Secure Real Time Transport Protocol

I am searching for an API to implement SRTP ( Secure Real Time Transport Protocol ) the new RFC 3711 with all its functions of encryption and authentication for a secure RTP session with java media framework.
Thank you.

Me too.. I'm looking for much the same SRTP API support. Have you found anything, such as, a developing open source project or commercial imp?

Similar Messages

  • OSB can support Real Time Messaging Protocol?

    Hi everyone:
    I have a question, OSB can support Real Time Messaging Protocol (RMTP) to transmit streaming of Audio and Video?
    Thanks in advance

    Knorrar,
    You can pass audio/video streams as binary data to OSB.
    Audio File / Binary / OSB
    Regards,
    Abhinav

  • Software protection with real time clock

    I'm trying get a secure real time clock information for licensing purposes ,I tried hardware dongle like hasp4 with RTC but I was not able not interface the dll and kept coming up with errors.Can anyone suggest a better of getting real time clock information or any available product which I can use.
    I even thought of using the system clock but it's doddle to reset the system time.
    Help is much appreciated.Thanks in advance
    Rajan

    One possibility might be to force the computer to access an external time server of your choice and check the time from there.
    This example shows how to read the time from a NTP server using LabVIEW.
    Attachments:
    TimeSync.ZIP ‏266 KB

  • How to avoid the transport request popup when changing real-time load behav

    Hello experts,
    I'm often switching between the two loading mode, and I already worked in systems where I don't have the popup for transport request : (so I guess there is a possible tuning anywhere)
    How to avoid the "asking for a transport request" popup in BW when changing real-time load behaviour of an infocube
    Thanks in advance, I will save precious time
    Guillaume P.

    Hello Krishnan,
    i tried to switch all object types from "not changeable" to "changeable original", but still get the popup when switching cube loading mode.
    Do you know the particular object type to manage ?
    Hello Vishnu,
    same thing, whatever the option is (switch on / off standard) I have the transport popup.
    Anyway thanks for your try.

  • BI 7 real-time cube load behavior changed after transport

    Dears,
      After I transported real-time cube from DEV to QA system, I found that all the real-time cube load behavior changed from 'can be loaded, planning not allowed' to 'can be planned, load not allowed'. What happened? Or I'm enpackaging this type cube with wrong step? Any suggestions are appreciated.
    Best regards,
    Gerald

    Hi,
    I think note 984803 can be usefull for you.
    The link is https://websmp207.sap-ag.de/~form/handler?_APP=01100107900000000342&_EVENT=REDIR&_NNUM=984803&_NLANG=E
    Rgs
    Antonino

  • Real-Time i-Cube load behavior changed after transport

    Dears
      After the transports compleleted, the Real-Time i-cube load behavior is changed. All the 'can be loaded,planning not allowed' were changed to 'can be planned, load not allowed'. What happened? How I enpackage this type R-T i-cube? Any suggestions are appreciated.
    Best regards,
    Gerald

    Hi Gerald,
    you can switch it back to the enable loadind of data, using the "Switch Transactional Infocube" option you get when you right click on the Infocube.

  • What are the different between Netflow protocols and Real Time Capture

    Hi Gurus,
    Let me know, if you have a link will be excelent, the different if we capture traffic in Real Time (using Spam Port) or export traffic by Netflow protocol.
    When I capture traffic and analysis it (using Wireashark or TCPDump) in Real Time I see in detail all data, but in Netflow I see statistic?
    Any other tip or link where could explian in detail, please?

    Capturing packets via a span port and inspecting with Wireshark or   any pcap analysis tools is looking at actual datagrams - the details are   much more indepth and detailed and you are not missing anything. You  see the actual IP conversations.
    NetFlow captures the  header information from each of the IP conversations  traversing your  networking device and allows for flow analysis tools to  decipher them  and display the results. With NetFlow, each IP  conversation is  represented in a flow with information about its source  and destination  IP Address, port numbers, protocol, ToS, etc. Now  remember, NetFlow is  not all sampled - It captures all the IP  conversation information.  There is also sampled NetFlow like Seb stated  in the previous reply,  but not all NetFlow is sampled. You can enable  sampling to capture 1 in  100 packets or 1 in x packets.
    A  simpler way to put it  is, consider a phone call. Packet capture is like  knowing who called  whom, how did they call, what did they use, when did  they call and also  get to know what did they talk about.
    NetFlow  is like your phone bill - you know who called  whom, when it happened,  how long they talked, etc., but you do not know  what did they talk  about.
    If you have a resource intensive network, capture NetFlow from all the nodes and do spanning from the most important interfaces.
    Regards,
    Don Thomas Jacob
    http://www.solarwinds.com/netflow-traffic-analyzer.aspx
    NOTE: Please rate and close questions if you found any of the answers helpful.

  • Any suggestions for free real time anti virus or malware security sw?

    I have been using Onyx and that seems to work fine, I wonder how you can tell without anything else to compare it to anyway.
    But lately I've been reading a lot about virusses (virae?) attacking Mac computers and I'm wondering if there is any free real time security software that is really working.
    If anyone has any recommendations I'd really appreciate it.
    Thank you in advance.
    Regards,
    Milli.

    No viruses that can attack OS X have so far been detected 'in the wild', i.e. in anything other than laboratory conditions.
    It is possible, however, to pass on a Windows virus to another Windows user, for example through an email attachment. To prevent this all you need is the free anti-virus utility ClamXav, which you can download from:
    http://www.clamxav.com/
    However, the appearance of Trojans and other malware that can possibly infect a Mac seems to be growing, but is a completely different issue to viruses.
    If you allow a Trojan to be installed, the user's DNS records can be modified, redirecting incoming internet traffic through the attacker's servers, where it can be hijacked and injected with malicious websites and pornographic advertisements. The trojan also installs a watchdog process that ensures the victim's (that's you!) DNS records stay modified on a minute-by-minute basis.
    You can read more about how, for example, the OSX/DNSChanger Trojan works here:
    http://www.f-secure.com/v-descs/trojanosxdnschanger.shtml
    SecureMac has introduced a free Trojan Detection Tool for Mac OS X. It's available here:
    http://macscan.securemac.com/
    The DNSChanger Removal Tool detects and removes spyware targeting Mac OS X and allows users to check to see if the trojan has been installed on their computer; if it has, the software helps to identify and remove the offending file. After a system reboot, the users' DNS records will be repaired.
    (Note that a 30 day trial version of MacScan can be downloaded free of charge from:
    http://macscan.securemac.com/buy/
    and this can perform a complete scan of your entire hard disk. After 30 days the cost is $29.99. The full version permits you to scan selected files and folders only, as well as the entire hard disk. It will detect (and delete if you ask it to) all 'tracker cookies' that switch you to web sites you did not want to go to.)
    A white paper has recently been published on the subject of Trojans by SubRosaSoft, available here:
    http://www.macforensicslab.com/ProductsAndServices/index.php?mainpage=document_general_info&cPath=11&productsid=174
    Also, beware of MacSweeper:
    MacSweeper is malware that misleads users by exaggerating reports about spyware, adware or viruses on their computer. It is the first known "rogue" application for the Mac OS X operating system. The software was discovered by F-Secure, a Finland based computer security software company on January 17, 2008
    http://en.wikipedia.org/wiki/MacSweeper
    On June 23, 2008 this news reached Mac users:
    http://www.theregister.co.uk/2008/06/23/mac_trojan/
    More information on Mac security can be found here:
    http://macscan.securemac.com/
    The MacScan application can be downloaded from here:
    http://macscan.securemac.com/buy/
    You can download a 30 day trail copy which enables you to do a full scan of your hard disk. After that it costs $29.95.
    More on Trojans on the Mac here:
    http://www.technewsworld.com/story/63574.html?welcome=1214487119
    This was published on July 25, 2008:
    Attack code that exploits flaws in the net's addressing system are starting to circulate online, say security experts.
    The code could be a boon to phishing gangs who redirect web users to fake bank sites and steal login details.
    In light of the news net firms are being urged to apply a fix for the loop-hole before attacks by hi-tech criminals become widespread.
    Net security groups say there is anecdotal evidence that small scale attacks are already happening.
    Further details here: http://news.bbc.co.uk/2/hi/technology/7525206.stm
    A further development was the Koobface malware that can be picked up from Facebook (already a notorious site for malware, like many other 'social networking' sites), as reported here on December 9, 2008:
    http://news.bbc.co.uk/newsbeat/hi/technology/newsid_7773000/7773340.stm
    You can keep up to date, particularly about malware present in some downloadable pirated software, at the Securemac site:
    http://www.securemac.com/
    There may be other ways of guarding against Trojans, viruses and general malware affecting the Mac, and alternatives will probably appear in the future. In the meantime the advice is: be careful where you go on the web and what you download!
    As to the current 'Conficker furore' affecting Intel-powered computers, MacWorld recently had this to say:
    http://www.macworld.co.uk/news/index.cfm?email&NewsID=25613
    Although any content that you download has the possibility of containing malicious software, practising a bit of care will generally keep you free from the consequences of anything like the DNSChanger trojan.
    1. Avoid going to suspect and untrusted Web sites, especially *********** sites.
    2. Check out what you are downloading. Mac OS X asks you for you administrator password to install applications for a reason! Only download media and applications from well-known and trusted Web sites. If you think you may have downloaded suspicious files, read the installer packages and make sure they are legit. If you cannot determine if the program you downloaded is infected, do a quick Internet search and see if any other users reported issues after installing a particular program.
    3. Use an antivirus program like ClamXav. If you are in the habit of downloading a lot of media and other files, it may be well worth your while to run those files through an AV application.
    4. Use Mac OS X's built-in Firewalls and other security features.
    5. Stop using LimeWire. LimeWire (and other peer-to-peer sharing applications) are hotbeds of potential software issues waiting to happen to your Mac. Everything from changing permissions to downloading trojans and other malicious software can be acquired from using these applications.
    6. Resist the temptation to download pirated software. After the release of iWork '09 earlier this year, a Trojan was discovered circulating in pirated copies of Apple's productivity suite of applications (as well as pirated copies of Adobe's Photoshop CS4). Security professionals now believe that the botnet (from iServices) has become active. Although the potential damage range is projected to be minimal, an estimated 20,000 copies of the Trojan have been downloaded. SecureMac offer a simple and free tool for the removal of the iBotNet Trojan available here:
    http://macscan.securemac.com/files/iServicesTrojanRemovalTool.dmg

  • Real time scanning keeps shutting off in security suite

    real time scanning keeps going off and have to keep putting it back on

    I, too, have the Droid 4 and have experienced the random shut downs, tho not as frequently as you seem to be experiencing it.  You said you did a factory reset - another option to try (that seems to help mine) is a system cache clear...
    Power down phone
    Hold volume up/down & power simultaneously until you see the Boot Mode Selection Menu
    Use volume down to navigate to 'Recovery', use volume up to select
    Should see screen with triangle and exclamation point next to an Android
    Press volume up/down simultaneously to go into system recovery
    Use volume rocker to navigate to 'wipe cache' and use power button to select
    Once finished, use volume rocker to navigate to 'reboot system now' and use power button to select
    It also may be a rogue app or a conflict with an app.  Have you recently installed a new app?  If so, try removing it ans see if that improves things.
    How long have you had the phone?  Is it still within the one year manufacturer's warranty?

  • Real time interview questions in XI

    Hi guys,
               Can anyone send me Real time interview questions in XI to my mail id [email protected] will be awarded.
    Thanks in advance

    Hi , check some of the FAQS.
    Some of them not answered.
    . Which of the following are Components of XI
    MDM, Adapter Framework, RWB, SLD, IS

    2. What is a XI Pipeline?
    3. Source element occurs once whereas the target element it is mapped to is produced 3 times when the mapping is executed. Why does this happen?
    4. A context object is used in place of what?
    5. what is UDF? What are the mandatory functions that you use in a Java based UDF
    a. Init() , Execute(), Destroy(), Run(), SetParameter()
    6. ABAP mapping is implemented using what?
    7. When you don’t find the ABAP mapping option in IR what do u do?
    8. Any of the of different Mapping types (Java, MM, XSLT, ABAP) can be called in any order for Interface mapping ? True of False
    9. Is true case sensitive in case of a Boolean function and can 1 be interpreted a Boolean TRUE?
    10. what is Context Changes ?
    11. What are the protocols that the Mail adapter supports
    12. Why is a SAP BC used?
    13. WSDL representation of a Message Interface is used to generate what kind of proxies?
    a. ABAP Proxies
    b. Java Proxies
    c. Neither ABAP nor Java
    d. Both ABAP and Java proxies
    14. Would you configure a Sender IDOC communication channel?
    15. You are required to upload additional libraries for the JMS adapter. How would you do it?
    16. QoS that a Sender JDBC communication channel supports
    17. What are the transport protocols a JMS adapter supports?
    18. Would you configure the Integration Server as a Logical system in a scenario where IDOCs are being sent from a SAP R/3 system to XI?
    19. Why do we specify the Logical System name in the SLD?
    20. The pre-requisites for sending IDOCs to an XI system
    a. Connection parameters must be maintained in SWCV
    b. User must have administration rights in XI
    c. The IDOC metadata must be imported into IR
    21. You need to post a transaction using a RFC. How would you accomplish this?
    a. Use a async BAPI call with implicit Commit?
    b. Use a async BAPI call with explicit Commit?
    22. what is PCK? What is the necessity for a PCK?
    23. In a company the Central Adapter Engine is installed close to the business partner site. Why do you this this is done?
    24. The flow of a message entering the Adapter Engine from Integration Server is--
    a. It is queued, processed using module processors and then posted to the backend application
    b. It is processed using module processors, queued and then posted to the backend application
    25. Is the persistence layer used by the Adapter Engine and the Integration Engine (Integration Server) same?
    26. Is the Message ID specified in the Integration Engine same as the Message ID used during the Message transformation in the Adapter engine?
    27. Would you configure a Sender HTTP adapter?
    28. QoS in case of a RFC Receiver adapter
    29. Sync-Async bridge is used for?
    30. A Business Process is
    a. Executable cross component
    b. Can send and receive messages
    31. What is the purpose of a deadline branch
    32. What is SXI_CACHE used for?
    33. Container elements can be typed to what ?
    34. Why is a Wait step used?
    35. A block can have which of the following?
    a. Multiple Exception branches
    b. Multiple Condition branches
    36. For what all step types can you use a Corelation?
    37. Which of the following is true?
    a. Blocks can be Nested
    b. Blocks can be Overlapped
    38. You need to collect and club messages in a container element coming from different steps. How would you do this?
    39. In case of a Block, which of the following is true?
    Elements of a super container are visible in sub-containers
    Elements of a subordinate container are not visible in all blocks
    Elements defined in the process container are visible in all blocks
    40. what is Co relation & Local Co-relation
    41. Where can you use N: M transformation?
    42. Alert framework uses/leverages CCMS?
    43. If you want to cancel a process and set its status to ‘Logically Deleted’ when a Deadline is reached, do you need to use a Control Step having its Action as ‘CancelProcess’ or is it automatically done?
    44. What are the ways an Exception can be triggered?
    45. What would be the best architecture after implementing SAP XI? Implementing EDI adapter(s).
    46. How to run the Adapter engine as a service?
    47. How SAP Netweaver supports a holistic approach to BPM (Business Process Management)?
    48. What is the role of SAP XI?
    49. How can we differentiate SAP XI from Business Connector (BC)?
    50. How to send mail from SAP XI?
    51. What are the migration steps from XI 2.0 to XI 3.0?
    52. XI will support synchronous communication and asynchronous communication?
    A. Yes
    B. No
    53. Integration server contains the following components?
    A. Additional integration services
    B. Integration Engine
    C. Business Process Engine
    D. Integration Repository
    54. Integration Repository provides the following components?
    A. Business processes
    B. Mapping Objects
    C. Components at design time
    D. Imported objects
    55. What is the usage of Web Application server in XI?
    56. What is the use of RFC and IDOC Adapters in XI?
    57. How to convert WSDL (Web Services Descriptive Language) to target language?
    58. What is the component to generate Jave classes?
    59. What is ESA (Enterprise Service Architecture)?
    60. What are the key elements of ESA?
    61. How to transport SLD, Integration Directory & Integration Repository objects to the Production system?
    62. Can we import XSD Schemas into XI 2.0?
    63. which api you use for java mapping.
    64. You use context object in place of what?
    65. To make non mandatory node mandatory which you should to?
    66. In case of RFC communication sender system sends a rfc call but target system does not receive it. What you think went wrong?
    67 Difference between Xi business process and workflow ?
    68. When you use transaction SXMB_MONI for process monitoring, which field tells you that the entry is for business process.
    69. What are different Xi components?
    70. In which all places you can use receive process?
    71 In which all steps you can activate correlation?
    1. How many interfaces are u developed in u r project.
    2,What is land accepted.?
    3.What is Your team size ?
    4.The work assignment procedure in your organization?
    5.What is your complete company object.?
    6.What is the nesicity of developing that scenario.?
    7.What is the advantage over other integration tools.?
    8.What is Sender agreement?
    9.What is Receiver agreement?
    10.Tell me the steps for Multiple Idoc to File.(BPM Scenarios)
    11.Tell me the steps for file to Multiple Idoc (BPM)
    12.How to Create Alerts in BPM?
    13.How to Use Third Party Adaptors in u r project.?
    14.How to Use External Objects?
    15.What is the Use of Node Fictions in XI?(example)
    16 Examples on RFC lookups?
    regards,
    Brahmaji.

  • Data replication in real time

    For security reasons, we have two Oracle 9.i database servers (Windows Server 2003 as O/S):
    We have a database server A in our internal network, which is our Intranet, too.
    We have a database server B, out of our Intranet but in our internal network, which can be accessed through Internet and any Internet user with a certain password can insert, update or delete records.
    Both database servers A and B have the same structure, but their data is different. Database A can be accessed from our Intranet and its records can only be updated for our Intranet users. Database B is only available for Internet users (out of our Intranet) and they also can update its records.
    **We need that both databases have the same data at any time.**
    Is it possible to REPLICATE in real time both database servers? Is there any set up or configuration that we must follow to achieve that?
    Thanks in advance!

    If you want absolute transactional consistency, you have to have one system go down if the other goes down. You can configure multi-master replication to replicate data synchronously, but that requires that the two databases participate in the same distributed transaction, so any commit will incur the overhead of the two-phase commit protocol. If either one of the databases cannot commit the transaction, the transaction could not be committed.
    Most folks go with an asynchronous replication scenario, since that allows the two databases to be very closely aligned data-wise, has a lower overhead, and does not have the same availability limitations.
    I would strongly advise against it, but you could build your own replication system that attempted to repeat the transaction on the other system and, if it failed, queued the request until the other system was available. Theoretically, this would allow you to have a transactionally consistent system when both databases were up and to allow one system to continue processing if the other were down. Practically, though, I wouldn't consider this a viable approach unless the alternatives were hugely unsatisfactory, you have gobs of cash, time, and programmers to throw at the problem, and you are willing to deal with significant administrative headaches for the next few years as you go through the first few releases.
    Justin
    Distributed Database Consulting, Inc.
    http://www.ddbcinc.com/askDDBC

  • What is difference between transport protocol and message protocol

    what is difference between transport protocol and message protocol
    please give definition and small explanation

    Hi,
    Transport protocol gives information about outside of message details, kind of system, security details.
    A transport protocol is a network protocol that has the capability of transferring some payload from one node to another, thus providing some level of transparency from the underlying network.
    Transport protocols are used as a mechanism to move payloads around a network. Typically, a payload will have a transport binding associated with it. For example, SOAP (acting as a payload) has a predetermined binding for HTTP (a transport protocol).
    Some common transport protocols include: HTTP, HTTP-R, SMTP and BEEP.
    Message protocol gives you an idea of message type XI payload
    http://help.sap.com/saphelp_nw04/helpdata/en/b6/0b733cb7d61952e10000000a11405a/content.htm

  • How to create a Real Time Interactive Business Intelligence Solution in SharePoint 2013

    Hi Experts,
    I was recently given the below requirements to architect/implement a business intelligence solution that deals with instant/real data modifications in data sources. After going through many articles, e-books, expert blogs, I am still unable to piece the
    right information to design an effective solution to my problem. Also, client is ready to invest in the best 
    infrastructure in order to achieve all the below requirements but yet it seems like a sword of Damocles that hangs around my neck in every direction I go.
    Requirements
    1) Reports must be created against many-to-many table relationships and against multiple data sources(SP Lists, SQL Server Custom Databases, External Databases).
    2) The Report and Dashboard pages should refresh/reflect with real time data immediately as and when changes are made to the data sources.
    3) The Reports should be cross-browser compatible(must work in google chrome, safari, firefox and IE), cross-platform(MAC, Android, Linux, Windows) and cross-device compatible(Tabs, Laptops &
    Mobiles).
    4) Client is Branding/UI conscious and wants the reports to look animated and pixel perfect similar to what's possible to create today in Excel 2013.
    5) The reports must be interactive, parameterized, slice able, must load fast and have the ability to drill down or expand.
    6) Client wants to leverage the Web Content Management, Document Management, Workflow abilities & other features of SharePoint with key focus being on the reporting solution.
    7) Client wants the reports to be scalable, durable, secure and other standard needs.
    Is SharePoint 2013 Business Intelligence a good candidate? I see the below limitations with the Product to achieve all the above requirements.
    a) Cannot use Power Pivot with Excel deployed to SharePoint as the minimum granularity of refresh schedule is Daily. This violates Requirement 1.
    b) Excel Services, Performance Point or Power View works as in-memory representation mode. This violates Requirement 1 and 2.
    b) SSRS does not render the reports as stated above in requirement 3 and 4. The report rendering on the page is very slow for sample data itself. This violates Requirement 6 and 7.
    Has someone been able to achieve all of the above requirements using SharePoint 2013 platform or any other platform. Please let me know the best possible solution. If possible, redirect me to whitepapers, articles, material that will help me design a effective
    solution. Eagerly looking forward to hear from you experts!.
    Please feel free to write in case you have any comments/clarifications.
    Thanks, 
    Bhargav

    Hi Experts,
    Request your valuable inputs and support on achieving the above requirements.
    Looking forward for your responses.
    Thanks,
    Bhargav

  • Error -1074384569; NI-XNET: (Hex 0xBFF63147) The database information on the real-time system has been created with an older NI-XNET version. This version is no longer supported. To correct this error, re-deploy your database to the real-time system.

    Hello
    I have a VeriStand-Project (VSP) created with my Laptop-Host (LTH) which works with my PXI, while
    deploying it from my LTH. Then I have installed the whole NI enviroment for PXI and VeriStand use on a
    industrial PC (iPC). I have tried to deploy my VSP from the iPC to the PXI but the following error
    message arose on my iPC:
    The VeriStand Gateway encountered an error while deploying the System Definition file.
    Details: Error -1074384569 occurred at Project Window.lvlibroject Window.vi >> Project
    Window.lvlib:Command Loop.vi >> NI_VS Workspace ExecutionAPI.lvlib:NI VeriStand - Connect to System.vi
    Possible reason(s):
    NI-XNET:  (Hex 0xBFF63147) The database information on the real-time system has been created with an
    older NI-XNET version. This version is no longer supported. To correct this error, re-deploy your
    database to the real-time system. ========================= NI VeriStand:  NI VeriStand
    Engine.lvlib:VeriStand Engine Wrapper (RT).vi >> NI VeriStand Engine.lvlib:VeriStand Engine.vi >> NI
    VeriStand Engine.lvlib:VeriStand Engine State Machine.vi >> NI VeriStand Engine.lvlib:Initialize
    Inline Custom Devices.vi >> Custom Devices Storage.lvlib:Initialize Device (HW Interface).vi
    * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * • Unloading System
    Definition file... • Connection with target Controller has been lost.
    The software versions of the NI products (MAX/My System/Software) between my LTH and the iPC are
    almost the same. The only differences are:
    1. LabView Run-Time 2009 SP1 (64-bit); is installed on LTH but missing on iPC. The iPC has a 32-bit system.
    2. LabView Run-Time 2012 f3; is installed on LTH but missing on iPC.
    3. NI-DAQmx ADE Support 9.3.5; something strage on the LTH, because normally I am using NI-DAQmx 9.5.5 and all other DAQmx products on my LTH are 9.5.5. That means NI-DAQmx Device Driver 9.5.5 and NI-DAQmx Configuration 9.5.5.. On the iPC side all three products are 9.5.5.. That means NI-DAQmx ADE Support 9.5.5, NI-DAQmx Device Driver 9.5.5 and NI-DAQmx Configuration 9.5.5..
    4. Traditional NI-DAQ 7.4.4; The iPC has this SW installed. On the LTH this SW is missing.
    In order to fix this problem I have formatted my PXI and I have installed the following SW from the iPC:
    1. LabVIEW Real-Time 11.0.1
    2. NI-488.2 RT 3.0.0
    3. NI_CAN 2.7.3
    Unfortunately the above stated problem still arose.
    What can I do to fix this problem?
    I found a hint on http://www.labviewforum.de/Thread-XNET-CAN-die-ersten-Gehversuche.
    There it is written to deploy the dbc file againt.
    If this is a good hint, so how do I deploy a dbc file?
    I would feel very pleased if somebody could help me! :-)
    Best regards
    Lukas Nowak

    Hi Lukas,
    I think the problem is caused by differenet drivers for the CAN communication.
    NI provides two driver for CAN: NI-CAN and NI-XNET.
    NI-CAN is the outdated driver which is not longer used by new hardware. NI replaced the NI-CAN driver with NI-XNET some years ago, which supports CAN, LIN and the FLEXRAY communication protocol.
    You wrote:
    In order to fix this problem I have formatted my PXI and I have installed the following SW from the iPC:
    3. NI_CAN 2.7.3
    NI CAN is the outdated driver. I think that you should try to install NI-XNET instead of NI-CAN on your PXI-System, to get rid of the error message.
    Regards, stephan

  • Real-time apply in Maximum Performance Mode Not Working

    We have configured physical standby database in maximum performance mode. It's working perfectly fine. Archive logs are being applied to the physical standby.
    We can open the DB in read-only mode, but real-time apply is not working. Physical standby database is lagging behind the primary db by an archive log. As soon as primary database generates an archive log, it's transported over to the standby and applied immediately by the media recovery process. But real-time redo is not working. Standby redo logs have been configured.
    On Physcial Standby:
    SQL> alter database recover managed standby database using current logfile disconnect ;
    Database Altered.
    SQL> select group#, DBID, status,first_time, last_time from v$standby_log ;
    GROUP# DBID STATUS FIRST_TIM LAST_TIME
    4 UNASSIGNED UNASSIGNED
    5 UNASSIGNED UNASSIGNED
    6 UNASSIGNED UNASSIGNED
    7 UNASSIGNED UNASSIGNED
    SQL> select * from v$dataguard_stats ;
    NAME
    VALUE
    UNIT TIME_COMPUTED
    apply lag
    +00 00:31:36
    day(2) to second(0) interval 22-JUN-2010 08:42:06
    transport lag
    +00 00:31:34
    day(2) to second(0) interval 22-JUN-2010 08:42:06
    As you could see from the output above, value of transport and apply lag is equal to the elapsed time since last archive log switch.
    ********* Standby init.ora
    db_name = CPRD
    db_unique_name = CPRDS
    instance_name = CPRD
    service_names = hrDBSBY.WORLD
    log_archive_format = CPRD%r%s.%t
    log_archive_dest_1 = "location=f:\orarch\hresysprod"
    log_archive_dest_2='service=hresysprod async db_unique_name=cprd valid_for=(primary_role,online_logfile)'
    log_archive_config='dg_config=(cprd,cprds)'
    fal_server=hresysprod
    fal_client=hresysprods
    standby_file_management=auto
    log_archive_trace=1
    log_file_name_convert = ('hresysprod','hresysprods')
    db_file_name_convert = ('hresysprod','hresysprods')
    remote_login_passwordfile = exclusive
    ******* Primary init.ora
    log_archive_config='dg_config=(cprd,cprds)'
    fal_server=hresysprods
    fal_client=hresysprod
    standby_file_management=auto
    log_archive_format = CPRD%r%s.%t
    log_archive_dest_1 = "location=f:\orarch\hrESYSPROD"
    log_archive_dest_2='service=hresysprods async db_unique_name=cprds valid_for=(primary_role,online_logfile)'
    log_archive_trace=1
    remote_login_passwordfile = exclusive
    Please advise.
    Thanks,
    jay

    Hi,
    In your case you are using ARC process for redo transfer as you have not specified any process in log_archive_dest_2 and default is arch.
    I will suggest you to use LGWR to transfer the redo to standby and also check the size of standby redo logs on standby is same to the size of online redo logs on primary
    Regards
    Anudeep

Maybe you are looking for