User guide

Glossary March 2005
Through Software Release 6.1
Issue 1 Page 425 of 425
Canopy System User Guide
telnet
Utility that allows a client computer to update a server. A firewall can
prevent the use of the telnet utility to breach the security of the
server. See http://www.faqs.org/rfcs/rfc818.html
,
http://www.faqs.org/rfcs/rfc854.html
and
http://www.faqs.org/rfcs/rfc855.html
.
Textual Conventions
MIB
Management Information Base file that defines Canopy system-
specific textual conventions. See also Management Information Base.
Time of Last
Transaction
A field in the data that the cmd show esn command generates from
data in the SQL database in the Bandwidth and Authentication
Manager (BAM) server. This field identifies the time of day of the most
recent authentication attempt by the SM. Expressed in the database
output as TLT.
TLT
Time of last transaction. A field in the data that the cmd show esn
command generates from data in the SQL database in the Bandwidth
and Authentication Manager (BAM) server. This field identifies the time
of day of the most recent authentication attempt by the SM.
TNAF
Total number of authentication requests failed. A field in the data that
the cmd show esn command generates from the SQL database in
the Bandwidth and Authentication Manager (BAM) server. This field
indicates how many times the SM (identified by ESN in the related
data) attempted to authenticate but was denied by BAM.
TNAR
Total number of authentication requests. A field in the data that the
cmd show esn command generates from the SQL database in the
Bandwidth and Authentication Manager (BAM) server. This field
indicates how many times the SM (identified by ESN in the related
data) attempted to authenticate, regardless of whether the attempt
succeeded.
Tokens
Theoretical amounts of data. See also Buckets.
TOS
8-bit field in that prioritizes data in a IP transmission. See
http://www.faqs.org/rfcs/rfc1349.html
.
TxUnderrun Field
This field displays how many transmission-underrun errors occurred
on the Ethernet controller.
UDP
User Datagram Protocol. A set of Network, Transport, and Session
Layer protocols that RFC 768 defines. These protocols include
checksum and address information but does not retransmit data or
process any errors. See http://www.faqs.org/rfcs/rfc768.html
.
udp
User-defined type of port.
U-NII
Unlicensed National Information Infrastructure radio frequency band,
in the 5.1-GHz through 5.8-GHz ranges.