Describes the features offered by the gateway and explains how the gateway works.
Compares BEA Tuxedo and BEA TOP END architectures, and describes differences in the terminology used for the two systems.
Explains how to connect BEA Tuxedo and BEA TOP END systems using the BEA TOP END Domain
Gateway (TEDG). Also discusses how the TEDG handles connections and message passing, how the TEDG handles queue processing, and how the TEDG supports transactions. Includes a discussion of the application programming interfaces (APIs) of the two systems, lists the supported and unsupported features of the two APIs,
and an overview of TEDG administration.
Gives an overview of the security features provided by the BEA Tuxedo and BEA TOP END systems. Also discusses how security works between
the two systems, and how security is handled by the TEDG.
Explains the TEDG configuration and run-time administration process, gives rules for configuring the TEDG with samples of valid
and invalid values, and describes
how to configure a TEDG node on a BEA TOP END system.
Defines the UBBCONFIG file, describes how to edit the file for a TEDG configuration, and gives a
sample section of a UBBCONFIG file modified for a TEDG.
Describes the DMCONFIG file and explains how to edit the file to configure a TEDG.
Includes a list of the required and optional parameters for each section of the file.
Explains how security is provided between the systems, and lists the prerequisites for setting up security
between them. Also explains how to
configure security in a BEA Tuxedo system, how to use BEA Tuxedo and BEA TOP END security administration tools to authorize inter-system access,
and how to configure the TEDG for NI encryption and authentication.
Discusses how to configure multiple GWTOPEND processes, how to define multiple processes in the UBBCONFIG file, and how to modify the
DMCONFIG file to support multiple gateway groups.
Describes a sample configuration that includes a TEDG. Discussion focuses on the mappings between the BEA TOP END products and functions and the corresponding
BEA Tuxedo services. A sample DMCONFIG file is included.
Gives an overview of run-time administration and the tools available, including the dmadmin command interpreter.
Explains how to use the BEA Tuxedo ATMI and the BEA TOP END CSI with the TEDG, and describes the
limitations of the supported features for the respective APIs.
Describes how request/response messaging works with the TEDG, how messages are passed from BEA Tuxedo
clients to BEA TOP END servers, and how messages are passed from BEA TOP END clients to BEA Tuxedo servers in request/response mode. Includes
client and server flag mappings and lists of error values and their causes.
Describes how conversational messaging works with the
TEDG, how messages are passed from BEA Tuxedo clients to BEA TOP END servers, and how messages are passed from BEA TOP END clients to BEA Tuxedo servers in conversational mode. Includes client
and server flag mappings and lists of error values and their causes.
Describes how the BEA Tuxedo and BEA TOP END systems
support reliable queues. Discussion focuses on common queuing features supported by the TEDG, and unsupported /Q and RTQ features. Discusses how BEA Tuxedo clients enqueue messages to RTQ, how BEA TOP END clients enqueue messages to /Q, and how the TEDG maps client
requests. Includes lists of error values and their causes.
Explains how to use transactions with the TEDG, describes transaction capabilities supported by the TEDG,
and discusses transaction design.
Gives an overview of end-to-end security for a configuration that comprises BEA Tuxedo and BEA TOP END systems connected by the TEDG.
|