Basic UNIX commands
Note: not all of these are actually part of UNIX itself, and you may not find them on all UNIX machines. But they
can all be used on turing in essentially the same way, by typing the command and hitting return. Note that some of
these commands are different on non-Solaris machines - see SunOS differences.
If you've made a typo, the easiest thing to do is hit CTRL-u to cancel the whole line. But you can also edit the
command line (see the guide to More UNIX).
UNIX is case-sensitive.
Files
* ls --- lists your files
ls -l --- lists your files in 'long format', which contains lots of useful information, e.g. the exact size of
the file, who owns the file and who has the right to look at it, and when it was last modified.
ls -a --- lists all files, including the ones whose filenames begin in a dot, which you do not always want to
see.
There are many more options, for example to list files by size, by date, recursively etc.
* more filename --- shows the first part of a file, just as much as will fit on one screen. Just hit the space
bar to see more or q to quit. You can use /pattern to search for a pattern.
* emacs filename --- is an editor that lets you create and edit a file. See the emacs page.
* mv filename1 filename2 --- moves a file (i.e. gives it a different name, or moves it into a different
directory (see below)
* cp filename1 filename2 --- copies a file
* rm filename --- removes a file. It is wise to use the option rm -i, which will ask you for confirmation before
actually deleting anything. You can make this your default by making an alias in your .cshrc file.
* diff filename1 filename2 --- compares files, and shows where they differ
* wc filename --- tells you how many lines, words, and characters there are in a file
* chmod options filename --- lets you change the read, write, and execute permissions on your files. The default
is that only you can look at them and change them, but you may sometimes want to change these permissions. For
example, chmod o+r filename will make the file readable for everyone, and chmod o-r filename will make it unreadable
for others again. Note that for someone to be able to actually look at the file the directories it is in need to be
at least executable. See help protection for more details.
* File Compression
o gzip filename --- compresses files, so that they take up much less space. Usually text files compress to
about half their original size, but it depends very much on the size of the file and the nature of the contents.
There are other tools for this purpose, too (e.g. compress), but gzip usually gives the highest compression rate.
Gzip produces files with the ending '.gz' appended to the original filename.
o gunzip filename --- uncompresses files compressed by gzip.
o gzcat filename --- lets you look at a gzipped file without actually having to gunzip it (same as gunzip
-c). You can even print it directly, using gzcat filename | lpr
* printing
o lpr filename --- print. Use the -P option to specify the printer name if you want to use a printer other
than your default printer. For example, if you want to print double-sided, use 'lpr -Pvalkyr-d', or if you're at
CSLI, you may want to use 'lpr -Pcord115-d'. See 'help printers' for more information about printers and their
locations.
o lpq --- check out the printer queue, e.g. to get the number needed for removal, or to see how many other
files will be printed before yours will come out
o lprm jobnumber --- remove something from the printer queue. You can find the job number by using lpq.
Theoretically you also have to specify a printer name, but this isn't necessary as long as you use your default
printer in the department.
o genscript --- converts plain text files into postscript for printing, and gives you some options for
formatting. Consider making an alias like alias ecop 'genscript -2 -r \!* | lpr -h -Pvalkyr' to print two pages on
one piece of paper.
o dvips filename --- print .dvi files (i.e. files produced by LaTeX). You can use dviselect to print only
selected pages. See the LaTeX page for more information about how to save paper when printing drafts.
Directories
Directories, like folders on a Macintosh, are used to group files together in a hierarchical structure.
* mkdir dirname --- make a new directory
* cd dirname --- change directory. You basically 'go' to another directory, and you will see the files in that
directory when you do 'ls'. You always start out in your 'home directory', and you can get back there by typing 'cd'
without arguments. 'cd ..' will get you one level up from your current position. You don't have to walk along step
by step - you can make big leaps or avoid walking around by specifying pathnames.
* pwd --- tells you where you currently are.
Finding things
* ff --- find files anywhere on the system. This can be extremely useful if you've forgotten in which directory
you put a file, but do remember the name. In fact, if you use ff -p you don't even need the full name, just the
beginning. This can also be useful for finding other things on the system, e.g. documentation.
* grep string filename(s) --- looks for the string in the files. This can be useful a lot of purposes, e.g.
finding the right file among many, figuring out which is the right version of something, and even doing serious
corpus work. grep comes in several varieties (grep, egrep, and fgrep) and has a lot of very flexible options. Check
out the man pages if this sounds good to you.
About other people
* w --- tells you who's logged in, and what they're doing. Especially useful: the 'idle' part. This allows you
to see whether they're actually sitting there typing away at their keyboards right at the moment.
* who --- tells you who's logged on, and where they're coming from. Useful if you're looking for someone who's
actually physically in the same building as you, or in some other particular location.
* finger username --- gives you lots of information about that user, e.g. when they last read their mail and
whether they're logged in. Often people put other practical information, such as phone numbers and addresses, in a
file called .plan. This information is also displayed by 'finger'.
* last -1 username --- tells you when the user last logged on and off and from where. Without any options, last
will give you a list of everyone's logins.
* talk username --- lets you have a (typed) conversation with another user
* write username --- lets you exchange one-line messages with another user
* elm --- lets you send e-mail messages to people around the world (and, of course, read them). It's not the
only mailer you can use, but the one we recommend. See the elm page, and find out about the departmental mailing
lists (which you can also find in /user/linguistics/helpfile).
About your (electronic) self
* whoami --- returns your username. Sounds useless, but isn't. You may need to find out who it is who forgot to
log out somewhere, and make sure *you* have logged out.
* finger & .plan files
of course you can finger yourself, too. That can be useful e.g. as a quick check whether you got new mail. Try
to create a useful .plan file soon. Look at other people's .plan files for ideas. The file needs to be readable for
everyone in order to be visible through 'finger'. Do 'chmod a+r .plan' if necessary. You should realize that this
information is accessible from anywhere in the world, not just to other people on turing.
* passwd --- lets you change your password, which you should do regularly (at least once a year). See the LRB
guide and/or look at help password.
* ps -u yourusername --- lists your processes. Contains lots of information about them, including the process
ID, which you need if you have to kill a process. Normally, when you have been kicked out of a dialin session or
have otherwise managed to get yourself disconnected abruptly, this list will contain the processes you need to kill.
Those may include the shell (tcsh or whatever you're using), and anything you were running, for example emacs or
elm. Be careful not to kill your current shell - the one with the number closer to the one of the ps command you're
currently running. But if it happens, don't panic. Just try again Smiley If you're using an X-display you may have
to kill some X processes before you can start them again. These will show only when you use ps -efl, because they're
root processes.
* kill PID --- kills (ends) the processes with the ID you gave. This works only for your own processes, of
course. Get the ID by using ps. If the process doesn't 'die' properly, use the option -9. But attempt without that
option first, because it doesn't give the process a chance to finish possibly important business before dying. You
may need to kill processes for example if your modem connection was interrupted and you didn't get logged out
properly, which sometimes happens.
* quota -v --- show what your disk quota is (i.e. how much space you have to store files), how much you're
actually using, and in case you've exceeded your quota (which you'll be given an automatic warning about by the
system) how much time you have left to sort them out (by deleting or gzipping some, or moving them to your own
computer).
* du filename --- shows the disk usage of the files and directories in filename (without argument the current
directory is used). du -s gives only a total.
* last yourusername --- lists your last logins. Can be a useful memory aid for when you were where, how long
you've been working for, and keeping track of your phonebill if you're making a non-local phonecall for dialling in.
Connecting to the outside world
* nn --- allows you to read news. It will first let you read the news local to turing, and then the remote news.
If you want to read only the local or remote news, you can use nnl or nnr, respectively. To learn more about nn type
nn, then \tty{:man}, then \tty{=.*}, then \tty{Z}, then hit the space bar to step through the manual. Or look at the
man page. Or check out the hypertext nn FAQ - probably the easiest and most fun way to go.
* rlogin hostname --- lets you connect to a remote host
* telnet hostname --- also lets you connect to a remote host. Use rlogin whenever possible.
* ftp hostname --- lets you download files from a remote host which is set up as an ftp-server. This is a common
method for exchanging academic papers and drafts. If you need to make a paper of yours available in this way, you
can (temporarily) put a copy in /user/ftp/pub/TMP. For more permanent solutions, ask Emma. The most important
commands within ftp are get for getting files from the remote machine, and put for putting them there (mget and mput
let you specify more than one file at once). Sounds straightforward, but be sure not to confuse the two, especially
when your physical location doesn't correspond to the direction of the ftp connection you're making. ftp just
overwrites files with the same filename. If you're transferring anything other than ASCII text, use binary mode.
* lynx --- lets you browse the web from an ordinary terminal. Of course you can see only the text, not the
pictures. You can type any URL as an argument to the G command. When you're doing this from any Stanford host you
can leave out the .stanford.edu part of the URL when connecting to Stanford URLs. Type H at any time to learn more
about lynx, and Q to exit.
Miscellaneous tools
* webster word --- looks up the word in an electronic version of Webster's dictionary and returns the
definition(s)
* date --- shows the current date and time.
* cal --- shows a calendar of the current month. Use e.g., 'cal 10 1995' to get that for October 95, or 'cal
1995' to get the whole year.
Tuesday, July 21, 2009
Friday, July 17, 2009
TIBCO BW
TIBCO BW -FAQS
1) What is the use of service container?
Ans) In the latest version of TIBCO Active Matrix Business Works a new feature called Service container is added. In this service container we can add number of EAR files and run all the services simultaneously. With the Service container feature we can add and upgrade processes without bringing down other running processes.
2) In how any ways can we create EAR files.
Ans) We can build EAR files in 2 ways. One method is using the Enterprise Archive pallete in the Tibco designer and adding the process archive we can build EAR file.
Other method is from the cmd prompt. We use the command appmanage and buildear.
3) What is Schema and why do we create schema.
Ans) Schema is used to create a XML schema file in which we add the variables which we want to use in our designer process. We can create the elements under which we can add the typed variables. The structure formed will be in the form of tree structure.
4) What is the use of confirm activity.
Ans) Confirm activity is used to confirm the success of a activity that have confirmable messages. For example if certain process starts on reception of a message then if that process starts the confirm activity sends a confirm message to the sender of the message.
5) What are the different modes of tibco BW installation.
Ans) There are 3 modes installation . They are a) GUI b) console c) silent
6) When we save a project what files are created under the saved project folder.
Ans) In that folder we see the Aeschema folder, all processes create in that project and the vcrepo.dat file.
7) What are the contents of vcrepo.dat
Ans) This files contains the display name , RV encodings and description.
8) What is grouping activity?
Ans) Grouping activity is used to group certain activities used in the designer so that we can loop those activities and iterate the group with conditions.
9) What is the condition for a process in order to build the EAR file.
Ans) We need to have a process starter.
10) How can we design exception handling?
Ans) The basic method is by routing the process to another sub process whenever error occurs by using the error transition.
11) What is the use of Render XML pallet.
Ans) It is used to create a XML file by creating the tags used in the xml file.
12) What are the elements in the WSDL file.
Ans) In abstract WSDl file we have the information about the messages ( request, reply) port type, operation. In concrete in addition to above we have the transport information.
13) What is the use of global variables?
Ans) Global variables are useful in order to provide dynamic input at the run time.
14) What is custom activity?
Ans) Custom activity is useful when we want others to use our process and not allow them to view the contents of the process. We can add this process into our MY Pallete section. We can directly use this process by dragging it into our process.
15) In web service in how many ways can we create connections.
Ans) 2 ways. HTTP and JMS.
16) How does the file poller activity works.
Ans) This is a starter activity which starts the process whenever there is update for the file that is specified.
17) What is the use of project template?
Ans) In project template we can save our standard processes that we want to use in future. These processes are generally the ones which have the commonly used activities.
18) What is the optimum maximum number of connections in JDBC?
Ans) 10
19) What is sub process and what is its use?
Ans) Whenever we call a process from another process , the called processbecomes the subprocess. Sub process helps in reducing the complexity of the design by assigning the activity in other process.
20) What is TRA.
Ans) Tibco Runtime Agent is the main frame work for all the tibco softwares. It provides the runtime agent and monitoring agent. All the libraries required by the designs are provided by TRA.
21) What are the process variables that are available to all activities as inputs.
Ans) global variables and process context.
22) What are break points?
Ans) Break points are used to check the inputs and outputs of each activity during testing the design so that we can debug our design. We can place the check points for all activities on input and output side.
23) What re the encoding techniques in WSDL?
Ans ) Encoded and literal.
24) What are the conditions in transitions?
Ans) Success, Success with condition, Success with no condition and error.
25) What are the different variables in BW?
Ans) Global variables, Shared variables, process variables and job shared variables.
26. Explain the processes flow of your latest project by including activities.
ans: for various service implementation I designed processes using various BW activities like JMS Queue Receiver, XML Parser
27. What are the differences between the versions 2.x and 5.2?
ans:
type 2.x 5.2
deployment In 2.x deployment is done in the designer Here deployment is done using administrator tool
Name spaces Name spaces are prefixed with tib No tib in name spaces
pallets Extra pallets added
Iterate-reset At the end of each iterate the output is not reset Here the output is reset after each iteration
installation Here all the components like BW,ADB,FILE etc come as a package Here we will have to install each component separately
File type All files are .dat. we have to convert these manually Multi format file are available so that we do not have to convert the dat files
28. What are the activities you worked on?
Ans: JMS queue receiver,confirm,checkpoint,XML parser,call process,JDBC update,SOAP,HTTP.
write to log - widely used.
Assign.
29. What is the inspector activity does?
Ans: the inspector activity is used to obtain the output of any activity or all the activities and process variables.
Scenario: You can use the inspector activity to write the output of any activity or process variable in the current process. Activities and process variables in a subprocess are not available to the Inspector activity (but the output of a Call Process activity can be written using the Inspector activity). If you wish to obtain the output from one or more activities or process variables in a subprocess, place the Inspector activity in the process definition of the subprocess.
30.Can you tell me at least four starter activities and when they get executed?
Ans:
1) Adapter subscriber, adap request response server :-When ever a message comes into a destination queue or network, listerns to a request from a adapter and sends a respose back to that adapter
2) File poller :- polls for any changes that occur in the file and with any change grabs the whole file.
3) Timer:- receive notification Starts a process on the time specified ex: before JDBC QUERY, starts a process on receiving of data from a notify activity.
4) http receiver :-Starts a process based on a request from http server.
5) Jms queue receiver, jms topic subscriber :- Starts a process when ever a new message comes into the specified queue, starts a process when ever there is a new message in the specified topic.
6) Receive mail :- The Receive Mail process starter polls a POP3 mail server for new mail. When new mail is detected and retrieved, the Receive Mail process starter starts a new process for the process definition it resides in and passes the mail data to the next activity in the process flow.
7) Rv subscriber:- The Rendezvous Subscriber process starter creates a process when a TIBCO Rendezvous message on the given subject is received.
Cool Rmi server :- The RMI Server process starter registers the specified remote object name with the specified registry server and then creates process instances to handle incoming requests for the object. The process definition acts as the implementation of the specified object.
9) Soap event source :- The SOAP Event Source process starter creates a process instance for incoming SOAP requests. SOAP is a standard protocol for invoking web services. This allows you to create a web service using process definitions.
At runtime, a client can retrieve the WSDL file for a process containing this process starter using an HTTP request. Once the WSDL is retrieved, the client can perform a SOAP request to invoke the web service.
10)Tcp receiver The TCP Receiver process starter starts a new process when a client requests a TCP connection.
31. What is the purpose of JMS Queue receiver activity and Queue sender activity?
Ans: Starts a process when ever a new message comes into the specified queue.
A queue sender activity sends messages into the specified queue.
32. What are acknowledgement modes and where do you set them and what is the applicability of each mode?
Ans:
The acknowledge mode for incoming messages. Can be one of the following:
• Auto — the message is automatically acknowledged when it is received.
• Client — the message will be acknowledged at a later point by using the Confirm activity. If the message is not confirmed before the process instance ends, the message is redelivered and a new process instance is created to handle the new incoming message. Ensure that your process definition confirms the message when using this acknowledge mode.
• TIBCO EMS Explicit Client Acknowledge — this mode behaves exactly the same as the Client mode, except the session is not blocked and one session can handle all incoming messages.
• Dups OK — the message is acknowledged automatically when it is received. JMS provides this mode for lazy acknowledgement, but TIBCO BusinessWorks acknowledges messages upon receipt.
• Transactional — this mode is used when a transaction that can process JMS messages is included in the process definition. The message is acknowledged when the transaction commits. See TIBCO BusinessWorks Process Design Guide for more information about creating transactions that JMS activities can participate in.
33. What is a check point activity and confirm activity?
Ans: A checkpoint saves the current process data and state so that it can be recovered at a later time in the event of a failure. If a process engine fails, all process instances can be recovered and resume execution at the location of their last checkpoint in the process definition.
The Confirm activity confirms any confirmable messages received by the process instance. For example, if a process is started because of the receipt of an RVCM message, the Confirm activity can send a confirmation message to the publisher of the RVCM message
34. What happens if you use check point activity first and confirm next?
ans:
In the case of confirmable messages , you must consider the consequences of performing a checkpoint before or after a Confirm activity.
If the checkpoint is taken before the Confirm activity, then a crash occurs after a checkpoint but before a confirm, the original message is resent. In this case, the restarted process can no longer send the confirmation. However, a new process is started to handle the resent message, and you can implement your process to handle the restarted and new processes appropriately.
If the checkpoint is taken after a Confirm activity, there is potential for a crash to occur after the Confirm but before the checkpoint. In this case, the message is confirmed and therefore not redelivered. The process instance is not restarted, because the crash occurred before the checkpoint.
You must consider the type of processing your process definition performs to determine when a checkpoint is appropriate if your process definition receives confirmable messages.
35. What is the potential problem with JMS Queue requestor?
Ans:
When we specify a reply to queue there is a chance of other processes sending messages to the same queue and the jms queue requestor interpreting that as the actual response and sending this wrong message to the client.
36. What is the other JMS activity you would use to address the problem?
Ans:
Get jms queue message. This incorporates a message ID to identify the true message.
37. What are the activities you used to publish the messages from BW process to network on RV?
Ans: publish rv message activity (along with the shared resource – rv transport).
38. What is the transition in BW?
Ans: to move the data from one activity to another or when conditions exist on the data.
39. What are the different kinds of condition types you can have in transition? Explain Them
Ans:
a)Success :- Take this transition unconditionally. That is, always transition to the activity the transition points to, if the activity completes successfully.
This is the default condition for transitions.
b)Success with condition :- Specify a custom condition using XPath. If the activity completes successfully, and the condition you create evaluates to true, the transition is taken to the activity it points to.
You can type in an XPath condition, and you can use the XPath formula builder to drag and drop XPath expressions and data into the condition. See Chapter 9, XPath for more information about specifying XPath conditions and using the XPath formula builder.
c)Success if no matching condition :- Take this transition when the activity completes successfully, but only if no other transitions are taken. This is useful when multiple transitions with conditions are drawn to other activities. This condition type can be used to handle any cases not handled by the conditions on the other transitions.
d)Error :- Take this transition if there is an error during processing of the activity.
40. What is Generate Error activity? What the applications of it ?
Ans:This activity generates an error and causes an immediate transition to any error transitions. If there are no error transitions, the process instance halts execution. This activity is useful in a group or in a called process. If you would like to catch and raise your own error conditions, you can use this activity to do so.
41. What are the shared variables and process variables?
Ans:
Process variables: Process variables are data structures available to the activities in the process. You can define your own process variables and assign values to them in your process definition. Process variables are defined on the Process Variables tab of the Process Definition resource. And assigning values to these kind of variables is done using the assign activity.
Shared variables: A Shared Variable resource allows you to share data across process instances. All process instances can read and update the data stored in a shared variable. This type of shared variable is useful if you wish to pass data across process instances or if you wish to make a common set of information available to all process instances.
42. What is XPATH?
Ans: isa XML based path language used to navigate the XML document and manipulate the data
43. What is XSD?
Ans: XML schema definition.
44. What is name space in XSD?
Ans: A name conflict will occur when two different documents use the same element names. So each element is given a unique namespace.
45 what is aweb-service?
Ans: application or a network responding to some remote web-request.
46what isw a wsdl?what are different types of wsdl?
Ans:Web-services run on wsdl,it defines structure of schema.There are two types of wsdl
Abstract wsdl:-Used on server side,contains request,response and type of operation performed.
concrete wsdl:-used on client side,contains abstract wsdl and transport used.
47. What are the modes of installation of tibco bw applns?
a. GUI mode
b. Console
c. Silent mode
48. What is the thread count in tibco administrator?
a. 8-32 threads for BW engines
b. For http connections-10/75
c. JMS-it’s a single thread model
49. What is Max jobs, Flow limit, and Activation limit?
a. Max jobs: Max jobs specify the number of process instances that are kept in memory while executing.
b. Flow Limit: it is the max number of jobs that can be spawned before the process starter is suspended.
c. Activation Limit: Specifies that once a process instance is loaded and it must be placed in memory till it completes execution.
50. What are tibco best practices-users?
a. User ”tibco” should be master of all applications.
b. User “tibcou” should have read only access to tibco applications and have read write access to logs owned by developer groups.
51. In how many ways can you deploy EAR file?
a. Using tibco administrator GUI
b. Use Appmanage utility to deploy EAR file into targeted domains
52. Whether to use check point/confirm activity first?
a. BW doc/general palette/checkpoint/confirm
53. What information can be found in the appmanage.batch file?
a. Component paths, service instance paths that is required to run AppManage utility
54. What is difference between EMS and RV?
a. Ems is centralized where as RV is bus based
55. What are the 2 message transport types?
a. Ems has 2 message transport types
i. Point-to-point: queues
ii. Pub-sub : topics
56. What is the diff between tibco adapter and BW component?
a. Adapters are connectors that use a messaging channel that can be configured over source/target systems which can be used in Pub,Sub or Replyrequest mode. BW components are designer, administrator, bw engine.
57. Why are routes used?
a. When we have to send messages from one server to another.
58. What parameters would be used to control storage in EMS?
a. Flow control property
59. What are the diff types of messaging services in RV?
a. RV
b. RVCM
c. RVCMQ
d. RVRD
60. Which transport is used between hawk agent and hawk microagent?
a. Rv
61. What re the three transport types available when configuring a tibco component?
a. HTTp, RV,local
62. What is the standard file extension of deployment files?
a. EAR
63. How many ways are there to move files between 2 secured UNIX servers
a. Sftp /https
64. What information can be found in the tibco bw tra files?
a. Service instance machine names, fault-tolerant settings, java heap sizes, jmv lib paths , repository URL
65. Can you give one example for sync and async operation?
a. Sync-request-reply and req-reply invocation services
b. Async-publication and subscription services
66. What are the different types of queues?
a. Static-created by the user
b. Dynamic- created by the sender/receiver application at run time.
c. Temporary- created by receiver to submit the response to EMS server/Sender to get the messages.
67. What are the various types of application property types in EMS?
a. Boolean, byte, short, char, int, long, float, double, string.
68. What are event queues?
a. An event queue contains received but undelivered messages, periodic timers, and state change callbacks etc.
69. What are the wire formats supported by file adapter?
a. AE,XML,RV
70. What is job shared variable and shared variable?
a. Job shared variable- is used to share the value of the variable between the main process and the sub process.
b. Shared variable- is used to share the value of the variable between two processes
71. What is the difference between jdbc and adb
a. Jdbc is a collection of activities that can be used for custom operations
b. ADB is an adapter which is used to capture the events and take action, this has pub and sub mechanisms, pub is used to capture the events and publish the messages and sub will be used to upsert the operations.
72. How is reduce the load on ems server?
a. Using maxbytes, flow limit, prefetch mechanisms
73. What is a tibco domain?
a. It’s a collection of software and hardware components that are used for business process integration.
74. What is tibco hawk agent?
a. It’s a independent process that monitors the status of the applications.
75. What are the resources that get included in the EAR file, created by the TIBCO designer?
a. EAR file contain
i. Local project resources
ii. Library builder resources
iii. Alias library resource files
iv. Files referred in classpath of designer
v. All the files under the designer installation directory.
76. What is tcp and udp
a. Tcp is used for client request. Udp is used for service call.
77. What is the difference between RVD and RVRD
a. RVD is used to route with in a subnet
b. RVRD is used to route through different subnet.
78. What are message selectors?
a. Message selectors are used to filter messages based on expression syntax. This reduces the processing overhead from the application.
79. What is a Home Queue and what is a Routed Queue in EMS routes?
a. Home Queue: The global queue sitting in the EMS server, where Route is being created.
b. Routed Queue: the global queue sitting in the EMS server where the queue name is referring to route.
80. What is the EMS maximum message size?
a. The maximum message size is 512 MB.
81. What are the delivery modes supported by EMS server?
a. EMS supports 2 delivery modes
i. Persistent
ii. Non-persistent
iii. Reliable.
82. What are the message types supported by EMS?
a. Text
b. XML
c. Bytes
d. Stream
e. Simple
f. Object
g. ObjectRef
h. Map
83. What are the wildcard characters supported by EMS?
a. * - means that any token can be in place of *.
b. > - matches any destination name i.e., it matches one or more trailing elements.
You can subscribe to wildcard topics but can’t publish.
You can neither send nor receive from wildcard queue names
84. What is the default storage limit for destinations?
a. Setting the flowControl property on a destination but specifying no value causes the server to use a default value of 256KB.
85. What is the syntax to create bridges?
a. Create bridge bridge_name source=destination_type:name target=destination_type:name
86. How do avoid/stop creation of dynamic queues/topics?
a. By deleting the parent queue “>”
87. Explain what do you understand by TRA?
a. TIBCO Runtime Agent is a bundle of tibco software and third-party software that is needed to run many TIBCO applications such as TIBCO Business works and Adapters
88. What are the components installed when you install TRA?
a. TIBCO designer
b. Java Runtime Environment
c. TIBCO Hawk Agent
d. TIBCO Rendezvous
e. TIBCO Domain Utility
f. TIBCO Wrapper etc.
89. Explain TIBCO Hawk Agent?
a. It is an autonomous process that resides on each computer on which TRA is installed. Hawk Agent uses a set of rules called rulebases to configure system management, status and automation tasks.
90. What is the use of TIBCO Wrapper utility
a. It allows deployment of a TIBCO product or TIBCO Adapter SDK based custom adapter as a service.
91. How is load balancing done in Randezvous?
a. Using distributed queues
92. What protocol does RV uses to communicate with in a subnet and outside the subnet?
a. UDP within a subnet
b. TCP outside subnet.
93. What is the difference between technical and functional adapters?
a. A
b. F
94. What is the use of secured queues and topics?
a. Setting ‘secure’ property to queues/topics can restrict unauthorized users from publishing/sending and subscribing/receiving the messages.
95. What is Publish by value and Publish by reference?
a. In Publish by Value, all the specified columns in the source table are copied into the Publishing table.
b. In Publish by reference, only the specified key column values are copied to the publishing table.
96. What are the services available in Adapter?
a. Publication service
b. Subscription service
c. Request-response service
1) What is the use of service container?
Ans) In the latest version of TIBCO Active Matrix Business Works a new feature called Service container is added. In this service container we can add number of EAR files and run all the services simultaneously. With the Service container feature we can add and upgrade processes without bringing down other running processes.
2) In how any ways can we create EAR files.
Ans) We can build EAR files in 2 ways. One method is using the Enterprise Archive pallete in the Tibco designer and adding the process archive we can build EAR file.
Other method is from the cmd prompt. We use the command appmanage and buildear.
3) What is Schema and why do we create schema.
Ans) Schema is used to create a XML schema file in which we add the variables which we want to use in our designer process. We can create the elements under which we can add the typed variables. The structure formed will be in the form of tree structure.
4) What is the use of confirm activity.
Ans) Confirm activity is used to confirm the success of a activity that have confirmable messages. For example if certain process starts on reception of a message then if that process starts the confirm activity sends a confirm message to the sender of the message.
5) What are the different modes of tibco BW installation.
Ans) There are 3 modes installation . They are a) GUI b) console c) silent
6) When we save a project what files are created under the saved project folder.
Ans) In that folder we see the Aeschema folder, all processes create in that project and the vcrepo.dat file.
7) What are the contents of vcrepo.dat
Ans) This files contains the display name , RV encodings and description.
8) What is grouping activity?
Ans) Grouping activity is used to group certain activities used in the designer so that we can loop those activities and iterate the group with conditions.
9) What is the condition for a process in order to build the EAR file.
Ans) We need to have a process starter.
10) How can we design exception handling?
Ans) The basic method is by routing the process to another sub process whenever error occurs by using the error transition.
11) What is the use of Render XML pallet.
Ans) It is used to create a XML file by creating the tags used in the xml file.
12) What are the elements in the WSDL file.
Ans) In abstract WSDl file we have the information about the messages ( request, reply) port type, operation. In concrete in addition to above we have the transport information.
13) What is the use of global variables?
Ans) Global variables are useful in order to provide dynamic input at the run time.
14) What is custom activity?
Ans) Custom activity is useful when we want others to use our process and not allow them to view the contents of the process. We can add this process into our MY Pallete section. We can directly use this process by dragging it into our process.
15) In web service in how many ways can we create connections.
Ans) 2 ways. HTTP and JMS.
16) How does the file poller activity works.
Ans) This is a starter activity which starts the process whenever there is update for the file that is specified.
17) What is the use of project template?
Ans) In project template we can save our standard processes that we want to use in future. These processes are generally the ones which have the commonly used activities.
18) What is the optimum maximum number of connections in JDBC?
Ans) 10
19) What is sub process and what is its use?
Ans) Whenever we call a process from another process , the called processbecomes the subprocess. Sub process helps in reducing the complexity of the design by assigning the activity in other process.
20) What is TRA.
Ans) Tibco Runtime Agent is the main frame work for all the tibco softwares. It provides the runtime agent and monitoring agent. All the libraries required by the designs are provided by TRA.
21) What are the process variables that are available to all activities as inputs.
Ans) global variables and process context.
22) What are break points?
Ans) Break points are used to check the inputs and outputs of each activity during testing the design so that we can debug our design. We can place the check points for all activities on input and output side.
23) What re the encoding techniques in WSDL?
Ans ) Encoded and literal.
24) What are the conditions in transitions?
Ans) Success, Success with condition, Success with no condition and error.
25) What are the different variables in BW?
Ans) Global variables, Shared variables, process variables and job shared variables.
26. Explain the processes flow of your latest project by including activities.
ans: for various service implementation I designed processes using various BW activities like JMS Queue Receiver, XML Parser
27. What are the differences between the versions 2.x and 5.2?
ans:
type 2.x 5.2
deployment In 2.x deployment is done in the designer Here deployment is done using administrator tool
Name spaces Name spaces are prefixed with tib No tib in name spaces
pallets Extra pallets added
Iterate-reset At the end of each iterate the output is not reset Here the output is reset after each iteration
installation Here all the components like BW,ADB,FILE etc come as a package Here we will have to install each component separately
File type All files are .dat. we have to convert these manually Multi format file are available so that we do not have to convert the dat files
28. What are the activities you worked on?
Ans: JMS queue receiver,confirm,checkpoint,XML parser,call process,JDBC update,SOAP,HTTP.
write to log - widely used.
Assign.
29. What is the inspector activity does?
Ans: the inspector activity is used to obtain the output of any activity or all the activities and process variables.
Scenario: You can use the inspector activity to write the output of any activity or process variable in the current process. Activities and process variables in a subprocess are not available to the Inspector activity (but the output of a Call Process activity can be written using the Inspector activity). If you wish to obtain the output from one or more activities or process variables in a subprocess, place the Inspector activity in the process definition of the subprocess.
30.Can you tell me at least four starter activities and when they get executed?
Ans:
1) Adapter subscriber, adap request response server :-When ever a message comes into a destination queue or network, listerns to a request from a adapter and sends a respose back to that adapter
2) File poller :- polls for any changes that occur in the file and with any change grabs the whole file.
3) Timer:- receive notification Starts a process on the time specified ex: before JDBC QUERY, starts a process on receiving of data from a notify activity.
4) http receiver :-Starts a process based on a request from http server.
5) Jms queue receiver, jms topic subscriber :- Starts a process when ever a new message comes into the specified queue, starts a process when ever there is a new message in the specified topic.
6) Receive mail :- The Receive Mail process starter polls a POP3 mail server for new mail. When new mail is detected and retrieved, the Receive Mail process starter starts a new process for the process definition it resides in and passes the mail data to the next activity in the process flow.
7) Rv subscriber:- The Rendezvous Subscriber process starter creates a process when a TIBCO Rendezvous message on the given subject is received.
Cool Rmi server :- The RMI Server process starter registers the specified remote object name with the specified registry server and then creates process instances to handle incoming requests for the object. The process definition acts as the implementation of the specified object.
9) Soap event source :- The SOAP Event Source process starter creates a process instance for incoming SOAP requests. SOAP is a standard protocol for invoking web services. This allows you to create a web service using process definitions.
At runtime, a client can retrieve the WSDL file for a process containing this process starter using an HTTP request. Once the WSDL is retrieved, the client can perform a SOAP request to invoke the web service.
10)Tcp receiver The TCP Receiver process starter starts a new process when a client requests a TCP connection.
31. What is the purpose of JMS Queue receiver activity and Queue sender activity?
Ans: Starts a process when ever a new message comes into the specified queue.
A queue sender activity sends messages into the specified queue.
32. What are acknowledgement modes and where do you set them and what is the applicability of each mode?
Ans:
The acknowledge mode for incoming messages. Can be one of the following:
• Auto — the message is automatically acknowledged when it is received.
• Client — the message will be acknowledged at a later point by using the Confirm activity. If the message is not confirmed before the process instance ends, the message is redelivered and a new process instance is created to handle the new incoming message. Ensure that your process definition confirms the message when using this acknowledge mode.
• TIBCO EMS Explicit Client Acknowledge — this mode behaves exactly the same as the Client mode, except the session is not blocked and one session can handle all incoming messages.
• Dups OK — the message is acknowledged automatically when it is received. JMS provides this mode for lazy acknowledgement, but TIBCO BusinessWorks acknowledges messages upon receipt.
• Transactional — this mode is used when a transaction that can process JMS messages is included in the process definition. The message is acknowledged when the transaction commits. See TIBCO BusinessWorks Process Design Guide for more information about creating transactions that JMS activities can participate in.
33. What is a check point activity and confirm activity?
Ans: A checkpoint saves the current process data and state so that it can be recovered at a later time in the event of a failure. If a process engine fails, all process instances can be recovered and resume execution at the location of their last checkpoint in the process definition.
The Confirm activity confirms any confirmable messages received by the process instance. For example, if a process is started because of the receipt of an RVCM message, the Confirm activity can send a confirmation message to the publisher of the RVCM message
34. What happens if you use check point activity first and confirm next?
ans:
In the case of confirmable messages , you must consider the consequences of performing a checkpoint before or after a Confirm activity.
If the checkpoint is taken before the Confirm activity, then a crash occurs after a checkpoint but before a confirm, the original message is resent. In this case, the restarted process can no longer send the confirmation. However, a new process is started to handle the resent message, and you can implement your process to handle the restarted and new processes appropriately.
If the checkpoint is taken after a Confirm activity, there is potential for a crash to occur after the Confirm but before the checkpoint. In this case, the message is confirmed and therefore not redelivered. The process instance is not restarted, because the crash occurred before the checkpoint.
You must consider the type of processing your process definition performs to determine when a checkpoint is appropriate if your process definition receives confirmable messages.
35. What is the potential problem with JMS Queue requestor?
Ans:
When we specify a reply to queue there is a chance of other processes sending messages to the same queue and the jms queue requestor interpreting that as the actual response and sending this wrong message to the client.
36. What is the other JMS activity you would use to address the problem?
Ans:
Get jms queue message. This incorporates a message ID to identify the true message.
37. What are the activities you used to publish the messages from BW process to network on RV?
Ans: publish rv message activity (along with the shared resource – rv transport).
38. What is the transition in BW?
Ans: to move the data from one activity to another or when conditions exist on the data.
39. What are the different kinds of condition types you can have in transition? Explain Them
Ans:
a)Success :- Take this transition unconditionally. That is, always transition to the activity the transition points to, if the activity completes successfully.
This is the default condition for transitions.
b)Success with condition :- Specify a custom condition using XPath. If the activity completes successfully, and the condition you create evaluates to true, the transition is taken to the activity it points to.
You can type in an XPath condition, and you can use the XPath formula builder to drag and drop XPath expressions and data into the condition. See Chapter 9, XPath for more information about specifying XPath conditions and using the XPath formula builder.
c)Success if no matching condition :- Take this transition when the activity completes successfully, but only if no other transitions are taken. This is useful when multiple transitions with conditions are drawn to other activities. This condition type can be used to handle any cases not handled by the conditions on the other transitions.
d)Error :- Take this transition if there is an error during processing of the activity.
40. What is Generate Error activity? What the applications of it ?
Ans:This activity generates an error and causes an immediate transition to any error transitions. If there are no error transitions, the process instance halts execution. This activity is useful in a group or in a called process. If you would like to catch and raise your own error conditions, you can use this activity to do so.
41. What are the shared variables and process variables?
Ans:
Process variables: Process variables are data structures available to the activities in the process. You can define your own process variables and assign values to them in your process definition. Process variables are defined on the Process Variables tab of the Process Definition resource. And assigning values to these kind of variables is done using the assign activity.
Shared variables: A Shared Variable resource allows you to share data across process instances. All process instances can read and update the data stored in a shared variable. This type of shared variable is useful if you wish to pass data across process instances or if you wish to make a common set of information available to all process instances.
42. What is XPATH?
Ans: isa XML based path language used to navigate the XML document and manipulate the data
43. What is XSD?
Ans: XML schema definition.
44. What is name space in XSD?
Ans: A name conflict will occur when two different documents use the same element names. So each element is given a unique namespace.
45 what is aweb-service?
Ans: application or a network responding to some remote web-request.
46what isw a wsdl?what are different types of wsdl?
Ans:Web-services run on wsdl,it defines structure of schema.There are two types of wsdl
Abstract wsdl:-Used on server side,contains request,response and type of operation performed.
concrete wsdl:-used on client side,contains abstract wsdl and transport used.
47. What are the modes of installation of tibco bw applns?
a. GUI mode
b. Console
c. Silent mode
48. What is the thread count in tibco administrator?
a. 8-32 threads for BW engines
b. For http connections-10/75
c. JMS-it’s a single thread model
49. What is Max jobs, Flow limit, and Activation limit?
a. Max jobs: Max jobs specify the number of process instances that are kept in memory while executing.
b. Flow Limit: it is the max number of jobs that can be spawned before the process starter is suspended.
c. Activation Limit: Specifies that once a process instance is loaded and it must be placed in memory till it completes execution.
50. What are tibco best practices-users?
a. User ”tibco” should be master of all applications.
b. User “tibcou” should have read only access to tibco applications and have read write access to logs owned by developer groups.
51. In how many ways can you deploy EAR file?
a. Using tibco administrator GUI
b. Use Appmanage utility to deploy EAR file into targeted domains
52. Whether to use check point/confirm activity first?
a. BW doc/general palette/checkpoint/confirm
53. What information can be found in the appmanage.batch file?
a. Component paths, service instance paths that is required to run AppManage utility
54. What is difference between EMS and RV?
a. Ems is centralized where as RV is bus based
55. What are the 2 message transport types?
a. Ems has 2 message transport types
i. Point-to-point: queues
ii. Pub-sub : topics
56. What is the diff between tibco adapter and BW component?
a. Adapters are connectors that use a messaging channel that can be configured over source/target systems which can be used in Pub,Sub or Replyrequest mode. BW components are designer, administrator, bw engine.
57. Why are routes used?
a. When we have to send messages from one server to another.
58. What parameters would be used to control storage in EMS?
a. Flow control property
59. What are the diff types of messaging services in RV?
a. RV
b. RVCM
c. RVCMQ
d. RVRD
60. Which transport is used between hawk agent and hawk microagent?
a. Rv
61. What re the three transport types available when configuring a tibco component?
a. HTTp, RV,local
62. What is the standard file extension of deployment files?
a. EAR
63. How many ways are there to move files between 2 secured UNIX servers
a. Sftp /https
64. What information can be found in the tibco bw tra files?
a. Service instance machine names, fault-tolerant settings, java heap sizes, jmv lib paths , repository URL
65. Can you give one example for sync and async operation?
a. Sync-request-reply and req-reply invocation services
b. Async-publication and subscription services
66. What are the different types of queues?
a. Static-created by the user
b. Dynamic- created by the sender/receiver application at run time.
c. Temporary- created by receiver to submit the response to EMS server/Sender to get the messages.
67. What are the various types of application property types in EMS?
a. Boolean, byte, short, char, int, long, float, double, string.
68. What are event queues?
a. An event queue contains received but undelivered messages, periodic timers, and state change callbacks etc.
69. What are the wire formats supported by file adapter?
a. AE,XML,RV
70. What is job shared variable and shared variable?
a. Job shared variable- is used to share the value of the variable between the main process and the sub process.
b. Shared variable- is used to share the value of the variable between two processes
71. What is the difference between jdbc and adb
a. Jdbc is a collection of activities that can be used for custom operations
b. ADB is an adapter which is used to capture the events and take action, this has pub and sub mechanisms, pub is used to capture the events and publish the messages and sub will be used to upsert the operations.
72. How is reduce the load on ems server?
a. Using maxbytes, flow limit, prefetch mechanisms
73. What is a tibco domain?
a. It’s a collection of software and hardware components that are used for business process integration.
74. What is tibco hawk agent?
a. It’s a independent process that monitors the status of the applications.
75. What are the resources that get included in the EAR file, created by the TIBCO designer?
a. EAR file contain
i. Local project resources
ii. Library builder resources
iii. Alias library resource files
iv. Files referred in classpath of designer
v. All the files under the designer installation directory.
76. What is tcp and udp
a. Tcp is used for client request. Udp is used for service call.
77. What is the difference between RVD and RVRD
a. RVD is used to route with in a subnet
b. RVRD is used to route through different subnet.
78. What are message selectors?
a. Message selectors are used to filter messages based on expression syntax. This reduces the processing overhead from the application.
79. What is a Home Queue and what is a Routed Queue in EMS routes?
a. Home Queue: The global queue sitting in the EMS server, where Route is being created.
b. Routed Queue: the global queue sitting in the EMS server where the queue name is referring to route.
80. What is the EMS maximum message size?
a. The maximum message size is 512 MB.
81. What are the delivery modes supported by EMS server?
a. EMS supports 2 delivery modes
i. Persistent
ii. Non-persistent
iii. Reliable.
82. What are the message types supported by EMS?
a. Text
b. XML
c. Bytes
d. Stream
e. Simple
f. Object
g. ObjectRef
h. Map
83. What are the wildcard characters supported by EMS?
a. * - means that any token can be in place of *.
b. > - matches any destination name i.e., it matches one or more trailing elements.
You can subscribe to wildcard topics but can’t publish.
You can neither send nor receive from wildcard queue names
84. What is the default storage limit for destinations?
a. Setting the flowControl property on a destination but specifying no value causes the server to use a default value of 256KB.
85. What is the syntax to create bridges?
a. Create bridge bridge_name source=destination_type:name target=destination_type:name
86. How do avoid/stop creation of dynamic queues/topics?
a. By deleting the parent queue “>”
87. Explain what do you understand by TRA?
a. TIBCO Runtime Agent is a bundle of tibco software and third-party software that is needed to run many TIBCO applications such as TIBCO Business works and Adapters
88. What are the components installed when you install TRA?
a. TIBCO designer
b. Java Runtime Environment
c. TIBCO Hawk Agent
d. TIBCO Rendezvous
e. TIBCO Domain Utility
f. TIBCO Wrapper etc.
89. Explain TIBCO Hawk Agent?
a. It is an autonomous process that resides on each computer on which TRA is installed. Hawk Agent uses a set of rules called rulebases to configure system management, status and automation tasks.
90. What is the use of TIBCO Wrapper utility
a. It allows deployment of a TIBCO product or TIBCO Adapter SDK based custom adapter as a service.
91. How is load balancing done in Randezvous?
a. Using distributed queues
92. What protocol does RV uses to communicate with in a subnet and outside the subnet?
a. UDP within a subnet
b. TCP outside subnet.
93. What is the difference between technical and functional adapters?
a. A
b. F
94. What is the use of secured queues and topics?
a. Setting ‘secure’ property to queues/topics can restrict unauthorized users from publishing/sending and subscribing/receiving the messages.
95. What is Publish by value and Publish by reference?
a. In Publish by Value, all the specified columns in the source table are copied into the Publishing table.
b. In Publish by reference, only the specified key column values are copied to the publishing table.
96. What are the services available in Adapter?
a. Publication service
b. Subscription service
c. Request-response service
Tibco Admin
TIBCO ADMIN -FAQS
What is a TIBCO Domain?
A: Domain is a collection of hardware and software components that are used for business process integration. The domain defines the TIBCO BusinessWorks environment. Each domain must contain one and only one administration server. Each domain must have a unique domain name. Each domain may contain one or more machines but no single machine can belong to multiple domains. Each machine may have more than one type of software component.
What is a deployment?
A deployment is a completed configured instance of an integration or project. TIBCO Designer is used to configure projects and deployments in current version. In the future, TIBCO Administrator will be used to manage deployment of projects.
What is the main responsibilities of the Admin server?
It manages data storage for the Admin
It manages transport options for applications
It enforces security for the domian
What is TIBCO HAWK agent?
It is the independent process that monitors applications and systems utility.
What are the Scripting utilities?
There are two types of scripting utilities.
They are
1. Buildear
2.Appmanage
What are the components of the TIBCO Admin? What is its use?
Admin server: It manages resource in Admi domian
Admin GUI: It [provides web browser interface. It allows to configure users and applications, deploys applications, monitor process and machines in admin domain.
Can we run multiple administrators in the same domain?
No. Only one administration server is installed and configured for use per domain.
What is the default port where admin runs?
Port: 8080
Host: Localhost
What is UDDI module?
Universal, description, discovery and integration. It creates connections between uddi servers and web services contained in the server. If you grant permissions then you can publish web services information through uddi servers.
What is Resouce management?
It creates application domian.
It can customize machine display.
It displays information about machines and process on machine.
What is application domain?
This applicatio stores the data separetely or independently in a repository from the admin domian repository.
What is an Application Archieve?
It provides information about the enterprise archieve file including package name, version, description and creation date.
Can we change the adapter from one domain to another?
Yes, but you will need to uninstall the existing adapter that has joined the current domain and then reinstall the adapter and join it to the new domain. You will also be able to change the domain info directly using Domain Utility .
How to view tracing results for a process engine?
Got to Application Management
click on All service instances,
click on the process engine name
tracing tab, go to details
What is deployment choice?
When configuring adminstration domian , you can set how the admin server creates and stores application data.
1. Local application data
2. Server based application data
What are the versions of TIBCO Admin?
There are two types of two versions.
1) Repository Edition
2) Enterprise Edition.
Can we change the domain for one machine to another later?
Yes, you can add/remove machine from domain using Damain Utility.
What are the restrictions of using TIBCO Admin GUI via secondary server?
We cannot perform user management, deploy applications or perform any other activity for which read write access is required.
What do you have in the User management module?
Users
Roles
Security
What is TIBCO Administrator ?
TIBCO Administrator supports security administration as well as monitoring and management of processes and machines.
TIBCO Administrator consists of the TIBCO Administration Server and the web browser based TIBCO Administrator GUI.
What are TIBCO Administrator Modules ?
User Management
Resource Management
Application Management
What is a TIBCO Domain?
A: Domain is a collection of hardware and software components that are used for business process integration. The domain defines the TIBCO BusinessWorks environment. Each domain must contain one and only one administration server. Each domain must have a unique domain name. Each domain may contain one or more machines but no single machine can belong to multiple domains. Each machine may have more than one type of software component.
What is a deployment?
A deployment is a completed configured instance of an integration or project. TIBCO Designer is used to configure projects and deployments in current version. In the future, TIBCO Administrator will be used to manage deployment of projects.
What is the main responsibilities of the Admin server?
It manages data storage for the Admin
It manages transport options for applications
It enforces security for the domian
What is TIBCO HAWK agent?
It is the independent process that monitors applications and systems utility.
What are the Scripting utilities?
There are two types of scripting utilities.
They are
1. Buildear
2.Appmanage
What are the components of the TIBCO Admin? What is its use?
Admin server: It manages resource in Admi domian
Admin GUI: It [provides web browser interface. It allows to configure users and applications, deploys applications, monitor process and machines in admin domain.
Can we run multiple administrators in the same domain?
No. Only one administration server is installed and configured for use per domain.
What is the default port where admin runs?
Port: 8080
Host: Localhost
What is UDDI module?
Universal, description, discovery and integration. It creates connections between uddi servers and web services contained in the server. If you grant permissions then you can publish web services information through uddi servers.
What is Resouce management?
It creates application domian.
It can customize machine display.
It displays information about machines and process on machine.
What is application domain?
This applicatio stores the data separetely or independently in a repository from the admin domian repository.
What is an Application Archieve?
It provides information about the enterprise archieve file including package name, version, description and creation date.
Can we change the adapter from one domain to another?
Yes, but you will need to uninstall the existing adapter that has joined the current domain and then reinstall the adapter and join it to the new domain. You will also be able to change the domain info directly using Domain Utility .
How to view tracing results for a process engine?
Got to Application Management
click on All service instances,
click on the process engine name
tracing tab, go to details
What is deployment choice?
When configuring adminstration domian , you can set how the admin server creates and stores application data.
1. Local application data
2. Server based application data
What are the versions of TIBCO Admin?
There are two types of two versions.
1) Repository Edition
2) Enterprise Edition.
Can we change the domain for one machine to another later?
Yes, you can add/remove machine from domain using Damain Utility.
What are the restrictions of using TIBCO Admin GUI via secondary server?
We cannot perform user management, deploy applications or perform any other activity for which read write access is required.
What do you have in the User management module?
Users
Roles
Security
What is TIBCO Administrator ?
TIBCO Administrator supports security administration as well as monitoring and management of processes and machines.
TIBCO Administrator consists of the TIBCO Administration Server and the web browser based TIBCO Administrator GUI.
What are TIBCO Administrator Modules ?
User Management
Resource Management
Application Management
Tibco EMS-FAQS
EMS FAQS
1. what are the two storage methods used by Tibco EMS server?
Ans : File based and database
2. what files are created in file based data storage method?
Ans . sync.db,async.db,meta.db
3. what information does Meta.db contain?
Ans . durable subscribers, fault tolerant connections and other meta data.
4. what does flow control property specifies ?
ans . specifies the maximum size of the pending messages in server.
5. what are the destinations of messages?
Ans : topics and queues.
6. in how many ways destinations for messages can be created?
Ans . static : administrator creates destinations and client programs uses the destinations
Dynamic: here client program creates destinations during runtime
Temporary: servers connected through routes communicate through temporary destinations.
7. what are the messaging models supported by ems serve?
Ans . point to point ( queues), pubsub (topics), multicast (topic).
8.What is the diff between exclusive queues and non exclusives ?
Ans . in exclusive – only one receiver can take message where as in non exclusive many receivers can receive msg.
9.how long the message will be stored for durable subscribers?
Ans . as long as durable subscriber exists or until msg expiration time reached or storage limit has been reached.
10. what are the different delivery modes supported by ems?
Ans . persistent, non persistent and reliable.
11.what is the dis advantage of reliable mode delivery?
Ans . in reliable , with out knowing the status of the consumer the producer keeps sending msg to server
12. what is the condition for persistent message to be stored on disk in topics?
Ans . there must be atleast one durable subscriber or one must be connected to fault tolerant connection to ems server.
13. how do you distinguish dynamic queues and static queues.?
Ans . dynamic queues have * before the queue name.
14. what happens if npsend_checkmode parameter in tibemsd.conf file is enabled?
Ans. Server sends acknowledgement for non persistent message.
15. what is shared state in fault tolerant operation ?
Ans . primary server and backup server have connection to shared state which contain information about client connection and persistant messages.
16. how many ways a back up server detects failure of primary server?
Ans. Hearbeat failure:-Primary server sends a heartbeat message to backup server to indicate primary server is working .
connection failure :-backup server detects the failure of tcp connection with primary server
17.what is the use of locking in fault tolerant operation?
Ans.Inorder to prevent the backup server to take the role of primary server, the primary server logs the shared state in normal operation and during the failure of primary server backup server takes the lock and access primary server.
18.If authorization is enabled in tibemsd.config file what is the condition to configure ems server as fault tolerance?
Ans.Server name and password for both primary and backup server should be same and username and password for both servers should match the server and password parameters in tibemsd.config file.
19. what are the changes to be made in config file for ems fault tolerant operation?
Ans . in primary server give url of backup server to ft_active parameter and in backup server give url of primary server for ft_active parameter.
20. different types of zones?
Ans. Multihop zone and 1hop zone.
21. what is fail safe?
Ans. In fail safe mode messages are frist stored in disk before sending messages so that no messages are lost.
22.what is the default port number for ems server?
Ans 7222.
23. difference between rendezvous and ems?
Ans. Rvd is bus based architecture , ems is centralized architecture
24.what are different acknowledge modes?
Ans. Dups_ok_acknowlwdge,auto_acknowlwdge,client_acknowledge,no_acknowledge.
25. How many ways we can determine the life span of the message in a queue. What are they?
Ans: expiration parameter in queue configuration file.
JMS expiration time in queue sender.
The JMS expiration time in queue sender overrides any value given in config.
26. What are the message storing mechanisms of queues?
Ans: persistent and non-persistent.
Persistent: messages are stored to external storage before sending.
Non-persistent: not stored to any external storage. The information will not be available for retrieval.
27.what is condition to create bridge?
Ans. Queus and topics must be defined as global.
28. why do we need routers ?
Ans. To transfer messages between different ems servers.
29. what is the default maximum size of message?
Ans. 512mb
30. how do you configure client for fault tolerant connection?
Ans. Specify multiple server as a comma-separated list of URLs and both URLs must use same protocol either tcp or ssl.
31. What are the different types of acknowledgement modes in EMS message delivery
• Auto
• Client
• Dups_ok
• No_ack
• Explciit
• Explicit_client_dups_ok
• Transitional
• Local transitional.
32. What are the different types of messages that can be used in EMS
• Text
• Simple
• Bytes
• Map
• XML test
• Object
• Object ref
• Stream
33. Tell me about bridges. Why do we use them, Syntax to create bridges, use of message selector
? Some applications require the same message to be sent to more than one destination possibly of different types. So we use bridges.
34. What is the purpose for stores.conf
a. This file defines the locations either store files or a database, where the EMS server will store messages or metadata.
b. Each store configured is either a file-based or a database store.
35. How many modes are the messages written to store file.
2 modes.. sync or async. When absent , the default is async
36. What is tibemsd.conf
It is the main configuration file that controls the characteristics of the EMS server
37. How many delivery modes for messages?
Persistent, Non-persistent, Reliable-delivery.
38. What is the maximum messagesize?
Ems supports max message size of 512 mb
39. Name 3 destination properties and explain them.
Global, secure, maxmsgs, maxbytes, flowcontrol, sender_name, sender_name_enforced, trace,maxRedelivery
40. What are the different modes of installation in Ems?
a. GUI mode
b. Console mode
c. Silent mode
41. What are the messaging models supported by JMS
a. Point-to-point
b. Publish-subscribe
c. Multicast
42. Tell me about routes
What is the purpose of routes, what kind of destinations can be used in routes? Topics and queues m-hops
43. What happens if the message expires/exceeded the value specified by maxredelivery property on queue?
If the jms_preserve_undelivered property is set to true, then it moves he message to undelivered message queue, if set to false, the message is deleted by the server.
44. In how many ways can a destination be created?
a. Static-created by user
b. Dynamic-created by ems server on the fly.
c. Temporary destinations.
45. What are the wild cards that we use in ems?how do they work for queues and topics
*,>
U can subscribe to wildcard topics but cant publish to them. Where as in case of queues we can’t either send /receive.
46. Are bridges transitive?
NO
47. Tell me about flow control on destinations
Some times the producer may send messages faster than the consumers can receive them. So, the message capacity on the server will be exhausted. So we use flow control. Flow control can be specified on destinations.
48. Tell me about flow control on bridges and routes
Flow control has to be specified on both sides of bridges where as on routes it operates differently on sender side and receiver side.
49. Name 3 configuration files and tell me what it consists of
a. Queues.conf
b. Topics.conf
c. Routes.conf
d. Factories.conf
e. Stores.conf
f. Groups.conf,users.conf,transports.conf
50. Name some administrative level destination properties
a. View
b. Create
c. Delete
d. Modify
e. Purge
51. How can you change the configuration properties of EMS server
You can change in the tibemsd.conf file or you can change using the ems admin console.
52. What are the permissions that you can grant to users to access queues
a. Receive
b. Send
c. Browse
53. What are the permissions that you can grant to users to access topics
a. Subscribe
b. Publish
c. Durable
d. Use_durable
54. Tell me about multicasting in EMS
a. Multicast is a messaging model that broadcasts messages to many consumers at once rather than sending messages individually to each consumer. EMS uses Pragmatic general multicast to broadcast messages published to multicast enabled topics.
b. Each multicast enabled topic is associated with a channel.
55. What are the advantages and disadvantages of multicasting..
a. Advantages: as the message broadcasts only once thereby reducing the amount of bandwidth used in publish and subscribe model. Reduces the network traffic.
b. Disadvantages: Offers only last-hop delivery. So can’t be used to send messages between servers.
56. On what destinations can you use multicast?
a. Topics
57. Suppose, you got an error while accessing a queue, that you don’t have necessary permissions to access the queue. What might be the solution/reason?
a. The user that is assigned to the queue and the user used while creating
58. How does the secondary server know that the primary server is failed?
a. Based on heartbeat intervals
59. What is JMS queue requestor?
a. The JMS Queue Requestor activity is used to send a request to a JMS queue name and receive a response back from the JMS client
60. What is JMS topic requestor?
a. The JMS Topic Requestor activity is used to communicate with a JMS application’s request-response service. This service invokes an operation with input and output. The request is sent to a JMS topic and the JMS application returns the response to the request.
61. How do you add ems server to administrator?
a. Using domain utility
62. How do you remove individual messages from destinations?
a. Using purge command.
1. what are the two storage methods used by Tibco EMS server?
Ans : File based and database
2. what files are created in file based data storage method?
Ans . sync.db,async.db,meta.db
3. what information does Meta.db contain?
Ans . durable subscribers, fault tolerant connections and other meta data.
4. what does flow control property specifies ?
ans . specifies the maximum size of the pending messages in server.
5. what are the destinations of messages?
Ans : topics and queues.
6. in how many ways destinations for messages can be created?
Ans . static : administrator creates destinations and client programs uses the destinations
Dynamic: here client program creates destinations during runtime
Temporary: servers connected through routes communicate through temporary destinations.
7. what are the messaging models supported by ems serve?
Ans . point to point ( queues), pubsub (topics), multicast (topic).
8.What is the diff between exclusive queues and non exclusives ?
Ans . in exclusive – only one receiver can take message where as in non exclusive many receivers can receive msg.
9.how long the message will be stored for durable subscribers?
Ans . as long as durable subscriber exists or until msg expiration time reached or storage limit has been reached.
10. what are the different delivery modes supported by ems?
Ans . persistent, non persistent and reliable.
11.what is the dis advantage of reliable mode delivery?
Ans . in reliable , with out knowing the status of the consumer the producer keeps sending msg to server
12. what is the condition for persistent message to be stored on disk in topics?
Ans . there must be atleast one durable subscriber or one must be connected to fault tolerant connection to ems server.
13. how do you distinguish dynamic queues and static queues.?
Ans . dynamic queues have * before the queue name.
14. what happens if npsend_checkmode parameter in tibemsd.conf file is enabled?
Ans. Server sends acknowledgement for non persistent message.
15. what is shared state in fault tolerant operation ?
Ans . primary server and backup server have connection to shared state which contain information about client connection and persistant messages.
16. how many ways a back up server detects failure of primary server?
Ans. Hearbeat failure:-Primary server sends a heartbeat message to backup server to indicate primary server is working .
connection failure :-backup server detects the failure of tcp connection with primary server
17.what is the use of locking in fault tolerant operation?
Ans.Inorder to prevent the backup server to take the role of primary server, the primary server logs the shared state in normal operation and during the failure of primary server backup server takes the lock and access primary server.
18.If authorization is enabled in tibemsd.config file what is the condition to configure ems server as fault tolerance?
Ans.Server name and password for both primary and backup server should be same and username and password for both servers should match the server and password parameters in tibemsd.config file.
19. what are the changes to be made in config file for ems fault tolerant operation?
Ans . in primary server give url of backup server to ft_active parameter and in backup server give url of primary server for ft_active parameter.
20. different types of zones?
Ans. Multihop zone and 1hop zone.
21. what is fail safe?
Ans. In fail safe mode messages are frist stored in disk before sending messages so that no messages are lost.
22.what is the default port number for ems server?
Ans 7222.
23. difference between rendezvous and ems?
Ans. Rvd is bus based architecture , ems is centralized architecture
24.what are different acknowledge modes?
Ans. Dups_ok_acknowlwdge,auto_acknowlwdge,client_acknowledge,no_acknowledge.
25. How many ways we can determine the life span of the message in a queue. What are they?
Ans: expiration parameter in queue configuration file.
JMS expiration time in queue sender.
The JMS expiration time in queue sender overrides any value given in config.
26. What are the message storing mechanisms of queues?
Ans: persistent and non-persistent.
Persistent: messages are stored to external storage before sending.
Non-persistent: not stored to any external storage. The information will not be available for retrieval.
27.what is condition to create bridge?
Ans. Queus and topics must be defined as global.
28. why do we need routers ?
Ans. To transfer messages between different ems servers.
29. what is the default maximum size of message?
Ans. 512mb
30. how do you configure client for fault tolerant connection?
Ans. Specify multiple server as a comma-separated list of URLs and both URLs must use same protocol either tcp or ssl.
31. What are the different types of acknowledgement modes in EMS message delivery
• Auto
• Client
• Dups_ok
• No_ack
• Explciit
• Explicit_client_dups_ok
• Transitional
• Local transitional.
32. What are the different types of messages that can be used in EMS
• Text
• Simple
• Bytes
• Map
• XML test
• Object
• Object ref
• Stream
33. Tell me about bridges. Why do we use them, Syntax to create bridges, use of message selector
? Some applications require the same message to be sent to more than one destination possibly of different types. So we use bridges.
34. What is the purpose for stores.conf
a. This file defines the locations either store files or a database, where the EMS server will store messages or metadata.
b. Each store configured is either a file-based or a database store.
35. How many modes are the messages written to store file.
2 modes.. sync or async. When absent , the default is async
36. What is tibemsd.conf
It is the main configuration file that controls the characteristics of the EMS server
37. How many delivery modes for messages?
Persistent, Non-persistent, Reliable-delivery.
38. What is the maximum messagesize?
Ems supports max message size of 512 mb
39. Name 3 destination properties and explain them.
Global, secure, maxmsgs, maxbytes, flowcontrol, sender_name, sender_name_enforced, trace,maxRedelivery
40. What are the different modes of installation in Ems?
a. GUI mode
b. Console mode
c. Silent mode
41. What are the messaging models supported by JMS
a. Point-to-point
b. Publish-subscribe
c. Multicast
42. Tell me about routes
What is the purpose of routes, what kind of destinations can be used in routes? Topics and queues m-hops
43. What happens if the message expires/exceeded the value specified by maxredelivery property on queue?
If the jms_preserve_undelivered property is set to true, then it moves he message to undelivered message queue, if set to false, the message is deleted by the server.
44. In how many ways can a destination be created?
a. Static-created by user
b. Dynamic-created by ems server on the fly.
c. Temporary destinations.
45. What are the wild cards that we use in ems?how do they work for queues and topics
*,>
U can subscribe to wildcard topics but cant publish to them. Where as in case of queues we can’t either send /receive.
46. Are bridges transitive?
NO
47. Tell me about flow control on destinations
Some times the producer may send messages faster than the consumers can receive them. So, the message capacity on the server will be exhausted. So we use flow control. Flow control can be specified on destinations.
48. Tell me about flow control on bridges and routes
Flow control has to be specified on both sides of bridges where as on routes it operates differently on sender side and receiver side.
49. Name 3 configuration files and tell me what it consists of
a. Queues.conf
b. Topics.conf
c. Routes.conf
d. Factories.conf
e. Stores.conf
f. Groups.conf,users.conf,transports.conf
50. Name some administrative level destination properties
a. View
b. Create
c. Delete
d. Modify
e. Purge
51. How can you change the configuration properties of EMS server
You can change in the tibemsd.conf file or you can change using the ems admin console.
52. What are the permissions that you can grant to users to access queues
a. Receive
b. Send
c. Browse
53. What are the permissions that you can grant to users to access topics
a. Subscribe
b. Publish
c. Durable
d. Use_durable
54. Tell me about multicasting in EMS
a. Multicast is a messaging model that broadcasts messages to many consumers at once rather than sending messages individually to each consumer. EMS uses Pragmatic general multicast to broadcast messages published to multicast enabled topics.
b. Each multicast enabled topic is associated with a channel.
55. What are the advantages and disadvantages of multicasting..
a. Advantages: as the message broadcasts only once thereby reducing the amount of bandwidth used in publish and subscribe model. Reduces the network traffic.
b. Disadvantages: Offers only last-hop delivery. So can’t be used to send messages between servers.
56. On what destinations can you use multicast?
a. Topics
57. Suppose, you got an error while accessing a queue, that you don’t have necessary permissions to access the queue. What might be the solution/reason?
a. The user that is assigned to the queue and the user used while creating
58. How does the secondary server know that the primary server is failed?
a. Based on heartbeat intervals
59. What is JMS queue requestor?
a. The JMS Queue Requestor activity is used to send a request to a JMS queue name and receive a response back from the JMS client
60. What is JMS topic requestor?
a. The JMS Topic Requestor activity is used to communicate with a JMS application’s request-response service. This service invokes an operation with input and output. The request is sent to a JMS topic and the JMS application returns the response to the request.
61. How do you add ems server to administrator?
a. Using domain utility
62. How do you remove individual messages from destinations?
a. Using purge command.
Subscribe to:
Comments (Atom)