Databases stored on a server are accessed by remotely stored applications using a distributed connection, which allows administrators to remotely manage databases and servers. For this to take place, recognized communication protocols must be used. The following communication protocols are recognized by DB2:
- TCP/IP (most frequently used)
- Named pipe
To access a database stored on a remote server, you must catalog the database. You must also catalog the node on the local server containing the database.
To access the data stored in a DB2 for z/OS or a DB2 for i5/OS database:
- Configure TCP/IP communications on the DB2 Connect server
- Catalog the TCP/IP node
- Catalog the System z or System i database as a DCS database
- Catalog the System z or System i database
- Bind utilities and applications to the System z or System i database server
DB2 discovery provides an easy way to catalog a remote server and a database without having to know detailed communication-specific information. DB2 discovery uses one of two methods to process a discovery request: search and known. At the server level, instance level, and database level, you can enable or disable DB2 discovery and control how discovery requests are initiated.
LDAP is an industry-standard access method to directory services. Each database server provides database information to the LDAP directory when the databases are created. DB2 supports IBM LDAP client on AIX, Solaris, HP-UX 11.11, Windows, and Linux.
This tutorial was created to provide you with the processes for configuring communications and cataloging databases/servers, as well as introduce to you the concepts of DB2 discovery and LDAP. It was also designed to help you prepare for the DB2 10.1 DBA for Linux, UNIX, and Windows certification exam (exam 611). You should now have a better understanding of DB2 connectivity and networking, as well as be able to:
- Catalog a local/remote DB2 database
- Catalog a remote server
- Identify the steps to access data stored on DB2 for z/OS or DB2 for i5/OS database
- Identify characteristics of DB2 locks (common locks shared across all platforms)
- Understand how configuration parameters control the behavior of DB2 discovery
- Register a database/server with LDAP