Free Essay

Sql Performance Analyzer

In:

Submitted By atuls2k12
Words 1591
Pages 7
SQL Performance Analyzer in Oracle Database 11g Release 1
The concept of SQL tuning sets, along with the DBMS_SQLTUNE package to manipulate them, was introduced in Oracle 10g as part of the Automatic SQL Tuning functionality. Oracle 11g makes further use of SQL tuning sets with the SQL Performance Analyzer, which compares the performance of the statements in a tuning set before and after a database change. The database change can be as major or minor as you like, such as:

•Database, operating system, or hardware upgrades.
•Database, operating system, or hardware configuration changes.
•Database initialization parameter changes.
•Schema changes, such as adding indexes or materialized views.
•Refreshing optimizer statistics.
•Creating or changing SQL profiles.
Unlike Database Replay, the SQL Performance Analyzer does not try and replicate the workload on the system. It just plugs through each statement gathering performance statistics.

The SQL Performance Analyzer can be run manually using the DBMS_SQLPA package or using Enterprise Manager. This article gives an overview of both methods.

•Setting Up the Test
•Creating SQL Tuning Sets using the DBMS_SQLTUNE Package
•Running the SQL Performance Analyzer using the DBMS_SQLPA Package
•Creating SQL Tuning Sets using Enterprise Manager
•Running the SQL Performance Analyzer using Enterprise Manager
•Optimizer Upgrade Simulation
•Parameter Change
•Transferring SQL Tuning Sets
Setting Up the Test
The SQL performance analyzer requires SQL tuning sets, and SQL tuning sets are pointless unless they contain SQL, so the first task should be to issue some SQL statements. We are only trying to demonstrate the technology, so the example can be really simple. The following code creates a test user called SPA_TEST_USER.

CONN / AS SYSDBA

CREATE USER spa_test_user IDENTIFIED BY spa_test_user QUOTA UNLIMITED ON users;

GRANT CONNECT, CREATE TABLE TO spa_test_user;Next, connect to the test user and create a test table called MY_OBJECTS using a query from the ALL_OBJECTS view.

CONN spa_test_user/spa_test_user

CREATE TABLE my_objects AS SELECT * FROM all_objects;

EXEC DBMS_STATS.gather_table_stats(USER, 'MY_OBJECTS', cascade => TRUE);This schema represents our "before" state. Still logged in as the test user, issue the following statements.

SELECT COUNT(*) FROM my_objects WHERE object_id 'sql_text LIKE ''%my_objects%'' and parsing_schema_name = ''SPA_TEST_USER''', attribute_list => 'ALL') ) a;

DBMS_SQLTUNE.load_sqlset(sqlset_name => 'spa_test_sqlset', populate_cursor => l_cursor);
END;
/The DBA_SQLSET_STATEMENTS view allows us to see which statements have been associated with the tuning set.

SELECT sql_text
FROM dba_sqlset_statements
WHERE sqlset_name = 'spa_test_sqlset';

SQL_TEXT
--------------------------------------------------------------------------------
SELECT object_name FROM my_objects WHERE object_id = 100
SELECT COUNT(*) FROM my_objects WHERE object_id 'spa_test_sqlset');

PL/SQL procedure successfully completed.

SQL> PRINT :v_task V_TASK
--------------------------------------------------------------------------------
TASK_122

SQL>Next, use the EXECUTE_ANALYSIS_TASK procedure to execute the contents of the SQL tuning set against the current state of the database to gather information about the performance before any modifications are made. This analysis run is named before_change.

BEGIN DBMS_SQLPA.execute_analysis_task( task_name => :v_task, execution_type => 'test execute', execution_name => 'before_change');
END;
/Now we have the "before" performance information, we need to make a change so we can test the "after" performance. For this example we will simply add an index to the test table on the OBJECT_ID column. In a new SQL*Plus session create the index using the following statements.

CONN spa_test_user/spa_test_user

CREATE INDEX my_objects_index_01 ON my_objects(object_id);

EXEC DBMS_STATS.gather_table_stats(USER, 'MY_OBJECTS', cascade => TRUE);Now, we can return to our original session and test the performance after the database change. Once again use the EXECUTE_ANALYSIS_TASK procedure, naming the analysis task "after_change".

BEGIN DBMS_SQLPA.execute_analysis_task( task_name => :v_task, execution_type => 'test execute', execution_name => 'after_change');
END;
/Once the before and after analysis tasks are complete, we must run a comparison analysis task. The following code explicitly names the analysis tasks to compare using name-value pairs in the EXECUTION_PARAMS parameter. If this is ommited, the latest two analysis runs are compared.

BEGIN DBMS_SQLPA.execute_analysis_task( task_name => :v_task, execution_type => 'compare performance', execution_params => dbms_advisor.arglist( 'execution_name1', 'before_change', 'execution_name2', 'after_change') );
END;
/With this final analysis run complete, we can check out the comparison report using the REPORT_ANALYSIS_TASK function. The function returns a CLOB containing the report in 'TEXT', 'XML' or 'HTML' format. Its usage is shown below.

Note. Oracle 11gR2 also includes an 'ACTIVE' format that looks more like the Enterprise Manager output.

SET PAGESIZE 0
SET LINESIZE 1000
SET LONG 1000000
SET LONGCHUNKSIZE 1000000
SET TRIMSPOOL ON
SET TRIM ON

SPOOL /tmp/execute_comparison_report.htm

SELECT DBMS_SQLPA.report_analysis_task(:v_task, 'HTML', 'ALL')
FROM dual;

SPOOL OFFAn example of this file for each available type is shown below.

•TEXT
•HTML
•XML
•ACTIVE - Active HTML available in 11gR2 requires a download of Javascript libraries from an Oracle website, so must be used on a PC connected to the internet.
Creating SQL Tuning Sets using Enterprise Manager
Click on the "SQL Tuning Sets" link towards the bottom of the "Performance" tab.

On the "SQL Tuning Sets" screen, click the "Create" button.

Enter a name for the SQL tuning set and click the "Next" button.

Select the "Load SQL statements one time only" option, select the "Cursor Cache" as the data source, then click the "Next" button.

Set the appropriate values for the "Parsing Schema Name" and "SQL Text" filter attributes, remove any extra attributes by clicking their remove icons, then click the "Next" button.

Accept the immediate schedule by clicking the "Next" button.

Assuming the review information looks correct, click the "Submit" button.

The "SQL Tuning Sets" screen shows the confirmation of the tuning set creation and the scheduled job to populate it.

Once the population job completes, clicking on the SQL tuning set displays its contents.

Now we have an SQL tuning set, we can start using the SQL performance analyzer.

Running the SQL Performance Analyzer using Enterprise Manager
Click the "SQL Performance Analayzer" link on the "Software and Support" tab.

Click the "Guided Workflow" link on the "SQL Performance Analayzer" screen.

Click the execute icon on the first step to create the SQL Performance Analyzer task.

Enter a name for the SPA task, select the SQL tuning set to associate with it, then click the "Create" button.

When the status of the previous step becomes a green tick, click the execute icon on the second step to capture the SQL tuning set performance information of the "before" state.

Enter a "Replay Trial Name" of "before_change", check the "Trial environment established" checkbox, then click the "Submit" button.

When the status of the previous step becomes a green tick, click the execute icon on the third step to capture the SQL tuning set performance information of the "after" state.

Alter the state of the database by creating an index on the OBJECT_ID column of the test table.

CONN spa_test_user/spa_test_user@prod

CREATE INDEX my_objects_index_01 ON my_objects(object_id);

EXEC DBMS_STATS.gather_table_stats(USER, 'MY_OBJECTS', cascade => TRUE);Enter a "Replay Trial Name" of "after_change", check the "Trial environment established" checkbox, then click the "Submit" button.

When the status of the previous step becomes a green tick, click the execute icon on the forth step to run a comparison analysis task.

Accept the default "Trial 1 Name" and "Trial 2 Name" settings by clicking the "Submit" button.

When the status of the previous step becomes a green tick, click the execute icon on the fifth step to view the comparison report.

The resulting page contains the comparison report for the SQL Performance Analyzer task.

Clicking on a specific SQL ID displays the statement specific results, along with the before and after execution plans.

Optimizer Upgrade Simulation
The SQL Performance Analyzer allows you to test the affects of optimizer version changes on SQL tuning sets. Click the "Optimizer Upgrade Simulation" link on the "SQL Performance Analyzer" page.

Enter a task name, select the two optimizer versions to compare, then click the "Submit" button.

The task is listed in the "SQL Performance Analyzer Tasks" section. Refresh the page intermittently until the task status becomes a green tick, then click on the task name.

The resulting screen shows details of the selected task. Click on the "Comparison Report" classes icon allows you to view the comparison report.

Parameter Change
The SQL Performance Analyzer provides a shortcut for setting up tests of initialization parameter changes on SQL tuning sets. Click the "Parameter" link on the "SQL Performance Analyzer" page.

Enter a task name and the parameter you wish to test. Enter the base and changed value, then click the "Submit" button.

The task is listed in the "SQL Performance Analyzer Tasks" section. Refresh the page intermittently until the task status becomes a green tick, then click on the task name.

The resulting screen shows details of the selected task. Click on the "Comparison Report" classes icon allows you to view the comparison report.

Transferring SQL Tuning Sets
In the examples listed above, the tests have been performed on the same system. In reality you are more likely to want to create a tuning set on your production system, then run the SQL Performance Analyzer against it on a test system. Fortunately, the DBMS_SQLTUNE package allows you to transport SQL tuning sets by storing them in a staging table.

First, create the staging table using the CREATE_STGTAB_SQLSET procedure.

CONN sys/password@prod AS SYSDBA

BEGIN DBMS_SQLTUNE.create_stgtab_sqlset(table_name => 'SQLSET_TAB', schema_name => 'SPA_TEST_USER', tablespace_name => 'USERS');
END;
/Next, use the PACK_STGTAB_SQLSET procedure to export SQL tuning set into the staging table.

BEGIN DBMS_SQLTUNE.pack_stgtab_sqlset(sqlset_name => 'SPA_TEST_SQLSET', sqlset_owner => 'SYS', staging_table_name => 'SQLSET_TAB', staging_schema_owner => 'SPA_TEST_USER');
END;
/Once the SQL tuning set is packed into the staging table, the table can be transferred to the test system using Datapump, Export/Import or via a database link. Once on the test system, the SQL tuning set can be imported using the UNPACK_STGTAB_SQLSET procedure.

BEGIN DBMS_SQLTUNE.unpack_stgtab_sqlset(sqlset_name => '%', sqlset_owner => 'SYS', replace => TRUE, staging_table_name => 'SQLSET_TAB', staging_schema_owner => 'SPA_TEST_USER');
END;
/The SQL tuning set can now be used with the SQL Performance Analyzer on the test system.

Similar Documents

Free Essay

Resume

...Professional Summary: * Extensive Experience in MS SQL Server 2005/2008 and 2000 Database Administration and PL/SQL developer in Business Analyst including Planning, Deployment / Implementation and configuration. * Extensive experience in writing Complex Stored procedures as well analyzing and debugging existing complex stored procedures. * Successfully led, executed and maintained projects with multiple databases. * Implementing all kinds of SQL Server Constraints (Primary, Foreign, Unique, Check etc).  * Generating complex Transact SQL (T-SQL) queries, Sub queries, Co-related sub queries, Dynamic SQL queries * Programming in SQL Server - Using the stored procedures, Triggers, User-defined functions and Views, Common table expressions (CTEs) * Proficient in creating T-SQL (DML, DDL, DCL and TCL), Indexes, Views, Temporally Tables, Table Variables, Complex Stored Procedures, System and User Defined Functions . * Strong experience in creating complex Replication, Index, Functions, DTS packages, triggers, cursors, tables, views and other SQL joins and statements. * Expertise in Client-Server Application Development using Oracle […] PL/SQL, SQL *PLUS, TOAD and SQL*LOADER. * Experience in understanding complicated performance issues and worked with DBA's to suggest valuable ways to fix the problem  * Hands on experience working with SSIS, for ETL process ensuring proper implementation of Event Handlers, Loggings, Checkpoints, Transactions...

Words: 1001 - Pages: 5

Free Essay

Siteprotector Database Tuning Guide

...Database Tuning and Administration Guide for SP6.1 February 22, 2007 IBM Internet Security Systems, Inc. 6303 Barfield Road Atlanta, Georgia 30328-4233 United States (404) 236-2600 http://www.iss.net © IBM Internet Security Systems, Inc. 1994-2006. All rights reserved worldwide. Customers may make reasonable numbers of copies of this publication for internal use only. This publication may not otherwise be copied or reproduced, in whole or in part, by any other person or entity without the express prior written consent of Internet Security Systems, Inc. Patent pending. Internet Security Systems, System Scanner, Wireless Scanner, SiteProtector, Proventia, Proventia Web Filter, Proventia Mail Filter, Proventia Filter Reporter ADDME, AlertCon, ActiveAlert, FireCell, FlexCheck, Secure Steps, SecurePartner, SecureU, and X-Press Update are trademarks and service marks, and the Internet Security Systems logo, X-Force, SAFEsuite, Internet Scanner, Database Scanner, Online Scanner, and RealSecure registered trademarks, of Internet Security Systems, Inc. Network ICE, the Network ICE logo, and ICEpac are trademarks, BlackICE a licensed trademark, and ICEcap a registered trademark, of Network ICE Corporation, a wholly owned subsidiary of Internet Security Systems, Inc. SilentRunner is a registered trademark of Raytheon Company. Acrobat and Adobe are registered trademarks of Adobe Systems Incorporated. Certicom is a trademark and Security Builder is a registered trademark of Certicom...

Words: 5367 - Pages: 22

Premium Essay

The One

...Ilona Oganesyan 10905 Ambergate Ln Frisco, TX 75035 214-543-2190 ilonchik15@yahoo.com Education * Bachelor of Science in Computer Science – University of Texas at Dallas * Master of Science in Management and Administrative Sciences – Finance Concentration – University of Texas at Dallas Professional Certifications * Certified Project Management Professional Professional Skills * Microsoft Project, MS SQL development, MS SQL Server 2008, 2005, 2000, 7.0 design and administration, backup and recovery, T-SQL stored procedures, Query Analyzer; Oracle PL/SQL, Oracle Forms and Reports, Toad 9.0; SSRS reports development, Visual Basic 6.0, C+ +, C#; AS400 Advanced knowledge of Excel, including complex macros, VBA, Pivot Tables and Graphs; Access Form Design, Access Report Design, ADO; Visio Professional, JIRA, Remedy, Clear Quest,Clear Case SharePoint Professional Experience Fannie Mae May 10 – Present Project Manager II * Application Development team lead responsible for managing project delivery of multiple Adobe Flex applications * Provide project management services for the Credit Loss Management division * Identify and engage appropriate technical and business resources needed for successful project execution. * Manage project resources. * Provide technical and analytical guidance to project team * Prepare project execution plans and ensure projects are completed on schedule, within budget and meet all...

Words: 726 - Pages: 3

Free Essay

Sql Server Security Best Practise

...SQL Server 2012 Security Best Practices - Operational and Administrative Tasks SQL Server White Paper Author: Bob Beauchemin, SQLskills Technical Reviewers: Darmadi Komo, Jack Richins, Devendra Tiwari Published: January 2012 Applies to: SQL Server 2012 and SQL Server 2014 Summary: Security is a crucial part of any mission-critical application. This paper describes best practices for setting up and maintaining security in SQL Server 2012. Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This white paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in, or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual...

Words: 15647 - Pages: 63

Premium Essay

Sharepoint Upgrade

...New Horizons Computer Learning Center of Cincinnati OFFICIAL MICROSOFT LEARNING PRODUCT 10174A Lab Instructions and Lab Answer Key: Configuring and Administering Microsoft® SharePoint® 2010 New Horizons Computer Learning Center of Cincinnati Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names, email addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, email address, logo, person, place or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft® Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. The names...

Words: 74170 - Pages: 297

Premium Essay

Network Systems Administrator Tools

...BALTIMORE CITY COMMUNITY COLLEGE DIVISION OF BUSINESS, HEALTH, MATHEMATICS AND SCIENCE BUSINESS, MANAGEMENT AND TECHNOLOGY DEPARTMENT ITSA 255 – Information Systems Security Assignment 4 – Network System Administrator Tools/Utilities Students are to perform independent Internet research and write a short paragraph describing the functionality and utilization for each of the following Network System Administrator Tools/Utilities: * FileZilla FileZilla is a cross platform File Transfer Protocol (FTP) application software that allows the ability to transfer multiple files over the internet. It is made up of a FileZilla client and a FileZilla server. It is available for use with Windows, Linux and MAC OSX. It supports FTP, SFTP (SSH File Transfer protocol), FTPS (FTP secure). Some of the features include support in IPv6, Drag and Drop, Filename feature, Remote file editing, FTP proxy support and much more. It includes two methods to invoke security which is the explicit method and implicit method. Many bug fixes and vulnerability patches were made over the initial release of June 22, 2001. * Nessus Nessus is a open source cross-platform network vulnerability scanner software developed by Tenable Network Security. First introduced during 1998; it was created to be used as a free remote security scanner to the internet community. It allows for various scanning which scans a computer and raises an alert if it discovers any vulnerability that hackers could use...

Words: 856 - Pages: 4

Premium Essay

555 Week One

...Cheeper Sales and Graphics: Accounting System CMGT 555 Cheeper Sales and Graphics: Accounting Management System Cheeper Sales and Graphics have enlisted the services of a third party software design company to assist in developing an online centralized accounting management system. Currently, there is no accounting management system in place to reference or build off. Therefore, the members of both companies are working together to design and develop a system from scratch that fulfills the companies technical, performance, usability, reliability, and security requirements. Technical Aspects Software Requirements: Cheeper Sales and Graphics is listing the following requirements that must be incorporated in the new accounting managements system. The accounting management system will be developed on one of the backbone software of the consulting team owns management application this type of service products simplify data protection in even the most challenging heterogeneous environments, enables administrators to easily and cost-effectively achieve maximum data availability, while protecting against multiple types of failures and reporting on their storage environment ("Quest Software", 2013). This type of product includes backup and recovery, real-time protection and application data protection. This type of software will be uniquely planned to meet the following main features as described by the staff...

Words: 1585 - Pages: 7

Premium Essay

Electronic Ing

...Admirim Ymeri Jordan Misja, Tirana, Albania Telephone: +355 69 3919969 (mobile) e-mail: adiymeri@hotmail.com Summary • Very good knowledge on IT systems, global system analysis, developing, testing and managing of software in several programming languages. Software Engineering, Software Analyst, Database designer and Administrator in ORACLE, SQL Server DBMS, PostgreSQL, etc., Software Designer, Software Developer, Network and System Administrator. • Experience managing national level large scale IT projects. • Experience in software development, through the full cycle, for requirements analysis, detailed specifications, project planning, resource management, implementation, testing and beyond. • Fluency in English, Italian, Albanian with intermediate knowledge of French and German Experience Database Designing Consultancy 03/2010-present Immovable Property System (IPS) Land Administration and Management Project (LAMP) Immovable Property Registration Office (IPRO) • Develop and maintain the database, database applications, database interface functions (data entry forms and reports) and products. • Create, maintain, install, modify and test modules for the database and user interface of the IPS. • Prepare comprehensive written user manual/guideline to use, maintain and update the database produced. A first draft of the user manuals should be ready at the end of the...

Words: 776 - Pages: 4

Premium Essay

Crm and Impact

...Executive summary The organization information system is backbone of organizational operational and functional units, the malware can produce potential threat to organization image, the establishment of an effective security measures and reassessment of organizational risk management approaches in order to cater with latest implication trend in network security. This report is based on literature review, analytical analysis of case studies, news articles magazines to highlight vulnerability and implication of malware attack to an organization, highlights the salient features of malware attack, malware attacks that can significantly hurt an enterprise information system, leading to serious functional commotions, can result into destructing the basic IT security up to identity theft, leakage of data, stealing private information, corporate information system blue prints, industrial white papers and networks break down. The only constant in the world of technology is a change, report highlights the latest trends, dimension and implication of malware attack and new critical source of threats, within the perspective of constantly changing IT world (e.g. cloud services-integration) Enterprise may not effectively device and manage malware threat and 'risk assessment processes. This report highlight the malware propagation process, malware vulnerability, the types of malware, optimistic cost effective solution in order to minimize security risk for an Enterprise information...

Words: 3648 - Pages: 15

Premium Essay

Computer Tricks

...EC-Council Press | The Experts: EC-Council EC-Council’s mission is to address the need for well educated and certified information security and e-business practitioners. EC-Council is a global, member based organization comprised of hundreds of industry and subject matter experts all working together to set the standards and raise the bar in Information Security certification and education. EC-Council certifications are viewed as the essential certifications needed where standard configuration and security policy courses fall short. Providing a true, hands-on, tactical approach to security, individuals armed with the knowledge disseminated by EC-Council programs are securing networks around the world and beating the hackers at their own game. The Solution: EC-Council Press The EC-Council | Press marks an innovation in academic text books and courses of study in information security, computer forensics, disaster recovery, and end-user security. By repurposing the essential content of EC-Council’s world class professional certification programs to fit academic programs, the EC-Council | Press was formed. With 8 Full Series, comprised of 27 different books, the EC-Council | Press is set to revolutionize global information security programs and ultimately create a new breed of practitioners capable of combating this growing epidemic of cybercrime and the rising threat of cyber war. This Certification: C|EH – Certified Ethical Hacker Certified Ethical Hacker is a certification...

Words: 61838 - Pages: 248

Premium Essay

Microsoft Access or Microsoft Sql Server: What's Right in Your Organization

...Microsoft Access or Microsoft SQL Server: What's Right in Your Organization? SQL Server Technical Article Writers: Luke Chung Technical Reviewer: Matt Nunn Published: December 2004, revised July 2006. Applies To: SQL Server 2005 Summary: This paper explains how Microsoft® Access is used within an organization. It also explains when to use Access and when to use Microsoft SQL Server™. Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This White Paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering...

Words: 6412 - Pages: 26

Premium Essay

Test Paper

...CompTIA Security+: Get Certified Get Ahead SY0-401 Study Guide Darril Gibson Dedication To my wife, who even after 22 years of marriage continues to remind me how wonderful life can be if you’re in a loving relationship. Thanks for sharing your life with me. Acknowledgments Books of this size and depth can’t be done by a single person, and I’m grateful for the many people who helped me put this book together. First, thanks to my wife. She has provided me immeasurable support throughout this project. The technical editor, Steve Johnson, provided some good feedback throughout the project. If you have the paperback copy of the book in your hand, you’re enjoying some excellent composite editing work done by Susan Veach. I’m extremely grateful for all the effort Karen Annett put into this project. She’s an awesome copy editor and proofer and the book is tremendously better due to all the work she’s put into it. While I certainly appreciate all the feedback everyone gave me, I want to stress that any technical errors that may have snuck into this book are entirely my fault and no reflection on anyone who helped. I always strive to identify and remove every error, but they still seem to sneak in. About the Author Darril Gibson is the CEO of YCDA, LLC (short for You Can Do Anything). He has contributed to more than 35 books as the sole author, a coauthor, or a technical editor. Darril regularly writes, consults, and teaches on a wide variety of technical...

Words: 125224 - Pages: 501

Free Essay

Interview Questions .Net

...------------------------------------------------- // Interface ------------------------------------------------- // ------------------------------------------------- public interface IChoice ------------------------------------------------- { ------------------------------------------------- string Buy(); ------------------------------------------------- } ------------------------------------------------- A new class will be added and this class we will be called factory class. This class sits between the client class and the business class and based on user choice it will return the respective class object through the interface. It will solve problem 3// ------------------------------------------------- // Factory Class ------------------------------------------------- // ------------------------------------------------- public class FactoryChoice ------------------------------------------------- { ------------------------------------------------- static public IChoice getChoiceObj(string cChoice) ------------------------------------------------- { ------------------------------------------------- IChoice objChoice=null; ------------------------------------------------- if (cChoice.ToLower()...

Words: 4323 - Pages: 18

Premium Essay

Chapter 9- 12 Review

...Knowledge Assessment Fill in the Blank Complete the following sentences by writing the correct word or words in the blanks provided. 1. A software routine, which also acts as a filter that blocks certain type of incoming and outgoing traffic, while enabling other types is called a __________________. firewall 2. The __________________ tool provides a central access point for all of the network controls and connections on a computer running Windows 7. Network and Sharing Center 3. A device that connects one network to another is called a __________________. router 4. The most common method for illustrating the operations of a networking stack is the __________________, which consists of __________________ layers. Open Systems Interconnection (OSI) reference model, seven 5. Protocols that do not guarantee delivery of their data, but do operate with a very low overhead that conserve network bandwidth are called __________________. connectionless protocols 6. The Windows 7 command-line utility that can tell you if the TCP/IP stack of another system on the network is functioning normally is called __________________. Ping.exe 7. The Windows 7 command-line utility that enables you to generate DNS request messages and then transmit them to specific DNS servers on the network is called __________________. Nslookup.exe 8. Most networks use __________________ to dynamically assign addresses and configure computers to use them. Dynamic Host Configuration...

Words: 2707 - Pages: 11

Free Essay

Mister

...packet sniffing will be introduced and several functionality and possible uses of packet sniffers will be explained. Also, information on how to protect against sniffers and man-in-the-middle attacks will be provided. An example of a packet sniffer program, Wireshark, will be given, followed by a case study involving the restaurant chain Dave & Buster's, which will show the negative consequences that can occur when organizations are not aware of the threat of packet sniffing by hackers. A packet sniffer is "a computer program or a piece of computer hardware that can intercept and log traffic passing over a digital network or part of a network" (Connolly, 2003). Packet sniffers are known by alternate names including network analyzer, protocol analyzer or sniffer, or for particular types of networks, an Ethernet sniffer or wireless sniffer (Connolly, 2003). As binary data travels through a network, the packet sniffer captures the data and provides the user an idea of what is happening in the network by allowing a view of the packet-by-packet data (Shimonski, 2002). Additionally, sniffers can also be used to steal information from a network (Whitman and Mattord, 2008). Legitimate and illegitimate usage will be explained in later sections. Packet sniffing programs can be used to perform man-in-the-middle attacks (MITM). This type of attack occurs when "an attacker...

Words: 2443 - Pages: 10