This site contains terms and definitions from many IBM software and hardware products as well as general computing terms.
See node port.
See next available byte.
See negative acknowledgment reply.
See node abnormal condition program.
See negative acknowledgment character.
See new application license charge.
A security mechanism that is used by Internet protocols over TCP/IP and SSL. During name-and-password authentication, the client sends a text password to the server. The server verifies the identity of the client by confirming that the password that was sent matches the password that is stored on the server.
Name Binding Protocol (NBP)
In AppleTalk networks, a protocol that provides name translation function from the AppleTalk entity (resource) name (character string) into an AppleTalk IP address (16-bit number) on the transport layer.
- A descriptive name that is given to a value and can be used in a filter in place of a value.
- In RPG, a name representing a specific value that does not change during the running of the program.
- A pipe that an application opens by name in order to write data into or read data from the pipe. Using a named pipe facilitates communication between a sending process and a receiving process.
- A type of interprocess communication that permits message data streams to pass between peer processes, such as between a client and a server.
named row data type
A row data type created with the CREATE ROW TYPE statement that has a declared name and inheritance properties and can be used to construct a typed table. See also row data type.
See predefined set.
A collection of styles that users can apply to other data in a file. Styles stored in a named style can include number format, typeface, type size, underlining, bold, italics, lines, colors, and alignment.
A process that cleans and standardizes name information to correct possible errors and transpositions and to enable optimal matching and linking between entities. See also data quality management.
Any meaningful element in a name that can be separated from the rest of the name. Common name parts include first name (or given name), middle name, last name (or surname), and generation. See also name token.
An inseparable unit that consists of a name stem and any affixes that are associated with that name stem. Some name phrases may be made up of multiple stems, as in a Chinese name like Mei-Hui or an English name like Mary-Anne. One or more name phrases can be combined to create a name field. See also name field, name stem, name token.
In a Tivoli environment, a name service consisting of a two-dimensional table that maps resource names to resource identifiers and corresponding information within a Tivoli Management Region.
In Internet communications, the process of mapping a machine name to the corresponding Internet Protocol (IP) address. See also Domain Name System.
See name phrase.
- In a Fibre Channel network, the server that contains the worldwide identifiers (WWIDs) of all addressable nodes on the network.
- See domain name server.
- In networking, the server that converts network names to addresses.
- In a Distributed Computing Environment (DCE), the service that administers the DCE name space and provides the network binding information that is needed by a client to access the server.
- In WebSphere MQ on UNIX and Linux systems and WebSphere MQ for Windows, the facility that determines which queue manager owns a specified queue.
name service handle
In the Distributed Computing Environment Remote Procedure Call (RPC), a reference to the context used by the series of next operations called during a specific name service interface (NSI) search or inquiry.
- The WebSphere MQ interface to which customer-written or vendor-written programs that resolve queue-name ownership must conform.
- In DCE Remote Procedure Call (RPC), a part of the application programming interface (API) of the RPC run time. NSI routines access a name service, such as the Cell Directory Service (CDS), for RPC applications.
- Space reserved by a file system to contain the names of its objects.
- A category used to group similar types of identifiers. See also namespace scope.
- A part of the model in which the names may be defined and used. Within a namespace, each name has a unique meaning.
- A logical container in which all the names are unique. The unique identifier for an artifact is composed of the namespace and the local name of the artifact.
- For authentication and access control, a configured instance of an authentication provider that allows access to user and group information. In Framework Manager, namespaces uniquely identify query items and query subjects. Different databases are imported into separate namespaces to avoid duplicate names.
- The scope within which a Common Information Model (CIM) schema applies.
- The set of all possible names composed of characters from the binder's character set, within which no duplicates are allowed. All external symbols have an assigned name space during binder processing and within program objects.
- In XML and XQuery, a uniform resource identifier (URI) that provides a unique name to associate with the element, attribute, and type definitions in an XML schema or with the names of elements, attributes, types, functions, and errors in XQuery expressions.
A user-defined, abstract scope in which identifiers are visible only when the code explicitly includes the desired namespace. See also class scope, global scope, local scope, namespace, scope.
A process that normalizes names by reducing them to the most common derivative or root name. For example, Richard is the most common derivative or root name for Dick, Ricardo, Ricky, Rich, or Ritchie and Mohammad is the most common derivative or root name for Mohamad, Mohamed, Mohammad, or Mohammed. See also data quality management, pipeline.
A node test that consists only of a QName or a wildcard. See also node test.
The smallest indivisible element of a name, which is delineated by white space or punctuation. Name tokens combine to form name phrases and name fields. One name token might contain multiple name parts. Name tokens are either affixes or stems. The exact function of a name token depends upon its placement in the personal name. See also name field, name part, name phrase, name stem, regularization.
In WebSphere MQ on UNIX and Linux systems and WebSphere MQ for Windows, an internal process that changes a queue manager name so that it is unique and valid for the system being used. Externally, the queue manager name remains unchanged.
In SNA network interconnection, the conversion of logical unit names, logon mode table names, and class-of-service names that are used in one network to equivalent names for use in another network. See also alias name.
A 1-byte number from 1 to 255 that the client specifies as the first byte of the resource ID. The name type guarantees uniqueness of names for all resources of that name type. This uniqueness prevents clients from putting more than one resource with the same name and name type out on the resource structure. The resources within the name type can have different data resource types.
A parameter containing a name and a value in the format name=value. See also data point.
An alternative of a specified name that is considered to be equivalent to that name, but which differs from it in its particular external form. Name variants arise from spelling variations (for example, "Geoff" and "Jeff"), nicknames (for example, "Bill" for "William"), abbreviations (for example, "GPE" for "Guadalupe"), translations (for example, "Peter" for "Pierre"), or other processes.
In OSI, an organization that assigns OSI names and addresses--such as abstract syntax names, application context names, network entity titles, and NSAP addresses--to ensure that they are unique.
An element of type char that, when processed sequentially, can represent text. See also wide character.
Form that has the shorter edges at the top and bottom and the longer edges at the sides. See also wide form.
NAS file server
See network-attached storage file server.
NAS file server node
See NAS node.
A client node that is a network-attached storage (NAS) file server. Data for the NAS node is transferred by a NAS file server that is controlled by the network data management protocol (NDMP). A NAS node is also called a NAS file server node.
A relationship between any of the following IP addresses and port numbers: (1) private source IP address and source port number (without NAT), (2) public (NAT) source IP address and public (NAT) source port number, (3) destination IP address and port number (an external network).
In U.S. EBCDIC, the three characters represented by X'7C', X'7B' and X'5B'; these values produce, respectively, the at sign (@), the number sign (#), and the dollar sign ($). On many keyboards and display screens in other countries, these hex values are displayed differently.
National Bureau of Standards (NBS)
See National Institute of Standards and Technology.
National Institute of Standards and Technology (NIST)
A U.S. government agency that supports industry, commerce, scientific institutions, and all branches of U.S. Government in advancing measurement science and developing standards. NIST was formerly known as the National Bureau of Standards (NBS). See also Federal Information Processing Standard.
- See language load identification.
- A language or dialect spoken by a group of people. This does not include computer programming languages.
national language dependent function (NLDF)
Any function of a hardware or software product that must be altered to suit a country, region, or language. Examples include date and time formats, monetary values, keyboards, measurement systems, and character data functions (such as sorting).
National Science Foundation Network (NSFNET)
A collection of local and regional networks in the United States that are connected by a high-speed backbone. NSFNET provides scientists access to a number of supercomputers across the country.
A characteristic of an object that is managed on a specific content server and that is specific to that content server. For example, the key field 'policy num' might be a native attribute in a Content Manager content server, whereas the field policy ID might be a native attribute in a Content Manager OnDemand content server.
An object that is managed on a specific content server and that is comprised of native attributes. For example, Content Manager index classes are native entities comprised of Content Manager key fields.
native file system
A file system that is locally added to the file server and is not added for space management. The hierarchical storage manager (HSM) client does not provide space management services to the file system.
A format of data that is written to a storage pool directly by the server. See also non-native data format.
See local language.
- In MPTN architecture, a transport network that provides the address type and transport characteristics assumed in the design of a particular transport. No MPTN address mapping or compensation protocols are used for data transfer.
- The subnetwork whose network identifier is used by a node for its own network-qualified resource names.
- In MPTN architecture, a transport network that provides the address type and transport characteristics assumed in the design of a particular transport. No MPTN address mapping or compensation protocols are used for data transfer.
- In MPTN architecture, a transport network that provides the address type and transport characteristics assumed in the design of a particular transport. No MPTN address mapping or compensation protocols are used for data transfer.
native SQL procedure
An SQL procedure that is processed by converting the procedural statements to a native representation that is stored in the database directory, as is done with other SQL statements. When a native SQL procedure is called, the native representation is loaded from the directory, and DB2 executes the procedure. See also external procedure, external SQL procedure.
native transport address
In MPTN architecture, a transport-user address that has an address type that corresponds to the address type that is used by the transport network underlying the transport user. For example, an SNA name that is being registered within an SNA network.
natural language processing (NLP)
A field of artificial intelligence and linguistics that studies the problems inherent in the processing and manipulation of natural language, with an aim to increase the ability of computers to understand human languages
The attribute of applications that contain no static external data and do not require additional processing to make them reentrant. See also constructed reentrancy.
natural search session
The number of sessions that result from visitors clicking through from a search engine link such as Google. Since this is a raw metric, it can only be viewed as a percentage comparison against another time period.
See nearest active upstream neighbor.
- A process that is employed by users to explore a multidimensional database interactively by drilling, rotating and screening, usually using a graphical OLAP Client connected to an OLAP Server.
- The method that is used to locate, retrieve, and move to one or more topics, such as a table of contents, index, or search facility.
- An area in the console that is used to locate and launch tasks.
A set of links to other web pages in a website. For example, a navigation bar is typically located across the top or down the side of a page and contains direct links to the major sections within the website.
In CDE, any of the keyboard keys that is used to move the current location of the cursor. These include the arrow keys (with or without the Control key); the Tab key (with or without the Control or Shift keys); the Begin and End keys (with or without the Control key); and the Page Up and Page Down keys.
In architecture, a link type that specifies the linkage from a source document component to a contextually related target document component. Navigation links can be used to support applications such as hypertext and hypermedia.
- The pane that either displays icons for all views, folders, and agents in a Notes database or displays the current navigator.
- The list of options that are available to administrators after they log on to the service.
In the vocabulary, a phrase that associates two business elements. A navigation phrase corresponds to a method that has a return value or an attribute in the business object model (BOM).
- Programmed graphics in the user interface that direct users to specific parts of a Notes database without their having to open views. Navigators usually include hotspots and can do simple actions such as opening a database, document, URL, view, folder, or another navigator.
- A utility that allows the user to navigate catalog components, determine component dependencies, and locate components.
A DFSMSdfp component for implementing, verifying, and maintaining a DFSMS storage management subsystem (SMS) environment in batch mode. NaviQuest is the batch equivalent of Interactive Storage Management Facility (ISMF). It provides batch testing and reporting capabilities that can be used to automatically provide these functions: create test cases in bulk; run many other storage management tasks in batch mode; and use supplied, access method services (ACS), code fragments as models when creating ACS routines.
See Networking Broadband Services.
See Name Binding Protocol.
See National Bureau of Standards.
See Network Computing Architecture.
See Network Communications Control Facility.
See Network Computing Kernel.
See non-colonized name.
See Network Control Program.
NCP connectionless SNA transport (NCST)
A function that enables the network control program (NCP) to transfer TCP/IP frames across the SNA subarea routing network. The NCST session interface provides access to an LU-LU session that can transport Internet Protocol (IP) datagrams to a host that uses the SNA Network Link (SNALINK) or to another NCP that uses NCST.
NCP/EP definition facility (NDF)
A program that is part of System Support Programs (SSP) and that is used to generate a load module for a partitioned emulation program (PEP), a Network Control Program (NCP), or an Emulation Program (EP).
NCP major node
In VTAM, a set of minor nodes representing resources, such as lines and peripheral nodes, controlled by a network control program. See also major node.
NCP Packet Switching Interface
See X.25 NCP Packet Switching Interface.
NCP/Token-Ring interconnection (NTRI)
An NCP function that enables a communication controller to attach to the IBM Token-Ring Network, and that provides both subarea and peripheral node data link control (DLC) services in the SNA network.
See Network Computing System.
See NCP connectionless SNA transport.
See Network Database System.
See normalized device coordinates.
See NCP/EP definition facility.
See normal disconnected mode.
See Network Data Management Protocol.
See non-defect oriented problem.
See Network Data Representation.
A local, in-process cache in the client Java virtual machine (JVM) that includes a subset of the cached data set that is stored remotely in servers. Data in the near cache can become out of sync with recently changed data in servers.
The process of comparing multiple versions of the same search result and returning only the most relevant or highest ranked version. See also deduplication.
near field communication (NFC)
A means of communicating data over a wireless connection over a very short distance (several centimeters). NFC chips consume very little power. For example, a smartphone with NFC enabled can communicate with an NFC-enabled movie poster when the user waves the smartphone in front of the poster (as opposed to scanning a tag).
nearline SAS drive
A drive that combines the high capacity data storage technology of a Serial Advanced Technology Attachment (SATA) drive with the benefits of a serial-attached SCSI (SAS) interface for improved connectivity.
near synchronous mode
In high availability disaster recovery, the synchronization mode in which the primary database considers a transaction committed when it receives a message from the standby database confirming that the log data was received and written to the main memory of the standby system. See also peer state, synchronization mode.
See node error block.
A response that indicates unsuccessful processing. See also acknowledgment.
negative acknowledgment reply (NACK)
A reply from a printer to a host indicating that an exception has occurred. See also positive acknowledgment reply.
negative polling limit
For a start-stop (SS) or binary synchronous communication (BSC) terminal, the maximum number of consecutive negative responses to polling that the communication controller accepts before suspending polling operations.
negotiable link station
The capability of a link station to assume either a primary link-station or secondary link-station role and to negotiate with a partner link station during link activation which role it will assume.
negotiated session key
An encryption key that is created at the beginning of the SSL handshake, which determines the key used when encrypting information over an SSL connection. The negotiated session key changes each time a new session is initiated.
- The process of coming to agreement on the terms, conditions, and language of a contract by its parties.
- In X.25 communications, the process by which two DTEs establish the packet size, packet window size, and throughput class to be used during a call procedure.
- A two-phase process by which an initiating key server communicates with a responding key server. If the negotiations are successful, the key servers establish a dynamic virtual private network (VPN) connection that is between the two agreed-on endpoints. This approach, which is directed by the Internet Key Exchange (IKE) protocols, maintains the secrecy of keys.
An established process workflow that allows participants to negotiate details of a transaction. This pipeline can be configured to occur anywhere within an existing pipeline. The result from the negotiation is either in the form of acceptance with the potential to update some of the negotiated values or in rejection of the terms of the transaction by one or both of the participants.
In a token-ring network, the process by which each data station identifies the next active station so that all stations that are affected by a hard failure can be informed that a failure has occurred.
See node error program.
To incorporate a structure or structures into a structure of the same kind; for example, one call instruction (nested call) within another call instruction (nesting call) or one subroutine (nested subroutine) within another subroutine (nesting subroutine).
nested accessor environment element (nested ACEE)
An ACEE that contains the security environment (ENVR object) of a daemon nested beneath the security environment of the client to support daemon access to delegated resources. See also delegated resource.
See nested accessor environment element.
A command or group of commands whose processing is conditioned on the evaluation of a preceding or associated command. Nesting is a structured form of branching. In CL programs, the nested command is merged into an associated command. If the nested command is a DO command, the entire do group is nested.
- In architecture, a resource that is invoked within another resource using either an Include command or a local ID. See also nesting resource.
- A resource mapped in an overlay.
A savepoint that is included or positioned within another savepoint. Nested savepoints allow an application to have multiple levels of savepoints active at a time and allow the application to roll back to any active savepoint as required.
A complex data type that references another complex data type. A nested type can be an array type with elements that are row or array types or can be a row type with fields that are row or array types.
- A display technique that is used to show the results of a multidimensional query that returns a sub-cube. The column/row labels display the extra dimensionality of the output within the labels describing the members of each dimension.
- In the WebSphere MQ Administration Interface (MQAI), a means of grouping information returned from WebSphere MQ.
In architecture, a resource that invokes nested resources. See also nested resource.
An element in a multiple response variable that shows the number of respondents who chose one or more categories in a group of categories. A subtotal element for the same categories would show the number of responses given.
See node error table.
net available quantity
The quantity of an SKU available for new orders after taking into account the stock reservations and allocation constraints. The net available quantity is calculated as: OnHand - Pending Out.
See NetBIOS Extended User Interface.
NetBIOS (Network Basic Input/Output System)
A standard interface to networks and personal computers that is used on local area networks to provide message, print-server, and file-server functions. Application programs that use NetBIOS do not have to handle the details of LAN data link control (DLC) protocols. See also basic input/output system.
See Network Design and Analysis.
Netezza Database Accelerator Card
A Netezza-designed expansion board that provides the FPGA analysis engines, memory, and I/O bandwidth to process the queries and data communications from its associated SPU to the disks that the SPU owns.
A Cisco network protocol that monitors network traffic flow data. NetFlow data includes the client and server information, which ports are used, and the number of bytes and packets that flow through the switches and routers connected to a network. The data is sent to NetFlow collectors where data analysis takes place.
See network identifier.
See network identifier.
NETID backbone average distance
In NetDA/2, the average path length (number of hops) in the set of shortest paths between backbone nodes in a NETID subnetwork. If more than one shortest path exists between two backbone nodes, only one of these paths is included in the set of shortest paths for calculation of the average.
See network map.
See network mask.
net present value (NPV)
The estimated monetary value of an investment based on expected returns and expected costs, where these expected returns and expenses are discounted by a rate that reflects inflation and opportunity costs.
A component of Infoprint Server that provides the capability for an installation to automatically direct VTAM application data targeted for a network printer to the JES spool without changing the VTAM applications. From the JES spool, the data can be printed on a JES or PSF printer or sent to another location for printing.
In Tivoli NetView for OS/390, a set of application programming interfaces (APIs) that enable Tivoli NetView for OS/390 to interact with various types of databases in the OS/390 environment.
NetView command authorization table
In the NetView program, a set of entries that define an operator's access restrictions to commands, and depending on the level of granularity that a customer chooses to instate, to command keywords and keyword values. See also command authorization.
See NetView Distribution Manager.
NetView Graphic Monitor Facility (NGMF)
A function of the NetView program that provides the network operator with a graphic topological presentation of a network controlled by the NetView program and that allows the operator to manage the network interactively.
See network log.
NetView-NetView task (NNT)
In Tivoli NetView for OS/390, the task under which a cross-domain NetView operator session runs. See also operator station task.
NetView Performance Monitor (NPM)
An IBM licensed program that collects, monitors, analyzes, and displays data relevant to the performance of a VTAM telecommunication network. It runs as an online VTAM application program.
NetWare managed site
In a Tivoli environment, a resource that represents (a) a Novell NetWare server on which the Tivoli NetWare repeater is installed and (b) one or more clients. A NetWare managed site enables profiles to be distributed through the NetWare server to one or more specified client PCs using either TCP/IP or IPX.
- To make connections with other social media users.
- A system of resources, such as appliances, computers, and storage devices, that are connected virtually or physically.
network accessible unit (NAU)
See network addressable unit.
network access server (NAS)
A device that functions as an access control point for users in remote locations who connect to an internal network or to an ISP. A NAS might include its own authentication services or rely on a separate authentication server. A NAS can be a dedicated server or a software service within a regular server.
- An identifier for a node in a network, for example an IP address. See also host name, IP address.
- In NCS, a unique identifier (within an address family) for a specific host on a network or an internet. The network address is sufficient to identify a host, but does not identify a communication end point within the host.
- In SNA networking, an address that consists of subarea and element fields and identifies a link, link station, or network addressable unit.
- The conversion of a network address that is assigned to a logical unit in one network into an address in an adjacent network. See also alias address, real address, static network address translation.
- In a firewall, the conversion of secure Internet Protocol (IP) addresses to external registered addresses. This enables communications with external networks but masks the IP addresses that are used inside the firewall.
A logical extended agent used to create dependencies between jobs and job streams on separate Tivoli Workload Scheduler networks. See also internetwork dependency.
network application program
In the IBM Token-Ring Network, a program that is used to connect and communicate with adapters on a network, enabling users to perform application-oriented activities and to run other application programs.
network-attached storage file server (NAS file server)
A dedicated storage device with an operating system that is optimized for file-serving functions. A NAS file server can have the characteristics of both a node and a data mover.
Control information about the communications environment. System name and default local location name are examples of network attributes. See also system value.
network authentication service
The i5/OS implementation of the Kerberos V5 standard protocol that enables the System i product and several System i services (such as IBM System i5 Access for Windows) to use for authentication a Kerberos ticket as an optional replacement for a user name and password.
Network Basic Input/Output System
See association chart.
- An object class that is used for symbols that represent compound objects that might contain objects such as hosts and network devices. See also connector class.
- The type of TCP/IP network, such as Class A, Class B, or Class C.
The use of a scalable distributed computing infrastructure that encompasses the key elements of networking technologies. Examples are systems and network management; the Internet and intranets; clients and servers; application programs, databases; transaction processing; and various operating systems and communication protocols.
Network Computing Kernel (NCK)
In the Network Computing System (NCS), the combination of the remote procedure call (RPC) runtime library and the Location Broker, which provide the function necessary required to run distributed applications.
Network Computing System (NCS)
A set of software tools that conform to the Network Computing Architecture. These tools include the Remote Procedure Call runtime library, the Location Broker, and the NIDL compiler.
A concentrator and protocol converter that is used with SDLC links. By converting protocols, which manage the way that data is sent and received, the IBM 3710 Network Controller enables the use of non-SNA devices with an SNA host processor.
network control mode
The mode in which a network control program can direct a communication controller to perform such activities as polling, device addressing, dialing, and answering. See also emulation mode.
- A program that controls the operation of a communication controller. See also emulation program.
- A program used for requests and responses exchanged between physical units in a network for data flow control.
- An IBM licensed program that provides communication controller support for single-domain, multiple-domain, and interconnected network capability.
The act of updating the topology database of all attached routing nodes to reflect the addition, deletion, or changes to the reachability and metrics of a network resource. The updating is accomplished through the exchange of topology messages.
Network Database System (NDB)
The part of TCP/IP that uses the remote procedure call (RPC) protocol to allow interoperability among a variety of workstation users and a mainframe relational database system. It provides access to a mainframe relational database from workstations and mainframes and allows users to issue SQL statements interactively, or to invoke NDB services from within a C application program. NDB services can then be used to pass SQL statements to a DB2 or SQL/DS system and to handle responses from the DB2 or SQL/DS system.
Network Data Management Protocol (NDMP)
A protocol that allows a network storage-management application to control the backup and recovery of an NDMP-compliant file server, without installing vendor-acquired software on that file server.
network data-transfer rate
A rate that is calculated by dividing the total number of bytes that are transferred by the data transfer time. For example, this rate can be the time that is spent transferring data over a network.
network delivery notification
A delivery notification that conforms to the network protocol. See also application delivery notification.
Network Design and Analysis (NetDA)
A host-based IBM licensed program for designing and analyzing networks. Its major functions are network definition, performance and availability analysis, route generation and explicit route (ER) numbering, and path-statement generation.
network directory database
See distributed directory database.
A program that allows two or more computers or work stations to interoperate over a communications network. The computers or work stations may be heterogeneous or homogeneous devices. Services provided by a network driver can include file sharing, remote database access, electronic mail, remote print services, time services, security services, data conversion, remote function call, and work station emulation.
network driver for Microsoft Windows
In System i Access, a program that integrates System i Access functions with the standard user interface in the Microsoft Windows program. The Windows network driver allows a Windows user to redirect print files to a System i server (using the virtual print function), manage these redirected printer files (using Windows Print Manager), and use remote System i server files (using the shared folders function).
In the Simple Network Management Protocol (SNMP), a gateway, router, or host that contains management agents responsible for performing the network management functions requested by the network management stations.
network entity title
In OSI, a title that identifies the network entity on a given node. Because a node can have only one network entity, the network entity title uniquely identifies a given node. Network entity titles are represented in the same format as NSAP addresses.
In object distribution, a file (either a physical file or a save file) sent by one user to one or more other users. A network file is placed on the recipient's message queue when it arrives at the destination system.
network gateway accounting (NGA)
The Tivoli NetView Performance Monitor subsystem that receives traffic information from the gateway network control program (NCP) for sessions that flow throughout a network.
In Backup, Recovery, and Media Services, a cluster of systems sharing a common media inventory. Available tapes are eligible for use by any system in the network group. Each system in the network group receives updates to the media inventory, regardless of which network member makes the change.
See network identifier.
- A single character that is placed before a message type to indicate which network is to be used to send the message; for example, S for SWIFT.
- The network ID that is assigned by IMS or CICS, or if the connection type is RRSAF, the RRS unit of recovery ID (URID).
- In TCP/IP, that part of the IP address that defines a network. The length of the network ID depends on the type of network class (A, B, or C).
Network Information Center (interNIC, NIC)
In networking, an organization at SRI International that provides information about TCP/IP and the Internet. NIC assigns Internet addresses and acts as the repository for all Requests for Comments and TCP/IP documentation and policies.
- A distributed database that is used to maintain consistent configuration files throughout a network.
- A set of protocols, developed by Sun Microsystems, that are used to provide directory services for network information.
network information services (NIS)
A set of UNIX network services (for example, a distributed service for retrieving information about the users, groups, network addresses, and gateways in a network) that resolve naming and addressing differences among computers in a network.
An open, highly modular framework for networking support using industry-wide standards. The Networking Blueprint (a) incorporates multiple protocols and multiple vendor components; (b) enables comprehensive systems management and application choices independent of the network; and (c) facilitates the support of new technologies.
Networking Broadband Services (NBBS)
An IBM architecture for high-speed networking that complements the asynchronous transfer mode (ATM) standards and provides access services, transport services, and network control for user traffic.
Rules for using communication lines. Protocols can identify the direction of data flow, where data begins and ends, how much data is being transmitted, and whether data or control information is being sent. The two protocols that JES3 uses to establish a networking environment are binary synchronous communication (BSC) and systems network architecture (SNA).
- The software that formats packets at the network layer into packets that specific network adapters can understand and transmit. See also network interface attribute.
- The physical interface that allows a user to connect to the integrated services digital network (ISDN).
network interface attribute
A property of a network interface. Network interface attributes include IP label or IP address and a function, such as service, boot, or persistent. See also network interface.
- The physical hardware which attaches the network to the cluster node. SystemMirror version 7 supports only ethernet capable NICs.
- A printed circuit board that plugs into a personal computer, server, or workstation. It controls the exchange of data over a network and provides the electronic functions for the data-link protocol or access method, such as token ring or Ethernet.
- The physical interface between the IBM mainframe and the network.
Network Interface Definition Language (NIDL)
A declarative language for the definition of interfaces that has two forms, a Pascal-like syntax and a C-like syntax. NIDL is a component of the Network Computing Architecture.
network interface description
An i5/OS communications object that represents the physical interface to the integrated services digital network (ISDN). The network interface description must be configured in addition to the line, controller, and device descriptions. The system-recognized identifier for the object type is *NWID.
- In object distribution, an entry in the network job table that specifies the system action required for incoming network jobs sent by a particular user or group of users. Each entry is identified by the user ID of the originating user or group.
- A facility for linking single-processor systems or multi-access spool complexes into a processing network
A file that contains (a) messages, commands, and command procedures that have been processed by monitoring and management software and (b) output resulting from commands, command procedures, and other activity occurring within monitoring and management software.
Network Logical Data Manager (NLDM)
A program that collects and interprets records of errors detected in a network and suggests possible solutions. NLDM consists of commands and data services processors that comprise the Netview software monitor component.
- In OSI, systems management that involves processing and exchanging management information over two or more nodes. Network management provides the ability to manage one or more nodes from another node.
- The conceptual control element of a data station that interfaces with all of the layers of that data station and is responsible for the setting and resetting control parameters, obtaining reports of error conditions, and determining if the station should be connected to or disconnected from the medium.
- The process of planning, organizing, and controlling a communications-oriented system.
network management association
In OSI, an ACSE association between two systems management application entities (SMAEs)--one representing a managing process, the other representing an agent process. After network management associations are established, a manager can send operator commands to its agents and an agent can send event reports to its managers.
network management domain
In OSI, a manager and the agents that it manages. An agent can participate in more than one network management domain. In OSI Communications Subsystem, the agent at a local node is always part of the management domain of the manager at that local node.
network management vector transport (NMVT)
A management services request/response unit (RU) that flows over an active session between physical unit management services and control point management services (SSCP-PU session). See also control point management services unit, multiple-domain support message unit.
network map (netmap)
A configuration file that defines the nodes in the network and the communication information of the nodes. See also guided node discovery.
- A method for identifying the different components of an IP address. An IP address consists of a network (or subnet) component and a host component. For IPv4 addressing, the network mask is a series of 4 octal numbers separated by periods (dots). Each digit of the octal value is used as a logical mask to identify the network part. For IPv6, the network mask is referred to as a "prefix length" and is a number which specifies how many of the leading digits of the address represent the network part of the address.
- A number that is the same as an Internet Protocol (IP) address. A network mask identifies which part of an address is to be used for an operation, such as making a TCP/IP connection. See also IP address takeover.
See network QOS mode.
- A user supplied name which uniquely identifies each network in the cluster.
- See also network name.
- In SNA, a symbolic name by which end users refer to a network addressable unit (NAU), a link station, or a link. See also ACB name, uninterpreted name.
- A node that can define the paths or routes, control route selection, and handle directory services for the APPN function.
- A network node that is directly connected to an end node or a low-entry networking end node, and has been assigned to service the end node session requests.
- An APPN network node that provides network services for its local logical units and adjacent end nodes.
- A component of a network hierarchy.
- An entry in the Network Installation Management (NIM) database that represents a local area network.
- A group of predefined settings that can be shared among multiple network access policy rules to control traffic flow, communication, and access between hosts, segments, or subnets on a network.
network operations center (NOC)
Any center that has responsibility for the operational aspects of a production network. Examples of NOC tasks are monitoring and control, troubleshooting, and user assistance.
A person who controls the day-to-day operation of all or part of a network. See also domain operator.
In System i Access, the system, path, or library, and the name of the server network driver, network printer, or data queue that the user is accessing. For example, the network path used to access a printer through the network driver is: //system/library/printer.
Network Printer Manager (NPM)
An application that lets network administrators monitor, control, and configure IBM network printers. NPM also lets network administrators monitor some aspects of printers controlled by PSF and other manufacturers' network printers that comply with RFC 1759.
Network Problem Determination Application (NPDA)
A program that collects and interprets records of errors detected in a network and suggests possible solutions. NPDA consists of commands and data services processors that comprise the Netview hardware monitor component.
network product support (NPS)
The function of the NetView program that provides operations control for the IBM 3710 Network Controller, the 5860 family of modems, and the NCP and provides configuration of 3710s and the 5860 family of modems. NPS provides operator commands for running diagnostics for link problem determination and for changing product operating parameters.
network QOS mode (network mode)
In the OSI Communications Subsystem licensed program, a set of X.25 connection-mode quality-of-service (QOS) values that determine the type of connection established between two nodes.
In SNA, a name that uniquely identifies a specific resource, such as a logical unit (LU) or control point (CP), within a specific network. A network-qualified name consists of a network identifier and a resource name, each of which is a symbol string that is 1 to 8 bytes.
Network Routing Facility (NRF)
A licensed program that runs under the control of the Network Control Program and uses a System/370 backbone network. The network routing facility provides primary logical unit support and a path for data between a display station and an application without using the System/370 host system.
An automated process that discovers hardware devices, such as computer and printers, that exist in a network. Network scan results include details of the discovered devices, including IP addresses and device names. See also scan, software scan.
- Software that is responsible for authenticating end users and authorizing them to access network resources, such as IBM Tivoli Access Manager. See also credential mapper.
- The protection of a network from malicious activity through monitoring, collecting, and analyzing network activities.
network service access point (NSAP)
The point at which network services are provided by a network entity to a transport entity according to the OSI reference model. NSAP addresses are assigned by a hierarchy of registration authorities so that each valid NSAP address provides a globally unambiguous identification of one system. One system can have multiple NSAP addresses.
- The services within network addressable units that control network operation through SSCP-to-SSCP, SSCP-to-PU, SSCP-to-LU, and CP-to-CP sessions.
- The session services (directory and route-selection functions) and management services provided by an APPN network-node control point to its domain.
network services header
In SNA, a 3-byte field in a function management data (FMD) request/response unit (RU) flowing in an SSCP-LU, SSCP-PU, or SSCP-SSCP session. The network services header is used primarily to identify the network services category of the request unit (RU) (for example, configuration services and session services) and the particular request code within a category.
network session accounting (NSA)
The Tivoli NetView Performance Monitor subsystem that receives session accounting information from the network control program (NCP) for sessions that flow throughout a network.
Network Status Manager (NSM)
A service used by Network File System (NFS) when using version 2 or 3 of the NFS protocol to determine whether resources, such as file open share or byte range locks, are still in use by a remote client.
network table file
A text file that contains the system-specific configuration information for each node in a Content Manager system. Each node in the system must have a network table file that identifies the node and lists the nodes that it needs to connect to. The name of a network table is FRNOLINT.TBL.
network tap (TAP)
In computer networking, a virtual-network kernel device that simulates a link layer device. A TAP creates a network bridge. See also network tunnel.
Network Terminal Option (NTO)
An IBM licensed program, used in conjunction with NCP, that allows certain non-SNA devices to participate in sessions with SNA application programs in the host processor. When data is sent from a non-SNA device to the host processor, NTO converts non-SNA protocol to SNA protocol; and when data is sent from the host processor to the non-SNA device, NTO converts SNA protocol to non-SNA protocol.
network termination 1 (NT1)
In ISDN, an end point for the network's transmission line. Network termination 1 is responsible for the physical layer characteristics (of the OSI reference model), such as ending the line transmission, monitoring performance, and timing.
network termination 2 (NT2)
In ISDN, an end point for the network's transmission line. Network termination 2 is responsible for the network layer, the data link layer, and the remaining functions of the physical layer (not included in network termination 1) of the OSI reference model. Examples include communications controllers and public branch exchanges (PBXs).
- The representation of the current topology of the intermediate routing portion of the APPN network. The network topology database contains entries for network nodes and the transmission groups interconnecting them. Each entry describes the current characteristics of the node or transmission group that it represents. The topology database is used to determine the preferred session route between two end nodes for a given class of service.
- In Managed System Services, a set of database files that contain topology information and general system information for nodes throughout the network.
network tunnel (TUN)
In computer networking, a virtual-network kernel device that simulates a network layer device. A TUN routes messages. See also network tap.
In DCE Remote Procedure Call (RPC), a type defined in an interface definition and referred to in a represent_as clause that is converted into a local type for manipulation by application code.
network user identification (NUI)
In X.25, the network specific information that enables the transmitting data terminal equipment (DTE) to provide billing, security, or management information on a per-call basis to the data circuit-terminating equipment (DCE). The NUI can identify a network user independently of the port being used.
network virtual terminal (NVT)
A Telnet service that provides a default common interface to remote terminals. The client application negotiates NVT support and, as a result, the Telnet server maps 5250 functions to virtual terminal characters.
A mathematical model for predicting or classifying cases by using a complex mathematical scheme that simulates an abstract version of brain cells. A neural network is trained by presenting it with a large number of observed cases, one at a time, and allowing it to update itself repeatedly until it learns the task. See also Kohonen network.
In the GDDM function, one of the colors selected to display graphics primitives; for example, white on a display or black on a printer. See also background color.
- An installation mode of QMF that permits QMF owner and object names to be as long as the database allows.
- The normal mode of operation that exists after successful completion of a version-to-version migration. At this stage, all new functions of the new version are available for use. A DB2 data sharing group cannot coexist with members that are still at the prior version level, and fallback to a prior version is not supported. See also conversion mode, conversion mode*, enabling-new-function mode, enabling-new-function mode*.
For the purposes of the Globalization White Paper: any product that is undergoing substantial changes in architecture or design or where more than 50% of the code will be new or rewritten. A product that is made up of other existing products with a small amount of integration code is not considered to be a new product.
The periodic transfer of newly posted newsgroup articles from one NNTP server to another using the NNTP protocol. Enabling the NNTP protocol on a Domino server allows you to set up a newsfeed to transfer both USENET and private newsgroup articles.
An online discussion group that users with newsreaders can participate in. A Domino NNTP server can store Usenet newsgroups, public newsgroups distributed on the Internet, and private newsgroups.
A single entry in a Really Simple Syndication (RSS) compatible format. It can include a headline, text, and a link to more information. A news item task in an agent can be used to create news items for display in a Cognos Connection portlet.
See Non-Facility Associated Signaling.
See near field communication.
See Network File System.
An NFS configuration in which one node is both the NFS server for one file system and the NFS client for another file system, while a second node is the NFS client for the first file system and the NFS server for the second file system. Each node is part of a mutual takeover or active-active cluster configuration, both providing and mounting an NFS file system.
See network gateway accounting.
See NetView Graphic Monitor Facility.
See node initialization block.
- An alternative name, often derived from other name elements, for a personal name.
- See alias.
- In a federated system, an identifier that is used in a distributed request to refer to a data source object. See also data source object.
- In the OSI Communications Subsystem licensed program, a 1- to 8-character name that identifies an object or entity in an OSI network. Nicknames are provided by OSI Communications Subsystem to enable users to use simple names instead of the often long, multipart, sometimes binary-coded identifiers required by OSI protocols.
See network identifier.
See Network Interface Definition Language.
See Network Installation Management.
An AIX system that can install one or more Network Installation Manager (NIM) clients. An AIX system must be defined as a NIM master before any NIM clients can be defined on that system. A NIM master manages the configuration database, which contains information for the NIM clients. In CSM, the NIM master is the management server.
The information that defines which networks in the NIM environment can communicate with each other and which gateways they use to facilitate that communication. NIM routing is used to represent the TCP/IP routine that exists for the LANs in the overall network environment.
See nucleus initialization program.
See node information table.
See network job entry.
See node loop port.
See national language dependent function.
See Network Logical Data Manager.
See national language feature.
See Network Lock Manager.
See Natural Language Processing model.
See National Motor Freight Classification code.
See National Motor Freight Classification council.
See network management gateway.
See network management station.
See network management vector transport.
See network node.
See network node control point.
See NetView-NetView task.
See Network News Transfer Protocol.
See network operations center.
- In a network configuration, the physical machine that contains one or more related functional units.
- An object in the tree view that serves as a container to hold related objects.
- The representation of a state or an event by means of a point on a diagram.
- See host.
- In Enterprise Service Tools, one of a series of graphical elements in a flow diagram. A node represents an endpoint or junction used in a flow.
- The start and end points, various stages, and decision points through which a document type passes in a workflow.
- Any element in a tree.
- In a network, a point at which one or more functional units connect channels or data circuits.
- A location in a communications network that provides host-processing services.
- A single processing unit within a system. For redundancy, nodes are deployed in pairs to make up a system.
- In Systems Network Architecture (SNA), the portion of a hardware component, along with its associated software components, that implements the functions of the seven architectural layers.
- An instance of Sterling Connect:Direct.
- One of the various artifacts in an application as shown in the application diagram. Each node is given a label based on its underlying source artifact or object name.
- See database partition.
- A single appliance, such as an IBM WebSphere DataPower appliance.
- A point in a transaction topology that represents an application, component, or server whose transaction interactions are tracked and aggregated by Transaction Tracking.
- One of the points in a topology view or topology diagram. A node usually corresponds to a machine, but depending on the type of view, might also correspond to a facility, base product, solution element, or solution artifact.
- In a graphing tool, a specific data element that is connected to other data elements by lines or edges.
- A Fibre Channel device that contains a node port (N_port) or node loop port (NL_port).
- A grouping of processor, memory, and I/O hub hardware resources in the system. On systems of machine type FHA, a node is a processor book. On systems of machine type MMA, a node is a drawer.
- In networking, a point capable of sending and receiving data. A node can be a device, such as printer or workstation, a system, or a storage location on a disk. See also port.
- In X.25, a point where packets are received, stored, and forwarded to another location (or data terminal equipment) according to a routing method defined for the network.
- A logical group of managed servers. See also managed node.
- A file server or workstation on which the backup-archive client program has been installed, and which has been registered to the server.
- One operating system image.
- A complete implementation of Sterling Commerce Center, which includes a Windows messaging server that is integrated with communications components, a processing engine, and primary and secondary systems.
- An IMS resource that represents a physical VTAM terminal. The node is represented by a VTAM terminal control block.
- See attribute definition.
- In Microsoft Cluster Server (MSCS), each computer in the cluster.
- An endpoint or junction used in a message flow.
- An instance of one of the node kinds that are defined by the XQuery and XPath data model. See also item, node kind, XQuery and XPath data model.
- In communications, an end point of a communication link or a junction common to two or more links in a network. Nodes can be processors, communication controllers, cluster controllers, terminals, or workstations. Nodes can vary in routing and other functional capabilities.
- A computer location defined in a network.
- A logical processing unit that is defined in a configuration file by a virtual name and a set of associated details about the physical resources, such as the server, the disks, its pools, and so on.
- An organization that represents a physical location whether it is a manufacturing plant, small stock room, or warehouse.
- In hardware, a uniprocessor or symmetric multiprocessor (SMP) computer that is part of a clustered system or a massively parallel processing (MPP) system. See also symmetric multiprocessing system.
- The graphical representation of a data operation in a stream. Different types of nodes have different shapes to indicate the type of operation that they perform. See also downstream, stream.
- A set of rows of spend data that contains a description of the amount of spend and the number of transactions associated with the spend.
- A choice point in a binary search tree.
- A computer that is part of a clustered system.
- A single machine or machine partition with a unique IP address on which you install one or more WebSphere Commerce components. In a federated environment, a node is a single occurrence of WebSphere Application Server and its applications. A node in a cell may or may not be running the same enterprise application as other nodes in the same cell.
- Any computer system that has a parallel engine installed on it. See also parallel engine.
- In the context of an index for a database, an ordered group of key values having a fixed number of elements. A B-tree for example, is a set of nodes that contain keys and pointers arranged in a hierarchy. See also branch node, root node.
- In XML, the smallest unit of a valid, complete structure in a document.
- An individual operating-system image within a cluster. Depending on the way in which the computer system is partitioned, it may contain one or more nodes.
See node definition file.
A node event that occurs when a node leaves the cluster voluntarily or fails. See also cluster event.
- Nodes having similar attribute values and defined as a group to facilitate node management.
- A collection of application server nodes that defines a boundary for server cluster formation.
See node identifier.
- In a tree-like representation of XML instance documents, a unique pointer to a specific node. A node ID can also point to a node that is generated by a constructor.
- A unique string of characters that identifies the node on a network.
node ID index
See XML node ID index.
node initialization block (NIB)
In VTAM, a control block associated with a particular node or session that contains information used by the application program to identify the node or session and to indicate how communication requests on a session are to be handled by VTAM.
Node isolation occurs when a node continues to run cluster services and has lost all communication with other cluster nodes which are also running cluster services. A cluster that experiences node isolation is referred to as a partitioned cluster. See also partitioned cluster.
A designation that defines a node according to the data that the node contains. The XQuery and XPath data model defines the following node kinds: document, element, attribute, text, processing instruction, and comment. See also node, processing instruction.
node-level policy group
One or more policies, or one or more simple policy groups, or both, that are of the same scope and that are associated with a particular node in a policy hierarchy. See also node-attached policy group, simple policy group.
- A system object that contains a list of SNA nodes identified by an APPN network ID and control point name. The system-recognized identifier for the object type is *NODL.
- The nodes assigned to participate in the takeover of a given resource group. See also resource group.
node loop port (NL_port)
A port specific to Fibre Channel Arbitrated Loop (FC-AL). An NL_port has the same functional, logical, and message handling capability as a node port (N_port), but connects to an arbitrated loop rather than to a fabric. In some implementations, ports can function either as N_ports or as NL_ports depending on the network to which they are connected. An NL_port must replicate frames and pass them on when in passive loop mode. See also arbitrated loop, Nx_port.
- The name assigned to a node during network definition.
- A unique name that is used to identify a workstation, file server, or PC to the server.
- An 8-character alphanumeric name that represents a node to other parts of the network job entry (NJE) network.
- The user-supplied name that identifies each node in a cluster. The default node name will be derived from the host name for the cluster node, however, the node name can be changed to any preferred value. Node name does not have to match the host name.
- The machine name or host name that must be unique.
node port (N_port)
A port that connects a node to a fabric or to another node. An N_port connects to a fabric port (F_port) or to the N_port of another node. An N_port handles creation, detection, and flow of message units to and from the connected systems. N_ports are end points in point-to-point links. See also Nx_port.
node priority policy
A user-selected method that is used to determine the node order for takeover of a nonconcurrent resource group. The node priority policy can be the order of the participating node list, or can be a dynamic node priority policy that uses an RSCT Resource Monitoring and Control (RMC) resource attribute. See also resource group policies, takeover priority.
node privilege class
A privilege class that gives an administrator the authority to remotely access backup-archive clients for a specific client node or for all clients in a policy domain. See also privilege class.
node switchboard (NSB)
A configuration of switches for node-to-switch communication. See also intermediate switch board.
Internal communication between clustered nodes uses the virtual Ethernet as the private network (or interconnect) that carries the heartbeat. The cluster service on each node uses a heartbeat to keep track of the current state of the nodes within the cluster. The cluster service uses the heartbeat to: (1) Determine when a failover to another node should occur, (2) Synchronize the cluster databases on each node, (3) Verify node failures during a cluster configuration change. The private network uses the single network virtual Ethernet model.
The designation of a node according to the protocols it supports or the role it plays in a network. Examples of Advanced Peer-to-Peer Networking (APPN) node types are network node and end node.
A node event that occurs when a node joins or rejoins a cluster. See also cluster event.
A storage control block containing the currently active NOERROR definitions, specifying a list of error codes that are treated as normal completion codes for job-tracking purposes. The controller builds the NOERROR table at startup.
- A disturbance that affects a signal and potentially distorts the information carried by that signal.
- Random variations of the characteristics of any entity, such as voltage, current, or data.
noise word file
See excluded word list.
A set of terms, acronyms, icons, or other symbols appearing on keys, switches, and labels. An example of nomenclature is the Alt label that appears on the alternate shift key on some keyboards. The padlock symbol (which is an icon or metaphor of Shift lock), the various arrows, and Attn (for the command Attention), are other examples of keyboard nomenclature used in IBM. ISO/IEC Standard 9995:1993 defines 56 symbols which cover most keyboard nomenclature requirements without the need for translation.
nonadjacent destination node
In the OSI Communications Subsystem licensed program, a destination node that is connected to a different subnetwork from the local node. To communicate with a nonadjacent destination node requires the use of a relay node. See also adjacent destination node.
A tape volume profile that RACF creates when tape data set protection is not active. RACF does not delete the profile unless specified to do so. See also automatic profile.
A way of requesting a service over an interface so that if the request cannot be completed immediately, the requesting process is able to continue and is not suspended. See also blocking mode.
An operation, such as sending or receiving a message, that returns immediately whether or not the operation is completed. For example, a nonblocking receive will not wait until a message arrives. A nonblocking receive must be completed by a later test or wait.
See required space.
In LANs, a format for the transmission of medium access control (MAC) addresses for token-ring adapters. In noncanonical format, the most significant (leftmost) bit of each address byte is transmitted first. See also canonical address.
- A binary value that is not repeatable by a generating program over a long period of time. It can be a counter or a random value.
- A random, unique text string that is encrypted along with data and then is used to detect attacks against the system that sends the encrypted data. A nonce is used especially for authentication and ensures that encrypted data is different each time that it is encrypted.
- A unique cryptographic number that is embedded in a message to help detect a replay attack.
noncomplete CCD table
In SQL replication, a CCD table that is initially empty and has rows appended to it as changes are made to the replication source. See also complete CCD table.
nonconcurrent resource group
A resource group that does not have the startup policy Online on All Available Nodes. See also concurrent resource group, resource group, resource group policies, shared IP address.
noncondensed CCD table
In SQL replication, a CCD table that can contain more than one row for each key value. These duplicate rows represent the history of changes for the values in the rows of a table. See also condensed CCD table, consistent-change-data table.
See delta backup.
A user-defined function that returns a single group of values (one row of data) and therefore does not require a cursor when it is executed. Compare with cursor function. See also cursor function.
See noncustomer identifier.
non-defect oriented problem (NDOP)
A type of PMR that does not result in an APAR, because it is not caused by a program defect. The analysis of NDOPs can help identify common user errors, usability problems, and documentation errors.
nondelimited ASCII format
A file format that is used to import data. A nondelimited ASCII file is a sequential ASCII file with row delimiters used for data exchange with any ASCII product; column values are not separated by delimiters.
The capability of a solving engine to search for a solution by exploring many alternative possibilities without the developer knowing beforehand which of those possibilities will necessarily succeed. An engine manages the implementation of nondeterminism through choice points, restored states, reversible variables, backtracking, and so forth.
A dictionary in which there are many possible paths for a given input letter when matching a string to find a word. See also deterministic dictionary.
A user-defined function whose result is not solely dependent on the values of the input arguments. That is, successive invocation with the same argument value can produce a different answer.
A subscription that exists only while the connection from the subscribing application to the queue manager remains open. The subscription is removed when the subscribing application disconnects from the queue manager either deliberately or by loss of connection. See also durable subscription.
none start event
A start event that does not have a defined trigger. A none start event can be used in a descriptive process that does not require technical information or in a subprocess where the control of the process flow is passed from its parent process. See also start event.
Non-Facility Associated Signaling (NFAS)
An ISDN configuration where several T1 facilities can be controlled by a single D-channel, instead of the normal T1 configuration where each T1 facility has 23 B-channels and a D-channel (23B+D). With NFAS, all 24 timeslots of the nonsignaling trunks are available for voice whereas only 23 channels can be used on the trunk that carries signaling traffic (23B+D+n24B). See also D-channel backup.
In SNA management services (SNA/MS), alert information that is encoded such that it conveys to the receiver the set of screens that should be displayed for the network operator when the alert is received. The use of nongeneric alerts requires that the receiver recognize and understand each unique problem for which an alert is sent. See also generic alert.
A zone that is hosted by a global zone which contains an installed subset of the complete Solaris operating system software packages. Non-global zones are unaware of the existence of any other zones. See also global zone.
non-guaranteed print labeling
Some printers that do not support guaranteed print labeling can still print identification labels, but the integrity of the labels cannot be guaranteed using PSF. See also guaranteed print labeling.
A printer in which printing is not the result of mechanical impacts, for example, a thermal printer, an electrostatic printer, and a photographic printer. See also impact printer.
The work done by jobs and tasks, such as batch jobs and system activity, that may have occurred as a result of an interactive transaction. See also interactive transaction.
non-intrusive journal backup
A method of journal backup during which all DFSMShsm activity is allowed to continue while DFSMShsm creates a backup of the preexisting journal records. After the initial backup of the journal completes, all DFSMShsm activity is quiesced and DFSMShsm completes the backup of the journal. Non-intrusive journal backup can be used to reduce the impact of journal backup on DFSMShsm availability and performance. See also quiesced journal backup.
A product is non-key if and only if the following conditions are satisfied: 1. A decision has been made using the process documented in section 14.2 that the product is not flagship, key, or legacy. 2. The product is not part of another product offering which is listed in the product classification database. See also flagship product, key product, legacy product.
An alphabet comprising letters other than the Latin-based ones, such as those used in Greek and Arabic. See also Latin alphabet.
An index page that contains keys and page numbers of other pages in the index (either leaf or nonleaf pages). Nonleaf pages never point to actual data. See also leaf page.
nonlibrary user ASP
An auxiliary storage pool that contains journals, journal receivers, and save files. The libraries for the objects are in the system ASP. See also library user ASP.
- In operations research, pertaining to functions that can be represented by polynomial or quadratic equations.
- In constraint programming, pertaining to a function that is not linear. That is, it may be a quadratic polynomial, or it may be logical and symbolic in ways that cannot be easily or efficiently represented by linear equations. For example, the trigonometric functions, such as sine, cosine, tangent, and so forth, are considered nonlinear in this context.
nonlinear programming (NLP)
A technique for solving an optimization problem for which the model may contain a nonlinear objective and nonlinear constraints. Typically, the decision variables are continuous (not discrete).
An environment in which the application is responsible for generating and configuring connection factories. The Java EE server does not own or know about these connection factories and therefore provides no Quality of Service facilities.
An application program that is initiated by the submission of a batch job. This program runs in a batch message processing (BMP) region, a Java batch processing region (JBP region), or an IMS Fast Path (IFP) utility region. See also message-driven program.
non-native data format
A format of data that is written to a storage pool that differs from the format that the server uses for operations. See also native format.
- A subnetwork whose network identifier differs from the network identifier that a node uses for its own network-qualified resource names.
- Any network attached to a gateway NCP that does not contain that NCP's resources.
- In MPTN architecture, with respect to a particular transport user, a transport network whose addressing structure and transport service are different from that assumed in the design of that transport user.
nonpageable dynamic area
In MVS, an area of virtual storage whose virtual addresses are identical to real addresses. It is used for programs or parts of programs that are not to be paged during execution.
In MVS, a subdivision of the nonpageable dynamic area that is allocated to a job step or system task that is not to be paged during execution. In a nonpageable region, each virtual address is identical to its real address.
In Business Graphics Utility and the GDDM function, data that is specified such that each X-value has a set of Y-values associated with it. See also paired data.
In Fibre Channel technology, a mode in which a loop port (L_port) in a loop is inactive and cannot arbitrate or send frames, but can retransmit any received transmissions. This mode is entered if there are more than 127 devices in a loop and an arbitrated loop physical address (AL_PA) cannot be acquired. See also loop port, participating mode.
- An index that is not physically partitioned. Both partitioning indexes and secondary indexes can be nonpartitioned. See also secondary index.
- An object that contains the index entries for all data partitions of a partitioned table. See also partitioned index.
nonpartitioned secondary index (NPSI)
An index on a partitioned table space that is not the partitioning index and is not partitioned. See also data-partitioned secondary index.
A table that does not use data partitions. See also partitioned table.
A temporary data field that an object uses for calculations or temporary storage. See also persistent column.
A message that does not survive a restart of the queue manager. See also persistent message.
See non-program integrated information.
See control character.
A carrier that does not subscribe to Sterling TMS. Shipments can still be tendered to a nonprofiled carrier. However, the shipments are not tracked. See also offline carrier.
non-program integrated information (non-PII)
Product information that is technically and rationally separable from the product but is delivered with the product. Non-PII information is not essential to the usability of the software and includes hard copy documentation, soft copy documentation, and tutorials.
Any resource status that cannot be recovered after a terminal logoff, a user signoff, or an IMS restart. Nonrecoverable status only exists while the resource is active and is deleted when that resource becomes inactive.
A reporting attribute of a workstation that means that information is not fed back to Tivoli Workload Scheduler for z/OS. See also reporting attribute.
- Proof that a transaction occurred or that a message was sent or received. The use of digital certificates and public key cryptography to digitally sign transactions, messages, and documents supports nonrepudiation.
- In business-to-business communication the ability of the recipient to prove who sent a message based on the contents of the message. This can derive from the use of a digital signature on the message, which links the sender to the message.
In IMS, a mode of terminal operation that allows asynchronous operations between the terminal operator and the application program. See also response mode.
A binary code system in which a signal condition must be sustained for the full time interval and does not revert to a standby or quiescent state between signal elements. Using NRZ permits the maximum data signaling rate on the channel, which should be twice the band width, according to Nyquist's theorem.
- Pertaining to objects created by, or actions performed by, a user without root privileges. For example, a user who installs the database server without user root privileges performs a non-root installation.
- Pertaining to objects that do not possess or require root privileges. For example, a non-root user is a user without root privileges. A non-root server is a database server that runs without root privileges.
A volume that has valid or unexpired data on it. See also scratch.
A cursor that can be moved only in a forward direction. Nonscrollable cursors are sometimes called forward-only cursors or serial cursors. See also scrollable cursor.
A set of nodes that are not controlled by a single administrative party. See also secure network.
See boot interface.
nonshared resource (NSR)
A file that has its own set of buffers and control blocks. See also local shared resource.
An IBM licensed program that provides format identification (FID) support for selected non-SNA facilities. Thus, it allows SNA and non-SNA facilities to share SDLC links. It also allows the remote concentration of selected non-SNA devices along with SNA devices.
nonspacing character sequence
For accented characters, a two-part sequence consisting of a valid diacritic followed by an alphabetic character or a space. The system converts the sequence into a single code point that results in the alphabetic character with the specified diacritic mark.
In the IBM 3800 Printing Subsystem, a font loaded from the host processor into raster pattern storage for immediate use. It remains there until deleted. See also stageable font.
A four-character code that is used to represent each fleet within a carrier organization. A carrier defines a nonstandard SCAC for each fleet, other than for the fleet that uses the legal SCAC of the carrier.
See dynamic connection.
A connection that does not have to be established by dialing. See also switched connection.
A connection between computers or devices that does not have to be made by dialing. See also switched line.
A type of MSDB characterized by data that is used or updated frequently, and segments that are not owned by specific logical terminals. Direct update of segment fields is allowed but no insertion or deletion of segments is permitted.
Images, static or animated visual content, or audio content that support product documentation. Examples include flowcharts, illustrations of hardware components, screen captures, diagrams and animations.
A mode of binary synchronous transmission in which all transmission control characters are treated as transmission control characters rather than as text. See also transparent mode.
A user-defined function that always returns the same value when passed the same arguments. A nonvariant function must not contain SQL statements. Compare with variant function. See also variant function.
A resource, such as user accounts, for which only one current copy is saved in Sterling B2B Integrator at any time. When a non-versioned resource is modified, the new data replaces the old data in the system.
non-VSAM data set
A data set allocated and accessed using one of the following methods: basic direct access method (BDAM), basic partitioned access method (BPAM), basic indexed sequential access method (BISAM), basic sequential access method (BSAM), queued sequential access method (QSAM), or queued indexed sequential access method (QISAM).
A catalog entry that describes a data set that does not use the Virtual Storage Access Method (VSAM). A non-VSAM entry contains the data set's volume serial number (VOLSER) and device type. If the data set resides on a magnetic tape volume, the entry can also identify the data set's file number. When the data set resides on a direct access device, the operating system obtains further information by examining the data set's data set control block (DSCB) in the volume's volume table of contents (VTOC).
non-VSAM volume record (NVR)
A VSAM volume data set (VVDS) record that contains information about a system-managed data set that does not use the Virtual Storage Access Method (VSAM) and is not related to the storage management subsystem (SMS).
non-working days calendar
A calendar assigned to a job stream to represent the non-working days, when job streams and jobs are not to be run. It can also be used to designate Saturdays or Sundays, or both, as workdays. See also calendar, holidays calendar.
See no operation.
In SNA, a value in the form-of-response-requested field of the request header that directs the receiver of the request not to return any response, regardless of whether or not the request is received and processed successfully. See also definite response, exception response.
normal disconnected mode (NDM)
A nonoperational mode of an unbalanced data link in which the secondary station is logically disconnected from the data link and, therefore, cannot transmit or receive information.
Pertaining to printing on both sides of the paper such that the top of one side is at the same end as the top of the other side. Normal duplex printing is used for forms that are bound on the long edge of the paper, regardless of whether the printing is portrait or landscape. See also duplex, tumble duplex.
- All sequence flow paths in a process except those paths that originate from an intermediate event that is attached to the boundary of an activity. See also exception flow.
- In SNA, a data flow designated in the transmission header (TH) that is used primarily to carry end-user data. The rate at which requests flow on the normal flow can be regulated by session-level pacing. Normal and expedited flows move in both the primary-to-secondary and secondary-to-primary directions. See also expedited flow.
A process in which the i5/OS operating system contained on tape is installed in auxiliary storage, replacing the operating system (if any) that is currently in the system. See also abbreviated installation.
- The process of restructuring a data model by reducing its relations to their simplest forms. It is a key step in the task of building a logical relational database design. Normalization helps avoid redundancies and inconsistencies in data. An entity is normalized if it meets a set of constraints for a particular normal form (first normal form, second normal form, and so on). See also denormalization, repeating group.
- The process of replacing surface form representations with their canonical form. This may include case normalization, where a capitalized word is replaced by a lowercase word: 'Run' becomes 'run'; grammatical normalization, where an inflected verb is replaced by the non-inflected form: 'runs' becomes 'run'; lexicographical normalization, where Unicode full-width characters is replaced with Unicode basic form, or white spaces are removed from Chinese text.
normalization support CCSID table (NSCT)
A table containing a default CCSID value associated with a pair of CCSIDs, which will be used to normalize two strings (that are coded in two different CCSIDs), before a string operation such as concatenation, comparison, or others is performed with the two strings.
To put data in a physical location and structure that is optimized for quick input and the storage of large amounts of data. See also denormalize.
See multiuser mode.
The priority assigned to a transaction when the number of transactions enqueued and waiting to be processed is less than the limit count value. See also limit count, limit priority, scheduling priority.
In SNADS, a queue that contains distribution entries with a service level of data low. See also priority queue.
normal response mode (NRM)
An operational mode of an unbalanced data link in which the secondary station starts transmission only as the result of receiving explicit permission, by polling, from the primary station. See also asynchronous balanced mode.
normal speed carrier service
A service that delivers products within a regular or typical interval of time. However, the interval of time that categories a service as regular or typical may vary from one service provider to another.
For IBM business, legal, marketing, or organizational contexts, the administrative region comprising Germany, the United Kingdom, Ireland, some parts of Africa, Nordic countries, CEMA, Switzerland, Austria and some countries in the Middle East. See also Central Europe, Middle East, and Africa, Europe, Middle East, and Africa, Southwest Europe.
See Notes object services.
See Not only SQL.
In binary floating-point and decimal floating-point concepts, a value, not interpreted as a mathematical value, that contains a mask and a sequence of digits. See also decimal floating-point number.
- A system of characters, symbols, or abbreviated expressions used to express technical facts or qualities.
- An XML construct that contains a note, a comment or an explanation about information in an XML file. A notation can be used to associate a binary description with an entity or attribute.
not deterministic function
See non-deterministic function.
A simple data structure that stores Notes database design elements (forms, views, and so on), user-created data (documents), and administrative information, such as the database access control list.
A structure that contains, among other things, the note's originator ID (OID), which includes the note's universal ID (UNID); the note ID; the note's parent note, if one exists; the number of items in the note; and the list of the note's item descriptors.
A 4-byte value that is assigned to a note when the note is first created. Note IDs are stored in the record relocation vector table, which maps a note's note ID to the position with the database file. A note ID is unique within a database but not across replicas of the database, meaning that the same note in two replicas can have different note IDs, even though the replicas have identical UNIDs.
A single file that physically contains both a set of documents and a copy of the application design elements that control the creation and modification of those documents. A database can be shared, local, or remote.
A security mechanism that verifies that the user or Domino server trying to access a particular Domino server has a trusted certificate in common with it. Authentication occurs in both directions: the server authenticates the user; then the user authenticates the server.
Notes named network
A group of Domino servers that run on the same LAN protocol -- for example, servers running on TCP/IP in one of an organization's locations. Servers on the same Notes named network route mail to each other automatically, whereas you need a Connection document to route mail between servers on different Notes named networks.
Notes name service
The name service within IBM Notes and Domino that assists in name-to-address resolution in NRPC (Notes remote procedure call) by making calls to the Domino Directory to resolve Domino common names to their respective protocol names.
Notes object services (NOS)
A set of portable C/C++ functions that create and access information in databases and files, compile and interpret formulas and scripts, and provide an interface to operating systems in a consistent, portable way.
Application software that runs on a machine that is connected to a network. The Notes server provides the following services to Notes clients and other Notes servers: storage and replication of databases, directory services, mail routing, and security.
Pertaining to a type, or characteristic, of a procedure or user-defined function that is defined to run in the database manager process. When this type of object is run (using the not fenced clause), the database manager is not protected from changes made by this object. See also fenced.
- A text or HTML message that is sent to an individual or user according to a particular task or event that either requires the participation of the individual or is purely informational. See also contract event.
- A user-configured e-mail, page, alert message, or Notification Type Process Control event that is initiated by the Audit Notification System when a specified error message is generated.
- An occurrence within a process that can trigger an action. Notifications can be used to model conditions of interest to be transmitted from a sender to a (typically unknown) set of interested parties (the receivers).
- A message that signals an event or key performance indicator (KPI) status change.
- A message that contains the event descriptions that are sent to managed resources, web services and other resources.
- An unscheduled, spontaneously generated message, issued by an agent when a significant or critical (data) condition occurs.
- The process of notifying the shipping node, vendor, or service provider when fulfilling an order request.
- Information, labeled as a managed object, that relates to an event that has occurred within the managed object.
- A mechanism that is used to generate email messages informing users of specific types of system events, such as changes to content repository objects and processing success and failure. Unlike subscriptions, notifications can be set up to send email to multiple users.
- The basis for the notification messages sent during the lifecycle of a contract or at defined events. See also template.
- A template that defines the content and format of the email sent to an access group on the occurrence of a specific event.
A message queue, a data area, or a database file that contains information identifying the last successful commitment operation. This information can be used by the programmer to find a restarting point for an application following an abnormal end to the system or routing step processing.
- A PSF subcomponent that returns processed data sets to JES or Direct Printer Services Subsystem and performs checkpoint processing on data sets as they are printed.
- An external trace that contains information pertaining to the releasing and checkpointing of data sets by PSF.
Not only SQL (NoSQL)
Pertaining to a status where all images in the image catalog are not available for use by the virtual optical device. The status of the individual image catalog entry images in the image catalog reflects either the last status for the catalog before being made not ready from ready or the future status for catalogs about to be made ready. The image catalog can be made not ready by using the LODIMGCLG command with OPTION(*UNLOAD).
See deterministic function.
See network-layer protocol data unit.
See Network Print Facility.
See N_Port ID Virtualization.
See nonprocess runout.
See network product support.
See net present value.
See negative response.
See normal response mode.
A typesetting utility originally designed to drive Teletype model 37 printing workstations. It now drives a wide variety of backspacing and non-backspacing tty-type line printers and tty-emulating printers.
See Notes Remote Procedure Call.
See network services.
See network session accounting.
See network service access point.
In OSI, an address that identifies a service access point in the network layer. NSAP addresses must be unique within the OSI network where they are used. NSAP addresses are assigned by naming authorities.
See node switchboard.
See normalization support CCSID table.
See Network Shared Disk.
See Nistevo Standard Delimited File.
See network-layer service data unit.
See National Science Foundation.
See National Science Foundation Network.
See name service interface.
NSI profile attribute
In DCE Remote Procedure Call (RPC), an RPC-defined attribute (NSI attribute) of a name service entry that stores a collection of RPC profile elements and identifies the entry as an RPC profile.
See Network Status Manager.
See nonshared resource.
See notify subtask.
See network termination.
See network termination 1.
See network termination 2.
See New Technology File System.
See national terminal number.
See Network Terminal Option.
See Network Time Protocol.
In a Tivoli environment, the first Windows NT machine on which the Tivoli Remote Execution Service is installed. Using fanout, the NT repeater distributes the Tivoli Remote Execution Service to all other NT clients during the client installation process.
See NCP/Token-Ring interconnection.
The specifications for color television as defined by the NTSC committee, which include: (a) 525 scan lines, (b) broadcast bandwidth of 4 MHz, (c) line frequency of 15.75 KHz, (d) frame frequency of 30 frames per second, and (e) color subcarrier frequency of 3.58 MHz. See also phase alternation line.
See network terminating unit.
See network user address.
- That portion of a control program that always remains in central storage.
- That portion of the CICS region that holds the CSA, management modules, control tables, and resident application programs.
See network user identification.
NUI service facility
In X.25, a facility sent by the data terminal equipment (DTE) to the network in call setup packets that contain a network-assigned identifier, which can be used for billing, security, or network management purposes. The NUI service facility can also be used to select specific optional facilities to be associated with a virtual call.
See null character.
- In the C language, a single character that denotes the end of a string.
- In SQL, the value denoting the absence of data for a particular row and column.
- In the C and C++ languages, a pointer that does not point to a data object.
- A character that is used for media-fill or time-fill. Null characters may be inserted into, or removed from, a data stream without affecting the information content of that stream, but such action may affect the information layout and the control of equipment.
- A control character used to delimit a string of characters.
- A control character with the value of X'00' that represents the absence of a displayed or printed character. See also numeric space, required blank, space.
A type of credential that is usually associated with diskless workstations. Because there is no repository of information that is local to the workstation, it is not possible to obtain identifying information.
See modem eliminator.
The value that is obtained by converting the number 0 into a pointer; for example, (void *) 0. The C and C++ languages guarantee that this value will not match that of any legitimate pointer, so it is used by many functions that return pointers to indicate an error.
- A statement that consists of a semicolon.
- A statement that contains only the delimiter symbol, but no characters.
- A string containing no element.
- A character or bit string with a length of zero.
In C, the value that indicates the end of a string. For EBCDIC, ASCII, and Unicode UTF-8 strings, the null terminator is a single-byte value (X'00'). For Unicode UTF-16 and UCS-2 (wide) strings, the null terminator is a double-byte value (X'0000').
- In REXX, a character string consisting of one or more decimal digits optionally preceded by a plus or minus sign, and optionally including a single period that represents a decimal point. A number can also have a power of 10 suffix in conventional exponential notation: an E (uppercase or lowercase) followed optionally by a plus or minus sign then followed by one or more decimal digits defining the power of 10.
- A word or symbol that expresses either quantity (cardinal) or order (ordinal). Many cultures have different forms for cardinal and ordinal numbers. For example in French the cardinal number five is cinq, but the ordinal fifth is cinquième or 5eme or 5e. Numbers are written with symbols which are usually referred to as numerals. See also Arabic numeral, Chinese numeral, Hindi numeral, Roman numeral.
numeric character reference
See character entity reference.
- A constant that expresses an integer, a real number, or a complex number.
- The actual numeric value to be used in processing, instead of the name of a field containing the data. A numeric constant can contain any of the numeric digits 0 through 9, a sign (plus or minus), and a decimal point. See also character constant.
- A constant that specifies a number for a column value in a column map or relationship. See also numeric expression.
A numeric constant, a simple numeric variable, a scalar reference to a numeric array, a numeric-valued function reference, or a sequence of the above, separated by numeric operators and parentheses. See also numeric constant.
An area that is reserved for a particular unit of information and that can contain only the digits 0 through 9. See also character field.
numeric grid question
A question that ties together a group of related subquestions that share a category list and that require numeric responses. For example, a question that asks respondents to enter the amount that they spent on various products in the last four months. The subquestions are “Amount spent in May,” “Amount spent in April,” and so on, and the categories are the product names.
A set of keys grouped in a special position (usually the right hand side) of a keyboard, or as a separate attachment to the keyboard. The numeric key pad is used to enter numeric data (see ISO/IEC 9995-4).
A space equal in pitch to the width of the numeric characters in a string in which it is imbedded. It has an IBM GCGID of SP31. In ISO/IEC 10646 and Unicode, this is called figure space. See also null character, required space, space.
See nonuniform rational B-spline.
See national vulnerability database.
See non-VSAM volume record.
See nonvolatile random access memory.
See network virtual terminal.
See network interface.
See nonprogrammable workstation.
See network server description.