You are on page 1of 33

ORACLE 8

STUDY GUIDE

ORACLE 8:
NETWORK ADMINISTRATION
EXAM 1Z0-016
Edition 1

http://www.troytec.com
Congratulations!!

You have purchased a Troy Technologies USA Study Guide.


This study guide is a selection of questions and answers similar to the ones you will find on the
official ORACLE 8: NETWORK ADMINISTRATION 1Z0-016 exam. Study and memorize the
following concepts, questions and answers for approximately 10 to 12 hours and you will be pre-
pared to take the exams. We guarantee it!

Remember, average study time is 10 to 12 hours and then you are ready!!!
GOOD LUCK!
Guarantee

If you use this study guide correctly and still fail the exam, send your official score notice and
mailing address to:

Troy Technologies USA


8200 Pat Booker Rd. #368
San Antonio, TX 78233

We will gladly refund the cost of this study guide. However, you will not need this guarantee if
you follow the above instructions.

This material is protected by copyright law and international treaties. Unauthorized reproduc-
tion or distribution of this material, or any portion thereof, may result in severe civil and crimi-
nal penalties, and will be prosecuted to the maximum extent possible under law.

Copyright 2000 Troy Technologies USA. All Rights Reserved.


http://www.troytec.com

http://www.troytec.com
Table of Contents

Types of Networks .......................................................................................................................... 1


SIMPLE (2-TIER) NETWORK.................................................................................................. 1
SIMPLE/COMPLEX (N-TIER) NETWORK............................................................................. 1
COMPLEX NETWORK............................................................................................................. 1
Net8 Overview ................................................................................................................................ 1
ORACLE NAMES...................................................................................................................... 1
CONNECTION MANAGER...................................................................................................... 1
ADVANCED NETWORKING OPTION................................................................................... 1
SECURITY SERVER ................................................................................................................. 2
OPEN GATEWAY ..................................................................................................................... 2
NET8 STACK ............................................................................................................................. 2
Client Side Layer Stack................................................................................................................... 2
APPLICATION LAYER ............................................................................................................ 2
ORACLE CALL INTERFACE (OCI) LAYER.......................................................................... 2
TWO TASK COMMON (TTS) LAYER.................................................................................... 2
TRANSPARENT NETWORK SUBSTRATE (TNS) LAYER.................................................. 2
NETWORK TRANSPORT (NT) LAYER ................................................................................. 3
ORACLE PROTOCOL ADAPTER (OPA) LAYER ................................................................. 3
NETWORK SPECIFIC PROTOCOLS ...................................................................................... 3
Server Side Layer Stack .................................................................................................................. 3
ORACLE PROGRAM INTERFACE (OPI) LAYER................................................................. 3
TTS, TNS, OPA and PROTOCOL LAYERS............................................................................. 3
SERVER LAYER ....................................................................................................................... 3
Network Program Interface (NPI)................................................................................................... 3
SERVER-SIDE CONFIGURATION ......................................................................................... 3
The Listener Process: .............................................................................................................. 3
The Listener Responses........................................................................................................... 3
Bequeath Session................................................................................................................. 3
Redirect Session (Prespawned Dedicated Server Process) ................................................. 4
Redirect Session (Dispatcher Server Process) .................................................................... 4
The LISTENER.ORA File ...................................................................................................... 4
Listener Control Utility (LSNRCTL)...................................................................................... 4
CLIENT-SIDE CONFIGURATION........................................................................................... 5
Host Naming Method .............................................................................................................. 5
Local Naming Method ............................................................................................................ 5
Service Name .......................................................................................................................... 5
Test Service ............................................................................................................................. 5
Oracle Names Usage and Configuration......................................................................................... 5
RESOLVING SERVICE NAMES.............................................................................................. 5
Local Naming.......................................................................................................................... 5
Host Naming ........................................................................................................................... 5
Centralized Naming................................................................................................................. 5
NAMES SERVER ...................................................................................................................... 6
Client Side Cache .................................................................................................................... 6

http://www.troytec.com
NAMES CONTROL UTILITY (NAMESCTL) ......................................................................... 6
Oracle Intelligent Agent for Oracle Enterprise Manager ................................................................ 6
ORACLE INTELLIGENT AGENT (OEM)............................................................................... 6
THE INTELLIGENT AGENT.................................................................................................... 6
LISTENER CONTROL UTILITY ......................................................................................... 6
Multithreaded Server....................................................................................................................... 7
SINGLE-TASK ARCHITECTURE ........................................................................................... 7
TWO-TASK ARCHITECTURE................................................................................................. 7
MULTITHREADED SERVER (MTS) ...................................................................................... 7
MTS Connecting ..................................................................................................................... 7
Processing A Request In MTS ................................................................................................ 7
Configuring the MTS .............................................................................................................. 8
CONNECTION POOLING ........................................................................................................ 8
CONNECTION MANAGER...................................................................................................... 8
CONNECTION MANAGER WITH ORACLE NAMES SERVER.......................................... 9
Troubleshooting the Network Environment.................................................................................... 9
TRACE ASSISTANT ............................................................................................................... 10
Security in the Network Environment........................................................................................... 10
NETWORK SECURITY SOLUTIONS ................................................................................... 10
Data Encryption..................................................................................................................... 11
Cryptographic Checksumming.............................................................................................. 11
Authentication Mechanisms.................................................................................................. 11

http://www.troytec.com
Oracle 8: Network Administration Concepts

Types of Networks
There are 3 basic network types. Simple or 2-tier, Simple/Complex or N-tier, and Complex.

SIMPLE (2-TIER) NETWORK


In two-tier network, a client communicates directly with a server. This is also called cli-
ent/server architecture. The client and server communicate over the network by using a given
protocol and it must be installed on both the client and the server. This configuration works
best with only small networks.

SIMPLE/COMPLEX (N-TIER) NETWORK


In n-tier networks, one or more agents are introduced between the client and server. This
agent can provide:
Translation Services
Scalability Services
Intelligent Agent Services

This middle tier contains applications and services. The Server holds the actual data.

COMPLEX NETWORK
In a complex network you have different hardware platforms, multiple protocols, and differ-
ent geographical locations.

Net8 Overview
Oracle Net8 offers comprehensive platform support. This includes:
Protocol independence
Integrated GUI administration tools
Multiple configuration options
Tracing and diagnostic toolset
Basic security

ORACLE NAMES
Oracle Names is a tool of Net8 that stores the database addresses for entire environment.
This tool provides centralized configuration, simplified network administration, and client
profile information.

CONNECTION MANAGER
Connection Manager is a tool of Net8 which is normally installed and configured on middle
tier. It provides multiplexing of connections, cross protocol connectivity, and network access
control.

ADVANCED NETWORKING OPTION


To ensure secure transmission, advanced networking option must be installed on both client
and server. This offers network security options such as client side encryption, and encrypted

1 http://www.troytec.com
data plus checksumming. At the server data is decrypted along with checksumming if proper
key is installed on the server.

SECURITY SERVER
Security Server supports authorization and authentication using cryptographic checksumming
in an Oracle environment. Also provides for Single Sign-On so users who may need access to
multiple databases no longer are issued different username/password pairs for each server.

OPEN GATEWAY
The Oracle open gateway extends the capability of Oracle server tier to non-Oracle environ-
ment. It provides transparent and procedural gateways.

NET8 STACK
In an Oracle client-server transaction, information passes through the following six client side
layers:
Client Application
Oracle Call Interface (OCI)
Two Task Common (TTS)
Transparent Network Substrate (TNS)
Oracle Protocol Adapters (OPA)
Network Specific Protocols

Client Side Layer Stack


APPLICATION LAYER
It provides all user oriented activities such as character or graphical user interface (GUI) dis-
play, screen control, data presentation, application flow and other application specifies.

ORACLE CALL INTERFACE (OCI) LAYER


It defines server calls, parses SQL statements, opens cursors, binds variables, executes SQL,
fetches data and closes cursors. It also initiates a SQL dialogue between the client and server.

TWO TASK COMMON (TTS) LAYER


Converts i-e data types and character sets.

TRANSPARENT NETWORK SUBSTRATE (TNS) LAYER


This layer provides a generic interface to industry standard protocols. It consists of more
Net8 specific layers:
Network Interface (NI) Layer - It provides a generic interface to access Net8 func-
tions, resolves connect descriptors to connect strings and handles break and reset
requests.
Network Routing (NR) Layer - It routes information from client to destination.
Network Naming (NN) Layer - It resolves network aliases to destination address.
Network Authentication (NA) Layer - It negotiates authentication with destination.
Network Session (NS) Layer - It handles connect handshake and negotiation, buffer
management and handles connection pooling and multiplexing.

2 http://www.troytec.com
NETWORK TRANSPORT (NT) LAYER
It maps TNS generic calls to protocol-specific calls and includes NT layers that handle trans-
port.

ORACLE PROTOCOL ADAPTER (OPA) LAYER


It consists of three sub-layers, NT Main, NT(2) and NT OS.

NETWORK SPECIFIC PROTOCOLS


All Oracle software in the client-server connection process requires an existing network pro-
tocol stack to make the machine level connection between the two machines.

Server Side Layer Stack


ORACLE PROGRAM INTERFACE (OPI) LAYER
It responds to each OCI call made by the client side.

TTS, TNS, OPA and PROTOCOL LAYERS


All perform the same functions as on the client side.

SERVER LAYER
Its responsible for receiving OCI calls from the client and resolving SQL statements on be-
half of the client.

Network Program Interface (NPI)


NPI is a server specific version of OCI and it enables coordinating servers to construct SQL
requests for other servers.

SERVER-SIDE CONFIGURATION
The Listener Process:
It can listen for more than one database.
Performs load balancing
Listens on Multiple Protocols
Default name of the listener is LISTENER.

The Listener Responses


When a request is made by a client to the server, the listener will perform one of the follow-
ing:

Bequeath Session
When the listener spawns a dedicated server process and bequeaths (passes) the connection to
a dedicated server process, the session is called a bequeath session and the sequence of events
is as follows:
A client connects to the listener with the network address.
The listener receives the session request and determines if the request can be serv-
iced.

3 http://www.troytec.com
If possible the listener spawns a new dedicate server process to serve the incoming
session and bequeaths the session to that server process.
Once the session is established data flows directly between the client and dedicated
server process.

Redirect Session (Prespawned Dedicated Server Process)


The connection time from client to server is faster than the bequeath method. The following
occurs:
The listener spawns a series of dedicated server processes when it is started, so
when a client connects to the listener with a network address listener determines if
the request can be processed or not.
If the connection is possible listener issues a redirect message to the client con-
taining the network address of one of the prespawned servers.
The client disconnects from the listener and connects to the prespawned address
given by the listener.
Once the session is established, the server listener spawns another server to replace
the one used by the client.

Note: The maximum number of server processes are defined by the parameter PRE-
SPAWN_MAX in listener.ora file.
Redirect Session (Dispatcher Server Process)
This occurs when the Oracle server is configured as a multithreaded server. In the multi-
threaded server the listener will redirect the incoming request to the dispatcher.
When a database instance is started, dispatchers are started according to the con-
figuration parameters in the init.ora file.
The address of each dispatcher is then registered with the listener and the client
connects to the listener with the network address.
If the received request can be serviced the listener issues a redirect message to cli-
ent containing the network address of least used dispatcher for the multithreaded
server.
The client disconnects from the listener and connects to the dispatcher address
given by the listener and the dispatcher updates the listener with new load value.

The LISTENER.ORA File


When a listener is started using the Listener Control Utility (LSNRCTL), it creates a lis-
tener.ora file with following default settings:
listener name LISTENER
Port 1521
Protocols TCP/IP and IPC
SID name Default database
Hostname Default hostname

Listener Control Utility (LSNRCTL)


A tool used to control the listener. Commands from the listener Control utility can be issued
from the command line or from the LSNRCTL prompt.

4 http://www.troytec.com
LSNRCTL COMMANDS:
Command Description
DBSNMP_START Starts the SNMP Intelligent Agent for an Oracle data-
base running on the same node.
DBSNMP_STOP Stops SNMP agent for an Oracle database.
RELOAD Shuts down everything except listener addresses and
re-reads listener.ora. It enables you to add or change
services without actually stopping the listener.
SAVE_CONFIG Creates a backup of listener configuration file lis-
tener.bak and updates listener.ora to reflect any
changes.
SERVICES Provides a detailed information about the services the
listener listens for.

CLIENT-SIDE CONFIGURATION
Host Naming Method
In using the host naming method you must have installed TCP/IP, Net8 and TCP/IP protocol
adapter. The host-naming method requires minimal user configuration and requires the file
sqlnet.ora.

Local Naming Method


Requires the configuration of a file named tnsnames.ora through Net8 Assistant.

Service Name
A service name is a short, convenient name that is mapped to a network address contained in
the network descriptor which is stored in the tnsnames.ora file. Users only need to know the
appropriate service name and not the full connect descriptor.

Test Service
It is used to test the simple network when its configured using the Net8 Assistant.

Oracle Names Usage and Configuration


RESOLVING SERVICE NAMES
Connection strings are resolved using one of the methods below.

Local Naming
Uses tnsnames.ora to lookup service names.

Host Naming
The actual name of the machine on which the database resides is used to establish a connec-
tion to the service.

Centralized Naming
This method uses Oracle names, which is a names service that maintains central storage of
network service addresses. The Names server has the benefit of simplified administration
tasks, increased efficiency, eliminates redundancy and facilitates location transparency.

5 http://www.troytec.com
Note: Names server resolves the client request to connect to a service by translating the
service name to a network address.

To use centralized naming, the Names server and the client attempting to use the Names
server must be configured. The Names server can be configured using the Net8 Assistant or
by manually editing the names.ora file. The names client profile can be configured using the
Net8 Assistant or by manually editing the sqlnet.ora file.

NAMES SERVER
Names.ora is the configuration file for Names server and sqlnet.ora is that for client. The
Names server resides in the root region. A Names server can be controlled by using Net8 As-
sistant, control panel and names control utility. It can be configured either manually by edit-
ing names.ora or by using Net8 Assistant.

Client Side Cache


It saves the time a client would normally take to re-query the Names server. A region data-
base is database repository of service names stored by the Names server.

NAMES CONTROL UTILITY (NAMESCTL)


To test if the Names server is up and running, the PING command is used.
To view the location of names.ora file, trace file, etc. issue the
NAMESCTL>STATUS command.

Oracle Intelligent Agent for Oracle Enterprise Manager


ORACLE INTELLIGENT AGENT (OEM)
OEM is a graphical application that combines a number of services to provide a comprehen-
sive system management platform.

THE INTELLIGENT AGENT


An Intelligent Agent is a smart process running on a remote node (server) in the network.
OEM on a client node communicates with Intelligent Agents to run jobs and monitor events
on remote sites. The Intelligent Agent is responsible for accepting jobs and events, canceling
jobs or events, running jobs, collecting results and queuing jobs, checking events and queuing
the resulting event reports, returning jobs and event reports, handling SNMP requests and
discovering services on nodes where agents reside.

LISTENER CONTROL UTILITY


Listener Control Utility is the tool used to start, stop and view the status of the Intelligent
Agent.
A few commands are:
LSNRCTL> dbsnmp_start Used to start the Intelligent Agent.
LSNRCTL> dbsnmp_stop Used to stop the Intelligent Agent.
LSNRCTL> dbsnmp_status Used to view the status of Intelligent Agent.

NOTE: The Intelligent Agent creates three configuration files. The main configuration file is
snmp_ro.ora while the other two are snmp_rw.ora (second configuration file) and serv-

6 http://www.troytec.com
ices.ora. The services.ora file contains the services discovered by the listener. A user
must be created for the agents to manage jobs and events.

Repository - A set of tables in your schema that can be placed in any Oracle database in
your system. A repository is created by a Repository Manager when Enterprise Manager
attempts to connect for the first time to a server running an Intelligent Agent.

Multithreaded Server
SINGLE-TASK ARCHITECTURE
The user and the server processes are combined in a single user process. When one process
executes both the application code and Oracle code, this configuration is called single-task
Oracle.

TWO-TASK ARCHITECTURE
A dedicated server process handles requests for a single user process. If the user and server
processes are separate, the term two-task is used. In two-task Oracle the servers can be shared
or dedicated and the database application code and Oracle code are executed by different pro-
cesses. In Dedicate Server Processes (Shadow Server Process) the user and server processes
are separate, each user has its own server process, the user and server processes can run on
different machines, there is one-to-one ratio between user and server processes and even
when user process is not making a database request the dedicated server exists but remains
idle.

MULTITHREADED SERVER (MTS)


A multithreaded server process enables many user processes to share a number of server pro-
cesses. MTS improves the server efficiency by allowing any server to process an incoming
request, rather than waiting for a specific user to issue a request.
MTS reduces the number of processes against instance, increases the number of possible us-
ers per node, offers automatic load balancing, reduces the number of idle server processes
and reduces memory usage, system overhead and can be set to support connection pooling..

MTS Connecting
The listener waits for any connection requests from a user process, if the user process can
connect to a dispatcher the listener gives the user process address of a dispatcher process.
Once the connection has been established, either through a dispatcher or a dedicated server
process the connection will be maintained for the duration of session.

Processing A Request In MTS


A user sends a request to its dispatcher, the dispatcher places the request into request queue in
SGA, a shared server picks up the request from the request queue and processes the request,
the shared server places the response on the calling dispatchers response queue, the response
is handed off to dispatcher, and the dispatcher returns the response to the user.

Request Queue - One request queue is shared by all dispatchers, shared servers monitor the
request queue for new requests and the requests are processed on a first-in, first-out basis.

7 http://www.troytec.com
Response Queue - Shared servers place all completed requests on the calling dispatchers re-
sponse queue, each dispatcher has its own response queue in the SGA, each dispatcher is re-
sponsible for sending completed requests back to appropriate user process and users are con-
nected to the same dispatcher for the duration of a session.
Configuring the MTS

LOCAL_LISTENER - Specifies the service name defined in tnsnames.ora. It specifies the


service names for listeners with which dispatchers register their services.

MTS_SERVICE - Establishes the name of the service for which the dispatchers of MTS in-
stance associate. Using this name in the CONNECT string allows users to connect to an in-
stance through a dispatcher.

MTS_DISPATCHERS - Specifies the number of dispatchers initially started for a given


protocol.

MTS_MAX_DISPATCHER - Specifies the maximum number of dispatchers that can be


started and needs alter system command to add more dispatchers than initially started.

MTS_SERVERS - It specifies the number of shared servers initially started. If you want
Oracle to use shared servers, you must set MTS_SERVERS to at least 1 and if you omit the
parameter or set it to 0, Oracle does not start any shared server at all.

MTS_MAX_SERVERS - It specifies the maximum number of shared servers that can be


started and will allocate shared servers dynamically if need more than initially started.

CONNECTION POOLING
It is a resource utilization feature that allows you to maximize the number of physical net-
work connections to MTS.
One or more connections are established to a dispatcher in a MTS environment.
When the maximum connections are reached for available dispatchers for a given
protocol and connection pooling is configured the next session trying to establish a
connection will wait for an existing idle connection to be temporarily disconnected
by the dispatcher and then the connection is established.
The connection that was idle becomes temporarily disconnected.
To enable connection pooling the init.ora parameter MTS_DISPATCHERS must
be configured.

CONNECTION MANAGER
It is a multipurpose networking solution to enable greater resource utilization for increased
scalability, multiprotocol connectivity and secure network access control.

NOTE: Connection Manager is installed on a middle tier in a multi-tiered environment.


It greatly reduces the resource consumption on end tier and enables highly scalable con-
figurations. When a connection is established through Connection Manager the database
SID to which connection needs to be established is given by SOURCE_ROUTE. In addi-

8 http://www.troytec.com
tion listener address specified for Connection Manager and destination listener address
needs to be listed. To use connection concentration you are required to configure the
MTS on destination database.

CMAN Contains the listening address for Connection Manager.


CMAN_PROFILE Contains CMAN configuration parameters.
CMAN_RULES Contains the rules for filtering incoming connection re-
quests. To configure network access control this com-
mand in cman.ora needs to be configured. SRV is the
SID name of targeted database.
CMCTL START It is a control command for Connection Manager and
starts the Connection Manager or one of its compo-
nents. In addition you can specify additional arguments
for CMCTL utility and can also be configured in
CMAN.ORA

CONNECTION MANAGER WITH ORACLE NAMES SERVER


Oracle Names server automatically updates Connection Manager listening ad-
dresses.
In the client sqlnet.ora file different parameters can be set.

Troubleshooting the Network Environment


Tracing and Logging can be enabled to help troubleshoot the environment. The
output from tracing and logging are stored in ASCII files.
To enable tracing on the client side we can use either Oracle Net8 Assistant in
which a profile is stored and implemented through sqlnet.ora or to edit the profile
itself. However, trace facility uses a large amount of disk space and may have sig-
nificant effect upon system performance. This feature is disabled by default. In ad-
dition to client side tracing you can also enable tracing for the listener, Names
server, Connection Manager and OEM daemon.
The level of tracing can be specified by following commands.
OFF (tracing disabled), USER (trace information applicable for users), ADMIN
(trace information applicable for database administrators) and SUPPORT (trace in-
formation applicable for customer support staff)
Logging refers to the process by which network components note and append error-
specific information to a log file. Logging can be configured using Net8 Assistant.
Sqlnet.ora contains the information you put in profile.
An error stack refers to information that is produced by each layer in an Oracle
communication stack as a result of network error and a log file provides this infor-
mation.

NOTE:
To use a log file to diagnose a network error starting from the bottom of the file, locate
the first non-zero entry in error support. This is usually the actual cause.

9 http://www.troytec.com
If that error does not provide the desired information, review next error in the stack until
you locate the correct error information.
If the cause of error is still not clear, turn on tracing and re-execute the statement that
produced the error message.

TRACE ASSISTANT
It helps to diagnose and troubleshoot network problems by a better understanding of flow of
packets between network nodes, which component of Net8 is failing and related set of error
codes. Net8 performs its functions by sending and receiving data packets and by specifying
the trace level to SUPPORT you can view the actual contents of Net8 packets in your trace
file. Trace assistant is also able to provide useful statistics and data about performance of an
Oracle application across the network and this information is valuable in identifying potential
performance bottlenecks.

NOTE: To find error codes related to your problem first check the log files, if they do not
give the needed information run through checklist and if the checklist does not provide the
solution, enable tracing and logging and if everything is still unclearcall support.

Security in the Network Environment


A sound network must have solid security capabilities to protect against the network intru-
sions that comprise the following.

Data Privacy - Ensuring that data is not disclosed or stolen during transmission.

Data Integrity - Ensuring that data is not modified or disrupted during transmission.

Authentication - Confidence that users, hosts and client identities are correctly
known.

Authorization - Permitting a user, a program, or a process to access an object or set of


objects.

NETWORK SECURITY SOLUTIONS


To counter network security risks, the Advanced Networking Option (ANO) can be imple-
mented and it enables following network security solutions:
Data Encryption
Cryptographic Checksumming
Authentication Mechanisms

ANO ensures data integrity through cryptographic checksums using MD5 algorithm. ANO
also ensures data privacy through encryption. ANO is an optional product that does not ship
with Net8; the only security that Net8 provides by default is user name and password encryp-
tion.

10 http://www.troytec.com
Data Encryption
Encryption is a technique that scrambles data using a key. Without the key the data can not be
unscrambled. Special hardware is used to encrypt data. The two algorithms used for encryp-
tion are Data Encryption Standard (DES) and RSARC4. The longer the length of the key the
stronger is the encryption, the stronger the encryption the longer it takes to break the code.

Cryptographic Checksumming
Labels each packet before it transmits and when the packet arrives, the server checks to see if
the packet is in order.

Authentication Mechanisms
The mechanisms of authentication are network authentication services, token cards and
biometric authentication adapter. To configure authentication the parameter is configured in
sqlnet.ora.

11 http://www.troytec.com
Network Administration
Practice Questions
1. You need to stop Oracle Intelligent Agent. What command should you issue using
LSNRCTL ability?

A: dbsnmp_stop
2. What is the main configuration file that is regenerating each time Oracle Intelligent
Agent is started?

A: snmp_ro.ora
3. You are using Net8 and OEM to run Intelligent Agent. What is one of the many tasks
the Intelligent Agent is responsible for?

A: Accepting agent or events


4. Which configuration file is eliminated by using the host naming method to establish a
connection request?

A: tnsnames.ora
5. What is available in Oracle Name Service wizard to determine the outcome of the set-
tings chosen, when configuring a simple network using Local Naming?

A: Test Service dialogue


6. What can you select in Net8 Assistant to create short meaningful names for databases
that you want users to connect to?

A: Service names
7. You are configuring local naming for the client and want to view the addresses that
you set up. In what file is this information stored?

A: tnsnames.ora
8. You configure local naming using Net8 Assistant and now you want to alter the de-
fault board number from 1521 to 1575. What client site file would you have to edit?

A: tnsnames.ora
9. You are setting up a client site machine to use the host naming method for a server
connection. Which two Oracle products must be installed on the client? (Choose two)

A: Net8 & TCP/IP Protocol Adapters


10. If you dont make any changes to the methods section of naming in Net8 Assistant, which
two default methods are provided?

A: Host names & tnsnames


11. You are preparing to setup local naming using Net8 Assistant. What must be estab-
lished at the client and server level prior to this setup process?

12 http://www.troytec.com
A: Database aliases
12. You created a new service using Net8 Assistant. What should you do now to make
sure that the service name was properly configured?

A: Choose Test Service in the Oracle Service Name wizard.


13. The product database has been renamed to TEST. What client file reflects this
change found connecting request to be accepted for the test database?

A: tnsnames.ora
14. Your network is configured as a simple two-tier network. What is the base configura-
tion of the network of this type?

A: A client server using the same protocol configured on both client and server
15. Which Oracle solution can you use with Net8 to encrypt Intranet data, so it can not
be altered or read during transmission?

A: Advance Networking Option


16. Your enterprise 440 database is used for online transaction processing. Users fre-
quently access the multiple databases during normal processing. Which Oracle solu-
tion can you implement to provide single sign on access to all the databases using
authentication?

A: Security Server
17. You are managing a complex multiprotocol networking environment. Which Oracle
networking solution can you use to provide multiplexing of connection?

A: Connection Manager
18. Why should security be a consideration when planning the implementation of net-
work environment for your enterprise?

A: Users may need to transmit secure data over the network.


19. Client A logs into the server and later logs out. Which information can be obtained from cli-
ent side cache when subsequent connect request is made to same server by client A?

A: Address information
20. You are creating the first Names server for your Net8 network. In which region will
this Names server reside?

A: Root region
21. Which is an example of data encryption?

A: Data is scrambled and cannot be unscrambled by thieves without a key.


22. In addition to assigning the hostname and port number to the Region Database, which other
storage information must be provided for the configuration?

13 http://www.troytec.com
A: SID of the database that will store the region information.
23. The Names server is unavailable and a user still needs to access database services on the
network. What can be accessed to obtain the current list of recently accessed services?

A: Client Side Cache


24. Your Net8 environment includes many Names servers and you want to store this information
in a repository. What can you create?

A: Region Database
25. When you create a Names server using Net8 Assistant, which file is automatically
created and stores the default parameters?

A: names.ora
26. For a client to connect to the server, which file must be configured to handle incom-
ing request on server site?

A: listener.ora
27. Which Net8 arch layer contains all the necessary code to initiate the SQL dialogue between
client and server?

A: OCI
28. Which TNS layer is used to resolve aliases to Net8 database address?

A: Network Naming
29. Which Net8 architecture layer provides display screen control and data presentation
to the client?

A: Application
30. When a client requests a connection to the server, a connect decryptor is needed to
resolve the service name provided. Which three methods can be used to resolve this?

A: Host naming (sqlnet.ora)


Local naming (tnsnames.ora)
Centralized naming (Oracle Names)
31. Why should you consider using Connection Manager for your network that accesses
high level secure databases?

A: Availability to restrict database access.


32. If you configure the network access control and do not create any rule in the
cman_rule section of c_man.ora file. What occurs by default?

A: All incoming requests are accepted.


33. What will cause a connect request to fail using the sqlnet.ora in a multiple protocol
interchange environment?

14 http://www.troytec.com
A: The setup for TCP protocol does not contain the service parameter.
34. If you configure connection concentrations in Connection Manager, which section of
configuration file contains the reasoning address for Connection Manager?

A: cman
35. Which layer handles break and connection requests?

A: NI Layer
36. You created a new listener named LSNROI and want to assign it a unique log file
name. What parameters are set for setting a default file?

A: LOG_FILE_LSNROI
37. You want to modify some of the services for listeners processes without having to
stop the listener. Which LSNRCTL command can you issue?

A: Reload
38. Which LSNRCTL command can you issue to create a backup for the listener.ora file?

A: Save_config
39. Your present networking environment is set up to run TCP/IP. You have hundreds of concur-
rent users accessing a single server. Which Oracle networking solution can you use to man-
age this environment using the multiplexing technique?

A: Connection Manager
40. You log into the Listener Control Utility for the first time and issue this command:

LSNRCTL > START,


What is the name of the listener that will be started?
A: LISTENER
41. You created the new listener using the Net8 Assistant. Now you need to access the prod da-
tabase. Using database service which additional service is required?

A: Global database name, Oracle home directory and SID


42. You need to determine the databases that are listener process is listening for which
LSNRCTL command can you issue to obtain this information?

A: Services
43. Which command can you issue for LSNRCTL to stop the default listener process
named Listener?

A: Stop
44. You configure the listener.ora to use multiple listener. What will you have to do if a
new database is added to the listener?

15 http://www.troytec.com
A: Add the service to the listener.ora for each listener entry
45. You configure multiple listener to handle incoming connection requests. How are
these requests processed?

A: Randomly chosen by the client


46. A user process has obtained a share server connection and is idle for some time. Us-
ing MTS what will happen to connection of this idle process?

A: Patcher will drop the connection when new request is received.


47. You are setting up client machines to use the host naming method. What are three methods of
resolving the hostname? (Choose three).

A: DNS, NIS and TCP/IP host file


48. You are configuring MTS for the product database for the product database and set
the parameter in init.ora:

MTS-dispatcher- (protocol=tcp)
(dispatchers=3)
MTS_MAC_SERVER=6
MTS_SERVERS=0
How many shared servers will be activated at instance startup?
A: 0
49. After implementing a small two-tier client/server network, what is a common problem com-
panies encounter?

A: Upward scalability
50. You are configuring MTS for an online transaction process. Database and user proc-
essing is very heavy. Which init.ora parameter is used to specify the number of
shared server processes to activate at instep starting?

A: MTX_SERVERS
51. When using connection pooling, what happens to an idle session when a new incom-
ing request is received?

A: Idle session is temporarily disconnected


52. Which init.ora parameters would you alter to establish the name of the instance as-
signed to dispatcher?

A: MTS_SERVICE
53. You are setting-up MTS and want to take advantage of connection pooling. Which
init.ora parameter should be used to enable connection pooling?

A: MTS_DISPATCHERS
54. You are analyzing the log file for the cause of TNS errors. Which file contains this in-
formation?

16 http://www.troytec.com
A: sqlnet.log
55. In which file is the configuration information for the client profile login stored?

A: sqlnet.ora
56. What is a benefit of using Connection Manager for a network that will have an increased
number of concurrent users?

A: Scalability
57. Which information is passed from the server or program to establish a server connection?

A: Username/password and service name


58. You are configuring connection concentration for Connection Manager. Which two listener
addresses must be listed in tnsnames.ora (Choose two)

A: Connection Manager process listener address and Destination listener address


59. You are using Advanced Networking option to enable cryptographic checksumming.
How is data secured using this method?

A: Data is transmitted using the series of packets that must be in sequential order to be ac-
cepted.
60. You are tightening security in your network environment and must ensure that users
are correctly logging into the system. Which security issue should you address?

A: Authentication
61. If you have profile logging set to SUPPORT and are still unable to determine the cause of a
network error, what should you do?

A: Turn on tracing in unique file mode and re-execute the statement that produced the error
message.
62. Which layer handles buffer management?

A: NS Layer
63. You want to know how many connect requests have been issued to the nserver1.acme.com
Names server. Which command can you issue using the NAMESCTL utility?

A: Status
64. If you choose to secure your networked data using cryptographic checksumming available
with the Advanced Networking option. How is the data handled?

A: An algorithm is created on the contents of each packet of data transmitted across the
network.
65. The PROD database has been renamed to TEST. Which client file must reflect this change
for connection requests to be accepted for the TEST database?

17 http://www.troytec.com
A: tnsnames.ora
66. Which TNS layer is used to resolved aliases to a Net8 destination address?

A: NN Layer
67. The dispatcher placed a user process request in the request queue. The second request was
made to the dispatcher from another user process. The first process was then completed by
the shared server and returned to the calling dispatchers response queue. How will the com-
pleted request be returned to the user process?

A: The dispatcher handling the request will return the completed request back to the user
process.
68. You are configuring MTS and set the LOCAL_LISTENER parameter in the init.ora to
LSNR1. Which additional file must also reside on the node where the LSNR1 listener is run-
ning?

A: tnsnames.ora
69. You are using cryptographic checksumming in the Advanced Networking option? What does
this security solution provide?

A: Labels each packet before transmission and then has the server check to see if the packet
is in order once it has arrived.
70. You are configuring the Advanced Networking option want data to be scrambled when sent
from the client. Which configuration should you use?

A: Data encryption on the client and on the server


71. You have received information that data was possibly modified during a network transmis-
sion. Which part of your security should you address to prevent this from happening again?

A: Data Integrity
72. You are planning a centralized naming configuration for your network environment using
Net8 Assistant. Which two will you have to configure? (Choose two)

A: Oracle Names server and Client


73. You installed Oracle Names server for your Net8 environment. Which daemon process is
also created during this install to store information from the server on the client?

A: Client Side Cache


74. You configured centralized naming using Net8 Assistant. This configuration automatically
created the names.ora file on the server. Which client-side file will reflect this resolution
method when configured?

A: sqlnet.ora
75. Which command should be issued from the Names Control Utility to start the client cache
daemon process?

18 http://www.troytec.com
A: START_CLIENT_CACHE
76. What is a benefit of Client Side Caching with Oracle Names server?

A: Saves the time it would take to re-query the Names server.


77. Your enterprise network is made up of a multi-platform environment using different proto-
cols. Which Oracle networking solution could you implement with this existing infrastruc-
ture?

A: Net8
78. You are managing a complex network environment for a multinational company supporting
over 50 databases in 5 countries. Which Oracle networking solution can you use to simplify
addressing for these databases?

A: Oracle Names
79. Your present networking environment is set up to run TCP/IP. In addition, You have hun-
dreds of concurrent users accessing a single server. Which Oracle networking solution can
you use to manage this environment using the multiplexing technique?

A: Connection Manager
80. Many enterprises are implementing the n-tier network for their environment. What is tone
benefit of implementing a network of this type?

A: Middle tier can contain applications and services.


81. Data base services for your system have grown considerably and you want to create a region
database to manage them .All information has been stored in the tnsnames.ora file? Which
command can u use to read the tnsnames.ora and place it in the region?

A: LOAD.

82. If you configure connection concentration in Connection Manager, which section of the con-
figuration for contains the information necessary to filter incoming connection requests?

A: cman_rules
83. You are configuring your environment for Multiple Protocol Interchange, in which the cli-
ents use TCP/IP and CMAN to connect to the server using SPX/IPX. Which parameter
should be included in the tnsnames.ora to allow this connection?

A: SOURCE_ROUTE
84. You are responsible for a large network and need to increase performance. What is a benefit
of using Connection Manager in this environment?

A: It will greatly reduce resource consumption on the end-tier.


85. Which Net8 architecture layer provides character set and data type conversion between dif-
ferent character sets on the client and the server?

19 http://www.troytec.com
A: Two Task Common
86. You have enabled multiplexing and connection pooling using Connection Manager. Which
TNS layer handles these functions?

A: Network session (NS)


87. Which configuration file contains the database services discovered by the listener when the
Oracle Intelligent Agent is started?

A: services.ora
88. What is the second configuration file containing listener information used by the Oracle In-
telligent Agent?

A: snmp_rw.ora
89. Why should you consider setting up an Intelligent Agent for use with OEM in your Net8 en-
vironment?

A: Manage jobs and events in your network environment


90. Which two files a re used to configure local naming on the client? (Choose two)

A: sqlnet.ora and tnsnames.ora


91. You are creating services name using Net8 Assistant. What information will you have to
provide to create these names?

A: Database SID
92. Which client configuration file must be updated, either manually or using Net8 Assistant, if
you change the connect method from TNSNAMES to ONAMES?

A: sqlnet.ora
93. You want to establish the order in which Net8 will resolve your connection requests. What
should you select in Net8 Assistant to set this preference?

A: Profile
94. What will happen if you set up your service name as TS1 for the TEST1 database and then
decide to change the name using Net8 Assistant?

A: The name will be changed successfully because the service name is only a logical user
defined name.
95. You are configuring local naming using Net8 Assistant and want the tnsnames.ora file read
for resolution before that host file is read. Which file can you manually edit to change the or-
dering of the method of resolution?

A: sqlnet.ora
96. You have set up local naming for the PROD database. However, users also need to connec-
tion to an additional database named MAIL. Which step should you take to have this data-
base also use local naming?

20 http://www.troytec.com
A: Create a new entry for the MAIL database using Net8 Assistant.
97. You created a new listener using Net8 Assistant. This listener should listen for requests for
PROD database. What is the result of incorrectly defining the SID, which is recorded in the
SID_NAME parameter of the listener.ora?

A: Clients will not be able to connect to the PROD database


98. The server currently uses only one listener and is overburdened by client connection requests.
What can you do to relieve this burden?

A: Decrease the load of the listener process by adding additional listeners for the same
service name.
99. In order for a client to randomly choose from more than one listener for services to a single
database, which information must be included in the listener.ora file?

A: A different listener address for each service name.


100. You log into the Listener Control Utility to stop the LSN01 listener process using this
command:

LSNRCTL>STOP LSN01
For which reason might this command fail to stop the listener?
A: The LSN01 process was processing a request when you issued the command.
101. Which LSNRCTL command would you issue to view detailed information for a listener?

A: SHOW <services>
102. You log into the Listener Control Utility and issue this command:

LSNRCTL>START
Which task has been accomplished?
A: The default listener is started.
103. You execute Net8 Assistant to create a new listener for the PROD database. After defin-
ing the name of the listener as LSNprod1, the port address as 1521, and the protocol as
TCP/IP. You save and exit. What is the status of the listener you just created?

A: The listener has been created but the database services setup needs to be completed.
104. You are troubleshooting your Net8 network and Need to enable tracing. To which value
should you set TRACE_LEVEL_CLIENT to obtain the most data?

A: SUPPORT
105. You view the log file to see if you can determine the cause of a network error. How
should you view the information in this file to locate the error?

A: Start at the bottom and locate the first not-zero error-code in the log file. This is usually
the actual cause.

21 http://www.troytec.com
106. You are trying to identify the performance bottlenecks across the network occurring in an
Oracle application. How should you enable tracing to obtain the actual contents of the Net8
packets for use in identifying problems?

A: ADMIN
107. Once a dispatcher picks up a request, it is placed into the request queue located in the
SGA. Which process then picks up this request from the queue and processes it?

A: Shared server process


108. You are configuring MTS for a new database that has only been used in test mode. Since
you do not have any real-time monitoring data for establishing the number of shared server
processes what should you initially choose to set up?

A: Few initial shared server processes so the system will not incur unnecessary overhead.
109. Which value should you set for MTS_SERVICE to make sure the user can connect to the
database even if a dispatcher is not available?

A: mts_service=<instance name>
110. You have set up your database to use MTS. When a user connects, which process deter-
mines the type of connection request?

A: listener process
111. You set up MTS for the PROD database, which uses multiple listeners to handle requests.
Which LSNRCTL command can you issue for each listener to verify that the dispatchers
have registered with all listeners used by the database?

A: SERVICES <listener name>


112. You configured MTS for a database and since that time, user processing has become very
light. Which init.ora parameter would you use to reduce the number of shared server proc-
esses activated at instance startup?

A: MTS_SERVERS
113. Examine this TNSNAMES.ORG

TSTS=
(Description=
(Address=
(Protocol=TCP/IP
(HOST=WWED141-SUN)
(PORT=1610)
)
(Address=
(Protocol=SPX)
(SERVICE=ORASVC1)
)
(Source-Route=Yes)

22 http://www.troytec.com
What will cause a connect request to fail, using this transnames.org in a multiple protocol
interchange environment?
A: The connect-data string is missing.
114. Examine the listener.ora file for the default LISTENER:

LISTENER=
(address-list=
(Address=(Protocol=TCP)(Host=WWED103-SUN)(Port=1521)))
SID-List-Listener=
(SID-List=
(SID-disc=
(Global-DBNAME=WWED103-SUN.US.Oracle.com)
(ORACLE-HOME=/home/oracle)
(SiD-NAME=ORCL803)
)

You modify the listener.ora using Net8 Assistant to also accept connections for TST2 data-
base on the same machine. What would the new listener.ora file contain?
A: (SID_NAME=ORCL803
)
(SID_DESC=
(GLOBAL_DBNAME=WWED102_SUN.US.ORAC
LE.COM)
(ORACLE_HOME)=/NAME/ORACLE)
(SID_NAME=TST2)
)
)
115. You are configuring your environment for Multiple Protocol Interchange, which the cli-
ent using TCP/IP and CMAN connecting to the server using SPX/IPX. Which parameter
should be included in the tnsnames.ora to allow this connection?

A: SOURCE_ROUTE
116. You setup MTS to use three dispatches for TCP/IP/IP protocol and for SPX protocol.
You queried the V$DISPATCHER views and determined that the load for TCP/IP dispatches
is consistently high. Which command can you use to assign a total of six dispatchers for
TCP/IP protocol?

A: ALTER SYSTEM SET


117: Your Net8 environment includes many Names servers and you want to store this infor-
mation in a repository. What can you create?
A: Region Database

23 http://www.troytec.com
24 http://www.troytec.com
INDEX

25 http://www.troytec.com
Address information................................................ 15 error stack.............................................................. 11
ADMIN.................................................................... 26 Global database name ............................................ 17
Advanced Networking option ................. 2, 11, 20, 21 GUI ........................................................................... 2
aliases ..................................................................... 14 GUI administration tools........................................ 1
ANO........................................................................ 12 Host names.............................................................. 14
Application.............................................................. 16 Host Naming ............................................................. 6
APPLICATION LAYER .......................................... 2 Host Naming Method.......................................... 6, 18
Authentication................................................... 11, 20 Hostname ........................................................... 5, 15
Authentication Mechanisms................................. 12 Idle session.............................................................. 19
Authorization .......................................................... 11 init.ora.............................................. 5, 18, 19, 21, 26
Basic security........................................................... 1 Intelligent Agent ........................................... 7, 13, 23
Bequeath Session ..................................................... 4 Intelligent Agent Services....................................... 1
biometric authentication adapter ............................. 12 listener.......................................................... 4, 17, 25
bottlenecks ............................................................. 26 Listener Control Utility............................. 5, 7, 17, 25
buffer management ............................................... 20 Listener Process .................................................. 4, 26
c_man.ora .............................................................. 16 Listener Responses.................................................... 4
Centralized Naming .................................................. 6 listener.ora........................................... 4, 5, 16, 18, 27
character set .......................................................... 23 Local Naming...................................................... 6, 13
checklist .................................................................. 11 Local Naming Method .............................................. 6
Client....................................................................... 21 LOCAL_LISTENER ........................................ 9, 21
Client Application ................................................... 2 log file ............................................................... 19, 25
client profile login ................................................. 19 LOG_FILE_LSNROI............................................... 17
Client Side Cache.......................................... 7, 15, 21 Logging .................................................................. 10
Client Side Caching............................................... 22 LSN01...................................................................... 25
client side encryption ................................................ 2 LSNR1.................................................................... 21
Client Side Layer Stack............................................. 2 LSNRCTL................................... 5, 13, 17, 18, 25, 26
CLIENT-SIDE CONFIGURATION ........................ 6 Commands............................................................ 5
CMAN .................................................................... 10 LSNROI ................................................................. 17
cman.ora............................................................ 10, 17 MD5 algorithm........................................................ 12
CMAN_PROFILE ................................................ 10 methods section ..................................................... 14
cman_rules................................................. 10, 16, 23 MTS .............................................. 8, 9, 18, 19, 21, 26
CMCTL START ................................................... 10 Configuring .......................................................... 9
COMPLEX NETWORK........................................... 1 Connecting ........................................................... 8
CONNECT................................................................ 9 Processing a request ............................................. 8
connect-data string ................................................. 27 MTS_DISPATCHERS............................................ 9
Connection Manager ..........2, 9, 15, 16, 17, 19, 22, 23 MTS_MAX_DISPATCHER .................................. 9
Connection Pooling............................................. 9, 19 MTS_MAX_SERVER ............................................ 9
cross protocol connectivity ....................................... 2 MTS_SERVERS ............................................... 9, 26
Cryptographic Checksumming.......... 2, 11, 12, 20, 21 MTS_SERVICE .......................................... 9, 19, 26
daemon process ............................................... 21, 22 MTX_MAX_SERVER .............................................. 19
Data Encryption .................................. 11, 12, 15, 21 multiple listener..................................................... 18
Data Encryption Standard ....................................... 12 Multiple Protocol Interchange ............................. 23
Data Integrity.................................................... 11, 21 Multithreaded Server............................................. 5, 8
Data Privacy ........................................................... 11 Name Service wizard ............................................ 13
data type conversion ............................................. 23 Names Control Utility......................................... 7, 22
Database SID.......................................................... 24 Names server..................................... 7, 10, 15, 21, 22
dbsnmp_start....................................................... 5, 7 Names servers........................................................ 15
dbsnmp_status........................................................... 7 names.ora ...................................................... 7, 15, 22
dbsnmp_stop.................................................. 5, 7, 13 NAMESCTL ....................................................... 7, 20
Dedicate Server Processes ........................................ 8 Net8..................................................... 1, 3, 13, 14, 22
default listener ........................................................ 25 Net8 Assistant ............................................ 17, 21, 24
Destination listener address.................................... 19 Net8 destination address....................................... 20
dispatcher .............................................. 5, 8, 9, 21, 26 NET8 STACK........................................................... 2
DNS......................................................................... 18 network address ........................................................ 6
encrypted data ........................................................... 2 Network Authentication (NA) Layer..................... 3
Enterprise Manager ................................................... 8 network descriptor .................................................... 6

26 http://www.troytec.com
Network Interface (NI) Layer ................................ 3 Server Side Layer Stack............................................ 3
Network Naming ..................................................... 16 SERVER-SIDE CONFIGURATION ....................... 4
Network Naming (NN) Layer................................. 3 Service Name ...................................................... 6, 19
Network Program Interface (NPI)............................. 3 Service Name wizard............................................... 14
Network Routing (NR) Layer ................................ 3 Service names.......................................................... 13
Network session ...................................................... 23 Services ........................................................ 5, 17, 26
Network Session (NS) Layer .................................. 3 services.ora ......................................................... 7, 23
Network Specific Protocols .................................... 2 SGA .................................................................... 8, 26
NETWORK TRANSPORT (NT) LAYER ............... 3 Shadow Server Process ............................................. 8
network types ............................................................ 1 Shared server process ............................................. 26
NI Layer .................................................................. 17 SID .............................................................. 15, 17, 24
NIS .......................................................................... 18 SID name.................................................................. 5
NN Layer................................................................. 20 simple network.................................................... 1, 13
NPI ............................................................................ 3 SIMPLE/COMPLEX (N-TIER) NETWORK........... 1
NS Layer ................................................................. 20 Single Sign-On.......................................................... 2
NT Main.................................................................... 3 SINGLE-TASK ARCHITECTURE ......................... 8
NT OS ....................................................................... 3 SNMP........................................................................ 7
NT(2) ........................................................................ 3 snmp_ro.ora ........................................................ 7, 13
n-tier....................................................................... 22 snmp_rw.ora ....................................................... 7, 23
OCI...................................................................... 3, 16 SOURCE_ROUTE ............................................ 10, 23
OCI call..................................................................... 3 SPX/IPX ................................................................. 23
OEM.............................................................. 7, 13, 23 SQL........................................................................... 3
online transaction process .................................... 19 SQL dialogue ......................................................... 16
OPA .......................................................................... 3 SQL statement........................................................... 2
OPEN GATEWAY ................................................... 2 sqlnet.log................................................................. 19
Oracle Call Interface (OCI) ................................... 2 sqlnet.ora............................6, 7, 10, 12, 16, 19, 22, 24
ORACLE CALL INTERFACE (OCI) LAYER........ 2 START_CLIENT_CACHE....................................... 22
Oracle home directory ............................................ 17 Status....................................................................... 20
Oracle Intelligent Agent...................................... 7, 13 Stop ......................................................................... 18
Oracle Names................................................ 1, 16, 22 SUPPORT.............................................................. 20
ORACLE PROGRAM INTERFACE (OPI) LAYER3 TCP/IP .............................................. 6, 17, 18, 22, 25
ORACLE PROTOCOL ADAPTER (OPA) LAYER 3 TCP/IP Protocol Adapters ...................................... 14
Oracle Protocol Adapters (OPA)........................... 2 Test Service......................................................... 6, 14
Patcher.................................................................... 18 Test Service dialogue .............................................. 13
PRESPAWN_MAX .................................................. 4 TNS........................................................................... 3
process listener address .......................................... 19 TNS errors ............................................................. 19
Profile ..................................................................... 24 TNS generic calls ...................................................... 3
Redirect Session .................................................. 4, 5 TNS layer ................................................... 16, 20, 23
Region Database..................................................... 15 tnsnames.................................................................. 14
Reload ..................................................................... 17 tnsnames.ora...............6, 13, 14, 16, 19, 20, 21, 23, 24
RELOAD ................................................................. 5 token cards .............................................................. 12
remote node............................................................... 7 TRACE ASSISTANT ............................................. 11
Repository................................................................ 8 TRACE_LEVEL_CLIENT.................................. 25
Repository Manager.................................................. 8 tracing ........................................................ 10, 20, 25
Request Queue......................................................... 8 Tracing and Logging............................................. 10
RESOLVING SERVICE NAMES ........................... 6 Translation Services................................................ 1
Response Queue ...................................................... 9 transnames.org ...................................................... 27
Root region ............................................................. 15 Transparent Network Substrate................................. 3
RSARC4 ................................................................. 12 Transparent Network Substrate (TNS)................. 2
save_config............................................................... 5 Troubleshooting ...................................................... 10
Save_config ............................................................. 17 TTS ........................................................................... 3
Scalability ............................................................... 19 Two Task Common.................................................. 23
Scalability Services.................................................. 1 Two Task Common (TTS)...................................... 2
Security ....................................................... 11, 20, 21 TWO TASK COMMON (TTS) LAYER.................. 3
Security Server.................................................... 2, 14 TWO-TASK ARCHITECTURE .............................. 8
SERVER LAYER ..................................................... 3 two-tier................................................................... 18

27 http://www.troytec.com
unique file mode...................................................... 20
Upward scalability.................................................. 22
Username ................................................................ 19

28 http://www.troytec.com
29 http://www.troytec.com

You might also like