Grass Valley iControlEdge v.1.20 User Manual
Page 60

56
Glossary
A
iC Web
iControl Web is a Web-based device-monitoring module made up of two applications:
• iControl Web Creator (iC Creator) is a tool for creating sites to provide a user-friendly
interface for operators to control and monitor devices connected throughout the iControl
environment.
• iControl Web allows you to view and access sites available on the iControl Edge
Application Server.
iControl
Miranda’s iControl is a high-level Element Management System which operates with
sophisticated telemetry probes to provide advanced facility monitoring over IP. The system
leverages industry standard SNMP protocols, and can fully integrate third-party control
applications to create a complete facility monitoring environment. With automated
reactions to failures, and guided operator response, the system can deliver dramatically
reduced down times.
iControl Webmin
Webmin is a popular system configuration tool for Unix systems. iControl employs a
customized version of Webmin to facilitate Web-based administration of Application
Servers. iControl Webmin provides the administrative functionality required to control both
system and user options such as system maintenance and security.
RMI daemon
Remote Method Invocation daemon, a service that enables Java objects to communicate with
each other remotely. This service is necessary for iControl applications.
URI
A Uniform Resource Identifier is a string of characters used to identify a resource. In iControl
Edge, URIs are used to identify each and every element of a network—from hardware
devices, such as cards and frames, to logical resources, such as services, alarms, Web pages
and user interface elements.
Virtual Alarm
A virtual alarm is a special type of alarm that allows a logical combination of multiple
arbitrary alarms. A virtual alarm is made up of one or more sub-alarms. Technically a virtual
alarm is an alarm provider that provides a single alarm. Any alarms in iControl Edge—
including other virtual alarms—can be combined to form a new, higher-level alarm
(provided the new virtual alarm does not create a cyclical dependency).
Term
Definition