Log:
Assessments - 0, GPA: 0 ( )

Instruções de Operação HP, Modelo HP NonStop G-Series

Fabricante : HP
Arquivo Tamanho: 331.84 kb
Arquivo Nome :
Língua de Ensino: en
Ir para baixar



por este dispositivo também tem outras instruções :

Facilidade de uso


Glossary
Tandem LAN Access Method (TLAM).
Tandem LAN Access Method (TLAM). The TLAM software provides an industry-standard
interface for accessing LANs from the Compaq system. Based on the IEEE 802.2
Logical Link Control standard, TLAM supports 802.2 Type 1 connectionless service as
well as the MULTILAN/NetBIOS protocol. With TLAM, you do not need to write
applications for a specific type of LAN.
TCP (Transmission Control Protocol). The Internet standard transport-level protocol that
provides the reliable, full-duplex stream service on which many application protocols
depend. TCP allows a process on one machine to send a stream of data to a process on
another. It is connection-oriented, in the sense that before transmitting data participants
must establish a connection. Software implementing TCP usually resides on the
operating system and uses the IP protocol to transmit information across the Internet. It
is possible to terminate (shut down) one direction of flow across a TCP connection,
leaving a one-way (simplex) connection. The Internet protocol suite is often referred to
as TCP/IP because TCP is one of the two most fundamental protocols.
TELNET. The Internet standard protocol for remote terminal connection service. TELNET
allows a user at one site to interact with remote timesharing systems at another site just
as if the user's terminal is connected directly to the remote machine. That is, the user
invokes a TELNET application program that connects to a remote machine, prompts for
a login id and password, then passes keystrokes from the user's terminal to the remote
machine and displays output from the remote machine on the user's terminal.
TFTP. See Trivial File Transfer Protocol (TFTP).
TLAM. See Tandem LAN Access Method (TLAM).
token. In DSM use, a distinguishable unit in a SPI message. Programs place tokens in an SPI
buffer using the SSPUT or SSINIT procedures and retrieve them from the buffer with
the SSGET procedure. A token has two parts: an identifying code, or token code, and a
token value. In command and response messages, a token normally represents a
parameter to a command, an item of information in a response, or control information
for the subsystem. In event messages, a token normally represents an item of
information about an event or about the event message itself. See also header token.
token number. In DSM programmatic interfaces, the number used by a subsystem to identify
each DSM token that it defines. The token type and the token number together form the
token code.
token ring. 1)þþThe token access procedure used on a network with a sequential or ring
topology. (2) A data link level protocol designed to transfer data over ring-oriented
LANs. The token ring technique is based on the use of a particular bit pattern called a
token that circulates around the ring when all stations are idle.
token type. In DSM programmatic interfaces, the part of a DSM token code that identifies
the data type and length of the token value. The token type and the token number
together form the token code.
token value. In DSM programmatic interfaces, the value assigned to a DSM token.
NBT Manual424773-001
Glossary -20


...

Este manual também é adequado para os modelos :
Computadores - HP NonStop L-Series (331.84 kb)

Escreva a sua própria avaliação do dispositivo



Mensagem
Seu nome :
Introduza os dois dígitos :
capcha





categorias