Hi some conceptual questions

hi all
i am new in this forum and a pl/sql developer and some knowledges of storage structure of oracle.Now i want to learn dba portion including backup etc..
my questions are--
1.what is nomount and mount state of a database.
2.what is rman why we use it though we can recover database through some scripts.
3.what is archivelog mode
4.cold backup and hot backup
5.how recovery is done when control file is lost ora database crashes
pls help me

Wow............
So simple Questions you asked
you are telling you are new to PL/dev and asking core Administration part.
If you want to know all these please go through admin/recovery books.
don't ask these Questions before self search and reading

Similar Messages

  • Some conceptual questions??

    1- what is the purpose of java interfaces ... Dont you think that with only abstract classes we can build an application. In that case we dont require interfaces
    2- what if java interfaces were not there, would a complex java application be possible ?
    3- Suppose there are no interfaces in java, which functionality in particular will be missing?
    4- why abstract classes? As we cannot instantiate abstract classes then what is the purpose behind all this..
    5- Is overloading a form of polymorphism? If yes, why? Because concept of polymorphism is, i believe, only possible in inheritance.

    Hi Ali,
    1- what is the purpose of java interfaces ... Dont you think that with only abstract classes we can build an application. In that case we dont require interfaces
    Interfaces in concept are contracts between tow entities, it means that one entity says to the other if you want to speak to me you must speak in this language. So the other entity will speak in that language and chooses what words to say based on the situation.
    In the Java world it means that one entitiy will require the other to implement the given interface so it will be sure that its contract (set of methods) will not be violated and the implementor entity is free in how to provide the implementation for these methods.
    4- why abstract classes? As we cannot instantiate abstract classes then what is the purpose behind all this
    Abstract classes are used for the same reason as Interfaces (it is a contract) but it has some more restriction, Meaning that it might provide concrete implementations for parts of that contract sothat the implementor (or in this case the extending class) can provide implementations only for the rest of the contract.
    Abstract classes can't replace interfaces, remember in java you have single-inhertance, so if you extended the abstract class you wasted your opportunity and you can't extend another one.
    5- Is overloading a form of polymorphism? If yes, why? Because concept of polymorphism is, i believe, only possible in inheritance.
    Yes, polymorphism means you have diffrent METHODS to perform the same FUNCTION.
    So assume you have a function named getPrice and you can return the price in USD or GBP, then you need to have 2 overloaded methods, one takes no-args and return USD and the other takes a string arg and returns price in given currency.
    Hope this will help you understand the concepts.
    Only by helping each other, we can grow

  • I have a Macbook Pro june 2011... I have 8GB ram but I only have 256mb VRAM... I've read some other questions about this and I realized... Why do I not have 560mb of VRAM since I have 8GB of RAM? Is there any way to get more VRAM to play games on steam?

    I have a Macbook Pro june 2011... I have 8GB ram but I only have 256mb VRAM...
    I've read some other questions about this and I realized... Why do I not have 560mb of VRAM since I have 8GB of RAM?
    Is there any way to get more VRAM to play games on steam?
    I've learned  by reading other topics that I can't upgrade my graphics card on my Macbook Pro because it's soldered into the motherboard or somthing like that, but please tell me if there is any way to get more video ram by chaning some setting or upgrading something else. I'd also like to know why I only have 256MB of VRAM when I have 8GB of RAM, since I have 8GB of RAM I thought I was supposed to have 560mb of VRAM...
    So the two questions are...
    Is there any way to upgrade my VRAM, so that I can play games on steam?
    Why do I only have 256MB VRAM when I have 8GB total RAM?
    Other Info:
    I have a quad core i7 Processor.
    My graphcics card is the AMD Radeon HD 6490M.
    I am also trying to play games on my BOOTCAMPed side of my mac, or my Windows 7 Professional side.
    THANK YOU SO MUCH IF YOU CAN REPLY,
    Dylan

    The only two items that a user can change on a MBP are the RAM and HDD (Retinas not included).  You have what the unit came with and the only way you will be able to change that is to purchase a MBP with superior graphics
    If you are very much into gaming, the I suggest A PC.  They are far superior for that type of application to a MBP.
    Ciao.

  • SGA Size for 8.1.7.4 32 bit? , some Interview Questions

    Hi buddies,
    I got some interview questions, might be simple for geeks in DBA. I am in need of answers. Could anyone help me.
    Thanks,
    Raaj
    1) Does windows NT support direct I/O?
    Answer: Choose one of the answers that apply
    A: No, only AIO
    B: Yes, depending on hardware.
    C: Yes.
    D: No.
    2) Can you take a coldbackup from solaris and use it on windows NT?
    Answer: Choose one of the answers that apply
    A: Yes.
    B: Yes if RMAN backup performed from NT server.
    C: Yes, after running RMAN convert.
    D: No.
    3) All of the following will alter the number of checkpoints that occur in one hour on the database, except one. Which is it?
    Answer: Choose one of the answers that apply
    A: Decreasing tablespace size
    B: Decreasing size of redo log members
    C: Setting LOG_CHECKPOINT_INTERVAL greater than the size of the redo log file
    D: Setting LOG_CHECKPOINT_TIMEOUT to zero
    4) The DBA is attempting to back up the Oracle database control file. After
    issuing the ALTER DATABASE BACKUP CONTROLFILE TO TRACE command, where can the DBA find the backup control file creation materials Oracle created for him or her ?
    Answer: Choose one of the answers that apply
    A: USER_DUMP_DEST
    B: LOG_ARCHIVE_DEST
    C: CORE_DUMP_DEST
    D: BACKGROUND_DUMP_DEST
    5) What is the most important action a DBA must perform after changing the database from NOARCHIVELOG TO ARCHIVELOG?
    Answer: Choose one of the answers that apply
    A: Shutdown normal and restart the database
    B: Perform a full logical database backup
    C: Perform a full offline database backup
    D: Manually switch the log files
    6) Which of the following choices lists an ALTER USER option that can be executed by the user herself or himself?
    Answer: Choose one of the answers that apply
    A: DEFAULT TABLESPACE
    B: IDENTIFIED BY
    C: TEMPORARY TABLESPACE
    D: PROFILE
    7) You need to view the initialization parameter settings for your Oracle
    database. Which of the following choices does not identify a method
    you can use to obtain values set for your initialization parameters?
    Answer: Choose one of the answers that apply
    A: Issue SELECT * FROM DBA_PARAMETERS; from SQL*Plus
    B: Issue SELECT * FROM V$PARAMETER; from SQL*Plus
    C: Issue SHOW PARAMETERS from Server Manager
    D: Use OEM Instance Manager
    8) As a result of a media failure, the current online redo log group is corrupted, the database crashes, as the current online group is inaccessible. Which type of incomplete recovery are you most likely to perform ?
    Answer: Choose one of the answers that apply
    A: Change-based
    B: Time-based
    C: Recovery using a backup control file
    D: Cancel-based
    9) User SNOW executes the following statement: SELECT * FROM EMP. This
    statement executes successfully, and SNOW can see the output. Table
    EMP is owned by user REED. What object would be required in order for
    this scenario to happen ?
    Answer: Choose one of the answers that apply
    A: User SNOW would need the role to view table EMP.
    B: User SNOW would need the privileges to view table EMP.
    C: User SNOW would need a synonym for table EMP.
    D: User SNOW would need the password for table EMP.
    10) Which one of the following statements is true?
    Answer: Choose one of the answers that apply
    A: The request queue is common, and the response queue is different for all the dispatchers.
    B: The request queue and response queue are different for all the dispatchers.
    C: The request queue is different, and response queue is common for all the dispatchers.
    D: The request queue and response queue are common for all the dispatchers.
    11) What is the largest SGA size for 8.1.7.4 32 bit?
    Answer: Choose one of the answers that apply
    A: approximately 2GB
    B: approximately 3.5GB
    C: approximately 4GB
    D: approximately 8GB
    E: approximately 16GB
    12) The DBA is about to perform some administrative tasks. Specifying the
    OPTIMAL parameter has which of the following appropriate uses?
    Answer: Choose one of the answers that apply
    A: Limiting concurrent users
    B: Limiting concurrent transactions
    C: Limiting growth of rollback segments
    D: Limiting growth of tables
    13) If the DBA wants to find information about how often transactions are
    wrapping transaction information between multiple rollback segment
    extents, where would the DBA look to find that information?
    Answer: Choose one of the answers that apply
    A: DBA_ROLLBACK_SEGS
    B: V$ROLLSTAT
    C: V$ROLLNAME
    D: DBA_SEGMENTS
    14) You have 30 rollback segments in your database, for which
    TRANSACTIONS_PER_ ROLLBACK_SEGMENT is set to 49 and
    TRANSACTIONS is set to 1000. During periods of heavy usage, about how many rollback segments will be actively used by Oracle?
    Answer: Choose one of the answers that apply
    A: 50
    B: 60
    C: 20
    D: 30
    15) The DBA has a table created with the following statement:
    CREATE TABLE EMPL
    (EMPID NUMBER(10),
    LASTNAME VARCHAR2(40),
    RESUME LONG RAW);
    The DBA attempts to issue the following statement:
    ALTER TABLE EMPL
    ADD ( PERF_APPRAISE LONG);
    What happens?
    Answer: Choose one of the answers that apply
    A: The statement succeeds.
    B: The statement succeeds, but column is added as VARCHAR2.
    C: The statement fails.
    D: The statement adds a disabled constraint.
    16) The primary key of the EMP table has three columns, EMPID, LASTNAME,
    and FIRSTNAME. You issue the following SELECT statement:
    SELECT * FROM EMP WHERE LASTNAME = 'HARRIS' AND FIRSTNAME = 'BILLI'
    AND EMPID = '5069493';
    Where would you look to see if this query will use the index associated
    with the primary key?
    Answer: Choose one of the answers that apply
    A: DBA_IND_COLUMNS
    B: DBA_TAB_COLUMNS
    C: DBA_INDEXES
    D: DBA_CLU_COLUMNS
    17) You are configuring your index to be stored in a tablespace. Which of the
    following storage parameters are not appropriate for indexes?
    Answer: Choose one of the answers that apply
    A: OPTIMAL
    B: INITIAL
    C: PCTINCREASE
    D: NEXT
    18) You need to set up auditing in an order entry and product shipment
    application so that when the ORDER_STATUS column in the ORDERS
    table changes to ‘SHIPPED’, a record is placed in a special table associated
    with a part of the application that gives sales representatives a daily list
    of customers to call on a follow-up to make sure the customer is satisfied
    with the order. Which of the following choices represents the best way
    to perform this auditing?
    Answer: Choose one of the answers that apply
    A: Statement auditing
    B: Object auditing
    C: Audit by access
    D: Value-based auditing
    19) Information in the buffer cache is saved back to disk in each of the
    following situations except one. In which situation does this not occur?
    Answer: Choose one of the answers that apply
    A: When a time-out occurs
    B: When a log switch occurs
    C: When the shared pool is flushed
    D: When a checkpoint occurs
    20) In order to allow remote administration of users and tablespaces on an Oracle database, which of the following types of files must exist in the database?
    Answer: Choose one of the answers that apply
    A: Password file
    B: Initialization file
    C: Datafile
    D: Control file
    E: Nothing, SYSDBA privileges are not required for these actions.
    21) You are planning the storage requirements for your database. Which of the following is an effect of maintaining a high PCTFREE for a table?
    Answer: Choose one of the answers that apply
    A: Oracle will manage filling data blocks with new records more actively.
    B: Oracle will manage filling data blocks with new records less actively.
    C: Oracle will leave more space free in data blocks for existing records.
    D: Oracle will leave less space free in data blocks for existing records.
    22) You manage database access privileges with roles where possible.
    You have granted the SELECT_MY_TABLE role to another role, called
    EMP_DEVELOPER. To view information about other roles that may be
    granted to EMP_DEVELOPER, which of the following dictionary views
    are appropriate?
    Answer: Choose one of the answers that apply
    A: DBA_ROLE_PRIVS
    B: DBA_TAB_PRIVS
    C: USER_SYS_PRIVS
    D: ROLE_ROLE_PRIVS
    23) In order to set your SQL*Plus session so that your NLS_DATE_FORMAT
    information is altered in a specific way every time you log into Oracle,
    what method would be used?
    Answer: Choose one of the answers that apply
    A: Setting preferences in the appropriate menu option
    B: Creating an appropriate LOGIN.SQL file
    C: Issuing the ALTER USER statement
    D: Issuing the ALTER TABLE statement
    24) You create a sequence with the following statement:
    CREATE SEQUENCE MY_SEQ
    START WITH 394
    INCREMENT BY 12
    NOMINVALUE
    NOMAXVALUE
    NOCACHE
    NOCYCLE;
    Two users have already issued SQL statements to obtain NEXTVAL, and
    four more have issued SQL statements to obtain CURRVAL. If you issue a
    SQL statement to obtain the NEXTVAL, what will Oracle return?
    Answer: Choose one of the answers that apply
    A: 406
    B: 418
    C: 430
    D: 442

    1.-
    2.c
    3.a
    4.a
    5.c
    6.b
    7.a
    8.d
    9.b
    10.a -
    11.a
    12.c
    13.b
    14.d
    15.c
    16.a -
    17.a
    18.d
    19.c
    20.a
    21. -
    22.d
    23.b
    24.?
    hope it helps u.
    Thanks
    Kuljeet

  • HT5312 So I have a problem with iTunes not letting me download anything without first responding to some security questions which I don't remember setting up, how can fix it? Oh, and it won't let me reset the questions either!

    So I have a problem with iTunes not letting me download anything without first responding to some security questions which I don't remember setting up, how can fix it? Oh, and it won't let me reset the questions either!

    If you mean that you aren't getting the reset link, then from the page that you posted from :
    Note: The option to send an email to reset your security questions and answers will not be available if a rescue email address is not provided. You will need to contact iTunes Store support in order to do so. 
    You can contact iTunes Support in your country via this page : http://support.apple.com/kb/HT5699
    When they've been reset you can then use the steps half-way down the HT5312 page that you posted from to add a rescue email address for potential future use

  • I have some problem when I want to download app in iTunes some security question ask me about my visa when I right my visa number I got an errors and on top of the page told me go to iTunes support I do these things and now what should I do

    I have some problem when I want to download app in iTunes some security question ask me about my visa when I right my visa number I got an errors and on top of the page told me go to iTunes support I do these things and now what should I do

    Most of the people on these forums, including myself, are fellow users - you're not talking to iTunes Support here.
    You can contact iTunes Support via this link : http://www.apple.com/support/itunes/contact/ - click on Contact iTunes Store Support on the right-hand side of the page, then Purchases, Billing & Redemption

  • I got a new ipad and went buy music on iTunes and in is telling me that this is a new device on this account and wants me to answer some security questions I dont remember setting thes up and dont know the answers how do i reset the security questions

    i got a new ipad and went buy music on iTunes and in is telling me that this is a new device on this account and wants me to answer some security questions I dont remember setting thes up and dont know the answers how do i reset the security questions

    Click here and search the article for '2 out of 3' without the quotes; this generally involves either a message being sent to your rescue email address or contacting the iTunes Store staff directly.
    (74313)

  • Some basic questions on File Adapter

    Hello all,
    I have some basic questions on XI and File Adapter and hope you can help me. Any answer is appreciated.
    1. Can I use NFS transport protocol to poll a file from a machine in the network, which is not the XI? Or do I have to use FTP instead?
    2. If I understand it correctly - when using the FTP-File Adapter, XI has the role of a ftp client. I have to run a ftp server on my distant machine. XI connects to FTP-Server and polls the file.
    Can it also be configured the other way round? The scenario I think of would be: FTP client installed on distant machine, which connects to FTP-Server(XI) and loads up a file. So XI would act as FTP Server.
    I know this works, if I install a ftp Server on the computer my XI runs on, and use the NFS-File Adapter to observe the folder. But I want to know, if I need a second, independant ftp server for this.
    3. And last but not least: When do I need the active ftp mode instead of passive?
    Thanx a lot for your answers!
    Ilona

    > Hello all,
    > I have some basic questions on XI and File Adapter
    > and hope you can help me. Any answer is appreciated.
    >
    >
    > 1. Can I use NFS transport protocol to poll a file
    > from a machine in the network, which is not the XI?
    <b>yes</b>
    > Or do I have to use FTP instead?
    >
    <b>also you can do it</b>
    > 2. If I understand it correctly - when using the
    > FTP-File Adapter, XI has the role of a ftp client. I
    > have to run a ftp server on my distant machine. XI
    > connects to FTP-Server and polls the file.
    > Can it also be configured the other way round? The
    > scenario I think of would be: FTP client installed on
    > distant machine, which connects to FTP-Server(XI) and
    > loads up a file. So XI would act as FTP Server.
    > I know this works, if I install a ftp Server on the
    > computer my XI runs on, and use the NFS-File Adapter
    > to observe the folder. But I want to know, if I need
    > a second, independant ftp server for this.
    >
    <b>XI cannot act as FTP server, but it is always a client. When XI is reading (File sender adpater) when XIis writing than it is File Receiver adapter</b>
    > 3. And last but not least: When do I need the active
    > ftp mode instead of passive?
    >
    <b>It depends on your firewall configuration. The best and the fastests is active mode but not always available.</b>
    > Thanx a lot for your answers!
    > Ilona

  • Some generic questions on BPM of NW CE

    Hi Gurus
      i have over 6 years of ABAP business workflow experience and over 3 years of XI experience. Now i'm getting tough with this new stuff, BPM of NW CE. Here i have some generic questions of it:
    1. How can i trigger a BPM task while a document, like a sales order , has been created in the system? is there any processes to catch the event of R3 in NWDI?
    2. Can BPM consume RFC/BAPIs in R3?
    3. Is it possible to make message mapping in BPM? i found there is a 'mapping' choice in the context setting of NWDI whereas it is quite simple compared with PI.
    4. Can the BPM be integrated with webdynpro ABAP? or send the relevant tasks into R3 directly? Actually what i mean is , can i bypass java programing while dealing with BPM of CE, if possible.
    thanks

    Hi Stephen,
    In the first released version of SAP NetWeaver BPM it is not possible to catch events of R/3 directly. Anyway. In case you have the possibility to trigger a web service in that situation you could start off a specific (BPM) process instance that handles the situation.
    The same is basically true for the question regarding RFC: In the initial version you'd need to wrap the RFC into a web service in order to consume it.
    The mapping possibilities in SAP NetWeaver BPM are meant to perform data flow between different activities in a BPMN based process model. This way you could transform a message that came into the process in that way that if fits your needs in regards to the BPM process (data) context.
    Bypassing Java when using SAP NetWeaver BPM would be difficult as the supported UI technology is Web Dynpro for Java. In addition the possibility to add more flexibility to your mappings by defining custom functions is based on EJB, thus again Java.
    Best regards,
    Martin

  • Some interview Question?

    hello all, as this forum has many brilliant minds, i have some interview question, if you mind please let me know the answer....
    q1. default level at which validation accurs?
    q2. in which case property pallet display **** as a property value, what its meaning?
    q3. best way to ensure that item can not accept query criteria?
    q4. what is the use of key-other trigger?
    q5. what is the use of forms module validation unit. if it is set to form then data block pre-text-item trigger at point will raise?
    i tried but did not find any relevant answer.

    Hi yash...
    q1. default level at which validation accurs?Well, the default level is where ur trigger exist ( Form Level ,Block Level or Item Level )
    q2. in which case property pallet display **** as a property value, what its meaning?Conceal ; it means hiding displaying data and it is almost used in password text item.
    q3. best way to ensure that item can not accept query criteria?Well, actually i don't have any forms now but u could try it urself item property > query criteria (any related query allowed property ) >NO
    q4. what is the use of key-other trigger?A Key-Others trigger fires when an operator presses the associated key.
    A Key-Others trigger is associated with all keys that can have key triggers associated with them but are not currently defined by function key triggers (at any level).
    A Key-Others trigger overrides the default behavior of a Runform function key (unless one of the restrictions apply). When this occurs, however, Oracle Forms still displays the function key's default entry in the Keys screen.
    Hope this helps...
    Good Luck :)
    Regards,
    Amatu Allah.

  • Some simple questions regarding the Xcode.

    I have some preliminary questions regarding the Xcode (objective C):
    What is the difference between the programming files followed by .h and .m?
    What does an asterisk * followed by a text mean (i.e. *window;)?
    Is there any source that briefly explains the most common codes with examples (nsstring, nsarray, iboutlet, inaction.....etc)?
    Any other tips will be highly appreciated.
    Many thanks.

    Xcode is the IDE.
    Objective-C is the most common language used within Xcode.
    UIWindow *window .....  the * means return the address of the instance variable 'window'.
    An * is called a pointer to a variable.
    Everything you need is explained here:  https://developer.apple.com

  • Some basic questions from a mac newbie

    hi,
    i have been using linux and windows all this while, and recently began using an apple too. have some simple questions here that i hope to get some answers for.
    1. is there something similar to /etc/hosts in linux where i can add the IP address of a server? this is for me to use the 'ssh' command in the terminal
    2. when i open up an application, say safari or chrome, i want the window to fill the entire screen automatically, instead of having to drag the bottom right of the window to fill the screen. how to configure that?
    3. when i close an application by clicking on the 'x' at the top left, why is it that it still appears in the list when i press command+tab? to remove the application from the list, i have to right click on its icon on the dock, then click 'quit'. this is rather troublesome.
    appreciate any help!

    1. is there something similar to /etc/hosts in linux where i can add the IP address of a server? this is for me to use the 'ssh' command in the terminal
    The /etc/hosts file is there, but the /etc/ folder is hidden. You can use the Terminal (in /Applications/Utilities/) to access it via Unix, or could enter "open /etc" in the Terminal to open that folder in the Finder.
    However, I'm not sure how this relates to ssh... I have not needed to modify that file, yet I can ssh all I need to. Are you trying to connect to your new Mac via ssh, or connect to other machines from the Mac via ssh?
    2. when i open up an application, say safari or chrome, i want the window to fill the entire screen automatically, instead of having to drag the bottom right of the window to fill the screen. how to configure that?
    Just drag the window out to full-screen and the browser should remember and open new windows at that size in the future. There are also some utilities (one called "Right Zoom" IIRC?) that will make the zoom button (green + button) behave more like the Windows zoom button.
    3. when i close an application by clicking on the 'x' at the top left, why is it that it still appears in the list when i press command+tab?
    Applications shouldn't quit just because you close their last window, unless the application's entire user interface is contained within that window. That is the case with ALL Windows apps, since there's no global menu bar, but only in some Mac apps. This is something that always ticked me off big-time with Windows... there have been times when I carelessly closed a window I didn't need anymore, but wanted to keep using the app, and then had to wait for it to load again. That won't happen on the Mac.
    If this bothers you, just use the key combination command-Q to quit apps.

  • I have some more question

    I have some more question.How can I create web.xml and check it.And
    how can check the URL patten.thanks

    write a simple Test servlet,compile it and place it in your WEB-INF\classes of your application context.configure this servlet class in your web.xml and access it thru your browser to test it all
    Regards
    padmanava

  • Some interview questions help

    Hi friends i have some interview questions please give me good answers.thanks for advance.
    1.what is info provider?what is advantages and disadvantages?
    2.when your working process chains you set up 2 jobs ,one is 12 pm and anothet 3 am.when you come morning there is errors what is the first thing you do?
    3.in the info provider data is loaded in serial or parallel?
    4.when your working in reports there is 8 columns,but we have requirement of 10 columns how you can added it?
    5.what is integrating planning in BPS?
    If possible please send me good interview questions to my mail id.
    takecare
    bye
    habeeb
    [email protected]

    Please think when you were at the beginer stage.Yes, I guess setting up a second machine under your desk and spending the next - oh I don't know - 2 months fiddling around and trying out all kinds of things is really nothing that can be asked of anyone anymore today. </sarcasm>
    Mind you, my boss at the time did not find it funny that I just formatted a surplus workstation and monopolized it, but when I then took the first official training I had a whole stack of questions at the ready with which to hassle the teacher.
    Now you tell me: which approach enables you to learn and understand more and better?
    @rnm1978: +1!

  • Some generic  questions about JMF

    Hi, as new to JMF, I would like to ask some generic questions about JMF from this community
    Though including RTP stack, JMF is only compatible to old RTP draft, RFC1889. I know that Sun stopped developing/supporting JMF. What is the alternative solution for JAVA RTP implementation suitable for a serious SERVER project, not just a school-term project? Has anyone thought about that or may have already moved forward? Is that any commercial or more updated Java based RTP stack currently? I searched with google. Besides jrtp, a school project, and I could not find a nice one. Majority of RTPstack implementation is C/C++.
    My second question is if there is the performance analysis and comparison of JMF. I know that some client applications such as SIP-Communicator adopt JMF for media delivery. But it is for one user in one machine. I wonder if any server application has adopt JMF as media relaying layer.
    I appreciate any input from this community.

    erwin2009 wrote:
    Hi, as new to JMF, I would like to ask some generic questions about JMF from this communitySure/
    Though including RTP stack, JMF is only compatible to old RTP draft, RFC1889. I know that Sun stopped developing/supporting JMF. What is the alternative solution for JAVA RTP implementation suitable for a serious SERVER project, not just a school-term project? Has anyone thought about that or may have already moved forward? Is that any commercial or more updated Java based RTP stack currently? I searched with google. Besides jrtp, a school project, and I could not find a nice one. Majority of RTPstack implementation is C/C++. There is one active project out there, Freedom for Media in Java, that has RTP capabilities. It's obviously not from Sun, but it's the only other RTP-capable project I am aware of, other than FOBS4Java, I believe is the name of it.
    What they are suitable for is beyond my scope of knowledge, I only know of the 2 projects.
    My second question is if there is the performance analysis and comparison of JMF. I know that some client applications such as SIP-Communicator adopt JMF for media delivery. But it is for one user in one machine. I wonder if any server application has adopt JMF as media relaying layer. None that I have seen, except for various projects I've helped people with on this forum. But, if someone is asking for help on a forum with his/her server application, it probably doesn't meet the guidelines you just laid out ;-)
    I appreciate any input from this community.Sorry I don't have more to add to your inquires...

Maybe you are looking for