A B C D E F G H I J K L M N O P Q R S T U V W X Y and Z Special characters and Numerics

This site contains terms and definitions from many IBM software and hardware products as well as general computing terms.


See newton.

The immediately preceding release of the operating system.

See node port.

See next available byte.

See negative acknowledgment reply.

See node abnormal condition program.

Nagle algorithm
An algorithm that reduces congestion of TCP/IP networks by combining smaller packets and sending them together.

See North American Industry Classification System.

naive application
An application with no knowledge of a server that fails over to another server. Client-to-server retry methods are used to reconnect.

NAK character
See negative acknowledgment character.

See new application license charge.

An alphanumeric term that identifies a data set, statement, program, or cataloged procedure. The first character of the name must be alphabetic.

name-and-password authentication
A security mechanism that is used by Internet protocols over TCP/IP and SSL. During name-and-password authentication, the client sends a text password to the server. The server verifies the identity of the client by confirming that the password that was sent matches the password that is stored on the server.

name binding
A relation between object classes that specifies that an object of one identified class may be the superior of an object of another identified class.

Name Binding Protocol (NBP)
In AppleTalk networks, a protocol that provides name translation function from the AppleTalk entity (resource) name (character string) into an AppleTalk IP address (16-bit number) on the transport layer.

named constant

  1. In RPG, a name representing a specific value that does not change during the running of the program.
  2. A descriptive name that is given to a value and can be used in a filter in place of a value.

named element
A specific design element in a Notes database -- for example, a view or folder.

named heap
A heap that was defined after the initial heap was provided by Language Environment. Named heaps have identifiers associated with them.

named mutex
A mutual exclusion lock that has a text name associated with it for identification and debugging purposes.

named-object table
A table that maps names to associated notes and objects; for example, a table that manages per-user unread lists.

named pipe

  1. A pipe that an application opens by name in order to write data into or read data from the pipe. Using a named pipe facilitates communication between a sending process and a receiving process.
  2. A type of interprocess communication that permits message data streams to pass between peer processes, such as between a client and a server.

named row data type
A row data type created with the CREATE ROW TYPE statement that has a declared name and inheritance properties and can be used to construct a typed table. See also row data type.

named set
See predefined set.

named style
A collection of styles that users can apply to other data in a file. Styles stored in a named style can include number format, typeface, type size, underlining, bold, italics, lines, colors, and alignment.

named type
A collection of IBM i resource types that are either object types or member types.

name field
A data construct that consists of one or more name phrases or name tokens. See also name phrase, name token.

Name/Finger Protocol (FINGER)
An application-level Internet protocol that provides an interface between the finger command and the fingered daemon.

name hygiene
A process that cleans and standardizes name information to correct possible errors and transpositions and to enable optimal matching and linking between entities. See also data quality management.

A WebSphere MQ object that contains a list of object names, for example, queue names.

Name Manager
A component that categorizes, parses, and normalizes names to increase name precision.

name part
Any meaningful element in a name that can be separated from the rest of the name. Common name parts include first name (or given name), middle name, last name (or surname), and generation. See also name token.

name pattern
In CoOperative Development Environment/400, a set of criteria used to display a list of VM files, MVS data set names, or i5/OS objects.

name phrase
An inseparable unit that consists of a name stem and any affixes that are associated with that name stem. Some name phrases may be made up of multiple stems, as in a Chinese name like Mei-Hui or an English name like Mary-Anne. One or more name phrases can be combined to create a name field. See also name field, name stem, name token.

name registry
In a Tivoli environment, a name service consisting of a two-dimensional table that maps resource names to resource identifiers and corresponding information within a Tivoli Management Region.

name resolution
In Internet communications, the process of mapping a machine name to the corresponding Internet Protocol (IP) address. See also Domain Name System.

name scope
The portion of an application within which a particular declaration of external data applies or is known.

name segment
See name phrase.

name server

  1. In networking, the server that converts network names to addresses.
  2. In a Fibre Channel network, the server that contains the worldwide identifiers (WWIDs) of all addressable nodes on the network.
  3. See domain name server.

name service

  1. In WebSphere MQ on UNIX and Linux systems and WebSphere MQ for Windows, the facility that determines which queue manager owns a specified queue.
  2. In a Distributed Computing Environment (DCE), the service that administers the DCE name space and provides the network binding information that is needed by a client to access the server.

name service handle
In the Distributed Computing Environment Remote Procedure Call (RPC), a reference to the context used by the series of next operations called during a specific name service interface (NSI) search or inquiry.

name service interface (NSI)

  1. The WebSphere MQ interface to which customer-written or vendor-written programs that resolve queue-name ownership must conform.
  2. In DCE Remote Procedure Call (RPC), a part of the application programming interface (API) of the RPC run time. NSI routines access a name service, such as the Cell Directory Service (CDS), for RPC applications.


  1. In XML and XQuery, a uniform resource identifier (URI) that provides a unique name to associate with the element, attribute, and type definitions in an XML schema or with the names of elements, attributes, types, functions, and errors in XQuery expressions.
  2. The scope within which a Common Information Model (CIM) schema applies.
  3. For authentication and access control, a configured instance of an authentication provider that allows access to user and group information. In Framework Manager, namespaces uniquely identify query items and query subjects. Different databases are imported into separate namespaces to avoid duplicate names.
  4. A part of the model in which the names may be defined and used. Within a namespace, each name has a unique meaning.
  5. Space reserved by a file system to contain the names of its objects.
  6. A category used to group similar types of identifiers. See also namespace scope.
  7. The set of all possible names composed of characters from the binder's character set, within which no duplicates are allowed. All external symbols have an assigned name space during binder processing and within program objects.
  8. A logical container in which all the names are unique. The unique identifier for an artifact is composed of the namespace and the local name of the artifact.

namespace object
A Data Interchange Services object that contains information about an XML namespace and assists the translator in being namespace aware when translating a source document to an XML document.

namespace prefix
The portion of a qualified name that is mapped to a URI reference and serves as a proxy for a URI reference in a qualified name.

namespace scope
A user-defined, abstract scope in which identifiers are visible only when the code explicitly includes the desired namespace. See also class scope, global scope, local scope, namespace, scope.

name standardization
A process that normalizes names by reducing them to the most common derivative or root name. For example, Richard is the most common derivative or root name for Dick, Ricardo, Ricky, Rich, or Ritchie and Mohammad is the most common derivative or root name for Mohamad, Mohamed, Mohammad, or Mohammed. See also data quality management, pipeline.

name stem
A name element that can stand alone or be combined with affixes or with other stems to form a complete name or name phrase. See also affix, name phrase, name token.

name string
A character string that identifies one of a variety of objects such as an icon, a resource, or a font.

name test
A node test that consists only of a QName or a wildcard. See also node test.

name token
The smallest indivisible element of a name, which is delineated by white space or punctuation. Name tokens combine to form name phrases and name fields. One name token might contain multiple name parts. Name tokens are either affixes or stems. The exact function of a name token depends upon its placement in the personal name. See also name field, name part, name phrase, name stem, regularization.

name transformation
In WebSphere MQ on UNIX and Linux systems and WebSphere MQ for Windows, an internal process that changes a queue manager name so that it is unique and valid for the system being used. Externally, the queue manager name remains unchanged.

name translation
In SNA network interconnection, the conversion of logical unit names, logon mode table names, and class-of-service names that are used in one network to equivalent names for use in another network. See also alias name.

name type
A 1-byte number from 1 to 255 that the client specifies as the first byte of the resource ID. The name type guarantees uniqueness of names for all resources of that name type. This uniqueness prevents clients from putting more than one resource with the same name and name type out on the resource structure. The resources within the name type can have different data resource types.

name-value pair
A parameter containing a name and a value in the format name=value. See also data point.

name variant
An alternative of a specified name that is considered to be equivalent to that name, but which differs from it in its particular external form. Name variants arise from spelling variations (for example, "Geoff" and "Jeff"), nicknames (for example, "Bill" for "William"), abbreviations (for example, "GPE" for "Guadalupe"), translations (for example, "Peter" for "Pierre"), or other processes.

name vital-record specification
A vital record specification used to define additional retention and movement policy information for data sets or volumes.

An operation that is used to obtain references to objects that are related to applications.

naming authority
In OSI, an organization that assigns OSI names and addresses--such as abstract syntax names, application context names, network entity titles, and NSAP addresses--to ensure that they are unique.

naming context
A logical namespace containing name and object bindings.

naming convention
A set of rules that govern the ways to create names in accordance with a standard format.

naming federation
The process of binding naming systems so that the aggregate system can process composite names that span the naming systems.

naming pattern
A set of specific rules used to automatically generate names when new containers are added to a file plan.

naming service
An implementation of the Java Naming and Directory Interface (JNDI) standard.

See Narrowband Advanced Mobile Phone Service.


  1. See Not a Number.
  2. See not-a-number.

narrow aisle reach truck
A lift truck designed to operate in narrow aisles.

Narrowband Advanced Mobile Phone Service (NAMPS)
A standard that combines cellular voice processing with digital signaling, increasing the capacity of Advanced Mobile Phone Service (AMPS) systems and adding functionality.

narrow character
An element of type char that, when processed sequentially, can represent text. See also wide character.

narrow form
Form that has the shorter edges at the top and bottom and the longer edges at the sides. See also wide form.


  1. See network-attached storage.
  2. See network access server.

NAS file server
See network-attached storage file server.

NAS file server node
See NAS node.

NAS node
A client node that is a network-attached storage (NAS) file server. Data for the NAS node is transferred by a NAS file server that is controlled by the network data management protocol (NDMP). A NAS node is also called a NAS file server node.


  1. See nodes attached table.
  2. See network address translation.
  3. See Network Address Translation.
  4. See Network Address Translator.

NAT conversation
A relationship between any of the following IP addresses and port numbers: (1) private source IP address and source port number (without NAT), (2) public (NAT) source IP address and public (NAT) source port number, (3) destination IP address and port number (an external network).

NAT indicator
An indicator on the topology graph that shows that the path between two network connections contains either source or destination address translations.

In U.S. EBCDIC, the three characters represented by X'7C', X'7B' and X'5B'; these values produce, respectively, the at sign (@), the number sign (#), and the dollar sign ($). On many keyboards and display screens in other countries, these hex values are displayed differently.

National Bureau of Standards (NBS)
See National Institute of Standards and Technology.

National Institute of Standards and Technology (NIST)
A U.S. government agency that supports industry, commerce, scientific institutions, and all branches of U.S. Government in advancing measurement science and developing standards. NIST was formerly known as the National Bureau of Standards (NBS). See also Federal Information Processing Standard.

National ISDN
A common ISDN standard developed for use in the U.S.

national language (NL)

  1. A language or dialect spoken by a group of people. This does not include computer programming languages.
  2. See language load identification.

national language dependent function (NLDF)
Any function of a hardware or software product that must be altered to suit a country, region, or language. Examples include date and time formats, monetary values, keyboards, measurement systems, and character data functions (such as sorting).

national language feature (NLF)
An optional feature that can be used to interact with QMF in specific native languages.

national language function
An operation on data or text that requires national language support. Such functions include sort, search, compare, monocase, fold, and merge.

national language implementation

National Motor Freight Classification code (NMFC code)
An industry-standard product code, which was defined by the NMFC Council for thousands of products.

National Motor Freight Classification council (NMFC council)
The council that defines the freight classes that are used to rate LTL shipments and the NMFC codes that identify groups and products.

National Science Foundation (NSF)
A United States government agency that is a sponsor of the National Science Foundation Network (NFSNET).

National Science Foundation Network (NSFNET)
A collection of local and regional networks in the United States that are connected by a high-speed backbone. NSFNET provides scientists access to a number of supercomputers across the country.

National Telecommunications and Information Administration (NTIA)
The United States government's authority on spectrum management.

National Television Standard Committee (NTSC)
A committee that sets the standard for color television broadcasting and video in the United States (currently in use also in Japan).

national terminal number (NTN)
In X.25 communications, the 1- to 12-digit number that follows the country code in the network user address.

national use graphics
Graphic characters on a coded character set that are not part of the invariant character set.

national vulnerability database (NVD)
A United States repository of standards-based vulnerability management data.

Pertaining to the relationship between a transport user and a transport provider that are both based on the same transport protocol.

native app
An app that is compiled into binary code for use on the mobile operating system on the device.

native attribute
A characteristic of an object that is managed on a specific content server and that is specific to that content server. For example, the key field 'policy num' might be a native attribute in a Content Manager content server, whereas the field policy ID might be a native attribute in a Content Manager OnDemand content server.

native character set
In COBOL, the default character set associated with the computer specified in the OBJECT-COMPUTER paragraph.

native collating sequence
In COBOL, the default collating sequence associated with the computer specified in the OBJECT-COMPUTER paragraph.

native context
A work context that is associated with a single application task.

native entity
An object that is managed on a specific content server and that is comprised of native attributes. For example, Content Manager index classes are native entities comprised of Content Manager key fields.

native file system
A file system that is locally added to the file server and is not added for space management. The hierarchical storage manager (HSM) client does not provide space management services to the file system.

native format
A format of data that is written to a storage pool directly by the server. See also non-native data format.

native function
A function written in C++ or Java code and that can be invoked from SPL code.

native interface
An interface that is specific to a system or subsystem.

native language
See local language.

native mode
In VTAM, a mode in which VTAM runs directly on the VM operating system rather than on a guest operating system.

native MPTN segment
An MPTN segment that spans only a single transport protocol type and does not use any MPTN flows or headers. A native MPTN segment may form part of an MPTN connection.

native network

  1. The subnetwork whose network identifier is used by a node for its own network-qualified resource names.
  2. In MPTN architecture, a transport network that provides the address type and transport characteristics assumed in the design of a particular transport. No MPTN address mapping or compensation protocols are used for data transfer.

native node
In MPTN architecture, a node that does not have MPTN capability.

native routing gateway
In MPTN architecture, a protocol-specific gateway that implements the same routing protocol as a given transport network.

native SQL procedure
An SQL procedure that is processed by converting the procedural statements to a native representation that is stored in the database directory, as is done with other SQL statements. When a native SQL procedure is called, the native representation is loaded from the directory, and DB2 executes the procedure. See also external procedure, external SQL procedure.

native text index
An index of the text items that are managed on a specific content server. For example, a single text search index on a Content Manager content server.

native transport address
In MPTN architecture, a transport-user address that has an address type that corresponds to the address type that is used by the transport network underlying the transport user. For example, an SNA name that is being registered within an SNA network.

natural key
For data sources that are not in relational databases, the name of an XML file or user name that can be mapped to tables in a data warehouse.

natural language
Human language, as opposed to the artificial languages used in computer programming.

natural language processing (NLP)
A field of artificial intelligence and linguistics that studies the problems inherent in the processing and manipulation of natural language, with an aim to increase the ability of computers to understand human languages.

natural reentrancy
The attribute of applications that contain no static external data and do not require additional processing to make them reentrant. See also constructed reentrancy.


  1. See network addressable unit.
  2. See network accessible unit.

See nearest active upstream neighbor.


  1. In the NetView Graphic Monitor Facility, to move between levels in the view hierarchy.
  2. To provide direction to a location.


  1. An area in the console that is used to locate and launch tasks.
  2. A process that is employed by users to explore a multidimensional database interactively by drilling, rotating and screening, usually using a graphical OLAP Client connected to an OLAP Server.
  3. The method that is used to locate, retrieve, and move to one or more topics, such as a table of contents, index, or search facility.

navigation bar
A set of links to other web pages in a website. For example, a navigation bar is typically located across the top or down the side of a page and contains direct links to the major sections within the website.

navigation button
A button that is used to navigate among open databases or web pages. Button functions include back, forward, stop, refresh, search, and go.

navigation folder
A navigation node that does not launch a page, but instead contains other nodes. A navigation folder is used to organize nodes in the navigation.

navigation key
In CDE, any of the keyboard keys that is used to move the current location of the cursor. These include the arrow keys (with or without the Control key); the Tab key (with or without the Control or Shift keys); the Begin and End keys (with or without the Control key); and the Page Up and Page Down keys.

navigation link
In architecture, a link type that specifies the linkage from a source document component to a contextually related target document component. Navigation links can be used to support applications such as hypertext and hypermedia.

navigation node
An element in the console navigation that is used to launch a page in the work area.

navigation pane
The pane that either displays icons for all views, folders, and agents in a Notes database or displays the current navigator.

navigation phrase
In the vocabulary, a phrase that associates two business elements. A navigation phrase corresponds to a method that has a return value or an attribute in the business object model (BOM).

navigation trail
An object that shows the route to the current page.

navigation tree
A hierarchical structure that is used to access information. See also navigation trail.


  1. A utility that allows the user to navigate catalog components, determine component dependencies, and locate components.
  2. Programmed graphics in the user interface that direct users to specific parts of a Notes database without their having to open views. Navigators usually include hotspots and can do simple actions such as opening a database, document, URL, view, folder, or another navigator.

navigator view
A hierarchical view of the resources in the workbench.

A DFSMSdfp component for implementing, verifying, and maintaining a DFSMS storage management subsystem (SMS) environment in batch mode. NaviQuest is the batch equivalent of Interactive Storage Management Facility (ISMF). It provides batch testing and reporting capabilities that can be used to automatically provide these functions: create test cases in bulk; run many other storage management tasks in batch mode; and use supplied, access method services (ACS), code fragments as models when creating ACS routines.

See Networking Broadband Services.

The ability to return more than one speech recognition result. Typically, an array of results is available in the application in order of descending probability.

See Name Binding Protocol.

See National Bureau of Standards.

See Network Computing Architecture.

See Network Communications Control Facility.

See Network Computing Kernel.

See non-colonized name.

Any valid configuration of processors for a system that is capable of supporting 1 - n processors.


  1. See network control program.
  2. See Network Control Program.

NCP connectionless SNA transport (NCST)
A function that enables the network control program (NCP) to transfer TCP/IP frames across the SNA subarea routing network. The NCST session interface provides access to an LU-LU session that can transport Internet Protocol (IP) datagrams to a host that uses the SNA Network Link (SNALINK) or to another NCP that uses NCST.

NCP/EP definition facility (NDF)
A program that is part of System Support Programs (SSP) and that is used to generate a load module for a partitioned emulation program (PEP), a Network Control Program (NCP), or an Emulation Program (EP).

NCP generation
The process by which the host processor assembles and link-edits a macroinstruction to produce a Network Control Program.

NCP major node
In VTAM, a set of minor nodes representing resources, such as lines and peripheral nodes, controlled by a network control program. See also major node.

NCP Packet Switching Interface
See X.25 NCP Packet Switching Interface.

NCP/Token-Ring interconnection (NTRI)
An NCP function that enables a communication controller to attach to the IBM Token-Ring Network, and that provides both subarea and peripheral node data link control (DLC) services in the SNA network.

See Network Computing System.

See NCP connectionless SNA transport.

See Network Database System.

See normalized device coordinates.

See NCP/EP definition facility.

See normal disconnected mode.

See Network Data Management Protocol.

See Network Data Representation.

near cache
A local, in-process cache in the client Java virtual machine (JVM) that includes a subset of the cached data set that is stored remotely in servers. Data in the near cache can become out of sync with recently changed data in servers.

near deduplication
The process of comparing multiple versions of the same search result and returning only the most relevant or highest ranked version. See also deduplication.

near edge
The edge of a character box appearing first in the inline direction.

nearest active upstream neighbor (NAUN)
In the IBM Token-Ring Network, the station sending data directly to another station in the ring.

near field communication (NFC)
A means of communicating data over a wireless connection over a very short distance (several centimeters). NFC chips consume very little power. For example, a smartphone with NFC enabled can communicate with an NFC-enabled movie poster when the user waves the smartphone in front of the poster (as opposed to scanning a tag).

Pertaining to a type of storage in which data is available in a short amount of time, but not instantly.

nearline SAS drive
A drive that combines the high capacity data storage technology of a Serial Advanced Technology Attachment (SATA) drive with the benefits of a serial-attached SCSI (SAS) interface for improved connectivity.

near synchronous mode
In high availability disaster recovery, the synchronization mode in which the primary database considers a transaction committed when it receives a message from the standby database confirming that the log data was received and written to the main memory of the standby system. See also peer state, synchronization mode.

See node error block.

Nederlands Normalisatie-Instituut (NNI)
The national standards-setting organization in The Netherlands.

To make ineffective or not valid.

negated combined condition
In COBOL, the NOT logical operator immediately followed by a combined condition in parentheses.

negated condition
A condition that is made opposite (either true or false), by the NOT logical operator.

negated simple condition
In COBOL, the NOT logical operator immediately followed by a simple condition.

negative acknowledgment
A response that indicates unsuccessful processing. See also acknowledgment.

negative acknowledgment character (NAK character)
The binary synchronous communication (BSC) transmission control character that indicates that the device is not ready or that an error occurred.

negative acknowledgment reply (NACK)
A reply from a printer to a host indicating that an exception has occurred. See also positive acknowledgment reply.

negative amount
An amount the indicates the absolute amount to be discounted from a list price.

negative polling limit
For a start-stop (SS) or binary synchronous communication (BSC) terminal, the maximum number of consecutive negative responses to polling that the communication controller accepts before suspending polling operations.

negative response (NR)
In SNA, a response indicating that a request did not arrive successfully or was not processed successfully by the receiver. See also positive response, response header.

negative virtual sensor
A virtual sensor for which the site attributes, such as the coordinates, width, or length, cannot be found. For example, a locked room that cannot be accessed.

negative zone
A zone in which a WiFI enabled device cannot be located because a person cannot physically be in that zone. For example, the shelving in a supermarket or retail store aisle.

Pertaining to an authored contract or authored amendment contract of which individual clauses can be edited by the external party.

negotiable BIND
In SNA, a capability that allows two half-sessions to negotiate the parameters of a session when the session is being activated.

negotiable link station
The capability of a link station to assume either a primary link-station or secondary link-station role and to negotiate with a partner link station during link activation which role it will assume.

negotiable lock
A lock whose mode can be downgraded, by agreement among contending users, to be compatible to all. A physical lock is an example of a negotiable lock.

negotiated release
In OSI, a service provided by the session layer that enables an application entity that has received a release indication to refuse the release and continue the session connection.

negotiated session key
An encryption key that is created at the beginning of the SSL handshake, which determines the key used when encrypting information over an SSL connection. The negotiated session key changes each time a new session is initiated.


  1. A two-phase process by which an initiating key server communicates with a responding key server. If the negotiations are successful, the key servers establish a dynamic virtual private network (VPN) connection that is between the two agreed-on endpoints. This approach, which is directed by the Internet Key Exchange (IKE) protocols, maintains the secrecy of keys.
  2. The process of coming to agreement on the terms, conditions, and language of a contract by its parties.
  3. In X.25 communications, the process by which two DTEs establish the packet size, packet window size, and throughput class to be used during a call procedure. See also validation.

negotiation monitor
A time-triggered transaction that alerts the enterprise when a negotiation remains in a particular status for specified amount of time.

negotiation pipeline
An established process workflow that allows participants to negotiate details of a transaction. This pipeline can be configured to occur anywhere within an existing pipeline. The result from the negotiation is either in the form of acceptance with the potential to update some of the negotiated values or in rejection of the terms of the transaction by one or both of the participants.

negotiation rule
Business rules and common codes that pertain to the negotiation process.

A router on a common subnetwork that has been designated by a network administrator to receive routing information.

neighbor data
Data collected from adapters that is used to discover information about devices that are connected to QRadar Quality Manager managed hosts.

neighbor node
A node that is connected to a given node by a link.

neighbor notification
In a token-ring network, the process by which each data station identifies the next active station so that all stations that are affected by a hard failure can be informed that a failure has occurred.

See node error program.

To incorporate a structure or structures into a structure of the same kind; for example, one call instruction (nested call) within another call instruction (nesting call) or one subroutine (nested subroutine) within another subroutine (nesting subroutine).

nested accessor environment element (nested ACEE)
An ACEE that contains the security environment (ENVR object) of a daemon nested beneath the security environment of the client to support daemon access to delegated resources. See also delegated resource.

nested ACEE
See nested accessor environment element.

nested bag
In the WebSphere MQ Administration Interface (MQAI), a system bag that is inserted into another data bag

nested call
A call to a program incorporated within another call to a program within the same job.

nested class
A C++ class defined within the scope of another class.

nested command
A command or group of commands whose processing is conditioned on the evaluation of a preceding or associated command. Nesting is a structured form of branching. In CL programs, the nested command is merged into an associated command. If the nested command is a DO command, the entire do group is nested.

nested condition
A condition that occurs during the handling of another, previous condition.

nested DO group
A DO group that is contained within another DO group.

nested enclave
A new enclave created by an existing enclave. The nested enclave that is created must be a new main routine within the process. See also child enclave, parent enclave.

nested exception
An exception that occurs while another exception is being handled.

nested file package
A file package that is added as an entry to another file package.

nested graph
A graph that contains nodes that are graphs, that is, a graph that contains nested subgraphs. See also flat graph.

nested group
A group that is contained within another group.

nested KPI
A KPI that is defined as a child of a parent KPI.

nested message
A message that is composed of one or more message types.

nested message type
A message type that is contained in another message type. In some cases, only part of a message type (for example, only the mandatory fields) is nested, but this "partial" nested message type is also considered to be nested. For example, SWIFT MT 195 could be used to request information about a SWIFT MT 100 (customer transfer). The SWIFT MT 100 (or at least its mandatory fields) is then nested in SWIFT MT 195.

nested program
In COBOL, a program that is directly contained within another program.

nested resource

  1. In architecture, a resource that is invoked within another resource using either an Include command or a local ID. See also nesting resource.
  2. A resource mapped in an overlay.

nested savepoint
A savepoint that is included or positioned within another savepoint. Nested savepoints allow an application to have multiple levels of savepoints active at a time and allow the application to roll back to any active savepoint as required.

nested subtree
A subtree within another subtree of the directory.

nested table
A data mining model configuration in which a column of a table contains a table.

nested table expression
A fullselect surrounded by parentheses in a FROM clause.

nested type
A complex data type that references another complex data type. A nested type can be an array type with elements that are row or array types or can be a row type with fields that are row or array types.


  1. In the WebSphere MQ Administration Interface (MQAI), a means of grouping information returned from WebSphere MQ.
  2. A display technique that is used to show the results of a multidimensional query that returns a sub-cube. The column/row labels display the extra dimensionality of the output within the labels describing the members of each dimension.

nesting coordinate space
In architecture, a coordinate space that contains another coordinate space. Examples of coordinate spaces are medium, overlay, page, and object area.

nesting identifier
An identifier (a number from 2 to 255) that is used to access a nested message type.

nesting resource
In architecture, a resource that invokes nested resources. See also nested resource.

An element in a multiple response variable that shows the number of respondents who chose one or more categories in a group of categories. A subtotal element for the same categories would show the number of responses given.

See node error table.

A program with which a user can create interactive web applications by using macros to add logic, variables, program calls, and report writing to HTML.

Net 5
The test specification for conformance to the Euro-ISDN standard for primary rate access to ISDN.

Eight-bit ASCII with the first bit always set high, for error checking.

net available quantity
The quantity of an SKU available for new orders after taking into account the stock reservations and allocation constraints. The net available quantity is calculated as: OnHand - Pending Out.

See NetBIOS Extended User Interface.

NetBIOS (Network Basic Input/Output System)
A standard interface to networks and personal computers that is used on local area networks to provide message, print-server, and file-server functions. Application programs that use NetBIOS do not have to handle the details of LAN data link control (DLC) protocols. See also basic input/output system.

NetBIOS Extended User Interface (NetBEUI)
The application programming interface (API) to the NetBIOS transport protocol.

net change
The cumulative effect of multiple changes to an object. For example, an add action followed by a remove action cancels out other changes, consequently yielding no net change.

Netcool/Impact policy language (IPL)
A programming language used to write policies.

See Network Design and Analysis.

Netezza Database Accelerator Card
A Netezza-designed expansion board that provides the FPGA analysis engines, memory, and I/O bandwidth to process the queries and data communications from its associated SPU to the disks that the SPU owns.

A Cisco network protocol that monitors network traffic flow data. NetFlow data includes the client and server information, which ports are used, and the number of bytes and packets that flow through the switches and routers connected to a network. The data is sent to NetFlow collectors where data analysis takes place.

A network-wide group of hosts and users. A netgroup can be used to restrict access to shared information on Network File Systems (NFS) and to restrict remote access.

net ID
See network identifier.

See network identifier.

NETID backbone average distance
In NetDA/2, the average path length (number of hops) in the set of shortest paths between backbone nodes in a NETID subnetwork. If more than one shortest path exists between two backbone nodes, only one of these paths is included in the set of shortest paths for calculation of the average.

NETID backbone diameter
In NetDA/2, the maximum path length (number of hops) in the set of shortest paths between backbone nodes in a NETID subnetwork.

NETID subnetwork
In NetDA/2, a group of nodes that have the same network ID. The NETID subnetwork includes all subarea and APPN subnetworks that have the same network ID.

net inventory
The quantity of the SKU at a location. The net inventory is calculated as: OnHand + Pending In - Pending Out.

See network map.

See network mask.

In CICS, the name by which a CICS terminal or a CICS system is known to z/OS Communications Server.

A shared resource on a server. When a netname is assigned to a resource, the user must refer to it by its netname and specify the server where the resource is located.

net present value (NPV)
The estimated monetary value of an investment based on expected returns and expected costs, where these expected returns and expenses are discounted by a rate that reflects inflation and opportunity costs.

A component of Infoprint Server that provides the capability for an installation to automatically direct VTAM application data targeted for a network printer to the JES spool without changing the VTAM applications. From the JES spool, the data can be printed on a JES or PSF printer or sent to another location for printing.

netting system
A clearing system that nets the debit and credit payments of a bank, that is, that maintains as a balance only the difference between debits and credits.

Pertaining to an IBM licensed program that is used to monitor a network, manage it, and diagnose its problems.

NetView Bridge
In Tivoli NetView for OS/390, a set of application programming interfaces (APIs) that enable Tivoli NetView for OS/390 to interact with various types of databases in the OS/390 environment.

NetView command authorization table
In the NetView program, a set of entries that define an operator's access restrictions to commands, and depending on the level of granularity that a customer chooses to instate, to command keywords and keyword values. See also command authorization.

NetView command list language
An interpretive language that is unique to the NetView program, and that is used to write NetView command lists in environments where REXX is not supported.

NetView Distribution Manager (DM, NetView DM)
A suite of IBM programs providing change management and distribution facilities.

NetView DM
See NetView Distribution Manager.

NetView Graphic Monitor Facility (NGMF)
A function of the NetView program that provides the network operator with a graphic topological presentation of a network controlled by the NetView program and that allows the operator to manage the network interactively.

NetView log
See network log.

NetView-NetView task (NNT)
In Tivoli NetView for OS/390, the task under which a cross-domain NetView operator session runs. See also operator station task.

NetView/PC application record
In the NetView/PC program, information that defines the communication path between the NetView/PC program and the host.

NetView Performance Monitor (NPM)
An IBM licensed program that collects, monitors, analyzes, and displays data relevant to the performance of a VTAM telecommunication network. It runs as an online VTAM application program.

NetView Program
An IBM licensed program that is used to monitor and manage a network and to diagnose network problems.

NetWare file server
A file server that provides the print queue and print server functions in the Novell environment.

NetWare managed site
In a Tivoli environment, a resource that represents (a) a Novell NetWare server on which the Tivoli NetWare repeater is installed and (b) one or more clients. A NetWare managed site enables profiles to be distributed through the NetWare server to one or more specified client PCs using either TCP/IP or IPX.

NetWare print server
A Novell file-server printing function that contains printer definitions used to service NetWare print queues.

NetWare requester
A requester that allows print jobs to be submitted to a NetWare print queue.


  1. To make connections with other social media users.
  2. A system of resources, such as appliances, computers, and storage devices, that are connected virtually or physically.

network accessible unit (NAU)
See network addressable unit.

network access server (NAS)
A device that functions as an access control point for users in remote locations who connect to an internal network or to an ISP. A NAS might include its own authentication services or rely on a separate authentication server. A NAS can be a dedicated server or a software service within a regular server.

network acknowledgment
A response from the network indicating the status of an interchange envelope, such as sent or received.

network adapter
A physical device, and its associated software, that enables a processor or controller to be connected to a network.

network address

  1. An identifier for a node in a network, for example an IP address. See also host name, IP address.
  2. In NCS, a unique identifier (within an address family) for a specific host on a network or an internet. The network address is sufficient to identify a host, but does not identify a communication end point within the host.
  3. In SNA networking, an address that consists of subarea and element fields and identifies a link, link station, or network addressable unit.

network addressable unit (NAU)
In SNA networking, any device on the network that has a network address, including logical units, physical units, and system service control points.

Network Address Translation (NAT)
In a firewall, the conversion of secure Internet Protocol (IP) addresses to external registered addresses. This enables communications with external networks but masks the IP addresses that are used inside the firewall.

network address translation (NAT)

  1. In a firewall, the conversion of secure Internet Protocol (IP) addresses to external registered addresses. This enables communications with external networks but masks the IP addresses that are used inside the firewall.
  2. The conversion of a network address that is assigned to a logical unit in one network into an address in an adjacent network. See also alias address, real address, static network address translation.

Network Address Translator (NAT)
A network protocol that allows multiple computers to connect to the Internet from what the public sees as the same source IP address, even though each computer has its own IP address behind the NAT.

network administrator
A person who defines the network configuration and other network-related information. This person controls how an enterprise or system uses its network resources.

network agent
A logical extended agent used to create dependencies between jobs and job streams on separate Tivoli Workload Scheduler networks. See also internetwork dependency.

network analyzer
A network device that is programmed to monitor and analyze all traffic data that it receives on a LAN.

network application program
In the IBM Token-Ring Network, a program that is used to connect and communicate with adapters on a network, enabling users to perform application-oriented activities and to run other application programs.

network architecture
The logical structure and operating principles of a computer network. The operating principles of a network include those of services, functions, and protocols.

network-attached storage (NAS)
A task-optimized storage device directly attached to a network that operates independently of the general-purpose file servers.

network-attached storage file server (NAS file server)
A dedicated storage device with an operating system that is optimized for file-serving functions. A NAS file server can have the characteristics of both a node and a data mover.

network attribute
Control information about the communications environment. System name and default local location name are examples of network attributes. See also system value.

network authentication service
The i5/OS implementation of the Kerberos V5 standard protocol that enables the System i product and several System i services (such as IBM System i5 Access for Windows) to use for authentication a Kerberos ticket as an optional replacement for a user name and password.

Network Basic Input/Output System
See NetBIOS.

network boot
The process of starting a computer directly over the network rather than from a disk.

network boot image
A boot image that supports standalone, diskless, and dataless machines.

network chart
See association chart.

network class

  1. The type of TCP/IP network, such as Class A, Class B, or Class C.
  2. An object class that is used for symbols that represent compound objects that might contain objects such as hosts and network devices. See also connector class.

network common carrier
Any organization that offers packet-switched data networks to the general public.

Network Communications Control Facility (NCCF)
A licensed program that serves as a base for command processors that can monitor, control, and improve the operation of a network.

network component
The component that displays telecommunication networks in the form of topological or geographical views. See also handler.

network computing
The use of a scalable distributed computing infrastructure that encompasses the key elements of networking technologies. Examples are systems and network management; the Internet and intranets; clients and servers; application programs, databases; transaction processing; and various operating systems and communication protocols.

Network Computing Architecture (NCA)
A set of protocols and architectures that support distributed computing.

Network Computing Kernel (NCK)
In the Network Computing System (NCS), the combination of the remote procedure call (RPC) runtime library and the Location Broker, which provide the function necessary required to run distributed applications.

Network Computing System (NCS)
A set of software tools that conform to the Network Computing Architecture. These tools include the Remote Procedure Call runtime library, the Location Broker, and the NIDL compiler.

network configuration
In SNA or TCP/IP, the group of links, nodes, machine features, devices, and programs that make up a data processing system, a network, or a communication system.

network controller
A concentrator and protocol converter that is used with SDLC links. By converting protocols, which manage the way that data is sent and received, the IBM 3710 Network Controller enables the use of non-SNA devices with an SNA host processor.

network control mode
The mode in which a network control program can direct a communication controller to perform such activities as polling, device addressing, dialing, and answering. See also emulation mode.

Network Control Program (NCP)
An IBM licensed program that provides communication controller support for single-domain, multiple-domain, and interconnected network capability.

network control program

  1. A program used for requests and responses exchanged between physical units in a network for data flow control.
  2. A program that controls the operation of a communication controller. See also emulation program.

network control program generation
The process, performed in a host processor, of validating, assembling, and link-editing network definition statements to produce a network control program.

network convergence
The act of updating the topology database of all attached routing nodes to reflect the addition, deletion, or changes to the reachability and metrics of a network resource. The updating is accomplished through the exchange of topology messages.

network credential
The data specific to each underlying security mechanism.

Network Database System (NDB)
The part of TCP/IP that uses the remote procedure call (RPC) protocol to allow interoperability among a variety of workstation users and a mainframe relational database system. It provides access to a mainframe relational database from workstations and mainframes and allows users to issue SQL statements interactively, or to invoke NDB services from within a C application program. NDB services can then be used to pass SQL statements to a DB2 or SQL/DS system and to handle responses from the DB2 or SQL/DS system.

Network Data Management Protocol (NDMP)
A protocol that allows a network storage-management application to control the backup and recovery of an NDMP-compliant file server, without installing vendor-acquired software on that file server.

Network Data Representation (NDR)
In DCE Remote Procedure Call (RPC), the transfer syntax defined by the Network Computing Architecture.

network data-transfer rate
A rate that is calculated by dividing the total number of bytes that are transferred by the data transfer time. For example, this rate can be the time that is spent transferring data over a network.

network delivery notification
A delivery notification that conforms to the network protocol. See also application delivery notification.

network deployment
The deployment of an IMS Server on a WebSphere Application Server cluster.

network deployment cell
A logical group of servers, on one or more machines, managed by a single deployment manager.

Network Design and Analysis (NetDA)
A host-based IBM licensed program for designing and analyzing networks. Its major functions are network definition, performance and availability analysis, route generation and explicit route (ER) numbering, and path-statement generation.

network device
A router, switch, hub, or other device that maintains network communication.

network directory database
See distributed directory database.

network driver
A program that allows two or more computers or work stations to interoperate over a communications network. The computers or work stations may be heterogeneous or homogeneous devices. Services provided by a network driver can include file sharing, remote database access, electronic mail, remote print services, time services, security services, data conversion, remote function call, and work station emulation.

network driver for Microsoft Windows
In System i Access, a program that integrates System i Access functions with the standard user interface in the Microsoft Windows program. The Windows network driver allows a Windows user to redirect print files to a System i server (using the virtual print function), manage these redirected printer files (using Windows Print Manager), and use remote System i server files (using the shared folders function).

network element

  1. In the Simple Network Management Protocol (SNMP), a gateway, router, or host that contains management agents responsible for performing the network management functions requested by the network management stations.
  2. Any shelf-based telecom or data communication equipment, outside plant equipment, or peripheral equipment. Network elements are predefined business objects.

network entity
In OSI, a component, such as the OSI Communications Subsystem network layer, that provides network services for an open system.

network entity title
In OSI, a title that identifies the network entity on a given node. Because a node can have only one network entity, the network entity title uniquely identifies a given node. Network entity titles are represented in the same format as NSAP addresses.

network entity title nickname
In OSI, a nickname that identifies a network entity title.

network failure
An event that occurs when no node in a cluster is able to communicate across the network.

network file
In object distribution, a file (either a physical file or a save file) sent by one user to one or more other users. A network file is placed on the recipient's message queue when it arrives at the destination system.

Network File System (NFS)
A protocol that allows a computer to access files over a network as if they were on its local disks.

network gateway accounting (NGA)
The Tivoli NetView Performance Monitor subsystem that receives traffic information from the gateway network control program (NCP) for sessions that flow throughout a network.

network group
In Backup, Recovery, and Media Services, a cluster of systems sharing a common media inventory. Available tapes are eligible for use by any system in the network group. Each system in the network group receives updates to the media inventory, regardless of which network member makes the change.

network hierarchy
A type of container that is a hierarchical collection of network objects.

network ID
See network identifier.

network identifier

  1. A single character that is placed before a message type to indicate which network is to be used to send the message; for example, S for SWIFT.
  2. The network ID that is assigned by IMS or CICS, or if the connection type is RRSAF, the RRS unit of recovery ID (URID).
  3. In TCP/IP, that part of the IP address that defines a network. The length of the network ID depends on the type of network class (A, B, or C).

Network Information Center (interNIC, NIC)
In networking, an organization at SRI International that provides information about TCP/IP and the Internet. NIC assigns Internet addresses and acts as the repository for all Requests for Comments and TCP/IP documentation and policies.

Network Information Service (NIS)

  1. A set of protocols, developed by Sun Microsystems, that are used to provide directory services for network information.
  2. A distributed database that is used to maintain consistent configuration files throughout a network.

network information services (NIS)
A set of UNIX network services (for example, a distributed service for retrieving information about the users, groups, network addresses, and gateways in a network) that resolve naming and addressing differences among computers in a network.

Networking Blueprint
An open, highly modular framework for networking support using industry-wide standards. The Networking Blueprint (a) incorporates multiple protocols and multiple vendor components; (b) enables comprehensive systems management and application choices independent of the network; and (c) facilitates the support of new technologies.

Networking Broadband Services (NBBS)
An IBM architecture for high-speed networking that complements the asynchronous transfer mode (ATM) standards and provides access services, transport services, and network control for user traffic.

networking protocol
Rules for using communication lines. Protocols can identify the direction of data flow, where data begins and ends, how much data is being transmitted, and whether data or control information is being sent. The two protocols that JES3 uses to establish a networking environment are binary synchronous communication (BSC) and systems network architecture (SNA).

Network Installation Management (NIM)
An environment that provides installation and configuration of software within a network interface.

network interface (NWI)

  1. The physical interface that allows a user to connect to the integrated services digital network (ISDN).
  2. The software that formats packets at the network layer into packets that specific network adapters can understand and transmit. See also network interface attribute.

network interface attribute
A property of a network interface. Network interface attributes include IP label or IP address and a function, such as service, boot, or persistent. See also network interface.

network interface card

  1. The physical hardware which attaches the network to the cluster node. SystemMirror version 7 supports only ethernet capable NICs.
  2. A printed circuit board that plugs into a personal computer, server, or workstation. It controls the exchange of data over a network and provides the electronic functions for the data-link protocol or access method, such as token ring or Ethernet.

network interface controller (NIC)
Hardware that provides the interface control between system main storage and external high-speed link (HSL) ports.

Network Interface Definition Language (NIDL)
A declarative language for the definition of interfaces that has two forms, a Pascal-like syntax and a C-like syntax. NIDL is a component of the Network Computing Architecture.

network interface description
An i5/OS communications object that represents the physical interface to the integrated services digital network (ISDN). The network interface description must be configured in addition to the line, controller, and device descriptions. The system-recognized identifier for the object type is *NWID.

network interface event
An event generated by the cluster manager in response to the failure or recovery of a network interface card.

network job
In object distribution, a batch input stream sent by one user to one or more users in the network as defined in the system distribution directory.

network job entry (NJE)

  1. A facility for linking single-processor systems or multi-access spool complexes into a processing network
  2. In object distribution, an entry in the network job table that specifies the system action required for incoming network jobs sent by a particular user or group of users. Each entry is identified by the user ID of the originating user or group.

network job table
In object distribution, a table containing entries that control the system action required for incoming network jobs.

network layer
In OSI architecture, the layer that provides services to establish a path between open systems with a predictable quality of service.

network layer packet (NLP)
A message unit used to carry data between High-Performance Routing (HPR) nodes.

network-layer protocol data unit (NPDU)
In OSI, a protocol data unit in the network layer. (I)

network-layer service access point
In OSI, a service access point in the network layer. (I)

network-layer service data unit (NSDU)
In OSI, a unit of data transferred between the transport layer and the network layer.

network license
A license that is maintained on a network license server for use upon request by a License Use Management Runtime client.

network license client
A node configured to make use of licenses by requesting them from a network license server.

network licensed product
A licensed product that is enabled such that the licenses are maintained on a server for use upon request by a License Use Management Runtime client.

network license server
A node in the network on which network licenses are stored for use by a License Use Management Runtime client.

Network Lock Manager (NLM)
A service used by Network File System (NFS) when using version 2 or 3 of the NFS protocol that allows a client on the host to lock a record or a file on the NFS server.

network log
A file that contains (a) messages, commands, and command procedures that have been processed by monitoring and management software and (b) output resulting from commands, command procedures, and other activity occurring within monitoring and management software.

Network Logical Data Manager (NLDM)
A program that collects and interprets records of errors detected in a network and suggests possible solutions. NLDM consists of commands and data services processors that comprise the Netview software monitor component.

network management

  1. The process of planning, organizing, and controlling a communications-oriented system.
  2. In OSI, systems management that involves processing and exchanging management information over two or more nodes. Network management provides the ability to manage one or more nodes from another node.
  3. The conceptual control element of a data station that interfaces with all of the layers of that data station and is responsible for the setting and resetting control parameters, obtaining reports of error conditions, and determining if the station should be connected to or disconnected from the medium.

network management association
In OSI, an ACSE association between two systems management application entities (SMAEs)--one representing a managing process, the other representing an agent process. After network management associations are established, a manager can send operator commands to its agents and an agent can send event reports to its managers.

network management domain
In OSI, a manager and the agents that it manages. An agent can participate in more than one network management domain. In OSI Communications Subsystem, the agent at a local node is always part of the management domain of the manager at that local node.

network management gateway (NMG)
A gateway between the SNA network management system and the network management function of one or more non-SNA networks.

network management station (NMS)
In the Simple Network Management Protocol (SNMP), a station that executes management application programs that monitor and control network elements.

network management vector transport (NMVT)
A management services request/response unit (RU) that flows over an active session between physical unit management services and control point management services (SSCP-PU session). See also control point management services unit, multiple-domain support message unit.

network manager
A program or group of programs that is used to monitor, manage, and diagnose the problems of a network.

network map (netmap)
A configuration file that defines the nodes in the network and the communication information of the nodes. See also guided node discovery.

network mask (netmask)

  1. A number that is the same as an Internet Protocol (IP) address. A network mask identifies which part of an address is to be used for an operation, such as making a TCP/IP connection. See also IP address takeover.
  2. A method for identifying the different components of an IP address. An IP address consists of a network (or subnet) component and a host component. For IPv4 addressing, the network mask is a series of 4 octal numbers separated by periods (dots). Each digit of the octal value is used as a logical mask to identify the network part. For IPv6, the network mask is referred to as a "prefix length" and is a number which specifies how many of the leading digits of the address represent the network part of the address.

network message
In object distribution, a message sent by one user to one or more users enrolled in the system distribution directory with the Send Network Message (SNDNETMSG) command.

network mode
See network QOS mode.

network-mounted client
An IBM data server client whose code and configuration files are stored on a network path.

network name

  1. In SNA, a symbolic name by which end users refer to a network addressable unit (NAU), a link station, or a link. See also ACB name, network name.
  2. See also network name.
  3. A name that identifies the server in the network. The network name is comprised of the communication protocol and server name.
  4. A user supplied name which uniquely identifies each network in the cluster.

Network News Transfer Protocol (NNTP)
A protocol that is used to post messages in, distribute messages to, and retrieve messages from newsgroups and to transfer articles between news servers.

network node

  1. A node that can define the paths or routes, control route selection, and handle directory services for the APPN function.

network node control point (NNCP)
A control point that provides session and routing services to adjacent end nodes.

network node domain
An APPN network node and its served end nodes.

network node server

  1. An APPN network node that provides network services for its local logical units and adjacent end nodes.
  2. A network node that is directly connected to an end node or a low-entry networking end node, and has been assigned to service the end node session requests.

network object

  1. A component of a network hierarchy.
  2. A group of predefined settings that can be shared among multiple network access policy rules to control traffic flow, communication, and access between hosts, segments, or subnets on a network.
  3. An entry in the Network Installation Management (NIM) database that represents a local area network.

network operations center (NOC)
Any center that has responsibility for the operational aspects of a production network. Examples of NOC tasks are monitoring and control, troubleshooting, and user assistance.

network operator
A person who controls the day-to-day operation of all or part of a network. See also domain operator.

network path
In System i Access, the system, path, or library, and the name of the server network driver, network printer, or data queue that the user is accessing. For example, the network path used to access a printer through the network driver is: //system/library/printer.

network performance analysis logical unit (NPALU)
A logical unit (LU) defined in the network control program (NCP) that is used to collect performance data from the NCP.

Network Printer Manager (NPM)
An application that lets network administrators monitor, control, and configure IBM network printers. NPM also lets network administrators monitor some aspects of printers controlled by PSF and other manufacturers' network printers that comply with RFC 1759.

Network Print Facility (NPF)
A feature that routes VTAM, JES2, or JES3 printer output to printers in a TCP/IP network.

Network Problem Determination Application (NPDA)
A program that collects and interprets records of errors detected in a network and suggests possible solutions. NPDA consists of commands and data services processors that comprise the Netview hardware monitor component.

network product support (NPS)
The function of the NetView program that provides operations control for the IBM 3710 Network Controller, the 5860 family of modems, and the NCP and provides configuration of 3710s and the 5860 family of modems. NPS provides operator commands for running diagnostics for link problem determination and for changing product operating parameters.

network profile
A profile that specifies the network interface configurations that can be used by a node. The network profile can be included in a provisioning template.

network protocol
A communication protocol from the Network Layer of the Open Systems Interconnect (OSI) network architecture, such as the Internet Protocol (IP).

network protocol stack
A set of network protocol layers and software that work together to process the protocols.

network provider
In X.25 communications, the organization, often a PTT, that provides a public network.

network QOS mode (network mode)
In the OSI Communications Subsystem licensed program, a set of X.25 connection-mode quality-of-service (QOS) values that determine the type of connection established between two nodes.

network-qualified name
In SNA, a name that uniquely identifies a specific resource, such as a logical unit (LU) or control point (CP), within a specific network. A network-qualified name consists of a network identifier and a resource name, each of which is a symbol string that is 1 to 8 bytes.

network resource
In OSI, a general term for resources available to the network, such as lines and line sets.

Network Routing Facility (NRF)
A licensed program that runs under the control of the Network Control Program and uses a System/370 backbone network. The network routing facility provides primary logical unit support and a path for data between a display station and an application without using the System/370 host system.

network routing facility (NRF)
An i5/OS function that runs with the Network Routing Facility licensed program to allow the path for data to go from a display station to a server application.

network scan
An automated process that discovers hardware devices, such as computer and printers, that exist in a network. Network scan results include details of the discovered devices, including IP addresses and device names. See also scan, software scan.

network security layer

  1. The protection of a network from malicious activity through monitoring, collecting, and analyzing network activities.
  2. Software that is responsible for authenticating end users and authorizing them to access network resources, such as IBM Tivoli Access Manager. See also credential mapper.

network server description (NWSD)
An object that contains a description of the characteristics of a file server I/O processor that is attached to the system.

network service
A service that transmits data or provides conversion of data in a network.

network service access point

  1. The endpoint of a network connection used by the SWIFT transport layer.
  2. The point at which network services are provided by a network entity to a transport entity according to the OSI reference model. NSAP addresses are assigned by a hierarchy of registration authorities so that each valid NSAP address provides a globally unambiguous identification of one system. One system can have multiple NSAP addresses.

network services (NS)

  1. The session services (directory and route-selection functions) and management services provided by an APPN network-node control point to its domain.
  2. The services within network addressable units that control network operation through SSCP-to-SSCP, SSCP-to-PU, SSCP-to-LU, and CP-to-CP sessions.

network services header
In SNA, a 3-byte field in a function management data (FMD) request/response unit (RU) flowing in an SSCP-LU, SSCP-PU, or SSCP-SSCP session. The network services header is used primarily to identify the network services category of the request unit (RU) (for example, configuration services and session services) and the particular request code within a category.

network session accounting (NSA)
The Tivoli NetView Performance Monitor subsystem that receives session accounting information from the network control program (NCP) for sessions that flow throughout a network.

Network Shared Disk (NSD)
A component for cluster-wide disk naming and access.

network simplex
A version of the simplex algorithm that takes into account the network structure in a network problem.

Network Status Manager (NSM)
A service used by Network File System (NFS) when using version 2 or 3 of the NFS protocol to determine whether resources, such as file open share or byte range locks, are still in use by a remote client.

network table file
A text file that contains the system-specific configuration information for each node in a Content Manager system. Each node in the system must have a network table file that identifies the node and lists the nodes that it needs to connect to. The name of a network table is FRNOLINT.TBL.

network tap (TAP)
In computer networking, a virtual-network kernel device that simulates a link layer device. A TAP creates a network bridge. See also network tunnel.

Network Terminal Option (NTO)
An IBM licensed program, used in conjunction with NCP, that allows certain non-SNA devices to participate in sessions with SNA application programs in the host processor. When data is sent from a non-SNA device to the host processor, NTO converts non-SNA protocol to SNA protocol; and when data is sent from the host processor to the non-SNA device, NTO converts SNA protocol to non-SNA protocol.

network terminating unit (NTU)
In X.25 communications, the point of access to a network.

network termination (NT)
In ISDN, equipment that provides the function necessary for the operation of the access protocols by the network.

network termination 1 (NT1)
In ISDN, an end point for the network's transmission line. Network termination 1 is responsible for the physical layer characteristics (of the OSI reference model), such as ending the line transmission, monitoring performance, and timing.

network termination 2 (NT2)
In ISDN, an end point for the network's transmission line. Network termination 2 is responsible for the network layer, the data link layer, and the remaining functions of the physical layer (not included in network termination 1) of the OSI reference model. Examples include communications controllers and public branch exchanges (PBXs).

network time
The time that is spent transmitting all required data through the network.

Network Time Protocol (NTP)
A protocol that synchronizes the clocks of computers in a network.

network-to-network interface (NNI)
In an asynchronous transfer mode (ATM) network, the interface between nodes (switches).

network topology database

  1. The representation of the current topology of the intermediate routing portion of the APPN network. The network topology database contains entries for network nodes and the transmission groups interconnecting them. Each entry describes the current characteristics of the node or transmission group that it represents. The topology database is used to determine the preferred session route between two end nodes for a given class of service.
  2. In Managed System Services, a set of database files that contain topology information and general system information for nodes throughout the network.

network tunnel (TUN)
In computer networking, a virtual-network kernel device that simulates a network layer device. A TUN routes messages. See also network tap.

network type
In DCE Remote Procedure Call (RPC), a type defined in an interface definition and referred to in a represent_as clause that is converted into a local type for manipulation by application code.

network user
A kernel-level protocol or user-level application that accesses the services of the network layer.

network user address (NUA)
In X.25 communications, the X.121 address containing up to 15 binary code digits.

network user identification (NUI)
In X.25, the network specific information that enables the transmitting data terminal equipment (DTE) to provide billing, security, or management information on a per-call basis to the data circuit-terminating equipment (DCE). The NUI can identify a network user independently of the port being used.

network virtual terminal (NVT)
A Telnet service that provides a default common interface to remote terminals. The client application negotiates NVT support and, as a result, the Telnet server maps 5250 functions to virtual terminal characters.

network weight
The numeric value applied to each network that signifies the importance of the network. The network weight is defined by the user.

neural network
A mathematical model for predicting or classifying cases by using a complex mathematical scheme that simulates an abstract version of brain cells. A neural network is trained by presenting it with a large number of observed cases, one at a time, and allowing it to update itself repeatedly until it learns the task. See also Kohonen network.

neutral color
In the GDDM function, one of the colors selected to display graphics primitives; for example, white on a display or black on a printer. See also background color.

neutral white
In architecture, a color attribute that gives a device-dependent default color, typically white on a screen and black on a printer.

new application license charge (NALC)

new function mode

  1. The normal mode of operation that exists after successful completion of a version-to-version migration. At this stage, all new functions of the new version are available for use. A DB2 data sharing group cannot coexist with members that are still at the prior version level, and fallback to a prior version is not supported. See also conversion mode, conversion mode*, enabling-new-function mode, enabling-new-function mode*.
  2. An installation mode of QMF that permits QMF owner and object names to be as long as the database allows.

newline character (NL)
A control character that causes the print or display position to move down one line.

new-process image
A new program laid over the current program by the exec subroutine.

new product
For the purposes of the Globalization White Paper: any product that is undergoing substantial changes in architecture or design or where more than 50% of the code will be new or rewritten. A product that is made up of other existing products with a small amount of integration code is not considered to be a new product.

The periodic transfer of newly posted newsgroup articles from one NNTP server to another using the NNTP protocol. Enabling the NNTP protocol on a Domino server allows you to set up a newsfeed to transfer both USENET and private newsgroup articles.

An online discussion group that users with newsreaders can participate in. A Domino NNTP server can store Usenet newsgroups, public newsgroups distributed on the Internet, and private newsgroups.

news item
A single entry in a Really Simple Syndication (RSS) compatible format. It can include a headline, text, and a link to more information. A news item task in an agent can be used to create news items for display in a Cognos Connection portlet.

A client application that runs the NNTP protocol and is used to select, view, create, sort, and print Usenet and private newsgroup articles.

New Technology File System (NTFS)
One of the native file systems in Windows operating environments.

newton (N)
The unit of force required to impart an acceleration of one meter per second per second to a mass of one kilogram.

next available byte (NAB)
The address of the next available byte of storage on a doubleword boundary. This address is a segment of stack storage.

next operable sentence
In COBOL, the next sentence to which control will be transferred after the running of the current statement is complete.

next record
The record that logically follows the current record of a file.

next sequential instruction
The next instruction to be executed in the absence of any branch or transfer of control.

next system
A node in the SNADS network that is physically connected to the local system, and through which distribution items can be routed.

next system queue
In SNADS, a queue that is used to hold distribution items that are being routed to a next system.

next system table
In SNADS, a table identifying all the systems physically connected to the local system.

See Non-Facility Associated Signaling.

See near field communication.

N-formatted number
A number that has an implied decimal point. For example, 2.01 is formatted as 201.

See Network File System.

NFS client
A program or system that mounts remote file directories from another host called a Network File System (NFS) server.

NFS cross-mounting
An NFS configuration in which one node is both the NFS server for one file system and the NFS client for another file system, while a second node is the NFS client for the first file system and the NFS server for the second file system. Each node is part of a mutual takeover or active-active cluster configuration, both providing and mounting an NFS file system.

NFS server
A program or system that allows authorized remote hosts called Network File System (NFS) clients to mount and access its local file directories.


See network gateway accounting.

See NetView Graphic Monitor Facility.

n-gram segmentation
A segmentation method that considers overlapping sequences of a specific number of characters as a single word.

See node initialization block.

A bit-pattern consisting of four bits.

NIB list
A series of contiguous node initialization blocks.


  1. See network interface controller.
  2. See network interface card.
  3. See Network Information Center.

nice value
A number that is used to bias the priority of a process. A higher number results in a lower priority.


  1. See alias.
  2. In a federated system, an identifier that is used in a distributed request to refer to a data source object. See also data source object.
  3. In the OSI Communications Subsystem licensed program, a 1- to 8-character name that identifies an object or entity in an OSI network. Nicknames are provided by OSI Communications Subsystem to enable users to use simple names instead of the often long, multipart, sometimes binary-coded identifiers required by OSI protocols.
  4. An alternative name, often derived from other name elements, for a personal name.

See network identifier.

See Network Interface Definition Language.

See Network Installation Management.

NIM master
An AIX system that can install one or more Network Installation Manager (NIM) clients. An AIX system must be defined as a NIM master before any NIM clients can be defined on that system. A NIM master manages the configuration database, which contains information for the NIM clients. In CSM, the NIM master is the management server.

NIM object
For AIX 5L, a representation of information about the Network Installation Manager (NIM) environment. NIM stores this information as objects in the NIM database.

NIM resources
For AIX 5L, the files and directories that the Network Installation Manager (NIM) uses to install a node.

NIM routing
The information that defines which networks in the NIM environment can communicate with each other and which gateways they use to facilitate that communication. NIM routing is used to represent the TCP/IP routine that exists for the LANs in the overall network environment.

See nucleus initialization program.


  1. See Network Information Service.
  2. See network information services.

See National Institute of Standards and Technology.

Nistevo Standard Delimited File (NSDF)
A file format that shippers can use to import contracts and other configuration data into Sterling TMS.

See node information table.

See network job entry.


  1. See national language.
  2. See newline character.

See node loop port.

See national language dependent function.

See Network Logical Data Manager.

See national language feature.

See Network Lock Manager.


  1. See natural language processing.
  2. See network layer packet.
  3. See nonlinear programming.

NMFC code
See National Motor Freight Classification code.

NMFC council
See National Motor Freight Classification council.

See network management gateway.

See network management station.

See network management vector transport.

See network node.

See network node control point.


  1. See Nederlands Normalisatie-Instituut.
  2. See network-to-network interface.

See NetView-NetView task.

See Network News Transfer Protocol.

no access
An access level with which users have no access to a Notes database; they cannot even add the database icon to their workspaces.

no access state
A state indicating that neither read access nor write access to a table is allowed.

See network operations center.

no-charge software
Software that is available for free but that must have a license agreement associated with it in order to be installed or used legally.

no data movement state
A state indicating that data movement operations within a table are not allowed.


  1. A single processing unit within a system. For redundancy, nodes are deployed in pairs to make up a system.
  2. A single machine or machine partition with a unique IP address on which you install one or more WebSphere Commerce components. In a federated environment, a node is a single occurrence of WebSphere Application Server and its applications. A node in a cell may or may not be running the same enterprise application as other nodes in the same cell.
  3. One of the various artifacts in an application as shown in the application diagram. Each node is given a label based on its underlying source artifact or object name.
  4. In networking, a point capable of sending and receiving data. A node can be a device, such as printer or workstation, a system, or a storage location on a disk. See also port.
  5. An organization that represents a physical location whether it is a manufacturing plant, small stock room, or warehouse.
  6. A logical group of managed servers. See also managed node.
  7. A computer that is part of a clustered system.
  8. One operating system image.
  9. A choice point in a binary search tree.
  10. See attribute definition.
  11. Any element in a tree.
  12. A point in a transaction topology that represents an application, component, or server whose transaction interactions are tracked and aggregated by Transaction Tracking.
  13. An instance of Sterling Connect:Direct.
  14. A Fibre Channel device that contains a node port (N_port) or node loop port (NL_port).
  15. In a network configuration, the physical machine that contains one or more related functional units.
  16. An individual operating-system image within a cluster. Depending on the way in which the computer system is partitioned, it may contain one or more nodes.
  17. An IMS resource that represents a physical VTAM terminal. The node is represented by a VTAM terminal control block.
  18. One of the points in a topology view or topology diagram. A node usually corresponds to a machine, but depending on the type of view, might also correspond to a facility, base product, solution element, or solution artifact.
  19. In a network, a point at which one or more functional units connect channels or data circuits.
  20. See database partition.
  21. A file server or workstation on which the backup-archive client program has been installed, and which has been registered to the server.
  22. In hardware, a uniprocessor or symmetric multiprocessor (SMP) computer that is part of a clustered system or a massively parallel processing (MPP) system. See also symmetric multiprocessing system.
  23. A grouping of processor, memory, and I/O hub hardware resources in the system. On systems of machine type FHA, a node is a processor book. On systems of machine type MMA, a node is a drawer.
  24. In X.25, a point where packets are received, stored, and forwarded to another location (or data terminal equipment) according to a routing method defined for the network.
  25. In Systems Network Architecture (SNA), the portion of a hardware component, along with its associated software components, that implements the functions of the seven architectural layers.
  26. A computer location defined in a network.
  27. A logical processing unit that is defined in a configuration file by a virtual name and a set of associated details about the physical resources, such as the server, the disks, its pools, and so on.
  28. In XML, the smallest unit of a valid, complete structure in a document.
  29. A complete implementation of Sterling Commerce Center, which includes a Windows messaging server that is integrated with communications components, a processing engine, and primary and secondary systems.
  30. An object in the tree view that serves as a container to hold related objects.
  31. The representation of a state or an event by means of a point on a diagram.
  32. In communications, an end point of a communication link or a junction common to two or more links in a network. Nodes can be processors, communication controllers, cluster controllers, terminals, or workstations. Nodes can vary in routing and other functional capabilities.
  33. A UML model element that represents the computational resources of a system, such as personal computers, sensors, printing devices, or servers.
  34. See host.
  35. An endpoint or junction used in a message flow. See also message flow node.
  36. In a graphing tool, a specific data element that is connected to other data elements by lines or edges.
  37. In Microsoft Cluster Server (MSCS), each computer in the cluster.
  38. A set of rows of spend data that contains a description of the amount of spend and the number of transactions associated with the spend.
  39. An element of a graph or hierarchy that can be connected by links. A graph consists of a finite set of nodes connected by a finite set of links. In drawings, nodes are often displayed as boxes and links are often displayed as lines.
  40. The graphical representation of a data operation in a stream. Different types of nodes have different shapes to indicate the type of operation that they perform. See also downstream, stream.
  41. In the context of an index for a database, an ordered group of key values having a fixed number of elements. A B-tree for example, is a set of nodes that contain keys and pointers arranged in a hierarchy. See also branch node, leaf node, root node.
  42. Any computer system that has a parallel engine installed on it. See also parallel engine.
  43. A single appliance, such as an IBM WebSphere DataPower appliance.
  44. The start and end points, various stages, and decision points through which a document type passes in a workflow.
  45. In Enterprise Service Tools, one of a series of graphical elements in a flow diagram. A node represents an endpoint or junction used in a flow.
  46. An instance of one of the node kinds that are defined by the XQuery and XPath data model. See also item, node kind, XQuery and XPath data model.
  47. A location in a communications network that provides host-processing services.

node abnormal condition program (NACP)
A CICS program used by terminal control to analyze terminal abnormal conditions that are logical unit or node errors detected by z/OS Communications Server.

node agent
An administrative agent that manages all application servers on a node and represents the node in the management cell.

node-attached policy group
A simple policy group that is associated with a particular node in a policy hierarchy. See also node-level policy group, simple policy group.

node attribute
See property.

node-by-node migration
The process of updating the cluster software to a new version by installing the new version on a node-by-node basis without stopping cluster services across the entire cluster.

node canister
A hardware unit that includes the node hardware, fabric and service interfaces, and serial-attached SCSI (SAS) expansion ports.

node capacity
The resource potential for fulfilling inventory requests.

nodedef file
See node definition file.

node definition file (nodedef file)
A file containing a stanza of information for defining each node in a cluster.

node descriptor
A definition that indicates how a node is used. Possible functions include manager node, client node, quorum node, and non-quorum node.

node directory
A directory that contains information that is necessary to establish communications from a client workstation to all applicable database servers.

node discovery
A process of adding and provisioning nodes. The cluster listens for the nodes, and as nodes are found they are provisioned.

node disjoint
In NetDA/2, pertaining to routes, virtual routes (VRs), or permanent virtual circuits (PVCs) between two nodes that share no common intermediate nodes.

node down
A node event that occurs when a node leaves the cluster voluntarily or fails. See also cluster event.

node error block (NEB)
A set of recording areas of the node error table used to count node errors relating to a single logical unit.

node error program (NEP)
A user-replaceable program used to allow user-dependent processing whenever a communication error is reported to CICS

node error table (NET)
Table used by the node error program.

node factory
An object that transforms business objects other than links into representation objects that are instances of IlpNetworkNode. See also link factory.

node federation
The process of combining the managed resources of one node into a distributed network such that the central manager application can access and administer the resources on the node.

node group

  1. Nodes having similar attribute values and defined as a group to facilitate node management.
  2. A collection of application server nodes that defines a boundary for server cluster formation.

node ID
See node identifier.

node identifier (node ID)

  1. A unique string of characters that identifies the node on a network.
  2. In a tree-like representation of XML instance documents, a unique pointer to a specific node. A node ID can also point to a node that is generated by a constructor.

node ID index
See XML node ID index.

node information table (NIT)
An internal control block containing information about each network job entry (NJE) node.

node initialization block (NIB)
In VTAM, a control block associated with a particular node or session that contains information used by the application program to identify the node or session and to indicate how communication requests on a session are to be handled by VTAM.

node instance
A UML model element that represents an instantiation, or actual occurrence, of a node.

node isolation
Node isolation occurs when a node continues to run cluster services and has lost all communication with other cluster nodes which are also running cluster services. A cluster that experiences node isolation is referred to as a partitioned cluster. See also partitioned cluster.

node kind
A designation that defines a node according to the data that the node contains. The XQuery and XPath data model defines the following node kinds: document, element, attribute, text, processing instruction, and comment. See also node, processing instruction.

node-level policy group
One or more policies, or one or more simple policy groups, or both, that are of the same scope and that are associated with a particular node in a policy hierarchy. See also node-attached policy group, simple policy group.

node list

  1. A system object that contains a list of SNA nodes identified by an APPN network ID and control point name. The system-recognized identifier for the object type is *NODL.
  2. The nodes assigned to participate in the takeover of a given resource group. See also resource group.

nodelocked license
A type of license that is assigned to a named user or agent. The nodelocked license is installed on the workstation for which it was created.

node loop port (NL_port)
A port specific to Fibre Channel Arbitrated Loop (FC-AL). An NL_port has the same functional, logical, and message handling capability as a node port (N_port), but connects to an arbitrated loop rather than to a fabric. In some implementations, ports can function either as N_ports or as NL_ports depending on the network to which they are connected. An NL_port must replicate frames and pass them on when in passive loop mode. See also arbitrated loop, Nx_port.

node name

  1. An 8-character alphanumeric name that represents a node to other parts of the network job entry (NJE) network.
  2. The name assigned to a node during network definition.
  3. A unique name that is used to identify a workstation, file server, or PC to the server.
  4. The user-supplied name that identifies each node in a cluster. The default node name will be derived from the host name for the cluster node, however, the node name can be changed to any preferred value. Node name does not have to match the host name.
  5. The machine name or host name that must be unique.

node number
A number that is generated by GPFS as the cluster is created and maintained by GPFS as nodes are added to or deleted from the cluster.

node port (N_port)
A port that connects a node to a fabric or to another node. An N_port connects to a fabric port (F_port) or to the N_port of another node. An N_port handles creation, detection, and flow of message units to and from the connected systems. N_ports are end points in point-to-point links. See also Nx_port.

node priority policy
A user-selected method that is used to determine the node order for takeover of a nonconcurrent resource group. The node priority policy can be the order of the participating node list, or can be a dynamic node priority policy that uses an RSCT Resource Monitoring and Control (RMC) resource attribute. See also resource group policies, takeover priority.

node privilege class
A privilege class that gives an administrator the authority to remotely access backup-archive clients for a specific client node or for all clients in a policy domain. See also privilege class.

node provisioning
The process of installing an operating system and applications on a node, and adding the nodes to the cluster.

node quorum
The minimum number of nodes that must be running in order for the daemon to start.

node rescue
The process by which a node that has no valid software installed on its hard disk drive can copy software from another node connected to the same Fibre Channel fabric.

nodes attached table (NAT)
An internal control block containing information about each pair of nodes that is connected or recently disconnected.

node switchboard (NSB)
A configuration of switches for node-to-switch communication. See also intermediate switch board.

node test
A test that determines whether a condition is true for each node that is selected by a step in a path expression. See also kind test, name test, path expression, step.

node-to-node communication
Internal communication between clustered nodes uses the virtual Ethernet as the private network (or interconnect) that carries the heartbeat. The cluster service on each node uses a heartbeat to keep track of the current state of the nodes within the cluster. The cluster service uses the heartbeat to: (1) Determine when a failover to another node should occur, (2) Synchronize the cluster databases on each node, (3) Verify node failures during a cluster configuration change. The private network uses the single network virtual Ethernet model.

node type
The designation of a node according to the protocols it supports or the role it plays in a network. Examples of Advanced Peer-to-Peer Networking (APPN) node types are network node and end node.

node up
A node event that occurs when a node joins or rejoins a cluster. See also cluster event.

A storage control block containing the currently active NOERROR definitions, specifying a list of error codes that are treated as normal completion codes for job-tracking purposes. The controller builds the NOERROR table at startup.

no-follow directive
A directive in a web page that instruct robots (such as the web crawler) to not follow links found in that page.

no-index directive
A directive in a web page that instruct robots (such as the web crawler) to not include the contents of that page in the index.


  1. A disturbance that affects a signal and potentially distorts the information carried by that signal.
  2. Random variations of the characteristics of any entity, such as voltage, current, or data.

noise status
The status that indicates an issue is irrelevant and should no longer be considered an issue. Noise status can indicate a false positive.

noise word file
See excluded word list.

no-license software
Software that has been developed in-house or made to order that does not need to be licensed but might need to be tracked.

A set of terms, acronyms, icons, or other symbols appearing on keys, switches, and labels. An example of nomenclature is the Alt label that appears on the alternate shift key on some keyboards. The padlock symbol (which is an icon or metaphor of Shift lock), the various arrows, and Attn (for the command Attention), are other examples of keyboard nomenclature used in IBM. ISO/IEC Standard 9995:1993 defines 56 symbols which cover most keyboard nomenclature requirements without the need for translation.

nominal CPU frequency
The vendor specified frequency for the CPU.

nominal input
The user-specified input value for each analog calibration point.

nominal variable
See set.

nonadjacent destination node
In the OSI Communications Subsystem licensed program, a destination node that is connected to a different subnetwork from the local node. To communicate with a nonadjacent destination node requires the use of a relay node. See also adjacent destination node.

Pertaining to products that are not available to be designated for orders.

non-automatic profile
A tape volume profile that RACF creates when tape data set protection is not active. RACF does not delete the profile unless specified to do so. See also automatic profile.

nonblocking mode
A way of requesting a service over an interface so that if the request cannot be completed immediately, the requesting process is able to continue and is not suspended. See also blocking mode.

nonblocking operation
An operation, such as sending or receiving a message, that returns immediately whether or not the operation is completed. For example, a nonblocking receive will not wait until a message arrives. A nonblocking receive must be completed by a later test or wait.

non-break space
See required space.

noncanonical address
In LANs, a format for the transmission of medium access control (MAC) addresses for token-ring adapters. In noncanonical format, the most significant (leftmost) bit of each address byte is transmitted first. See also canonical address.


  1. A unique cryptographic number that is embedded in a message to help detect a replay attack.
  2. A binary value that is not repeatable by a generating program over a long period of time. It can be a counter or a random value.
  3. A random, unique text string that is encrypted along with data and then is used to detect attacks against the system that sends the encrypted data. A nonce is used especially for authentication and ensures that encrypted data is different each time that it is encrypted.

non-colonized name (NCName)
A name that does not contain a colon character. A lexical QName consists of two NCNames, the namespace prefix and the local name, which are separated by a colon.

noncomplete CCD table
In SQL replication, a CCD table that is initially empty and has rows appended to it as changes are made to the replication source. See also complete CCD table.

nonconcurrent access
Access to shared resources, often disks, in which only one connection is active at any given time and the node with the active connection owns the disk.

nonconcurrent repair
Repair to hardware in a hardware unit when the power is off.

nonconcurrent resource group
A resource group that does not have the startup policy Online on All Available Nodes. See also concurrent resource group, resource group, resource group policies, shared IP address.

noncondensed CCD table
In SQL replication, a CCD table that can contain more than one row for each key value. These duplicate rows represent the history of changes for the values in the rows of a table. See also condensed CCD table, consistent-change-data table.

noncontiguous item
In COBOL, a data item in the Working-Storage and Linkage Sections of the Data Division that bears no relationship to other data items.

A mode of CICS operation in which resources are allocated, used, and released immediately on completion of the task.

noncumulative backup
See delta backup.

noncursor function
A user-defined function that returns a single group of values (one row of data) and therefore does not require a cursor when it is executed. Compare with cursor function. See also cursor function.

noncustomer ID
See noncustomer identifier.

noncustomer identifier (noncustomer ID)
A unique code that identifies a trading partner on another VAN.

noncustomer mailbox
On Sterling B2B Collaboration Network, a mailbox set up for the trading partner of a customer.

noncyclic period
A period that does not represent a constant number of days or work days, for example, a quarter or academic semester.

non-data sharing mode
A mode of operation in which RACF is enabled for sysplex communication, but does not use the coupling facility.

non-default working time
A value that changes a default value in the project calendar.

nondelimited ASCII format
A file format that is used to import data. A nondelimited ASCII file is a sequential ASCII file with row delimiters used for data exchange with any ASCII product; column values are not separated by delimiters.

The capability of a solving engine to search for a solution by exploring many alternative possibilities without the developer knowing beforehand which of those possibilities will necessarily succeed. An engine manages the implementation of nondeterminism through choice points, restored states, reversible variables, backtracking, and so forth.

non-deterministic dictionary
A dictionary in which there are many possible paths for a given input letter when matching a string to find a word. See also deterministic dictionary.

non-deterministic function
A user-defined function whose result is not solely dependent on the values of the input arguments. That is, successive invocation with the same argument value can produce a different answer.

A type of distributed transaction in which all of the nodes are connected, using the same protocol.

Pertaining to an action or activity that does not result, from the customer's view, in the loss of any existing capability or resource.

nondisruptive startup
A function that starts and restarts cluster services and manages applications that are already running without stopping the applications first.

nondisruptive upgrade
A function that upgrades software while keeping cluster services running and the application continuously available throughout the upgrade.

nondurable subscription
A subscription that exists only while the connection from the subscribing application to the queue manager remains open. The subscription is removed when the subscribing application disconnects from the queue manager either deliberately or by loss of connection. See also durable subscription.

nonescaping key
A key that allows a character to be typed without the presentation position being changed. Nonescaping keys are used for building an accented character.

none start event
A start event that does not have a defined trigger. A none start event can be used in a descriptive process that does not require technical information or in a subprocess where the control of the process flow is passed from its parent process. See also start event.

nonexecutable statement
In DB2 for i5/OS, an SQL statement that can be embedded only in an application program.

non-exposed field
A system or data field that is part of a work item but is not available for searches and sorting.

nonexposed name
In DB2 for i5/OS, a table name or view name for which a correlation name is specified.

nonextended result
An exception notification that does not have any data defined in the result_ext file of the dlc_getx_arg structure.

Non-Facility Associated Signaling (NFAS)
An ISDN configuration where several T1 facilities can be controlled by a single D-channel, instead of the normal T1 configuration where each T1 facility has 23 B-channels and a D-channel (23B+D). With NFAS, all 24 timeslots of the nonsignaling trunks are available for voice whereas only 23 channels can be used on the trunk that carries signaling traffic (23B+D+n24B). See also D-channel backup.

nongeneric alert
In SNA management services (SNA/MS), alert information that is encoded such that it conveys to the receiver the set of screens that should be displayed for the network operator when the alert is received. The use of nongeneric alerts requires that the receiver recognize and understand each unique problem for which an alert is sent. See also generic alert.

non-generic operator
A primitive operator implemented entirely in C++ code. See also generic operator, primitive operator.

nongeoreferenced image file
A .gif, .tif, .jpg, or .jpeg file that has no coordinate system associated with it.

non-global zone
A zone that is hosted by a global zone which contains an installed subset of the complete Solaris operating system software packages. Non-global zones are unaware of the existence of any other zones. See also global zone.

non-guaranteed print labeling
Some printers that do not support guaranteed print labeling can still print identification labels, but the integrity of the labels cannot be guaranteed using PSF. See also guaranteed print labeling.

nonhosted partition
A logical partition that is not dependent on a logical partition for I/O resources.

nonimpact printer
A printer in which printing is not the result of mechanical impacts, for example, a thermal printer, an electrostatic printer, and a photographic printer. See also impact printer.

noninteractive transaction
The work done by jobs and tasks, such as batch jobs and system activity, that may have occurred as a result of an interactive transaction. See also interactive transaction.

non-intrusive journal backup
A method of journal backup during which all DFSMShsm activity is allowed to continue while DFSMShsm creates a backup of the preexisting journal records. After the initial backup of the journal completes, all DFSMShsm activity is quiesced and DFSMShsm completes the backup of the journal. Non-intrusive journal backup can be used to reduce the impact of journal backup on DFSMShsm availability and performance. See also quiesced journal backup.

non-IPDS printer
A printer that is not channel-attached and which does not accept the Intelligent Printer Data Stream.

non-ISC static user
A user signed on to a static terminal. The user is represented by a user ID that is defined to an enhanced security product such as RACF.

Pertaining to a simple mapping of COBOL items and XML elements belonging to XML documents and COBOL groups that are not identical in shape.

non-key product
A product is non-key if and only if the following conditions are satisfied: 1. A decision has been made using the process documented in section 14.2 that the product is not flagship, key, or legacy. 2. The product is not part of another product offering which is listed in the product classification database. See also flagship product, key product, legacy product.

nonlabeled tape
A tape that has no labels. Tape marks are used to indicate the end of the volume and the end of each data file.

non-Latin-based alphabet

  1. An alphabet comprising letters other than the Latin-based ones, such as those used in Greek and Arabic. See also Latin alphabet.
  2. An alphabet comprising letters other than the Latin-based ones, such as those used in Greek and Arabic.

nonleaf page
An index page that contains keys and page numbers of other pages in the index (either leaf or nonleaf pages). Nonleaf pages never point to actual data. See also leaf page.

nonlibrary user ASP
An auxiliary storage pool that contains journals, journal receivers, and save files. The libraries for the objects are in the system ASP. See also library user ASP.


  1. In operations research, pertaining to functions that can be represented by polynomial or quadratic equations.
  2. In constraint programming, pertaining to a function that is not linear. That is, it may be a quadratic polynomial, or it may be logical and symbolic in ways that cannot be easily or efficiently represented by linear equations. For example, the trigonometric functions, such as sine, cosine, tangent, and so forth, are considered nonlinear in this context.

nonlinear programming (NLP)
A technique for solving an optimization problem for which the model may contain a nonlinear objective and nonlinear constraints. Typically, the decision variables are continuous (not discrete).

nonmanaged mode
An environment in which the application is responsible for generating and configuring connection factories. The Java EE server does not own or know about these connection factories and therefore provides no Quality of Service facilities.

nonmatched record
A record that is not a matched record, clerical record, or duplicate record. See also clerical record, duplicate record, matched record.

In MPTN architecture, pertaining to the relationship between peer transport users or peer transport providers that use different protocols.

non-message-driven program
An application program that is initiated by the submission of a batch job. This program runs in a batch message processing (BMP) region, a Java batch processing region (JBP region), or an IMS Fast Path (IFP) utility region. See also message-driven program.

In MPTN architecture, pertaining to the relationship between a transport user and a transport provider that are based on different transport protocols.

non-native data format
A format of data that is written to a storage pool that differs from the format that the server uses for operations. See also native format.

nonnative MPTN segment
A segment of an MPTN connection in which an MPTN protocol was used to establish the segment.

nonnative network

  1. In MPTN architecture, with respect to a particular transport user, a transport network whose addressing structure and transport service are different from that assumed in the design of that transport user.
  2. A subnetwork whose network identifier differs from the network identifier that a node uses for its own network-qualified resource names.
  3. Any network attached to a gateway NCP that does not contain that NCP's resources.

nonnative network connection
A connection in which an APPN or LEN node and the subarea to which it connects use different network identifiers.

nonnumeric item
In COBOL, a data item that is alphanumeric, alphabetic, or Boolean.

nonnumeric literal
In COBOL, a character string bounded by quotation marks, whose value is itself.

non-operational downtime
Downtime that occurs when an asset is not normally in use.

nonpageable dynamic area
In MVS, an area of virtual storage whose virtual addresses are identical to real addresses. It is used for programs or parts of programs that are not to be paged during execution.

nonpageable region
In MVS, a subdivision of the nonpageable dynamic area that is allocated to a job step or system task that is not to be paged during execution. In a nonpageable region, each virtual address is identical to its real address.

nonpaired data
In Business Graphics Utility and the GDDM function, data that is specified such that each X-value has a set of Y-values associated with it. See also paired data.

nonparticipating mode
In Fibre Channel technology, a mode in which a loop port (L_port) in a loop is inactive and cannot arbitrate or send frames, but can retransmit any received transmissions. This mode is entered if there are more than 127 devices in a loop and an arbitrated loop physical address (AL_PA) cannot be acquired. See also loop port, participating mode.

nonpartitioned index

  1. An index that is not physically partitioned. Both partitioning indexes and secondary indexes can be nonpartitioned. See also secondary index.
  2. An object that contains the index entries for all data partitions of a partitioned table. See also partitioned index.

nonpartitioned secondary index (NPSI)
An index on a partitioned table space that is not the partitioning index and is not partitioned. See also data-partitioned secondary index.

nonpartitioned table
A table that does not use data partitions. See also partitioned table.

nonpersistent column
A temporary data field that an object uses for calculations or temporary storage. See also persistent column.

nonpersistent message
A message that does not survive a restart of the queue manager. See also persistent message.

nonpersistent session
A session that is terminated if it remains inactive for a user-specified time.

Pertaining to SKUS that are not available for picking, packing, and shipping.

See non-program integrated information.

nonplanar graph
A graph that cannot be drawn without any links crossing other links.

non-primary quote
A quote that is secondary to the identified primary quote.

nonprinting character
See control character.

nonprocess runout (NPRO)
An operation that moves paper or forms through the paper path without printing.

nonproduction system
A system on which application programs that are in development are run and tested.

Pertaining to data traffic on the media that is only made up of repetitive control information and does not contain end user data.

nonproduct object
In System Manager, an application object that has not been packaged as part of a product.

nonprofiled carrier
A carrier that does not subscribe to Sterling TMS. Shipments can still be tendered to a nonprofiled carrier. However, the shipments are not tracked. See also offline carrier.

non-program integrated information (non-PII)
Product information that is technically and rationally separable from the product but is delivered with the product. Non-PII information is not essential to the usability of the software and includes hard copy documentation, soft copy documentation, and tutorials.

nonprogrammable workstation (NWS)
A workstation that does not have processing capability and does not allow the user to change its functions.

non-quorum node
A node in a cluster that is not counted for the purposes of quorum determination.

nonrecoverable data set
A data set for which no changes are logged. Neither backout nor forward recovery is provided. See also backout, forward recovery.

nonrecoverable status
Any resource status that cannot be recovered after a terminal logoff, a user signoff, or an IMS restart. Nonrecoverable status only exists while the resource is active and is deleted when that resource becomes inactive.

nonrecoverable transaction
An inquiry transaction that is not recovered in the event of a failure.

Pertaining to a program that cannot be shared by multiple users.

nonregistered customer
A customer who is not registered with a store. Nonregistered customers are created when a customer adds something to the shopping cart, but has not yet registered.

nonregistered user
A member of an organization who is not using the Emptoris Sourcing application but can respond to surveys using an external link.

nonremovable medium
A recording medium that cannot be added to or removed from a storage device.

nonrepeatable reads
A problem condition that occurs when a transaction re-reads data it previously read and finds that the data has been modified by another transaction.

nonreporting attribute
A reporting attribute of a workstation that means that information is not fed back to Tivoli Workload Scheduler for z/OS. See also reporting attribute.


  1. In business-to-business communication the ability of the recipient to prove who sent a message based on the contents of the message. This can derive from the use of a digital signature on the message, which links the sender to the message.
  2. Proof that a transaction occurred or that a message was sent or received. The use of digital certificates and public key cryptography to digitally sign transactions, messages, and documents supports nonrepudiation.

nonrepudiation bucket
A storage container configured to store raw requests and responses to prove the owner organization has received or sent messages from or to a trading partner.

nonrepudiation data repository
The repository in which copies of documents (and authentication information for signed documents) are stored in case disputes arise regarding the authenticity of document exchanges.

nonresponse mode
In IMS, a mode of terminal operation that allows asynchronous operations between the terminal operator and the application program. See also response mode.

nonrestricted state
The state of a system meaning any or all subsystems are active, regardless of whether there are any active jobs or users at the time.

non-retentive data
Data that the control program can easily recreate in the event that it is lost. The control program may cache non-retentive write data in volatile memory.

non-return-to-zero (NRZ)
A binary code system in which a signal condition must be sustained for the full time interval and does not revert to a standby or quiescent state between signal elements. Using NRZ permits the maximum data signaling rate on the channel, which should be twice the band width, according to Nyquist's theorem.


  1. Pertaining to objects that do not possess or require root privileges. For example, a non-root user is a user without root privileges. A non-root server is a database server that runs without root privileges.
  2. Pertaining to objects created by, or actions performed by, a user without root privileges. For example, a user who installs the database server without user root privileges performs a non-root installation.

non-root installation
An installation performed by a non-root user.

non-root instance
A DB2 instance created by a non-root user from the DB2 product installed by that user.

non-root user
In Linux and UNIX operating systems, a user without root privileges.

non-runtime-based enablement
A type of license enablement for a product with simple nodelocked licenses that does not make use of License Use Management Runtime on a user's workstation.

nonscratch volume
A volume that has valid or unexpired data on it. See also scratch.

nonscrollable cursor
A cursor that can be moved only in a forward direction. Nonscrollable cursors are sometimes called forward-only cursors or serial cursors. See also scrollable cursor.

nonsecure interface
For security gateways, the physical layer connection between the gateway and a nonsecure network.

nonsecure network
A set of nodes that are not controlled by a single administrative party. See also secure network.

nonseed router
In AppleTalk networks, a router that acquires network number range and zone list information from a seed router that is attached to the same network.

nonservice interface
See boot interface.

nonshared resource (NSR)
A file that has its own set of buffers and control blocks. See also local shared resource.

non-SMS volume
A volume that is not controlled by the storage management subsystem (SMS).

Non-SNA Interconnection
An IBM licensed program that provides format identification (FID) support for selected non-SNA facilities. Thus, it allows SNA and non-SNA facilities to share SDLC links. It also allows the remote concentration of selected non-SNA devices along with SNA devices.

nonspacing character
See diacritic.

nonspacing character sequence
For accented characters, a two-part sequence consisting of a valid diacritic followed by an alphabetic character or a space. The system converts the sequence into a single code point that results in the alphabetic character with the specified diacritic mark.

nonstageable font
In the IBM 3800 Printing Subsystem, a font loaded from the host processor into raster pattern storage for immediate use. It remains there until deleted. See also stageable font.

nonstandard labeled tape
A tape that has labels but does not follow IBM labeling conventions.

nonstandard SCAC
A four-character code that is used to represent each fleet within a carrier organization. A carrier defines a nonstandard SCAC for each fleet, other than for the fleet that uses the legal SCAC of the carrier.

nonstatic connection
See dynamic connection.

nonstatic method
A method that refers to a single, specific instance.

nonstop service
A service of the common agent that monitors processes on the common agent to make sure they are running and available. The service automatically restarts the processes it monitors.

nonswitched connection
A connection that does not have to be established by dialing. See also switched connection.

nonswitched data link
A connection between a link-attached device and a communication controller that does not have to be established by dialing.

nonswitched line
A connection between computers or devices that does not have to be made by dialing. See also switched line.

non-sysplex aware
In zFS, pertaining to a physical file system that handles file requests for mounted file systems by remotely shipping function requests through z/OS UNIX.

nonterminal-related MSDB
A type of MSDB characterized by data that is used or updated frequently, and segments that are not owned by specific logical terminals. Direct update of segment fields is allowed but no insertion or deletion of segments is permitted.

nonterminal symbol
The structure that the parser recognizes.

non-text information
Images, static or animated visual content, or audio content that support product documentation. Examples include flowcharts, illustrations of hardware components, screen captures, diagrams and animations.

nontransparent mode
A mode of binary synchronous transmission in which all transmission control characters are treated as transmission control characters rather than as text. See also transparent mode.

nonuniform rational B-spline (NURBS)
A mathematical representation of a 2- or 3-dimensional curve or surface that is used in computer graphics and computer-aided design.

nonvalid entry
An entry by an operator that falls outside of the range of valid values configured during survey authoring. The entry requires additional action to redo or encode with another value.

nonvariant function
A user-defined function that always returns the same value when passed the same arguments. A nonvariant function must not contain SQL statements. Compare with variant function. See also variant function.

nonversioned resource
A resource, such as user accounts, for which only one current copy is saved in Sterling B2B Integrator at any time. When a non-versioned resource is modified, the new data replaces the old data in the system.

nonvolatile random access memory (NVRAM)
Random access memory (storage) that retains its contents after the electrical power to the machine is shut off.

nonvolatile storage
A storage device whose contents are not lost when power is cut off.

non-VSAM data set
A data set allocated and accessed using one of the following methods: basic direct access method (BDAM), basic partitioned access method (BPAM), basic indexed sequential access method (BISAM), basic sequential access method (BSAM), queued sequential access method (QSAM), or queued indexed sequential access method (QISAM).

non-VSAM entry
A catalog entry that describes a data set that does not use the Virtual Storage Access Method (VSAM). A non-VSAM entry contains the data set's volume serial number (VOLSER) and device type. If the data set resides on a magnetic tape volume, the entry can also identify the data set's file number. When the data set resides on a direct access device, the operating system obtains further information by examining the data set's data set control block (DSCB) in the volume's volume table of contents (VTOC).

non-VSAM volume record (NVR)
A VSAM volume data set (VVDS) record that contains information about a system-managed data set that does not use the Virtual Storage Access Method (VSAM) and is not related to the storage management subsystem (SMS).

non-working days calendar
A calendar assigned to a job stream to represent the non-working days, when job streams and jobs are not to be run. It can also be used to designate Saturdays or Sundays, or both, as workdays. See also calendar, holidays calendar.

Pertaining to a value that is not equal to zero.

no operation (NOP)
A construct whose execution causes a product to proceed to the next instruction to be processed without taking any other action.

See no operation.

no-print border
A small area on the edges of a physical page where data will not print. This no-print border is a limitation of the printer.

One of two ways to display a message panel. NOPROMPT mode is only intended for experienced SWIFT Link users who are familiar with the structure of SWIFT messages. With NOPROMPT mode, only the SWIFT header, trailer, and pre-filled fields and their tags are displayed. See also PROMPT mode.

no response
In SNA, a value in the form-of-response-requested field of the request header that directs the receiver of the request not to return any response, regardless of whether or not the request is received and processed successfully. See also definite response, exception response.

normal control field
For the sort function, any control field that is specified by an N in column 7 of the field sequence specification.

normal disconnected mode (NDM)
A nonoperational mode of an unbalanced data link in which the secondary station is logically disconnected from the data link and, therefore, cannot transmit or receive information.

normal duplex
Pertaining to printing on both sides of the paper such that the top of one side is at the same end as the top of the other side. Normal duplex printing is used for forms that are bound on the long edge of the paper, regardless of whether the printing is portrait or landscape. See also duplex, tumble duplex.

normal flow

  1. All sequence flow paths in a process except those paths that originate from an intermediate event that is attached to the boundary of an activity. See also exception flow.
  2. In SNA, a data flow designated in the transmission header (TH) that is used primarily to carry end-user data. The rate at which requests flow on the normal flow can be regulated by session-level pacing. Normal and expedited flows move in both the primary-to-secondary and secondary-to-primary directions. See also expedited flow.

normal installation
A process in which the i5/OS operating system contained on tape is installed in auxiliary storage, replacing the operating system (if any) that is currently in the system. See also abbreviated installation.


  1. The process of restructuring a data model by reducing its relations to their simplest forms. It is a key step in the task of building a logical relational database design. Normalization helps avoid redundancies and inconsistencies in data. An entity is normalized if it meets a set of constraints for a particular normal form (first normal form, second normal form, and so on). See also denormalization, repeating group.
  2. The process of replacing surface form representations with their canonical form. This may include case normalization, where a capitalized word is replaced by a lowercase word: 'Run' becomes 'run'; grammatical normalization, where an inflected verb is replaced by the non-inflected form: 'runs' becomes 'run'; lexicographical normalization, where Unicode full-width characters is replaced with Unicode basic form, or white spaces are removed from Chinese text.

normalization support CCSID table (NSCT)
A table containing a default CCSID value associated with a pair of CCSIDs, which will be used to normalize two strings (that are coded in two different CCSIDs), before a string operation such as concatenation, comparison, or others is performed with the two strings.

To put data in a physical location and structure that is optimized for quick input and the storage of large amounts of data. See also denormalize.

normalized device coordinates (NDC)
In GL, coordinates in the range from -1 to 1. All primitives that draw within the unit cube are visible on the screen (unless masked by the screen mask).

normalized form
A form of a word, or multiword unit, after it has undergone a process of normalization. The resulting term can be a lemma or stem.

normal job
A job received in an input stream.

normal mode
See multiuser mode.

normal number
In floating-point representation, any nonzero number that has a nonzero digit as the leftmost digit of the significand. See also decimal floating-point number, subnormal number.

normal port
A port that is asynchronous and allows users to log in. No outgoing use of the port is allowed while it is enabled.

normal priority
The priority assigned to a transaction when the number of transactions enqueued and waiting to be processed is less than the limit count value. See also limit count, limit priority, scheduling priority.

normal queue
In SNADS, a queue that contains distribution entries with a service level of data low. See also priority queue.

normal response mode (NRM)
An operational mode of an unbalanced data link in which the secondary station starts transmission only as the result of receiving explicit permission, by polling, from the primary station. See also asynchronous balanced mode.

normal restart
The restart of IMS after a termination initiated by a /CHECKPOINT command. See also cold start, emergency restart.

normal speed carrier service
A service that delivers products within a regular or typical interval of time. However, the interval of time that categories a service as regular or typical may vary from one service provider to another.

normal stop
One of two ways to stop an attachment. If the attachments or any of their connections are in a pending state, SNA Server rejects the normal stop attachment action.

normal transition link
In a collaboration template activity diagram, the line that represents the path between a successfully executed node for an action, subactivity, or iterator and the next node. See also exception transition link, transition link.

normal XRF operations
The period of XRF processing when the active IMS is processing the IMS workload and the alternate IMS is tracking the active IMS.

Norsk Verkstedsindustris standardiseringssentral (NVS)
Norwegian Engineering Industries Standardization Center.

North American Industry Classification System (NAICS)
An economic classification system based on groups of goods and services that use similar or identical production processes.

Northeast Europe
For IBM business, legal, marketing, or organizational contexts, the administrative region comprising Germany, the United Kingdom, Ireland, some parts of Africa, Nordic countries, CEMA, Switzerland, Austria and some countries in the Middle East. See also Central Europe, Middle East, and Africa, Europe, Middle East, and Africa, Southwest Europe.

See Notes object services.

See Not only SQL.

nostro correspondent channel
A type of clearing channel that is in fact a channel to a partner bank, and is used for settling nostro accounts at that bank.

Not a Number (NaN)
In binary floating-point and decimal floating-point concepts, a value, not interpreted as a mathematical value, that contains a mask and a sequence of digits.

not-a-number (NaN)
In binary floating-point and decimal floating-point concepts, a value, not interpreted as a mathematical value, that contains a mask and a sequence of digits. See also decimal floating-point number.


  1. An XML construct that contains a note, a comment or an explanation about information in an XML file. A notation can be used to associate a binary description with an entity or attribute.
  2. A system of characters, symbols, or abbreviated expressions used to express technical facts or qualities.

not deterministic function
See non-deterministic function.

A simple data structure that stores Notes database design elements (forms, views, and so on), user-created data (documents), and administrative information, such as the database access control list.

note attachment relationship
In UML modeling, a relationship that connects a note or text box to a connector or shape.

In graphical user interfaces (GUIs), a control that resembles a tabbed notebook, with multiple pages that can be accessed individually in any order.

note header
A structure that contains, among other things, the note's originator ID (OID), which includes the note's universal ID (UNID); the note ID; the note's parent note, if one exists; the number of items in the note; and the list of the note's item descriptors.

note ID
A 4-byte value that is assigned to a note when the note is first created. Note IDs are stored in the record relocation vector table, which maps a note's note ID to the position with the database file. A note ID is unique within a database but not across replicas of the database, meaning that the same note in two replicas can have different note IDs, even though the replicas have identical UNIDs.

Notes application
The design of a Notes database. A complex Notes application consists of several individual database designs that work together to perform a specific task. A typical Notes application consists of a set of design elements that specify, among other things, the type of documents in the database, the way that documents can be indexed and viewed, and the application's logic, which is written in the Notes Formula Language, LotusScript, Java, or JavaScript.

Notes client
Client software that allows users to access Notes databases on a Domino server, send mail, and browse the web.

Notes database
A single file that physically contains both a set of documents and a copy of the application design elements that control the creation and modification of those documents. A database can be shared, local, or remote.

Notes/Domino authentication
A security mechanism that verifies that the user or Domino server trying to access a particular Domino server has a trusted certificate in common with it. Authentication occurs in both directions: the server authenticates the user; then the user authenticates the server.

A technology that lets desktop applications and Notes share data fields.

Notes named network
A group of Domino servers that run on the same LAN protocol -- for example, servers running on TCP/IP in one of an organization's locations. Servers on the same Notes named network route mail to each other automatically, whereas you need a Connection document to route mail between servers on different Notes named networks.

Notes name service
The name service within Lotus Notes and Domino that assists in name-to-address resolution in NRPC (Notes remote procedure call) by making calls to the Domino Directory to resolve Domino common names to their respective protocol names.

Notes network port
A port at which a Notes client or Domino server listens for NRPC (Notes remote procedure call) connections in a given network protocol -- such as, TCP/IP, NetBIOS, or IPX/SPX.

Notes object services (NOS)
A set of portable C/C++ functions that create and access information in databases and files, compile and interpret formulas and scripts, and provide an interface to operating systems in a consistent, portable way.

Notes Remote Procedure Call (NRPC)
The architectural layer of Notes used for all Notes-to-Notes communication. Either the HTTP or the SOCKS proxy can be set up to work with NRPC.

Notes server
Application software that runs on a machine that is connected to a network. The Notes server provides the following services to Notes clients and other Notes servers: storage and replication of databases, directory services, mail routing, and security.

Notes storage facility
Part of the Notes Object Services, the Notes Storage Facility is a library of C functions that implement the most basic database-creation and database-management operations.

not fenced
Pertaining to a type, or characteristic, of a procedure or user-defined function that is defined to run in the database manager process. When this type of object is run (using the not fenced clause), the database manager is not protected from changes made by this object. See also fenced.

not-found indicator
An indicator that is set on when the specified record cannot be found.

In a Tivoli environment, a message generated by a systems management operation that contains information about an event or the status of an application. Notices are stored in notice groups.

notice group
In a Tivoli environment, an application- or operation-specific container that stores and displays notices that pertain to specific Tivoli functions.

notice to receive
An incoming message that advises of a credit payment to come. Also called a credit advice.


  1. A mechanism that is used to generate email messages informing users of specific types of system events, such as changes to content repository objects and processing success and failure. Unlike subscriptions, notifications can be set up to send email to multiple users.
  2. An occurrence within a process that can trigger an action. Notifications can be used to model conditions of interest to be transmitted from a sender to a (typically unknown) set of interested parties (the receivers).
  3. Information, labeled as a managed object, that relates to an event that has occurred within the managed object.
  4. An unscheduled, spontaneously generated message, issued by an agent when a significant or critical (data) condition occurs.
  5. The process of notifying the shipping node, vendor, or service provider when fulfilling an order request.
  6. A text or HTML message that is sent to an individual or user according to a particular task or event that either requires the participation of the individual or is purely informational. See also contract event.
  7. A message that signals an event or key performance indicator (KPI) status change.
  8. A user-configured e-mail, page, alert message, or Notification Type Process Control event that is initiated by the Audit Notification System when a specified error message is generated.
  9. A message that contains the event descriptions that are sent to managed resources, web services and other resources.

notification broadcaster
An element that is responsible for publishing notifications. Notification receivers listen for these notifications.

notification channel
A mode by which a subscriber uses a business service.

notification log entry
An item displayed on the notification log that summarizes information about a notification made by the audit notification system.

notification program
A program or web service that can be triggered when an event occurs.

notification receiver
An element that listens for and receives notifications. By default, this element starts listening when its owning process starts.

notification rule
A rule that is used to set up automatic notifications when certain contract conditions are satisfied.

notification subsystem
A system that enables users to be proactively notified when an error occurs by setting up notification parameters.

notification template

  1. A template that defines the content and format of the email sent to an access group on the occurrence of a specific event.
  2. The basis for the notification messages sent during the lifecycle of a contract or at defined events. See also template.

notification trigger
A predefined key performance indicator (KPI) value change that causes an alert notification to be sent to the Coordinator - Alerts portlet.

A network services request that is sent by a system services control point (SSCP) to a logical unit (LU) to inform the LU of the status of a procedure requested by the LU.

notify delivery
The method of delivering messages to a message queue in which the work station user is notified that a message arrived. The signal is a light or an audible alarm.

notify message
A message that describes a condition for which a program requires a reply from the calling program, or for which a reply is automatically sent to the program.

notify object
A message queue, a data area, or a database file that contains information identifying the last successful commitment operation. This information can be used by the programmer to find a restarting point for an application following an abnormal end to the system or routing step processing.

notify subtask (NST)

  1. An external trace that contains information pertaining to the releasing and checkpointing of data sets by PSF.
  2. A PSF subcomponent that returns processed data sets to JES or Direct Printer Services Subsystem and performs checkpoint processing on data sets as they are printed.

Not only SQL (NoSQL)
A class of database management systems that consist of non-relational, distributed data stores. These systems are optimized for supporting the storage and retrieval requirements of massive-scale data-intensive applications. See also JavaScript Object Notation.

not ready
Pertaining to a status where all images in the image catalog are not available for use by the virtual optical device. The status of the individual image catalog entry images in the image catalog reflects either the last status for the catalog before being made not ready from ready or the future status for catalogs about to be made ready. The image catalog can be made not ready by using the LODIMGCLG command with OPTION(*UNLOAD).

not-variant function
See deterministic function.

See network performance analysis logical unit.

Pertaining to a class of computational problems for which no efficient solution algorithm has been found. Many significant computer science problems, including many graph layout problems, belong to this class.

See Network Problem Determination Application.

See network-layer protocol data unit.

See Network Print Facility.

See N-Port ID Virtualization.


  1. See NetView Performance Monitor.
  2. See Network Printer Manager.

N-Port ID Virtualization (NPIV)
A standard method for virtualizing a physical Fibre Channel port.

See nonprocess runout.

See network product support.


  1. See X.25 NCP Packet Switching Interface.
  2. See nonpartitioned secondary index.

See net present value.

See negative response.


  1. See Network Routing Facility.
  2. See network routing facility.

See normal response mode.

A typesetting utility originally designed to drive Teletype model 37 printing workstations. It now drives a wide variety of backspacing and non-backspacing tty-type line printers and tty-emulating printers.

See Notes Remote Procedure Call.

See non-return-to-zero.

See network services.

See network session accounting.

See network service access point.

NSAP address
In OSI, an address that identifies a service access point in the network layer. NSAP addresses must be unique within the OSI network where they are used. NSAP addresses are assigned by naming authorities.

NSAP nickname
In OSI, a nickname that identifies an NSAP address.

See node switchboard.

See normalization support CCSID table.

See Network Shared Disk.

See Nistevo Standard Delimited File.

See network-layer service data unit.

NSD volume ID
A unique, 16-digit, hexadecimal number that is used to identify and access all Network Shared Disks (NSDs).

See National Science Foundation.

See National Science Foundation Network.

See name service interface.

NSI profile attribute
In DCE Remote Procedure Call (RPC), an RPC-defined attribute (NSI attribute) of a name service entry that stores a collection of RPC profile elements and identifies the entry as an RPC profile.

See Network Status Manager.

See nonshared resource.

See notify subtask.

See network termination.

See network termination 1.

See network termination 2.

See New Technology File System.

See National Telecommunications and Information Administration.

NT mode
A mode in which attachment to the ISDN network is asymmetric. The network side of the connection operates in NT mode. User equipment operates in terminal equipment, or TE, mode.

See national terminal number.

See Network Terminal Option.

See Network Time Protocol.

NT repeater
In a Tivoli environment, the first Windows NT machine on which the Tivoli Remote Execution Service is installed. Using fanout, the NT repeater distributes the Tivoli Remote Execution Service to all other NT clients during the client installation process.

See NCP/Token-Ring interconnection.

See National Television Standard Committee.

NTSC format
The specifications for color television as defined by the NTSC committee, which include: (a) 525 scan lines, (b) broadcast bandwidth of 4 MHz, (c) line frequency of 15.75 KHz, (d) frame frequency of 30 frames per second, and (e) color subcarrier frequency of 3.58 MHz. See also phase alternation line.

See network terminating unit.

A program that runs with the NetView program and monitors NCPs that were activated by the VTAM on the host where NTuneMON is running.

A feature of NTuneMON that runs in a communication controller and, with VTAM, enables a network administrator to tune NCP interactively.

See network user address.


  1. That portion of a control program that always remains in central storage.
  2. That portion of the CICS region that holds the CSA, management modules, control tables, and resident application programs.

nucleus initialization program (NIP)
The MVS component that initializes the resident control program.

nucleus server
A MERVA component that processes a service request as selected by the request queue handler. The service a nucleus server provides and the way it provides it is defined in the nucleus server table (DSLNSVT).

See network user identification.

NUI service facility
In X.25, a facility sent by the data terminal equipment (DTE) to the network in call setup packets that contain a network-assigned identifier, which can be used for billing, security, or network management purposes. The NUI service facility can also be used to select specific optional facilities to be associated with a virtual call.

See null character.

In SQL, the value denoting the absence of data for a particular row and column.


  1. In the C language, a single character that denotes the end of a string.
  2. In the C and C++ languages, a pointer that does not point to a data object.
  3. In SQL, the value denoting the absence of data for a particular row and column.

The condition in which a value for a column, function parameter, or result can be absent.

null-capable field
A field whose value can be null.

null character (NUL)

  1. A control character with the value of X'00' that represents the absence of a displayed or printed character. See also numeric space, required blank, space.
  2. A character that is used for media-fill or time-fill. Null characters may be inserted into, or removed from, a data stream without affecting the information content of that stream, but such action may affect the information layout and the control of equipment.
  3. A control character used to delimit a string of characters.

null character string
Two consecutive single quotation marks that specify a character string consisting of characters.

null clause
In REXX, a clause consisting of only blanks, comments, or both. A null clause is ignored.

null credential
A type of credential that is usually associated with diskless workstations. Because there is no repository of information that is local to the workstation, it is not possible to obtain identifying information.

null modem
See modem eliminator.

null name
In PSF, a token name with X'FFFF' in the first 2 bytes.

null output message
The message IMS sends to a terminal when no other output is immediately available to satisfy terminal requirements.

null pointer
The value that is obtained by converting the number 0 into a pointer; for example, (void *) 0. The C and C++ languages guarantee that this value will not match that of any legitimate pointer, so it is used by many functions that return pointers to indicate an error.

null record
In binary synchronous communications, a record that contains no data, only the data link control characters STX ETX.

null resource
In the NetView Graphic Monitor Facility, an object that is used only as an aid in formatting and drawing a view. A null resource always shows the status "unknown."

null statement

  1. A statement that consists of a semicolon.
  2. A statement that contains only the delimiter symbol, but no characters.

null string

  1. A string containing no element.
  2. A character or bit string with a length of zero.

Pertaining to a character string that ends with a zero byte.

null-terminated host variable
A varying-length host variable in which the end of the data is indicated by the presence of a null terminator.

null terminator
In C, the value that indicates the end of a string. For EBCDIC, ASCII, and Unicode UTF-8 strings, the null terminator is a single-byte value (X'00'). For Unicode UTF-16 and UCS-2 (wide) strings, the null terminator is a double-byte value (X'0000').

null value
A parameter position for which no value is specified.

null wide-character code
A wide-character code with all bits set to zero.


  1. In REXX, a character string consisting of one or more decimal digits optionally preceded by a plus or minus sign, and optionally including a single period that represents a decimal point. A number can also have a power of 10 suffix in conventional exponential notation: an E (uppercase or lowercase) followed optionally by a plus or minus sign then followed by one or more decimal digits defining the power of 10.
  2. A word or symbol that expresses either quantity (cardinal) or order (ordinal). Many cultures have different forms for cardinal and ordinal numbers. For example in French the cardinal number five is cinq, but the ordinal fifth is cinquième or 5eme or 5e. Numbers are written with symbols which are usually referred to as numerals. See also Arabic numeral, Chinese numeral, Hindi numeral, Roman numeral.

number attribute
A unique descriptor of a number, including any number, an integer, a floating value, and so on.

number sign
The character #, which is also referred to as the hash sign.

Pertaining to any of the digits 0 through 9.

numeric character
See digit.

numeric character reference
See character entity reference.

numeric constant

  1. The actual numeric value to be used in processing, instead of the name of a field containing the data. A numeric constant can contain any of the numeric digits 0 through 9, a sign (plus or minus), and a decimal point. See also character constant.
  2. A constant that specifies a number for a column value in a column map or relationship. See also numeric expression.
  3. A constant that expresses an integer, a real number, or a complex number.

numeric data
Data represented by numerals.

numeric digit
In REXX, a pattern that specifies, by column number, how input data is to be parsed.

numeric edited item
In COBOL, a numeric item whose PICTURE character-string contains valid editing characters.

numeric expression
A numeric constant, a simple numeric variable, a scalar reference to a numeric array, a numeric-valued function reference, or a sequence of the above, separated by numeric operators and parentheses. See also numeric constant.

numeric field
An area that is reserved for a particular unit of information and that can contain only the digits 0 through 9. See also character field.

numeric grid question
A question that ties together a group of related subquestions that share a category list and that require numeric responses. For example, a question that asks respondents to enter the amount that they spent on various products in the last four months. The subquestions are “Amount spent in May,” “Amount spent in April,” and so on, and the categories are the product names.

numeric item
In COBOL, a data item that must be numeric. If signed, the item can also contain a representation of an operational sign.

numeric keypad
A set of keys grouped in a special position (usually the right hand side) of a keyboard, or as a separate attachment to the keyboard. The numeric key pad is used to enter numeric data (see ISO/IEC 9995-4).

numeric operator
A symbol representing an operation to be performed on numeric data, such as + or - to indicate addition or subtraction.

numeric overflow
The result from an arithmetic calculation that exceeds the space designated to hold it.

numeric pattern
In REXX, a pattern that specifies, by column number, how input data is to be parsed.

numeric question
A question that requires a numeric response.

numeric response
A question type for the entry of non-categorical numeric values, such as quantities, years, and telephone numbers.

numeric shaping
A characteristic of numbers that indicates whether they must be presented using the European digit shapes or the Arabic-Indic digit shapes.

numeric space
A space equal in pitch to the width of the numeric characters in a string in which it is imbedded. It has an IBM GCGID of SP31. In ISO/IEC 10646 and Unicode, this is called figure space. See also null character, required space, space.

numeric variable
The name of a numeric data item whose value is assigned or changed during program processing.

The partitioning of a side of a sheet into a fixed number of equal size partitions. For example, 4-up divides each side of a sheet into four equal partitions.

See nonuniform rational B-spline.

See national vulnerability database.

See non-VSAM volume record.

See nonvolatile random access memory.

See Norsk Verkstedsindustris standardiseringssentral.

See network virtual terminal.

Nways family
A group of IBM switched networking hardware products plus the software that uses or manages these products.

See network interface.

See nonprogrammable workstation.

See network server description.

A node port that can operate as either a node port (N_port) or node loop port (NL_port). See also node loop port, node port.

NzAdmin tool
An administrative interface that runs on Windows clients to manage Netezza appliances

nz user
The default IBM Netezza database user.