Sun Microsystems, Inc.
spacerspacer
spacer www.sun.com docs.sun.com |
spacer
black dot
 
 
Glossary   Previous   Contents   Next 
   
 
naming service switch

A configuration file (/etc/nsswitch.conf) that defines the sources from which an naming client can obtain its network information.

naming service

A network service that handles machine, user, printer, domain, router, an other network names and addresses.

namespace

(1) A namespace stores information that users, workstations, and applications must have to communicate across the network.

(2) The set of all names in a naming system.

network mask

A number used by software to separate the local subnet address from the rest of a given Internet protocol address.

network password

See Secure RPC password.

NIS

A distributed network information service containing key information about the systems and the users on the network. The NIS database is stored on the master server and all the replica or slave servers.

NIS maps

A file used by NIS that holds information of a particular type, for example, the password entries of all users on a network or the names of all host machines on a network. Programs that are part of the NIS service query these maps. See also NIS.

NIS+

A distributed network information service containing hierarchical information about the systems and the users on the network. The NIS+ database is stored on the master server and all the replica servers.

NIS-compatibility mode

A configuration of NIS+ that allows NIS clients to have access to the data stored in NIS+ tables. When in this mode, NIS+ servers can answer requests for information from both NIS and NIS+ clients.

parent domain

See domain.

preferred server list

A client_info table or a client_info file. Preferred server lists specify the preferred servers for a client or domain.

private key

The private component of a pair of mathematically generated numbers, which, when combined with a private key, generates the DES key. The DES key in turn is used to encode and decode information. The private key of the sender is only available to the owner of the key. Every user or machine has its own public and private key pair.

public key

The public component of a pair of mathematically generated numbers, which, when combined with a private key, generates the DES key. The DES key in turn is used to encode and decode information. The public key is available to all users and machines. Every user or machine has their own public and private key pair.

record

See entry.

remote procedure call (RPC)

An easy and popular paradigm for implementing the client-server model of distributed computing. A request is sent to a remote system to execute a designated procedure, using arguments supplied, and the result is returned to the caller.

reverse resolution

The process of converting workstation IP addresses to workstation names using the DNS software.

root domain

See domain.

RPC

See remote procedure call (RPC).

SASL

The simple authentication and security layer. A framework for negotiating authentication and security layer semantics in application-layer protocols.

Secure RPC password

Password required by Secure RPC protocol. This password is used to encrypt the private key. This password should always be identical to the user's login password.

server

(1) In NIS+, NIS, DNS, and LDAP a host machine providing naming services to a network.

(2) In the client-server model for file systems, the server is a machine with computing resources (and is sometimes called the compute server), and large memory capacity. Client machines can remotely access and make use of these resources. In the client-server model for window systems, the server is a process that provides windowing services to an application, or "client process." In this model, the client and the server can run on the same machine or on separate machines.

(3) A daemon that actually handles the providing of files.

server list

See preferred server list.

slave server

(1) A server system that maintains a copy of the NIS database. It has a disk and a complete copy of the operating environment.

(2) Slave servers are called replica servers in NIS+.

 
 
 
  Previous   Contents   Next