1 Glossary
1.1 A
This section describes glossary information about alphabet A.
- abort
- absolute OID
- Abstract Syntax Notation One (ASN.1)
- access control list (ACL)
- Access Decision object
- access machine
- ACID properties
- ACL
- activate
- activation policy
- active object
- active object map
- active server
- ADE
- AdminAPI
- administrative API
- administrative domain
- administrator
- advertised
- AEQ
- AET
- agent
- agent-manager model
- alarm
- allocation
- alternate facility
- alternate remote domain
- AP
- API
- applet
- application
- application association
- application code
- application context
- application context name (ACN)
- application-controlled deactivation
- application development environment (ADE)
- application entity
- application entity qualifier (AEQ)
- application entity title (AET)
- application framework
- application program (AP)
- application programming interface (API)
- Application-to-Transaction Monitor Interface (ATMI)
- architecture
- ASN.1
- asymmetric algorithm
- asymmetric outbound IIOP
- asynchronous
- asynchronous connections
- asynchronous process
- asynchronous request
- ATMI
- atomic set
- attribute
- auditing
- audit trail
- authentication
- authorization
- autoinstall
- auto-spawning
- availability
Parent topic: Glossary
1.1.1 abort
Terminate a transaction in such a way that the values assigned to all protected resources, such as database records, are unchanged from the beginning of the transaction.
Parent topic: A
1.1.2 absolute OID
(CORBA) An object identifier (OID) that specifies a unique path to a managed object from the root of the OID tree.
See Also:
object identifier (OID).Parent topic: A
1.1.3 Abstract Syntax Notation One (ASN.1)
A formal notation used to define data types and encode data values. A language that describes the data structures that make up an abstract syntax. ITU-T (formerly CCITT) specification X.409 is equivalent to ASN.1. ASN.1 Distinguished Encoding Rules (DER) object identifiers are used in public key interface (PKI) security programming.
Parent topic: A
1.1.4 access control list (ACL)
An Oracle Tuxedo security feature that controls client access to services, objects, and methods by means of lists of clients that are authorized to receive specific services or invoke specific objects and methods. When ACL security is being used, the Oracle Tuxedo system checks the appropriate list whenever a client requests a service, to determine whether the client is authorized to access the service.
Parent topic: A
1.1.5 Access Decision object
(CORBA) The object in the security infrastructure of a CORBA application that enforces the checking of authorized access before a request to the target object is delivered.
Parent topic: A
1.1.6 access machine
The processor within the administrative domain of an application at which a client first accesses the system. For a native client, this is the processor on which it is running. For a Workstation client, this is the site at which it contacts the application.
Parent topic: A
1.1.7 ACID properties
The essential characteristics of transaction processing systems include the following:
- Atomicity, which requires that all changes made by a transaction to a database are made permanent, or else all are nullified.
- Consistency, which defines the success of a transaction as the transformation of a database from one valid state to another.
- Isolation, which requires that changes made by a transaction to a database must not be visible to other operations until the transaction completes its work.
- Durability, which guarantees that changes made by a transaction to a database survive future system or media failures.
Parent topic: A
1.1.9 activate
(ATMI) To move a server from the inactive (unavailable) state to the state in which it is up and running (active).
(CORBA) To prepare an object for execution.
Parent topic: A
1.1.10 activation policy
(CORBA) The policy that determines the in-memory activation duration for a CORBA object.
Parent topic: A
1.1.12 active object map
(CORBA) A table maintained by a POA and the TP Framework that maps the association of object IDs to servants.
Parent topic: A
1.1.13 active server
An Oracle Tuxedo server that is either processing a service request or is available to do so.
Parent topic: A
1.1.16 administrative API
An application programming interface for writing programs that configure and control an Oracle Tuxedo application by setting and changing attribute values in the Management Information Base (MIB). It can be used by both ATMI and CORBA programmers.
Parent topic: A
1.1.17 administrative domain
That portion of an application that is actively administered at run time by a Bulletin Board Liaison (BBL) process. It does not include workstations or host processors.
Parent topic: A
1.1.18 administrator
The person who installs the Oracle Tuxedo system, configures and monitors an Oracle Tuxedo application, and updates application information, such as computer names and locations.
Parent topic: A
1.1.19 advertised
A service is advertised when a service table entry exists for it
in the Oracle Tuxedo bulletin board. When a Domains gateway server
is booted, it advertises all the remote services that it is
importing from remote domains in the bulletin board of the local
domain (that is, the domain on which the gateway server is booted).
After a remote service is advertised by a domain gateway server, it
remains advertised until either an unadvertise
command
is issued or a MIB request removes the service.
Parent topic: A
1.1.22 agent
- A component of a network management system that exchanges data about managed objects with a manager at a network management workstation. At a manager’s request, agents provide a software interface to, and gather data about, managed resources.
- In a two-phase commit syncpointing sequence (LU6.2 or MRO), a task that receives syncpoint requests from an initiator (a task that initiates syncpointing activity).
See Also:
SNMP agent.Parent topic: A
1.1.23 agent-manager model
A model where a manager communicates with many distributed agents through a system management protocol.
Parent topic: A
1.1.24 alarm
A means of reporting that a managed object is in an abnormal state (that is, a managed object has passed a predefined threshold).
Parent topic: A
1.1.25 allocation
The assignment of various types of programs and record categories for system storage locations, such as main storage or disk storage.
Parent topic: A
1.1.26 alternate facility
In distributed transaction programming, a session that a
transaction obtains by means of an ALLOCATE
command.
Parent topic: A
1.1.27 alternate remote domain
A remote domain that is used when a primary remote domain is unavailable.
Parent topic: A
1.1.30 applet
An interactive Java program that can be run via a Web page displayed by a Java-capable browser. An applet enhances the Web page’s display or enables the user to complete a task.
Parent topic: A
1.1.31 application
A business program, built around the Oracle Tuxedo system, that is defined and controlled by a single Oracle Tuxedo configuration file, and that is administered as a single entity. Such an application may comprise one or more clients (local or remote), one or more servers, and one or more machines. At a minimum, an Oracle Tuxedo application includes one machine, one server, and one client. Also referred to as an Oracle Tuxedo domain.
Multiple Oracle Tuxedo applications can communicate with each other through a domain gateway group.
Note:
In this context, the term business program is defined as a set of one or more programs that work together. Similarly, in conversation the term application is often used loosely: it may refer to a standalone program or to a set of programs that work together to accomplish a particular business objective.Parent topic: A
1.1.32 application association
The association between a process and an Oracle Tuxedo application (domain). A multicontexted process may have associations with multiple Oracle Tuxedo domains. It may also have multiple associations with the same domain.
Parent topic: A
1.1.33 application code
Code that is written by the user, as opposed to system code that is provided by Oracle Systems, Inc.
Parent topic: A
1.1.34 application context
(ATMI) A reference to a particular application association. In the Oracle Tuxedo system, an application context is set via an explicit call and is then used implicitly by subsequent ATMI calls. Thus, in an implicit context interface, the terms application context and default context are often used interchangeably.
Parent topic: A
1.1.35 application context name (ACN)
A set of rules that govern associations between application entities.
Parent topic: A
1.1.36 application-controlled deactivation
(CORBA) A feature used with the process
activation policy to keep an object active in memory until the
application explicitly deactivates the object by invoking the
TP::deactivateEnable()
operation on that object.
Parent topic: A
1.1.37 application development environment (ADE)
A set of tools (often presented or accessed via a GUI) to help programmers build applications.
Parent topic: A
1.1.38 application entity
A set of software components that make up a distributed transaction processing application on one computer system.
Parent topic: A
1.1.39 application entity qualifier (AEQ)
The locally unique component of a title that is used to identify an OSI TP application entity.
Parent topic: A
1.1.40 application entity title (AET)
The globally unique component of the title that is used to identify an OSI TP application entity.
Parent topic: A
1.1.41 application framework
The software that provides the infrastructure that makes it possible for sets of applications or other software components to work together.
Parent topic: A
1.1.42 application program (AP)
A single instance of a user program that performs one or more specific tasks. An AP defines transaction boundaries and accesses resources within those boundaries; it interacts with other system components using interfaces specified in the X/Open Distributed Transaction Processing model. An AP is a single thread of control involved in, at most, one global transaction at any time.
Parent topic: A
1.1.43 application programming interface (API)
- The functions and environment that exist at the application level to support a particular system software product.
- A set of code that enables a developer to initiate and complete client/server requests within an application.
- A set of calling conventions that define how to invoke a service. A set of well-defined programming interfaces (entry points, calling parameters, and return values) by which one software program utilizes the services of another.
Parent topic: A
1.1.44 Application-to-Transaction Monitor Interface (ATMI)
The Application-to-Transaction Monitor Interface is the application programming interface to the Oracle Tuxedo system. It includes transaction routines, message handling routines, service interface routines, and buffer management routines.
Parent topic: A
1.1.45 architecture
- A hardware and software platform (for example, SPARC/Solaris, Intel Pentium/Windows NT, or Intel Pentium/Linux).
- The structure and interrelationship of components in a system or in an environment.
Parent topic: A
1.1.47 asymmetric algorithm
An encryption algorithm that has two keys: a public key and a private key. The public key can be distributed openly while the private key is kept secret. Asymmetric algorithms may be capable of a number of operations, including encryption, digital signatures, and key agreements.
Parent topic: A
1.1.49 asynchronous
An event that occurs at a time that is unrelated to the time at which another event occurs. The two events are mutually asynchronous. The relationship between the times at which they occur is unpredictable.
Parent topic: A
1.1.50 asynchronous connections
Virtual circuits set up to execute independently of each other,
that is, asynchronously. An asynchronous connection does not block
the processing of working circuits while attempts are being made to
reconnect failed circuits. The BRIDGE
allows the use
of nonfailing network paths by listening and transferring data
using multiple network address endpoints.
Parent topic: A
1.1.51 asynchronous process
A process that executes independently of another process. When a request is processed asynchronously, the client application continues to perform other operations while it waits for the service request to be filled.
Parent topic: A
1.1.52 asynchronous request
A request that lets the client do other work while the request is being processed, enhancing parallelism within an application.
Parent topic: A
1.1.54 atomic set
A behavior of SNMP agents that operates as follows: When an SNMP agent receives an SNMP set request that contains more than one variable, the agent either sets all requested objects or sets none. This behavior is a requirement of the SNMP standard.
Parent topic: A
1.1.55 attribute
(CORBA) An identifiable association between an object and a value.
When using OMG IDL, that part of an OMG IDL interface that is
similar to a public class field or data member. The compiler maps
an OMG IDL attribute to accessor and modifier methods in either the
C++ or Java programming language. For example, an interface
ball
might include the attribute color
.
The idltojava
compiler would generate a C++ or Java
programming language method to get the color
, and,
unless the attribute is read-only, would generate a method to set
the color
. CORBA attributes correspond closely to
JavaBeans properties.
Parent topic: A
1.1.56 auditing
A security mechanism that involves saving a secure, tamper-resistant record of requested system operations, along with the identity of the requesting party.
Parent topic: A
1.1.57 audit trail
A manual or computerized means for tracing the transactions affecting the contents of a record.
Parent topic: A
1.1.58 authentication
The process used by the server to verify the identity of an entity, such as a user or a process, before allowing that user or process to join an application. This process relies on the use of passwords and other security mechanisms.
Parent topic: A
1.1.59 authorization
The process of determining which services may be accessed by a particular entity, such as a user or a process, and giving the entity permission to access those services.
Parent topic: A
1.1.60 autoinstall
A method of creating and installing terminal definitions dynamically (that is, as terminals log on) and deleting them when logging off.
Parent topic: A
1.1.61 auto-spawning
The creation, by an Oracle Tuxedo application server, of new threads to handle messages as they are received. The number of new threads that can be created is restricted by a configurable limit.
Parent topic: A
1.1.62 availability
Features of transaction processing systems that contribute to the smooth, continued systems operation in the presence of failures.
Parent topic: A
1.2 B
This section describes glossary information about alphabet B.
- backup
- bandwidth
- BBL
- bidirectional outbound IIOP
- bind
- bitmap
- blocking
- blocking mode
- Bootstrap environmental object
- bootstrapping
- BRIDGE
- broadcast
- broker
- buffer types
- bulletin board
- Bulletin Board Liaison (BBL)
- business object
- byte
Parent topic: Glossary
1.2.1 backup
The act of a resource manager in using a log to restore resources to some predetermined state by applying log entries sequentially to the resource until the desired state has been achieved.
Parent topic: B
1.2.5 bind
(CORBA) The process of associating a name with an application object or a naming context object. Also used to describe the process of connecting a client application to an application object.
Parent topic: B
1.2.6 bitmap
In temporary storage, a control block used by intrapartition transient data to show the VSAM control intervals that have been used and are available. It is updated whenever a control interval or track is assigned to or released from a destination.
Parent topic: B
1.2.8 blocking mode
A synchronous style of message delivery, where a program must wait for an action to complete before the program can proceed. Contrast with nonblocking mode.
Parent topic: B
1.2.9 Bootstrap environmental object
(CORBA) The object that brings a CORBA application into an Oracle Tuxedo domain and provides initial object references to that application. Every CORBA client or server application that interacts with an Oracle Tuxedo domain needs a Bootstrap environmental object.
Parent topic: B
1.2.10 bootstrapping
(CORBA) The process of setting up an application to interact with CORBA objects that are located within an Oracle Tuxedo domain.
Parent topic: B
1.2.11 BRIDGE
The Oracle Tuxedo system process that maintains virtual circuits to other nodes participating in an application for the purpose of transferring application messages between the nodes.
Parent topic: B
1.2.13 broker
A system-level entity whose role is to maintain subscriptions and to cause subscribers’ actions to occur when events are posted.
Parent topic: B
1.2.14 buffer types
An abstract name for a message type. Oracle Tuxedo provides predefined types for message communication: STRING, CARRAY, FML, FML32, VIEW, VIEW32, MBSTRING, and XML. These buffer types are transparently encoded and decoded across a network of heterogeneous machines. Applications can define additional types.
Parent topic: B
1.2.15 bulletin board
A collection of shared data structures designed to keep track of a running Oracle Tuxedo system application. It contains information about servers, services, clients, and transactions pertaining to an Oracle Tuxedo application. The bulletin board is replicated on each logical native (non-foreign) machine in the application.
Parent topic: B
1.2.16 Bulletin Board Liaison (BBL)
An Oracle Tuxedo administrative process responsible for maintaining a copy of the bulletin board on a particular processor. When the system is running, one BBL process runs continuously on each logical machine in the application.
Parent topic: B
1.2.17 business object
(CORBA) An application-level component that can be used in combinations that may not be defined ahead of time. A business object is independent of any single application and represents a recognizable, everyday-life entity, such as a document processor. A business object is a self-contained deliverable that has a user interface and a state, and that can cooperate with other separately developed business objects to perform a desired task.
1.3 C
This section describes glossary information about alphabet C.
- C++
- cache
- callback method
- Callbacks Wrapper object
- CARRAY buffer
- catalog
- CCR
- certificate
- certificate authentication
- certificate authority (CA)
- channel
- cipher
- cipher suite
- ciphertext
- class
- class library
- client
- client application
- Client Data Caching design pattern
- client naming
- client program
- client/server
- client/server computing
- closed framework
- CMIP
- columnar object
- COM
- COM view
- command-line interface
- commit
- Common Management Interface Protocol (CMIP)
- Common Object Request Broker Architecture
- compact disc-read only memory (CD-ROM)
- component
- Component Object Model (COM)
- concurrency
- concurrent
- configuration
- configuration set
- configure
- connection
- connection-oriented communication
- consistent state
- constructor
- conversation
- conversational
- conversational communication
- conversational server
- conversational service
- CORBA
- CORBA callback object
- CORBA client stub
- CORBA domain
- CORBA foreign client application
- CORBA interface
- CORBA native client application
- CORBA object
- CORBA ORB
- CORBA remote client application
- CORBA server application
- CORBA TP framework
- CORBAfacilities
- CORBAservices
- CORBAservices Life Cycle Service
- CORBAservices Naming Service
- CORBAservices Object Transaction Service (OTS)
- CORBAservices Security Service
- core class
- credentials
- Credentials object
- cryptography
- CSI
- current context
- Custom GUI element
Parent topic: Glossary
1.3.1 C++
An object-oriented programming language developed at AT&T Bell Laboratories in the early 1980s. C++ is a “hybrid” language based on the non-object-oriented C language.
Parent topic: C
1.3.2 cache
A subset of memory that contains copies of the frequently accessed parts of a larger memory.
Parent topic: C
1.3.3 callback method
A method that is implemented by application code and that is invoked by system code when needed to perform a specific function. Callback methods are never intended to be invoked directly by application code.
Parent topic: C
1.3.4 Callbacks Wrapper object
(CORBA) An object implemented to support callbacks on CORBA joint client/server applications using the Oracle Wrapper Callbacks API.
See Also:
Oracle Wrapper Callbacks API, callback method, CORBA callback object, joint client/server application, and object.Parent topic: C
1.3.5 CARRAY buffer
A data structure that is an array of characters any of which can be the null character. The interpretation of the array is entirely application dependent.
Parent topic: C
1.3.8 certificate
A digital statement that associates a particular public key with a name or other attributes. The statement is digitally signed by a certificate authority (CA). By trusting that authority to sign only true statements, you can trust that the public key belongs to the person named in the certificate.
See Also:
certificate authority (CA).Parent topic: C
1.3.9 certificate authentication
A method that provides confident identification of a client by a server through the use of digital certificates. Certificate-based authentication is generally preferred over password-based authentication because it is based on what the user has (the private key) as well as what the user knows (the password that protects the private key).
Parent topic: C
1.3.10 certificate authority (CA)
A well-known and trusted entity that issues public key certificates. A certificate authority attests to a user’s real-world identity, somewhat like a notary public.
See Also:
certificate.Parent topic: C
1.3.11 channel
A functional unit, controlled by a processor, that handles the transfer of data between the processor and local input/output devices.
Parent topic: C
1.3.13 cipher suite
An SSL encryption method that includes the key exchange algorithm, the symmetric encryption algorithm, and the secure hash algorithm used to protect the integrity of the communication.
See Also:
Secure Sockets Layer (SSL).Parent topic: C
1.3.15 class
(CORBA) In Java, a type that defines the implementation
of a particular kind of object. A class definition defines
instances and class variables and methods, and specifies the
interfaces and class implementations and the immediate superclass
of the class. If the superclass is not explicitly specified, the
superclass will implicitly be Object.
Parent topic: C
1.3.16 class library
A set of client programming tools. These tools can be used in a Java or C ++ program or Web page-embeddable Java applet.
Parent topic: C
1.3.17 client
(ATMI) A program that performs the following steps:
- Collects, through a user interface, requests for services from users.
- Transmits those requests to servers.
- Receives the servers’ responses and passes them to the users.
If a client is located on a machine that is part of the domain to which the target servers belong, then the client is called a native client. If the client is located on a machine that is outside that domain, then the client is called a remote client or a Workstation client. Remote clients communicate with servers through the Oracle Tuxedo Workstation component.
(CORBA) Any code that invokes an operation on a distributed object.
Parent topic: C
1.3.18 client application
A program, written for use with the Oracle Tuxedo software, that requests services from other applications.
See Also:
server application.Parent topic: C
1.3.19 Client Data Caching design pattern
(CORBA) The design pattern that provides increased performance for client applications by caching server application data on the machine on which the client application resides, thereby avoiding repeated remote calls to retrieve data.
See Also:
design pattern.Parent topic: C
1.3.20 client naming
An Oracle Tuxedo feature that enables client programs to carry both usernames and client name values.
Parent topic: C
1.3.23 client/server computing
A programming model in which application programs are structured as clients or servers to achieve distributed processing. A client program is an application program that requests services to be performed. A server program is an entity that dispatches service routines to satisfy requests from client programs. A service routine is an application program module that performs one or more specific functions on behalf of client programs.
Client/server computing can be configured in a 2-tier or a 3-tier structure. A 2-tier configuration consists of only the client and the server. A 3-tier configuration includes a client, a server, and an intermediate level that acts as a router or a broker.
Parent topic: C
1.3.24 closed framework
A software infrastructure in which developers cannot remove and replace software components easily in a plug-and-play fashion.
Parent topic: C
1.3.26 columnar object
A MIB leaf object—that is, a MIB object that does not have any objects below it in the OID tree—which can have zero or more instances. A columnar object represents one column in a table.
Parent topic: C
1.3.28 COM view
(CORBA) A representation of an object that conforms to the Component Object Model (COM) standards, including implementations of all necessary interfaces.
See Also:
Component Object Model (COM).Parent topic: C
1.3.29 command-line interface
A style of user interface that allows user interaction by entering commands at a system prompt.
Parent topic: C
1.3.30 commit
- Complete a transaction so that changes are recorded and stable. Protected resources are released.
- The declaration or process of making a transaction’s updates and messages visible to other transactions. When a transaction commits, all its effects become public and durable. After commitment, the effects of a transaction cannot be reversed automatically.
Parent topic: C
1.3.31 Common Management Interface Protocol (CMIP)
An protocol for network management defined by ISO standards.
Parent topic: C
1.3.33 compact disc-read only memory (CD-ROM)
A disk from which data is read optically by laser and on which the data cannot be modified except under special conditions.
Parent topic: C
1.3.35 Component Object Model (COM)
(CORBA) A collection of services that let software components interoperate in a networked environment.
Parent topic: C
1.3.37 concurrent
Pertaining to the occurrence of two or more activities within a given interval of time. Concurrent processes can alternately use shared common resources.
Parent topic: C
1.3.38 configuration
The set of hardware, hardware options, software, and software setup on a computer or on a network.
Parent topic: C
1.3.39 configuration set
The name or the number used to reference a particular configuration in a configuration partition. Each configuration set describes the services to be used when the configuration is active.
Parent topic: C
1.3.40 configure
To customize hardware and software for a computer or for a network.
Parent topic: C
1.3.42 connection-oriented communication
Communication between two Oracle Tuxedo system processes over a connection.
Parent topic: C
1.3.44 constructor
(CORBA) A pseudo-method that creates an object. In Java,
constructors are instance methods with the same name as their
class. Java constructors are invoked using the new
keyword.
1.3.46 conversational
Communication characterized by one or more messages exchanged by a requestor and a server such that the server remains dedicated to the communication until the termination of the exchange.
Parent topic: C
1.3.48 conversational server
A server that offers services that require a connection to have a conversation with the requester. The conversation follows an application-established protocol. A conversational service must conform to the startup and termination rules of Oracle Tuxedo system services.
Parent topic: C
1.3.49 conversational service
A service routine that is invoked by means of conversational communication from a client program. When the connection is established and the service is invoked, the client and service exchange data in a manner specific to the application. When the service returns, the connection ends.
Parent topic: C
1.3.50 CORBA
(CORBA) Common Object Request Broker Architecture. A multivendor standard published by the Object Management Group for distributed object-oriented computing.
Parent topic: C
1.3.51 CORBA callback object
(CORBA) A CORBA object supplied as a parameter in a client application's invocation on a target object. The target object can make invocations on the callback object either during the execution of the target object or at some later time (even after the invocation on the target object has been completed). A callback object might be located inside or outside an Oracle Tuxedo domain.
Parent topic: C
1.3.52 CORBA client stub
When using CORBA objects, a file created by the IDL compiler when you compile an application's OMG IDL statements. The client stub contains code that is generated during the client application build process. The client stub maps OMG IDL operation definitions for an object type to the methods in the server application that the Oracle Tuxedo domain calls when it invokes a request. The code is used to send the request to the CORBA server application.
When using OMG IDL, a C++ or Java programming language class created by the compiler and used transparently by the client ORB during object invocation. The remote object reference held by the client points to the client stub. This stub is specific to the IDL interface from which it was generated, and contains the information needed for the client to invoke a method on the CORBA object defined in the IDL interface.
Parent topic: C
1.3.53 CORBA domain
A collection of CORBA or ATMI servers, services, interfaces, machines, and associated resource managers defined by a single UBBCONFIG (ASCII version) or TUXCONFIG (binary version) configuration.
See also TUXCONFIG file and UBBCONFIG file.
Parent topic: C
1.3.54 CORBA foreign client application
(CORBA) A client application that is implemented on an ORB that is not a product of Oracle Systems, Inc.
1.3.55 CORBA interface
(CORBA) A set of operations and attributes. A CORBA interface is defined by using OMG IDL statements to create an interface definition. The definition contains operations and attributes that can be used to manipulate an object.
1.3.56 CORBA native client application
(CORBA) A client application that invokes operations defined in OMG IDL statements to talk to CORBA server applications. Relative to the CORBA domain to which the server applications belong, a client application is either native (that is, local) or remote. Remote and native client applications are the same. Their requests are handled differently and transparently, depending on whether or not the applications are collocated on a machine that is running in the CORBA domain. CORBA native client applications are always collocated on a machine in the CORBA domain.
See Also:
CORBA domain, CORBA foreign client application, CORBA remote client application, CORBA server application, and OMG IDL.Parent topic: C
1.3.57 CORBA object
(CORBA) An entity that complies with the CORBA standard upon which operations are performed. An object is defined by its interface.
1.3.58 CORBA ORB
(CORBA) Any Object Request Broker (ORB) that complies with the CORBA standard. A CORBA ORB is a communications intermediary between client and server applications that are distributed across a network. The ORB used in Oracle Tuxedo applications is a CORBA ORB.
See Also:
conversation.Parent topic: C
1.3.59 CORBA remote client application
(CORBA) A client application that invokes operations defined in OMG IDL statements to talk to remote CORBA server applications using IIOP. Remote and native client applications are the same. Their requests are handled differently and transparently, depending on whether or not the applications are collocated on a machine that is running in the CORBA domain. CORBA remote client applications are typically not located on a machine that is running in the CORBA domain.
See Also:
IIOP, OMG IDL, CORBA domain, CORBA foreign client application, and CORBA native client application.Parent topic: C
1.3.60 CORBA server application
(CORBA) A program that performs a task requested of it by a client application and that is written to be used with the Oracle Tuxedo CORBA software.
See Also:
local factory.Parent topic: C
1.3.61 CORBA TP framework
(CORBA) Run-time library of default implementations that the CORBA server application build procedure links to the server application executable image. The Transaction Processing (TP) Framework consists of a set of convenience functions that make it easy for you to write code that does the following:
- Initializes the server application and executes startup and shutdown routines.
- Ties the server application to CORBA domain resources.
- Manages objects, bringing them into memory when needed, flushing them from memory when no longer needed, and managing reading and writing of data for persistent objects.
- Performs object housekeeping.
Parent topic: C
1.3.62 CORBAfacilities
(CORBA) The adopted OMG Common Facilities. Common Facilities provide horizontal end-user-oriented frameworks that are applicable to most applications, and are defined in OMG IDL.
1.3.63 CORBAservices
(CORBA) A set of system services for objects that were developed for the programmer. These services, defined in OMG IDL by the OMG, can be used to create objects, control access to objects, track objects and object references, and control the relationship between types of objects. Programmers can call object service functions instead of writing and calling their own private object service functions.
1.3.64 CORBAservices Life Cycle Service
(CORBA) The CORBAservice that defines conventions for creating, deleting, copying, and moving objects.
Parent topic: C
1.3.65 CORBAservices Naming Service
(CORBA) The CORBAservice that provides the ability to associate a name to an object relative to a naming context.
Parent topic: C
1.3.66 CORBAservices Object Transaction Service (OTS)
(CORBA) The CORBAservice that provides transaction semantics to ensure the integrity of data in the system.
See Also:
CORBAservices.Parent topic: C
1.3.67 CORBAservices Security Service
(CORBA) The CORBAservice that defines identification and authentication of principals, authorization and access control, security auditing, security of communication between objects, nonrepudiation, and administration of security information.
Parent topic: C
1.3.68 core class
(CORBA) A public class (or interface) that is a standard member of the Java platform. The intent is that the Java core classes, at a minimum, are available on all operating systems on which the Java platform runs.
1.3.69 credentials
Information that describes the security attributes (identity and/or privileges) of a user or other principal. Credentials are claimed through authentication or delegation and are used by access control.
See Also:
authentication.Parent topic: C
1.3.70 Credentials object
(CORBA) The object that holds the security attributes of a principal. These security attributes include the principal’s authenticated or unauthenticated identities. The Credentials object also contains information for establishing security associations. The Credentials object provides methods to obtain the security attributes of the principals it represents.
Parent topic: C
1.3.71 cryptography
The art of protecting information by transforming it (encrypting it) into an unreadable format, called ciphertext. Only those who possess a secret key can decipher (or decrypt) the message into plaintext.
Parent topic: C
1.3.73 current context
(ATMI) Clients may initialize to multiple contexts; however, at any given time, in any particular thread, only one of these contexts may be the current context.
(CORBA) A special type of ORB object that is used to communicate between a user application and a specialized built-in service.
Parent topic: C
1.3.74 Custom GUI element
(ATMI) A Java GUI class that communicates with JoltBeans. The means of communication can be JavaBeans events, methods, or properties offered by JoltBeans.
Parent topic: C
1.4 D
This section describes glossary information about alphabet D.
- daemon
- DASD
- database
- database management system (DBMS)
- data-dependent routing
- Data Encryption Standard (DES)
- data independence
- data transfer protocol
- DB2
- DBBL
- DBMS
- DDE
- DDE conversation
- deadlock
- decoding
- decryption
- decryption private key
- default
- default context
- deferred synchronous communication
- deployment
- DES
- design document
- design pattern
- desktop client
- dialog
- digital certificate
- digital signature
- digital signature algorithm
- DII
- Direct Access Storage Device (DASD)
- Distinguished Bulletin Board Liaison (DBBL)
- Distinguished Name (DN)
- distributed application
- distributed computing
- distributed object
- Distributed Program Interface (DPI)
- distributed transaction
- distributed transaction processing (DTP)
- DLL
- domain
- Domain Configuration (DMCONFIG) File
- domain gateway
- domain gateway group
- Domains
- Domains-level failback
- Domains-level failover
- dotted-decimal notation
- DPI subagent
- DSA
- DSI
- DTP
- dual-paired connections outbound IIOP
- dynamic argument
- Dynamic Data Exchange (DDE)
- dynamic datatype
- Dynamic Invocation Interface (DII)
- dynamic link library (DLL)
- Dynamic Skeleton Interface (DSI)
Parent topic: Glossary
1.4.3 database
A collection of interrelated or independent data items stored together without redundancy to serve one or more applications.
Parent topic: D
1.4.4 database management system (DBMS)
A program or set of programs that lets users structure and manipulate the data in the tables of a database. A DBMS ensures privacy, recovery, and integrity of data in a multi-user environment.
Parent topic: D
1.4.5 data-dependent routing
- Routing that directs a request to be processed by a particular group based on the value in a data field of the message.
- A mechanism in the Oracle Tuxedo system in which a service request is mapped to a specific server group based on a value contained in a designated field in the data buffer.
Parent topic: D
1.4.6 Data Encryption Standard (DES)
A symmetric key algorithm adopted by the U.S. government in 1976 as a standard encryption-decryption system for unclassified data in the United States. Several types of DES are offered, including DES-CBC and two-key triple-DES.
- DES-CBC is a 64-bit block cipher run in Cipher Block Chaining (CBC) mode. It provides 56-bit keys; 8 parity bits are stripped from the full 64-bit key.
- Two-key triple-DES is a 128-bit block cipher run in Encrypt-Decrypt-Encrypt (EDE) mode. Two-key triple-DES provides two 56-bit keys (in effect, a 112-bit key).
Parent topic: D
1.4.7 data independence
The ability to request data by a high-level data-management method without concern as to how the data is stored or retrieved.
Parent topic: D
1.4.8 data transfer protocol
A set of rules for transforming data of a particular buffer type from one representation into another.
Parent topic: D
1.4.13 DDE conversation
The sending and receiving of DDE messages between a client application and a server application.
Parent topic: D
1.4.14 deadlock
- Unresolved contention for the use of a resource.
- An error condition in which processing cannot continue because each of the two elements of the process is waiting for an action or a response from the other.
Parent topic: D
1.4.17 decryption private key
An algorithm that reverses the work of the encryption algorithm.
Parent topic: D
1.4.18 default
The value assumed by a program if a value is not supplied by the user.
Parent topic: D
1.4.19 default context
An Oracle Tuxedo application association that is referenced by subsequent ATMI calls if tpsetctxt()
is not called. The default context may differ from thread to thread. This term is often used interchangeably with application context.
See Also:
application context.Parent topic: D
1.4.20 deferred synchronous communication
A form of asynchronous communication in which one piece of software can send a message to another piece of software, and then continue to work and retrieve the reply to the message at some later time.
Parent topic: D
1.4.21 deployment
The process of placing an application in a distributed environment and making the application available for use. Deployment can include such tasks as installation, configuration, and administration of various parts of the application.
Parent topic: D
1.4.23 design document
The document written by the system integrator that explains the overall design of the application or the framework to be built.
Parent topic: D
1.4.24 design pattern
A document that encapsulates, in a structured format, solutions to design problems. Design patterns are guides to good design practices.
Parent topic: D
1.4.25 desktop client
(CORBA) A CORBA client application that operates on a Microsoft desktop platform, such as Windows XP. Desktop client applications use the Component Object Model (COM) and communicate with the Oracle Tuxedo domain.
Parent topic: D
1.4.27 digital certificate
An electronic file used to identify individuals and resources over networks such as the Internet. A digital certificate securely binds the identity of an individual or resource, as verified by a trusted third party known as a Certificate Authority, to a particular public key. Because no two public keys are ever identical, a public key can be used to identify its owner.
Oracle Tuxedo public key security recognizes certificates that comply with X.509 version 3.0.
Parent topic: D
1.4.28 digital signature
A digital code, attached to an electronically transmitted message, that uniquely identifies the sender and that can, therefore, be used to authenticate the identity of the sender. When a message is authenticated, verification is provided that: (1) the message is genuine; (2) the message has arrived exactly as it was sent; and (3) the message has come from the stated source.
Digital signatures are especially important for electronic commerce and are a key component of most authentication schemes. The recipient of signed data can use a digital signature to prove to a third party that the signature was, in fact, generated by the signatory. When such proof is provided, the signed data is protected by nonrepudiation: the signatory cannot, at a later time, deny authorship of the signature.
Parent topic: D
1.4.29 digital signature algorithm
An algorithm that transforms a message of any length to a digital signature in such a way that it is computationally infeasible to (1) find two messages with the same digital signature, (2) produce a message from a given, predetermined digital signature, or (3) find the digital signature of a given message without knowledge of the sender’s private key. Typically, a digital signature algorithm is implemented by computing a message digest on the message, then encrypting the message digest with the sender’s private key.
An example of a digital signature algorithm is DSA.
Parent topic: D
1.4.31 Direct Access Storage Device (DASD)
A disk, disk drive, or group of disks or drives on an IBM machine.
Parent topic: D
1.4.32 Distinguished Bulletin Board Liaison (DBBL)
An Oracle Tuxedo administrative process that runs on the MASTER node of the application and communicates with BBLs to coordinate updates to the bulletin board.
Parent topic: D
1.4.33 Distinguished Name (DN)
(CORBA) A distinguished name (DN) is an entry in the Directory Information Tree (DIT) that uniquely identifies an object in an X.500 directory.
1.4.34 distributed application
An application that is separated into two or more parts (such as a client and a server) on different computers that communicate through a network.
Parent topic: D
1.4.35 distributed computing
An application design and implementation strategy that separates an application into units that are executed on different computers and communicate through a network. For example, an application can be separated into three distributed units: a user interface unit, a processing unit, and a storage unit.
Parent topic: D
1.4.36 distributed object
(CORBA) An object that can live anywhere on a network. Distributed objects are packaged as independent pieces of code that can be accessed by remote clients via method invocations. The language and compiler used to create distributed objects are totally transparent to the clients. Clients do not need to know where the distributed object resides or what operating system executes on it.
Parent topic: D
1.4.37 Distributed Program Interface (DPI)
The Distributed Program Interface (DPI) protocol extension to SNMP agents. Permits end-users to dynamically add, delete or replace variables in the local MIB without recompiling the SNMP agent, by creating a subagent that communicates with the agent via the SNMP-DPI protocol.
Parent topic: D
1.4.38 distributed transaction
A transaction involving multiple transaction managers. In a distributed transaction environment, a client application may send requests to several servers resulting in resource updates at multiple resource managers. To complete the transaction, the transaction manager for each participant (client, servers, and resource managers) must be polled to coordinate the commit process for each participant within its domain.
Parent topic: D
1.4.39 distributed transaction processing (DTP)
A form of processing in which multiple application programs update multiple resources (such as databases) in a coordinated manner. Programs and resources can reside on one or more computers access a network.
Parent topic: D
1.4.42 Domain Configuration (DMCONFIG) File
The file that describes the relationship between the local
domain (the domain in which the DMCONFIG
file resides)
and remote domains (any other domains). There is one
DMCONFIG
file per domain. The DMCONFIG
file contains domain information for Oracle Tuxedo domains.
1.4.43 domain gateway
A highly asynchronous multitasking server provided by the Oracle Tuxedo system to process service requests to and from remote domains. The gateway makes access to services on a remote domain (and service requests from a remote domain) transparent to both the application programmer and the user.
Parent topic: D
1.4.45 Domains
An Oracle Tuxedo system component that provides a framework for interoperability among multiple domains. The framework consists of the following:
- An extended client/server model that hides the heterogeneity of different computers and application programs, as well as the location of application programs.
- A centralized administration system that allows application administrators to control all cooperating machines as a single application.
Parent topic: D
1.4.46 Domains-level failback
The restoration of message traffic to a primary remote domain. The TDomain gateway always tries to use the primary domain or the highest-level alternate remote domain defined for a service. When these domains become unavailable (due to circuit failure or other reasons), the gateway transfers message traffic to a lower-priority alternate remote domain, and periodically checks the availability of the primary remote domain and the highest-level alternate remote domain. When possible, the gateway restores message traffic to the primary remote domain or the highest-level remote domain.
Parent topic: D
1.4.47 Domains-level failover
The transfer of message traffic to an alternate remote domain when a primary remote domain fails.
See Also:
remote domain.Parent topic: D
1.4.48 dotted-decimal notation
A convention for expressing IP addresses, consisting of a series of four decimal numbers (0-255), separated by periods. Example: 123.205.23.99.
Parent topic: D
1.4.50 DSA
Digital Signature Algorithm. An algorithm used to generate digital signatures. DSA is defined in US FIPS 186.
Parent topic: D
1.4.54 dynamic argument
A type of argument for which a method can allocate or extend the existing storage.
Parent topic: D
1.4.55 Dynamic Data Exchange (DDE)
A form of communication available on Microsoft Windows platforms that allows applications to exchange information through a series of messages. Two applications sending and responding to DDE messages are said to have a DDE conversation.
Parent topic: D
1.4.56 dynamic datatype
A datatype whose memory size is not known when the code is compiled; a dynamic datatype’s memory size is known only when the code is executed.
Parent topic: D
1.4.57 Dynamic Invocation Interface (DII)
(CORBA) An API that allows a CORBA client to either perform invocations on an object whose signature may be unknown at compile time, or a deferred synchronous invocation. If an object’s signature is unknown, the client locates the object and uses the Interface Repository to obtain information about the object’s signature and constructs an invocation with the proper parameters. The client can then issue the invocation and receive the response. DII is distinguished from the static invocation interface in which a client performs a synchronous invocation using client stubs. DII also allows a client to issue a request and to not block until the request is completed. The client checks for a response at a later time.
See Also:
Dynamic Skeleton Interface (DSI).Parent topic: D
1.4.58 dynamic link library (DLL)
A collection of functions grouped into a load module that is dynamically linked with an executable program at run time for a Microsoft Windows application.
Parent topic: D
1.4.59 Dynamic Skeleton Interface (DSI)
(CORBA) An API that provides a way to deliver requests from an ORB to an object implementation. DSI is used at compile time when the ORB has no knowledge of the object implementation. As the server-side analog to the client-side DII, DSI lets the application programmer examine the parameters of an incoming request to determine a target object and method.
See Also:
Dynamic Invocation Interface (DII).Parent topic: D
1.5 E
This section describes glossary information about alphabet E.
- electronic commerce
- encoding
- encryption
- encryption key pair
- environmental object
- environment variable
- event
- Event Broker/Monitor
- event posting
- event subscription
- exception
- extensibility
- Exterior Gateway Protocol (EGP)
- External Data Representation (XDR)
Parent topic: Glossary
1.5.1 electronic commerce
The practice of buying and selling goods and services over the Internet.
Parent topic: E
1.5.2 encoding
The conversion of architecture-specific data into a format that can be transmitted between different architectures, such as XDR encoding.
Parent topic: E
1.5.3 encryption
The process of algorithmically scrambling data to prevent (or hinder) unauthorized disclosure, while still preserving access to the original data by authorized users. To read an encrypted file, a recipient must have access to a secret key or password that enables the recipient to decrypt it. Unencrypted data is called plaintext; encrypted data is referred to as ciphertext.
Parent topic: E
1.5.4 encryption key pair
An encryption key pair consists of the public key used to encrypt information and a private key used to decipher the information.
Parent topic: E
1.5.5 environmental object
(CORBA) Any support object that provides independence from the underlying environment (for example, independence from the operating system). The Bootstrap object is an environmental object.
Parent topic: E
1.5.6 environment variable
A string of specific value that controls a certain attribute of an application. Environment variables are made available to the application as it begins.
Parent topic: E
1.5.7 event
An indication to the Oracle Tuxedo system process of the occurrence of a particular state or condition, for example, disconnection, transaction request mode, connection request, and so forth.
Parent topic: E
1.5.8 Event Broker/Monitor
An Oracle Tuxedo system component that monitors the occurrence of defined system and application events and notifies subscribers when an event is detected.
Parent topic: E
1.5.9 event posting
Notification by the Oracle Tuxedo system (or by an application) to the Event Broker/Monitor that a defined event has occurred.
Parent topic: E
1.5.10 event subscription
A request made to the Event Broker/Monitor to be notified when a specific event is detected.
Parent topic: E
1.5.11 exception
(CORBA) An event that occurs during program execution
that prevents the program from continuing normally (usually an
error). C++ supports exceptions with the try
,
catch
, and throw
keywords. There are two
categories of exceptions: system and user-defined.
In C++, system exceptions inherit from
CORBA::System_Exception
and user-defined exceptions
inherit from CORBA::User_Exception
.
Parent topic: E
1.5.12 extensibility
The ease with which a system adapts to meet new requirements. Extensibility also includes the ability to add or change a function or data (data type, file format, database schema, or information model) without:
- Requiring changes to existing functions, data, and interfaces.
- Introducing unwanted side effects, such as degradation of performance, reliability, maintainability, portability, and so on.
Parent topic: E
1.5.13 Exterior Gateway Protocol (EGP)
A protocol used to advertise the set of networks that can be reached within an autonomous system. EGP enables this information to be shared with other autonomous systems.
Parent topic: E
1.5.14 External Data Representation (XDR)
A canonical data format defined by Sun Microsystems and used to transfer data between heterogeneous hardware nodes.
Parent topic: E
1.6 F
This section describes glossary information about alphabet F.
- factory
- factory-based routing
- factory finder
- failback
- failover
- field
- Field Manipulation Language (FML)
- field table
- FML
- FML buffer
- foreign access path
- foreign client application
- foreign node
- format independence
- framework
Parent topic: Glossary
1.6.1 factory
(CORBA)
- Any distributed CORBA object that returns an object reference to other distributed CORBA objects. A factory is located in a server application.
- An interface used by a client to obtain an object reference to a CORBA object. Object references to factories are obtained by the client using an object reference to a Factory Finder interface. The Factory Finder interface is advertised by the system and is made available to the client as part of client bootstrap processing.
Parent topic: F
1.6.2 factory-based routing
(CORBA) A feature of the Oracle Tuxedo software that permits the routing of requests on a CORBA object reference to a specific server group based on criteria supplied at the time the object reference is created by a factory.
Parent topic: F
1.6.3 factory finder
(CORBA) A CORBA object that locates the factories that an
application needs. Both client applications and server applications
can use a factory finder. A factory finder object provides an
implementation of the CORBAservices
COSLifeCycle.FactoryFinder
interface, as well as the
Oracle Tobj.FactoryFinder
interface.
factory_finder.ini file
(CORBA) The FactoryFinder configuration file for domains.
This file is parsed by the TMFFNAME
service when it is
started as a Master NameManager. The file contains information used
by NameManagers to control the import and the export of object
references for factory objects with other domains.
Parent topic: F
1.6.4 failback
Restoration of message traffic to a higher-priority circuit. The
BRIDGE
process always tries to use the
highest-priority circuit defined for the node; when traffic is
flowing on a lower-priority circuit, whether due to circuit failure
or just non-availability, the BRIDGE
periodically
checks higher-priority circuits to find one that is usable. When a
higher priority circuit becomes available again, the data flow is
returned to it. This mechanism is called failback.
Parent topic: F
1.6.5 failover
(ATMI and CORBA) Seamless transfer of message traffic to a lower-priority circuit on the occasion of the failure of a higher-priority circuit. Some operating system and hardware bundles transparently detect a problem on one network card and replace it with another. When this replacement is done quickly, application-level TCP virtual circuits have no indication that a fault has occurred.
In the Oracle Tuxedo system, data flows over the highest available priority circuit. If all network groups have the same priority, data travels over all networks simultaneously. If all circuits at the current priority fail, data is sent over the next lower priority circuit. This is called “failover.”
(Jolt) A failure prevention mechanism that works as follows. If the current Jolt Relay Adapter (JRAD) fails to respond to a connection request, the Jolt Relay (JRLY) is enabled to connect to another available JRAD. The Jolt client proves a list of JRLY addresses to which the JRAD attempts connection in a round-robin fashion.
Parent topic: F
1.6.6 field
- In a record, a specified area used for a particular category of data.
- An area within a segment that is the smallest referable unit of data.
- Any designated portion of a segment.
- A way of addressing a single item of data in a database table.
- An area of a window where data displays.
Parent topic: F
1.6.7 Field Manipulation Language (FML)
(ATMI) A set of C language functions for defining and manipulating storage structures called field buffers. Cooperating processes can send and receive data in fielded buffers.
(Jolt) An interface for maintaining buffers with field/value pairs; specifically, the 16-bit version of this interface.
Parent topic: F
1.6.8 field table
(ATMI) A file that consists of FML field names and their identifiers. The field table enables users to refer to fields by logical names rather than by system field identifiers.
Parent topic: F
1.6.10 FML buffer
(ATMI) A buffer of self-describing data items accessed through the field manipulation language API.
Parent topic: F
1.6.11 foreign access path
A physical connection between a native Oracle Tuxedo system node and a foreign node. At least one gateway server must reside on the Oracle Tuxedo node.
Parent topic: F
1.6.12 foreign client application
(CORBA) A client application that is implemented on an ORB that is not a product of Oracle Systems, Inc. Although the client is implemented on a Microsoft product, the ORB is provided by Oracle Systems, Inc.
1.6.13 foreign node
A node in the network that does not have access to the configuration’s bulletin board, or that cannot execute the full complement of Oracle Tuxedo system software.
Parent topic: F
1.6.14 format independence
The ability to send data to a device without having to be concerned with the format in which the data is displayed. The same data may appear in different formats on different devices.
Parent topic: F
1.6.15 framework
The software environment tailored to the needs of a specific domain. Frameworks include a collection of software components that programmers use to build applications for the domain the framework addresses. Frameworks can contain specialized APIs, services, and tools, which reduce the knowledge a user or programmer needs to accomplish a specific task.
Parent topic: F
1.7 G
This section describes glossary information about alphabet G.
- gateway
- gateway group
- gateway server
- General Inter-ORB Protocol (GIOP)
- GIOP
- global transaction
- Global Transaction Identifier (GTRID)
- graphical user interface (GUI)
- group
- GUI
Parent topic: Glossary
1.7.1 gateway
For the Oracle Tuxedo system, any communication mechanism between different environments (for example, between native and foreign nodes). A software program that allows dissimilar systems to communicate and exchange information. A gateway normally handles communication between systems and performs all necessary protocol translation such that the end applications communicate transparently.
Parent topic: G
1.7.2 gateway group
A collection of processes that provide communication services to
and from remote domains. The group consists of the following:
GWADM
, the gateway administrative server, and a
gateway process, for example, GWTDOMAIN
.
Parent topic: G
1.7.3 gateway server
A server process, resident on a native Oracle Tuxedo system node, that communicates with one or more foreign machines.
Parent topic: G
1.7.4 General Inter-ORB Protocol (GIOP)
(CORBA) A standard for communication between independent CORBA Object Request Broker (ORB) implementations. GIOP was developed by the Object Management Group (OMG). GIOP is an abstract protocol that forms the basis for specific protocols that map the GIOP standard to individual transport layers. For example, IIOP maps the GIOP standard to the TCP/IP transport layer.
1.7.6 global transaction
The Oracle Tuxedo system name for a transaction in which multiple servers or multiple resource manager interfaces are used and that is coordinated as an atomic unit of work. A global transaction may be composed of several local transactions, in each of which a single resource manager is accessed.
See Also:
resource manager (RM).Parent topic: G
1.7.7 Global Transaction Identifier (GTRID)
A data structure, the value of which uniquely identifies a global transaction.
Parent topic: G
1.7.8 graphical user interface (GUI)
A high-level interface that uses windows and menus with graphic symbols instead of typed system commands to provide an interactive environment for a user. The Oracle Administration Console, available through the World Wide Web, enables an authorized user to configure and control an Oracle Tuxedo application.
Parent topic: G
1.8 H
This section describes glossary information about alphabet H.
- handler
- hierarchical database
- hierarchy
- high-level language
- host
- host computer
- hypertext markup language (HTML)
Parent topic: Glossary
1.8.1 handler
A request that originates on a remote computer. Handlers are registered in the local Oracle Tuxedo bulletin board as client programs.
See Also:
Workstation Handler (WSH).Parent topic: H
1.8.2 hierarchical database
A database organized in the form of a tree structure that predetermines the access paths to data stored in the database. DL/I, IMS, and SQL/DS are hierarchical database managers.
Parent topic: H
1.8.3 hierarchy
In a database, a tree of segments beginning with the root and proceeding downward to dependent segment types. No segment type can be dependent on more than one other segment type.
Parent topic: H
1.8.5 host
A computer that is attached to a network and provides services other than acting as a communication switch.
Parent topic: H
1.8.6 host computer
The primary or controlling computer in a data communication system.
Parent topic: H
1.8.7 hypertext markup language (HTML)
The language used for writing pages for the World Wide Web.
Parent topic: H
1.9 I
This section describes glossary information about alphabet I.
- ICF
- ident string
- identification string
- IDL
- idl compiler
- IDL interface
- IDL parameter
- idltojava compiler
- IIOP
- IIOP Handler (ISH)
- IIOP Listener (ISL)
- IIOP Listener/Handler
- implementation code
- Implementation Configuration File (ICF)
- implementation file
- inactive server
- incoming connection
- information hiding
- infrastructure
- initial naming context
- instance
- instantiate
- instrumentation
- integration
- interaction model
- interactive
- interactive interface
- interface
- Interface Repository
- internationalization
- International Standards Organization (ISO)
- Internet
- Internet Inter-ORB Protocol (IIOP)
- Internet Protocol Address (IP address)
- interoperability
- Interoperable Object Reference (IOR)
- intranet
- invocation
- invocation access policy
- IP address
- ISO
Parent topic: Glossary
1.9.3 identification string
Portions of a file that get expanded by RCS and SNMP Agent utilities to contain file and identification information. If compiled, these strings are placed into object file functions, where the information is made available.
Parent topic: I
1.9.5 idl compiler
(CORBA) A tool that takes an OMG IDL interface and produces C++ programming language interfaces and classes that represent the mapping from the IDL interface to the C++ programming language.
1.9.6 IDL interface
(CORBA) A declaration in OMG IDL of an interface to a CORBA object. The interface declaration contains IDL operations and attributes. The OMG IDL interface declaration is used to generate stubs and skeletons for Oracle Tuxedo CORBA objects.
Parent topic: I
1.9.7 IDL parameter
(CORBA) One or more objects the client passes to an IDL
operation when it invokes the operation. Parameters may be declared
as in
(passed from client to server), out
(passed from server to client), or inout
(passed from
client to server and then back from server to client).
Parent topic: I
1.9.8 idltojava compiler
(CORBA) A tool that takes an OMG IDL interface and produces Java programming language interfaces and classes that represent the mapping from the IDL interface to the Java programming language. The resulting files are .java files.
1.9.9 IIOP
(CORBA) Internet Inter-ORB Protocol. The standard protocol defined by the CORBA specification for interoperation between Object Request Brokers (ORBs), which was written by the Object Management Group (OMG). The IIOP enables two or more Object Request Brokers (ORBs) to cooperate to deliver requests to an object.
1.9.10 IIOP Handler (ISH)
(CORBA) An Oracle Tuxedo system process that handles all IIOP communication between a remote application and target CORBA objects.
Parent topic: I
1.9.11 IIOP Listener (ISL)
(CORBA) An Oracle Tuxedo system process that listens for incoming IIOP connections from remote applications. After a connection is established, the Listener hands off the connection to the IIOP Handler.
Parent topic: I
1.9.12 IIOP Listener/Handler
(CORBA)The feature of the Oracle Tuxedo software that enables client applications to communicate with the Oracle Tuxedo domain, and the reverse. The IIOP Listener/Handler receives a request from a client application via the IIOP protocol, and then sends that request to the appropriate server application within the Oracle Tuxedo domain. It also receives a request from a server application in the Oracle Tuxedo domain and sends the request to a server outside the domain.
See also IIOP,client application,domain, and server application.
(Jolt) A process that receives a client request, which is sent using the IIOP, and delivers that request to the appropriate server application.
Parent topic: I
1.9.13 implementation code
(CORBA) The method code that you write that satisfies a client application’s request on a specific object. The interface defines the operation and is implemented in the method.
Parent topic: I
1.9.14 Implementation Configuration File (ICF)
(CORBA) A file that describes the implementation attributes of Oracle Tuxedo C++ server applications. The ICF file is input to the IDL compiler when generating skeletons for Oracle Tuxedo C++ server applications.
Parent topic: I
1.9.15 implementation file
(CORBA) The file that contains, among other data, method declarations for each operation defined in your OMG IDL statements. You need to implement the method with your business logic. When you build the server application, you provide this implementation file to the Oracle Tuxedo build procedure.
Parent topic: I
1.9.16 inactive server
A server that is not currently available to process requests.
Parent topic: I
1.9.17 incoming connection
A connection to the local gateway that is initiated by a domain gateway on a remote domain.
Parent topic: I
1.9.18 information hiding
A software design technique in which a piece of code contains only the information it needs to do its job.
Parent topic: I
1.9.19 infrastructure
A common underlying computing base. The infrastructure is a set of components (fundamental services) that support another higher-level set of components in a given system. The higher-level components are typically more directly associated with providing the specific function of the overall system.
Parent topic: I
1.9.20 initial naming context
(CORBA) When using CORBA objects, the
NamingContext
object returned by a call to the method
orb.resolve_initial_references
("NameService
").
It is an object reference to the CosNaming Service registered with
the ORB. The initial naming context can be used to create other
NamingContext
objects.
See Also:
naming context.Parent topic: I
1.9.21 instance
(CORBA) A particular realization of an abstraction or template, such as a class of objects or a computer process.
Parent topic: I
1.9.22 instantiate
(CORBA) To create an instance by defining one particular variation of an object within a class, giving it a name and locating the object in some physical place.
Parent topic: I
1.9.23 instrumentation
Facilities that provide access to the attributes of managed resources, to retrieve or modify values of these attributes. Access to managed resources used by agents to respond to management requests.
Parent topic: I
1.9.24 integration
The ability of applications to share information or to process independently by requesting services and satisfying service requests. In a well-integrated system, all of the parts have a purpose, and the parts combine effectively to achieve the purpose of the overall system.
Parent topic: I
1.9.25 interaction model
A description of how the clients and servers in a distributed application or application framework work with each other.
Parent topic: I
1.9.26 interactive
Pertaining to an application in which each entry entails a response from a system or program, as in an inquiry system or airline reservation system. An interactive system may also be conversational, implying a continuous dialog between the user and the system.
Parent topic: I
1.9.27 interactive interface
A system facility that controls how different users see and work with the system by means of user profiles. When signing on, the interactive interface makes available those parts of the system authorized by the profile. The interactive interface has sets of selection and data entry panels through which users communicate with the system.
Parent topic: I
1.9.29 Interface Repository
(CORBA) An online database that contains the definitions of the interfaces that determine the CORBA contracts between client and server applications.
Parent topic: I
1.9.30 internationalization
A mechanism that allows customization of a system’s text messages and data formats into an application’s language and format of choice.
Parent topic: I
1.9.31 International Standards Organization (ISO)
An international organization whose membership includes standards and research groups from various nations. ISO establishes standards for computer network communications and many other technologies.
Parent topic: I
1.9.32 Internet
The world’s largest network, the Internet is based on the TCP/IP protocol suite and is universally accessible.
Parent topic: I
1.9.34 Internet Protocol Address (IP address)
A numeric value that uniquely identifies a node in a TCP/IP network. IP addresses are usually expressed in dotted decimal notation, a series of four decimal numbers (0-255), separated by periods. Example: 123.205.23.99.
Parent topic: I
1.9.36 Interoperable Object Reference (IOR)
(CORBA) The entity that associates a collection of tagged profiles with object references. An ORB must create an IOR (from an object reference) whenever an object reference is passed across ORBs.
Parent topic: I
1.9.37 intranet
A set of internal company or group-specific networks protected by firewalls and connected by IP routers. An intranet appears to its users as a single network.
Parent topic: I
1.9.38 invocation
(CORBA) The process of performing a method call on a distributed object, with or without knowledge of the object's location on the network. CORBA Static invocation, which uses a client stub for the invocation and a server skeleton for the service being invoked, is used when the interface of the object is known at compile time. CORBA Dynamic invocation must be used if the interface is not known at compile time.
Parent topic: I
1.9.39 invocation access policy
(CORBA) The security policy that controls whether a client application may invoke a method on the target object as specified in the request.
Parent topic: I
1.10 J
This section describes glossary information about alphabet J.
- JAR files (.jar)
- Java
- JavaBeans
- Java Development Kit (JDK)
- Javadoc
- Java Runtime Environment (JRE)
- JDK
- joint client/server application
- JoltBeans
- JoltBeans toolkit
- Jolt Class Library
- Jolt Relay (JRLY)
- Jolt Relay Adapter (JRAD)
- Jolt Repository
- Jolt Server Handler (JSH)
- Jolt Server Listener (JSL)
- Jolt WAS for Servlet
- Jolt WAS for WebLogic
- journaling
- JRAD
- JRE
- JREPSVR
- JRLY
- JSH
- JSL
Parent topic: Glossary
1.10.1 JAR files (.jar)
(CORBA) Java ARchive files. A file format used for aggregating many files into one file.
1.10.2 Java
An object-oriented programming language developed by Sun Microsystems, Inc. A write once, run anywhere programming language.
Parent topic: J
1.10.3 JavaBeans
(CORBA) A specification developed by Sun Microsystems that defines how Java objects interact. An object that conforms to this specification is called a JavaBean. The JavaBean can be used by any application that understands the JavaBeans format. JavaBeans can be developed only in Java, but can run on any platform.
Parent topic: J
1.10.4 Java Development Kit (JDK)
A software development environment for writing applets and applications in Java.
1.10.5 Javadoc
(CORBA) A tool from Sun Microsystems, Inc. that generates API documentation in HTML format from comments in Java source code. The Java API Reference document is formatted by the Javadoc tool.
See Also:
application programming interface (API).Parent topic: J
1.10.6 Java Runtime Environment (JRE)
A subset of the Java Development Kit that is suitable for redistribution and sufficient for end users. The JRE consists of the Java Virtual Machine (JVM), the Java core classes, and supporting files.
Parent topic: J
1.10.8 joint client/server application
An application that executes code that acts as the starter for some business actions, and also executes method code for invocations on objects.
See Also:
native joint client/server application.Parent topic: J
1.10.9 JoltBeans
(ATMI) JavaBeans components that are used in Java development environments to construct Jolt clients. JoltBeans consist of two sets of JavaBeans: JoltBeans toolkit and Jolt-aware AWT beans.
Parent topic: J
1.10.10 JoltBeans toolkit
(ATMI) A JavaBeans-compliant interface to Oracle Jolt. The toolkit includes the JoltServiceBean, JoltSessionBean, and JoltUserEventBean.
Parent topic: J
1.10.11 Jolt Class Library
(ATMI) A set of Java classes that allows the user to write Java programs to access Oracle Tuxedo services.
Parent topic: J
1.10.12 Jolt Relay (JRLY)
(ATMI) A standalone program that routes Jolt messages from Jolt clients to the Jolt Server Listener (JSL) or Jolt Server Handler (JSH) via the Jolt Relay Adapter (JRAD). Jolt Relay is not an Oracle Tuxedo server or Oracle Tuxedo client.
Parent topic: J
1.10.13 Jolt Relay Adapter (JRAD)
(ATMI) An Oracle Tuxedo application server that does not include any Oracle Tuxedo services. It requires command-line arguments in order to work with the JSL and the Oracle Tuxedo system. The JRAD may or may not be located on the same Oracle Tuxedo host machine and server group to which the JSL server is connected.
Parent topic: J
1.10.14 Jolt Repository
(ATMI) A subsystem in Jolt that provides primitive services and storage for the service definitions.
Parent topic: J
1.10.15 Jolt Server Handler (JSH)
(ATMI) A program that runs on an Oracle Tuxedo server machine to provide a network connection point for remote clients. The JSH works with the Jolt Server Listener (JSL) to provide client connectivity with the Oracle Tuxedo system.
Parent topic: J
1.10.16 Jolt Server Listener (JSL)
(ATMI) A program that supports clients on an IP/port combination. The JSL works with the Jolt Server Handler (JSH) to provide client connectivity to the backend of the Jolt system. The JSL is administered by the same tools used to manage any resource within an Oracle Tuxedo environment.
Parent topic: J
1.10.19 journaling
The recording of information in any journal (including the system log) for possible subsequent processing by the user. The primary purpose of journaling is to enable forward recovery of the data sets. A data set can be reconstructed by applying transactions in the journal against a previous version of the data set. Journaling can be used for any other user-defined purpose, such as auditing, accounting, or performance analysis.
Parent topic: J
1.10.22 JREPSVR
An Oracle Tuxedo server that provides services to access the Jolt Repository storage. It provides support for the Jolt Runtime Environment and minimum editing and query functions.
Note:
Tuxedo server TMMETADATA replaces JREPSVR starting with version 12.2.2.Parent topic: J
1.11 K
This section describes glossary information about alphabet K.
Parent topic: Glossary
1.11.1 Kerberos protocol
The private key authentication protocol developed as part of Project Athena at the Massachusetts Institute of Technology (MIT).
Parent topic: K
1.11.2 Kerberos security
The security system that provides authentication, mutual authentication, and protection against replay and sequencing attacks.
Parent topic: K
1.11.3 keyword
- A symbol that identifies a parameter.
- A part of a command operand that consists of a specific character string.
Parent topic: K
1.12 L
This section describes glossary information about alphabet L.
- LAN
- LAN partition
- lazy connection
- LDAP
- legacy application
- Life Cycle Service
- Lightweight Directory Access Protocol
- link-level encryption (LLE)
- link-level failover in Domains
- listener
- Listener/Handler
- LMID
- load balancing
- local
- local application names
- Local Area Network (LAN)
- local domain
- local factory
- local gateway
- local node
- local service
- local system
- local transaction
- locality-constrained object
- location transparency
- log file
- logical machine ID (LMID)
Parent topic: Glossary
1.12.2 LAN partition
The failure of a LAN connecting the machines of an application, resulting in a loss of message communication between the machines. A partitioned site is one that no longer has access to the master node.
Parent topic: L
1.12.3 lazy connection
A connection between a domain gateway and a remote domain that is not established until the remote domain receives a request for a remote service. A lazy connection keeps initialization overhead low for configurations involving many domains.
When a domain gateway server is booted, no connections are made to any remote domains. All remote services are assumed to be available and are advertised in the Oracle Tuxedo bulletin board. When the first request for a service in a particular remote domain is made, the gateway server receives the request and tries to establish the connection. If the connection is made, the request flows to the remote domain and the connection remains active. If the connection fails, the client receives a failure message and the service remains advertised.
Parent topic: L
1.12.5 legacy application
(ATMI) An existing application, usually based on a relatively old release of the Oracle Tuxedo system that must be modified or wrapped before it can be used by an Oracle Tuxedo domain.
Parent topic: L
1.12.7 Lightweight Directory Access Protocol
A set of protocols for accessing information directories. These directories can be physically distributed across multiple systems for access by many applications within an enterprise. LDAP is based on the standards contained within the X.500 standard, but is significantly simpler. And unlike X.500, LDAP supports TCP/IP, which is necessary for any type of Internet access. LDAP is an ideal way to publish certificates because it is closely coupled with the X.509 standard for certificates.
Parent topic: L
1.12.8 link-level encryption (LLE)
The encryption of messages moving over network links. Encryption is performed just before data is transmitted on the network, and decryption is performed just after data is received.
LLE operates over Workstation client, domain gateway, bridge, and administrative network links. It employs a symmetric key encryption technique (specifically, RC4), which uses the same key for encryption and decryption.
Parent topic: L
1.12.9 link-level failover in Domains
Link-level failover is a mechanism that ensures that an alternate network link becomes active when a primary link fails.
Parent topic: L
1.12.11 Listener/Handler
See IIOP Handler (ISH),IIOP Listener (ISL),Jolt Server Handler (JSH), Jolt Server Listener (JSL),Workstation Handler (WSH), and, Workstation Listener (WSL).
Parent topic: L
1.12.13 load balancing
The practice of distributing service requests among all the servers in a given domain to achieve the most efficient handling of those requests. Specifically, the system identifies the server currently doing the smallest amount of work and sends requests to that server’s queue for processing.
When a service request is routed to a domain gateway, the gateway implements two algorithms, a load-balancing algorithm and a data-dependent routing algorithm, to find the proper remote domains to which the request should be sent. Load-balancing and data-dependent routing algorithms are based on the remote service table entries and remote domain table entries in the gateway-shared memory.
Parent topic: L
1.12.14 local
In data communication, pertaining to devices that are accessed directly (that is, without use of a telecommunication line).
Parent topic: L
1.12.15 local application names
The DDE Listener uses the application name supplied in the DDE Initiate message to determine if the client is looking for a local or a remote DDE application. The syntax for a local DDE application includes only the name of the application. For example, if the client is looking for Microsoft Excel on the local computer, the application name would be EXCEL.
Parent topic: L
1.12.16 Local Area Network (LAN)
A high-speed network that spans a limited distance, such as a building or a cluster of buildings. LANs can be connected to wide area networks (WANs) with bridge devices.
Parent topic: L
1.12.17 local domain
View of an application (that is, a subset of the application’s services) that is available to other domains. Because a local domain is always represented by a domain gateway group, the terms are used interchangeably.
Parent topic: L
1.12.18 local factory
(CORBA) A factory object that exists in the local domain that is made available to remote domains through an Oracle Tuxedo factory finder.
Parent topic: L
1.12.19 local gateway
A specific gateway group (for example, GWADM
and
GWTDOMAIN
) within a local Oracle Tuxedo application.
Multiple local gateways may be running within a single Oracle
Tuxedo application.
Parent topic: L
1.12.21 local service
A service of a local domain that is available to remote domains through a domain gateway group.
Parent topic: L
1.12.22 local system
In a multi-system environment, the system on which an application program is being executed. A local application can process data from databases located on either the same (local) system or another (remote) system.
Parent topic: L
1.12.23 local transaction
A local resource manager transaction that is active on behalf of a global transaction.
Parent topic: L
1.12.24 locality-constrained object
(CORBA) A CORBA object that cannot be invoked outside the
address space in which it exists. Any attempt to pass a reference
outside the address space of such an object, or any attempt to
externalize an object supporting the interface using
CORBA::ORB::object_to_string
, results in the
CORBA::MARSHAL
system exception being raised.
Parent topic: L
1.12.25 location transparency
The ability to define a resource so that its name implies no specific network address or physical location.
Parent topic: L
1.12.26 log file
A message file that describes events that occur during an operation. Log files are updated frequently during an operation and are useful for tracing system operations and errors.
Parent topic: L
1.12.27 logical machine ID (LMID)
The logical name assigned (in the configuration file) to a processing element used in a transaction manager application.
Parent topic: L
1.13 M
This section describes glossary information about alphabet M.
- makefile
- managed object
- managed resource
- management framework
- Management Information Base (MIB)
- management station
- man-in-the-middle attack
- mapping
- marshal
- mask
- master agent
- master node
- MD5
- message
- message catalog
- message definition block
- message digest
- message digest algorithm
- metadata interface
- method
- MIB
- MIB group
- middleware
- migrate
- model
- modeling
- module
- MOPS
- MP model
- multicontexted process
- multidomain client
- multiple listening addresses
- Multiple Virtual Storage (MVS)
- multiprocessor
- multiprogramming
- multithreading
- multithreaded CORBA server application
- mutual authentication
- MVS
Parent topic: Glossary
1.13.1 makefile
A file, referenced by the make command, that tells the make command how to create each of the files needed to generate a complete program. The makefile contains a list of source files, object files, and dependency information.
Parent topic: M
1.13.2 managed object
A software entity, defined within the Management Information Base (MIB), that represents a feature of a managed resource (such as a process, a piece of hardware, or system performance attribute) and is controlled through a management infrastructure, such as the Oracle Tuxedo TMIB, on behalf of a management console.
Parent topic: M
1.13.3 managed resource
The physical resource whose attributes are represented by managed objects in a management information base. A managed resource can be a software entity such as an application or queue, or a hardware device, such as an interface card or hub.
Parent topic: M
1.13.4 management framework
A system that provides a unified view of hardware and software resources on distributed systems and enterprise-wide networks to help network or system administrators to manage and control these resources.
Parent topic: M
1.13.5 Management Information Base (MIB)
(ATMI and CORBA) An Oracle Tuxedo system component that provides a complete definition of the classes and their attributes that make up the Oracle Tuxedo system. The Oracle Tuxedo System Management Information Base comprises a generic MIB and a specific MIB for each major component, such as Domains and Workstation. Configuration and administration of the Oracle Tuxedo system can be done programmatically by using the ATMI to set or change the value of an attribute.
See Also:
Tuxedo MIB.Parent topic: M
1.13.7 man-in-the-middle attack
An attack where an enemy inserts a machine into a network, and then captures, possibly modifies, and retransmitts all messages between two parties.
Parent topic: M
1.13.8 mapping
(ATMI) The process of associating local values or entities with values or entities that are meaningful on remote systems.
(CORBA) In CORBA, the relationship between OMG IDL statements and the programming language code that results when the OMG IDL statements are compiled. For example, a C++ IDL compiler maps OMG IDL statements into C++ language bindings.
1.13.9 marshal
The process of packing data into a stream of bytes so that the data can be shipped across a network to another computer.
Parent topic: M
1.13.10 mask
An SNMP means of hiding selected SNMP traps, so that alarms are generated only for specified instances.
Parent topic: M
1.13.11 master agent
The single point of contact for the SNMP manager on a managed node. The master agent receives requests from the SNMP manager and contacts the appropriate subagents to fulfill the requests.
Parent topic: M
1.13.12 master node
The MASTER
node for an application as designated in
the RESOURCES
section of the configuration file. It
contains the master copy of the TUXCONFIG
binary
configuration file. Administration of the running system is done
from the MASTER
node.
Parent topic: M
1.13.13 MD5
Message Digest 5. An algorithm defined in RFC 1321 that takes as input a message of arbitrary length and produces as output a 128-bit message digest, or hash value, of the input. The MD5 algorithm is intended for digital signature applications, where a large file must be compressed in a secure manner before being encrypted with a private key under a public-key cryptosystem such as PKCS.
Parent topic: M
1.13.14 message
A formula for sending data and values across applications. Messages may contain statistical or status information about application processes or instructions for the recipient. They consist of a header, containing message ID data, and a body containing user-defined information.
1.13.15 message catalog
With respect to internationalization, a file or storage area containing program messages, command prompts, and responses to prompts for a particular native language, territory, and codeset.
Parent topic: M
1.13.16 message definition block
The total body of data that makes up a message definition. It includes, for example, the command name, the subsystem name, and the internal and external recommendations.
Parent topic: M
1.13.17 message digest
The representation of text in the form of a single string of digits, created with a formula called a one-way hash function. Encrypting a message digest with a private key creates a digital signature, which is an electronic means of authentication.
Parent topic: M
1.13.18 message digest algorithm
A method of reducing a message of any length to a string of a fixed length, called the message digest or hash value. Message digest algorithms have the property that it is computationally infeasible to find a message that corresponds to a given message digest, or to find two different messages that produce the same message digest. Examples of message digest algorithms are MD5 and SHA-1.
Parent topic: M
1.13.19 metadata interface
(CORBA) An interface that accesses data about data; descriptive information about a particular object.
Parent topic: M
1.13.20 method
(CORBA) In object-oriented programming, a programmed procedure that is defined as part of a class and included in any object of that class. A class (and thus an object) can have more than one method. A method in an object can have access only to the data known to that object, which ensures data integrity among the set of objects in an application. A method can be reused in multiple objects.
Parent topic: M
1.13.22 MIB group
Ancestor object of MIB objects within the OID (or registration) tree. A MIB group may contain other MIB groups, or it may contain scalar or tabular objects.
Parent topic: M
1.13.23 middleware
A set of services for building distributed client/server applications, such as services for locating other programs in the network, establishing communication with those programs, and passing information between applications. Middleware services can also be used to resolve disparities between different computing platforms and to provide a uniform authorization model in networks that comprise multiple vendors and multiple operating systems.
Parent topic: M
1.13.24 migrate
Relocates a server or group of servers from one LMID to another. Migration must be planned for and specified in the configuration file.
Parent topic: M
1.13.25 model
A paradigm in which details have been abstracted for the sake of simplification.
Parent topic: M
1.13.26 modeling
A design technique used in developing architecture, simulations, and computer systems.
Parent topic: M
1.13.27 module
A piece of code that contains information on a particular topic and on the topic’s related interfaces. For example, code that describes a banking withdrawal operation could be stored in a module.
Parent topic: M
1.13.29 MP model
An Oracle Tuxedo application configuration that runs on more than one computer. The multiple machines that make up an MP configuration might include two or more uniprocessors, one or more multiprocessors, or a combination of uniprocessors and multiprocessors.
Parent topic: M
1.13.30 multicontexted process
An Oracle Tuxedo process that is connected to more than one application and/or has more than one connection to the same application.
Parent topic: M
1.13.31 multidomain client
An Oracle Tuxedo client that is associated with more than one Oracle Tuxedo applications.
Parent topic: M
1.13.32 multiple listening addresses
When addresses are available on separate networks, even if one
virtual circuit is disrupted, another circuit can continue
undisturbed. Only a failure on all configured networks makes
reconnection of the BRIDGE
processes impossible. For
example, when a high-priority network fails, its load can be
switched to an alternate network with a lower priority. When the
higher-priority network returns to service, the network load
returns to it.
Parent topic: M
1.13.33 Multiple Virtual Storage (MVS)
One of IBM’s principal mainframe operating systems. MVS/XA: Extended Architecture. MVS/ESA: Enterprise Systems Architecture.
Parent topic: M
1.13.34 multiprocessor
A computer that has more than one processing element, each with its own private memory.
Parent topic: M
1.13.37 multithreaded CORBA server application
(CORBA) An application design to use multiple, independent threads. In general, this provides concurrency within an application and can improve overall throughput. Using multiple threads enables applications to be structured efficiently with threads servicing several independent tasks in parallel.
Parent topic: M
1.13.38 mutual authentication
The process whereby each side of an intended communication proves its identity to the other. Frequently, this is a prerequisite for the establishment of a secure association between a client and a target. Mutual authentication ensures that both parties can perform a secure transaction.
See Also:
authentication.Parent topic: M
1.14 N
This section describes glossary information about alphabet N.
- name binding
- name resolution
- name server
- namespace
- naming context
- Naming Service
- native client
- native client application
- native joint client/server application
- native node
- network
- Network Agent (NA)
- Network Interface (NI)
- Node Manager (NM)
- network provider
- NLS
- node
- nonblocking mode
- nonmaster node
- nonpartitioned
- n-tier client/server
Parent topic: Glossary
1.14.1 name binding
(CORBA) The association of a name with an object reference. Name bindings are stored in a naming context.
Parent topic: N
1.14.2 name resolution
(CORBA) The process of converting a name to an object reference.
Parent topic: N
1.14.3 name server
(CORBA) A software component of the Oracle Tuxedo system that transparently maps service names to physical addresses so that users can communicate with services by name rather than by internal identifier.
Parent topic: N
1.14.5 naming context
(CORBA) An object that contains a set of name associations in which each name is unique.
See Also:
CORBAservices Naming Service.Parent topic: N
1.14.8 native client application
(CORBA) A client application that invokes operations defined in OMG IDL statements to talk to CORBA server applications. Relative to the Oracle Tuxedo domain to which the server applications belong, a client application is either native (that is, local) or remote. Remote and native client applications are the same. Their requests are handled differently and transparently, depending on whether or not the applications are co-located on a machine that is running in the Oracle Tuxedo domain. Native client applications are always co-located on a machine in the Oracle Tuxedo domain.
Parent topic: N
1.14.9 native joint client/server application
(CORBA) A joint client/server application that is located within an Oracle Tuxedo domain. C++ native joint client/server applications are built with the buildobjclient
command. The Oracle Tuxedo software does not support Java native joint client/server applications.
See Also:
joint client/server application.Parent topic: N
1.14.10 native node
A machine in an Oracle Tuxedo configuration that contains the full complement of Oracle Tuxedo software, and that has access to the same bulletin board as all other native nodes in the configuration (that is, it is part of the administrative domain of the application).
Parent topic: N
1.14.11 network
- An interconnected group of nodes.
- The assembly of equipment through which connections are made between data stations.
- The communication path used to communicate with a server.
Parent topic: N
1.14.12 Network Agent (NA)
Oracle TOP END term that is equivalent to the Oracle Tuxedo term Workstation Handler (WSH).
Parent topic: N
1.14.13 Network Interface (NI)
Oracle TOP END term that is equivalent to the Oracle Tuxedo term Bootstrap environmental object.
Parent topic: N
1.14.14 Node Manager (NM)
Oracle TOP END term that is equivalent to the Oracle Tuxedo term Bulletin Board Liaison (BBL).
Parent topic: N
1.14.15 network provider
The protocol used at the transport level and below to communicate data across a network. Network providers are typically accessed from programs through a transport interface. Examples of network providers are TCP/IP and StarLAN.
Parent topic: N
1.14.17 node
A point on a network. The term is also used to refer to a computer (for example, a single instantiation of the UNIX operating system) that participates in an Oracle Tuxedo system application. It is possible, however, to have more than one node in a multiprocessor system.
Parent topic: N
1.14.18 nonblocking mode
An asynchronous style of message delivery, that does not require a program to wait for an action to complete before proceeding.
Parent topic: N
1.14.19 nonmaster node
Any node of an Oracle Tuxedo application that is not designated the MASTER
node.
Parent topic: N
1.14.20 nonpartitioned
A term used to identify portions of a partitioned network that continue to be able to communicate with the DBBL on the master node.
Parent topic: N
1.14.21 n-tier client/server
An application development approach that distributes application logic across three or more environments: the desktop computer, one or more application servers, and a database server. The main advantage of the n-tier client/server model is that it extends the benefits of client/server architecture to the enterprise level. Other advantages include added manageability, scalability, security, and higher performance.
Parent topic: N
1.15 O
This section describes glossary information about alphabet O.
- object
- object activation
- Object Bridge
- object by value
- object deactivation
- object handle
- object ID (OID)
- object identifier (OID)
- object implementation
- object interface
- Object Management Group (OMG)
- object model
- object reference
- Object Request Broker
- object system
- Object Transaction Service
- octet
- OID
- OLE
- OLTP
- OMG IDL
- online transaction processing (OLTP)
- open framework
- open system
- Open Systems Interconnect Commitment, Concurrency, and Recovery (OSI CCR)
- Open Systems Interconnection (OSI)
- Open Systems Interconnect Transaction Processing (OSI TP)
- operation
- ORB
- ORBMain module
- Oracle Administration Console
- Oracle Transaction Processing
- Oracle Tuxedo-JSE Connectivity
- Oracle Tuxedo-WebLogic Connectivity
- Oracle Tuxedo application
- Oracle Tuxedo Bulletin Board
- Oracle Tuxedo client
- Oracle Tuxedo domain
- Oracle Tuxedo Domains
- Oracle Tuxedo server
- Oracle Tuxedo system
- Oracle Wrapper Callbacks API
- OSI
- OSI CCR
- OSI TP
- OTS
- outbound IIOP
- outgoing connection
- out-of-band data
Parent topic: Glossary
1.15.1 object
(CORBA) An entity defined by its state, behavior, and identity. These attributes (also known as properties) are defined by the object’s object system.
Parent topic: O
1.15.2 object activation
(CORBA) The process of making a CORBA object ready to accept invocations from client applications. The object needs to have its methods and state available in memory.
When using CORBA objects, the association of an object ID to a servant in the Active Object Map of a POA and the TP Framework. When a CORBA object is activated, the TP Framework reloads the state of the CORBA object from persistent storage and makes the object available to fulfill requests from client applications.
See Also:
active object map,metadata interface,object deactivation,object ID (OID),object reference,Portable Object Adapter (POA), and servant.Parent topic: O
1.15.3 Object Bridge
(CORBA) Software from Visual Edge Software, Ltd. that provides a framework for object system interoperability.
Parent topic: O
1.15.4 object by value
A method of passing an object by value as opposed to by reference. A description of the state of an object is sent to a receiver. The receiver of an object passed by value instantiates a new instance of that state with a separate identity from that of the sender. Once the object is passed by value, no relationship is assumed to exist between the two instances.
Parent topic: O
1.15.5 object deactivation
(CORBA) In CORBA, the removal of the association of an object ID to a servant in the Active Object Map of a POA and the TP Framework. The result of object deactivation is that no client invocation on an object reference that contains this object ID can be satisfied without first performing object activation.
In EJB, the removal of the association of an object ID to an instance in the Active Object map by the EJB container. The result of object deactivation is that no client invocation on an object reference that contains this object ID can be satisfied without first performing object activation.
See Also:
active object map, object activation, object ID (OID),object reference, passivation, and Portable Object Adapter (POA).Parent topic: O
1.15.6 object handle
(CORBA) Identifies the object in a portable way. The handle can be serialized, which allows you to store the object handle and then use it at a later time, possibly in a different process or in a different system, or by another bean or object.
Parent topic: O
1.15.8 object identifier (OID)
(CORBA) A unique number assigned to each object in the MIB. These OIDs fall into specific categories and form a tree. When the agent accesses a specific object, it traverses the OID tree in the MIB file to find the object. An OID identifies an object by specifying a unique path to the object from the root of the OID tree.
Parent topic: O
1.15.9 object implementation
(CORBA) The code you write that implements the operations defined for an interface.
1.15.10 object interface
(CORBA) The interface to an object, as defined in an
application’s OMG IDL statements. The object interface
identifies the set of operations and attributes that can be
performed on an object. For example, the interface for a teller
object identifies the types of operations that can be performed on
that object, such as withdrawals, transfers, and deposits.
Tobj::TransactionCurrent
is an example of an object
interface provided by the Oracle Tuxedo software.
Parent topic: O
1.15.11 Object Management Group (OMG)
(CORBA) An international organization that establishes industry guidelines and object management specifications to provide a common framework for object-oriented application development. The OMG Common Object Request Broker Architecture specifies the CORBA object model.
Parent topic: O
1.15.12 object model
(CORBA) The model that reflects as objects the overall design of an application or system.
Parent topic: O
1.15.13 object reference
(CORBA) An identifier that uniquely specifies an instance of an object within a distributed ORB system.
Parent topic: O
1.15.15 object system
(CORBA) A software system that stores, manipulates, and uses a collection of objects according to a set of system-specific standards. An object system specifies how information is exchanged between objects, and how objects are implemented in accordance to an object model, such as CORBA COM, EJB, and RMI.
Parent topic: O
1.15.17 octet
- A byte that consists of eight bits.
- A byte composed of eight binary elements.
Parent topic: O
1.15.21 OMG IDL
(CORBA) Object Management Group Interface Definition Language. A definition language specified by the OMG for describing an object's interface (that is, the characteristics and behavior of an object, including the operations that can be performed on the object).
See also operation.
Parent topic: O
1.15.22 online transaction processing (OLTP)
- A form of data processing in which users at terminals or workstations send messages to application programs, which update databases in real time.
- The execution of units of work in a performance-critical environment that appears to the user as immediate; real-time; usually having internal recoverability, history-keeping, and consistency-assurance features.
Parent topic: O
1.15.23 open framework
A software infrastructure in which developers can easily remove and replace software components in a plug-and-play fashion.
Parent topic: O
1.15.24 open system
A system that implements specified common standards across different computer vendors. Implementing open system standards for communication allows computers from different vendors to communicate with each other.
Parent topic: O
1.15.25 Open Systems Interconnect Commitment, Concurrency, and Recovery (OSI CCR)
- This protocol is an ISO standard (ISOIIEC 9804) for services and protocols that are used to commit or roll back global transaction branches.
- A software implementation of the ISOIIEC 9804 standard.
Parent topic: O
1.15.26 Open Systems Interconnection (OSI)
A consortium that facilitates communication among different types of computer systems.
Parent topic: O
1.15.27 Open Systems Interconnect Transaction Processing (OSI TP)
- An ISO standard (ISOIIEC 10026-2) for services and protocols that are used to establish dialogs and pass messages between clients and service routines on different computers.
- A software implementation of the ISOIIEC 10026-2 standard.
Parent topic: O
1.15.28 operation
(CORBA) An action that can be performed by an object. For example, you can request several operations on a file object, including opening, closing, reading, and printing.
1.15.30 ORBMain module
(CORBA) The main procedure of the Oracle Tuxedo server
application process. The Oracle Tuxedo software provides the
ORBMain module. You do not modify this module. The server
application build procedure automatically builds the ORBMain module
into the server application process. The ORBMain module is provided
by the buildobjserver
command for servers using the TP
Framework. Note that joint client/server applications must provide
their own main procedure and must use the -P
switch on
the buildobjclient
command.
Parent topic: O
1.15.31 Oracle Administration Console
A Web-based, graphical user interface for the remote administration of Oracle Tuxedo applications (running in either ATMI or CORBA environments). It is delivered as a Java applet that you can download into your Internet browser.
See also Oracle Tuxedo system.
Parent topic: O
1.15.34 Oracle Tuxedo-WebLogic Connectivity
Formerly JoltWAS for WebLogic. A customized version of Oracle Tuxedo-JSE Connectivity for WebLogic.
Parent topic: O
1.15.38 Oracle Tuxedo domain
An Oracle Tuxedo domain consists of an Oracle Tuxedo application running one or more business applications. A single domain is defined in one configuration file and is administered as a single entity. A domain can be connected to other Oracle Tuxedo domains through the Domains feature.
Parent topic: O
1.15.39 Oracle Tuxedo Domains
An Oracle Tuxedo component that extends the Oracle Tuxedo system client/server model to provide transaction interoperability across TP domains. This extension preserves the client/server model and the ATMI interface by making access to services on a remote domain (and service requests from a remote domain) transparent to both the application programmer and user.
Parent topic: O
1.15.40 Oracle Tuxedo server
A program that performs a task requested of it by a client application.
See also server.
Parent topic: O
1.15.41 Oracle Tuxedo system
A robust e-commerce platform from Oracle Systems, Inc. for developing and deploying business-critical client/server applications. It handles distributed transaction processing, application messaging, and the full complement of services necessary to build and run enterprise-wide applications.
Parent topic: O
1.15.42 Oracle Wrapper Callbacks API
(CORBA) An application programming interface designed to simplify the implementation of callback objects for CORBA joint client/server applications. The API provides specific methods for defining, starting, stopping, and destroying callbacks objects.
See also application programming interface (API), Callbacks Wrapper object, CORBA callback object, and joint client/server application.
Parent topic: O
1.15.47 outbound IIOP
(CORBA) A feature of the Oracle Tuxedo software that supports client callbacks. Outbound IIOP adds the outbound half-gateway to the ISL/ISH. The Oracle Tuxedo system supports the following three types of outbound IIOP:
- asymmetric outbound IIOP
- Outbound IIOP, via a second connection, to joint client/server applications that are not connected to an ISH. This feature of the Oracle Tuxedo software is supported for GIOP 1.0, GIOP 1.1, and GIOP 1.2 client applications, server applications, and joint client/server applications.
- bidirectional outbound IIOP
- Outbound IIOP to a remote joint client/server application that is connected to an ISH. The outbound callback reuses the same connection initially used by the joint client/server for inbound calls. This feature is supported only for Oracle Tuxedo C++ GIOP 1.2 client applications, server applications, and joint client/server applications.
- dual-paired connections outbound IIOP
- Outbound IIOP to a remote joint client/server application that is connected to an ISH. Unlike bidirectional outbound IIOP, the outbound callback uses a second connection that is separate from the connection initially used by the joint client/server application for inbound calls. This feature of the Oracle Tuxedo software is supported for GIOP 1.0, GIOP 1.1, and GIOP 1.2 client applications, server applications, and joint client/server applications.
Parent topic: O
1.15.48 outgoing connection
A connection from the local gateway that has been generated as a
result of one of the following: an automatic retry of the
connection, an initial request to a remote domain, or a
dmadmin(1)
connect
command sequence
issued by the administrator.
Parent topic: O
1.15.49 out-of-band data
Data delivered by the Oracle Tuxedo system outside the normal client/server communications channels supported by the Oracle Tuxedo system.
Parent topic: O
1.16 P
This section describes glossary information about alphabet P.
- parallel data circuits
- partition
- pass phrase
- passivation
- persistent object
- PID
- PIDL (Pseudo-IDL)
- PKCS-7
- plaintext
- platform
- POA
- policy
- polling
- portability
- Portable Object Adapter (POA)
- port number
- pragma
- precommit
- primary remote domain
- principal
- Principal Authenticator object
- private key
- private MIB
- procedure
- process ID (PID)
- Process-Entity design pattern
- profile
- protocol
- provider
- Pseudo-IDL
- pseudo-object
- public key
- public key algorithm
- Public-Key Cryptography Standard 7 (PKCS-7)
- public key encryption
- public key security
- publish
Parent topic: Glossary
1.16.1 parallel data circuits
Parallel data circuits enable data to flow simultaneously on
more than one circuit. When you configure parallel data circuits,
network traffic is scheduled over the circuit with the largest
network group number (NETGRPNO
). When this circuit is
busy, the traffic is scheduled automatically over the circuit with
the next lower network group number. When all circuits are busy,
data is queued until a circuit is available.
Parent topic: P
1.16.2 partition
A state in which one or more active nodes of a networked application are unable to contact other active nodes because of a problem such as a LAN failure.
Parent topic: P
1.16.3 pass phrase
A string of alphanumeric and other characters, usually provided by a human being to provide identity. A pass phrase is typically longer than a password. It should contain more than one word, with mixed uppercase and lowercase letters, plus punctuation characters. A pass phrase should be easy to remember, but harder for an intruder to guess than a single password.
Parent topic: P
1.16.4 passivation
The deactivation of a bean's state. In the case of a stateful session bean or an entity bean, passivation typically involves writing the bean's state data to durable storage. This state can be restored at a later time during reactivation. For stateful session and entity beans, passivation causes object deactivation.
See Also:
object deactivation.Parent topic: P
1.16.5 persistent object
An object that exists independently of the process within which its object reference was created.
Parent topic: P
1.16.7 PIDL (Pseudo-IDL)
(CORBA) The interface definition language for describing a CORBA pseudo-object. Each language mapping, including the mapping from IDL to the C++ or Java programming language, describes how pseudo-objects are mapped to language-specific constructs. PIDL mappings may or may not follow the rules that apply to mapping regular CORBA objects.
Parent topic: P
1.16.10 platform
The combination of hardware, operating system, and windowing system software that supports an application.
Parent topic: P
1.16.13 polling
(CORBA) An activity in which a manager interrogates an agent at periodic intervals, checking to determine whether a managed object value has crossed a specified threshold. The agent reports the values of specified managed objects.
Parent topic: P
1.16.14 portability
The ease with which developers can move an application from one platform to another without costly reengineering.
Parent topic: P
1.16.15 Portable Object Adapter (POA)
(CORBA) A run-time library of functions that are built into the CORBA server application executable image. The POA creates and manages object references to all objects used by the application. In addition, the POA manages object state and provides the infrastructure for the support of persistent objects and the portability of object implementations between different ORB products.
The Oracle Tuxedo server application procedure automatically builds the POA into the server application. The Oracle Tuxedo TP Framework automatically handles all the Oracle Tuxedo server application interactions with the POA. Note that joint client/server applications interact directly with the POA.
Parent topic: P
1.16.16 port number
The entity on a TCP/IP host that identifies a logical communications channel and distinguishes one connection from another. A TCP/IP server “listens” for incoming connection requests at a designated port. A TCP/IP client initiates a connection with the server by specifying the host’s IP address and the server’s designated port number.
Parent topic: P
1.16.17 pragma
(CORBA) A directive to an IDL compiler to perform specific operations when compiling an IDL file. For example, the pragma Prefix affects the Interface Repository ID for an IDL interface.
Parent topic: P
1.16.18 precommit
The process (used by resource managers to make data recoverable) of copying data changes to stable storage.
Parent topic: P
1.16.19 primary remote domain
The remote domain with the highest priority. It is used whenever it is available.
Parent topic: P
1.16.20 principal
(ATMI) For security purposes, an authenticated user.
(CORBA) A user or programmatic entity with the ability to use the resources of a system.
Parent topic: P
1.16.21 Principal Authenticator object
(CORBA) The object that is visible to the application responsible for the creation of Credentials for a given principal. A user or principal that requires authentication, but has not been authenticated, uses the Principal Authenticator object.
Parent topic: P
1.16.22 private key
An encryption/decryption key known only to the party or parties that exchange secure messages.
Parent topic: P
1.16.24 procedure
A sequence of instructions (to a computer) for performing a particular task.
Parent topic: P
1.16.26 Process-Entity design pattern
The design pattern that can be used to increase performance in situations where a client application needs to interact with database records stored on a server machine.
Parent topic: P
1.16.27 profile
A set of information about a client or a user. The profile provides information the server might require to recognize the client or the user.
Parent topic: P
1.16.28 protocol
- A set of rules that govern the format and timing of messages sent and received over a communication link. TCP/IP is an example of a network protocol.
- The set of rules followed by two systems to communicate and exchange information.
Parent topic: P
1.16.29 provider
The communications product supplying networking facilities through level 4 of the OSI communications protocol.
Parent topic: P
1.16.31 pseudo-object
(CORBA) An object similar to a CORBA object in that it is described in IDL however, unlike a CORBA object, it cannot be passed using its object reference, nor can it be narrowed or stringified.
The DII interfaces are examples of pseudo-objects, although the DII interfaces are implemented as libraries and are more accurately described in OMG specifications as pseudo-objects with IDL interfaces. The IDL for pseudo-objects is called PIDL, indicating that a pseudo-object is being defined.
See Also:
PIDL (Pseudo-IDL).Parent topic: P
1.16.32 public key
A value provided by a certificate authority that, combined with a private key, can be used to encrypt and decrypt messages.
Parent topic: P
1.16.33 public key algorithm
An algorithm for encrypting or decrypting data with a public or private key. A private key is typically used to encrypt a message digest; in such an application, the public key algorithm is called a message digest encryption algorithm. A public key is typically used to encrypt a content-encryption key, or session key; in such an application, the public key algorithm is called a key-encryption algorithm. An example of a public key algorithm is RSA.
Parent topic: P
1.16.34 Public-Key Cryptography Standard 7 (PKCS-7)
One of a set of Public-Key Cryptography Standards developed by RSA Laboratories in cooperation with an informal consortium, originally including Apple, Microsoft, DEC, Lotus, Sun and MIT. PKCS-7 defines a general syntax for messages that include cryptographic enhancements such as digital signatures and encryption. Oracle Tuxedo public key security complies with the PKCS-7 standard.
Parent topic: P
1.16.35 public key encryption
A technique that uses a pair of asymmetric keys for encryption and decryption. Each pair of keys consists of a public key and a private key. The public key is made public by distributing it widely. The private key is never distributed; it is always kept secret.
Parent topic: P
1.16.36 public key security
Oracle Tuxedo security built on the public key encryption technology. Uses public key encryption to establish end-to-end digital signing and data privacy between Oracle Tuxedo application clients and servers. Complies with the PKCS-7 standard.
Parent topic: P
1.16.37 publish
The act of pushing a structured event into the event channel to make the event available to subscribers.
Parent topic: P
1.17 Q
This section describes glossary information about alphabet Q.
1.17.1 queue
A simple data structure for managing the time-staged delivery of requests to servers. Queued elements may be sorted in some order of priority. Clients insert items in the queue and servers remove items from the queue, as soon as possible, in batch, or periodically.
Parent topic: Q
1.18 R
This section describes glossary information about alphabet R.
- RC2
- RC4
- ReceivedCredentials object
- RECONNECT client
- record
- recover
- recovery
- relational database
- relative OID
- reliability
- remote
- remote client
- remote client application
- remote domain
- remote factory
- remote file sharing (RFS)
- remote gateway
- remote joint client/server applications
- Remote Method Invocation (RMI)
- remote node
- remote procedure call (RPC)
- remote service
- remote service fan-out
- remote service name
- request
- requester
- request-level interceptor
- requestor
- request/response communication
- request/response server
- request/response service
- Requests For Comments (RFC)
- resource manager (RM)
- resource manager instance
- response time
- RFC
- RM
- roll back
- rollback
- RPC
- RSA
- RTQ
- run-time trace
Parent topic: Glossary
1.18.1 RC2
Rivest’s Cipher 2. A variable key-size block cipher with a key size range of 40 to 128 bits. It is faster than DES and is exportable with a key size of 40 bits. A 56-bit key size is allowed for foreign subsidiaries and overseas offices of United States companies. In the United States, RC2 can be used with keys of virtually unlimited length, although Oracle Tuxedo public key security restricts the key length to 128 bits.
Parent topic: R
1.18.2 RC4
Rivest’s Cipher 4. A variable key-size stream cipher with byte-oriented operations. RC4 is a symmetric or private key system that is about 10 times faster than DES and is exportable with a key size of 56 bits. In the United States, RC4 can be used with keys of virtually unlimited length, although Oracle Tuxedo link-level encryption restricts the key length to 128 bits.
Parent topic: R
1.18.3 ReceivedCredentials object
(CORBA) The object that represents the secure association to the application. The ReceivedCredentials object contains the properties of that association.
1.18.4 RECONNECT client
A Jolt client whose network connection can be torn down after being idle for a specific amount of time, but whose user context in Oracle Tuxedo remains active.
Parent topic: R
1.18.5 record
Input or output data as it exists outside the local or remote Oracle Tuxedo regions, or on different kinds of systems.
Parent topic: R
1.18.6 recover
A request from a coordinator or a participant to complete an identified transaction.
Parent topic: R
1.18.7 recovery
In transaction systems, after a failure, the ability to restore the system to the most recently committed, and therefore consistent, state. In distributed systems, recovery may involve resynchronizing several distributed components. Once a system has been recovered, processing can resume, and transactions aborted as a result of the failure can be resubmitted.
Parent topic: R
1.18.8 relational database
A database accessed and organized according to the relationships between data items. Relationships are expressed by means of tables that allow the accessing of items with matching attributes. The access path is determined at the time of access.
Parent topic: R
1.18.9 relative OID
(CORBA) An object identifier (OID) that specifies a path to a managed object only relative to some node in the OID tree below root.
Parent topic: R
1.18.10 reliability
The extent to which a system (or part of a system) produces the correct output on repeated trials (without unintended side effects), while meeting the performance specification.
Parent topic: R
1.18.11 remote
Describes a service or a computer that is available to a client over the network.
Parent topic: R
1.18.14 remote domain
(ATMI) View of an application that is accessed through a local domain gateway group.
Parent topic: R
1.18.15 remote factory
(CORBA) A factory object that exists in a remote domain that is made available to the application through an Oracle Tuxedo factory finder.
Parent topic: R
1.18.16 remote file sharing (RFS)
A UNIX system capability that provides access to remote files over a network.
Parent topic: R
1.18.17 remote gateway
The functionality of a specific gateway group within a remote Oracle Tuxedo application.
Parent topic: R
1.18.18 remote joint client/server applications
(CORBA) A CORBA joint client/server application that is located outside an Oracle Tuxedo domain. The remote joint client/server application does not use the Oracle Tuxedo TP Framework and requires more direct interaction between the client application and the ORB. Remote joint client/server applications are built with the buildobjclient
command or with the Java client application commands.
Parent topic: R
1.18.19 Remote Method Invocation (RMI)
(CORBA) A Java-specific API for accessing remote objects.
Parent topic: R
1.18.20 remote node
Any computer in the network other than the computer to which the user’s workstation is connected.
Parent topic: R
1.18.21 remote procedure call (RPC)
A local procedure call that is executed in a non-local program or address space. Enables application logic to be split between a client and a server in the way that best uses available resources.
Parent topic: R
1.18.22 remote service
A service of a remote domain that is made available to the local application through a domain gateway group.
Parent topic: R
1.18.23 remote service fan-out
A configuration in which a remote service that is imported from multiple remote domains is advertised only once by a local domain gateway in the Oracle Tuxedo bulletin board. A remote service can be fanned-out by a gateway server that imports the same service name from multiple remote domains. Fan-out is achieved through the gateway shared memory.
Parent topic: R
1.18.24 remote service name
The name (between 1 and 16 characters long prior to 11.1.1.1.0. It is 127 characters or less since 11.1.1.1.0) of a service offered by a remote system that can be accessed through a remote gateway.
Parent topic: R
1.18.25 request
A message sent by a client that identifies an operation to be performed. In a CORBA environment, the message is sent to the Object Request Broker and is relayed to the appropriate server application, which fulfills the request.
1.18.26 requester
- A process that receives messages from clients, converts these messages to a common internal form, determines the appropriate server or servers for the transaction request, and forwards the request to a server.
- A generic term for a client or server that is acting as a client.
Parent topic: R
1.18.27 request-level interceptor
(CORBA) A user-written application that is inserted into the invocation path between the client and server components of an Oracle Tuxedo application, and that is invoked automatically by the ORB on each object invocation. A request-level interceptor allows services such as security or monitoring components to be added to an object invocation, either at the client or the server end. Request-level interceptors facilitate the use of third-party security plug-in software.
Parent topic: R
1.18.28 requestor
A process that receives messages from clients, converts these messages to a common internal form, determines the appropriate server or servers for the transaction request, and forwards the request to a server.
Parent topic: R
1.18.29 request/response communication
Communication characterized by a single request matched to a single response message. When this type of communication is used, a client requests a task, and a server performs the task and sends a response to the client. Request/response communication may be conducted synchronously or asynchronously.
Parent topic: R
1.18.31 request/response service
A service initiated by a request from a client. The service routine receives a single request and provides (at most) a single reply. A request/response service is handled like a procedure and has the following properties: it is executed until completion, it does not have any dialog with the requestor, and it sends back a return-value to the requester. For a requester, the execution of a request/response service can be synchronous or asynchronous.
Parent topic: R
1.18.32 Requests For Comments (RFC)
Documents in which Internet standards, as approved by the Internet Architecture Board (IAB), are published.
Parent topic: R
1.18.33 resource manager (RM)
An interface and associated software that provides access to a collection of information and processes; for example, a database management system. Resource managers provide transaction capabilities and permanence of actions; they are the entities accessed and controlled within a global transaction.
See Also:
transaction manager (TM).Parent topic: R
1.18.34 resource manager instance
A particular instance or occurrence of a resource manager. There may be many occurrences or instances of the same or different resource managers within a global transaction, each managing different data. Each resource manager instance is considered to be autonomous, in full control of local access (for both local and global transactions), administration, and so forth.
Parent topic: R
1.18.35 response time
The elapsed time between entering an inquiry or request and receiving a response.
Parent topic: R
1.18.38 roll back
To terminate a transaction in such a way that all resources updated within a transaction revert to their original (that is, pretransactional) state.
Parent topic: R
1.18.39 rollback
The event that ends a transaction and nullifies or undoes all changes to resources that were specified during that transaction.
Parent topic: R
1.18.41 RSA
A public key algorithm invented by Rivest, Shamir, and Adleman. RSA is widely employed for digital signatures and encryption. The RSA algorithm is asymmetric: a private key is closely held by its owner, while a corresponding public key may be widely disseminated.
Parent topic: R
1.18.42 RTQ
Component of the Oracle TOP END system that is equivalent to the /Q component of the Oracle Tuxedo system.
Parent topic: R
1.18.43 run-time trace
An Oracle Tuxedo feature that enables users to monitor application-to-application transactions and, if necessary, troubleshoot distributed applications under development or during production. Also, it allows users to pinpoint problems to any hardware, operating system, network, or application code.
Parent topic: R
1.19 S
This section describes glossary information about alphabet S.
- scalability
- scalar object
- SCM
- scope
- Secure Sockets Layer (SSL)
- security
- SecurityCurrent
- security policy
- security principal
- Security Service
- Security Service Provider Interface (SSPI)
- servant
- servant factory
- servant pooling
- server
- server abstraction
- server application
- Server Description File
- server group
- server ID
- Server object
- server-to-server communication
- service
- service code
- Service Control Manager (SCM)
- service request
- service routine
- SERVICES section
- servlet
- session bean
- session key
- SHA-1
- shared connection transaction
- SHM model
- simple events
- Simple Network Management Protocol (SNMP)
- single threading
- singleton object
- skeleton
- SMUX
- SMUX subagent
- SNMP
- SNMP agent
- socket
- socket descriptor
- socket ID
- socket number
- SQL
- standard MIB
- StarLAN
- state
- stateful application
- stateful session bean
- stateless application
- stateless session bean
- STRING buffer
- stroid
- Structured Event
- Structured Query Language
- subagent
- subroutine
- subscribe
- subscriber
- symmetric key algorithm
- synchronization
- synchronous
- synchronous communication
- synchronous process
- system
- system administration
- system administrator
- system manager
- system operations
Parent topic: Glossary
1.19.1 scalability
The extent to which developers can apply a solution to problems of different sizes. Ideally, a solution should work well across the entire range of complexity. In practice, however, there are usually simpler solutions for problems of lower complexity.
Parent topic: S
1.19.2 scalar object
A MIB leaf object—that is, a MIB object that does not contain other MIB objects below it in the OID tree—that can have only one instance.
Parent topic: S
1.19.5 Secure Sockets Layer (SSL)
A transport-level technology developed by Netscape for authentication and data encryption between two communicating applications, based on the use of public key technology.
See Also:
authentication.Parent topic: S
1.19.6 security
The protection of information from unauthorized modification or disclosure and the protection of resources from unauthorized use.
Parent topic: S
1.19.7 SecurityCurrent
(CORBA) The object that provides access to the security features of the system.
Note:
object.Parent topic: S
1.19.8 security policy
(CORBA) A set of security rules for an application that are defined and enforced by a security administrator. A security policy has a collection of users (or principals) and uses a well-defined authentication protocol for authenticating users. In addition, groups may be used to simplify the setting of security rules.
When using EJBs, a security policy defines the set of permissions in Java that determine which operations in a JVM are accessible.
Parent topic: S
1.19.9 security principal
An entity that is known to, and can be authenticated by, the security system.
Parent topic: S
1.19.11 Security Service Provider Interface (SSPI)
(CORBA) An interface that allows security components provided by multiple vendors to be integrated with the Oracle Tuxedo Security Service.
Parent topic: S
1.19.12 servant
(CORBA) The instance of the class that implements the interface defined in an application’s OMG IDL statements. A servant contains the method code that implements the operations of one or more CORBA objects.
Parent topic: S
1.19.13 servant factory
(CORBA) A feature of Oracle Tuxedo Java server applications for automatically instantiating servants. Unlike Oracle Tuxedo C++ servers, Java servers do not need to provide a callback for instantiating servants.
Parent topic: S
1.19.14 servant pooling
(CORBA) A feature of the Oracle Tuxedo (C++) software that gives your Oracle Tuxedo server application the opportunity to keep a servant in memory after the servant’s association with a specific object ID has been broken.
Parent topic: S
1.19.15 server
A software program that provides a service in a client/server architecture by performing the following steps:
- Receives a request from a client (or another serving playing the role of a client) for a particular service.
- Dispatches a service routine to fulfill the request.
- Sends a response to the original requester, indicating whether the requested service has been performed successfully and conveying the results of the service that has been performed.
1.19.16 server abstraction
Applications combine their service routines with the Oracle
Tuxedo system main()
in building a server process. The
Oracle Tuxedo system’s main()
provides server
initialization and termination, and receives incoming requests and
dispatches them to service routines. All of this processing is
transparent to applications.
Parent topic: S
1.19.17 server application
(CORBA) A program, written for use with the Oracle Tuxedo software, that performs a task requested of it by a client application.
See Also:
local factory.Parent topic: S
1.19.18 Server Description File
(CORBA) The file within which you assign the default
CORBA activation and transaction policies for the interfaces
implemented in your Java server application. This XML file also
contains a server declaration, which includes the name of the
server implementation class and the name of the server descriptor
file. You can also identify the Java class files that comprise the
server application’s Java ARchive (.jar
) file.
See JAR files (.jar).
Parent topic: S
1.19.20 server ID
An identifier for a single server. No two servers can operate at the same time with the same server ID.
Parent topic: S
1.19.21 Server object
(CORBA) The object that performs server application initialization functions, creates one or more servants, and performs server application shutdown and cleanup procedures.
1.19.22 server-to-server communication
(CORBA) The feature of the Oracle Tuxedo software that allows applications to invoke distributed objects and handle invocations from those distributed objects (referred to as callbacks). The CORBA or RMI objects can be either inside or outside an Oracle Tuxedo domain.
Parent topic: S
1.19.23 service
- An application routine available for request by a client in the system.
- A module of application code that carries out a service request.
Parent topic: S
1.19.24 service code
The name associated with a service offered remotely through a tlisten process.
Parent topic: S
1.19.25 Service Control Manager (SCM)
A service control manager (SCM) is started at the beginning of a Windows system. A remote procedure call (RPC) server allows programs to configure and control remote services.
Parent topic: S
1.19.26 service request
A request initiated by a requester process that asks for the invocation of a service.
Parent topic: S
1.19.27 service routine
An application module that performs one or more specific services on behalf of clients. The structure of service routines (the mechanism by which they are called and terminated) is defined by the XATMI interface specification.
Parent topic: S
1.19.28 SERVICES section
The section of the configuration file in which services are defined.
Parent topic: S
1.19.29 servlet
A Java replacement for CGI. Servlets are Java classes that are invoked by a Web server in response to HTTP requests. Servlets generate Hypertext Markup Language (HTML) as their output.
(Jolt) An applet that runs on a server. This term usually refers to a Java applet that runs in a Web server environment. This is analogous to a Java applet that runs in a Web browser environment.
Parent topic: S
1.19.30 session bean
(Jolt) A nonpersistent object that implements some business logic running on the server. A session bean can be thought of as a logical extension of the client that runs on the server. A session bean is not shared among multiple clients.
Parent topic: S
1.19.31 session key
Used with the symmetric key algorithm in which encryption and decryption involve the same key: the session key. Data encrypted with a session key can only be decrypted with the same session key.
Parent topic: S
1.19.32 SHA-1
Secure Hash Algorithm 1. An algorithm specified in the Secure Hash Standard that takes as input a message of any length greater than 264 bits and produces as output a 160-bit message digest, or hash value, of the input. It is slightly slower than MD5, but the larger message digest makes it more secure against brute-force collision and inversion attacks. The SHA-1 algorithm is intended for digital signature applications, where a large file must be compressed in a secure manner before being encrypted with a private key under a public-key cryptosystem such as PKCS.
Parent topic: S
1.19.33 shared connection transaction
A transaction that appears to span processes by using a single, shared connection to a single database.
Parent topic: S
1.19.34 SHM model
An Oracle Tuxedo application that runs entirely on a single computer, even if that computer is a symmetric multiprocessor.
Parent topic: S
1.19.35 simple events
The Oracle Systems, Inc. proprietary events interface. As the name implies, this interface is designed to be simple to use.
Parent topic: S
1.19.36 Simple Network Management Protocol (SNMP)
A de facto standard network management protocol developed by the Internet community.
Parent topic: S
1.19.37 single threading
The complete execution of a program. Processing of one transaction is completed before another transaction is started.
Parent topic: S
1.19.38 singleton object
(CORBA) An object that can appear only once in a process address space.
Parent topic: S
1.19.39 skeleton
(CORBA) A public abstract class generated by an IDL compiler that provides the ORB with information required to dispatch method invocations to servant objects. A server skeleton, like a client stub, is specific to the IDL interface from which it is generated. A server skeleton is the server-side analog to a client stub. Client stubs and skeletons are used by ORBs in static invocation.
Parent topic: S
1.19.40 SMUX
Stands for SNMP multiplexing. A protocol for master agent/subagent communication defined by RFC 1227.
Parent topic: S
1.19.41 SMUX subagent
The SNMP Multiplexing (SMUX) protocol allows the creation of subagents that communicate with the agent and resolve management operations for specific objects in the MIB module.
Parent topic: S
1.19.43 SNMP agent
An agent that uses the SNMP protocol to exchange data with a system manager.
Parent topic: S
1.19.44 socket
An endpoint of communication to which a name may be bound. The socket interface is a network access method supported by the Oracle Tuxedo system. The logical end point of a TCP/IP connection. An application accesses a TCP/IP connection through a socket.
Parent topic: S
1.19.45 socket descriptor
A TCP/IP-assigned number that uniquely identifies a socket and TCP/IP connection. An application must specify the socket descriptor in TCP/IP API calls to identify the socket/connection.
Parent topic: S
1.19.48 SQL
Structured Query Language. A non-procedural language for defining and accessing relational databases. SQL has become the industry standard database language.
Parent topic: S
1.19.49 standard MIB
A MIB developed as a standard by the Internet community. Examples are MIB I and MIB II.
Parent topic: S
1.19.51 state
(ATMI) The situation of a conversation from the point of view of one of the participating transactions. The conversation state determines the commands that a transaction can validly issue. The state of each transaction changes dynamically in the course of conversation.
(CORBA) A description of the current situation of an object. State is typically described in memory.
Parent topic: S
1.19.52 stateful application
An application that retains state information in memory after a service or an operation has been performed.
Parent topic: S
1.19.53 stateful session bean
(CORBA) A bean that preserves information about the state of its conversation with the client. This conversation may consist of several calls that modify the conversation state.
Parent topic: S
1.19.54 stateless application
An application that flushes state information from memory after a service or an operation has been performed.
Parent topic: S
1.19.55 stateless session bean
(CORBA) A bean that does not save information about the state of its conversation with the client.
Parent topic: S
1.19.56 STRING buffer
(ATMI) A data structure that is an array of non-null characters terminated by the null character. It is a self-describing buffer.
Parent topic: S
1.19.57 stroid
(CORBA) An object ID represented as a string.
See Also:
object identifier (OID).Parent topic: S
1.19.58 Structured Event
(CORBA) A COS Structured Event as defined by the CORBAservices Notification Service. A Structured Event contains a Fixed header, Variable header, Filterable body parts, and a Remaining body.
Parent topic: S
1.19.60 subagent
A component of the master agent protocol that fulfills requests and replies to the master agent.
Parent topic: S
1.19.61 subroutine
(ATMI) A sequenced set of instructions that can be used in one or more programs and at one or more points in a program. The execution of a subroutine is usually invoked by a call.
Parent topic: S
1.19.63 subscriber
An application program that subscribes to an event or set of events, and declares what action should take place when an event is posted.
Parent topic: S
1.19.64 symmetric key algorithm
An algorithm for encrypting or decrypting data with the same key, known as a session key. A random number generator creates a new session key for each communication, which makes it difficult for a would-be attacker to reuse previous communications.
Examples of symmetric key algorithms are DES, RC2, and RC4.
Parent topic: S
1.19.65 synchronization
A coordinated commitment control process between communicating transactions that ensures that all logically related updates to recoverable resources are completed or that all are backed out.
Parent topic: S
1.19.66 synchronous
- Pertaining to an event that happens, exists, or arises at precisely the same time as another event.
- Pertaining to an operation that occurs regularly or predictably with regard to the occurrence of a specified event in another process; for example, the calling of an input/output routine that receives control at a precoded location in a program.
Parent topic: S
1.19.67 synchronous communication
A method of transmitting data using a timing signal. With this form of communication, when one piece of software sends a message to another piece of software, the originating software must wait until the service provider completes the request before it can continue.
Parent topic: S
1.19.68 synchronous process
A process that cannot be executed independently of other processes. When a request is processed synchronously, the client must wait until the service provider completes the request before continuing.
Parent topic: S
1.19.69 system
Oracle TOP END term that is equivalent to Tuxedo domain.
See Also:
Tuxedo domain.Parent topic: S
1.19.70 system administration
- The preparation of an instance of a system for use in a particular setting or installation.
- Changing the system as the installation changes. This term is often used in a way that includes system operations as well.
Parent topic: S
1.19.72 system manager
The part of a network management system that requests data from an agent and takes actions based on that data.
Parent topic: S
1.19.73 system operations
Tasks that need to be performed regularly for a system. Examples are backing up and restoring data and logs, monitoring the system for error conditions, and so forth.
Parent topic: S
1.20 T
This section describes glossary information about alphabet T.
- task
- TCP/IP
- TDomain gateway
- terminal
- thread
- threading
- thread-per-object concurrency model
- thread-per-request concurrency model
- thread pool
- three-tier client/server architecture
- tie class
- TLI
- tlisten
- TLOG
- TM
- TMFFNAME
- TMIFRSVR
- TMS
- token
- TP
- TP Framework
- TP monitor
- TP protocols
- TPSUT
- transaction
- transaction coordinator
- TransactionCurrent
- transaction log (TLOG)
- transaction manager (TM)
- transaction policy
- Transaction Manager Server (TMS)
- transaction processing (TP)
- transaction processing monitor (TP monitor)
- transaction processing protocols (TP protocols)
- transaction processing service user title (TPSUT)
- Transaction Service
- transactions per second (TPS)
- transient object
- translation
- Transmission Control Protocol/Internet Protocol (TCP/IP)
- transport interface
- Transport Layer Interface (TLI)
- transport provider
- trap
- TUXCONFIG file
- Tuxedo
- Tuxedo domain
- Tuxedo MIB
- Tuxedo remote client application
- two-phase commit (2PC)
- two-tier client/server
- TX interface
- type conversion
- typed buffer
Parent topic: Glossary
1.20.3 TDomain gateway
The domain gateway that handles communication between two Oracle Tuxedo domains.
See Also:
domain gateway.Parent topic: T
1.20.4 terminal
- A computer monitor.
- A point in a system or communication network at which data can either enter or leave.
Parent topic: T
1.20.5 thread
The basic unit of program execution. A process can have several threads running concurrently. Each thread can be performing a different job, such as waiting for events or performing a time-consuming task that the program does not need to complete before the program continues. Generally, when a thread has finished performing its task, the thread is suspended or destroyed.
See Also:
worker thread.Parent topic: T
1.20.6 threading
An operating system capability that allows a single process to be divided into multiple entities, each of which executes independently while sharing a common address space.
Parent topic: T
1.20.7 thread-per-object concurrency model
(CORBA) A threading model supported by a multithreaded CORBA server application. In the thread-per-object concurrency model, each active object in the server process is associated with a single thread at any one time. Each request for an object establishes an association between a dispatch thread and the object.
See Also:
multithreaded CORBA server application.Parent topic: T
1.20.8 thread-per-request concurrency model
(CORBA) A threading model supported by a multithreaded CORBA server application. In the thread-per-request concurrency model, each request from a client is processed in a different thread of control.
See Also:
multithreaded CORBA server application.Parent topic: T
1.20.9 thread pool
(CORBA) A means to reduce the cost of managing threads in multithreaded CORBA server implementations. At startup and as needed, threads are created, assigned, and released to a pool of available threads where the thread waits until it is needed again to process future requests. Thread pools can be used to support any of the threading models. See also multithreaded CORBA server application.
Parent topic: T
1.20.10 three-tier client/server architecture
An implementation of n-tier client/server architecture.
Parent topic: T
1.20.11 tie class
(CORBA) Classes that are generated by the IDL compiler when the delegation-based approach to programming is used. The delegation-based approach to programming is used when the overhead of inheritance is too high or cannot be used. For example, due to the invasive nature of inheritance, implementing objects using existing legacy code might be impossible if inheritance for some global class were required.
In the delegation-based approach, the implementation does not inherit from the POA skeleton class. Instead, a wrapper class inherits from the POA skeleton and delegates upcalls to an implementation that is coded as required. This wrapper class, called a tie class, is generated by the IDL compiler, along with the same skeleton class used for the inheritance approach. Like the skeleton, the tie class provides a method corresponding to each OMG IDL operation for the associated interface; however, you may need to modify the tie class to adapt it to the interface of your legacy object. The name of the generated tie class is the same as the generated skeleton class, with the addition that the string _tie is appended to the end of the class name.
Parent topic: T
1.20.13 tlisten
A network-independent listener process that runs as a daemon process and provides remote service connections for other Oracle Tuxedo system processes.
Parent topic: T
1.20.16 TMFFNAME
(CORBA) A server application provided with Oracle Tuxedo software that runs the FactoryFinder and supporting NameManager services that maintain a mapping of application-supplied names to object references.
Parent topic: T
1.20.17 TMIFRSVR
(CORBA) A server application provided with Oracle Tuxedo software for accessing the Interface Repository. The API is a subset of the Interface Repository API defined by CORBA. For a description of the Interface Repository API, see the C++ Programming Reference.
Parent topic: T
1.20.19 token
An individual element in the message definition block, such as the command or the subsystem name.
Parent topic: T
1.20.25 transaction
- A complete unit of work that transforms a database from one consistent state to another. In DTP, a transaction can include multiple units of work performed on one or more systems.
- A logical construct through which applications perform work on shared resources (for example, databases). The work done on behalf of the transaction conforms to the four ACID properties: atomicity, consistency, isolation, and durability.
See Also:
distributed transaction processing (DTP).Parent topic: T
1.20.26 transaction coordinator
A system software component that provides the infrastructure that guarantees the integrity and consistency of an operation and the data involved in a transaction.
See Also:
transaction manager (TM).Parent topic: T
1.20.27 TransactionCurrent
(CORBA) An object that is used to manage transactions. The
TransactionCurrent object supports all of the methods of the
Current object in the CosTransactions
module. In
addition, the TransactionCurrent object supports APIs to open and
close the resource manager.
TransactionCurrent defines the methods that allow a client of the CORBAservices Object Transaction Service (OTS) to explicitly manage the association between threads and transactions. This object also defines methods that simplify the use of the OTS for most applications.
See Also:
application programming interface (API), CORBAservices Object Transaction Service (OTS), Credentials object, and resource manager (RM).Parent topic: T
1.20.28 transaction log (TLOG)
The Oracle Tuxedo system log that keeps track of global transactions.
Parent topic: T
1.20.29 transaction manager (TM)
A system software component that manages global transactions on behalf of application programs. A transaction manager coordinates commands from application programs and communication resource managers to start and complete global transactions by communicating with all resource managers that are participating in those transactions. When resource managers fail during global transactions, transaction managers help resource managers decide whether to commit or roll back pending global transactions.
See Also:
transaction coordinator.Parent topic: T
1.20.30 transaction policy
(CORBA) The policy that determines the TP Framework’s or EJB container’s interaction between the client request (which may be associated with a transaction) and the servant’s transaction context.
Parent topic: T
1.20.31 Transaction Manager Server (TMS)
An Oracle Tuxedo system server process that manages the two-phase commit protocol and recovery for global transactions.
Parent topic: T
1.20.32 transaction processing (TP)
Transaction processing consists of a set of convenient functions that make it easy for you to write code that does the following:
- Initialize the server application and execute startup and shutdown routines.
- Tie the server application to Oracle Tuxedo domain resources.
- Perform housekeeping functions.
Parent topic: T
1.20.33 transaction processing monitor (TP monitor)
A class of products that provide a transaction execution environment on top of conventional operating systems.
Parent topic: T
1.20.34 transaction processing protocols (TP protocols)
A set of standard protocols by which transaction processing managers on heterogeneous systems interoperate.
Parent topic: T
1.20.35 transaction processing service user title (TPSUT)
A value that is used to identify OSI TP endpoints that exist within one application entity.
Parent topic: T
1.20.37 transactions per second (TPS)
A throughput rating used in conjunction with the standard transactions defined by TPC. Often the rating implies the maximum number of transactions that can be processed by the system in which 90% of the transaction’s response times are less than two seconds.
Parent topic: T
1.20.38 transient object
(CORBA) An object that exists only for the lifetime of the process within which it is created.
See Also:
persistent object.Parent topic: T
1.20.39 translation
The process of changing how intrinsic data types are represented in input data and output data (with respect to word length, byte ordering, and character encoding).
Parent topic: T
1.20.40 Transmission Control Protocol/Internet Protocol (TCP/IP)
The suite of standard communications protocols that defines the Internet and is supported by the transport layer interface. Originally designed for the UNIX operating system, TCP/IP software is now available for every major operating system.
Parent topic: T
1.20.41 transport interface
The programming interface used to access a network provider. Transport interfaces are typically network provider independent to an extent.
Parent topic: T
1.20.42 Transport Layer Interface (TLI)
The standard UNIX system user-level interface to data communications features as defined by level 4 of the OSI communications protocol. It is a network access method supported by the Oracle Tuxedo system.
Parent topic: T
1.20.44 trap
An SNMP data packet that contains information about an error that occurred with a managed object. Traps are unsolicited event notifications, that is, notifications generated by an agent on its own initiative.
Parent topic: T
1.20.45 TUXCONFIG file
The binary version of the configuration file for an Oracle Tuxedo application. This file is accessed by all Oracle Tuxedo processes for all configuration information.
Parent topic: T
1.20.48 Tuxedo MIB
A Tuxedo internal data structure for resources. Specifically, it is an Oracle Tuxedo or WebLogic Enterprise framework component that provides a complete definition of the object classes and their attributes that together constitute the Tuxedo or WebLogic Enterprise framework. The total Tuxedo system management information base is organized into a generic MIB and component-specific MIBs for each major component. Configuration and administration of the Tuxedo or WLE framework can be done programmatically.
Parent topic: T
1.20.50 two-phase commit (2PC)
A method of coordinating a single transaction across more than one DBMS (or other resource manager). It guarantees data integrity by ensuring that transactional updates are committed in all of the participating databases, or are fully rolled back out of all the databases, reverting to the state prior to the start of the transaction.
Parent topic: T
1.20.51 two-tier client/server
An application development approach that splits an application into two parts and divides the processing between a desktop workstation and a server machine.
Parent topic: T
1.20.52 TX interface
The Transaction Demarcation (TX) API used by application programs to call the transaction manager. Application programs use the TX interface to define the boundaries of global transactions and direct the completion of those transactions.
Parent topic: T
1.20.53 type conversion
(ATMI) The process of converting an application program’s data buffer or record so that the data is formatted in a manner that is suitable to a target application program.
Parent topic: T
1.20.54 typed buffer
(ATMI) A buffer for message communication involving data of a specific type.
See Also:
buffer types.Parent topic: T
1.21 U
This section describes glossary information about alphabet U.
- UBBCONFIG file
- UDP
- unadvertised
- uniprocessor
- Universal Device List (UDL)
- URL
- use case
- user datagram protocol (UDP)
- user sponsor
- UserTransaction environmental object
- UserTransaction interface
Parent topic: Glossary
1.21.1 UBBCONFIG file
The ASCII version of the configuration file for an Oracle Tuxedo application. A binary version, referred to in Oracle Tuxedo documentation as the TUXCONFIG
file, is generated from the UBBCONFIG
file.
Parent topic: U
1.21.3 unadvertised
A service is unadvertised when there is no service table entry for it in the Oracle Tuxedo bulletin board.
Parent topic: U
1.21.5 Universal Device List (UDL)
A system-wide list of devices (either raw disk slices or UNIX
files) on which space is allocated for TUXCONFIG
configuration tables, Oracle Tuxedo transaction logs, and,
possibly, databases. Its location is specified by the
TUXCONFIG
environment variable.
Parent topic: U
1.21.6 URL
Uniform Resource Locator. The address of a site on the Web. An
example of a URL is www.oracle.com
.
Parent topic: U
1.21.7 use case
Text that describes how a user will interact with the application that is being designed. The use case reflects the processes the user will follow.
See Also:
application.Parent topic: U
1.21.9 user sponsor
The code that calls the security interfaces for user authentication.
See Also:
authentication.Parent topic: U
1.21.10 UserTransaction environmental object
(CORBA) An object that connects the client application to the Oracle Tuxedo transaction subsystem, wherein the client application can perform operations within the context of a transaction. The UserTransaction object exists only with Java client applications.
Parent topic: U
1.21.11 UserTransaction interface
The interface that defines the methods that allow an application to explicitly manage transaction boundaries.
Parent topic: U
1.22 V
This section describes glossary information about alphabet V.
- view
- VIEW buffer
- VIEW definitions
- virtual machine
- virtual one-hop network
- Volume Table of Contents (VTOC)
- VTOC
Parent topic: Glossary
1.22.1 view
(ATMI) In the VIEW System Manager, a window that is displayed when you click on an icon that represents a managed host.
(CORBA) A representation of a CORBA object in an Oracle Tuxedo domain that resides in another object system.
Parent topic: V
1.22.2 VIEW buffer
(ATMI) A data structure similar to a C structure. As part of defining this buffer type, a view description file is created. It is a self-describing buffer. VIEW buffers are always accompanied by VIEW definitions.
Parent topic: V
1.22.3 VIEW definitions
(ATMI) Descriptions of data structures that are used for input and output in the Oracle Tuxedo environment.
Parent topic: V
1.22.4 virtual machine
The functional equivalent of a computer and its associated devices that is controlled by a user at a terminal.
Parent topic: V
1.22.5 virtual one-hop network
A network in which all nodes can be reached from all other nodes in exactly one transmission. This implies nothing about the physical configuration of the network, which may be a ring, star, bus, or any other valid configuration as long as it appears that all nodes are fully interconnected.
Parent topic: V
1.22.6 Volume Table of Contents (VTOC)
A file that contains the Oracle Tuxedo system and possibly database tables.
Parent topic: V
1.23 W
This section describes glossary information about alphabet W.
- WAN
- Web GUI
- WebLogic Express
- WebLogic Server
- Wide Area Network (WAN)
- window
- wiring
- WLS
- worker thread
- Workstation
- Workstation client (WSC)
- Workstation Handler (WSH)
- Workstation Listener (WSL)
- wrap
- wrapper
- wrapper object
Parent topic: Glossary
1.23.3 WebLogic Express
(CORBA) An implementation of JDBC for use with Java applets or applications.
Parent topic: W
1.23.4 WebLogic Server
A pure Java application server for assembling, deploying, and managing distributed Java applications.
Parent topic: W
1.23.5 Wide Area Network (WAN)
A public or private data communications system in which data is transmitted primarily over communication lines.
Parent topic: W
1.23.6 window
An area of a user’s screen in a graphical user interface system. A window is a mechanism used by applications for interacting with a user.
Parent topic: W
1.23.7 wiring
(CORBA) An indication that a bean is registered as a listener of events from another bean.
Parent topic: W
1.23.9 worker thread
(CORBA) A thread that is scheduled to execute a request from a client application. The Oracle Tuxedo Java software uses a thread pooling model, where a pool of available worker threads is managed by the software. When the Oracle Tuxedo Java software receives a request from a client application, the software schedules, from the thread pool, an available worker thread to execute the request. When the request is complete, the worker thread returns to the thread pool. A worker thread can serve only one request at a time.
1.23.10 Workstation
The component of the Oracle Tuxedo system that allows application clients to be located on sites on which no server-side components of the Oracle Tuxedo system are installed. A Workstation client does not support an administration server, an application server, or a bulletin board. All communication between such a client and the rest of the application takes place over a network.
Parent topic: W
1.23.11 Workstation client (WSC)
A client process that runs on a machine on which no Oracle Tuxedo server software is installed. Multiple Workstation clients can run simultaneously on Windows, Windows NT, UNIX, and VMS platforms. The ATMI is available to Workstation clients.
Parent topic: W
1.23.12 Workstation Handler (WSH)
A process that manages one or more connections between Workstation clients and native Oracle Tuxedo servers. Specifically, a Workstation Handler makes surrogate service requests, manages transactions, and returns replies. WSH processes are started and stopped by a Workstation Listener (WSL). The WSH process resides within the administrative domain of the application. Handlers are registered in the local Oracle Tuxedo bulletin board as clients.
Parent topic: W
1.23.13 Workstation Listener (WSL)
A process that assigns Workstation Handlers (WSHs) to Workstation clients (WSCs). Once such an assignment is made, the designated WSH manages all service requests from the specified client. The WSL also manages the pool of Workstation Handlers, starting and stopping them in response to load requirements. The WSL process resides within the administrative domain of the application.
Parent topic: W
1.23.14 wrap
To enclose an application in a software layer to make the application available to other applications.
Parent topic: W
1.23.15 wrapper
(CORBA) The enclosure that is used to wrap a legacy application to make the legacy application available as an implementation to CORBA client applications.
Parent topic: W
1.24 X
This section describes glossary information about alphabet X.
- X.509
- XA
- XATMI application service element
- XATMI interface
- X_COMMON buffer
- X_C_TYPE buffer
- XDR
- XML
- X_OCTET buffer
- X/Open
- X/Open Distributed Transaction Processing (DTP) model
Parent topic: Glossary
1.24.1 X.509
A standard that specifies the format of certificates, which provide a way to securely associate a name to a public key, providing strong authentication.
Parent topic: X
1.24.2 XA
The bidirectional, system-level interface used for communication among applications, transactions managers, and database systems, as defined in the X/Open distributed transaction processing (DTP) model.
Parent topic: X
1.24.3 XATMI application service element
Software that maps primitives in the XATMI interface to the OSI TP protocol.
Parent topic: X
1.24.4 XATMI interface
An interface that enables application programs to use request/response communication and conversational communication during global transactions.
Parent topic: X
1.24.5 X_COMMON buffer
(ATMI) A non-nested C structure whose elements are any of the following C data types: short, long, or char. X_COMMON is one of three buffers that are defined in the X/Open XATMI standard. It is equivalent to the Oracle Tuxedo VIEW buffer; however, X_COMMON represents only the subset of field types that are common to both the C and COBOL languages.
Parent topic: X
1.24.6 X_C_TYPE buffer
(ATMI) A non-nested C structure whose elements are any of the following C data types: int, short, long, char, float, double, character string, and octet array. X_C_TYPE is one of three buffers that are defined in the X/Open XATMI standard. It is equivalent to the Oracle Tuxedo VIEW buffer.
Parent topic: X
1.24.8 XML
eXtensible Markup Language. A language developed by the World Wide Web Consortium (W3C) and organized by Sun Microsystems, Inc. Used in specifying the Server Descriptor file and the EJB deployment descriptor.
Parent topic: X
1.24.9 X_OCTET buffer
(ATMI) An array of bytes whose structure is defined by an application. X_OCTET is one of three buffers that are defined in the X/Open XATMI standard. It is equivalent to the Oracle Tuxedo CARRAY buffer.
Parent topic: X
1.24.10 X/Open
The X/Open Company, Ltd., an international private consortium of vendors and users working to establish standards for open systems. Oracle Tuxedo products are designed to implement X/Open standards for distributed transaction processing.
Parent topic: X
1.24.11 X/Open Distributed Transaction Processing (DTP) model
The distributed transaction processing model specified in standards developed by the X/Open Company, Ltd. The Oracle Tuxedo architecture is based on these standards. The model defines four components of a DTP system:
- Application programs (APs) define the transaction boundaries and perform the actions that make up the transaction (typically database updates).
- Resource managers (RMs), such as database management systems, provide access to shared resources.
- Communication resource managers (CRMs) allow application programs to communicate with each other.
- Transaction managers (TMs) assign unique identifiers (XIDs) to transactions, monitor the progress of transactions, and handle transaction completion or recovery.
Parent topic: X