Feed aggregator

link layers 2 and 3

Pat Shuff - Tue, 2016-08-09 02:07
We are going through the OSI 7 layer stack and looking at the different layers. Yesterday we stared the discussion by looking at Kevin Fall and Richard Steven's book TCP/IP Illustrated Volume 1. In this book they describe the different layers and look at the how, what, and why of the design. Today we will focus on layers 2 and 3 the link layer and network layer.

Alternate sources of information about these layers can be found at

Layer 2 is basically a way of communicating between two neighbors. How many milliseconds a bit of data is kept on the wire, physical addressing, and aggregation of data packets are defined here. If you have ever wondered what a MAC Address is, this is where it is defined. Vendors are given a sequence of bits that indicate the address of a device that they create. Note that this is not your ip address but a physical sequence of bits as defined by the Institute of Electrical and Electronic Engineers (IEEE) 802 definition. The data packet consists of six octets of data with the first three octets identifying a corporation or manufacturer and the second three octets representing a unique sequence number of a device that the vendor manufactured. An example of this would be the MAC address on my MacBook Pro, 00:26:b0:da:c8:10. Apple is assigned 00:26:b0 as the identifier for their products. My specific laptop gets the identifier da:c8:10. When a data packet is placed on the internet through a hard wired cable or wifi it is placed there with the unique MAC Address of my laptop. When data was generated and consumed by physical hardware these addresses meant something. With virtualization and containers the MAC Address has become somewhat meaningless because these values are synthetic. You really can't determine if something came from an Apple product because we can map the above MAC address to a virtual machine by defining it as a parameter. It is best practice not to use the same MAC address is a physical network because all of the computers with that address will pick up the packet off the wire and decode it.

Layer 3 is the communication protocol that is used to create and define packets. With Apple for example, they defined a protocol called Appletalk so that you could talk between Apple computers and devices. This protocol did not really take off. Digital Computers did something similar with VAX/VMS and DecNET. This allowed their computers to talk to each other very efficiently and consume a network without regard for other computers on the network. Over the years the IP protocol has dominated. The protocol is currently in transition from IPv4 to IPv6 because the number of devices attached to the internet have exceeded the available addresses with the protocol. The IPv4 protocol consists of a dotted-quad or dotted-decimal notation with four fields that denote networks. For example, 129.152.168.100 is a valid ip address. All of the four fields can range from 0 to 255 with some of the values reserved. For example, 0.0.0.0 is not considered to be a valid address and neither is 255.255.255.255 because they are reserved for special functions. IPv6 uses a similar notation but addresses are denoted as eight blocks of 16 bit values. An example of this would be 5f05:2000:80ad:5800:58:800:2023:1d71. Note that this give us 128 bits rather than 32 bits to represent an address. IPv4 has 4,294,967,296 possible addresses in its address space, and IPv6 has 340,282,366,920,938,463,463,374,607,431,768,211,456.

With IPv4 addressing there is something called classes of networks. A class A network consists of a leading zero followed by seven bits to define a network and 24 bits to define a specific host. This is typically not used when talking about cloud services. A class B network consists of a leading 1 and 0 followed by 14 bits to define a network and 16 bits to define a host. Data centers typically use something like this because they could have thousands of servers in a data center. A class C network consists of a leading 110 followed by 21 bits to define the network and 8 bits to define a host. This allows 256 computers to be on one network which could be a department or office building. A class D network starts with 1110 and is considered to be a multicast broadcast. If something is written with this sequence, the packets are written to all hosts on the network. All hosts should but are not mandated to pick up this packet and look at the data element. A class E network starts with 1111 and is considered to be reserved and not to be used. The image from Chapter 2 of TCP/IP Illustrated Volume I shows the above visually.

This comes into play when someone talks about netmasks. If you are talking about a 0.0.0.0/16 it means that you are ignoring the leading 16 bits and looking at the remaining 16 bits to use for routing. You might also see 0.0.0.0/24 which means that you use the last 24 bits to route the data. If you set your netmask to be 255.255.255.0 it means that you are using a class B network with the first 16 bits defining the corporate network, the next 8 bits defining the subnet in the company, and the last 8 bits to define the specific host. This means that you can have 255 subnets in the company and 255 computers on each network. A netmask of 255.255.255.0 suggests that you are not going to route outside of your subnet if the first three octets are the same. What this means is that a router either passes the packets through or does not pass the data through based on the netmask and ip address of the destination.

You might hear the term CIDR (Classless inter-domain routing). This term refers to how to get to and from a host if there are multiple ways of traversing the network. We will not get into this but netmasks are good ways of limiting routing tables and spanning trees across networks. This is typically a phrase that you need to know about if you are looking at limiting communication and flow of addresses across a data center.

Earlier we talked about reserved networks and subnets. Some of the network definitions for IPv4 are defined as private and non-routable networks. A list of these addresses include

  • 0.0.0.0/8 Hosts on the local network. May be used only as a source IP address.
  • 10.0.0.0/8 Address for private networks (intranets). Such addresses never appear on the public Internet.
  • 127.0.0.0/8 Internet host loopback addresses (same computer). Typically only 127.0.0.1 is used.
  • 169.254.0.0/16 “Link-local” addresses—used only on a single link and generally assigned automatically.
  • 172.16.0.0/12 Address for private networks (intranets). Such addresses never appear on the public Internet.
  • 192.168.0.0/16 Address for private networks (intranets). Such addresses never appear on the public Internet.
  • 224.0.0.0/4 IPv4 multicast addresses (formerly class D); used only as destination addresses.
  • 240.0.0.0/4 Reserved space (formerly class E), except 255.255.255.255.
  • 255.255.255.255/32 Local network (limited) broadcast address.

Multicast addressing is supported by IPv4 and IPv6. An IP multicast address (also called group or group address) identifies a group of host interfaces, rather than a single one. Most cloud vendors don't allow for multicast and restrict use of communications to unicast from one server to another.

Some of the additional terms that come up are network address translation (NAT), border gateway router (BGP), and firewalls come up around networking discussions. We will defer these conversations to higher layer protocols because they involve more than just the ip address. BGP can be a simple definition that just drops ip addresses and does not pass them outside the corporate network independent of the netmask that the source host uses. If, for example, we want to stop someone from connecting to an ip address outside of our network and force it to go through a firewall or packet filter device a BGP can redirect all traffic through these devices or drop the packets.

In summary, we skimmed over routing. This is a complex subject. We mainly talked about layers 2 and 3 to introduce the terms MAC address, IP address, IPv4, and IPv6. We touched on CIDR and routing tables as well as reserved addresses and BGP and NAT. This is not a complete discussion on these subjects but an introduction of terms. Most cloud vendors do not support multicast or anycast broadcasts inside or outside of their cloud services. Most cloud vendors support IPv4 and IPv6 as well as subnet masking and multiple networks for servers and services. It is important to understand what a router is, how to configure a routing table, and the dangers of creating routing loops. We did not touch on hop count and hop cost because for most cloud implementations the topology is simple and servers inside a cloud implementation is rarely a hop or two away unless you are trying to create a highly available service in another data center, zone, or region. Up next, the data layer and the IP datagram.

Modernize Customer Engagement: Collaborative Marketing Asset Development

WebCenter Team - Mon, 2016-08-08 15:21

Content and feature rich engagement sites can help drive effective interactions with various groups such as customers, partners, and employees, leading to higher satisfaction and loyalty. With Oracle’s collaborative marketing asset development solution, business users with absolutely no website experience can rapidly assemble rich, interactive engagement microsites for marketing and communities. Microsites can be built on the fly with new content and also incorporate existing enterprise content, processes, and social applications all within a single integrated user interface.

Digitally empowered consumers can be your greatest advocates and your most loyal buying population. By engaging these customers—tracking their web activities, intuiting their needs, and recommending next steps in the buying cycle—marketing professionals can control the customer experience, from initial contact to long term loyalty. 

Most companies depend on several channels to interact with their customers, including email, Web, mobile, and social. Customer needs vary from one channel to the next. In addition, their expectations change at each stage of these relationships, from initial awareness through qualification, purchase, repeat purchases, and ongoing service. 

At a time when most interactions take place online, meeting customer needs and exceeding their expectations has become a tremendous technical challenge. Market-leading organizations succeed by establishing a versatile set of information systems for creating customer-facing content and sharing it with prospects via integrated marketing and awareness-building campaigns. They create engaging digital customer experiences that fulfill each customer’s expectations during each interaction and they understand the importance of facilitating and nurturing exceptional experiences. We invite you to read this solution brief to see how collaborative marketing asset development can help you meet customer expectations and effectively engage your customers, partners and employees.

Asahi Refining Selects Oracle Cloud to Improve Financial Visibility and Accelerate Business Growth

Oracle Press Releases - Mon, 2016-08-08 12:13
Press Release
Asahi Refining Selects Oracle Cloud to Improve Financial Visibility and Accelerate Business Growth Modern Finance Platform Enables Asahi Refining to Embrace Industry Change

Redwood Shores, Calif.—Aug 8, 2016

Asahi Refining, the world’s leading provider of precious metal assaying, refining, and bullion products, selected Oracle Cloud Applications and Oracle Cloud Platform to streamline its procurement and financial processes to get a more comprehensive and accurate picture of its financials to provide better visibility into the business.  By moving to the cloud, Asahi Refining has been able to shift its full attention to its core business of refining gold and silver and accelerate business growth.

The ongoing digitization of the refining industry means that organizations need an integrated financial platform to leverage data insights that can help evolve their business models and retain their competitive advantage. To address this market shift, Asahi Refining needed to overhaul its legacy enterprise resource planning (ERP) system, which was difficult to maintain, had limited reporting capabilities and contained fragmented data spread across various silos. The company needed a modern, integrated system to gain the insights needed for swift approvals and decision making.

“In order to update our outdated and over-extended IT infrastructure, we needed to move our financials to a centralized and secure environment,” said Kevin Braddy, IT director, Asahi Refining. “The Oracle ERP Cloud gives us real-time visibility into finance operations across the company and helps drive efficiencies across our financial processes. With this accurate financial information easily at hand, we are able to focus on growing our business.” 

Using the Oracle ERP Cloud and Oracle Cloud Platform, Asahi Refining was able to replace its legacy ERP environment with an integrated cloud-based financial system. Within three months, Asahi Refining was able to fully implement the solution and transition to Oracle Self-Service Procurement Cloud, Oracle Financials Cloud, and Oracle Purchasing Cloud.  The company now has a highly accurate, 360-degree view of its financial systems and operations. In addition, Asahi Refining was able to standardize reporting and reduce month-end reporting from a week to just three days, while increasing its efficiency in processing receivable transactions.

“We are happy to be working with Asahi Refining to help them transform their business with the Oracle Cloud,” said Amit Zavery, senior vice president, cloud platform and integration, Oracle.  “Moving from legacy systems to the cloud enabled Asahi Refining to modernize its technology systems, improving visibility into the business and ultimately accelerating growth and increasing efficiency.”

Asahi Refining used the Oracle Java Cloud and Oracle Database Cloud to seamlessly integrate its Oracle ERP Cloud applications with its legacy ERP system and third-party payroll applications, as well as to validate all data coming into the Oracle ERP Cloud from those legacy applications. Additionally, Asahi Refining has been able to lower its total cost-of-ownership by moving to the cloud, which the company can now leverage to realize additional business efficiencies in the future.

The Oracle Cloud runs in 19 data centers around the world and supports 70+ million users and more than 34 billion transactions each day. With the Oracle Cloud, Oracle delivers the industry’s broadest suite of enterprise-grade cloud services, including Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS), and Data as a Service (DaaS).

 
Contact Info
Nicole Maloney
Oracle
+1.650.506.0806
nicole.maloney@oracle.com
About Oracle

Oracle offers a comprehensive and fully integrated stack of cloud applications and platform services. For more information about Oracle (NYSE:ORCL), visit www.oracle.com.

Trademarks

Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.

Safe Harbor

The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle's products remains at the sole discretion of Oracle Corporation. 

Talk to a Press Contact

Nicole Maloney

  • +1.650.506.0806

Windows: Sauvegarde RMAN sur un disque partagé

Yann Neuhaus - Mon, 2016-08-08 11:09

Dans ce blog, je vais vous expliquer comment exporter les backups RMAN sur un « share disk » appartenant à un Domaine.

Assurer la sécurité des données est l’une des tâches principales de l’administrateur :

  • La mise en œuvre d’une protection des fichiers sensibles de la base :
    • Fichier de contrôle
    • Fichiers de journalisation
  • La mise en place d’une stratégie de sauvegarde/récupération :
    • Adaptée aux contraintes de l’entreprise
    • Testée et documentée.

Afin de vous documenter sur les différentes techniques de sauvegarde et de restauration, je vous propose de jeter un coup d’œil à notre page Workshop Oracle Backup Recovery.

Plusieurs d’entre vous utilisent certainement des serveurs Windows pour administrer les bases de données Oracle, cependant il n’est pas toujours évident de les administrer sur un environnement Windows par rapport à Linux.
C’est pourquoi, je vous propose une solution de sauvegarde qui exportera vos backups sur un disque partagé ou un serveur de stockage sur lequel une sauvegarde des backups se fait quotidiennement sur un disque ou une bande.

Voici les étapes à suivre:

  • Vérifiez les droits (lecture/écriture) sur le disque partagé
  • Configurez le service Oracle et le Listener dans l’outil « services.msc » avec l’utilisateur de service
  • Vérifiez que le mot de passe du compte de service n’expire jamais et qu’il ne soit jamais verrouillé ou supprimé.
  • Redémarrez les services (oracle et listener)
  • Testez les backups avec RMAN

Allez dans le menu « services.msc » et changez le paramètre du service « OracleService_[nom_de_l’instance] » ainsi que le service « Listener » à l’aide de l’utilisateur de service qui fait fonctionner vos bases de données.

Faites un clic droit sur « Propriété » aller sur l’onglet « Connexion » puis sélectionnez « Ce compte ».
Cliquez ensuite sur « Parcourir » puis écrivez le nom de l’utilisateur de service, pour finir cliquez sur « Vérifier les noms » afin de trouver l’utilisateur dans l’Active Directory.

Capture-13
Capture-8Capture-9

Redémarrez le service Oracle et Listener.
ATTENTION : Ne pas redémarrer les services si la base de données est une production !
Capture-15

Testez les Backups RMAN sur le lecteur partagé :
Capture-17

Bien entendu, il est préférable de scripter les backups via le Planificateur de tâches, afin de les exécuter automatiquement. Je vous parlerais de cette prochaine étape lors d’un second blog.

 

Cet article Windows: Sauvegarde RMAN sur un disque partagé est apparu en premier sur Blog dbi services.

September 7, 2016: Telogis—Oracle HCM Cloud Customer Forum

Linda Fishman Hoyle - Mon, 2016-08-08 10:49

Join us for an Oracle HCM Cloud Customer Forum call on Wednesday, September 7, 2016.

Janet Randolph, vice president, Human Resources, and Rosetta Jasperson, manager HR Operations and Systems, will discuss how Oracle HCM Cloud helped Telogis consolidate its data, integrate its payroll system globally, and improve reporting and data reliability. Randoph and Jasperson also will share the importance of an integrated operation—being able to implement inventory and finance in the cloud along with HCM was a key decision point for the company.

Register now to attend the live Forum on Wednesday, September 7, 2016, at 9:00 a.m. PT and learn more about Telogis’ experience with Oracle HCM Cloud.

Performance imact of adding 200+ columns to a table

Tom Kyte - Mon, 2016-08-08 09:46
Hi Team, I have doubt on number of columns on a table. currently we have 66 columns in a table and we want to add extra 204 columns in that table. My question is it will impact the DB performance and lead to row chaining or not? The DB block si...
Categories: DBA Blogs

SQL query sometimes taking longer (most of the time working good)

Tom Kyte - Mon, 2016-08-08 09:46
This is the duplicate (unable to edit the old) question where Connor Sir has asked to add code tags but as I was not aware of code tags. Here it is... This is to ask some suggestion about a query which is infrequently taking minutes->hours time...
Categories: DBA Blogs

Why Scalar sub query is reducing my query cost to 50%

Tom Kyte - Mon, 2016-08-08 09:46
Hi Tom, Please have a look: Below are the 2 queries with the same result set but differing in the cost. When i used scalar sub query instead of inner join its cost is low when compared with the other. Could you please explain. Please u...
Categories: DBA Blogs

Getting data from Multiple Users

Tom Kyte - Mon, 2016-08-08 09:46
Hi Tom, Please find the below problem statement and kindly provide the solution. Problem Statement: I have a schema and that schema contains a table T1. T1 table contains 2 columns i.e. UserId and CityId. T1 ------------- USERID CITYID -...
Categories: DBA Blogs

RMAN restore into a new database

Tom Kyte - Mon, 2016-08-08 09:46
Hi.. 3 days before I took Level 0 and Level 1 backup from my database( name:sample) by using RMAN .Yesterday my target database was crashed.So I created another new database(sample1). Now I want to use those backup files and restore that all data in...
Categories: DBA Blogs

Oracle Security Talks, Training and Conferences

Pete Finnigan - Mon, 2016-08-08 09:46

Kamil Stawiarski who runs Database Whisperers sp. z o. o. sp. k., an Oracle specialist consulting company in Poland and whose company is also a reseller for our Oracle database security scanner PFCLScan in Poland has invited me to speak....[Read More]

Posted by Pete On 08/08/16 At 12:48 PM

Categories: Security Blogs

Why Asking Myself How To Add Value At Work Is The Best Thing I’ve Done This Month

Complete IT Professional - Mon, 2016-08-08 06:00
I’ve been doing something at work which has been getting great results. I only started doing a lot of it a few weeks ago. But, I’ve had a few people notice, and I can see the positive impact it’s having on the team. I want to share it in this article so you can try […]
Categories: Development

PeopleSoft Encryption

Protection of sensitive data while at-rest, in-motion or in-use all need to be addressed as part of a holistic security strategy. This includes both Personally Identifiable Information (PII) as well as sensitive PeopleSoft system configurations.

When performing a PeopleSoft security audit, Integrigy reviews the use and implementation of encryption within all components of the PeopleSoft technology stack. This includes the following, all which are critical. Review yours today and contact Integrigy with any questions.

  • Implementation of Oracle Advanced Security Option (ASO) for Transparent Data Encryption (TDE), Oracle Wallets and encryption key management for database encryption
  • Configuration of SQL-NET encryption between database server, application and web servers
  • PeopleSoft Pluggable Encryption Technology (PET)
  • PeopleSoft client and web services connections. Specifically, we look to ensure that both internal and external network traffic is encrypted using TLS not SSL to encrypt network traffic. TLS is the successor to SSL and is considered more secure.
  • Encryption of Tuxedo configurations using the PSADMIN utility
  • Encryption of PeopleSoft web server configurations by generating or implementing a new PSCipher key to encrypt values in the web server configuration files.
  • Encryption of the Template file. The Template file is used to share configurations among multiple environments (Test, Dev Prod etc...) and passwords stored in the file MUST be encrypted and should not be stored in clear text.

If you have questions, please contact us at info@integrigy.com

Michael A. Miller, CISSP-ISSMP, CCSP

References

PeopleSoft Database Security

PeopleSoft Security Quick Reference

Encryption, Oracle PeopleSoft
Categories: APPS Blogs, Security Blogs

TCP/IP Illustrated Vol 1

Pat Shuff - Mon, 2016-08-08 02:07
Back in 1998 I was working for Sun Microsystems and took an introductory class on networking. One of the big benefits of working for Sun is that it had a very strong affiliation with Stanford University and employees could take classes at no cost. An early rumor was that Sun really stood for Stanford University Networking since two of the founders of the company were living in the Stanford dorms during the early years of Sun. Stanford for years has offered CS 144 - Introduction to Computer Networking. The class is based on Kevin Fall and Richard Steven's book TCP/IP Illustrated Volume 1. I was in an internal training class about cloud services last week and terms and phrases that I remotely remembered kept coming up. As I talked to more and more people, they also knew most of the terms but not all of them. In the next few days we will go through TCP/IP Illustrated and provide a quick tutorial on networking for those of us that have been out of college more than ten years (much more for some of us) and don't work with this on a daily basis.

TCP/IP Illustrated starts out by talking about the history of computer connectivity and the evolution of the 7 layer OSI stack. The seven layers consist of physical (1), link (2), network (3), transport (4), session (5), presentation (6), and application (7). Each of these layers have different protocols, methodologies, and incantations that make them unique and worthy of selection for different problems.

The physical layer is the actual connection between two computers. This might be a copper cable, fiber optic cable, or wireless network. The physical connection media is the definition for this layer. Most of us are familiar with a cable that comes out of the wall, switch, or router and plugs into our server or wifi hub. We are also familiar with a wifi or bluetooth connection that allows us to connect without a physical wire connecting us to other computers. We are not going to focus on this layer but assume that we are wirelessly or ethernet connected to the internet and the cloud servers that we are connecting to are wired to an internet connection. We then use the nebulous internet to route our requests to access our cloud server and responses back to us. This will require higher layers of the stack to make this happen but the default is that we are connected to a network in some manner as well as the server that we want to connect to.

The link or data link layer include protocols for connecting to a link layer and exchanging data. Links can be multi-access layers with more than just two computers talking to each other. WiFi and Ethernet networks are examples of a multi-access layer. We can have more than two computers on these networks and all of them can operate at the same time on the network. Not all of the computers can talk at once but they can time slice the network and share the common physical layer together.

The network or internetwork layer (layer 3) is the protocol layer where we frame packets of information and define communication protocols. Protocols like TCP/IP is defined at this layer. We can put a data analyzer on the physical cable and look at bits streaming by on the wire (or wifi) and decode these packets into data and control blocks. The IP or internet protocol layer is defined here as well as other protocols for creating data packets.

The transport layer (layer 4) is the layer where we describe how data is exchanged and deal with collisions, addresses, and different types of services. TCP, for example, exists at this layer and has protocols for dealing with collisions on the network. If two computers are talking at the same time, bits get overwritten and listeners can not properly read the packets. The TCP layer defines how to request retransmission of data as well as how to avoid collisions in the future for short term. Other protocols like UDP and multicast are defined at this layer that allows us to do things like broadcast messages to all hosts on a network and not wait for a response or acknowledgement. We might want to do this for a video broadcast from a single source where we know that we have one transmitter and multiple receivers on a network.

The session layer (layer 5) are handshaking mechanisms to maintain state between data packets. An example of this would be a cookie in a web browser to maintain a relationship between a client and web server. Server affinity and route preferences are also defined at this layer. If we have a pool of web servers and want to send a client back to the web server that it went to previously, this layer helps create this affinity.

The presentation layer (layer 6) is responsible for format conversions and is typically not manipulated or used for internet protocols or communications.

The application layer (layer 7) is where most of the work is done. A web server, for example, uses http as the communication protocol and defines how screens are painted inside a browser and what files are retrieved from a web server. There are hundreds of layers defined here and we will go into a few examples in future blogs.

If we take an overview of TCP/IP Illustrated Volume I we see that chapter 1 covers the OSI stack and introduces networking and the history of networking as well as layer 1 options. Chapter 2 covers layer 3 and all networking options and touches on the differences between IPv4 and IPv6. Chapter 3 covers the link layer or layer 2 focusing on ethernet, bridges, switches, wireless networks, point to point protocols, and tunneling options. Chapter 4 dives into the ARP protocol which is an implementation of layer 3 used to deal with addressing and computers on a network. Chapter 5 covers the IP definition and discusses packet headers and formats. Chapter 6 goes into addressing more and talks about dynamic host configuration protocol (DHCP) for assigning addresses dynamically. Chapter 7 discusses firewalls and routers as well as network address translations (NAT) concepts. This is the layer that typically gets confusing for cloud vendors and leads to different configurations and options when it comes to protecting servers in the cloud. Chapters 8 and 9 deal with internet control message protocol, broadcasting, and multicasting. Most cloud vendors don't deal with this layer and just prohibit the use of this layer. Chapter 10 focuses on UDP and IP fragmentation. Chapter 11 centers on Domain Naming Services. Each cloud vendor addresses this differently with local and global naming services. We will look at the major cloud vendors and see how they address local naming and name resolution. Chapters 12 through 17 deal with the TCP structure, management, and operation. The Stanford class spent most of the semester on this and ways of optimizing errors and issues. Most cloud vendors do this for you and don't really let you manipulate or modify anything presented in these chapters. The book finishes with Chapter 18 by talking about security in all of its flavors and incantations. We will spend a bit of time talking about this layer since it is of major concern for most users.

In review, we are going to go back and look at networking terms, concepts, and buzzwords so that when someone asks us does this cloud service provide xyz you have a strong context of what they are asking. We are not trying to make everyone a networking expert, just trying to level set the language so that we can compare and contrast services between different cloud vendors.

Notes on DataStax and Cassandra

DBMS2 - Sun, 2016-08-07 20:19

I visited DataStax on my recent trip. That was a tipping point leading to my recent discussions of NoSQL DBAs and misplaced fear of vendor lock-in. But of course I also learned some things about DataStax and Cassandra themselves.

On the customer side:

  • DataStax customers still overwhelmingly use Cassandra for internet back-ends — web, mobile or otherwise as the case might be.
  • This includes — and “includes” might be understating the point — traditional enterprises worried about competition from internet-only ventures.

Customers in large numbers want cloud capabilities, as a potential future if not a current need.

One customer example was a large retailer, who in the past was awful at providing accurate inventory information online, but now uses Cassandra for that. DataStax brags that its queries come back in 20 milliseconds, but that strikes me as a bit beside the point; what really matters is that data accuracy has gone from “batch” to some version of real-time. Also, Microsoft is a DataStax customer, using Cassandra (and Spark) for the Office 365 backend, or at least for the associated analytics.

Per Patrick McFadin, the four biggest things in DataStax Enterprise 5 are:

  • Graph capabilities.
  • Cassandra 3.0, which includes a complete storage engine rewrite.
  • Tiered storage/ILM (Information Lifecycle Management).
  • Policy-based replication.

Some of that terminology is mine, but perhaps my clients at DataStax will adopt it too. :)

We didn’t go into as much technical detail as I ordinarily might, but a few notes on that tiered storage/ILM bit are:

  • It’s a way to have some storage that’s more expensive (e.g. flash) and some that’s cheaper (e.g. spinning disk). Duh.
  • Since Cassandra has a strong time-series orientation, it’s easy to imagine how those policies might be specified.
  • Technologically, this is tightly integrated with Cassandra’s compaction strategy.

DataStax Enterprise 5 also introduced policy-based replication features, not all of which are in open source Cassandra. Data sovereignty/geo-compliance is improved, which is of particular importance in financial services. There’s also hub/spoke replication now, which seems to be of particular value in intermittently-connected use cases. DataStax said the motivating use case in that area was oilfield operations, where presumably there are Cassandra-capable servers at all ends of the wide-area network.

Related links

  • I wrote in detail about Cassandra architecture in December, 2013.
  • I wrote about intermittently-connected data management via the relational gold standard SQL Anywhere in July, 2010.
Categories: Other

Lost control files

Tom Kyte - Sun, 2016-08-07 15:26
I have couple of questions regarding controlfiles 1.I am connected through catalog and lost all the control files of database how can i recover the database and get all control files back please suggest 2.If in lost of all control files will I be a...
Categories: DBA Blogs

Updating / Resetting columns

Tom Kyte - Sun, 2016-08-07 15:26
Hey Guys, I have a process where I need to update one column with the value of another if the 1st column is null, when I transfer the value I need to set the value of the second column to null, I am doing this in a single update statement, see exa...
Categories: DBA Blogs

MVIEW Dependencies

Tom Kyte - Sun, 2016-08-07 15:26
Where are the MVIEW dependencies stored? SQL> create view y1 as select 1 as y1 from dual; View created. <code>SQL> create materialized view y2 as select y1 as y2 from y1; Materialized view created. SQL> create view y3 as select y2 as y...
Categories: DBA Blogs

Selecting rank wise records

Tom Kyte - Sun, 2016-08-07 15:26
Hi Tom, Its been such a long time to visit here and resolve the doubts but this is the first time I am asking. There is an Employee table with Name, Department, Salary and Date of Joining in it. I need to write a query which will give the outpu...
Categories: DBA Blogs

Pages

Subscribe to Oracle FAQ aggregator