Oracle Network Products Getting Started Release 2.3.4 for Windows Platforms Go to Product Documentation Library 
Library
Go to books for this product 
Product
Go to Contents for this book 
Contents
Go to Index 
Index



Go to previous file in sequenceGo to next file in sequence

Supported Oracle Network Products

This chapter covers the following areas:

Oracle Network Products

Table 2-1 lists each supported Oracle Network Product, its release number, and the Windows platform on which it can be installed. Each Oracle Network Product is described in detail later in this chapter.

Table 2-1 Oracle Network Products Availability

Oracle Network Product Release NT Server NT Client 95 Client Windows Client
SQL*Net 2.3.31  no  no  no  yes 2 
SQL*Net 2.3.4  yes  yes  yes  no
Oracle Protocol Adapters:
TCP/IP Protocol Adapter  2.3.4  yes  yes  yes  yes 
SPX Protocol Adapter  2.3.4  yes  yes  yes  yes 
DECnet Protocol Adapter3  2.3.4  yes (NT 3.51 only)  yes (NT 3.51 only)  no  yes 
Named Pipes Protocol Adapter 2.3.4  yes  yes  yes  yes 
NetBIOS Protocol Adapter  2.3.4  no  no  no  yes 
LU6.2 Protocol Adapter  2.3.4  yes  yes  no  yes 
Bequeath Protocol Adapter (automatically installed with SQL*Net for local connections)  2.3.4  yes  yes  yes4  no 
SQL*Net Configuration Tools:
SQL*Net Easy Configuration5  n/a  yes  yes  yes  yes 
Oracle Network Manager6  3.1.0  yes  yes  yes  yes 
Client Status Monitor and SQLNET.ORA Editor  2.3.4  no  no  no  yes 
Oracle Names Server 2.0.4  yes  no  no  no 
NDS Native Naming Adapter 2.3.4  no  yes  yes  yes 
SQL*Net Authentication Adapters:
NDS Authentication Adapter7  2.3.4  no  yes  yes  yes 
Windows NT Authentication Adapter  2.3.4  yes8  yes  yes  yes9 
Advanced Networking Option10: 2.3.4 
Network Security and Single Sign-On  2.3.4  yes  yes  yes  yes 
CyberSAFE Authentication Adapter  2.3.4  yes  yes  yes  yes 
SecurID Authentication Adapter  2.3.4  yes  yes  yes  yes 
Kerberos Authentication Adapter  2.3.4  yes  yes  yes  yes 
Biometric (Identix) Authentication Adapter  2.3.4  yes  yes  yes  no 
DCE Integration11  2.3.4  yes  yes  yes  no 
 
  1. SQL*Net on Windows contains release 2.3.3 functionality.
  2. SQL*Net for Windows 3.1x is compatible with Windows applications running in enhanced mode only. Attempting to run SQL*Net for Windows in Windows standard mode generates the following error:
  3. ORA-03121 No interface driver connection - function not performed 

  4. The Oracle DECnet Protocol Adapter is available for Windows NT 3.51, not Windows NT 4.0.

  5.  
     

  6. Bequeath only works on Windows 95 for connections to a Personal Oracle7 database.
  7. SQL*Net Easy Configuration and the 16-bit Client Status Monitor and SQLNET.ORA Editor are automatically installed with SQL*Net. For information on the Client Status Monitor and SQLNET.ORA Editor, see the Oracle Network Products Troubleshooting Guide.
  8. Oracle Network Manager is a 16-bit application. It is not available for installation from the Windows 95 or Windows NT subdirectories of your CD-ROM disc. To install and run Oracle Network Manager on either Windows 95 or Windows NT, go to the \WINDOWS subdirectory of your CD-ROM disc, and run ORAINST or SETUP. Then, select Custom Installation to install Oracle Network Manager.
  9. If using the NDS Authentication Adapter without enough memory on Windows 3.1x, you may receive the following message when trying to access the database with CONNECT /@alias:
  10. ORA-12634 TNS:Memory allocation failed 

    If you receive this error, try using 535K or below one megabyte DOS memory. Free up more DOS memory by either not loading as many DOS drivers or by running MEMMAKER. 

  11. If using Windows NT 3.51, Service Pack 5 must be installed for operating system authentication to work.
  12. Windows NT Authentication Adapter is available for Windows for Workgroups 3.11 only, not Windows 3.1.
  13. Advanced Networking Option is packaged separately from SQL*Net. ANO must be the identical release (up to the third digit) to SQL*Net on the same machine. For example, if you have SQL*Net release 2.3.4 installed on a machine, the ANO release must be 2.3.4 as well. For client-to-server connections, ANO requires at least SQL*Net 2.3.2.1.5 for Windows NT and Windows 95 and at least SQL*Net 2.3.2.1.4 for Windows 3.1x. ANO is not compatible with earlier versions of SQL*Net. Different machines do not require the same releases of ANO and SQL*Net.
  14. DCE Integration is no longer supported by DEC Digital. Only Gradient PC-DCE/32 Runtime Services is supported.

Oracle Network Products Compatibility

Table 2-2 shows the Oracle Network Products releases that are compatible with that Oracle7 database and Oracle8 database releases.

Note: 

A client and server or two servers running different versions of SQL*Net connect successfully. The SQL*Net functionality, however, defaults to the lower version. 

 
 

Table 2-2 Compatible Releases

Database Release 7.1.4 7.1.5 7.1.6 7.2.2 7.2.3 7.3.2 7.3.3 7.3.4 8.0.3
SQL*Net1  2.1.4  2.1.5  2.1.6  2.2.2  2.2.3  2.3.2  2.3.3  2.3.4  n/a 
Names Server  1.0  1.0  1.0  1.1  2.0  2.0.2  2.0.3  2.0.4  8.0.3 
Advanced Networking Option  n/a  n/a  n/a  n/a  n/a  2.3.2  2.3.3  2.3.4  8.0.3 
Secure Network Services2  1.0.1  1.0.2  1.0.3  1.1  2.0  n/a  n/a  n/a  n/a 
Net8  n/a  n/a  n/a  n/a  n/a  n/a  n/a  n/a  8.0.3 
 
  1. SQL*Net includes Oracle Protocol Adapters.
  2. The functionality of Secure Network Services and SQL*Net/DCE are now included in the Oracle Advanced Networking Option.

SQL*Net and Net8 Coexistence and Migration

It is possible to have a heterogeneous network of SQL*Net and Net8 (the SQL*Net product for Oracle8) clients. Oracle7 release 7.3.4 clients can directly connect to an Oracle8 database on the local system without specifying a service name.
Additional Information: 

See: 

 

Supported Vendors

Table 2-3 below lists the third-party software required for specific networking products:
Note: Windows NT implies 3.51 and 4.0 unless otherwise stated. 
 
 

Table 2-3 Supported Protocol Adapter Vendors

Networking Product Windows Platform Supported Vendor
TCP/IP Protocol Adapter  Windows 3.1 and Windows for Workgroups 3.11  Third-party vendors that support JSB Virtual Socket Library version 3.0.11 
Windows NT and Windows 95  Microsoft TCP/IP 
SPX Protocol Adapter  Windows 3.1 and Windows for Workgroups 3.11  Novell NetWare version 3.11 or later, included in Novell NetWare Workstation Kit for DOS and Windows version 2.0 

Novell NetWare Client version 4.1 or higher 

Windows NT and Windows 95  Microsoft NW Link1 

Novell NetWare Client 32 

Novell IntranetWare Client version 4.1 for Windows NT 

Novell IntranetWare Client version 2.2 for Windows 95 

Note: For Microsoft NW Link, Client Service for NetWare must be installed. 

DECnet Protocol Adapter  Windows 3.1 and Windows for Workgroups 3.11  Digital DEC PATHWORKS for DOS/Windows version 5.1 or 6.0 
Windows NT  Digital DEC PATHWORKS2 version 4.1B supporting Windows NT 3.51 
Named Pipes Protocol Adapter Windows 3.1 and Windows for Workgroups 3.11  Microsoft LAN Manager version 2.2 or Windows for Workgroups version 3.11 
Windows NT and Windows 95  Microsoft NETBEUI 
NetBIOS Protocol Adapter  Windows 3.1 and Windows for Workgroups 3.11  IBM LAN Support Program version 1.3, or Microsoft NetBEUI provided by Microsoft Windows for Workgroups version 3.11 
LU6.2 Protocol Adapter  Windows 3.1 and Windows for Workgroups 3.11  IBM Networking Services for Windows version 1.0 
Windows NT  Microsoft SNA Server version 3.0 
NDS Native Naming Adapter  Windows 3.1 and Windows for Workgroups 3.11  Novell NetWare Client version 4.1 

Note: An Oracle7 release 7.2.2 or above for Netware release 4.1 is required. 

Windows NT and Windows 95  Novell NetWare Client 32 version 4.1 

Note: An Oracle7 release 7.2.2 or above for Netware release 4.1 is required. 

NDS Authentication Adapter Windows 3.1 and Windows for Workgroups 3.11  Novell NetWare Client version 4.1 

Note: An Oracle7 release 7.2.2 or above for Netware release 4.1 is required. 

Windows NT and Windows 95  Novell NetWare Client 32 version 4. 

Note: An Oracle7 release 7.2.2 or above for Netware release 4.1 is required. 

Windows NT Authentication Adapter  Windows for Workgroups 3.11, Windows NT, and Windows 95  Microsoft 
ANO DCE Integration Protocol Adapter  Windows NT and Windows 95  Gradient PC-DCE/32 Runtime Services Kit version 2.0 
ANO CyberSAFE Authentication Adapter  Windows 3.1 and Windows for Workgroups 3.11  CyberSafe Challenger Version 5.2.7 
Windows NT and Windows 95  CyberSafe Application Security Toolkit version 1.0.4a 

ANO SecurID Authentication Adapter  Windows 3.1 and Windows for Workgroups 3.11  No vendor software requirements on an Oracle7 client, but a SecurID card is needed 
Windows NT and Windows 95  No vendor software requirements on an Oracle7 client or server, but a SecurID card is needed 

ANO Kerberos Authentication Adapter  Windows 3.1 and Windows for Workgroups 3.11  No vendor software requirements on an Oracle7 client. 
Windows NT and Windows 95  No vendor software requirements on an Oracle7 client or server. 

ANO Biometric (Identix) Authentication Adapter  Window NT and Windows 95  Identix hardware and driver on an Oracle7 client. 
 
  1. If you run more than three concurrent SPX client applications from Windows 95 that connect and disconnect repeatedly, some of the applications may hang or there may be a trap in the protocol layer.
  2. You must obtain the node name and address from your network administrator and fill in the information while configuring PATHWORKS for Windows NT.
 
Additional Information: 

See Appendix B, "Verifying Parameters and Vendor Adapters for Windows 3.1x" for additional vendor information for Windows Oracle Protocol Adapters. 

 

16-Bit Support on Windows NT and Windows 95

The following Oracle Protocol Adapters support 16-bit SQL*Net on Windows NT and Windows 95:

Table 2-4 16-Bit Protocol Adapters on Windows NT and Windows 95

Protocol Adapter Platform Supported Vendor
TCP/IP Protocol Adapter  Windows NT 

Windows 95 

Microsoft TCP/IP 
SPX Protocol Adapter  Windows 95 

 Window NT 

Novell NetWare Client 32 

Novell IntranetWare Client version 4.1 for Windows NT 

 Novell IntranetWare Client version 2.2 for Windows 95 

 

Named Pipes Protocol Adapter Windows NT 

Windows 95 

Microsoft NETBEUI 
Bequeath Protocol Adapter Windows NT 

Windows 95 

Microsoft 
 

Oracle Protocol Adapters

This section describes the following Oracle Protocol Adapters: All the adapters except Bequeath, which is a feature of SQL*Net, are installable products.

TCP/IP Protocol Adapter

The TCP/IP Protocol Adapter enables client/server conversation over a network using TCP/IP and SQL*Net. This combination of Oracle products enables an Oracle application on a client to communicate with remote Oracle databases through TCP/IP (if the Oracle database is running on a host system that supports network communication using TCP/IP).

TCP/IP is a combination of two network protocols that facilitate transferring data across a network:
Protocol Description
Transmission Control Protocol (TCP)  TCP is a connection-oriented protocol for establishing reliable, sequenced data transfer. TCP ensures that data reaches its destination. 
Internet Protocol (IP)  IP assembles and addresses data packets for transmission to their network destinations. 
 
 
Additional Information: See your operating system documentation. 
 

SPX Protocol Adapter

The SPX Protocol Adapter enables client/server conversation over a network using SPX/IPX and SQL*Net. This combination of Oracle products enables an Oracle application on a client to communicate with remote Oracle databases through SPX/IPX (if the Oracle database is running on a host system that supports network communication using SPX/IPX).

SPX/IPX is a combination of two network protocols that carry data packets between clients and their servers:
Protocol Description
Sequenced Packet Exchange (SPX)  SPX is a connection-oriented protocol for establishing a reliable, peer-to-peer connection between the source and destination of a network request. SPX guarantees delivery, sequencing of packets, and correction of errors encountered.
Internetwork Packet Exchange (IPX)  IPX is a connectionless protocol. Connectionless protocols do not establish connections between the source and destination of network requests. Data packets are addressed and sent, but the sender has no guarantee that data is successfully delivered or correctly sequenced.
 
SPX and IPX are specifically designed for personal computer (PC) local area network (LAN) environments. They are communications protocols suitable for memory-constrained PC workstations. SPX/IPX supports all major PC operating systems.
Additional Information: See the Novell manual that came with your SPX/IPX software. 
 

DECnet Protocol Adapter

The DECnet Protocol Adapter enables client/server conversation over a network using DECnet and SQL*Net. DECnet is a networking and proprietary communication protocol of Digital Equipment Corporation.

DECnet is a collection of software and hardware communications products that lets various computer system users communicate in a network. Its peer-to-peer network environment lets any computer or node running DECnet communicate with all other nodes in the network without depending on a central controlling node. Each node is equally responsive to user requests, letting network users access applications. DECnet extends operating system use by creating an environment where client and server software is shared and accessed by other DECnet network users.

Many third party vendors on other operating systems and hardware platforms implement the DECnet protocol. DECnet capabilities include:

Named Pipes Protocol Adapter

The Named Pipes Protocol Adapter enables client/server conversation over a network using Named Pipes and SQL*Net. This combination of Oracle products enables an Oracle application on a client to communicate with remote Oracle databases through Named Pipes (if the Oracle database is running on a host system that supports network communication using Named Pipes).

The Named Pipes Protocol Adapter is a high-level interface providing interprocess communications between clients and servers (distributed applications). One process (the server side of the application) creates the pipe, and the other process (the client side) opens it by name. What one side writes, the other can read, and vice versa. Named Pipes is specifically designed for PC-LAN environments.

NetBIOS Protocol Adapter

The Network Basic Input/Output System (NetBIOS) is an API that defines process-to-process communications on a PC LAN.

The Oracle NetBIOS Protocol Adapter for Windows lets an Oracle application on a Windows client machine communicate with remote Oracle7 databases using NetBIOS.

Communication is over an IBM LAN Support Program or Microsoft Network Basic Extended User Interface (NetBEUI).

NetBEUI is part of the transport layer protocol, not the NetBIOS programming interface.

NetBEUI is fast, with a low overhead (number of extra bytes) per frame of data transmitted. The protocol, however, cannot be routed. Thus, NetBEUI is most appropriate in single subnet (continuous) networks.

NetBEUI provides compatibility with existing LAN Manager, LAN Server, and MS-Net installations. NetBEUI is provided with Windows NT to maintain connectivity to existing LAN Manager and MS-Net based networks.

LU6.2 Protocol Adapter

The Logical Unit Type 6.2 (LU6.2) Protocol Adapter is part of the IBM Advanced Program-to-Program Communication (APPC) architecture. APPC is the IBM peer-to-peer (program-to-program) protocol for a System Network Architecture (SNA) network. SNA is an IBM reference model similar to the Open Systems Interconnect (OSI) model of the International Standards Organization (ISO).

Program-to-program communication protocols provide services for programs on one computer to initiate processes on another computer, thus establishing a dialog. Peer-to-peer communication is independent of the following:

APPC architecture lets the client and host communicate over an SNA network without forcing the client to emulate a terminal (as in terminal-to-host protocols). APPC architecture allows peer-to-peer communication; the client can initiate communication with the server.

An SNA network with the LU6.2 and Physical Unit Type 2.1 (PU2.1) protocols provides APPC. The LU6.2 protocol defines a session between two application programs; LU6.2 is a product-independent LU-type.

The LU6.2 Protocol Adapter lets an Oracle application on a PC communicate with an Oracle7 database. This communication is over an SNA network with the Oracle7 database on a host system that supports APPC.

In addition to these server platforms, LU6.2 is available on operating systems that are client-only platforms.

Bequeath Protocol Adapter

The Bequeath Protocol Adapter enables the client to retrieve information from the database without using the listener. The Bequeath Adapter internally spawns a server process for each client application. In a sense, it does the same operation that a remote listener does for your connection, yet locally.

The Bequeath Protocol Adapter:

SQL*Net Configuration Tools

Several configuration tools enable you to configure SQL*Net version 2 client and server database connections. The tool you use depends upon the size/complexity of the network:
Tool Description Where to Find Additional Information...
SQL*Net Easy Configuration  Used for simple database connections.  "Using SQL*Net Easy Configuration" in Chapter 4, "Configuration" 
Oracle Network Manager  Used for complex networks, and advanced SQL*Net features such as Oracle Names and the Advanced Networking Option. 
Client Status Monitor Provides client connection troubleshooting information about a client workstation and access to the SQLNET.ORA editor. 
SQLNET.ORA Editor  Enables you to edit parameters in your SQLNET.ORA file, including trace parameters. 
 

Oracle Names

Oracle Names is software that allows storage of network addresses in a single location and makes the addresses available to SQL*Net clients throughout the network. In addition, Oracle Names with Dynamic Discovery Option (DDO) minimizes configuration for Oracle Names and SQL*Net, which enables servers to register themselves with well-known Name Servers. When DDO is used, minimal configuration files are required.

Features of DDO are:

If your network uses a flat naming structure and has a limited number of servers, this option may be appropriate. If you choose not to use DDO, configure Oracle Names Servers by using Oracle Network Manager.
Additional Information: 

See: 

 

NDS Native Naming Adapter

The NetWare Directory Services (NDS) Native Naming Adapter is available for naming services when SQL*Net is installed. It does not require a separate installation.

Advanced Networking Option (ANO) provides its own naming service adapter. See "Advanced Networking Option" in this chapter for more information.

The NDS Native Naming Adapter enables you to integrate Oracle service names (or database aliases) and addresses into your existing non-Oracle name services. This feature allows users from multiple points to use a single login to access a multi-server and multi-database network, and view the entire network under a single directory tree.

The NDS Native Naming Adapter uses the NDS naming environment to store service names and addresses of Oracle7 for NetWare databases. This environment allows users to connect to Oracle7 databases whose server name is defined as an NDS object name.

To use the NDS Native Naming Adapter, you must configure your Windows client machine to a Novell NetWare 4.x workstation.
Additional Information: 

See: 

 

SQL*Net Authentication Adapters

The following authentication adapters are available for security when SQL*Net is installed: These adapters are features of SQL*Net; they do not require a separate installation.

ANO provides other authentication adapters. See "Advanced Networking Option" in this chapter for ANO authentication adapters.

NDS Authentication Adapter

The NDS Authentication Adapter for clients lets a single login access a multi-server and multi-database network and view the entire network under a single NDS directory tree.
Additional Information: See "NDS Authentication Adapter" in Chapter 5, "Database Connection Tasks"
 

Windows NT Authentication Adapter

The Windows NT Authentication Adapter allows operating system authentication to be performed between a client and an Oracle7 database on Windows NT.
Additional Information: See "Windows NT Authentication Adapter" in Chapter 5, "Database Connection Tasks"
 

Advanced Networking Option

ANO is an optional product that provides enhanced functionality to SQL*Net. Its set of features provides enhanced security and authentication to your network, and enables integration with a Distributed Computing Environment (DCE).

ANO is comprised of the following components:

Network Security and Single Sign-On

Network Security is an Oracle network data encryption and checksumming service to ensure secure transmission of data over networks. Network Security uses encryption and authentication engines from RSA Data Security, Incorporated.

The following concepts are explained below:

Network Security

EncryptionEncryption provides a way to ensure confidentiality of information. Encryption is the transformation of data so that it is unreadable by anyone without a (secret) decryption key. Encryption provides a means to ensure confidentiality of information by keeping its content hidden from anyone for whom it is not intended, even those who can see the encrypted data. For example, one can encrypt sensitive information stored on a laptop so that if the laptop is stolen, the data cannot be recovered by the thief.

In symmetric-key encryption, the sender of a message uses a secret key to encrypt the message, and the receiver uses the same secret key to decrypt the message. If Alice and Bob want to communicate, they must each know what the secret key is (and the key must be exchanged in a way that the secrecy of the key is preserved). If Bob and Steve want to communicate, they must also have a separate key (so that, for example, Alice cannot read their messages).

The main drawback of symmetric-key encryption is that, in a system with many users wanting to communicate, the management and distribution of keys becomes overwhelming.

Public Key CryptographyPublic key cryptography solves the key management problem of symmetric-key cryptography. In the public key scheme, each person receives a pair of keys:

Each public key is published, while the private key is confidential. Messages encrypted with a public key can only be decrypted with the corresponding private key. Messages encrypted with a private key can only be decrypted with the corresponding public key. Keys may not be deduced from each other. The sender and receiver of an encrypted message do not share confidential information, since all communications involve only public keys. Private keys are neither transmitted nor shared.

For example, Alice sends a message to Bob so that only Bob can read it. She encrypts the message with Bob's public key, which is public knowledge. Bob decrypts the message with his private key to read it. Only Bob owns the private key that is able to decrypt the message, and only Bob can read the message.

Digital SignaturesPublic key cryptography can be used for authentication (digital signatures) as well as for privacy (encryption). A digital signature is a non-forgeable way of authenticating the sender of a message. Only the sender of a message could actually have sent the message. The sender cannot later claim that someone impersonated her or him.

For example, Alice orders equipment, and the purchasing department (where Bob works) requires a digital signature on the purchase order. To sign the purchase order, Alice performs a computation (hash) of the message, encrypts the hash with her private key, and attaches the encrypted hash (digital signature) to the order before sending it. To verify the signature, Bob decrypts the hash with Alice's public key, performs the same computation on the order, and compares the results with Alice's decrypted hash. If the results are the same, then only Alice could have sent the message.

Digital CertificatesTo establish confidence in the identity associated with a public key, public keys are incorporated into digital certificates. A digital certificate is a binding of a public key to a user by a trusted third party known as a Certificate Authority (CA). The public key and user identity, together with other information such as the certificate expiration date, are digitally signed by the CA. CAs serve as electronic notaries, attesting to the identity of users and the validity of their public keys.

Certificates may be issued in several ways. For instance, Alice may generate her own key pair and send the public key to an appropriate CA with some proof of her identification. The CA verifies the identification and takes other steps to ensure that Alice is really Alice. Next, the CA sends Alice a certificate attesting to the binding between Alice and her public key, along with a hierarchy of certificates verifying the CA's public key. Alice can present this certificate chain whenever necessary to demonstrate the legitimacy of her public key.

Alternatively, the key pair may be generated by an administrator in a way that the person generating the keys does not know Alice's private key. Alice's private key may be given to her on a diskette or embedded within a token. Alice's public key is bound to a certificate by the CA, a copy given to Alice and a copy stored in a public database for ready access.

Certificate Revocation Lists (CRL)Public keys are sometimes revoked before their expiration date. Such instances include compromised keys or employment termination. A CRL lists such revoked public keys. CAs maintain CRLs and provide information about revoked keys originally certified by the CA. CRLs list only current keys, since expired keys are not valid. A revoked key past the expiration date is removed from the list. Although CRLs are maintained in a distributed manner, networked sites may provide a centralized location for the latest CRLs.
Note: 

See the RSA Data Security website at http://www.rsa.com for more information about public key cryptography and digital signatures. 

 
Supported AlgorithmsThe following algorithms are supported for encryption and checksumming:

Single Sign-On

Single sign-on allows users to access multiple accounts and applications with a single password, eliminating the need for multiple passwords for users and simplifying management of user accounts and passwords for system administrators.

Authentication Adapters Provide Enhanced Security

Centralized, secure authentication services allow you to have high confidence in the identity of users, clients, and servers in distributed environments. Network authentication services can also provide the benefit of single sign-on for users.

The following adapters are supported for this reason:

DCE Integration

DCE Integration enables users to transparently use Oracle tools and applications to access Oracle7 databases in a DCE environment. The DCE Integration product is comprised of two major components:

DCE Communication/Security Adapter

The DCE Communication/Security Adapter provides:

DCE CDS Naming Adapter

DCE Integration registers Oracle7 connect descriptors in the DCE CDS Naming Adapter, allowing them to be transparently accessed across the entire DCE environment. Users can connect to Oracle database servers in a DCE environment using familiar Oracle service names.

The DCE CDS Naming Adapter offers a distributed, replicated repository service for name, address, and attributes of objects across the network. Because servers register their name and address information in the DCE CDS Naming Adapter, Oracle clients can make location-independent connections to Oracle7 databases. Services can be relocated without any changes to the client configuration. An Oracle utility is provided to load the Oracle service names (with corresponding connect descriptors) into the DCE CDS Naming Adapter. After the names are loaded, Oracle connect descriptors can be viewed from a central location with standard DCE tools.


Go to previous file in sequenceGo to next file in sequence 
Prev Next
Oracle 
Copyright © 1997 Oracle Corporation. 
All Rights Reserved.
Go to Product Documentation Library 
Library
Go to books for this product 
Product
Go to Contents for this book 
Contents
Go to Index 
Index