Sun Microsystems Sun Fire X4150 User Manual
Page 141
Glossary
125
redundant array of
independent disks
(RAID)
A way of storing the same data at different places, thus redundantly, on
multiple hard disks. RAID enables a set of disk drives to appear as a single
logical disk drive to an application such as a database or file system. Different
RAID levels provide different capacity, performance, high availability, and cost
characteristics.
Remote Management
and Control Protocol
(RMCP)
A networking protocol that enables an administrator to respond to an alert
remotely by powering the system on or off, or forcing a reboot.
remote procedure call
(RPC)
A method of network programming that enables a client system to call
functions on a remote server. The client starts a procedure at the server, and the
result is transmitted back to the client.
remote system
A system other than the one on which the user is working.
reset
A hardware-level operation that performs a system power-off, followed by a
system power-on.
root
In UNIX operating systems, the name of the superuser (root). The root user has
permissions to access any file and carry out other operations not permitted to
ordinary users. Roughly equivalent to the Administrator user name on
Windows Server operating systems.
root directory
The base directory from which all other directories stem, either directly or
indirectly.
router
A system that assigns a path over which to send network packets or other
Internet traffic. Although both hosts and gateways do routing, the term
“router” commonly refers to a device that connects two networks.
RSA algorithm
A cryptographic algorithm developed by RSA Data Security, Inc. It can be used
for both encryption and digital signatures.
S
schema
Definitions that describe what type of information can be stored as entries in
the directory. When information that does not match the schema is stored in
the directory, clients attempting to access the directory might be unable to
display the proper results.
Secure Shell (SSH)
A UNIX shell program and network protocol that enables secure and
encrypted login and execution of commands on a remote system over an
insecure network.