Contents
3-46 Manager Control Hierarchy ..................................................................... 446
3-47 Example of Kerberos-Based Flow using SSPI and GSS-API................ 470
3-48 DDM Kerberos Security Flows................................................................. 471
3-49 Mapping aDDM Server onto a System .................................................. 520
3-50 Source Server Manager Interactions........................................................ 521
3-51 Target Server Manager Interactions ........................................................ 521
3-52 Data Objects ................................................................................................ 545
3-53 A Single Recordwith RecordNumber Feedback.................................. 546
3-54 A Single RecordFormatted in a Continued OBJDSS............................ 546
3-55 DDM Objects ............................................................................................... 554
3-56 DDM Object Interchange Format ............................................................ 554
3-57 Objects—Data Items Encapsulated by Programs .................................. 556
3-58 Objects as Instances of a Class.................................................................. 557
3-59 Hierarchical Taxonomy ............................................................................. 558
3-60 A Sample of the DDM Class Hierarchy .................................................. 559
3-61 Inheritance of Programs from MoreAbstract Classes.......................... 560
3-62 Smalltalk Instance, Class, and Metaclass Relationships....................... 561
3-63 DDM Instance, Class, and Metaclass Relationships ............................. 562
3-64 Example of Plug-In-Based Flows............................................................. 627
3-65 DDM Plug-In Security Flows ................................................................... 628
3-66 Transparent Data Management Services ................................................ 640
3-67 DDM Processing Overview ...................................................................... 641
3-68 Application to Local RDB Connection.................................................... 742
3-69 Application to Remote RDB Connection................................................ 743
3-70 Reply Data Stream Structures .................................................................. 768
3-71 Data Stream StructureRequest Correlation ........................................... 773
3-72 Request Data Stream Structures ............................................................... 774
3-73 Server Paths for RSYNCMGR at DDM Level 5 ..................................... 786
3-74 Scalar to Data Stream Mapping ............................................................... 794
3-75 N-Flow Security Authentication.............................................................. 817
3-76 Processing Model for Programs with Embedded SQL
Statements ................................................................................................... 836
3-77 Application Requester and a Remote RDB ............................................ 841
3-78 Application Requester,Remote RDBs, and Two-Phase
Commit ........................................................................................................ 842
3-79 DDM Distributed Systems and Servers.................................................. 868
3-80 Structural Layers in Nature...................................................................... 877
3-81 The Structural Layers of DDM Architecture.......................................... 878
3-82 Backout Flows Between Managers (SYNCMNBK) Protocol ............... 909
3-83 Two-Phase Commit Flows Between Managers (SYNCMNCM)
Protocol ........................................................................................................ 911
3-84 Communications FailureBetween Source and Target
(SYNCMNFL) ............................................................................................. 914
3-85 Communications Initiation by Source System (SYNCMNI)................ 917
3-86 Normal Communications Termination (SYNCMNT) Protocol ........... 920
3-87 Server Paths for SYNCPTMGR at DDM Level 4 ................................... 924
3-88 Server Paths for SYNCPTMGR at DDM Level 5 ................................... 925
3-89 Illustration of Sync Point Flow................................................................. 929
3-90 Illustration of Resync Server Sync Point Flow....................................... 930
3-91 Multiple Released Connections Commit Flow ...................................... 934
3-92 Multiple Released Connections Rollback Flow ..................................... 935
3-93 Commit With Updates Flow..................................................................... 936
xvi Open Group Standard (2011)