What is WASà Provides the infrastructure for running applications that run your business.à Common environment and programming model for your applications.àPlatform for developing and Deploying web services and SOA based appsà Secure, Scalable, reliable transaction engine for ERPà IBM WebSphere is architected to enable you to build business-critical applicationsfor the Webà WebSphere includes a wide range of products that help you develop and serveWeb applications.à They are designed to make it easier for clients to build, deploy, and managedynamic Web sites more productivelyà WAS implements J2EE specificationWebSphere Application Server provides the environment to run your Web-enabled e-business applications. An application server functions as Web middleware or a middletier in a three-tier e-business environment. The first tier is the HTTP server thathandles requests from the browser client. The third tier is the business database (forexample, DB2 UDB for iSeries) and the business logic (for example, traditionalbusiness applications, such as order processing). The middle tier is WebSphereApplication Server, which provides a framework for a consistent and architected linkbetween the HTTP requests and the business data and logic.
With the Base and Express packages, you are limited to single application serverenvironments. The Network Deployment package allows you to extend thisenvironment to include multiple application servers that are administered from asingle point of control and can be clustered to provide scalability and high availabilityenvironments.The typical application flow is as follows:1. A Web client requests a URL in the browser (input page).2. The request is routed to the Web server over the Internet.3. The Web server immediately passes the request to the Web server plug-in.All requests go to the Web server plug-in first.4. The Web server plug-in examines the URL, verifies the list of host namealiases from which it will accept traffic based on the virtual host information,and chooses a server to handle the request.5. A stream is created. A stream is a connection to the Web container. It ispossible to maintain a connection (stream) over a number of requests. TheWeb container receives the request and, based on the URL, dispatches it tothe proper servlet.6. If the servlet class is not loaded, the dynamic class loader loads the servlet(servlet init(), then doGet() or doPost()).7. JNDI is used for lookup of either datasources or EJBs required by the servlet.8. Depending upon whether a datasource is specified or an EJB is requested,the JNDI directs the servlet:– To the corresponding database and gets a connection from its connection
pool in the case of a data source.– To the corresponding EJB container, which then instantiates the EJB whenan EJB is requested.9. If the EJB request involves an SQL transaction, it goes back to the JNDI tolook up the datasource.10.The SQL statement is executed and the retrieved data is sent back either tothe servlet or to the EJB.11.Data beans are created and handed off to JSPs in the case of EJBs.12.The servlet sends data to JSPs.13.The JSP generates the HTML that is sent back through the plug-in to the Webserver.14.The Web server sends the output page (output HTML) to the browser. Functionality of WAS WebSphere Application Server supports asynchronous messaging through the use of a JMS provider and its related messaging system.(JMS 1.1 Messaging Provider) WebSphere Application Server provides authentication and authorization capabilities to secure administrative functions and applications, using LDAP WebSphere Application Server works with a Web server (such as the IBM HTTP Server) to route requests from browsers to the applications that run in WebSphere Application Server. Web server plug-ins are provided for installation with supported Web browsers. The plug-ins direct requests to the appropriate application server and perform workload balancing among servers in a cluster. Web services enable businesses to connect applications to other business applications, deliver business functions to a broader set of clients and partners, interact with marketplaces more efficiently, and create new business models dynamically. Delivers a high performance and extremely scalable transaction engine for dynamic e-business applications PackagingWebSphere Application Server is available in multiple packaging options.WebSphere Application Server - Express V6.0à Single Server environment.(No Clustering or multi server management)à J2EE 1.4 supportàMedium-sized business
àContains Rational Web Developer application toolà Doesn’t handle EJB and JCAà Limited to 2 CPU’sWebSphere Application Server V6.1 (Base)àSlightly differs in packaging and licensingà Contains Application Server toolkità Includes a trial version of Rational Application DeveloperàUnlimited CPU’sWebSphere Application Server Network Deployment V6àExtends Base versionàClustering capabilitiesàEdge Components which provide high performance and availability (Caching Proxyand Load Balancer)àHA for distributed configurationsàLarge Enterprise applicationsàScalability, Availability and PerformanceàWeb Server plug-in supports weighted WLMàAll V6 application servers have the same core and base functionalityàWebSphere Application Server - Express V6 node can be upgraded to a WebSphereApplication Server V6 node(.Can be done without any software upgrades .Only apaper license upgrade is required)àWebSphere Application Server- Express V6 and WebSphere Application Server V6node can be federated into a WebSphere Application Server - Network DeploymentV6 cell (Can be done without any software upgrades .Only a paper license upgrade isrequired)Differences b/n WAS VersionWAS 5: J2EE 1.2/1.3 support JDK 1.3 support Web Services based on Apache engineWAS 6.0: J2EE 1.2/1.3/1.4 support JDK 1.4 support (JDK 1.4.2) Web Services based on J2EE 1.4 High Availability Manager Java Based Messaging Engine
EJB 2.1, JMS 1.1, JCA 1.5, Servlet 2.4, and JSP 2.0 Supports Java Server Faces (JSF) Creates Archive of the existing WAS configurations and the archive canbe used to create new configurations. Profiles and all profiles use same WebSphere binaries(Less storage) Node groups Service integration functionality provides both message-oriented andservice Oriented applicationsWAS 6.1: J2EE 1.2/1.3/1.4 support JDK 5.0 support JSF-a framework for Web applications Integrated Console Security changes Secure and Scalable runtimeEdge ComponentsUsing Edge components can reduce Web server congestion, increase contentavailability, and improve Web server performance. As the name indicates, Edgecomponents usually run on machines that are close (in a network configurationsense) to the boundary between an enterprise’s intranet and the Internet.Web containeràA Web container, which processes HTTP requests, servlets, and JavaServer Pages(JSPs)à Web container transport chains:Requests are directed to the Web container using the Web container inboundtransport chain. The chain consists of a TCP inbound channel that provides theconnection to the network, an HTTP inbound channel that serves HTTP 1.0 and 1.1requests, and a Web container channel over which requests for servlets and JSPs aresent to the Web container for processingà Servlet processingWhen handling servlets, the Web container creates a request object and a responseobject, then invokes the servlet service method. The Web container invokes theservlet’s destroy method when appropriate and unloads the servlet, after which theJVM performs garbage collection.à HTML and other static content processingRequests for HTML and other static content that are directed to the Web containerare served by the Web container inbound chain. However, in most cases, using anexternal Web server and Web server plug-in as a front-end to a Web container ismore appropriate for a production environment.
purpose, such server-side programs generate a response, most often in HTML, forviewing in a Web browser.Understand that a Web servers delegation model is fairly simple. When a requestcomes into the Web server, the Web server simply passes the request to theprogram best able to handle it. The Web server doesnt provide any functionalitybeyond simply providing an environment in which the server-side program canexecute and pass back the generated responses. The server-side program usuallyprovides for itself such functions as transaction processing, database connectivity,and messaging.While a Web server may not itself support transactions or database connectionpooling, it may employ various strategies for fault tolerance and scalability such asload balancing, caching, and clustering—features oftentimes erroneously assigned asfeatures reserved only for application servers.Eg: Apache HTTP Server, Sun ONE Web Server, iPlanet Web ServerThe application server:As for the application server, according to our definition, an application serverexposes business logic to client applications through various protocols, possiblyincluding HTTP. While a Web server mainly deals with sending HTML for display in aWeb browser, an application server provides access to business logic for use by clientapplication programs. The application program can use this logic just as it would calla method on an object (or a function in the procedural world).Such application server clients can include GUIs (graphical user interface) running ona PC, a Web server, or even other application servers. The information traveling backand forth between an application server and its client is not restricted to simpledisplay markup. Instead, the information is program logic. Since the logic takes theform of data and method calls and not static HTML, the client can employ theexposed business logic however it wants.In most cases, the server exposes this business logic through a component API, suchas the EJB (Enterprise JavaBean) component model found on J2EE (Java 2 Platform,Enterprise Edition) application servers. Moreover, the application server manages itsown resources. Such gate-keeping duties include security, transaction processing,resource pooling, and messaging.Like a Web server, an application server may also employ various scalability andfault-tolerance techniques.Difference between AppServer and a Web server :(1) Webserver serves pages for viewing in web browser, application server providesexposes businness logic for client applications through various protocols
1. Roles & Responsibilities2. Explain your work in your previous environment (Your script)3. What is wsadmin / jacl scripting WSADMIN is a scripting interface (or command-line interface) intoWebSphere Application Server that permits the automation of many different tasksthat we can do using a (web interface) or graphical user admin console. JACL scripting is the scripting language that is supported by theWebSphere Application Server to administer or write any custom-based task. What are the different wsadmin objects. AdminConfig AdminControl AdminApp AdminTask Help How do you invoke wsadmin command Go to the appropriate <profile_home> and type wsdmin. How do you execute a jacl script >wsadmin -f myScript.jacl What did you use wsadmin / jacl scripting for.4. Explain Session affinity: Most servers use the term "Session Affinity" to indicate that within acluster of servers, requests from the same client always get routed back to the sameserver. (or) In a clustered environment, any HTTP requests associated with an HTTPsession must be routed to the same Web application in the same JVM. Session Persistance: You use session persistence to permanently store data from an HTTPsession object to enable failover and load balancing across a cluster of WebSphereApplicaiton Servers. Sessiontracking: Session tracking enables you to track a users progress over multipleservlets or HTML pages, which, by nature, are stateless.How do you set session time out :
You can specify an interval of time after which HTTP sessions expire. click Servers > Application servers > server_name > Web containersettings > Session management > Session Timeout What are the different levels at which session timeout can be set application level, web module level, server level5. How do you upgrade WASGUI UpgradeSilent UpgradeLogs files and their paths for both6. Back UpsHow do you take back ups in WAS backupConfig.sh [filename] -nostopWhat is the out put file WebSphereConfig_yyyy-mm-dd.zipHow do you restore back ups restoreConfig.sh <filename.zip> -nostopWhat is the Backup policy in your previous company Incremental Backups every week.7. Explain profiles and what is the equivalent command in WAS 5.x In WAS 5.x ----> wsInstance.sh -name instanceName -pathinstanceLoacation -host hostName -create | delete8. What are the different kinds of sync operations 1. Automatic synchronization. 2. Manual synchronization. 3. Startup synchronization.How do you disable auto sync System Administration > nodeagent > file synchronization service >Uncheck automatic synchronization.What is the default interval for auto sync 60 seconds.9. What are the different UserRoles in WAS 1. Monitor 2. Operator 3. Configurator 4. Administrator
10. Explain JNDI in WAS Each application server hosts a name service that provides a JavaNaming and Directory Interface (JNDI) name space. The service is used to registerresources hosted by the application server. The JNDI implementation in WebSphereApplication Server is built on top of a Common Object Request Broker Architecture(CORBA) naming service (CosNaming). JNDI provides the client-side access to naming and presents theprogramming model that application developers use. CosNaming provides the server-side implementation and is where the name space is actually stored. JNDI essentiallyprovides a client-side wrapper of the name space stored in CosNaming and interactswith the CosNaming server on behalf of the client. Simple Simple name The simple name binding is guaranteed to succeed if lookup is withinthe same server or when connected directly to the name space of the servercontaining the target of the lookup. It can be used in a servlet or EJB, if it is certainthat the object is located on the same application server. Here is an example of asimple name: ejb/webbank/Account Corba Corbaname The corbaname binding is always guaranteed to work. However, itrequires that you know the correct path to the object at deployment time. Here is anexample of a corbaname:corbaname::myhost1:9812/NameServiceServerRoot#ejb/webbank/Account Complex names Compound name/remote/complex Applications that do not run in the same server cannot use simplename lookup because the simple name is not local to the application. Instead, anapplication of this type must look the object up directly from the name server. Eachapplication server contains a name server. System artifacts such as EJB homes arebound relative to the server root context in that name server. The fully qualified(compound name) JNDI name is always guaranteed to work. Here is an example of a compound name: cell/nodes/node1/servers/server1/ejb/webbank/Account When do you use dumpNameSpace.sh Run the dumpNameSpace command against any bootstrap port toget a listing of the names bound with that provider URL.
11. Explain JDBC Connection Pooling Each JDBC data source has a pool of JDBC connections that arecreated when the data source is deployed or at server startup. Applications use aconnection from the pool then return it when finished using the connection.Connection pooling enhances performance by eliminating the costly task of creatingdatabase connections for the application. Each data source that you configure contains a pool of databaseconnections that are created when the data source instance is created-when it isdeployed or targeted, or at server startup. Connection Timeout This value indicates the number of seconds a request for a connectionwaits when there are no connections available in the free pool and no newconnections can be created. Max Connections Specifies the maximum number of physical connections that you can create inthis pool. Min Connections Specifies the minimum number of physical connections that you can create inthis pool. Reap Time Specifies the interval in seconds between runs of pool maintenance thread. Unused Timeout Specifies the interval in seconds after which an idle or unused connection isdiscarded. Aged Timeout Specifies the interval in seconds before a physical connection is discarded. Which one should be the highest and which one should be the lowest in the reap/unused/aged timeouts. Aged timeout should be the highest and Reap timeout should belowest. Purge Policy Specifies how to purge connections when a stale connections or fatalconnection error is detected. What are stale connection exceptions When an application receives a stale connection exception on adatabase operation, it indicates that the connection currently held is no longer valid. (or) Whenever a troubled connection is encountered, astaleConnectionException is raised. (A troubled connection is an inconsitentconnection object in a connection pool)12. Explain the Deployment steps of a J2EE application to WAS
13. How would you go about when a new application comes into urenvironment (resources, settings, heaps etc)14. What is rollover update It is used to rollover the updates to all the cluster members in acluster whenever any changes are made to even one of the cluster member.15. What is ripple start RippleStart combines stopping and starting operations. It first stopsand then restarts each member of the cluster.16. Explain 2 Troubleshooting scenarios17. How would you set up introscope profiles/probes Wilys Introscope is an enterprise application performance monitoringtool. It provides an overview of application and server health and statistics.18. VerboseGC VerboseGC is the logging mechanism implemented by the JVMto diagnose memory/storage problems. Here Garbage collection identifies and freespreviously allocated storage that is no longer in use. An understanding of the waythat the Garbage Collector works will help you to diagnose problems. Verbose logging is intended as the first tool to be used whenattempting to diagnose garbage collector problems; more detailed analysis can beperformed by invoking one or more (trace garbage collector) traces. How do set it up In Admin Console goto Servers > Application Servers > Javaand Process Management > Process Definition > Java Virtual Machine > CheckVerbose Garbage Colletion option. What files have verbosegc information That particular servers (<profile_home>/logs/servername/)native_stderr.log What tool did you use to analyse verbosegc logs GCAnalyzer19. What is process definition. A process definition specifies the run-time characteristics of anapplication server process. A process definition can include characteristics such asJVM settings, standard in, error and output paths, and the user ID and passwordunder which a server runs.
What is the effect of changing max heap and min heap size of a jvm Max Heap Size: When you have established the maximumheap size that you need, you might want to set the minimum heap size to the samevalue; Using the same values is not usually a good idea, because it delays the startof garbage collection until the heap is full. The first time that the Garbage Collectorruns, therefore, becomes a very expensive operation. Also, the heap is more likely tobe fragmented and require a heap compaction. Again this is a very expensiveoperation. Min Heap Size: The recommendation is to start yourapplication with the minimum heap size that it needs. When it starts up, theGarbage Collector will run often and, because the heap is small, it runs efficiently. Whats the max heap allowed by AIX Minimum heap size allowed AIX: 4 MB LINUX: 4 MB WINDOWS: 4 MB Maximum heap size allowed AIX: Half the available memory with a minimum of 16 MB and a maximum of512 MB LINUX: Half the available memory with a minimum of 16 MB and amaximum of 512 MB WINDOWS: Half the real (physical or RAM) memory with a minimum of 16 MBand a maximum of 2 GB What are the effects of large initial heap/max heap The time between garbage collections will increase, but the garbagecollection will take longer, which indirectly effects the turn-around-time of theapplicaiton performance. (or) Because it delays the start of garbage collection until the heapis full. The first time that the Garbage Collector runs, therefore, becomes a veryexpensive operation. Also, the heap is more likely to be fragmented and require aheap compaction. Again this is a very expensive operation.20. Heap Dumps/ Core dumps What is a heap dump Heapdump is a JVM facility that generates a dump of all liveobjects that are on the Java heap at a certain point in time; that is, those that are used by the Java application. When the java heap is exhaustedthe JVM will generate a heap dump by default. By default, you get heapdumps only on OutOfMemoryErrors. You donot get heapdumps in crashes or through a signal to the JVM. It shows the objects that are using large amounts of memory on the
Java heap, and what is preventing them from being collected by the GarbageCollector. What is a core dump/thread dump Java thread dumps provide detailed information about all activeJava threads. It is useful in several situations, most notably for hung servers. How to generate Heap dump both WAS 5/6 By default, you get heapdumps only on OutOfMemoryErrors. You donot get heapdumps in crashes or through a signal to the JVM. In order to manuallygenerate a heapdump, you must first enable signal-based heapdumps by setting theIBM_HEAPDUMP=TRUE and IBM_NOSIGHANDLER=TRUE environmental variablesand through wsadmin follow the below process:>set myheap_dm [$AdminControl queryNames type=JVM,process=server1,*]>$AdminControl invoke $myheap_dm generateHeapDump How to generate core dump/thread dump both WAS 5/6Through wsadmin>set mythread_dm [$AdminControl completeObjectNametype=JVM,process=server1,*]>$AdminControl invoke $mythread_dm dumpThreads Whats the difference between kill -3 command executed on WAS5 JVMs and WAS 6 JVMS kill -3 command generate core dumps. What tools did you use to analyse core dump/thread dump IBM ThreadAnalyzer What tools did you use to analyse heap dumps IBM HeapAnalyzer In what scenarios is a core dump/thread dump useful It is useful in several situations, most notably for hung servers or hungthread situations or thread deadlock situations. In what scenarios is a heap dump useful It is useful in situations, most notable for memory leakproblems or memory allocation problems for exaple OutOfMemoryExceptions. What are the respective extensions (jdk 1.3 and 1.4) jdk 1.4 heap dump format generates a .phd format21. How do you make a jvm run as a service in windows and why. WASService.exe. The reason we can utilize this service onWindows platform is because the Windows OS automatically starts this servicewhenever the system is up and we can flexibily start and stop the server fromwindows services.
22. What is activity log and how do you view it. These are IBM Service logs which are in binary format, which logsactivity of various WebSphere Application Server components. Log Analyzer is usedto view the activity.log files.23. How do you set up traces. In Admin console Troublshooting > logs and trace > servername >choose Diagnostic trace24. What is a PMR and explain how you worked with IBM on a PMR PMR: Problem Management Record ---- PMR is created wehn a customersubmits a request to fix a software problem via ESR. A PMR number is assigned totrack the request. You can attach files to your PMR to provide the IBM engineer moreinformation to better assist you.ESR: Electronic Service Request --------25. What all parameters did you tune in WAS (other than JDBC connectionpool and heap sizes) We can tune some of these other aspects such as 1. Application server (parameter : ) 2. JVM tunings (parameter : ) 3. Applications (parameter : ) 4. Database (parameter : ) 5. JMS (parameter : ) 6. Security 7. Hardware capacity and settings (parameter : ) 8. Operating System (parameter : ) 9. Web Servers (parameter : )26. What other connection pools do you know in WAS other than JDBCconnection pool J2C connection pool MQ connection pool Thread pool27. How do you enable global security in WAS 1. Configure User registries (it can be custom, LDAP, or localOS) 2. Configure Authentication mechanisms (LTPA) 3. Configure Authorization (if there is any) and then check Enable global security. How do u configure an LDAP 1. In the Deployment Manager Admin Console, select Security -> Global
Security > User Registries -> LDAP. 2. Provide the details for the fields in the Configuration panel as listed below: Serverid, Serverpassword, Type, Host, Port, Base DN, Bind DN,Bind password (please get this info from LDAP admin) 3. Click Apply 4. Save the configuration for WebSphere. 5. We need to define the configuration for Global Security in theAdministrative Console. Navigate to Security -> Global Security. 6. "Check" Enable global security option 7. "Uncheck" Enforce Java 2 Security option 8. From the Active User Registry drop-down list select LDAP as the activeuser registry. 9. Click Apply; this will validate the settings. 10. Save the configuration for WebSphere, and then restart the server. How do u configure LTPA Global Security > Authentication mechanism > LTPA > provide the passwordand Apply How do u configure SSO Global Security > Authentication mechanism > LTPA > SSO > checkEnabled option What is the limitation of SSO It is applicable only to a single domain. It cannot span multipledomains. Example: mail.google.com (every resource under google.com can beaccessed) but outside of that domain SSO cannot be applied. How do you make SSO work across multiple cells The LTPA token keys must be exported to the target cell and the LTPAtoken key from the target cell must be imported into the current cell. Does WAS support multiple LDAPs? Yes, from 6.0 version onwards28. What is SSL Secure Socket Layer is the technology to establish securecommunication along with data integrity and encryption over the network or betweenthe nodes (machines)29. Did you ever work with certificates Yes,30. What is the utility that comes with WAS / IHS to manage certificates ikeyman.sh31. What is the defualt key store location for WAS
<profile_home>/etc32. How do you change the port number for admin console Logging into the admin console http://<hostname>:<admin_port>/admin ex: http://localhost:9060/admin Without logging into the admin consoleC:WebSphereprofilesdmgrconfigcellsdmgr_cellnodesdmgr_nodeserviceindex.xml (dmgr starts but cannot open the admin console because the port hasnt beenchanged in virtual host xml file) C:WebSphereprofilesdmgrconfigcellsdmgr_cellvirtualhosts.xml33. How do you disable security for Deployment manager without logginginto the console security.xml , enable=false34. If you have to change the ports of a jvm manually without logging intothe admin console which file would you edit. serverindex.xml35. Explain virtual hosts concept A virtual host is a configuration that enable a single host machine toresemble multiple host machine. What are the two virtual hosts that come with WAS installation admin_host, default_host36. What is the plugin configuration file and where is it located The plug-in configuration file (plugin-cfg.xml) contains routing information forall applications mapped from the web server to the application server. How do u regenerate the plugin config file The GenPluginCfg command is used to regenerate the plug-inconfiguration file. Depending on the operating platform, the command is: Linux and Unix: GenPluginCfg.sh Windows: GenPluginCfg.bat When do u regenerate the plugin config file The plug-in configuration file needs to be regenerated and propagatedto the Web servers when there are changes to your WebSphere configuration thataffect how requests are routed from the Web server to the application server. These changes include: _ Installing an application
_ Creating or changing a virtual host _ Creating a new server _ Modifying HTTP transport settings (i.e HTTP ports) _ Creating or altering a cluster When do you manually edit the plugin config file When enabling SSL (specifying the key file name), LoadBalanceWeight,and minimum number of connections. What is the information in a plugin config file Plugin config file contains routing information along with informationon virtual hosts , clusters (cluster members), and URIs. When the request comes to a webserver how does the webserver know the JVM that is capable of handling that request. The webserver first takes the request and if it cant serve, itforwards the request to the plugin config file . The plugin config file routes therequest to the appropriate application server (or cluster member or jvm)according to the mapping information it has. What is the refresh interval of plugin. 60 seconds If a change is made to the plugin config should the webserver be restarted? Not Required because the plugins automatic refresh interval is 60seconds.37. What webserver did you work on I have on on IBM HTTP and Apache web servers. What is the configuration file for IHS httpd.conf If changes are made to the config file should the webserver be restarted Yes. The webserver must to restarted so the changes made to the configfile become effective. What changes are made to this config file (automatically) during plugin installation on the webserver The plugins binary module file (.dll) path and the pluginsconfiguration file (plugin-cfg.xml) path will be copied to the httpd.conf fileautomatically.38. What is collector tool The collector tool gathers information about your WebSphere Application
Server installation and packages it in a Java archive (JAR) file that you can send toIBM Customer Support to assist in determining and analyzing your problem.Information in the JAR file includes logs, property files, configuration files, operatingsystem and Java data, and the presence and level of each software prerequisite.Collector tool can be run by only root or administrator. Syntax It must be invoked from a temporary work directory >C:IBMWebSphereAppServerbincollector.sh | bat Use It can be used to send it to the IBM Customer Support to assist indetermining and analyzing your problem. Output file The output will a .jar file. For example: node31-dmgr_cell-dmgr_node-dmgr-WASenv.jar39. When on a system there is an existing installation of webspherefederated to the DM. You make one more installation and federate this toanother/same DM. Will it work?? We can federate it to the same DM. This works. If it doesnt, how will you make it work40. What is the difference between horizontal/vertical clustering. Clustering is a mechanism which provides workload management (WLM) andfailover for applications that reside on the application server cluster. Horizontal clustering: For high availability and horizontal scalability. Vertical clustering: For high availability and vertical scalability.Disadvantage: Single point of failure. When would you use them For workload management (WLM) and failover requirements.41. When an application is deployed, where can the application binaries befound In the Applications folder when the application is deployed. Ex:C:IBMWebSphereprofilesdmgrconfigcellsdmgr_cellapplications42. Unix commands43. How do you create a JDBC resource To view this administrative console page, click Resources >JDBC Providers> New.
Step 1: Select the database type. Choose a supported database type. Step 2: Select the JDBC provider type. Choose a supported JDBC Providertype. Step 3: Select the implementation type. Choose a supported implementationtype. Step 4: Apply Step5: Now create the required Data Sources To view this administrative console page, click Resources > JDBCProviders > JDBC_provider > Data sources > New44. What is the difference between webserver handling in WAS 5 and 645. New features in WAS 646. What is the pre requisite for syncnode command The nodeagent on the node must be in a stopped state when thiscommand is executed.47. What are the logs in IHS access.log, error.log48. How do you change the log format in IHS In httpd.conf file change the following line to your required parameters----- LogFormat"%t %h %u %m"49. What are the configuration files in IPlanet web server magnus.conf, obj.conf50. What is TAI, and how do you enable it. TAI = Trust Association Interceptor. Trust association is used to connectreversed proxy servers to WebSphere Application Server. (or) Trust association enables the integration of IBM WebSphere ApplicationServer security and third-party security servers. Global Security > LTPA > TrustAssociation > Check Enable trust associationand Apply1) What is the recommended free disk space in /tmp to install WAS.1 GB2) What is the default installation location of WAS in Linux.Opt/IBM/WebSphere/AppServer
3) What is the default installation location of WAS in Sun Solaris.Opt/IBM/WebSphere/AppServer4) What is the default installation location of WAS in AIXUsr/IBM/WebSphere/AppServer5) List any 10 parameters in response file-W silentInstallLicenseAcceptance.value="true"-P wasProductBean.installLocation="C:IBMWebSphereAppServer"-OPT disableOSPrereqChecking="true"-OPT installType="installNew"-OPT createProfile="true"-OPT profileType="deploymentManager"-OPT PROF_enableAdminSecurity="true"-W nodehostandcellnamepanelInstallWizardBean.nodeName="krishna_node"-W nodehostandcellnamepanelInstallWizardBean.hostName="localhost"-W winservicepanelInstallWizardBean.winServiceQuery="true"-W winservicepanelInstallWizardBean.accountType="localsystem"-W winservicepanelInstallWizardBean.startupType="manual"6) Write the complete command to execute a response file.<was-setup>./install –options “<absolute path of response file>” – silent7) Which registry file will get updated after installation of WAS.vpd.properties8) What is the use of SOAP Connector port and what is the default soap port numberfor DMGR profile.Client Applications like wsadmin uses Simple Object Access Protocol andthat is listening to the port 8879. If we want federate a profile by usingSOAP protocol and SOAP connector port number, we can federate a profile.9) What is the default Http transport port number for Application Server profile andwhat is the use.9080, (if ssl was enabled 9443) If we want to invoke applications runningon AppServer we are using HTTP transport port10) What is the default Bootstrap port number in App.Serv profile and what is theuse.2809. To access the EJB’s, JNDI use bootstrap port to obtain initial contextroot.11) Installation was successful and when I am trying to start server it is giving“Invocation Target Exception” why you will get this issue and how you are troubleshooting this issue.May be the problem with hostnames, hostnames are mismatched. Add thehost name in etc/hosts file which you had given at the time of installation.
12) What are different profile templates in WAS 6.0?Dmgr, default and managed13) Write the complete command to create an App.Serv profile through commandline.C:IBMWebSphereAppServerbin>wasprofile.bat -create -profileNameAppSrv04 -profilePath "C:IBMWebSphereAppServerprofilesAppSrv04"-template Path "C:IBMWebSphereAppServerprofileTemplatesdefault"-nodeName app_node04 -cellName cell04 -hostName krishamurthy14) Write a complete command to delete a profile.C:IBMWebSphereAppServerprofilesAppSrv01bin>wasprofile.bat-delete -profileName AppSrv0115) If you get a problem before creating a log’s directory at the time of installation,at that time where you can check the status of installation tmp/log.txt16) What is the difference between managed node and unmanaged nodeManged Node contains node agent, we can administer federated profilesservers and applications from dmgr admin console. For unmanaged the willbe no nodeagent.17) What is the impact for the federated profile servers, if DMGR is down.No impact on servers and applications18) In which xml file, we can change the port numbers.Serverindex.xml19) What is a server.Server provides a runtime environment for your web app’s Or Enterpriseapplications.Server receives user request, process that request and execute that requestand response will be generated to the end users.20) If we stop the nodeagent, what will be the impact for end users.There is no impact for end users21) How to take backup with out stopping servers../backupConfig.sh –nostop22) What are the different user registries under global security in 6.0 and 6.1.Local OS, Custom, LDAP. Federated repository was added in 6.123) What is the necessity of global security?To provide security for the admin console.
24) What is the port number for LDAP server with SSL and without SSL?389 and 63625) How to disable Global Security./wsadmin.sh -conntype NONESecurityoff exit26) How to know how many profiles are available./AppServer/bin>./wasprofile.sh –listProfiles27) What are the advantages and disadvantages of Local OS,Custom and LDAP userregistries?Global Security: In 6.0 we have 3 ways to provide security for adminconsole. 1) Local os user registry. 2) Custom user registry. 3) LDAP (Light Weight Directory Access Protocol) user registry.a) Custom user registry: Here we have to create two files named: Users. Registry Groups. RegistryWe can create this file any where but we have to configure this absolute path to theapplication servers.b) LDAP: It is a mechanism & not a server. Here we are integrating seperatedirectory servers. if SSL is enabled the port number is 636, if it is not enabled 389. -> In local os user registry we have to create user accounts and that useraccounts have to configure to websphere application servers. where as in the custom user registry specifying user names and passwords ina normal file and we are specifying the absolute path of that file into the websphereapplication server. whenever we are going for LDAP user registry we have to specifyuser id & password & type of directory server, port number (default is 389), if SSL isenabled we have to specify port number as 636 and we have to specify Basedistinguished name which indicates authentication for users and we have to specifyBind distinguished name and Bind password which specify authorization for user andwe have to select "Advanced Light Weight Directory Access Protocol user registrysettings" there we have to specify user filter classes and group filter classes(automatically it will be there) and finally we have to restart the server.28)What is the full form of JDBC.JDBC (java Database Connectivity) is an API (Applicationprogram Interfaces), that isuseful to write a java program to connect any database, and retrieve the data formthe database and utilize the data in the java program.Making a connection to a databaseCreating SQL or MySQL statementsExecuting that SQL or MySQL queries in the databaseViewing & Modifying the resulting records
We have 2 types of JDBC drivers in was. Those are Type2(Thick) andType4(Thin/Native Protocol) jdbc drivers.Type2 JDBC drivers require the databaseclient software on the client node to connect to the database server.Type4 JDBCdrivers connect directly to the database server.29) What is the full form of JAR and what a jar file contains?An EJB module which contains enterprise java beans class files and EJBdeployment descriptors are packed as JAR files with .jar extension.30)Write the name of the jar file necessary to configure Oracle 9i & Oracle 10gDatabase.In oracle 10g & 9i We have only one jar file i.e OJDBC14.JAR (for log) & Class12.jar(for 9i) and In DB2 we have 3 or more jar files. i.eDB2JCC.JAR,DB2JCC_LICENSE_C4.JAR, DB2JCC_LICENCE_CIS42.JAR.-> The .jar file is nothing but a collection of .class files. It is necessary tocommunicate with the database. So we should configure this jar files with database.31) What is a connection pool?Connection pooling is a place where a set of connections are kept and are used bythe different programmers with out creating connections to the database(it meansthere is a ready made connection available for the programmers where he can use).After using the connection he can send back that connection to the connection pool.Number of connections in connection pool may vary.32) What is meant by Federation33) What are the different types of console roles available and explain about eachrole?34) what is your goal and role in was?Goal -a. Goal is to provide infrastructure for the demandsb. goal is to provide stable environmentc. goal is to provide high availabilityd. goal is to provide scalabilitye. goal is to provide 0 downtimeRole-a. involve in infrastructure architecting a.k.a designb. involve in implementing architecturesc. involve in solving infrastructure issuesd. involve in solving application environment issuese. involve in solving issues which become hurdles in providing high availabilityf. involve in solving issues which become hurdles in scaling35) what is incident management?Incident = Issue. Hurdle. Risk. Downtime. Security Breach.Incident Management = Risk Plan. Potential incidents management.36) Do you know how to configure ticketing tool with WAS?
This is a meaningless question. You need more information to address this question.Ticketing System - is it part of IBM? Does it fall in Web Sphere Umbrella? Is it anapplication running on WAS? Is it a Web based app? or Java Client?Unless you know these, it’s a blind question.37) when you configure LDAP with application server, if the users are unable toconnect to WAS. How do you trouble shoot this scenario?You don’t trouble shoot, you *troubleshoot*The issue is - U have LDAP, running on Server x. Server y, WAS bind to server x.if a problem occurs, u need to dig like this -A) Ldap up or notB) If yes, can server y reach server x [simple ping or telnet on ldap port]C) If yes - Ur infrastructure is clearD) Any firewall between server y and server x. talk to firewall team, ask them toenable trace between server y and x. any droppage of packets?E. if everything is clean, talk to ldap admin, enable trace on that specific group whoare getting auth errors.F) Look into systemout.log, find out what exactly the error message you get.G) U have to login to admin console and verify the authentication. u can *test* ldapauth from console. Feb 7 (2 days ago) Raju38) What is the difference between Signed Certificate and Self-signed certificate?Which one you prefer?http://webdesign.about.com/od/ssl/a/signed_v_selfsi.htm39) In Windows 2003 box, an application server process is not responding. How doyou trouble shoot this issue. Even when you are unable to kill the process.*trouble shoot* - On any server, app server freeze - may because of resourcecrunch, or process failing to release a resource, jvm could not complete a specificthread, blablabla.a. do u have enuf rights to kill the process?b. check the processor utilization thru task managerc. kill -3, if not responding, try again, again and againd. verfiy the disk space.e. verify error log and out log.Blabla40) how many types of scripting you have done or you know?such questions cannot be asked in a forum, or its difficult to answer. if i were you, iwud say, perl scripting, php, python, jython, tcl, jacl, ant, shell, blabla. Feb 7 (2days ago)41) when you are on call support when you got a severity 1 ticket, how do you takeaction. Explain in detail.Open the ticket, read the message what the problem is about.login to targeted server(s), check logs, depending on error, propagate first hand infoto stakeholders. sit on the issue, fix it, close it.
42) What is a fix pack, refresh pack and when you will go for fix pack installation andwhen you will go for refresh pack installation?fix pack fixes certain issues.refresh pack is a mile stone for a release.a refresh pack takes you to a release, say22.214.171.124 is a release. if you apply rp2, it becomes a release 6.0.2. if you apply fp35, itbecomes 126.96.36.199, which is not a release. Feb 7 (2 days ago) Raju43) when you find in a particular server cpu starvation error message what you willdo?whenever there is not enough physical memory available to allow the highavailability manager threads to have consistent runtimes. When the CPU is spendingthe majority of its time trying to load swapped-out processes while processingincoming work, thread starvation might occur.Goto InfoCenter, search for starvation.To achieve good performance and avoid receiving these error messages, it isrecommended that you allocate at least 512 MB of RAM for each Java processrunning on a single machine.High CPU usage in a large cell configuration when security is enabledWith certain configurations and states, the amount of time spent in discoverybecomes substantial.If a large the number of processes are defined within a core group, a proportionallylarge number of connections must be established to support these processes.If a large number of inactive processes are defined within a core group, aproportionally large number of connections are attempted during each discoveryinterval.If global security is enabled, the DCS connections are secured, and the impact ofopening a connection greatly increases .To decrease the CPU time spent in discovery:In the administrative console, click Servers > Core groups > Core groups settings ,and then select the -> DefaultCoreGroup.Under Additional Properties, click Custom properties > New.Enter IBM_CS_UNICAST_DISCOVERY_INTERVAL_SECS in the Name field and 120 inthe Value field.Click OK.Then click New again and enter IBM_CS_SS_SECURE_TOKEN in the Name fieldandfalse in the Value field.Click OK and then Save to apply these changes to the master configuration.Restart the server for these changes to take effect.Transient high availability heartbeat failures und11.If we said to analyze thread dumps can you do?Ya!! Why not44) How comfortable with scripting?
100% pakka comfortable45) Did you worked with JACL or Jython scripts?I prefer one scripting style. Why wud I use two scripting styles? At a given point oftime, scripting interface accepts only one language.46) When you found hung thread error messages what you will do? Will you kill theprocess. If yes, in which case you have to kill the process?Lucky you and lucky me, we have IBMs InfoCenter. Is it not easy to perform asimple search on InfoCenter like this *hung thread*?http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.multiplatform.doc/info/ae/ae/ttrb_confighangdet.htmlConfiguring the hang detection policyThe hang detection option for WebSphere Application Server is turned on by default.You can configure a hang detection policy to accommodate your applications andenvironment so that potential hangs can be reported, providing earlier detection offailing servers. When a hung thread is detected, WebSphere Application Servernotifies you so that you can troubleshoot the problem.Add the following properties:Name: com.ibm.websphere.threadmonitor.intervalValue: The frequency (in seconds)Default: 180 seconds (three minutes).Name: com.ibm.websphere.threadmonitor.thresholdValue: The length of time (in seconds).Default: The default value is 600 seconds (ten minutes).Name: com.ibm.websphere.threadmonitor.false.alarm.thresholdValue: The number of times (T) that false alarms can occur before automaticallyincreasing the threshold. Feb 7 (2 days ago) Raju47) Explain about your enivronment, servers, webservers, etc.,Think about ur company and thier business. Cook a story. Serve it on the table withsome masala, salt and pepper.48) What is a document server and what is the use of it.this is the funniest question one can ask.what is a document server? in general a document server is a repository ofdocuments in an enterprise.what is the use of it? its the central repository and depending access polices agencywide authorized and authenticated *users* can access documents.ex.,u have prepared a document on ur environment. u need a place to put thatdocument so that ur team can access it, ur manager can access it. above that,another team who wants to read that document can access that, above that, someinfrastructure team can access it, above that datacom people can access it and soon.what is the best place to put it?on ur desk top? or attach to mail? or dump it in a shared location.
if its a shared location, what that could be? will you dump it in a zunkyard sharedlocation or in a proper shared location? first | < previous | next > | last report spam reply49) TYPES OF SEVERIATIES?Severities will be of different types like Severity 1, 2, 3, 4, 5. Depending upon the type of issue it will be classified.50) WHAT TYPE OF ISSUES CONTAIN SEVERIATY1 TICKETS?Severity 1 tickets are the most rare tickets which will get and which we have to get in our administration.If our process is not running smooth, that means your application not responding, application server is not responding or entire environment falls then we will get severity 1 ticket.51.WHAT IS THE DIFF B/W COREDUMP & THREAD DUMP?there is not much difference between these two. In thread dump we can find, what are the active threads that are there at thatparticular time. Where as core dump contains information about dead locks, hang threads also52.WHEN THE SERVER HUNG HOW WILL IDENTIFY IN SYSOUT.LOG?Its very simple in systemout.log we will find a particular thread is hung from thismany milli seconds will be found. The thread name will be WSVR****53. HOW TO TAKE BACKUP THE APPLICATION?Taking backup of the application can be done by using export optionin the admin console or directly from the directory location.54. WHATS THE RELATION B/W WIILY INTROSCOPE & WAS(LIKEAGENT/AGENTLESS)?Wily introscope is a third party tool which is used to monitor the serverenvironments, not only WAS anything.55) Difference between Websphere 5.1, 6.1 and 7.0ProfilesWebSphere 5.1:No Concepts of profile ,there are 4 types of Installation-Express,Base ,Network Deployment and Enterprise.Websphere 6.1:Cell Profile,Deployment Manager profile,Application Serverprofile,Custom ProfileWebsphere 7.0 Cell(DeploymentManager and managednode),Management,Application Server,Custom profile,Secure Proxy.Note:Under Management there are three types of profiles available :AdministrativeagentDeployment Manager
Job ManagerNote:The Main use of Job Manager is to queue jobs to application server in a flexiblemanagement environmentManaging ProfilesWebSphere 5.1 :Websphere multiple installation instance can be created usingwsinstance scriptWebSphere 6.1:There are two ways of managing a profile1.Profile Management Tool(GUI)2.Manage profiles(Command interface for managing profiles )WebSphere 7.0: same as 6.1Security RolesWAS 5.1:Administrator,operator,configuratorWAS 6.1:Administrator,operator,configurator,Deployer,Admin Security Manager,ISCAdminWAS 7.0:Administrator,operator,configurator,Deployer,Admin Security Manager,ISCAdmin,AuditorWebServers supportedWAS 5.1:Apache HttpServer,Domino Server,IHS,Microsoft IIS,Sun Java System WebServer,HTTP Server for iseriesWAS 6.1:Apache HttpServer,Domino Server,IHS,Microsoft IIS,Sun Java System WebServerWAS 7.0:HTTPServer for Z/Os and all web servers supported in 6.1User Registries/RepositriesWAS 5.1:Local Operating System,Standalone LDAP registry,Standalone CustomregistryWAS 6.1:Federated repositories,Local Operating System,Standalone LDAPregistry,Standalone Custom registry or file based registryWAS 7.0:Same as 6.1lOGGING AND TRACINGWAS 5.1Diagnostic traceJVM logsProcess logsIBM Service logsWAS 6.1Apart from the logs available in 5.1 there is a Change log detail levels which willenable the Message level and trace level of the JVMWAS 7.0Same as V 6.1Managing WebServers
WAS 5.1:Web Servers cannot be managed through Websphere Admin ConsoleWAS 6.1:WebServers can be Administered using the Websphere Admin Console(Stopping, Starting, Generation and propagation of Plug-in can be done). WebServers can be created in Managed node or in Unmanaged nodeWAS 7.0 same AS V 6.1JMSWAS 5.1:JMS Fail Over Support and scalability is not availableWAS 6.1:JMS Fail over support and scalability is available.SIB(Service IntegrationBus Concept is being introduced)WAS 7.0:Same as V 6.1MonitoringWAS 5.1:N/AWAS 6.1:TPF(Tivoli Performance Viewer) is embedded in the Websphere AdminConsole for monitoring WebSphere ObjectsWAS 7.0same as V 6.1Intelligent Run Time provisioningWAS 5.1N/AWAS 6.1N/AWAS 7.0Intelligent run time provisioning is a new concept introduced in V7.0 At runtime the server uses the activation plan to start only those components that arerequired inside the application serverComponents like Web Container , EJB Container , Web Service and SIP Container aredynamically activatedSIP and Portlet ContainerWAS 5.1:N/AWAS 6.1SIP(Session Initiation Protocol) extends the application server to allow torun SIP applications written to JSR 116 SpecificationThe Portlet applications can deployed which is compliant with JSR 168WAS 7.0same as V 6.1wsadmin scriptsWAS 5.1:JACL is the scripting language which is usedWAS 6.1:JACL will be deprecated from 6.1 and Jython scripting will be used.WAS 7.0:Same as V 6.1Posted by TechnoTips at 4:18 AM 0 commentsReactions:Thursday, September 25, 2008create Heapdump using wsadmin//Refrence of JVM
objectName=AdminControl.queryNames(type=JVM,process=WebSphere_Portal,*)wsadmin>print objectNameWebSphere:name=JVM,process=WebSphere_Portal,platform=dynamicproxy,node=ahdp2csmwas78,j2eeType=JVM,J2EEServer=WebSphere_Portal,version=188.8.131.52,type=JVM,mbeanIdentifier=JVM,cell=wpcell//genrate heapdumpwsadmin>AdminControl.invoke(objectName, "generateHeapDump")Posted by TechnoTips at 4:24 AM 0 commentsReactions:1)What is 5 Tier Architecture?in J2E we can write 5 tier archi like1. Client Tier- Browser, Applet, Client Applications2. Presentation Tier- Servlets, JSP3. Business Tier- EJB or Some Business Objects4. Integration Tier- JDBC5. Backend Tier- Databases, JMS2)we know that 3 tier have1.UI(User interface) or (presentation) logic2.BL (Business)3.DL (Database)2)Tell me about the Architecture of Web Application (how it will happen WorkloadManagement & clustring)when ther request coming from the browser the webserver will handled that reuest ,It will handled over to the plug-in, then the plug-in will looks in to the plug-in cfg.xmlfile forthe reuested url and It will redirect the request to the avaliability of the servers inthe cluster.The plug-in mainly perform the work load management.If any server is processingany request then the plug-in will route the request to the avaliability of the serversbased on their weight and based on the algorithams.3)what are the main point while installing an IHS?The main use of installing any external web server is to proces the dynamic contentrequest4)what the file path of httpd.conf?/opt/IBM HTTPSERVER/conf/httpd.conf
windowc:programfilesIBM HTTP SERVERconfhttpd.conf5)What are Java Programming languages?Servlets,jsp,ENB,Struts,JSF,HIbernate6)What is Object pool?How to take back up ? while taking back is it necessary to stop the server?execute backupConfig.sh command to take the backup ,yes it is required to stop theservers,by default when you execute this command it will stop all the servers on the node soyhe partiallysynchronized information will not be saved .what are the Deployment ways ? steps ?1.Hot fix2.wsadmin3.AdminConsole4.Using third party tolls like ,Teamsite ,Cruise Control, MKS etc.1)what is thin driver and thick driver.why it is cal...thick driver - type 1 and type 2 JDBC drivers are called thick drivers. The reason forit is - it provides JDBC access via ODBCdrivers. ODBC binary code and in many cases database client code must be loadedon each client machine that uses such a driver.and as the program is connected to database by an extra layer in the clint hencethay are called thick drivers.Thin drivers: This style of driver converts JDBC calls into the network protocol useddirectly by DBMSs allowing a direct callfrom the client machine to the DBMS server and providing a practical solution forintranet access. hence their conenction to DBis more direct and without any intermediate stage making them thin drivers. type 4driver. Basic difference between thin and thick clientOracle has a thin client driver which mean you can connect to a oracle databasewithout the Oracle client installed on your machine.Thick client would need the Oracle Client database drivers etc.. Drivers include JDBC-ODBC bridge drivers JDBC drivers depending on tns resolution.Dominic thin driver is 4 type driver in java which r provide the connectivity betweenoracle and java.the main advantage is this driver is we connect the databse to javawithout create DSN.and it provide the all the host computer connectivity in thenetwork.so its r most important driver which we use in the java.2)What is Connection Pooling
Connection pooling is a place where a set of connections are kept and areused by the different programers with out creating conncections to the database(itmeans there is a ready made connection available for the programmers where hecan use). After using the connection he can send back that connection to theconnection pool. Number of connections in connection pool may vary.1)How many JDBC drivers are there ?A) 2B) 4C) 3D) 12)Which of the following is false for the Type 1 JDBC bridge driver?A) A Type 1 driver is a JDBC-ODBC bridge driverB) This type of driver enables a client to connect to an ODBC database via Java callsand JDBCC) Both the database and middle tier need to be Java compliant.D) ODBC binary code must be installed on each client machine that uses this driver.Explanation: Neither the database nor the middle tier needs to be java compliant.3)Which of the following statement is true for the Type 2 JDBC driver?A) A Type 2 driver converts JDBC calls into calls for a specific database.B) This driver is referred to as a "native-API, partly Java driver."C) As with the Type 1 driver, some binary code may be required on the clientmachine, which means this type of driver is not suitable for downloading over anetwork to a client.D) All of the above4)What is the difference between EAR, JAR and WAR fileAnswered by Jey on 2005-05-08 11:23:41: In J2EE application modules arepackaged as EAR, JAR and WAR based on their functionalityJAR:EJB modules which contains enterprise java beans class files and EJB deploymentdescriptor are packed as JAR files with .jar extenstionWARWeb modules which contains Servlet class files,JSP FIles,supporting files, GIF andHTML files are packaged as JAR file with .war( web achive) extensionEARAll above files(.jar and .war) are packaged as JAR file with .ear ( enterprise archive)extension and deployed into Application Server.5)Full form of java jar file?In: JAVA Programming [Edit categories]JAR = Java ARchive6)Re: URL of Oracle thin driver.Topic: JDBCLuigi Viggiano PREMIUM, Jun 4, 2001 [replies:1]briefly: jdbc:oracle:thin:@hostname:port:oracle-sid
1. in green the Oracle sub-protocol (can be oracle:oci7:@, oracle:oci8:@,racle:thin:@, etc...) is related on the driver you are unsign and the protocol tocommunicate with server. 2. in red the network machine name, or its ip address, to locate the server whereoracle is running. 3. in blue the port (it is complementary to the address to select the specific oracleservice) 4. in magenta the sid, select on wich database you want to connect.1) Find Java Archive files using an Eclipse plug-injmalasko writes "Discover JAR Class Finder, a plug-in utility with improved compatibility for RationalApplication Developer,WebSphere Integration Developer, and Eclipse. This plug-in finds JAR files containing a given class for the Java build path and helpsfix NoClassDefFound exceptions.1) Explain about web sphere?The word web sphere popularly refers to IBM middleware technology products. Websphere is known for its turn key operation in e business applications. It has run timecomponents and tools which can help in creating applications which run on WAS.WAS refers to web sphere application server.2) Explain about web sphere commerce?IBM web sphere commerce has a single platform which offers complete ecommercesolutions to developers. It can be very productive if you are planning to do businesswith consumers, business and indirectly through channel partners. This can be usedto perform business with consumers, business and channel partners altogether.3) Detail about the architecture of web sphere?Web Sphere is built on three main components they are• Database• J2EE application server• A web serverThe databases which it supports are• DB2• Oracle• CloudscapeApplication server is IBMWAS and the supported web servers are• IBM server• Microsoft IIS• Sun web server4) State some of the features present in web sphere?Some of the features which are present in web sphere are: -• Order management
• Web sphere commerce accelerator• Analytical and business intelligence• Open standards such as Java, EJB, etc• Web sphere commerce payments and customer care, etc5) Explain about IBM Web Sphere edge server?Web sphere edge server is used to improve the performance of web based systems.It can be used as forward or proxy server. Basically four components are present inthe web sphere they are Network dispatcher, Caching proxy, Content distribution andapplication service at the edge.6) Explain about extended deployment?Web sphere application server extended deployment increases the functionality ofthe server in two main areas they are manageability and performance. Dynamicvirtualization between servers is possible with the help of XD. A stand alonedistributed cache was added to it under the performance header, it is known asObject Grid.7) Explain about the security features present in WAS?Security model for web sphere is primarily based on JAVA EE security model. It alsodepends upon the operating system. User authentication and authorizationmechanisms are also provided in WAS. Light weight third party authenticationmechanism is the main security feature present in WAS.8) Explain about asymmetric clustering?Asymmetric clustering applications are primarily used in electronic trading systemsemployed in banks. Some of the features are, partitions can be declared during runtime and are usually run on a single cluster at a time. Work specific to a particularcan be routed to that cluster.9) Explain the various Administrator benefits using Web sphere?Web sphere almost reduces the work of server administrator as he can manage loadon servers efficiently without any hassles. It also gives him flexibility to divide theload and applications among different server farms. He can also predict about theincoming load on servers. Email alerts, restart options, memory leak detection, etc.10) Explain about caching proxy of IBM Web sphere Edge sphere?A caching proxy can be configured in forward direction or as a proxy. Contentrequested by the user is cached by edge before sending or adhering to the query.Page fragments arising from JSP or servlets are cached by Edge and the cachingprocess is slow. Performance and scalability of J2EE applications can be increased byedge.11) Explain about the network deployment feature present in WAS?Managing singletons will be a thing of the past and it also provides hot recovery ofsingletons which makes you forget about your GC collected singletons. Transactionlogs can stored on a shared file system. For clustering run time operations
deployment manager`s role was eliminated. J2EE failover support and cellconfiguration support is also present.12) Explain about IBM web sphere integration developer?Web sphere integration developer provides an IDE to build applications based onservice oriented architecture. Web sphere process server and web sphere ESB werebuilt with WID. WID was built with RAD Eclipse based technology.13) Explain about compute Grid?Compute grid is also known as Web sphere batch. Web sphere extended deploymentoffers a Java batch processing system called as Compute Grid. This forms anadditional feature to Web sphere network environment. Various features areprovided which help a developer to create, manage and execute batch jobs. Jobscheduler, xJCL, batch container and batch programming controller.14) Explain about web sphere MQ Real time transport?This feature is very useful in instant messaging across different clients throughintranet and internet. This supports high volume and high performance acrossdifferent clients. It uses the concept of light weight transport which is again based onIP rather than the queue process.15) Explain about Web sphere MQ JMS Provider?Web sphere MQ and Web Sphere Business integration manager Broker are veryuseful in providing Java messaging services to wide range of clients (publisher –subscribe, point to point). Java classes are chiefly responsible for translating the APIcalls to API`s defined by web sphere. It is very useful to have knowledge of Websphere MQ for proper configuration.16) Explain the attribute CHANNEL in web sphere MQ?CHANNEL specifies the name of the server connection channel. Generally this is WebSphere MQ network abstraction. The default standard used by CHANNEL is SVRCONNwhich is the server connection channel. This server is generally used to communicateto the queue manager by the client.17) Is the naming of connection factory independent of the name specified by JMSclient?Yes, the naming of connection factory is independent of the name specified by JMSclient. This is made possible by WAS (Web sphere application server) with itsresource references. It isolates the application from object names. This feature isimportant because it gives us the flexibility to change the administered objectwithout changing the JMS client code.Tell me your self1) Explain us in what way your education background will help you and theorganization?
When answering this question explain to him about your education background andsome extra courses you learnt during the process.You need to correlate your education background with the job opening. It would beadded advantage if you can explain to him about the necessary features of the job.2) Tell us something about yourself (One of the most common question asked)?Make sure that you tell about yourself in detail. Keep it small and simple explain tohim about all your interests, previous job, passion, hobbies, projects, etc. Just briefhim about all your interests and passion without going into detail, if asked state himabout it in detail.3) Why did you choose this specific course or stream of study when there are thesemany options available to you?When answering this question explain to him about why you choose this course orstream of study. What made you to choose this course, it would be an addedadvantage if you speak about the different projects you did. Also state or explainabout your goal and higher education pursuits.4) What will be the future of this industry?You need to explain the current trend of the industry and then explain to him aboutfuture developments. This is very important because it shows you that you are goinghand in hand on the developments of the industry.5) Explain specifically why we need to hire you?Explain to the interviewer about the necessary skills you have which were mentionedin the job requirement and also tell him about your team playing skills, soft skills, etcwhich can fetch you the job. If you have interest in pursuing higher studies then doexplain about that.6) Explain us about your previous project and its benefitsAs the question states you need to explain to him about your project and its benefits.Do remember a project is done by a team and it has features such as Environment,team members, technical descriptions, usage, etc. This is very important as he willmention to the technical HR about your project.7) What was the reason you left your previous job?While explaining this question you need to make sure that you don’t speak about thenegative features of your previous job which made you to leave the company insteadexplain about those negative features in a convincing manner and you can state thatthose reasons are hindering your growth.8) What is your goal and what do you like to achieve in the near future?Explain to him about the goal which you would like to pursue in the near future andhow the company can help you achieve that goal. Have a goal which is reasonableand achievable because it gives you a feeling of accomplishment.
9) What was your biggest job or project accomplishment?For this question you would be explaining to him about the most challenging projectyou undertook and the benefits you obtained by completing it within the deadline.This will explain to the interviewer about your necessary skills, management skillsand team play.10) Can you go to tours often?When answering this question have it in mind that your answer will be kept in therecord. If you cannot take tours due to various reasons state them in a pleasanttone. The answer which you give will be kept in the record. Also make it a habit totake small tours or travelling because every job demands that.11) What do you know about this organization?Before answering this question make sure that you do enough research about theorganization before applying to it. Also do remember that the interviewer knowsmuch more about this organization than you do. Try to have as much informationabout the job position also.12) Did you miss deadlines or target?Be honest when answering this question because your previous employer will haveeverything on record and your current employer may request for it. Explain tohim/her about the deadlines you have met during the process.1)How to identify unused indexes in DB2 for Linux, UNIX, and Windows database has gone into production, the existence of too many indexes turnsout to be a cause for decreased database performance. Many indexes mean. During database application development, developers tend to define a largenumber of indexes on tables to guarantee that each and every query performs well.After application development has been finished and a database has gone intoproduction, the existence of too many indexes turns out to be a cause for decreaseddatabase performance. Many indexes mean more work for the database system when executing UPDATE,INSERT, and DELETE (UID) operations. In addition, regular maintenance activitieslike RUNSTATS and REORG also run considerably longer in cases where manyindexes are present. Therefore, to achieve the best database performance, it iscritical to be able to determine which indexes are necessary for query execution andwhich indexes you can safely drop without impacting query runtimes. This articleexplains several methods that a DB2® for Linux®, UNIX®, and Windows® (DB2LUW) database administrator (DBA) can use to identify unused and seldom usedindexes.What is a JAR file?The JAR file format is based on the popular ZIP file format, and is used foraggregating many files into one. Unlike ZIP files, JAR files are used not only forarchiving and distribution, but also for deployment and encapsulation of libraries,components, and plug-ins, and are consumed directly by tools such as compilers and
JVMs. Special files contained in the JAR, such as manifests and deploymentdescriptors, instruct tools how a particular JAR is to be treated.A JAR file might be used:For distributing and using class librariesAs building blocks for applications and extensionsAs deployment units for components, applets, or plug-insFor packaging auxiliary resources associated with componentsThe JAR file format provides many benefits and features, many of which are notprovided with a traditional archive format such as ZIP or TAR. These include:Security. You can digitally sign the contents of a JAR file. Tools that recognize yoursignature can then optionally grant your software security privileges it wouldntotherwise have, and detect if the code has been tampered with.Decreased download time. If an applet is bundled in a JAR file, the applets class filesand associated resources can be downloaded by a browser in a single HTTPtransaction, instead of opening a new connection for each file.Compression. The JAR format allows you to compress your files for efficient storage.Transparent platform extension. The Java Extensions Framework provides a meansby which you can add functionality to the Java core platform, which uses the JAR filefor packaging of extensions. (Java 3D and JavaMail are examples of extensionsdeveloped by Sun.)Package sealing. Packages stored in JAR files can be optionally sealed to enforceversion consistency and security. Sealing a package means that all classes defined inthat package must be found in the same JAR file.Package versioning. A JAR file can hold data about the files it contains, such asvendor and version information.Portability. The mechanism for handling JAR files is a standard part of the Javaplatforms core API.Compressed and uncompressed JARsThe jar tool (see The jar tool for details) compresses files by default. UncompressedJAR files can generally be loaded more quickly than compressed JAR files, because
the need to decompress the files during loading is eliminated, but download timeover a network may be longer for uncompressed files.The META-INF directoryMost JAR files contain a META-INF directory, which is used to store package andextension configuration data, such as security and versioning information. Thefollowing files or directories in the META-INF directory are recognized and interpretedby the Java 2 platform for configuring applications, extensions, and class loaders:MANIFEST.MF. The manifest file defines the extension- and package-related data.INDEX.LIST. This file is generated by the new -i option of the jar tool and containslocation information for packages defined in an application or extension. It is part ofthe JarIndex implementation and used by class loaders to speed up the class loadingprocess.xxx.SF. This is the signature file for the JAR file. The placeholder xxx identifies thesigner.xxx.DSA. The signature block file associated with the signature file stores the publicsignature used to sign the JAR file.The jar toolTo perform basic tasks with JAR files, you use the Java Archive Tool (jar tool)provided as part of the Java Development Kit. You invoke the jar tool with the jarcommand. Table 1 shows some common applications:Table 1. Common usages of the jar toolFunction CommandCreating a JAR file from individual files jar cf jar-file input-file...Creating a JAR file from a directory jar cf jar-file dir-nameCreating an uncompressed JAR file jar cf0 jar-file dir-nameUpdating a JAR file jar uf jar-file input-file...Viewing the contents of a JAR file jar tf jar-fileExtracting the contents of a JAR file jar xf jar-fileExtracting specific files from a JAR file jar xf jar-file archived-file...Running an application packaged as an executable JAR file java -jar app.jar--------------------------------------------------------------------------------what is a connection pool?
Connection pooling is a technique used for sharing server resources amongrequesting clients. This article focuses on support for connection pooling of bothdatabase resources and non-database resources in a J2EE environment. Sivaexamines the JDBC 2.0, JMS 1.02, JNDI 1.2 Standard Extension APIs with regard toconnection pooling and looks at some existing vendor implementations of those APIs.He then looks at the upcoming J2EE Connector Architecture 1.0 that would support avendor-independent/pluggable approach to managing resource connections.1) How many JDBC drivers ?name them? Answer There are 4 JDBC drivers are available:*JDBC-ODBC Bridge Driver:-Popular name is Type-1 Driver.Inthis connection some native code or native database clientcode must be loaded on each client machine due to thisprocess it is slower than other drivers.It usesJDBC-Bridge-ODBC means between JDBC and ODBC one bridge iswork that establise the connection between application andDataBase... It is suitable for automatic installation anddownloading java technology application is not important.*Native API partly Java Driver:-Known as Type-2 Driver.Itenables driver converts JDBC calls into calls on the clientAPI for Oracle or any other databases.This driver need toload some binary code on client machine like JDBC-ODBCBridge Driver.*Network Protocol Driver:-Known as Type-3 Driver.*Jdbc net pure Java Driver:-Known as Type-4 Driver. The JDBC Driver provides vendor-specific implementations ofthe abstract classes provided by the JDBC API. This driveris used to connect to the database.there are:Type 1 : JDBC-ODBC Bridge DriverType 2: Native API Partly Java DriverType 3: Network protocol Driver-Type 4: JDBC Net pure Java Driver2) what is JDBC? AnswerJDBC(java Database Connectivity) is an API(Applicationprogram Interfaces), that is useful to write a java programto connect any database,and retrieve the data form thedatabase and utilize the data in the java program.1.Making a connection to a database2.Creating SQL or MySQL statements3.Executing that SQL or MySQL queries in the database4.Viewing & Modifying the resulting records3) How warnings are retrieved in JDBC? Answerwhile using jdbc, warnings can occur at any timewhile getting connection
while creating statementwhile getting resultset, at each , we can get usinggetWarnings() method.->Web Sphere relates to IBM Family.->We have different servers in market such as: JBOSS --} Web Logic -- }Application Servers Web Sphere --} Tomcat -- Partial Application Servers i.e not pure Web Server&Not pure Application Server.->JBoss is a open source software->The concepts of Web Logic & Web Sphere are same but only the terminology isdifferent.->In 6.0 Version we have 3 types of packages. 1) Express Package --} 2) Base Package --} Used for Stand alone Environment 3) Network Deployment -- Distributed Environment-> In java we have 3 parts. 1)J2SE (core java) 2)J2EE (servlets, jsps(web applications) ,Ejbs(enterprise java beans. 3)J2ME-> We will make the web application as .WAR (web Archieve)file.-> And we will make enterprise applications as .EAR file.-> For installation we have 2 modes: 1)GUI. 2)Silent Mode. Silent Mode there is a file called Response File this is what we have tocustomize.->ServerIndex.Xml file is used to find out the port number. Servers are listening to this port number, not application.-> Whenever we change port number and restart the server it will be updated inportdef, no need to change here again.Profile: A profile is nothing but an environment where we can create Servers. Thereare 3 types: 1) Application Profile. 2) Deployment Profile. 3) Custom Profile.-> The default profile is Application Server profile.-> The custom profile will give us an empty node.-> The soap connecter port number of deployment manager is 8879.-> Independantly a custom profile will have no use. We have to get connected withdmgr.
-> Before federation we have to check whether, .Dmgr is opening or not. .Dmgr is under running or not. In dmgr host we maintain dmgr just to monitoring and configuring theadministration.->In ND package we have 3 types of Templates: 1) Dmgr Template 2) Default Template 3) Managed Template. -> By default the dmgr profile wont give any servers. It is not at all a server,used just to configure. -> The AppServer gives server1 as default server. In application server wehave no option to create server. It is just a stand alone profile.Node: is a collection of servers. it reduces administration burden. It is a single pointof servers. If we start Node, n-number of servers will get started, if we stop all willbe stopped.Federation: In Dmgr01 we should have an eligible node to create servers but Dmgrnode is not eligible, at that time we can connect App-node which is eligibe to createservers from the appsrv01 Then we can create servers using App-Node in dmgr01. If we want to do federation we have to ping the Dmgr Server. Dmgr was introduced for single point of admin. In dmgr admin console, number of servers will be there under sameenvironment. We can create number of servers under dmgr console using Add-node.When ever we do federation a node agent will be created to communicate betweenAppserv & Dmgr.Node Agent: It will acts as a communication between which node we are federating.Cell Profile: is the combination of deployment profile and application profile. in both 6.0 & 6.1 the cell is available in deployment manager.Whenever we create cell profile automatically there will be deployment profile &application profile and federation also will be done automatically.The complete administration will be under the cell profile only.Global Security: In 6.0 we have 3 ways to provide security for admin console. 1) Local os user registry. 2) Custom user registry. 3) LDAP (Light Weight Directory Access Protocol) user registry.2) custom user registry: Here we have to create two files named: users.registry groups.registryWe can create this files any where but we have to configure this absolute path to theapplication servers.3)LDAP: It is a mechanism & not a server. Here we are integrating seperate directoryservers. if SSL is enabled the port number is 636, if it is not enabled 389. -> In local os user registry we have to create user accounts and that useraccounts have to configure to websphere application servers.
where as in the custom user registry specifying user names and passwords ina normal file and we are specifying the absolute path of that file into the websphereapplication server. whenever we are going for LDAP user registry we have to specifyuser id & password & type of directory server, port number (default is 389), if SSL isenabled we have to specify port number as 636 and we have to specify Basedistinguished name which indicates authentication for users and we have to specifyBind distinguished name and Bind password which specify authorization for user andwe have to select "Advanced Light Weight Directory Access Protocol user registrysettings" there we have to specify user filter classes and group filter classes(automatically it will be there) and finally we have to restart the server.->Web Sphere application server is a middleware component.-> In 3-Tier Architecture we have 3 levels. In level 1 (Tier-1) we have HTTP server (or web server) In Tier-2 we have Application server In Tier-3 we have Data base.Whenever we integrate database with application server every applications are ableto communicate with the database.->A database is a collection of data.-> A schema is a collection of Tables.-> In oracle 10g & 9i We have only one jar file i.e OJDBC14.JAR (for log) &Class12.jar (for 9i) and In DB2 we have 3 or more jar files. i.eDB2JCC.JAR,DB2JCC_LICENSE_C4.JAR, DB2JCC_LICENCE_CIS42.JAR.-> The .jar file is nothing but a collection of .class files. It is necessary tocommunicate with the database. So we should configure this jar files with database.JDBC: providers create connection between web application server & database serverfor communication.But data source provide communication for applications insideWAS with particular database inside the DB server.->We can say HTTP Servers as web servers also. The responsibility of http servers is to serve static content only. It will givequick response to static content than app servers. To communicate between http servers & app servers we have a conceptcalled "PLUG-INS".(it is a intermediatory component) By using round robin algorithm (default), here we have a concept routingtable, which is taken care by the http server. -> Plug-ins contain Plugin-cfg.xml contains complete information aboutapplication server environment i.e how many clusters are there, how may clusterenvironments are there, weight of cluster etc.Virtual Host: Here we will have wc-default host port number also. We can create orchange this ports by using Virtual hosts concepts. All applications and applicationservers has to listen to this ports. ->If we want to access an application under multiple domains, or by usingmultiple ports, (simply multiple domains,multiple ports). After following all the stepswe have to restart the server. ->multiple domain names can access the same application. ->All the applications will go through the http server only at the time oftrouble shooting we can by pass this http server for some purposes.