国产一级a片免费看高清,亚洲熟女中文字幕在线视频,黄三级高清在线播放,免费黄色视频在线看

打開APP
userphoto
未登錄

開通VIP,暢享免費(fèi)電子書等14項超值服

開通VIP
[Laskey99] Chapter 5. Oracle Networking

Chapter 5.

Few,if any, concepts are as important to the proper administration of anOracle database as the concept of networking.Connectivity—the ability to makeconnections between clients and databases, as well as betweendatabases—has been a key component of Oracle for over a decade.While some of the terminology and technology has changed, the needfor a clear understanding of networking and how it functions with theOracle framework is at least as critical today as it was whenclient/server was a brand new buzzword.

This chapter discusses networking and how it relates to Oracle. Italso shows you the tools Oracle provides for managing its networkingcomponents and lays out the networking capabilities of the modernOracle database.

5.1. Oracle Network Architecture

The complexity of Oraclenetworking arises to some extent from its basic simplicity. Althoughthat statement appears to contradict itself, it points out a basiccharacteristic of the Oracle networking architecture: it is a simplestructure that can be used to implement complex solutions.Oracle's networking architecture is simple because it isdesigned to allow any Oracle product, running on any supportedplatform, to "talk" to any other Oracle product withoutregard for network topologies or protocols. Figure 5.1 shows several Oracle databases and clientsconnected via a "cloud" with no network identification.

Figure 5.1. A simple view of the Oracle network architecture

Because Oracle is designed to run on almost any network, using almostany accepted protocol, the configuration of the Oracle componentsthat interface with the network can be very complex, which oftenleads to frustration when the DBA is not sure where to turn in orderto solve a problem. This is because Oracle often hides its underlyingcomplexity. For example, the simple connection shown in Figure 5.1 could, in reality, look more like the morecomplex connection shown in Figure 5.2, where thephysical and logical components of the network can be seen. Thatfigure shows a client and server connected using TCP/IP, 10BaseT, andtoken ring with routers.

Figure 5.2. A more complex view of an Oracle network

5.1.1. SQL*Net and Net8

Oracleachieves its goal of transparent connectivity between and among itsproducts through the use of a product called SQL*Net.

With the introduction of Oracle8, SQL*Net has been renamed Net8. However, except for some added functionality, Net8 and SQL*Net are the same product; thus, when we refer to SQL*Net, we will mean both SQL*Net and Net8 unless otherwise noted.


5.1.1.1. SQL*Net functionality

Simply put, SQL*Net provides all the facilities required for anOracle client (that is, a network machine running a tool that willconnect to the Oracle database) to connect to an Oracle database, tomaintain that connection, and to process transactions on thedatabase. This is done without regard for location(locationtransparency), network protocol(network transparency), host operating system, or anyother factor. SQL*Net also supports the complexities of distributedtransactions, and so is able to:

  • Determine the location of each server involved in a transaction

  • Resolve any issues arising from character set differences on the participating nodes

  • Create and maintain connections to each required node, regardless of network attributes

  • Handle any network disconnects or other errors

5.1.1.2. How SQL*Net works

SQL*Net is designed to run on top of an existing network protocol,and is therefore independent of the particular hardware and softwarebeing used to implement a network. As long as SQL*Net on both sidesof the connection is using the same basic protocol (e.g., TCP/IP,LU6.2 or IPX), it won't matter to Oracle how the underlyingnetwork transports the information. Figure 5.3shows the relationship between SQL*Net and the underlying network; itillustrates Oracle, SQL*Net, TCP/IP, and physical transport on bothsides.

Figure 5.3. Relationship between SQL*Net and the underlying network

The key here is that connectivity to and from the Oracle database andtools is achieved by using SQL*Net, which presents a consistentinterface to Oracle. By utilizing an appropriate protocol adapter (inthis case, TCP/IP) on each side, SQL*Net is able to conform to thenetwork protocol in use. SQL*Net creates data packets using thenative network protocol, and it does not matter how the network isimplemented to actually carry the SQL*Net packets. In fact, SQL*Netdoes not even know if a network exists, and it is possible to useSQL*Net without any network at all by making an internal connectionbetween a client process and a server running on the same machine.

SQL*Net protocol adapters are available to support a variety ofnetwork protocols, including:


TCP/IP

Probably the most common universal protocol, TCP/IP originated onUnix systems but is now widely supported by a variety of operatingsystems and network hardware.


SPX/IPX

This protocol was developed by Novell for use in Netware and isavailable on a variety of operating systems.


LU6.2

This protocol was developed by IBM and is widely used in its SNA(System Network Architecture) strategy.


Named pipes

This protocol is used by Microsoft for Windows networking.

When Oracle is installed, both SQL*Net and one or more supportedprotocol adapters must be installed. Note that not all protocols aresupported on every host operating system. For example, Oracle forWindows NT does not provide a protocol adapter for LU6.2, since thisis not a protocol normally supported in a Windows environment.

5.1.1.3. Oracle services

SQL*Netconnections to Oracle databases are made throughservices, which are actually processes runningon the Oracle Server host machine. Each Oracle server maintains oneor more listener processes, which are used to monitor the network forincoming connection requests. When such a request is received, thelistener process is responsible for determining which Oracle instancethe incoming request is seeking a connection with, and establishingan appropriate server process for that connection. The server processmay be established as a dedicated process, or may use theMulti-Threaded Server, depending on how the Oracle instance isconfigured. For more information, see Chapter 10.

In order to identify the Oracle instance to connect with, the SQL*Netconnection request specifies the name of a service (sometimes calleda database alias), which in turn corresponds toa particular Oracle instance on a specific host machine. Therelationships between service names and specific instances and hostsare typically maintained in the filetnsnames.ora (discussed in more detail later inthis chapter). For example, the service name "test" mightactually refer to an Oracle database instance with an SID of TST23,which is accessible via TCP/IP at address 123.234.210.001 using port1526. It is certainly simpler to refer to"test"!

5.1.2. Advanced Networking Option

In addition to the standard functionality provided by SQL*Net andNet8, Oracle now offers the AdvancedNetworking Option (ANO) as an extra-cost option. This option providesadditional security-related functionality to Oracle connectivity.Among the capabilities of the Advanced Networking Option are:

  • Network security

  • Single sign-on

  • DCE integration

5.1.2.1. Network security

Improvednetwork security is provided through the following security features:


Encryption

Thetransformation of data so that it is unreadable by anyone without a(secret) decryption key. Encryption ensures the confidentiality ofinformation by keeping its content hidden from anyone for whom it isnot intended, even those who can see the encrypted data. The AdvancedNetworking Option also utilizes public key encryption. In thisscheme, each person receives a pair of keys: a public key and aprivate key.

Each person's public key is published, while the private key isconfidential. Messages encrypted with a public key can only bedecrypted with the corresponding private key. Messages encrypted witha private key can only be decrypted with the corresponding publickey. Keys may not be deduced from each other. The sender and receiverof an encrypted message do not share confidential information, sinceall communications involve only public keys. Private keys are neithertransmitted nor shared.


Digital signature

Anon-forgeable way of authenticating the sender of a message thatsupports non-repudiation of messages. Use of a digital signatureensures that only the purported sender of a message could actuallyhave sent the message. The sender cannot later claim that someoneimpersonated her or him.


Digital certificate

A mechanismused to establish confidence in the identity associated with a publickey by incorporating public keys. A digital certificate is a bindingof a public key to a user by a trusted third party known as aCertificate Authority (CA). The public key and useridentity, together with other information such as the certificateexpiration date, are digitally signed by the CA. CAs serve aselectronic notaries, attesting to the identity of users and thevalidity of their public keys.

5.1.2.2. Single sign-on

The single sign-on feature allows users toaccess multiple accounts and applications with a single password.This feature eliminates the need for multiple passwords for users andsimplifies management of user accounts and passwords for systemadministrators. Authentication adapters provide centralized, secureauthentication services that confirm the identity of users, clients,and servers in distributed environments. Network authenticationservices also can provide the benefit of single sign-on for users.The following authentication adapters are supported:

  • Kerberos

  • CyberSAFE

  • SecurID

  • Biometric (Identix)

5.1.2.3. DCE integration

DistributedComputing Environment (DCE) integration enables users totransparently use Oracle tools and applications to access Oracleservers in a DCE environment. The Oracle DCE integration productconsists of two major components:

  • DCE communications/security adapter

  • DCE CDS (cell directory service) naming adapter

The DCE communications/security adapter provides:


Authenticated remote procedure call (RPC)

RPCis the transport mechanism that enables multivendor interoperabilityfor DCE integration. RPC also uses additional DCE services, includingdirectory and security services, to provide location transparency andsecure distributed computing.


Integrated security

DCE integration works with the DCE security service to providesecurity within DCE cells. It enables a user logged onto DCE tosecurely access any Oracle application without specifying a usernameor password. This function is referred to as externalauthentication to the database. In addition, clients andservers not running DCE authentication services can interoperate withsystems that have DCE security by specifying an Oracle password.


Data privacy and integrity

DCE integration usesmultiple levels of security to ensure data authenticity, privacy, andintegrity. Users are provided with a range of choices, from noprotection to full encryption for each connection, with a guaranteethat no data has been modified in transit.

5.1.2.4. DCE naming adapter

The DCE CDS naming adapter offers adistributed, replicated repository service for the names, addresses,and attributes of objects across the network. Because serversregister their name and address information in the DCE CDS namingadapter, Oracle clients can make location-independent connections toOracle servers. An Oracle utility is provided to load the Oracleservice names with corresponding connect descriptors into the DCE CDSnaming adapter. After the names are loaded, Oracle connectdescriptors can be viewed from a central location with standard DCEtools, and services can be relocated without any changes to theclient configuration.

本站僅提供存儲服務(wù),所有內(nèi)容均由用戶發(fā)布,如發(fā)現(xiàn)有害或侵權(quán)內(nèi)容,請點(diǎn)擊舉報
打開APP,閱讀全文并永久保存 查看更多類似文章
猜你喜歡
類似文章
File System Primer - CoolSolutionsWiki
MySQL database on Linux Tutorial
mysql5.6 linux下安裝筆記
Kettle 連接失敗 Oracle 數(shù)據(jù)庫報 ora
使用 VMware Server 在 Oracle Enterprise Linux 上安...
CentOS 6.5 X64上64位Oracle11gR2 靜默安裝,靜默設(shè)置監(jiān)聽,靜默建庫親自實踐記錄
更多類似文章 >>
生活服務(wù)
分享 收藏 導(dǎo)長圖 關(guān)注 下載文章
綁定賬號成功
后續(xù)可登錄賬號暢享VIP特權(quán)!
如果VIP功能使用有故障,
可點(diǎn)擊這里聯(lián)系客服!

聯(lián)系客服