Download Oracle Concepts (10g R2)

Document related concepts

Entity–attribute–value model wikipedia , lookup

Microsoft SQL Server wikipedia , lookup

Open Database Connectivity wikipedia , lookup

IMDb wikipedia , lookup

Microsoft Jet Database Engine wikipedia , lookup

Extensible Storage Engine wikipedia , lookup

Concurrency control wikipedia , lookup

Database wikipedia , lookup

PL/SQL wikipedia , lookup

Relational model wikipedia , lookup

Clusterpoint wikipedia , lookup

Database model wikipedia , lookup

Oracle Database wikipedia , lookup

Transcript
文档下载 免费文档下载
http://www.wendangwang.com/
本文档下载自文档下载网,内容可能不完整,您可以点击以下网址继续阅读或下载:
http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8
Oracle Concepts (10g R2)
Oracle? Database
Concepts
10g Release 2 (10.2)
B14220-02
October 2005
Oracle Database Concepts, 10g Release 2 (10.2)
B14220-02
Copyright ? 1993, 2005, Oracle. All rights reserved.
Primary Author: Michele Cyran
Contributing Author: Paul Lane, JP Polk
Contributor: Omar Alonso, Penny Avril, Hermann Baer, Sandeepan Banerjee, Mark Bauer,
Bill Bridge, Sandra Cheevers, Carol Colrain, Vira Goorah, Mike Hartstein, John Haydu,
Wei Hu, Ramkumar Krishnan, Vasudha Krishnaswamy, Bill Lee, Bryn Llewellyn, Rich Long,
Diana Lorentz, Paul Manning, Valarie Moore, Mughees Minhas, Gopal Mulagund, Muthu
文档下载 免费文档下载
http://www.wendangwang.com/
Olagappan, Jennifer Polk, Kathy Rich, John Russell, Viv Schupmann, Bob Thome, Randy
Urbano, Michael Verheij, Ron Weiss, Steve Wertheimer
The Programs (which include both the software and documentation) contain proprietary
information; they are provided under a license agreement containing restrictions on
use anhttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8d disclosure and are
also protected by copyright, patent, and other intellectual and industrial property
laws. Reverse engineering, disassembly, or decompilation of the Programs, except to
the extent required to obtain interoperability with other independently created
software or as specified by law, is prohibited.
The information contained in this document is subject to change without notice. If
you find any problems in the documentation, please report them to us in writing. This
document is not warranted to be error-free. Except as may be expressly permitted in
your license agreement for these Programs, no part of these Programs may be reproduced
or transmitted in any form or by any means, electronic or mechanical, for any purpose.
If the Programs are delivered to the United States Government or anyone licensing
or using the Programs on behalf of the United States Government, the following notice
is applicable:://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8par
U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and
technical data delivered to U.S. Government customers are "commercial computer
software" or "commercial technical data" pursuant to the applicable Federal
Acquisition Regulation and agency-specific supplemental regulations. As such, use,
duplication, disclosure, modification, and adaptation of the Programs, including
documentation and technical data, shall be subject to the licensing restrictions set
forth in the applicable Oracle license agreement, and, to the extent applicable, the
additional
rights
set
forth
in
FAR
52.227-19,
Commercial
Computer
Software—Restricted Rights (June 1987). Oracle Corporation, 500 Oracle Parkway,
Redwood City, CA 94065
文档下载 免费文档下载
http://www.wendangwang.com/
The Programs are not intended for use in any nuclear, aviation, mass transit, medical,
or other inherently dangerous applications. It shall be the licensee's responsibility
to take all http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8appropriate
fail-safe, backup, redundancy and other measures to ensure the safe use of such
applications if the Programs are used for such purposes, and we disclaim liability
for any damages caused by such use of the Programs.
Oracle, JD Edwards, PeopleSoft, and Retek are registered trademarks of Oracle
Corporation and/or its affiliates. Other names may be trademarks of their respective
owners.
The Programs may provide links to Web sites and access to content, products, and
services from third parties. Oracle is not responsible for the availability of, or
any content provided on, third-party Web sites. You bear all risks associated with
the use of such content. If you choose to purchase any products or services from a
third party, the relationship is directly between you and the third party. Oracle
is not responsible for: (a) the quality of third-party products or services; or (b)
fulfilling
any
of
the
thhttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8e
terms
agreement
of
with
the
third party, including delivery of products or services and warranty obligations
related to purchased products or services. Oracle is not responsible for any loss
or damage of any sort that you may incur from dealing with any third party.
Contents
Preface.........................................................................
................................................................................
....
xxv
文档下载 免费文档下载
http://www.wendangwang.com/
Audience........................................................................
...........................................................................
xxvDocumentation
Accessibility...................................................................
..............................................
xxvRelated
Documentation...................................................................
.......................................................
xxviConventions.......http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8...
................................................................................
...................................................
xxviPart I
What Is
Oracle?
1 Introduction to the Oracle Database
Oracle
Database
Architecture ...................................................................
............................................
Overview
1-1
of
Oracle
Grid
Architecture....................................................................
........................
1-2
Grid
Computing
Defined.........................................................................
..................................
1-2Grid
Computing
in
Oracle
Database
10g.............................................................................
....
1-5Overview
of
Application
Architecture....................................................................
.......................
1-7
文档下载 免费文档下载
http://www.wendangwang.com/
Client/Server
Archihttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8tecture.............
................................................................................
...........
1-7Multitier
Architecture:
Application
Servers.........................................................................
..
1-7Overview
of
Physical
Database
Structures......................................................................
...............
1-8
Datafiles ......................................................................
.................................................................
1-8Control
Files...........................................................................
......................................................
1-8Redo
Log
Files...........................................................................
..................................................
1-9Archive
Log
Files...........................................................................
...........................http://www.wendangwang.com/doc/f6d2729bbb843fed64cefe
b8..................
1-9Parameter
Files...........................................................................
.................................................
1-9Alert
and
Trace
Log
Files...........................................................................
................................
1-9Backup
Files...........................................................................
...................................................
1-10Overview of Logical
Database
Structures......................................................................
.............
1-10
Tablespaces.....................................................................
..........................................................
1-10Oracle
Data
文档下载 免费文档下载
http://www.wendangwang.com/
Blocks..........................................................................
.........................................
1-10Extents..............................................................http://
www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8................................
.........................................
1-11Segments....................................................................
...............................................................
of
Schemas
and
1-11Overview
Common
Schema
Objects...............................................................
1-12
Tables..........................................................................
...............................................................
1-12Indexes ....................................................................
..................................................................
1-12Views.......................................................................
..................................................................
1-12Clusters....................................................................
..................................................................
1http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8-13Synonyms.............
................................................................................
.....................................
1-13
iii
Overview
of
the
Oracle
Data
Dictionary......................................................................
...............
1-13Overview
of
the
Oracle
Instance........................................................................
...........................
1-13
文档下载 免费文档下载
http://www.wendangwang.com/
Real
Application
Clusters:
Multiple
Instance
Systems.......................................................
1-13Instance
Memory
Structures .....................................................................
............................
1-14System
Global
Area............................................................................
.....................................
1-14Program
Global
Area............................................................................
...................http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8......
..........
1-15Oracle
Background
Processes.......................................................................
.........................
1-15Process
Architecture....................................................................
............................................
1-15Overview of Accessing the
Database........................................................................
...................
1-16
Network
Connections.....................................................................
.........................................
1-16Starting
Up
the
Database........................................................................
................................
How
Oracle
Works ..........................................................................
.......................................
Overview
of
Oracle
Utilities.....................................................................ht
tp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8...........................
文档下载 免费文档下载
http://www.wendangwang.com/
..........Oracle
Database
Features .......................................................................
.............................................
Overview
of
Scalability
and
Performance
Features...................................................................
Concurrency ....................................................................
.........................................................
Read
Consistency ....................................................................
................................................
Locking
Mechanisms .....................................................................
.........................................
Quiesce
Database........................................................................
.............................................
Real
Application
Clusters...................................http://www.wendangwang.com/doc/f6d272
9bbb843fed64cefeb8..............................................................
......
Portability.....................................................................
.............................................................
文档下载 免费文档下载
http://www.wendangwang.com/
Overview
of
Manageability
Features........................................................................
...................
Self-Managing
Database........................................................................
.................................
Oracle
Enterprise
Manager.........................................................................
............................
SQL*Plus........................................................................
............................................................
Automatic
Storage
Management......................................................................
.....................
The
Scheduler................http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8
................................................................................
...........................
Database
Resource
Manager ........................................................................
.........................
Overview
of
Database
Backup
and
Features.............................................................
Recovery
文档下载 免费文档下载
http://www.wendangwang.com/
Types
of
Failures .......................................................................
..............................................
Structures
Used
for
Recovery .......................................................................
.........................
Overview
of
High
Availability
Features........................................................................
..............Overview
of
Business
Intelligence
Features........................................................................
........
Data
Warehousing.......................http://www.wendangwang.com/doc/f6d2729bbb843fe
d64cefeb8.......................................................................
.....................
Extraction,
Transformation,
and
Loading
(ETL).................................................................
Materialized
Views...........................................................................
.......................................
Bitmap
Indexes
in
Data
Warehousing.....................................................................
.............
文档下载 免费文档下载
http://www.wendangwang.com/
Table
Compression.....................................................................
.............................................
Parallel
Execution.......................................................................
.............................................
Analytic
SQL.............................................................................
................................................
OLAP
Capabilities......http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8.......
................................................................................
......................
Data
Mining..........................................................................
....................................................
Partitioning....................................................................
...........................................................
Overview
of
Content
Management
Features........................................................................
......
XML
in
文档下载 免费文档下载
http://www.wendangwang.com/
Oracle..........................................................................
.................................................
LOBs............................................................................
...............................................................
Oracle
Text ...........................................................................
.................http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8........
...........................
iv1-161-171-171-171-181-181-181-191-201-201-201-211-211-211-211-211-221-221-221221-231-241-251-251-251-251-261-261-261-261-261-271-271-271-271-271-28
Oracle
Ultra
Search .........................................................................
........................................
1-28Oracle
interMedia......................................................................
...............................................
1-28Oracle
Spatial.........................................................................
...................................................
1-28Overview of Security
Features........................................................................
..............................
1-28
Security
Mechanisms .....................................................................
.........................................
1-29Overview
of
Data
Integrity
anhttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8d
Triggers........................................................................
............
1-29
文档下载 免费文档下载
http://www.wendangwang.com/
Integrity
Constraints.....................................................................
...........................................
1-30Keys .......................................................................
....................................................................
1-30Triggers ...................................................................
..................................................................
1-30Overview
of
Information
Integration
Features........................................................................
...
1-31
Distributed
SQL ............................................................................
..........................................
1-31Oracle
Streams ........................................................................
..............................http://www.wendangwang.com/doc/f6d2729bbb843fed64c
efeb8...................
1-31Oracle
Transparent
Gateways
Connectivity.................................................
Database
and
Generic
1-33Oracle
Application
Development ....................................................................
...............
1-33
Overview
of
Oracle
SQL.............................................................................
...................................
1-33
SQL
Statements......................................................................
..................................................
1-33Overview
of
文档下载 免费文档下载
http://www.wendangwang.com/
PL/SQL..........................................................................
............................................
1-34
PL/SQL
Program
Units...........................................................................
...............................
1-35Overview
of
Java............................................................................
.http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8........................
........................
1-35Overview of Application Programming Languages
(APIs).....................................................
1-35Overview of
Transactions....................................................................
..........................................
Commit
1-36
and
Undo
Transactions....................................................................
........................
1-37Savepoints..................................................................
...............................................................
1-37Overview
of
Datatypes.......................................................................
............................................
1-37Overview
of
Globalization ..................................................................
..........................................
1-38Part
II
Oracle
Database
Architecture
2 Data Blocks, Extents, http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8and
Segments
Introduction
to
Data
Blocks,
Extents,
and
Segments........................................................................
文档下载 免费文档下载
http://www.wendangwang.com/
2-1Overview
of
Data
Blocks..........................................................................
..............................................
2-3
Data
Block
Format .........................................................................
....................................................
Header
2-3
(Common
and
Variable).......................................................................
.......................
2-4Table
Directory.......................................................................
.....................................................
2-4Row
Directory.......................................................................
......................................................
2-4Overhead....................................................http://www.wendan
gwang.com/doc/f6d2729bbb843fed64cefeb8..........................................
........................................
2-4Row
Data............................................................................
..........................................................
2-4Free
Space...........................................................................
..........................................................
2-4Free
Space
Management......................................................................
..............................................
Availability
and
Optimization
of
2-4
Free
Block..............................................
Space
in
2-5Row
a
Data
Chaining
and
Migrating ......................................................................
............................
2-5PCTFREE,
PCTUSED,
and
Row
Chaining .......................................................................
文档下载 免费文档下载
http://www.wendangwang.com/
.............
2-6
The
PCTFREE
Parameter.........http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8.......
................................................................................
...........
2-6The
PCTUSED
Parameter.......................................................................
...................................
2-7Overview
of
Extents.........................................................................
.....................................................
When
2-10
Extents
Are
Allocated ......................................................................
..................................
2-10
v
Determine
the
Number
and
Size
of
Extents ........................................................................
.......
2-10How
Extents
Are
Allocated ......................................................................
....................................
2-11When
Extents
Are
Deallocated ....................................................................
........................http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8.
.......
2-11
Extents
in
Nonclustered
Tables..........................................................................
...................
2-12Extents
in
Clustered
Tables..........................................................................
文档下载 免费文档下载
http://www.wendangwang.com/
..........................
2-12Extents
in
Materialized
Views
and
Their
Logs....................................................................
2-12Extents
in
Indexes.........................................................................
...........................................
2-13Extents
in
Temporary
Segments........................................................................
....................
2-13Extents
in
Rollback
Segments........................................................................
.........................
2-13Overview
of
Segments........................................................................
............................................http://www.wendangwang.com/doc/f6d27
29bbb843fed64cefeb8.....
2-13
Introduction
to
Data
Segments .......................................................................
.............................
2-13Introduction
to
Index
Segments .......................................................................
............................
2-14Introduction
to
Temporary
Segments .......................................................................
..................
2-14
Operations
Segments
2-14Segments
that
Require
Temporary
..................................................................
in
Temporary
Tables
and
Indexes ............................................................
Temporary
Segments
Their
2-15How
Are
Allocated ......................................................................
....
2-15Introduction
to
Automatic
Undo
Management......................................................................
....
2-16
文档下载 免费文档下载
http://www.wendangwang.com/
Undo
Mode...................http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8..
................................................................................
..........................
2-16Undo
Quota...........................................................................
...................................................
2-17Automatic
Undo
Retention.......................................................................
..............................
2-17External
Views...........................................................................
...............................................
2-17
3 Tablespaces, Datafiles, and Control Files
Introduction
to
Tablespaces,
Datafiles,
and
Files...............................................................
Control
3-1
Oracle-Managed
Files...........................................................................
.............................................
3-2Allocate More Space for a
Database ................................http://www.wendangwang.com/doc/f6d2729b
bb843fed64cefeb8...............................................................
3-2Overview
of
Tablespaces.....................................................................
...................................................
3-4
Bigfile
Tablespaces.....................................................................
........................................................
3-5
文档下载 免费文档下载
http://www.wendangwang.com/
Benefits
of
Bigfile
Tablespaces.....................................................................
.............................
3-6Considerations
with
Bigfile
Tablespaces.....................................................................
............
3-6The
SYSTEM
Tablespace .....................................................................
.............................................
3-6
The
Data
Dictionary......................................................................
..............................................
3-7PL/http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8SQL
Program
Units
Description.....................................................................
...................
3-7The
SYSAUX
Tablespace......................................................................
.............................................
3-7Undo
Tablespaces.....................................................................
.........................................................
Creation
3-7
of
Undo
Tablespaces.....................................................................
.............................
3-8Assignment
of
Undo
Tablespaces.....................................................................
.......................
3-8Default
Temporary
Tablespace......................................................................
..................................
How
to
Specify
3-8
a
Default
Temporary
Tablespace..................................................................
http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb83-8Using
Multiple
文档下载 免费文档下载
http://www.wendangwang.com/
Tablespaces.....................................................................
.........................................
3-9Managing
Space
in
Tablespaces ....................................................................
..................................
3-9
Locally
Managed
Tablespaces ....................................................................
...........................
Tablespaces
3-10Segment Space Management in Locally Managed
......................................
3-10Dictionary
Managed
Tablespaces ....................................................................
.....................
3-11Multiple
Block
Sizes...........................................................................
.............................................
3-11Online
and
Offline
Tablespaces.....................................................................
...............................
3-11
http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8Bringing
Tablespaces
Offline.........................................................................
........................
3-12
vi
Use
of
Tablespaces
for
Special
Procedures......................................................................
....
3-12Read-Only
Tablespaces ....................................................................
.............................................
3-13Temporary Tablespaces for
Sort
Operations......................................................................
.........
3-13
文档下载 免费文档下载
http://www.wendangwang.com/
Sort
Segments .......................................................................
...................................................
3-13Creation of Temporary
Tablespaces ....................................................................
.................
3-14Transport
of
Tablespaces
Between
Databases ......................................................................
.....
http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb83-14
Tablespace
Repository......................................................................
.......................................
3-14How to Move or Copy a Tablespace to
Another Database ...............................................
3-15Overview
of
Datafiles.......................................................................
...................................................
3-15
Datafile
Contents .......................................................................
.....................................................
3-16Size
of
Datafiles ......................................................................
........................................................
3-16Offline
Datafiles ......................................................................
........................................................
3-16Temporary
Datafiles ........................................................http://www.wen
dangwang.com/doc/f6d2729bbb843fed64cefeb8.......................................
.......................
3-16Overview
of
Control
Files...........................................................................
........................................
3-17
文档下载 免费文档下载
http://www.wendangwang.com/
Control
File
Contents .......................................................................
..............................................
3-17Multiplexed
Control
Files ..........................................................................
...................................
3-184 Transaction Management
Introduction
to
Transactions....................................................................
..............................................
Statement
Execution
4-1
and
Transaction
Control ........................................................................
.....
4-3Statement-Level
Rollback .......................................................................
................http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8.........
.................
4-3Resumable
Space
Allocation......................................................................
.......................................
4-3Overview
of
Transaction
Management......................................................................
..........................
4-4
Commit
Transactions ...................................................................
.....................................................
4-4Rollback
of
Transactions ...................................................................
...............................................
4-5Savepoints
In
Transactions....................................................................
...........................................
4-6Transaction
Naming..........................................................................
................................................
4-7
文档下载 免费文档下载
http://www.wendangwang.com/
How
Transactions
Are
Named..........http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8..........
.............................................................................
4-7Commit
Comment.........................................................................
.............................................
4-7The
Two-Phase
Commit
Mechanism ......................................................................
.......................
4-8Overview
of
Autonomous
Transactions....................................................................
..........................
4-8
Autonomous
PL/SQL
Blocks .........................................................................
.................................
Transaction
Control
4-9
Statements
in
Blocks .....................................................
Autonomous
4-9
5 Schema Objects
Introduction
to
Schema
Objects ........................................................................
...................................
5-1Ohttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8verview
of
Tables .........................................................................
........................................................
How
Table
Data
5-3
Is
Stored .........................................................................
文档下载 免费文档下载
http://www.wendangwang.com/
.......................................
Row
5-4
Format
and
Size ...........................................................................
.....................................
5-5Rowids
of
Row
Pieces .........................................................................
......................................
5-6Column
Order ..........................................................................
..................................................
5-6Table
Compression.....................................................................
.......................................................
5-7
Using
Table
Compression..............................http://www.wendangwang.com/doc/f6d2729b
bb843fed64cefeb8................................................................
............
5-7Nulls
Indicate
Absence
of
Value...........................................................................
...........................
5-8Default
Values
for
Columns ........................................................................
....................................
Default
Value
Insertion
5-8
and
Integrity
Checking ...............................................
Constraint
5-8
vii
Partitioned
Tables..........................................................................
....................................................
5-9Nested
Tables .........................................................................
文档下载 免费文档下载
http://www.wendangwang.com/
.........................................................
5-10Temporary
Tables .........................................................................
................................................http://www.wendangwang.com/doc/f
6d2729bbb843fed64cefeb8.
5-10
Segment
Allocation......................................................................
............................................
5-10Parent
and
Child
Transactions ...................................................................
...........................
5-11External
Tables..........................................................................
......................................................
5-11
The
Access
Driver..........................................................................
..........................................
5-11Data Loading with External
Tables..........................................................................
.............
5-12Parallel
Access
to
External
Tables..........................................................................
...............
5-12Overview
of
Views...........................................................................
........http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8.................
............................5-13
How
Views
are
Stored..........................................................................
..........................................How
Views
Are
Used ...........................................................................
.........................................Mechanics
of
Views ..........................................................................
文档下载 免费文档下载
http://www.wendangwang.com/
.............................................
Globalization
Support
Parameters
in
Views........................................................................
Use
of
Indexes
Against
Views...........................................................................
.....................
Dependencies
and
Views ..........................................................................
....................................Updatable
Join
Views ........................................................http://www.wendang
wang.com/doc/f6d2729bbb843fed64cefeb8...........................................
.................Object
Views...........................................................................
.........................................................Inline
Views ..........................................................................
..........................................................Overview
of
Materialized
Views...........................................................................
............................
Define
Constraints
on
Views...........................................................................
..............................Refresh
Materialized
Views ..........................................................................
................................Materialized
View
Logs ...........................................................................
.....................................Overview
of
文档下载 免费文档下载
http://www.wendangwang.com/
Dimensions...............................http://www.wendangwang.com/doc/f6d2729b
bb843fed64cefeb8................................................................
......................Overview
of
the
Sequence
Generator.......................................................................
........................Overview
of
Synonyms........................................................................
................................................Overview
of
Indexes.........................................................................
....................................................
Unique
and
Nonunique
Indexes ........................................................................
..........................Composite
Indexes.........................................................................
.................................................Indexes
and
Keys ...........................................................................
................................................Indexes
and
Nulls ............http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8.......
................................................................................
.......................Function-Based
Indexes.........................................................................
........................................
Uses
of
Function-Based
Indexes ........................................................................
...................
Optimization
with
Function-Based
Indexes .......................................................................
文档下载 免费文档下载
http://www.wendangwang.com/
Dependencies
of
Function-Based
Indexes ........................................................................
...
How
Indexes
Are
Stored .........................................................................
......................................
Format
of
Index
Blocks..........................................................................
..................................
The
Internal
Structure
of
Inhttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8dexes..................
........................................................................
Index
Properties......................................................................
.................................................
Advantages
of
B-tree
Structure.......................................................................
.......................
Index
Unique
Scan............................................................................
..............................................Index
Range
Scan............................................................................
................................................Key
Compression ....................................................................
文档下载 免费文档下载
http://www.wendangwang.com/
.......................................................
Prefix
and
Suffix
Entries ........................................................................
................................://www.wendangwang.com/doc/f6d2729bbb843fed64cef
eb8r
Performance
and
Storage
Considerations .................................................................
..........
Uses
of
Key
Compression ....................................................................
..................................
Reverse
Key
Indexes ........................................................................
..............................................viii5-135-145-145-155-155-155-165165-165-175-175-185-185-195-195-205-215-225-225-235-235-245-245-245-255-265-265265-275-285-285-285-285-285-295-295-30
Bitmap
Indexes ........................................................................
.......................................................
Benefits
for
5-30
Data
Warehousing
Applications ...................................................................
..
5-30Cardinality.................................................................
........................http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8.
......................................
5-31Bitmap
Index
文档下载 免费文档下载
http://www.wendangwang.com/
Example.........................................................................
...................................5-32Bitmap
Indexes
and
Nulls ..........................................................................
...........................
5-33Bitmap
Indexes
on
Partitioned
Tables..........................................................................
........
5-33Bitmap
Join
Indexes.........................................................................
...............................................
5-33Overview of Index-Organized
Tables..........................................................................
.....................
5-34
Benefits
of
Index-Organized
Tables .........................................................................
...................
5-35Index-Organized
Tables
with
Row
Overflow
Area......................................http://www.wendangwang.com/doc/f6d2729
bbb843fed64cefeb8.............................
5-35Secondary
Indexes
on
Index-Organized
Tables.........................................................................
5-36Bitmap
Indexes
on
Index-Organized
Tables..........................................................................
.....
5-36
Mapping
Table...........................................................................
..............................................
5-36Partitioned Index-Organized
Tables..........................................................................
..................
Index-Organized
5-37B-tree Indexes on UROWID Columns for Heap- and
Tables....................
5-37Index-Organized
Table
Applications....................................................................
.......................
5-37Overview
of
Application
Domain
文档下载 免费文档下载
http://www.wendangwang.com/
Indexes.........................................................................
.............
5-37Overview
of
Clusthttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8ers.................
................................................................................
...........................
5-38Overview
of
Hash
Clusters........................................................................
.........................................
5-406 Dependencies Among Schema
Objects
Introduction
to
Dependency
Issues..........................................................................
............................
6-1Resolution
of
Schema
Object
Dependencies....................................................................
..................
Compilation
6-3
of
Views
and
PL/SQL
Program
Units ....................................................................
Views
and
6-4
Base
Tables..........................................................................
.....................................
6-4Program
Units
and
Referenced
Objects..................................http://www.wendangwang.com/doc/f6d2729b
bb843fed64cefeb8.................................................
6-5Data
Warehousing
Considerations..................................................................
........................
6-5Session
State
and
Referenced
Packages........................................................................
...........
6-5Security
Authorizations..................................................................
...........................................
6-6Object
Name
文档下载 免费文档下载
http://www.wendangwang.com/
Resolution......................................................................
...................................................
6-6Shared SQL Dependency
Management......................................................................
.........................
6-6Local
and
Remote
Dependency
Management......................................................................
..............
6-7
Management
of
Local
Dependencies...............................................http://www.wendangwan
g.com/doc/f6d2729bbb843fed64cefeb8...............................................
6-7Management
of
Remote
Dependencies....................................................................
......................
Dependencies
6-7
Among
Local
and
Procedures.........................................
Remote
Database
6-7Dependencies Among Other
Remote Schema Objects .........................................................
6-9Dependencies
of
Applications ...................................................................
..............................
6-9
7 The Data Dictionary
Introduction
to
the
Data
Dictionary .....................................................................
...............................
Structure
7-1
of
the
Data
Dictionary .....................................................................
................................
7-2
文档下载 免费文档下载
http://www.wendangwang.com/
Base
Tables.......................................................http://www.wendangw
ang.com/doc/f6d2729bbb843fed64cefeb8............................................
................................
7-2User-Accessible
Views...........................................................................
....................................
7-2SYS,
Owner
of
the
Data
Dictionary .....................................................................
...........................
7-2How
the
Data
Dictionary
Is
Used ...........................................................................
.............................
How
7-2
Oracle
Uses
the
Data
Dictionary .....................................................................
......................
7-2
ix
Public
Synonyms
for
Data
Dictionary
Views.........................................................................
7-3Cache
the
Data
Dictionary
for
Fast
Access..........................................................................
....
7-3Other
Programs
and
the
Data
Dictionarhttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8y...............
................................................................
the
7-3How to Use
Data
Dictionary .....................................................................
................................
Views
with
7-3
the
Prefix
文档下载 免费文档下载
http://www.wendangwang.com/
USER............................................................................
..........................
7-4Views
with
the
Prefix
ALL.............................................................................
...........................
7-4Views
with
the
Prefix
DBA.............................................................................
...........................
7-4The
DUAL
Table...........................................................................
..............................................
7-4Dynamic
Performance
Tables .........................................................................
......................................
7-5Database
Object
Metadahttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8ta.................
................................................................................
.....................
7-58 Memory Architecture
Introduction
to
Oracle
Memory
Structures .....................................................................
...................
8-1Overview
of
the
System
Global
Area............................................................................
.......................
The
8-2
SGA_MAX_SIZE
Initialization
Parameter.......................................................................
.......
8-3Automatic
Shared
Memory
Management......................................................................
................
The
8-4
SGA_TARGET
Initialization
Parameter.......................................................................
...
8-5Automatically
Managed
SGA
Components......................................................................
文档下载 免费文档下载
http://www.wendangwang.com/
.....
8-5Manuallhttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8y
Managed
SGA
Components......................................................................
..............
8-6Persistence
of
Automatically
Tuned
Values...........................................................................
8-6Adding
Granules
and
Tracking
Component
Size.........................................................................
8-6Database
Buffer
Cache...........................................................................
............................................
Organization
of
8-7
the
Database
Buffer
Cache ...........................................................................
8-7The
LRU
Algorithm
and
Full
Table
Scans ..........................................................................
....
8-8Size
of
the
Database
Buffer
Cache...........................................................................
.................
8-8Multiple
Buffer
Pools ................................http://www.wendangwang.com/doc/f6d2729bbb8
43fed64cefeb8...................................................................
..............
8-9Redo
Log
Buffer .........................................................................
.....................................................
8-10Shared
Pool ...........................................................................
..........................................................
8-10
Library
Cache...........................................................................
................................................
Private
8-10Shared SQL Areas and
SQL
文档下载 免费文档下载
http://www.wendangwang.com/
Areas...........................................................................
8-10PL/SQL
Program
Units
and
the
Shared
Pool......................................................................
8-11Dictionary
Cache...........................................................................
...........................................
8-11Allocation
Mehttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8mory
and
in
Reuse
the
Pool.........................................................
of
Shared
8-11Large
Pool............................................................................
.............................................................
8-13Java
Pool............................................................................
...............................................................
8-13Streams
Pool............................................................................
.........................................................
SGA’s
8-13Control of the
Use
of
Memory..........................................................................
.................
8-14Other
SGA
Initialization
Parameters......................................................................
......................
8-14
Physical
Memory .........................................................................
................................http://www.wendangwang.com/doc/f6d2729bbb843fed6
4cefeb8...........
8-14SGA
Starting
Address ........................................................................
....................................
8-14Extended
Buffer
Cache
Mechanism ......................................................................
...............
8-14Overview
of
the
Program
Global
Areas...........................................................................
.................
8-14
文档下载 免费文档下载
http://www.wendangwang.com/
Content
of
the
PGA ............................................................................
............................................
8-15
Private
SQL
Area............................................................................
..........................................
8-15Session
Memory..........................................................................
.............................................
8-16SQL
Work
Areas.......................................................................http
://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8.............................
..........................
8-16PGA
Memory
Management
for
Dedicated
Mode......................................................................
8-16x
Dedicated
and
Shared
Servers.........................................................................
...................................
8-18Software
Code
Areas ..........................................................................
.................................................
8-189 Process Architecture
Introduction
to
Processes ......................................................................
.................................................
9-1
Multiple-Process
Oracle
Systems ........................................................................
............................
9-1Types
of
Processes ......................................................................
文档下载 免费文档下载
http://www.wendangwang.com/
..........................................http://www.wendangwang.com/doc/f6d2729
bbb843fed64cefeb8.............
9-2Overview
of
User
Processes.......................................................................
............................................
9-3
Connections
and
Sessions .......................................................................
.........................................
9-3Overview
of
Oracle
Processes.......................................................................
.........................................
9-3
Server
Processes.......................................................................
..........................................................
9-3Background
Processes.......................................................................
................................................
Database
9-4
Writer
Process
(DBWn) .........................................................................
...................
9-6Log
Writer
Process
(LGWR) .........http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8.........
................................................................................
...
9-6Checkpoint
Process
(CKPT) .........................................................................
............................
9-8System
Monitor
Process
(SMON) .........................................................................
...................
9-8Process
Monitor
Process
(PMON) .........................................................................
..................
9-8Recoverer
Process
(RECO) .........................................................................
文档下载 免费文档下载
http://www.wendangwang.com/
...............................
9-9Job
Queue
Processes.......................................................................
............................................
9-9Archiver
Processes
(ARCn) .........................................................................
..........................
9-10Queue
Monitor
Processes
(QMNn) ....................http://www.wendangwang.com/doc/f6d2729bbb843fed64cefe
b8..................................................................
9-10Other
Background
Processes.......................................................................
...........................
9-10Trace
Files
and
the
Alert
Log ............................................................................
............................
9-11Shared
Server
Architecture ...................................................................
..............................................
Dispatcher
Request
9-11
and
Response
Queues .........................................................................
.......
9-12
Dispatcher
Processes
(Dnnn)..........................................................................
........................
9-14Shared
Server
Processes
(Snnn)..........................................................................
...................
9-14Restricted
Operations
of
the
Shared
Server ..http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8................
.............................................................
9-15Dedicated
Server
Configuration ..................................................................
.....................................
9-15The
Program
Interface ......................................................................
文档下载 免费文档下载
http://www.wendangwang.com/
...................................................
9-17
Program
Interface
Structure ......................................................................
...................................
9-17Program
Interface
Drivers ........................................................................
....................................
9-17Communications
Software
for
the
Operating System ..............................................................
9-1810 Application Architecture
Introduction
to
Client/Server
Architecture....................................................................
..............http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8....
10-1Overview
of
Multitier
Architecture ...................................................................
...............................
10-3
Clients.........................................................................
......................................................................
10-4Application
Servers.........................................................................
................................................
10-4Database
Servers.........................................................................
....................................................
10-4Overview of Oracle Net
Services........................................................................
...............................
How
Oracle
10-5
Net
Services
Works...........................................................................
........................10-5The
文档下载 免费文档下载
http://www.wendangwang.com/
Listener ....................................http://www.wendangwang.com/doc/f6d2
729bbb843fed64cefeb8............................................................
.....................................
10-6
Service
Information
Registration....................................................................
.......................
10-6
xi
11 Oracle Utilities
Introduction
to
Oracle
Utilities ......................................................................
...................................
11-1Overview of Data Pump Export and
Import..........................................................................
..........
11-2Data
Pump
Export..........................................................................
.................................................
11-2Data
Pump
Import..........................................................................
................................................
11-2Overview of the Data Pump
API.......................................................http://www.wendangwang
.com/doc/f6d2729bbb843fed64cefeb8...............................................
..
11-2Overview
of
the
Metadata
API.............................................................................
..............................
11-2Overview
of
SQL*Loader......................................................................
..............................................
11-3Overview
of
External
Tables..........................................................................
.....................................
11-3Overview
of
文档下载 免费文档下载
http://www.wendangwang.com/
LogMiner........................................................................
.................................................
11-4Overview of DBVERIFY
Utility.........................................................................
................................Overview
of
DBNEWID
Utility.........................................................................
................................12
Database
and
Instance
Startup
and
Shutdowhttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8n
Introduction
to
an
Oracle
Instance .......................................................................
............................The
Instance
and
the
Database .......................................................................
..............................Connection
with
Administrator
Privileges .....................................................................
...........Initialization
Parameter
Files
and
Server
Parameter
Files........................................................How Parameter Values
Are
Changed.........................................................................
..........
Overview
of
Instance
and
Database
Startup ........................................................................
..........How
an
Instance
Is
Started.........................................................................
...................................
Restricted
Mode
of
Instance
Startup.......http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8...........
...................................................................
文档下载 免费文档下载
http://www.wendangwang.com/
Forced
Startup
in
Abnormal
Situations......................................................................
..........
How
a
Database
Is
Mounted.........................................................................
................................How a Database Is Mounted with Real Application
Clusters..........................................
How
a
Standby
Database
Is
Mounted.........................................................................
.........
How
a
Clone
Database
Is
Mounted.........................................................................
..............
What
Happens
When
You
Open
a
Database........................................................................
......
Instance
Recovery........................................................................
.........................http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8
...................
Undo
Space
Acquisition
and
Management......................................................................
....
文档下载 免费文档下载
http://www.wendangwang.com/
Resolution
of
In-Doubt
Distributed
Transaction.................................................................
Open
a
Database
in
Read-Only
Mode ...........................................................................
......
Overview
of
Database
and
Instance
Shutdown........................................................................
......Close
a
Database .......................................................................
......................................................
Close
the
Database
by
Terminating
the
Instance................................................................
Unmount
a
Database .......................................................................
..............................................Shut
Down
an
Instancehttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8 ................
................................................................................
..................
Abnormal
Instance
Shutdown........................................................................
.......................
Part III Oracle Database Features
13 Data Concurrency and Consistency
文档下载 免费文档下载
http://www.wendangwang.com/
Introduction
to
Data
Concurrency
Environment..................Preventable
and
Consistency
Phenomena
and
in
a
Transaction
Multiuser
Isolation
Levels .....................................................Overview of Locking
Mechanisms......................................................................
.........................How
Oracle
Manages
Data
Concurrency
and
Consistency..........................................................xii11-411-5
12-112-212-212-312-312-412-412-412-412-412-512-512-512-612-612-612-612-612-712-7
12-712-812-812-813-113-213-213-3
Multiversion
Concurrency
Control
http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8.........................
....................................................................
13-3Statement-Level
Read
Consistency ....................................................................
.........................
13-4Transaction-Level
Read
Consistency ....................................................................
......................
13-4Read
Consistency
with
Real
Application
Clusters.....................................................................
13-4Oracle
Isolation
Levels .........................................................................
.........................................
Set
13-5
the
Isolation
Level ..........................................................................
...................................
13-5Read
Committed
Isolation.......................................................................
...............................
13-5Serializable
Isolation.......http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8.........
................................................................................
文档下载 免费文档下载
http://www.wendangwang.com/
................
13-6Comparison
of
Read
Committed
Isolation ...................................................
and
Serializable
13-7
Transaction
Set
Consistency.....................................................................
..............................
13-7Row-Level
Locking.........................................................................
.........................................
13-8Referential
Integrity.......................................................................
..........................................
13-8Distributed
Transactions....................................................................
.....................................
13-9Choice
of
Isolation
Level ..........................................................................
.....................................
Read
13-9
Cohttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8mmitted
Isolation.......................................................................
...............................
13-9Serializable
Isolation.......................................................................
.......................................
13-10Quiesce
Database........................................................................
...........................................
13-11How
Oracle
Locks
Data............................................................................
..........................................
Transactions
13-12
and
Data
Concurrency ....................................................................
.....................
Modes
13-12
of
文档下载 免费文档下载
http://www.wendangwang.com/
Locking.........................................................................
..........................................
13-13Lock
Duration........................................................................
..................http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8.......
........................
13-13Data
Lock
Conversion
Versus
Lock
Escalation.................................................................
13-13Deadlocks .................................................................
.....................................................................
13-14
Deadlock
Detection.......................................................................
.........................................
13-14Avoid
Deadlocks.......................................................................
.............................................
13-15Types
of
Locks ..........................................................................
....................................................
13-15DML
Locks ..........................................................................
..........................................................
13-15
Row
Locks
(TX)............................http://www.wendangwang.com/doc/f6d2729bbb843fed6
4cefeb8.........................................................................
.................
13-16Table
Locks
(TM)............................................................................
.......................................
for
DML
13-16DML Locks Automatically Acquired
Statements.............................................
13-19DDL
Locks...........................................................................
...........................................................
Exclusive
13-21
DDL
文档下载 免费文档下载
http://www.wendangwang.com/
Locks...........................................................................
..................................
13-21Share
DDL
Locks...........................................................................
.........................................
13-22Breakable
Parse
Locks...........................................................................
................................
13-22Duration
of
DDL
Locks...........http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8.........
................................................................................
.....
13-22DDL
Locks
and
Clusters........................................................................
...............................
13-22Latches
and
Internal
Locks ..........................................................................
...............................
13-22
Latches.........................................................................
............................................................
13-22Internal
Locks...........................................................................
..............................................
13-23Explicit (Manual) Data
Locking ........................................................................
.........................
13-23Oracle
Lock
Management
Services........................................................................
.....................
13-24Ohttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8verview
of
Oracle
Flashback
Query...........................................................................
..................
13-24
Flashback
Query
Benefits........................................................................
.....................................
13-25Some
Uses
of
Flashback
文档下载 免费文档下载
http://www.wendangwang.com/
Query...........................................................................
........................
13-2614 Manageability
Installing
Oracle
and
Getting
Started.........................................................................
......................
14-1
xiii
Simplified
Database
Creation........................................................................
................................
14-2Instant
Client..........................................................................
..........................................................
14-2Automated
Upgrades..........................http://www.wendangwang.com/doc/f6d2729bbb843fe
d64cefeb8.......................................................................
....................
14-2Basic
Initialization
Parameters......................................................................
................................
14-2Data
Loading,
Transfer,
and
Archiving.......................................................................
................
14-3Intelligent
Infrastructure..................................................................
...................................................
14-3
Automatic
Workload
Repository......................................................................
............................
14-3Automatic
Maintenance
Tasks...........................................................................
...........................
14-4Server-Generated
Alerts..........................................................................
文档下载 免费文档下载
http://www.wendangwang.com/
.......................................
14-4Advhttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8isor
Framework.......................................................................
.................................................
14-4Performance Diagnostic
and
Troubleshooting.................................................................
...............
14-5Application
and
SQL
Tuning..........................................................................
....................................
14-6Memory
Management......................................................................
....................................................
14-7Space
Management......................................................................
.........................................................
14-9
Automatic
Undo
Management......................................................................
...............................
14-9Oracle-Managed
Files.........................................................................ht
tp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8...........................
...............
14-10Free
Space
Management......................................................................
.........................................
14-10Proactive
Space
Management......................................................................
................................
14-10Intelligent
Capacity
Planning........................................................................
..............................
14-10Space
Reclamation.....................................................................
...................................................
14-11Storage
Management......................................................................
....................................................
14-12Backup
and
文档下载 免费文档下载
http://www.wendangwang.com/
Recovery........................................................................
.................................................
14-12
Recovery
Manager.............http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8.....
................................................................................
......................
14-13Mean
Time
to
Recovery........................................................................
........................................
14-14Self
Service
Error
Correction......................................................................
.................................
14-14Configuration
Management......................................................................
........................................
14-14Workload
Management......................................................................
................................................
14-15
Overview
Database
of
the
Resource
Manager..........................................................................
14-15
Database
Resource
Manager
Concepts........................................................................
.......
14-http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb816Overview
of
Services........................................................................
............................................
Workload
14-17
Management
with
Services........................................................................
........
14-17High
Availability
with
文档下载 免费文档下载
http://www.wendangwang.com/
Services........................................................................
...................
14-18Automatic
Storage
Management......................................................................
................................
Basic
Concepts
14-19
Automatic
Storage
Management
....................................................................
14-20
Disk
Groups..........................................................................
..................................................
14-20Automatic
Storage
Management
Files...........................................................................
.....
http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb814-20Automatic
Storage
Management
Templates......................................................................
14-21Automatic
Storage
Management
Disks...........................................................................
...
14-21Failure
Groups..........................................................................
..............................................
14-22Automatic
Storage
Management
Instances........................................................................
14-22Benefits
of
Using
Automatic
Storage
Management.................................................................
14-23Oracle
Scheduler.......................................................................
..........................................................
14-24
文档下载 免费文档下载
http://www.wendangwang.com/
What
Can
the
Scheduler
Do?.............................................................................
..........................
14-24
Schedule
Job
Exhttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8ecution................
................................................................................
.........
14-25Time-based
scheduling......................................................................
...................................
14-25Event-Based
Scheduling......................................................................
..................................
14-25Define
Multi-Step
Jobs............................................................................
..............................
14-25
xiv
Schedule
Job
Processes
that
Requirements...........................................
Model
Business
14-25Manage and Monitor
Jobs............................................................................
........................
14-25Execute
and
Manage
Jobs
Environment...................................................
in
a
Clustered
14-26
15 Backup and Recovery
Introductihttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8on
to
Backup..........................................................................
..............................................
Consistent
and
15-1
Inconsistent
文档下载 免费文档下载
http://www.wendangwang.com/
Backups.........................................................................
..................
15-2
Overview
of
Consistent
Backups.........................................................................
..................
15-2Overview
of
Inconsistent
Backups.........................................................................
...............
15-3Whole
Database
and
Partial
Database
Backups.........................................................................
15-3
Whole
Database
Backups.........................................................................
...............................
15-4Tablespace
Backups.........................................................................
........................................
http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8
15-4Datafile
Backups.........................................................................
..............................................
15-4RMAN
and
User-Managed
Backups.........................................................................
...................
15-5
RMAN
with
Online
Backups.........................................................................
........................
15-5Control
File
Backups.........................................................................
......................................
15-5Archived
Redo
Log
Backups.........................................................................
.........................
15-6Introduction
to
Recovery........................................................................
文档下载 免费文档下载
http://www.wendangwang.com/
.............................................
Overview
15-6
of
Media
Recovery........................................................................
.......http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8..................
.......
15-8
Complete
Recovery........................................................................
..........................................
15-8Incomplete
Recovery........................................................................
.......................................
15-8Datafile
Media
Recovery........................................................................
...............................
15-10Block
Media
Recovery........................................................................
...................................
15-11Overview of RMAN and User-Managed
Restore and Recovery...........................................
RMAN
15-11
Restore
and
Recovery........................................................................
......................
15-11User-Managed
Restore
and
Recovery........................................................................
.........
http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb815-11Recovery
Using
Oracle
Flashback
Technology......................................................................
...
15-12
Overview
of
Oracle
Flashback
Database........................................................................
....
15-12Overview
of
Oracle
Flashback
文档下载 免费文档下载
http://www.wendangwang.com/
Table...........................................................................
.......
15-13Other
Types
of
Oracle
Recovery........................................................................
.........................
15-14
Overview
of
Redo
Application.....................................................................
.......................
15-14Overview
of
Instance
and
Crash
Recovery........................................................................
15-15Deciding
Which
Recovery
Technique
to
Use.............................................................................
....
15-16
When
to
Use
Media
Recovery.....http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8............
................................................................................
....
15-16When
to
Use
Oracle
Flashback.......................................................................
.............................
15-17When
to
Use
CREATE
TABLE
AS
SELECT
Recovery.............................................................
15-17When
to
Use
Import/Export
Utilities
Recovery.......................................................................
15-18When
to
Use
Tablespace
Point-in-Time
Recovery...................................................................
15-18Flash
Recovery
Area............................................................................
................................................
Flash
Recovery
15-18
Area
Disk
Limit...........................................................................
文档下载 免费文档下载
http://www.wendangwang.com/
......................
Introduction
to
15-1916 Business Intelligence
Datahttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8
Warehousing
and
Business
Intelligence.....................................................
Characteristics
16-1
of
Data
Warehousing.....................................................................
......................
16-1
Subject
Oriented........................................................................
...............................................
16-2Integrated..................................................................
................................................................
16-2
xv
Nonvolatile.....................................................................
..........................................................
16-2Time
Variant.........................................................................
....................................................
Data
Warehouse
16-2Differences Between
and
OLTP
Systems...........................................http://www.wendangwang.com/doc
/f6d2729bbb843fed64cefeb8...........
16-2
Workload........................................................................
...........................................................
16-2Data
Modifications...................................................................
................................................
16-2Schema
文档下载 免费文档下载
http://www.wendangwang.com/
Design..........................................................................
...............................................
16-3Typical
Operations......................................................................
.............................................
16-3Historical
Data............................................................................
..............................................
16-3Data
Warehouse
Architecture....................................................................
...................................
Data
16-3
Warehouse
Architecture
(Basic)........................http://www.wendangwang.com/doc/f6d2729bbb843fed64
cefeb8...........................................................
Warehouse
a
Staging
Area).........................................................
16-4Data
Warehouse
Architecture
Architecture
(with
16-3Data
(with
Marts).............................
a
Staging
Area
and
Data
16-5Overview of Extraction, Transformation,
and Loading (ETL)......................................................
16-6
Transportable
Tablespaces.....................................................................
........................................
16-7Table
Functions.......................................................................
.........................................................
16-7External
Tables..........................................................................
......................................................
16-8Table
Compression.....................................................................
...........http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8..............
...........................
16-8Change
Data
Capture.........................................................................
............................................
16-9Overview of Materialized Views
文档下载 免费文档下载
http://www.wendangwang.com/
for
Data
Warehouses.................................................................
16-9Overview
of
Bitmap
Indexes
in
Data
Warehousing.....................................................................
16-10Overview
of
Parallel
Execution.......................................................................
.................................
How
16-11
Parallel
Execution
Works...........................................................................
........................
16-11Overview
of
Analytic
SQL.............................................................................
...................................
16-12
SQL
for
Aggregation.................................................http://www.wendangwa
ng.com/doc/f6d2729bbb843fed64cefeb8.............................................
.......................
16-13SQL
for
Analysis........................................................................
....................................................
16-13SQL
for
Modeling........................................................................
..................................................
16-14Overview
of
OLAP
Capabilities....................................................................
...................................
Benefits
of
16-14
OLAP
and
RDBMS
Integration.....................................................................
..........
16-14
Scalability.....................................................................
文档下载 免费文档下载
http://www.wendangwang.com/
...........................................................
16-15Availability...............................................................
...............................................................
16http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8-15Manageability.......
................................................................................
..................................
16-15Backup
and
Recovery........................................................................
....................................
16-15Security...................................................................
.................................................................
16-16Overview
of
Data
Mining..........................................................................
........................................
16-1617 High Availability
Introduction
to
High
Availability....................................................................
..................................
17-1Overview
of
Unplanned
Downtime........................................................................
..........................
Oracle
17-1
Solutions
to
System
Failures....................http://www.wendangwang.com/doc/f6d2729bbb843fed64cef
eb8.........................................................................17-1
Overview
of
Fast-Start
Fault
Recovery .......................................................................
.........
17-2Overview
of
Real
Application
Clusters........................................................................
........
17-2Oracle
Solutions
to
Data
Failures........................................................................
文档下载 免费文档下载
http://www.wendangwang.com/
..........................
Overview
of
17-2
Backup
and
Recovery
Features
Availability.................................
for
High
17-2Overview
of
Partitioning ...................................................................
....................................17-3Overview
of
Transparent
Application
Failover..................................................................
17-4Oracle
Solutions
to
Disasters.......................................................................
..........http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8...............
.........
17-5
Overview
of
Oracle
Data
Guard...........................................................................
.................
17-5
xvi
Oracle
Solutions
to
Human
Errors..........................................................................
.....................
Overview
17-6
of
Oracle
Flashback
Features........................................................................
.......
17-7Overview
of
LogMiner........................................................................
....................................17-7Overview of Security Features for High
Availability.........................................................
17-8Overview
of
Planned
Downtime........................................................................
文档下载 免费文档下载
http://www.wendangwang.com/
...............................
17-8
System
Maintenance.....................................................................
....http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8.....................
.........................
17-8Data
Maintenance.....................................................................
......................................................
17-9Database
Maintenance.....................................................................
...............................................
17-918 Partitioned Tables and
Indexes
Introduction
to
Partitioning....................................................................
............................................
18-1
Partition
Key.............................................................................
.......................................................
18-3Partitioned
Tables..........................................................................
.................................................
18-3Partitioned
Index-Organized
Tables.....................................................................http:
//www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8.......................
18-3Overview
of
Partitioning
Methods.........................................................................
...........................
18-3
Range
Partitioning....................................................................
文档下载 免费文档下载
http://www.wendangwang.com/
......................................................
18-4
Range
Partitioning
Example.........................................................................
..........................
18-5List
Partitioning....................................................................
...........................................................
18-5
List
Partitioning
Example.........................................................................
..............................18-5Hash
Partitioning....................................................................
........................................................
18-6
Hash
Partitioning
Example.http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8.................
................................................................................
..
18-6Composite
Partitioning....................................................................
..............................................
Composite
18-7
Partitioning
Range-Hash
Example....................................................................
18-7Composite
Partitioning
Range-List
Example......................................................................
18-8When
to
Partition
a
Table...........................................................................
...................................
18-9Overview
of
Partitioned
Indexes.........................................................................
..............................
18-9
文档下载 免费文档下载
http://www.wendangwang.com/
Local
Partitioned
Indexes.........................................................................
....................................
18-10Global
Partitionehttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8d
Indexes.........................................................................
.................................
Global
18-10
Range
Partitioned
Indexes.........................................................................
..............
18-10Global
Hash
Partitioned
Indexes.........................................................................
................
18-11Maintenance
of
Global
Partitioned
Indexes.......................................................................
18-11Global
Nonpartitioned
Indexes.........................................................................
..........................
18-12Miscellaneous Information about Creating Indexes
on Partitioned Tables.........................
18-12Using Partitioned Indexes in
OLTP
Applications....................................................................
18-13Using
Partitioned
Indexes
in
Data
Warehousing
and
DSS
Applications..........http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8...
................
18-13Partitioned
Indexes
on
Composite
Partitions......................................................................
.....
18-13Partitioning
to
Improve
Performance.....................................................................
.........................
18-13
Partition
Pruning.........................................................................
文档下载 免费文档下载
http://www.wendangwang.com/
..................................................
18-13
Partition
Pruning
Example.........................................................................
..........................
18-14Partition-wise
Joins...........................................................................
............................................
18-14Parallel
DML.............................................................................
.....................................................
18-1419
Content
Management
Introduction
to
Content
Manhttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8agement...............
................................................................................
19-1Overview
of
XML
in
Oracle..........................................................................
......................................
19-2Overview
of
LOBs............................................................................
.....................................................
19-3
xvii
Overview
of
Oracle
Text............................................................................
...........................................
Oracle
19-3
Text
Index
Types...........................................................................
......................................
19-4Oracle
Text
Document
Services........................................................................
文档下载 免费文档下载
http://www.wendangwang.com/
............................
19-4Oracle
Text
Query
Package.....................................................http://www.wendangwa
ng.com/doc/f6d2729bbb843fed64cefeb8.............................................
..........
19-4Oracle
Text
Advanced
Features........................................................................
............................
19-4Overview
of
Oracle
Ultra
Search..........................................................................
..............................
19-5Overview
of
Oracle
interMedia......................................................................
....................................
19-5Overview
of
Oracle
Spatial.........................................................................
........................................
Introduction
19-620 Database Security
to
Database
Security........................................................................
.............................
Database
20-1
Users
and
Schemas.........................................................................
...............................
20-http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb81
Security
Domain .........................................................................
.............................................
20-1Privileges..................................................................
........................................................................
20-2Roles.......................................................................
...........................................................................
20-2Storage
Settings
and
文档下载 免费文档下载
http://www.wendangwang.com/
Quotas..........................................................................
................................
20-2
Default
Tablespace .....................................................................
.............................................
20-2Temporary
Tablespace .....................................................................
......................................20-2Tablespace
Quotas.........................................http://www.wendangwang.com/doc/f6
d2729bbb843fed64cefeb8..........................................................
................
20-2Profiles
and
Resource
Limits..........................................................................
........................
20-2Overview
of
Transparent
Data
Encryption......................................................................
................
20-3Overview
of
Authentication
Methods ........................................................................
.....................
20-4
Authentication
by
the
Operating
System .........................................................................
..........
20-4Authentication
by
the
Network ........................................................................
...........................
20-4
Third
Party-Based
Authentication
Technologies................................................................
20-5Public-Key-Infrastructure-Based
Authentication.................http://www.wendangwang.com/doc/f6d2729bbb843fed64
cefeb8...............................................
20-5Remote
Authentication..................................................................
文档下载 免费文档下载
http://www.wendangwang.com/
.........................................20-5Authentication
by
the
Oracle
Database .......................................................................
...............
20-5
Password
Encryption......................................................................
........................................
20-6Account
Locking ........................................................................
.............................................
20-6Password
Lifetime
and
Expiration .....................................................................
..................
20-6Password
Complexity
Verification ...................................................................
....................
20-6Multitier
Authentication
and
Authorization .............................................http://www.wendangwan
g.com/doc/f6d2729bbb843fed64cefeb8................................
20-7Authentication
by
the
Secure
Socket
Layer
Protocol.................................................................
20-7Authentication
of
Database
Administrators .................................................................
.............
20-7Overview
of
Authorization ..................................................................
..............................................
User
Resource
20-8
Limits
and
Profiles........................................................................
........................
Types
of
20-9
System
Resources
and
Limits .........................................................................
.......
文档下载 免费文档下载
http://www.wendangwang.com/
20-9Profiles ...................................................................
.................................................................
20-11Introduction
to
Privileges.........................................................http://www.we
ndangwang.com/doc/f6d2729bbb843fed64cefeb8......................................
.............
20-11
System
Privileges......................................................................
.............................................
20-12Schema
Object
Privileges......................................................................
................................
20-12Introduction
to
Roles...........................................................................
.........................................
Common
20-12
Uses
for
Roles ..........................................................................
.............................
20-13Role
Mechanisms......................................................................
.............................................
20-14The Operating System and
Roles ..........................................................................
..............
20-14Secure
Application
Roles.........................http://www.wendangwang.com/doc/f6d2729bbb843fed64c
efeb8...........................................................................
.........
Overview
20-15xviii
of
Access
Restrictions
Rows................................
Fine-Grained
on
Tables,
Views,
Synonyms,
or
20-15
Access
文档下载 免费文档下载
http://www.wendangwang.com/
Control.........................................................................
..............................
20-15
Dynamic
Predicates .....................................................................
.........................................
20-16Application
Context.........................................................................
.............................................
20-16
Dynamic
Contexts........................................................................
..........................................
20-16Fine-Grained
Auditing........................................................................
.........................................
20-17Ohttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8verview of Security
Policies .......................................................................
...................................
20-17
System
Security
Policy..........................................................................
.......................................
20-18
Database
User
Management......................................................................
...........................
20-18User
Authentication..................................................................
.............................................
20-18Operating
System
Security........................................................................
...........................
20-18Data
Security
Policy..........................................................................
文档下载 免费文档下载
http://www.wendangwang.com/
............................................
20-18User
Security
Policy..........................................................................
http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8.........................
...................
20-19
General
User
Security........................................................................
....................................
20-19End-User
Security........................................................................
..........................................
20-19Administrator
Security........................................................................
..................................
20-20Application
Developer
Security........................................................................
...................
20-20Application
Administrator
Security........................................................................
............
20-21Password
Management
Policy..........................................................................
..........................
20-21Auditing
Policy...................................................................http://
www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8................................
...........................
20-21Overview
of
Database
Auditing........................................................................
...............................
Types
20-21
and
Records
of
Auditing........................................................................
..........................
Audit
Records
20-22
and
the
Audit
Trails..........................................................................
文档下载 免费文档下载
http://www.wendangwang.com/
..........
20-23
21 Data Integrity
Introduction
to
Data
Integrity.......................................................................
......................................
Types
21-1
of
Data
Integrity ......................................................................
............................................
21-3
Null
Rule............................................................................
........................http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8.
..............................
21-3Unique
Column
Values..........................................................................
.................................
21-3Primary
Key
Values..........................................................................
.......................................
21-3Referential
Integrity
Rules...........................................................................
...........................
21-3Complex
Integrity
Checking........................................................................
..........................
21-3How
Oracle
Enforces
Data
Integrity ......................................................................
.....................
Integrity
21-3
Constraints
Description.....................................................................
.....................
21-4Database
文档下载 免费文档下载
http://www.wendangwang.com/
Triggers........................................................................
......http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8...................
...................
21-4Overview
of
Integrity
Constraints.....................................................................
................................
21-4
Advantages
of
Integrity
Constraints ....................................................................
.......................
21-5
Declarative
Ease............................................................................
...........................................
21-5Centralized
Rules...........................................................................
..........................................
21-5Maximum Application Development
Productivity............................................................
21-5Immediate
User
Feedback........................................................................
..............................
21-5Superior
Performance...........................................................http://www
.wendangwang.com/doc/f6d2729bbb843fed64cefeb8...................................
................
21-5Flexibility for Data Loads and Identification of Integrity
Violations...............................
21-6The Performance Cost of Integrity
Constraints ....................................................................
.....
21-6Types
of
Integrity
Constraints.....................................................................
.......................................
NOT
NULL
21-6
Integrity
Constraints ....................................................................
文档下载 免费文档下载
http://www.wendangwang.com/
............................
21-6UNIQUE
Key
Integrity
Constraints ....................................................................
........................
21-7
xix
Unique
Keys............................................................................
..................................................
21-7UNIQUE Key Constraints
and
Indexes................................http://www.wendangwang.com/doc/f6d2729bbb
843fed64cefeb8................................................
21-8Combine
UNIQUE Key and NOT NULL Integrity Constraints.......................................
21-9PRIMARY
KEY
Integrity
Constraints ....................................................................
.....................
21-9
Primary
Keys............................................................................
................................................
21-9PRIMARY KEY Constraints
and
Indexes.........................................................................
..
21-10Referential
Integrity
Constraints ....................................................................
............................
21-10
Self-Referential
Integrity
Constraints.....................................................................
.............
21-12Nulls
and
Foreign
Keys............................................................................
文档下载 免费文档下载
http://www.wendangwang.com/
................http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8.........
....
21-13Actions
Defined
by
Referential
Integrity
Constraints......................................................
21-13Concurrency
Control,
Indexes,
and
Foreign
Keys............................................................
21-14CHECK
Integrity
Constraints ....................................................................
.................................
21-16
The
Check
Condition.......................................................................
......................................
21-16Multiple
CHECK
Constraints.....................................................................
.........................
21-17The
Mechanisms
of
Constraint
Checking........................................................................
..............
Default
Checking
21-17
Column
Values
and
Integrity
.................................................
Constraint
21-19Deferred
Constraint
Checking...http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8..............
................................................................................
.........
21-19
Constraint
Attributes .....................................................................
..............................................
21-19SET
CONSTRAINTS
Mode ...........................................................................
.............................
21-19Unique
Constraints
and
Indexes ........................................................................
文档下载 免费文档下载
http://www.wendangwang.com/
........................
21-20Constraint
States..........................................................................
........................................................
21-20
Constraint
State
Modification....................................................................
..................................
21-2122 Triggers
Introduction
to
Triggers..............................................................http://www
.wendangwang.com/doc/f6d2729bbb843fed64cefeb8...................................
.....................
22-1
How
Triggers
Are
Used ...........................................................................
.....................................
Some
22-2
Cautionary
Notes
about
Triggers .......................................................................
.......
Constraints
22-3Triggers
Compared
with
Declarative
.............................................
Integrity
22-4Parts
of
a
Trigger.........................................................................
...........................................................
The
Triggering
Event
22-5
or
Statement ......................................................................
.......................
22-5Trigger
Restriction.....................................................................
.....................................................
22-6Trigger
Action .........................http://www.wendangwang.com/doc/f6d2729bbb843fed6
文档下载 免费文档下载
http://www.wendangwang.com/
4cefeb8.........................................................................
...............................
22-6Types
of
Triggers........................................................................
...........................................................
Row
Triggers
22-7
and
Statement
Triggers .......................................................................
.................
22-7
Row
Triggers .......................................................................
....................................................
22-7Statement
Triggers .......................................................................
...........................................
22-7BEFORE
and
AFTER
Triggers .......................................................................
...............................22-7
BEFORE
Triggers .......................................................................
................http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8.........
....................
22-8AFTER
Triggers .......................................................................
................................................
22-8Trigger
Type
Combinations ...................................................................
...............................
22-8INSTEAD
OF
Triggers .......................................................................
............................................
22-9
Modify
Views ..........................................................................
文档下载 免费文档下载
http://www.wendangwang.com/
................................................
22-9Views
That
Are
Not
Modifiable .....................................................................
.......................
22-9INSTEAD
OF
Triggers
on
Nested
Tables ..........................................................................
22-10Triggers
on
System
Events
and
User
Events .....................................................http://www.wendangwa
ng.com/doc/f6d2729bbb843fed64cefeb8.......................
22-10
Event
Publication ....................................................................
..............................................
22-11Event
Attributes .....................................................................
...............................................
22-11
xx
System
Events .........................................................................
...............................................
22-11User
Events .........................................................................
...................................................
22-11Trigger
Execution.......................................................................
..........................................................
The
Execution
Checking
Model
for
Triggers
and
...............................
22-12
Integrity
22-13Data
Constraint
Access
for
Triggers ....................http://www.wendangwang.com/doc/f6d2729bbb843fed64ce
feb8............................................................................
.............
22-14Storage
of
PL/SQL
Triggers........................................................................
文档下载 免费文档下载
http://www.wendangwang.com/
................................
22-15Execution
of
Triggers .......................................................................
............................................
22-15Dependency Maintenance for
Triggers .......................................................................
..............
22-15Part IV Oracle Database Application Development
23 Information Integration
Introduction
to
Oracle
Information
Integration.....................................................................
.........
23-1Federated
Access..........................................................................
..........................................................
23-2
Distributed
SQL................................http://www.wendangwang.com/doc/f6d2729bbb843f
ed64cefeb8......................................................................
.........................
23-2Location
Transparency....................................................................
...............................................
23-2SQL
and
COMMIT
Transparency....................................................................
.............................
23-3Distributed
Query
Optimization....................................................................
..............................23-3Information
Sharing.........................................................................
....................................................
23-4
Oracle
Streams.........................................................................
........................................................
23-4
文档下载 免费文档下载
http://www.wendangwang.com/
Oracle
Streams
Architecture....................................................................
.....................http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8....
......
23-5Replication
with
Oracle
Streams.........................................................................
...................
23-6Oracle
Streams
Advanced
Queuing.........................................................................
.............
23-8Database
Change
Notification....................................................................
...........................
23-9Change
Data
Capture.........................................................................
...................................
23-10Heterogeneous
Environments....................................................................
.........................
23-10Oracle
Streams
Use
Cases...........................................................................
..........................
23-10Materialized
Views...........................................................................
............................................
23-12Intehttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8grating
Non-Oracle
Systems.........................................................................
.............................
23-12
Generic
Connectivity....................................................................
................................................
23-12Oracle
Transparent
Gateways........................................................................
.............................
23-1324 SQL, PL/SQL, and Java
文档下载 免费文档下载
http://www.wendangwang.com/
Overview
of
SQL.............................................................................
......................................................
24-1
SQL
Statements......................................................................
..........................................................
Data
24-2
Manipulation
Language
Statements......................................................................
......
24-2Data
Definition
Language
Statements........http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8.......
...................................................................
24-3Transaction
Control
Statements......................................................................
.......................
24-3Session
Control
Statements......................................................................
..............................
24-4System
Control
Statements......................................................................
...............................
24-4Embedded
SQL
Statements......................................................................
..............................
24-4Cursors.....................................................................
.........................................................................
24-4
Scrollable
Cursors.........................................................................
...........................................
24-5Shared
SQL ....................http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8.
................................................................................
文档下载 免费文档下载
http://www.wendangwang.com/
.................................
24-5Parsing ....................................................................
.........................................................................
24-5SQL
Processing......................................................................
..........................................................
24-6
xxi
SQL
Statement
Execution.......................................................................
................................
24-6DML
Statement
Processing .....................................................................
..............................
24-7DDL
Statement
Processing .....................................................................
.............................
24-10Control
of
Transactions....................................................................
..........http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8...............
............
24-11Overview
of
the
Optimizer.......................................................................
...................................
24-11
Execution
Plans...........................................................................
...........................................
24-11Overview
of
Procedural
Languages.......................................................................
..........................
Overview
24-12
of
PL/SQL..........................................................................
文档下载 免费文档下载
http://www.wendangwang.com/
..........................................
24-12
How
PL/SQL
Runs ...........................................................................
....................................
24-13Language
Constructs
for
PL/SQL .........................................................................
.............
24-15PL/SQL
Program
Units.........................................http://www.wendangwang.com/doc/f6d
2729bbb843fed64cefeb8...........................................................
....
24-16Stored
Procedures
and
Functions ......................................................................
.................
24-16PL/SQL
Packages .......................................................................
..........................................
24-20PL/SQL
Collections
and
Records.........................................................................
...............
24-23PL/SQL
Server
Pages...........................................................................
.................................
24-23Overview
of
Java............................................................................
...............................................
Java
and
24-24
Object-Oriented
Programming
Terminology....................................................
24-24Class
Hierarchy.....................................................................ht
tp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8...........................
......................
24-26Interfaces.................................................................
................................................................
24-27Polymorphism...............................................................
.........................................................
24-27Overview of the
文档下载 免费文档下载
http://www.wendangwang.com/
Java
Virtual
Machine
(JVM)....................................................................
24-28Why
Use
Java
in
Oracle?.........................................................................
..............................
24-29Oracle’s
Java
Application
Strategy........................................................................
..............
24-32
25 Overview of Application Development Languages
Introduction
to
Oracle
Application
Development
Languages.....................................................
25-1Overview of
C/C
Programming
Languaghttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8es................
.................................................................
Overview
of
Oracle
25-1
Call
Interface
(OCI)...........................................................................
..........
25-2Overview
of
Oracle
C
Call
Interface
(OCCI)..........................................................................
25-3
OCCI
Associative
Relational
and
Object
Interfaces............................................................
25-3OCCI
Navigational
Interface.......................................................................
...........................
25-3Overview
of
Oracle
Type
Translator .....................................................................
......................
25-3Overview
of
Pro*C/C
Precompiler.....................................................................
文档下载 免费文档下载
http://www.wendangwang.com/
....................
Dynamic
25-4
Creation
and
Access
of
Type
Descriptions...........http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8..
............................................
25-5Overview
of
Microsoft
Programming
Languages.......................................................................
....
25-5
Open
Database
Connectivity ...................................................................
.....................................
25-6Overview of Oracle Objects for
OLE.............................................................................
...............
25-6
OO4O
Automation
Server..........................................................................
............................
25-6Oracle
Data
Control.........................................................................
........................................
25-6The Oracle Objects for OLE C
Class Library...................................................................
25-7Oracle
Data
Provider
for .NET...........................................................http://www.we
ndangwang.com/doc/f6d2729bbb843fed64cefeb8......................................
.....
25-7Overview
of
Legacy
Languages.......................................................................
...................................
Overview
25-7
of
Pro*Cobol
Precompiler.....................................................................
文档下载 免费文档下载
http://www.wendangwang.com/
.......................
25-7Overview
of
Pro*FORTRAN
Precompiler.....................................................................
..............
25-726
Native Datatypes
Introduction
to
Oracle
Datatypes.......................................................................
................................
26-1xxii
Overview
of
Character
Datatypes.......................................................................
...............................
26-2
CHAR
Datatype .......................................................................
......................................................
26-2VARCHhttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8AR2 and VARCHAR
Datatypes ......................................................................
..............
26-2
VARCHAR
Datatype .......................................................................
.......................................
26-3Length Semantics for Character
Datatypes.......................................................................
..........
26-3NCHAR
and
NVARCHAR2
Datatypes ......................................................................
................
26-4
NCHAR...........................................................................
..........................................................
26-4NVARCHAR2...................................................................
文档下载 免费文档下载
http://www.wendangwang.com/
........................................................
Data
in
26-4Use of Unicode
an
Oracle
Database........................................................................
.......
26-4
Imhttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8plicit
Type
Conversion......................................................................
.................................
26-5LOB
Character
Datatypes ......................................................................
.......................................
26-5LONG
Datatype .......................................................................
......................................................
26-5Overview of Numeric
Datatypes.......................................................................
.................................
26-5
NUMBER
Datatype........................................................................
.................................................
Internal
26-6
Numeric
Format .........................................................................
..............................
26-7Floating-Point
Numbers....................................................................http:
//www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8..............................
...............
26-7
BINARY_FLOAT
Datatype........................................................................
............................
26-7BINARY_DOUBLE
Datatype........................................................................
文档下载 免费文档下载
http://www.wendangwang.com/
.........................
26-7Overview
of
DATE
Datatype........................................................................
......................................
Use
26-8
of
Julian
Dates ..........................................................................
...............................................
26-8Date
Arithmetic .....................................................................
.........................................................
26-9Centuries and the
Year
2000 ...........................................................................
..............................
26-9Daylight
Savings
Support................http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8..
................................................................................
............
26-9Time
Zones...........................................................................
............................................................
26-9Overview of
LOB
Datatypes.......................................................................
......................................
26-10
BLOB
Datatype .......................................................................
......................................................
26-11CLOB and NCLOB
Datatypes ......................................................................
..............................
26-11BFILE
Datatype .......................................................................
......................................................
LONG
26-11Overview of RAW and
RAW
Datatypes.......................................................................
文档下载 免费文档下载
http://www.wendangwang.com/
...http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8..
ROWID
26-12Overview of
and
UROWID
Datatypes.......................................................................
....
26-12
The
ROWID
Pseudocolumn ...................................................................
....................................
26-13Physical
Rowids .........................................................................
..................................................
26-13
Extended
Rowids .........................................................................
.........................................
26-13Restricted
Rowids .........................................................................
........................................
26-14Examples
of
Rowid
Use.............................................................................
...........................
26-15How
Rowids
Are
Used ...........................................................................
........http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8.................
....
26-16Logical
Rowids .........................................................................
....................................................
Comparison
of
Logical
26-16
Rowids
with
Rowids ...................................................
Physical
26-16Guesses in
Logical
Rowids .........................................................................
.........................
26-17Rowids
in
Non-Oracle
Databases ......................................................................
文档下载 免费文档下载
http://www.wendangwang.com/
........................
26-17Overview
of
ANSI,
DB2,
and
SQL/DS
Datatypes........................................................................
26-18Overview
of
XML
Datatypes.......................................................................
......................................
26-18
XMLType
Datatype........................................................................
.....................http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8....
......................
26-18Overview
of
URI
Datatypes.......................................................................
.......................................
26-18Overview
of
Data
Conversion......................................................................
....................................
26-19
xxiii
27 Object Datatypes and Object Views
Introduction
to
Object
Datatypes.......................................................................
................................
27-1Complex
Data
Models .........................................................................
..........................................
27-2Multimedia
Datatypes.......................................................................
.............................................
27-2Overview of Object Datatype
Categories......................................................................
...................
http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8
27-3Object
Types ..........................................................................
文档下载 免费文档下载
http://www.wendangwang.com/
..........................................................
27-3
Types
of
Methods.........................................................................
............................................
27-3Object
Tables..........................................................................
...................................................
27-4Object
Identifiers.....................................................................
.................................................
27-5Object
Views
Description.....................................................................
...................................27-5REFs.....................................
................................................................................
......................
27-5Collection
Types ...................................................http://www.wendangwang.
com/doc/f6d2729bbb843fed64cefeb8................................................
..........................
27-6
VARRAYs.........................................................................
.........................................................
27-6Nested
Tables..........................................................................
.................................................
27-7Overview
of
Type
Inheritance.....................................................................
.......................................
27-7FINAL
and
NOT
FINAL
Types...........................................................................
.........................
27-8NOT
INSTANTIABLE
Types
and
Methods.........................................................................
.......
27-8Overview
of
User-Defined
Aggregate
Functions.......................................................................
.....
27-8Why
Have
User-Defined
Aggregate
Functions?..http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8.............
文档下载 免费文档下载
http://www.wendangwang.com/
.........................................................
27-8Overview
of
Datatype
Evolution.......................................................................
................................
27-9Introduction
to
Object
Views...........................................................................
...................................
27-9
Advantages
of
Object
Views ..........................................................................
.............................
27-10Use
of
Object
Views...........................................................................
...........................................
27-10Updates
of
Object
Views...........................................................................
...................................
27-11Updates of Nested Table Columns in
Views............................................................................
27-11View
Hierarchies.........http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8.....
................................................................................
.............................
27-11Glossary
Index
xxiv
Preface
This
manual
describes
all
features
of
the
Oracle
database
server,
an
object-relational database management system. It describes how the Oracle database
server functions, and it lays a conceptual foundation for much of the practical
information contained in other manuals. Information in this manual applies to the
文档下载 免费文档下载
http://www.wendangwang.com/
Oracle database server running on all operating systems.
This preface contains these topics:
■
■
■
■AudienceDocumentation AccessibilityRelated DocumentationConventions
Audience
Oracle Database Concepts is intended for database administrators, system
administrators, and database application developers.
To use this document, you need to know the following:
://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8■
■
■ Relational database concepts in generalConcepts and terminology in Chapter1,
"Introduction to the Oracle Database"The operating system environment under which
you are running Oracle
Documentation Accessibility
Our goal is to make Oracle products, services, and supporting documentation
文档下载 免费文档下载
http://www.wendangwang.com/
accessible, with good usability, to the disabled community. To that end, our
documentation includes features that make information available to users of assistive
technology. This documentation is available in HTML format, and contains markup to
facilitate access by the disabled community. Accessibility standards will continue
to evolve over time, and Oracle is actively engaged with other market-leading
technology vendors to address technical obstacles so that our documentation can be
accessible to all of our customers. For more information, visit the Oracle
Accessibility
Program
Web
site
athttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8
http://www.oracle.com/accessibility/
xxv
Accessibility of Code Examples in Documentation
Screen readers may not always correctly read the code examples in this document. The
conventions for writing code require that closing braces should appear on an
otherwise empty line; however, some screen readers may not always read a line of text
that consists solely of a bracket or brace.
Accessibility of Links to External Web Sites in Documentation
This documentation may contain links to Web sites of other companies or
organizations that Oracle does not own or control. Oracle neither evaluates nor makes
any representations regarding the accessibility of these Web sites.
文档下载 免费文档下载
http://www.wendangwang.com/
TTY Access to Oracle Support Services
Oracle provides dedicated Text Telephone (TTY) access to Oracle Support Services
within
the
United
States
of
America
24
hours
a
day,
seven
days
a
whttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8eek. For TTY support, call
800.446.2398.
Related Documentation
For more information, see these Oracle resources:
■Oracle Database Upgrade Guide for information about upgrading a previous release
of Oracle
Oracle Database Administrator's Guide for information about how to administer the
Oracle database server
Oracle Database Application Developer's Guide - Fundamentals for information about
developing Oracle database applications
Oracle Database Performance Tuning Guide for information about optimizing
performance of an Oracle database
Oracle Database Data Warehousing Guide for information about data warehousing and
business intelligence■■■■
Many books in the documentation set use the sample schemas of the seed database, which
is installed by default when you install Oracle. Refer to Oracle Database Sample
Schemas
for
information
on
how
these
schemas
were
文档下载 免费文档下载
http://www.wendangwang.com/
createhttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8d and how you can use
them yourself.
Conventions
The following text conventions are used in this document:Conventionboldface
italic
monospaceMeaningBoldface
type
indicates
graphical
user
interface
elements
associated with an action, or terms defined in text or the glossary.Italic type
indicates book titles, emphasis, or placeholder variables for which you supply
particular values.Monospace type indicates commands within a paragraph, URLs, code
in examples, text that appears on the screen, or text that you enter.
xxvi
What Is Oracle?
Part I provides an overview of Oracle Database concepts and terminology. It contains
the following chapter:
■Chapter1, "Introduction to the Oracle Database"
Introduction to the Oracle DatabaseThis chapter provides an overview of the Oracle
database server. The topics include:■
■
文档下载 免费文档下载
http://www.wendangwang.com/
■
Oracle
Database
Ahttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8rchitectureOracle
Database FeaturesOracle Database Application Development
Oracle Database Architecture
An Oracle database is a collection of data treated as a unit. The purpose of a database
is to store and retrieve related information. A database server is the key to solving
the problems of information management. In general, a server reliably manages a large
amount of data in a multiuser environment so that many users can concurrently access
the same data. All this is accomplished while delivering high performance. A database
server also prevents unauthorized access and provides efficient solutions for failure
recovery.
Oracle Database is the first database designed for enterprise grid computing, the
most flexible and cost effective way to manage information and applications.
Enterprise grid computing creates large pools of industry-standard, modular storage
and
servers.
With
this
architecture,
each
nehttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8w system can be rapidly
provisioned from the pool of components. There is no need for peak workloads, because
capacity can be easily added or reallocated from the resource pools as needed.
The database has logical structures and physical structures. Because the physical
and logical structures are separate, the physical storage of data can be managed
without affecting the access to logical storage structures.
The section contains the following topics:
■
文档下载 免费文档下载
http://www.wendangwang.com/
■
■
■
■
■
■
■
■Overview of Oracle Grid ArchitectureOverview of Application ArchitectureOverview
of Physical Database StructuresOverview of Logical Database StructuresOverview of
Schemas and Common Schema ObjectsOverview of the Oracle Data DictionaryOverview of
the Oracle InstanceOverview of Accessing the DatabaseOverview of Oracle Utilities
Introduction
to
the
Oracle
Database1-http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb81
Oracle Database Architecture
Overview of Oracle Grid Architecture
enterprise information systems. With grid computing, groups of independent, modular
hardware and software components can be connected and rejoined on demand to meet the
changing needs of businesses.
文档下载 免费文档下载
http://www.wendangwang.com/
The grid style of computing aims to solve some common problems with enterprise IT:
the problem of application silos that lead to under utilized, dedicated hardware
resources, the problem of monolithic, unwieldy systems that are expensive to maintain
and difficult to change, and the problem of fragmented and disintegrated information
that cannot be fully exploited by the enterprise as a whole.
Benefits of Grid ComputingCompared to other models of computing, IT systems designed
and implemented in the grid style deliver higher quality of service, lower cost, and
greater
flexibility.
Higher
quality
of
service
results
frohttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8m having no single point
of failure, a robust security infrastructure, and centralized, policy-driven
management. Lower costs derive from increasing the utilization of resources and
dramatically reducing management and maintenance costs. Rather than dedicating a
stack of software and hardware to a specific task, all resources are pooled and
allocated on demand, thus eliminating under utilized capacity and redundant
capabilities. Grid computing also enables the use of smaller individual hardware
components, thus reducing the cost of each individual component and providing more
flexibility to devote resources in accordance with changing needs.
Grid Computing Defined
The grid style of computing treats collections of similar IT resources holistically
as a single pool, while exploiting the distinct nature of individual resources within
the pool. To address simultaneously the problems of monolithic systems and
http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8fragmented resources, grid
computing achieves a balance between the benefits of holistic resource management
and flexible independent resource control. IT resources managed in a grid include:
文档下载 免费文档下载
http://www.wendangwang.com/
■Infrastructure: the hardware and software that create a data storage and program
execution environment
Applications:
the
program
logic
and
flow
that
define
specific
business
processesInformation: the meanings inherent in all different types of data used to
conduct business■■
Core Tenets of Grid ComputingTwo core tenets uniquely distinguish grid computing from
other styles of computing, such as mainframe, client-server, or multi-tier:
virtualization and provisioning.
With virtualization, individual resources (e.g. computers, disks, application
components and information sources) are pooled together by type then made
available to consumers (e.g. people or software programs) through an abstraction.
Vihttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8rtualization
means
breaking hard-coded connections between providers and consumers of resources, and
preparing a resource to serve a particular need
without the consumer caring how that is accomplished.
With provisioning, when consumers request resources through a virtualization layer,
behind the scenes a specific resource is identified to fulfill the request and then
it is allocated to the consumer. Provisioning as part of grid computing means that
the system determines how to meet the specific need of the consumer, while optimizing
operation of the system as a whole.■■
1-2Oracle Database Concepts
Oracle Database Architecture
文档下载 免费文档下载
http://www.wendangwang.com/
The specific ways in which information, application or infrastructure resources are
virtualized and provisioned are specific to the type of resource, but the concepts
apply universally. Similarly, the specific benefits derived from grid computing are
particular to http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8each type of
resource, but all share the characteristics of better quality, lower costs and
increased flexibility.
Infrastructure grid resources include hardware resources such as
storage, processors, memory, and networks as well as software designed to manage this
hardware, such as databases, storage management, system management, application
servers, and operating systems.Infrastructure Grid
Virtualization and provisioning of infrastructure resources mean pooling resources
together and allocating to the appropriate consumers based on policies. For example,
one policy might be to dedicate enough processing power to a web server that it can
always provide sub-second response time. That rule could be fulfilled in different
ways by the provisioning software in order to balance the requests of all
consumers.Treating infrastructure resources as a single pool and allocating those
resources
on
demand
saves
monehttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8y by eliminating under
utilized capacity and redundant
capabilities. Managing hardware and software resources holistically reduces the cost
of labor and the opportunity for human error.
Spreading computing capacity among many different computers and spreading
storage capacity across multiple disks and disk groups removes single points of
文档下载 免费文档下载
http://www.wendangwang.com/
failure so that if any individual component fails, the system as a whole remains
available. Furthermore, grid computing affords the option to use smaller individual
hardware components, such as blade servers and low cost storage, which enables
incremental scaling and reduces the cost of each individual component, thereby giving
companies more flexibility and lower cost.
Infrastructure is the dimension of grid computing that is most familiar and easy to
understand, but the same concepts apply to applications and information.
Application
resources
in
the
ghttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8rid are the encodings of
business
logic and process flow within application software. These may be packaged
applications or custom applications, written in any programming language, reflecting
any level of complexity. For example, the software that takes an order from a customer
and sends an acknowledgement, the process that prints payroll checks, and the logic
that routes a particular customer call to a particular agent are all application
resources.Applications GridHistorically, application logic has been intertwined
with user interface code, data management code, and process or page flow and has lacked
well-defined interfaces, which has resulted in monolithic applications that are
difficult to change and difficult to integrate.
Service oriented architecture has emerged as a superior model for building
applications, and service oriented architecture concepts align exactly with the core
tenets ohttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8f grid computing.
Virtualization and provisioning of application resources involves publishing
application components as services for use by multiple
文档下载 免费文档下载
http://www.wendangwang.com/
consumers, which may be people or processes, then orchestrating those services into
more powerful business flows.
In the same way that grid computing enables better reuse and more flexibility of IT
infrastructure resources, grid computing also treats bits of application logic as
a
resource, and enables greater reuse of application functionality and more flexibility
in changing and building new composite applications.
Furthermore, applications that are orchestrated from published services are able to
view activities in a business as a single whole, so that processes are standardized
Introduction to the Oracle Database1-3
Oracle Database Architecture
across
geography
and
business
units
and
processes
are
automated
end-to-end.http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8 This generates
more reliable business processes and lowers cost through increased automation and
reduced variability.
Information GridThe third dimension to grid computing, after infrastructure and
applications, is information. Today, information tends to be fragmented across a
company, making it difficult to see the business as a whole or answer basic
questions.about customers. Without information about who the customer is, and what
they want to buy, information assets go underexploited.
文档下载 免费文档下载
http://www.wendangwang.com/
In contrast, grid computing treats information holistically as a resource, similar
to infrastructure and applications resources, and thus extracts more of its latent
value. Information grid resources include all data in the enterprise and all metadata
required to make that data meaningful. This data may be structured, semi-structured,
or unstructured, stored in any location, such as databases, local file systems, or
e-mhttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8ail
servers,
and
created by any application.
The core tenets of grid computing apply similarly to information as they do to
infrastructure and applications. The infrastructure grid exploits the power of the
network to allow multiple servers or storage devices to be combined toward a single
task, then easily reconfigured as needs change. A service oriented architecture, or
an applications grid, enables independently developed services, or application
resources, to be combined into larger business processes, then adapted as needs change
without breaking other parts of the composite application. Similarly, the information
grid provides a way for information resources to be joined with related information
resources to greater exploit the value of the inherent relationships among
information, then for new connections to be made as situations change.
The
relational
database,
for
example,
was
an
early
informatiohttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8n
virtualization
technology. Unlike its predecessors, the network database and hierarchical database
models, in which all relationships between data had to be predetermined, relational
database enabled flexible access to a general-purpose information resource. Today,
XML furthers information virtualization by providing a standard way to represent
information along with metadata, which breaks the hard link between information and
a specific application used to create and view that information.
文档下载 免费文档下载
http://www.wendangwang.com/
Information provisioning technologies include message queuing, data propagation,
replication, extract-transform-load, as well as mapping and cleansing tools to ensure
data quality. Data hubs, in which a central operational data store continually syncs
with multiple live data sources, are emerging as a preferred model for establishing
a single source of truth while maintaining the flexibility of distributed
control.Grid
Resourhttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8ces
Work Well Independently and Best TogetherBy managing any single IT resource –
infrastructure, applications, or information - using grid
computing, regardless of how the other resources are treated, enterprises can realize
higher quality, more flexibility, and lower costs. For example, there is no need to
rewrite applications to benefit from an infrastructure grid.
It is also possible
to deploy an applications grid, or a service oriented architecture, without changing
the way information is managed or the way hardware is configured.
It is possible, however, to derive even greater benefit by using grid computing for
all resources. For example, the applications grid becomes even more valuable when
you can set policies regarding resource requirements at the level of individual
services and have execution of different services in the same composite application
handled
differently
by
the
infrastrhttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8ucture - something
that can only be done by an application grid in combination with an infrastructure
grid. In addition, building an information grid by integrating more information into
a single source of truth becomes tenable
1-4Oracle Database Concepts
文档下载 免费文档下载
http://www.wendangwang.com/
Oracle Database Architecture
only when the infrastructure is configured as a grid, so it can scale beyond the
boundary of a single computer.
Grid Computing in Oracle Database 10g
On the path toward this grand vision of grid computing, companies need real solutions
to support their incremental moves toward a more flexible and more productive IT
architecture. The Oracle Database 10g family of software products implements much
of the core grid technology to get companies started. And Oracle delivers this grid
computing functionality in the context of holistic enterprise architecture,
providing
a
robust
security
infrastructure,
http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8management,
centralized
intuitive,
powerful development tools, and universal access. Oracle Database 10g includes:
■
■
■
■ Oracle Database 10gOracle Application Server 10gOracle Enterprise Manager
10gOracle Collaboration Suite 10g
Although the grid features of Oracle 10g span all of the products listed above, this
discussion will focus on the grid computing capabilities of Oracle Database
10g.Infrastructure Grid
文档下载 免费文档下载
http://www.wendangwang.com/
■Server Virtualization. Oracle Real Application Clusters 10g (RAC) enable a single
database to run across multiple clustered nodes in a grid, pooling the processing
resources of several standard machines. Oracle is uniquely flexible in its ability
to provision workload across machines because it is the only database technology that
does not require data to be partitioned and distributed along with the work. Oracle
10g
Release
2
software
includes
enhancements
for
cohttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8nnections
balancing
across
RAC
instances, based on policies.
■Storage Virtualization. The Oracle Automatic Storage Management (ASM) feature of
Oracle Database 10g provides a virtualization layer between the database and
storage so that multiple disks can be treated as a single disk group and disks can
be dynamically added or removed while keeping databases online. Existing data will
automatically be spread across available disks for performance and utilization
optimization. In Oracle 10g Release 2, ASM supports multiple databases, which could
be at different software version levels, accessing the same storage pool.Grid
Management. Because grid computing pools together multiple servers and disks and
allocates them to multiple purposes, it becomes more important that individual
resources are largely self-managing and that other management
functions are centralized.
The
Grid
Control
feature
of
Enterprihttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8se
Oracle
Manager
10g
provides a single console to manage multiple systems together as a logical group.
Grid Control manages provisioning of nodes in the grid with the appropriate full stack
of software and enables configurations and security settings to be maintained
文档下载 免费文档下载
http://www.wendangwang.com/
centrally for groups of systems.
Another aspect to grid management is managing user identities in a way that is both
highly secure and easy to maintain. Oracle Identity Management 10g includes an
LDAP-compliant directory with delegated administration and now, in Release 2,
federated identity management so that single sign-on capabilities can be
securely shared across security domains. Oracle Identity Management 10g closely
adheres to grid principles by utilizing a central point for applications to
authenticate users - the single sign-on server - while, behind the scenes,
Introduction to the Oracle Database1-5■
Oracle
Datahttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8base
Architecture
distributing control of identities via delegation and federation to optimize
maintainability and overall operation of the system.
Applications Grid
Standard Web Services Support. In addition to the robust web services support in
Oracle Application Server 10g, Oracle database 10g can publish and consume web
services. DML and DDL operations can be exposed as web services, and functions within
the database can make a web service appear as a SQL row source, enabling use of powerful
SQL tools to analyze web service data in conjunction with relational and
non-relational data.
文档下载 免费文档下载
http://www.wendangwang.com/
Oracle Enterprise Manager 10g enhances Oracle’s support for service oriented
architectures by monitoring and managing web services and any other
administrator-defined services, tracking end-to-end performance and performing root
cause analysis of problems encountered.
Information Grid://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8ar
■Data Provisioning. Information starts with data, which must be provisioned wherever
consumers need it. For example, users may be geographically
distributed, and fast data access may be more important for these users than access
to an identical resource. In these cases, data must be shared between
systems, either in bulk or near real time. Oracle’s bulk data movement
technologies include Transportable Tablespaces and Data Pump.
For more fine-grained data sharing, the Oracle Streams feature of Oracle Database
10g captures database transaction changes and propagates them, thus keeping two or
more database copies in sync as updates are applied. It also unifies traditionally
distinct data sharing mechanisms, such as message queuing, replication, events, data
warehouse loading, notifications and publish/subscribe, into a single
technology.
■
Centralized
Data
Oraclehttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8
Management.
Database
10g
manages all types of structured, semi-structured and unstructured information,
representing,
文档下载 免费文档下载
http://www.wendangwang.com/
maintaining and querying each in its own optimal way while providing common access
to all via SQL and XML Query. Along with traditional relational database structures,
Oracle natively implements OLAP cubes, standard XML structures, geographic spatial
data
and
unlimited
sized
file
management,
thus
virtualizing
information
representation. Combining these information types enables
connections between disparate types of information to be made as readily as new
connections are made with traditional relational data.
Metadata Management. Oracle Warehouse Builder is more than a traditional batch ETL
tool for creating warehouses. It enforces rules to achieve data quality, does fuzzy
matching to automatically overcome data inconsistency, and uses statistical analysis
to
infer
data
profiles.
With
Oracle
10g
Relhttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8ease 2, its metadata
management capabilities are extended from scheduled data pulls to handle a
transaction-time data push from an Oracle database implementing the Oracle Streams
feature.
Oracle’s series of enterprise data hub products (for example, Oracle Customer Data
Hub) provide real-time synchronization of operational information sources so that
companies can have a single source of truth while retaining separate
systems and separate applications, which may include a combination of packaged,
legacy and custom applications. In addition to the data cleansing and scheduling
mechanisms, Oracle also provides a well-formed schema, established from years of
experience building enterprise applications, for certain common types of
information, such as customer, financial, and product information.■
1-6Oracle Database Concepts
文档下载 免费文档下载
http://www.wendangwang.com/
Oracle Database Architecture
■
Metadata
Inference.
Joining
http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8the Oracle 10g software
family is the new Oracle Enterprise Search product. Oracle Enterprise Search 10g
crawls all information
sources in the enterprise, whether public or secure, including e-mail servers,
document management servers, file systems, web sites, databases and
applications, then returns information from all of the most relevant sources for a
given search query. This crawl and index process uses a series of heuristics specific
to each data source to infer metadata about all enterprise information that is used
to return the most relevant results to any query.
Overview of Application Architecture
There are two common ways to architect a database: client/server or multitier. As
internet computing becomes more prevalent in computing environments, many database
management systems are moving to a multitier environment.
Client/Server Architecture
Multiprocessing
uses
more
http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8than one processor for a
set of related jobs. Distributed processing reduces the load on a single processor
by allowing different processors to concentrate on a subset of related tasks, thus
improving the performance and capabilities of the system as a whole.
文档下载 免费文档下载
http://www.wendangwang.com/
An Oracle database system can easily take advantage of distributed processing by using
its client/server architecture. In this architecture, the database system is divided
into two parts: a front-end or a client, and a back-end or a server.
The Client
The client is a database application that initiates a request for an
operation to be performed on the database server. It requests, processes, and presents
data managed by the server. The client workstation can be optimized for its job. For
example, it might not need large disk capacity, or it might benefit from graphic
capabilities.
Often,
the
client
runs
on
a
different
computer
than
the
database
serhttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8ver, generally on a PC.
Many clients can simultaneously run against one server.
The Server
The server runs Oracle software and handles the functions required for
concurrent, shared data access. The server receives and processes the SQL and PL/SQL
statements that originate from client applications. The computer that
manages the server can be optimized for its duties. For example, it can have large
disk capacity and fast processors.
Multitier Architecture: Application Servers
A multitier architecture has the following components:
■
■A client or initiator process that starts an operationOne or more application
servers that perform parts of the operation. An application server provides access
to the data for the client and performs some of
文档下载 免费文档下载
http://www.wendangwang.com/
the query processing, thus removing some of the load from the database server. It
can
serve
as
an
interface
between
clients
and
multiphttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8le database servers,
including providing an additional level of security.
An end or database server that stores most of the data used in the operation
Validate the credentials of a client, such as a Web browser
Connect to an Oracle database server■This architecture enables use of an application
server to do the following:■■
Introduction to the Oracle Database1-7
Oracle Database Architecture
■Perform the requested operation on behalf of the client
If proxy authentication is being used, then the identity of the client is maintained
throughout all tiers of the connection.
Overview of Physical Database Structures
The following sections explain the physical database structures of an Oracle database,
including datafiles, redo log files, and control files.
Datafiles
Every Oracle database has one or more physical datafiles. The datafiles
文档下载 免费文档下载
http://www.wendangwang.com/
conthttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8ain all the database
data. The data of logical database structures, such as tables and indexes, is
physically stored in the datafiles allocated for a database.
The characteristics of datafiles are:
■
■A datafile can be associated with only one database. Datafiles can have certain
characteristics set to let them automatically extend when the database runs out of
space.
One or more datafiles form a logical unit of database storage called a tablespace.
■
Data in a datafile is read, as needed, during normal database operation and stored
in the memory cache of Oracle. For example, assume that a user wants to access some
data in a table of a database. If the requested information is not already in the
memory cache for the database, then it is read from the appropriate datafiles and
stored in memory.
Modified or new data is not necessarily written to a datafile immediately. To reduce
thttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8he amount of disk access
and to increase performance, data is pooled in memory and written to the appropriate
datafiles all at once, as determined by the database writer process (DBWn) background
process.
"Overview of the Oracle Instance" on page1-13 for more
information about Oracle’s memory and process structuresSee Also:
文档下载 免费文档下载
http://www.wendangwang.com/
Control Files
Every Oracle database has a control file. A control file contains entries that specify
the physical structure of the database. For example, it contains the following
information: ■
■
■Database name Names and locations of datafiles and redo log filesTime stamp of
database creation
Oracle can multiplex the control file, that is, simultaneously maintain a number of
identical control file copies, to protect against a failure involving the control
file. Every time an instance of an Oracle database is started, its control file
identifies
the
http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8database
and redo log files that must be opened for database operation to proceed. If the
physical makeup of the database is altered (for example, if a new datafile or redo
log file is created), then the control file is automatically modified by Oracle to
reflect the change. A control file is also used in database recovery.
See Also:Chapter3, "Tablespaces, Datafiles, and Control Files"
1-8Oracle Database Concepts
Oracle Database Architecture
Redo Log Files
Every Oracle database has a set of two or more redo log files. The set of redo log
文档下载 免费文档下载
http://www.wendangwang.com/
files is collectively known as the redo log for the database. A redo log is made up
of redo entries (also called redo records).
The primary function of the redo log is to record all changes made to data. If a failure
prevents modified data from being permanently written to the datafiles, then the
changes
can
be
obtained
from
the
redo
log,
so
worhttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8k is never lost.
To protect against a failure involving the redo log itself, Oracle allows a
multiplexed redo log so that two or more copies of the redo log can be maintained
on different disks.
The information in a redo log file is used only to recover the database from a system
or media failure that prevents database data from being written to the datafiles.
For example, if an unexpected power outage terminates database operation, then data
in memory cannot be written to the datafiles, and the data is lost. However, lost
data can be recovered when the database is opened, after power is restored. By applying
the information in the most recent redo log files to the database datafiles, Oracle
restores the database to the time at which the power failure occurred.
The process of applying the redo log during a recovery operation is called rolling
forward.
See
Also:"Overview
of
Database
Backup
Rechttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8overy Features" on
page1-22
Archive Log Files
and
文档下载 免费文档下载
http://www.wendangwang.com/
You can enable automatic archiving of the redo log. Oracle automatically archives
log files when the database is in ARCHIVELOG mode.
Parameter Files
Parameter files contain a list of configuration parameters for that instance and
database.
Oracle recommends that you create a server parameter file (SPFILE) as a dynamic means
of maintaining initialization parameters. A server parameter file lets you store and
manage your initialization parameters persistently in a server-side disk file.
See Also:
■"Initialization Parameter Files and Server Parameter Files" on page12-3
Oracle Database Administrator's Guide for information on creating and changing
parameter files■
Alert and Trace Log Files
Each server and background process can write to an associated trace file. When an
internal error is detechttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8ted
by a process, it dumps information about the error to its trace file. Some of the
information written to a trace file is intended for the database administrator, while
other information is for Oracle Support Services. Trace file information is also used
to tune applications and instances.
The alert file, or alert log, is a special trace file. The alert log of a database
is a chronological log of messages and errors.
文档下载 免费文档下载
http://www.wendangwang.com/
See Also:Oracle Database Administrator's Guide
Introduction to the Oracle Database1-9
Oracle Database Architecture
Backup Files
To restore a file is to replace it with a backup file. Typically, you restore a file
when a media failure or user error has damaged or deleted the original file.
User-managed backup and recovery requires you to actually restore backup files before
you can perform a trial recovery of the backups.
Server-managed backup anhttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8d
recovery manages the backup process, such as
scheduling of backups, as well as the recovery process, such as applying the correct
backup file when recovery is needed.
See Also:
■
■ Chapter15, "Backup and Recovery"Oracle Database Backup and Recovery Advanced
User's Guide
Overview of Logical Database Structures
文档下载 免费文档下载
http://www.wendangwang.com/
The logical storage structures, including data blocks, extents, and segments, enable
Oracle to have fine-grained control of disk space use.
Tablespaces
A database is divided into logical storage units called tablespaces, which group
related logical structures together. For example, tablespaces commonly group
together all application objects to simplify some administrative operations.
Each database is logically divided into one or more tablespaces. One or more datafiles
are
explicitly
created
for
each
tablespace
to
physically
store
the
dahttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8ta of all logical
structures in a tablespace. The combined size of the datafiles in a tablespace is
the total storage capacity of the tablespace.
Every Oracle database contains a SYSTEM tablespace and a SYSAUX tablespace. Oracle
creates them automatically when the database is created. The system default is to
create a smallfile tablespace, which is the traditional type of Oracle tablespace.
The SYSTEM and SYSAUX tablespaces are created as smallfile tablespaces.
Oracle also lets you create bigfile tablespaces. This allows Oracle Database to
contain tablespaces made up of single large files rather than numerous smaller ones.
This lets Oracle Database utilize the ability of 64-bit systems to create and manage
ultralarge files. The consequence of this is that Oracle Database can now scale up
to 8 exabytes in size. With Oracle-managed files, bigfile tablespaces make datafiles
completely
transparent
for
users.
http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8In other words, you can
perform operations on tablespaces, rather than the underlying datafiles.
文档下载 免费文档下载
http://www.wendangwang.com/
See Also:"Overview of Tablespaces" on page3-4
Online and Offline Tablespaces
A tablespace can be online (accessible) or offline
(not accessible). A tablespace is generally online, so that users can access the
information in the tablespace. However, sometimes a tablespace is taken offline to
make a portion of the database unavailable while allowing normal access to the
remainder of the database. This makes many administrative tasks easier to perform.
Oracle Data Blocks
At the finest level of granularity, Oracle database data is stored in data blocks.
One data block corresponds to a specific number of bytes of physical database space
on disk. The standard block size is specified by the DB_BLOCK_SIZE initialization
1-10Oracle Database Concepts
Oracle Database Architecture
parahttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8meter.
In
addition,
you can specify up to five other block sizes. A database uses and allocates free
database space in Oracle data blocks.
Extents
The next level of logical database space is an extent. An extent is a specific number
of contiguous data blocks, obtained in a single allocation, used to store a specific
type of information.
Segments
文档下载 免费文档下载
http://www.wendangwang.com/
Above extents, the level of logical database storage is a segment. A segment is a
set of extents allocated for a certain logical structure. The following table
describes the different types of segments.
SegmentData segmentDescriptionEach nonclustered table has a data segment. All table
data is stored in the extents of the data segment.
For a partitioned table, each partition has a data segment.
Each cluster has a data segment. The data of every table in the cluster is stored
in the cluster’s data segment.
Index segment://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8par
Temporary segmentEach index has an index segment that stores all of its data. For
a partitioned index, each partition has an index segment. Temporary segments are
created by Oracle when a SQL statement needs a temporary database area to complete
execution. When the statement finishes execution, the extents in the temporary
segment are returned to the system for future use.
If you are operating in automatic undo management mode, then the database server
manages undo space using tablespaces. Oracle recommends that you use automatic undo
management.
Earlier releases of Oracle used rollback segments to store undo information. The
information in a rollback segment was used during database recovery for generating
read-consistent database information and for rolling back uncommitted transactions
for users.
Space management for these rollback segments was complex, and Oracle has deprecated
文档下载 免费文档下载
http://www.wendangwang.com/
that
method.
Thttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8his
book
discusses the undo tablespace method of managing undo; this eliminates the
complexities of managing rollback segment space, and lets you exert control over how
long undo is retained before being overwritten.
Oracle does use a SYSTEM rollback segment for performing system transactions. There
is only one SYSTEM rollback segment and it is created automatically at CREATE DATABASE
time and is always brought online at instance startup. You are not required to perform
any operations to manage the SYSTEM rollback segment.Rollback segment
Oracle dynamically allocates space when the existing extents of a segment become full.
In other words, when the extents of a segment are full, Oracle allocates another extent
for that segment. Because extents are allocated as needed, the extents of a segment
may or may not be contiguous on disk.Introduction to the Oracle Database1-11
Oracle Database Architecture
http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8See Also:
■
■
■
■
■Chapter2, "Data Blocks, Extents, and Segments"Chapter3, "Tablespaces, Datafiles,
and Control Files""Introduction to Automatic Undo Management" on page2-16"Read
Consistency" on page1-18"Overview of Database Backup and Recovery Features" on
文档下载 免费文档下载
http://www.wendangwang.com/
page1-22
Overview of Schemas and Common Schema Objects
A schema is a collection of database objects. A schema is owned by a database user
and has the same name as that user. Schema objects are the logical structures that
directly refer to the database’s data. Schema objects include structures like tables,
views, and indexes. (There is no relationship between a tablespace and a schema.
Objects in the same schema can be in different tablespaces, and a tablespace can hold
objects from different schemas.)
Some of the most common schema objects are defined in the following section. Tables
Tables are thehttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8 basic unit
of data storage in an Oracle database. Database tables hold all user-accessible data.
Each table has columns and rows. A table that has an employee database, for example,
can have a column called employee number, and each row in that column is an employee’s
number.
Indexes
Indexes are optional structures associated with tables. Indexes can be created to
increase the performance of data retrieval. Just as the index in this manual helps
you quickly locate specific information, an Oracle index provides an access path to
table data.
When processing a request, Oracle can use some or all of the available indexes to
locate the requested rows efficiently. Indexes are useful when applications
frequently query a table for a range of rows (for example, all employees with a salary
文档下载 免费文档下载
http://www.wendangwang.com/
greater than 1000 dollars) or a specific row.
Indexes
are
created
on
one
or
more
columns
of
a
table.
After
ihttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8t is created, an index is
automatically maintained and used by Oracle. Changes to table data (such as adding
new rows, updating rows, or deleting rows) are automatically incorporated into all
relevant indexes with complete transparency to the users.
Views
Views are customized presentations of data in one or more tables or other views. A
view can also be considered a stored query. Views do not actually contain data. Rather,
they derive their data from the tables on which they are based, referred to as the
base tables of the views.
Like tables, views can be queried, updated, inserted into, and deleted from, with
some restrictions. All operations performed on a view actually affect the base tables
of the view.
Views provide an additional level of table security by restricting access to a
predetermined set of rows and columns of a table. They also hide data complexity and
store complex querihttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8es.
1-12Oracle Database Concepts
文档下载 免费文档下载
http://www.wendangwang.com/
文档下载网是专业的免费文档搜索与下载网站,提供行业资料,考试资料,教
学课件,学术论文,技术资料,研究报告,工作范文,资格考试,word 文档,
专业文献,应用文书,行业论文等文档搜索与文档下载,是您文档写作和查找
参考资料的必备网站。
文档下载 http://www.wendangwang.com/
亿万文档资料,等你来发现