[NTLUG:Discuss] OT sql communication between nix boxen
Leroy Tennison
leroy_tennison at prodigy.net
Fri May 23 23:35:42 CDT 2008
Fred James wrote:
> All
> The central database and server ...
> SGI IRIX 6.4 (soon to become 6.5.30)
> Oracle 8.0.4 (soon to become 8.1.7 - sorry that's our limit at the moment)
>
> Other SQL databases on other computers want to communicate (GUI
> interactive not required - this is behind the scenes stuff)
>
> One box in particular is said to be a fairly recent version of Red Hat
> Enterprise - have not confirmed that
>
> Could someone outline the communication layer, please? Or point me
> toward some "for dummies" documentation?
>
> Thank you in advance for any help you may be able to offer
> Regards
> Fred James
>
>
> _______________________________________________
> http://www.ntlug.org/mailman/listinfo/discuss
>
Well, I'm not sure I clearly understand at what level you are wanting to
understand the communication layer, but hopefully even if I'm off base
it will help to clarify things and move the discussion in the right
direction.
I know very little about Oracle but, in general, communication is at
several layers. I'm going to skip the physical and data link layer
because I'm assuming the computers are attached to an interconnected
network with functioning network software. Since I didn't see Microsoft
or Novell in the equation I'm going to assume we are talking about
TCP/IP (as opposed to either NetBEUI or IPX) as the 'carrier' protocol
for communication.
The initiator of the communication has to know how to contact the
responder by some identifier (name such as DNS name or IP address) and
port which the responder software is listening on. This is one aspect
of configuration. The 'port' part may be hidden by the vendor's
software if the vendor has hard-coded a set value on both ends. (I'm
using the term initiator and responder to avoid the confusion of a
server acting as a client.)
Depending on the capabilities and configuration, the IP traffic (or data
portion of same) may or may not be 'secure' (encrypted). If it's
optional this may be another configuration setting (or group of same)
which must agree on both ends.
Whether the actual protocol traffic is encrypted or not, there is
probably some kind of authentication and exchange of capabilities which
takes place at the start of communication. The authentication is almost
assuredly a configuration issue on both ends, the responder has to know
something about the initiator and the initiator has to provide that
information to the responder. The capabilities part may or may not be
configurable (depends on whether there are options).
Finally (I think) there's what I'm going to call a product-specific
communication protocol. Again, I'm using this term to avoid having to
try and distinguish between transport, session, presentation and
application layer components of this communication. First of all, I
don't know the specifics. Second, no one may know all of them except
the software vendor. Third, as long as it works we really don't care.
The point here is that there may be additional configuration to do if
the product has options.
That's a generic overview as long as there's no firewall or other kind
of blocking device between the initiator and responder. If there is
then there's configuration for those device(s) to allow the
communication to pass between the endpoints unhindered.
More information about the Discuss
mailing list