Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Entity–attribute–value model wikipedia , lookup
Microsoft SQL Server wikipedia , lookup
Open Database Connectivity wikipedia , lookup
Microsoft Jet Database Engine wikipedia , lookup
Extensible Storage Engine wikipedia , lookup
Concurrency control wikipedia , lookup
Relational model wikipedia , lookup
Clusterpoint wikipedia , lookup
文档下载 免费文档下载 http://www.wendangwang.com/ 本文档下载自文档下载网,内容可能不完整,您可以点击以下网址继续阅读或下载: http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8 Oracle Concepts (10g R2) Oracle? Database Concepts 10g Release 2 (10.2) B14220-02 October 2005 Oracle Database Concepts, 10g Release 2 (10.2) B14220-02 Copyright ? 1993, 2005, Oracle. All rights reserved. Primary Author: Michele Cyran Contributing Author: Paul Lane, JP Polk Contributor: Omar Alonso, Penny Avril, Hermann Baer, Sandeepan Banerjee, Mark Bauer, Bill Bridge, Sandra Cheevers, Carol Colrain, Vira Goorah, Mike Hartstein, John Haydu, Wei Hu, Ramkumar Krishnan, Vasudha Krishnaswamy, Bill Lee, Bryn Llewellyn, Rich Long, Diana Lorentz, Paul Manning, Valarie Moore, Mughees Minhas, Gopal Mulagund, Muthu 文档下载 免费文档下载 http://www.wendangwang.com/ Olagappan, Jennifer Polk, Kathy Rich, John Russell, Viv Schupmann, Bob Thome, Randy Urbano, Michael Verheij, Ron Weiss, Steve Wertheimer The Programs (which include both the software and documentation) contain proprietary information; they are provided under a license agreement containing restrictions on use anhttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8d disclosure and are also protected by copyright, patent, and other intellectual and industrial property laws. Reverse engineering, disassembly, or decompilation of the Programs, except to the extent required to obtain interoperability with other independently created software or as specified by law, is prohibited. The information contained in this document is subject to change without notice. If you find any problems in the documentation, please report them to us in writing. This document is not warranted to be error-free. Except as may be expressly permitted in your license agreement for these Programs, no part of these Programs may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose. If the Programs are delivered to the United States Government or anyone licensing or using the Programs on behalf of the United States Government, the following notice is applicable:://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8par U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are "commercial computer software" or "commercial technical data" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the Programs, including documentation and technical data, shall be subject to the licensing restrictions set forth in the applicable Oracle license agreement, and, to the extent applicable, the additional rights set forth in FAR 52.227-19, Commercial Computer Software—Restricted Rights (June 1987). Oracle Corporation, 500 Oracle Parkway, Redwood City, CA 94065 文档下载 免费文档下载 http://www.wendangwang.com/ The Programs are not intended for use in any nuclear, aviation, mass transit, medical, or other inherently dangerous applications. It shall be the licensee's responsibility to take all http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8appropriate fail-safe, backup, redundancy and other measures to ensure the safe use of such applications if the Programs are used for such purposes, and we disclaim liability for any damages caused by such use of the Programs. Oracle, JD Edwards, PeopleSoft, and Retek are registered trademarks of Oracle Corporation and/or its affiliates. Other names may be trademarks of their respective owners. The Programs may provide links to Web sites and access to content, products, and services from third parties. Oracle is not responsible for the availability of, or any content provided on, third-party Web sites. You bear all risks associated with the use of such content. If you choose to purchase any products or services from a third party, the relationship is directly between you and the third party. Oracle is not responsible for: (a) the quality of third-party products or services; or (b) fulfilling any of the thhttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8e terms agreement of with the third party, including delivery of products or services and warranty obligations related to purchased products or services. Oracle is not responsible for any loss or damage of any sort that you may incur from dealing with any third party. Contents Preface......................................................................... ................................................................................ .... xxv 文档下载 免费文档下载 http://www.wendangwang.com/ Audience........................................................................ ........................................................................... xxvDocumentation Accessibility................................................................... .............................................. xxvRelated Documentation................................................................... ....................................................... xxviConventions.......http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8... ................................................................................ ................................................... xxviPart I What Is Oracle? 1 Introduction to the Oracle Database Oracle Database Architecture ................................................................... ............................................ Overview 1-1 of Oracle Grid Architecture.................................................................... ........................ 1-2 Grid Computing Defined......................................................................... .................................. 1-2Grid Computing in Oracle Database 10g............................................................................. .... 1-5Overview of Application Architecture.................................................................... ....................... 1-7 文档下载 免费文档下载 http://www.wendangwang.com/ Client/Server Archihttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8tecture............. ................................................................................ ........... 1-7Multitier Architecture: Application Servers......................................................................... .. 1-7Overview of Physical Database Structures...................................................................... ............... 1-8 Datafiles ...................................................................... ................................................................. 1-8Control Files........................................................................... ...................................................... 1-8Redo Log Files........................................................................... .................................................. 1-9Archive Log Files........................................................................... ...........................http://www.wendangwang.com/doc/f6d2729bbb843fed64cefe b8.................. 1-9Parameter Files........................................................................... ................................................. 1-9Alert and Trace Log Files........................................................................... ................................ 1-9Backup Files........................................................................... ................................................... 1-10Overview of Logical Database Structures...................................................................... ............. 1-10 Tablespaces..................................................................... .......................................................... 1-10Oracle Data 文档下载 免费文档下载 http://www.wendangwang.com/ Blocks.......................................................................... ......................................... 1-10Extents..............................................................http:// www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8................................ ......................................... 1-11Segments.................................................................... ............................................................... of Schemas and 1-11Overview Common Schema Objects............................................................... 1-12 Tables.......................................................................... ............................................................... 1-12Indexes .................................................................... .................................................................. 1-12Views....................................................................... .................................................................. 1-12Clusters.................................................................... .................................................................. 1http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8-13Synonyms............. ................................................................................ ..................................... 1-13 iii Overview of the Oracle Data Dictionary...................................................................... ............... 1-13Overview of the Oracle Instance........................................................................ ........................... 1-13 文档下载 免费文档下载 http://www.wendangwang.com/ Real Application Clusters: Multiple Instance Systems....................................................... 1-13Instance Memory Structures ..................................................................... ............................ 1-14System Global Area............................................................................ ..................................... 1-14Program Global Area............................................................................ ...................http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8...... .......... 1-15Oracle Background Processes....................................................................... ......................... 1-15Process Architecture.................................................................... ............................................ 1-15Overview of Accessing the Database........................................................................ ................... 1-16 Network Connections..................................................................... ......................................... 1-16Starting Up the Database........................................................................ ................................ How Oracle Works .......................................................................... ....................................... Overview of Oracle Utilities.....................................................................ht tp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8........................... 文档下载 免费文档下载 http://www.wendangwang.com/ ..........Oracle Database Features ....................................................................... ............................................. Overview of Scalability and Performance Features................................................................... Concurrency .................................................................... ......................................................... Read Consistency .................................................................... ................................................ Locking Mechanisms ..................................................................... ......................................... Quiesce Database........................................................................ ............................................. Real Application Clusters...................................http://www.wendangwang.com/doc/f6d272 9bbb843fed64cefeb8.............................................................. ...... Portability..................................................................... ............................................................. 文档下载 免费文档下载 http://www.wendangwang.com/ Overview of Manageability Features........................................................................ ................... Self-Managing Database........................................................................ ................................. Oracle Enterprise Manager......................................................................... ............................ SQL*Plus........................................................................ ............................................................ Automatic Storage Management...................................................................... ..................... The Scheduler................http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8 ................................................................................ ........................... Database Resource Manager ........................................................................ ......................... Overview of Database Backup and Features............................................................. Recovery 文档下载 免费文档下载 http://www.wendangwang.com/ Types of Failures ....................................................................... .............................................. Structures Used for Recovery ....................................................................... ......................... Overview of High Availability Features........................................................................ ..............Overview of Business Intelligence Features........................................................................ ........ Data Warehousing.......................http://www.wendangwang.com/doc/f6d2729bbb843fe d64cefeb8....................................................................... ..................... Extraction, Transformation, and Loading (ETL)................................................................. Materialized Views........................................................................... ....................................... Bitmap Indexes in Data Warehousing..................................................................... ............. 文档下载 免费文档下载 http://www.wendangwang.com/ Table Compression..................................................................... ............................................. Parallel Execution....................................................................... ............................................. Analytic SQL............................................................................. ................................................ OLAP Capabilities......http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8....... ................................................................................ ...................... Data Mining.......................................................................... .................................................... Partitioning.................................................................... ........................................................... Overview of Content Management Features........................................................................ ...... XML in 文档下载 免费文档下载 http://www.wendangwang.com/ Oracle.......................................................................... ................................................. LOBs............................................................................ ............................................................... Oracle Text ........................................................................... .................http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8........ ........................... iv1-161-171-171-171-181-181-181-191-201-201-201-211-211-211-211-211-221-221-221221-231-241-251-251-251-251-261-261-261-261-261-271-271-271-271-271-28 Oracle Ultra Search ......................................................................... ........................................ 1-28Oracle interMedia...................................................................... ............................................... 1-28Oracle Spatial......................................................................... ................................................... 1-28Overview of Security Features........................................................................ .............................. 1-28 Security Mechanisms ..................................................................... ......................................... 1-29Overview of Data Integrity anhttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8d Triggers........................................................................ ............ 1-29 文档下载 免费文档下载 http://www.wendangwang.com/ Integrity Constraints..................................................................... ........................................... 1-30Keys ....................................................................... .................................................................... 1-30Triggers ................................................................... .................................................................. 1-30Overview of Information Integration Features........................................................................ ... 1-31 Distributed SQL ............................................................................ .......................................... 1-31Oracle Streams ........................................................................ ..............................http://www.wendangwang.com/doc/f6d2729bbb843fed64c efeb8................... 1-31Oracle Transparent Gateways Connectivity................................................. Database and Generic 1-33Oracle Application Development .................................................................... ............... 1-33 Overview of Oracle SQL............................................................................. ................................... 1-33 SQL Statements...................................................................... .................................................. 1-33Overview of 文档下载 免费文档下载 http://www.wendangwang.com/ PL/SQL.......................................................................... ............................................ 1-34 PL/SQL Program Units........................................................................... ............................... 1-35Overview of Java............................................................................ .http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8........................ ........................ 1-35Overview of Application Programming Languages (APIs)..................................................... 1-35Overview of Transactions.................................................................... .......................................... Commit 1-36 and Undo Transactions.................................................................... ........................ 1-37Savepoints.................................................................. ............................................................... 1-37Overview of Datatypes....................................................................... ............................................ 1-37Overview of Globalization .................................................................. .......................................... 1-38Part II Oracle Database Architecture 2 Data Blocks, Extents, http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8and Segments Introduction to Data Blocks, Extents, and Segments........................................................................ 文档下载 免费文档下载 http://www.wendangwang.com/ 2-1Overview of Data Blocks.......................................................................... .............................................. 2-3 Data Block Format ......................................................................... .................................................... Header 2-3 (Common and Variable)....................................................................... ....................... 2-4Table Directory....................................................................... ..................................................... 2-4Row Directory....................................................................... ...................................................... 2-4Overhead....................................................http://www.wendan gwang.com/doc/f6d2729bbb843fed64cefeb8.......................................... ........................................ 2-4Row Data............................................................................ .......................................................... 2-4Free Space........................................................................... .......................................................... 2-4Free Space Management...................................................................... .............................................. Availability and Optimization of 2-4 Free Block.............................................. Space in 2-5Row a Data Chaining and Migrating ...................................................................... ............................ 2-5PCTFREE, PCTUSED, and Row Chaining ....................................................................... 文档下载 免费文档下载 http://www.wendangwang.com/ ............. 2-6 The PCTFREE Parameter.........http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8....... ................................................................................ ........... 2-6The PCTUSED Parameter....................................................................... ................................... 2-7Overview of Extents......................................................................... ..................................................... When 2-10 Extents Are Allocated ...................................................................... .................................. 2-10 v Determine the Number and Size of Extents ........................................................................ ....... 2-10How Extents Are Allocated ...................................................................... .................................... 2-11When Extents Are Deallocated .................................................................... ........................http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8. ....... 2-11 Extents in Nonclustered Tables.......................................................................... ................... 2-12Extents in Clustered Tables.......................................................................... 文档下载 免费文档下载 http://www.wendangwang.com/ .......................... 2-12Extents in Materialized Views and Their Logs.................................................................... 2-12Extents in Indexes......................................................................... ........................................... 2-13Extents in Temporary Segments........................................................................ .................... 2-13Extents in Rollback Segments........................................................................ ......................... 2-13Overview of Segments........................................................................ ............................................http://www.wendangwang.com/doc/f6d27 29bbb843fed64cefeb8..... 2-13 Introduction to Data Segments ....................................................................... ............................. 2-13Introduction to Index Segments ....................................................................... ............................ 2-14Introduction to Temporary Segments ....................................................................... .................. 2-14 Operations Segments 2-14Segments that Require Temporary .................................................................. in Temporary Tables and Indexes ............................................................ Temporary Segments Their 2-15How Are Allocated ...................................................................... .... 2-15Introduction to Automatic Undo Management...................................................................... .... 2-16 文档下载 免费文档下载 http://www.wendangwang.com/ Undo Mode...................http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8.. ................................................................................ .......................... 2-16Undo Quota........................................................................... ................................................... 2-17Automatic Undo Retention....................................................................... .............................. 2-17External Views........................................................................... ............................................... 2-17 3 Tablespaces, Datafiles, and Control Files Introduction to Tablespaces, Datafiles, and Files............................................................... Control 3-1 Oracle-Managed Files........................................................................... ............................................. 3-2Allocate More Space for a Database ................................http://www.wendangwang.com/doc/f6d2729b bb843fed64cefeb8............................................................... 3-2Overview of Tablespaces..................................................................... ................................................... 3-4 Bigfile Tablespaces..................................................................... ........................................................ 3-5 文档下载 免费文档下载 http://www.wendangwang.com/ Benefits of Bigfile Tablespaces..................................................................... ............................. 3-6Considerations with Bigfile Tablespaces..................................................................... ............ 3-6The SYSTEM Tablespace ..................................................................... ............................................. 3-6 The Data Dictionary...................................................................... .............................................. 3-7PL/http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8SQL Program Units Description..................................................................... ................... 3-7The SYSAUX Tablespace...................................................................... ............................................. 3-7Undo Tablespaces..................................................................... ......................................................... Creation 3-7 of Undo Tablespaces..................................................................... ............................. 3-8Assignment of Undo Tablespaces..................................................................... ....................... 3-8Default Temporary Tablespace...................................................................... .................................. How to Specify 3-8 a Default Temporary Tablespace.................................................................. http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb83-8Using Multiple 文档下载 免费文档下载 http://www.wendangwang.com/ Tablespaces..................................................................... ......................................... 3-9Managing Space in Tablespaces .................................................................... .................................. 3-9 Locally Managed Tablespaces .................................................................... ........................... Tablespaces 3-10Segment Space Management in Locally Managed ...................................... 3-10Dictionary Managed Tablespaces .................................................................... ..................... 3-11Multiple Block Sizes........................................................................... ............................................. 3-11Online and Offline Tablespaces..................................................................... ............................... 3-11 http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8Bringing Tablespaces Offline......................................................................... ........................ 3-12 vi Use of Tablespaces for Special Procedures...................................................................... .... 3-12Read-Only Tablespaces .................................................................... ............................................. 3-13Temporary Tablespaces for Sort Operations...................................................................... ......... 3-13 文档下载 免费文档下载 http://www.wendangwang.com/ Sort Segments ....................................................................... ................................................... 3-13Creation of Temporary Tablespaces .................................................................... ................. 3-14Transport of Tablespaces Between Databases ...................................................................... ..... http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb83-14 Tablespace Repository...................................................................... ....................................... 3-14How to Move or Copy a Tablespace to Another Database ............................................... 3-15Overview of Datafiles....................................................................... ................................................... 3-15 Datafile Contents ....................................................................... ..................................................... 3-16Size of Datafiles ...................................................................... ........................................................ 3-16Offline Datafiles ...................................................................... ........................................................ 3-16Temporary Datafiles ........................................................http://www.wen dangwang.com/doc/f6d2729bbb843fed64cefeb8....................................... ....................... 3-16Overview of Control Files........................................................................... ........................................ 3-17 文档下载 免费文档下载 http://www.wendangwang.com/ Control File Contents ....................................................................... .............................................. 3-17Multiplexed Control Files .......................................................................... ................................... 3-184 Transaction Management Introduction to Transactions.................................................................... .............................................. Statement Execution 4-1 and Transaction Control ........................................................................ ..... 4-3Statement-Level Rollback ....................................................................... ................http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8......... ................. 4-3Resumable Space Allocation...................................................................... ....................................... 4-3Overview of Transaction Management...................................................................... .......................... 4-4 Commit Transactions ................................................................... ..................................................... 4-4Rollback of Transactions ................................................................... ............................................... 4-5Savepoints In Transactions.................................................................... ........................................... 4-6Transaction Naming.......................................................................... ................................................ 4-7 文档下载 免费文档下载 http://www.wendangwang.com/ How Transactions Are Named..........http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8.......... ............................................................................. 4-7Commit Comment......................................................................... ............................................. 4-7The Two-Phase Commit Mechanism ...................................................................... ....................... 4-8Overview of Autonomous Transactions.................................................................... .......................... 4-8 Autonomous PL/SQL Blocks ......................................................................... ................................. Transaction Control 4-9 Statements in Blocks ..................................................... Autonomous 4-9 5 Schema Objects Introduction to Schema Objects ........................................................................ ................................... 5-1Ohttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8verview of Tables ......................................................................... ........................................................ How Table Data 5-3 Is Stored ......................................................................... 文档下载 免费文档下载 http://www.wendangwang.com/ ....................................... Row 5-4 Format and Size ........................................................................... ..................................... 5-5Rowids of Row Pieces ......................................................................... ...................................... 5-6Column Order .......................................................................... .................................................. 5-6Table Compression..................................................................... ....................................................... 5-7 Using Table Compression..............................http://www.wendangwang.com/doc/f6d2729b bb843fed64cefeb8................................................................ ............ 5-7Nulls Indicate Absence of Value........................................................................... ........................... 5-8Default Values for Columns ........................................................................ .................................... Default Value Insertion 5-8 and Integrity Checking ............................................... Constraint 5-8 vii Partitioned Tables.......................................................................... .................................................... 5-9Nested Tables ......................................................................... 文档下载 免费文档下载 http://www.wendangwang.com/ ......................................................... 5-10Temporary Tables ......................................................................... ................................................http://www.wendangwang.com/doc/f 6d2729bbb843fed64cefeb8. 5-10 Segment Allocation...................................................................... ............................................ 5-10Parent and Child Transactions ................................................................... ........................... 5-11External Tables.......................................................................... ...................................................... 5-11 The Access Driver.......................................................................... .......................................... 5-11Data Loading with External Tables.......................................................................... ............. 5-12Parallel Access to External Tables.......................................................................... ............... 5-12Overview of Views........................................................................... ........http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8................. ............................5-13 How Views are Stored.......................................................................... ..........................................How Views Are Used ........................................................................... .........................................Mechanics of Views .......................................................................... 文档下载 免费文档下载 http://www.wendangwang.com/ ............................................. Globalization Support Parameters in Views........................................................................ Use of Indexes Against Views........................................................................... ..................... Dependencies and Views .......................................................................... ....................................Updatable Join Views ........................................................http://www.wendang wang.com/doc/f6d2729bbb843fed64cefeb8........................................... .................Object Views........................................................................... .........................................................Inline Views .......................................................................... ..........................................................Overview of Materialized Views........................................................................... ............................ Define Constraints on Views........................................................................... ..............................Refresh Materialized Views .......................................................................... ................................Materialized View Logs ........................................................................... .....................................Overview of 文档下载 免费文档下载 http://www.wendangwang.com/ Dimensions...............................http://www.wendangwang.com/doc/f6d2729b bb843fed64cefeb8................................................................ ......................Overview of the Sequence Generator....................................................................... ........................Overview of Synonyms........................................................................ ................................................Overview of Indexes......................................................................... .................................................... Unique and Nonunique Indexes ........................................................................ ..........................Composite Indexes......................................................................... .................................................Indexes and Keys ........................................................................... ................................................Indexes and Nulls ............http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8....... ................................................................................ .......................Function-Based Indexes......................................................................... ........................................ Uses of Function-Based Indexes ........................................................................ ................... Optimization with Function-Based Indexes ....................................................................... 文档下载 免费文档下载 http://www.wendangwang.com/ Dependencies of Function-Based Indexes ........................................................................ ... How Indexes Are Stored ......................................................................... ...................................... Format of Index Blocks.......................................................................... .................................. The Internal Structure of Inhttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8dexes.................. ........................................................................ Index Properties...................................................................... ................................................. Advantages of B-tree Structure....................................................................... ....................... Index Unique Scan............................................................................ ..............................................Index Range Scan............................................................................ ................................................Key Compression .................................................................... 文档下载 免费文档下载 http://www.wendangwang.com/ ....................................................... Prefix and Suffix Entries ........................................................................ ................................://www.wendangwang.com/doc/f6d2729bbb843fed64cef eb8r Performance and Storage Considerations ................................................................. .......... Uses of Key Compression .................................................................... .................................. Reverse Key Indexes ........................................................................ ..............................................viii5-135-145-145-155-155-155-165165-165-175-175-185-185-195-195-205-215-225-225-235-235-245-245-245-255-265-265265-275-285-285-285-285-285-295-295-30 Bitmap Indexes ........................................................................ ....................................................... Benefits for 5-30 Data Warehousing Applications ................................................................... .. 5-30Cardinality................................................................. ........................http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8. ...................................... 5-31Bitmap Index 文档下载 免费文档下载 http://www.wendangwang.com/ Example......................................................................... ...................................5-32Bitmap Indexes and Nulls .......................................................................... ........................... 5-33Bitmap Indexes on Partitioned Tables.......................................................................... ........ 5-33Bitmap Join Indexes......................................................................... ............................................... 5-33Overview of Index-Organized Tables.......................................................................... ..................... 5-34 Benefits of Index-Organized Tables ......................................................................... ................... 5-35Index-Organized Tables with Row Overflow Area......................................http://www.wendangwang.com/doc/f6d2729 bbb843fed64cefeb8............................. 5-35Secondary Indexes on Index-Organized Tables......................................................................... 5-36Bitmap Indexes on Index-Organized Tables.......................................................................... ..... 5-36 Mapping Table........................................................................... .............................................. 5-36Partitioned Index-Organized Tables.......................................................................... .................. Index-Organized 5-37B-tree Indexes on UROWID Columns for Heap- and Tables.................... 5-37Index-Organized Table Applications.................................................................... ....................... 5-37Overview of Application Domain 文档下载 免费文档下载 http://www.wendangwang.com/ Indexes......................................................................... ............. 5-37Overview of Clusthttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8ers................. ................................................................................ ........................... 5-38Overview of Hash Clusters........................................................................ ......................................... 5-406 Dependencies Among Schema Objects Introduction to Dependency Issues.......................................................................... ............................ 6-1Resolution of Schema Object Dependencies.................................................................... .................. Compilation 6-3 of Views and PL/SQL Program Units .................................................................... Views and 6-4 Base Tables.......................................................................... ..................................... 6-4Program Units and Referenced Objects..................................http://www.wendangwang.com/doc/f6d2729b bb843fed64cefeb8................................................. 6-5Data Warehousing Considerations.................................................................. ........................ 6-5Session State and Referenced Packages........................................................................ ........... 6-5Security Authorizations.................................................................. ........................................... 6-6Object Name 文档下载 免费文档下载 http://www.wendangwang.com/ Resolution...................................................................... ................................................... 6-6Shared SQL Dependency Management...................................................................... ......................... 6-6Local and Remote Dependency Management...................................................................... .............. 6-7 Management of Local Dependencies...............................................http://www.wendangwan g.com/doc/f6d2729bbb843fed64cefeb8............................................... 6-7Management of Remote Dependencies.................................................................... ...................... Dependencies 6-7 Among Local and Procedures......................................... Remote Database 6-7Dependencies Among Other Remote Schema Objects ......................................................... 6-9Dependencies of Applications ................................................................... .............................. 6-9 7 The Data Dictionary Introduction to the Data Dictionary ..................................................................... ............................... Structure 7-1 of the Data Dictionary ..................................................................... ................................ 7-2 文档下载 免费文档下载 http://www.wendangwang.com/ Base Tables.......................................................http://www.wendangw ang.com/doc/f6d2729bbb843fed64cefeb8............................................ ................................ 7-2User-Accessible Views........................................................................... .................................... 7-2SYS, Owner of the Data Dictionary ..................................................................... ........................... 7-2How the Data Dictionary Is Used ........................................................................... ............................. How 7-2 Oracle Uses the Data Dictionary ..................................................................... ...................... 7-2 ix Public Synonyms for Data Dictionary Views......................................................................... 7-3Cache the Data Dictionary for Fast Access.......................................................................... .... 7-3Other Programs and the Data Dictionarhttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8y............... ................................................................ the 7-3How to Use Data Dictionary ..................................................................... ................................ Views with 7-3 the Prefix 文档下载 免费文档下载 http://www.wendangwang.com/ USER............................................................................ .......................... 7-4Views with the Prefix ALL............................................................................. ........................... 7-4Views with the Prefix DBA............................................................................. ........................... 7-4The DUAL Table........................................................................... .............................................. 7-4Dynamic Performance Tables ......................................................................... ...................................... 7-5Database Object Metadahttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8ta................. ................................................................................ ..................... 7-58 Memory Architecture Introduction to Oracle Memory Structures ..................................................................... ................... 8-1Overview of the System Global Area............................................................................ ....................... The 8-2 SGA_MAX_SIZE Initialization Parameter....................................................................... ....... 8-3Automatic Shared Memory Management...................................................................... ................ The 8-4 SGA_TARGET Initialization Parameter....................................................................... ... 8-5Automatically Managed SGA Components...................................................................... 文档下载 免费文档下载 http://www.wendangwang.com/ ..... 8-5Manuallhttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8y Managed SGA Components...................................................................... .............. 8-6Persistence of Automatically Tuned Values........................................................................... 8-6Adding Granules and Tracking Component Size......................................................................... 8-6Database Buffer Cache........................................................................... ............................................ Organization of 8-7 the Database Buffer Cache ........................................................................... 8-7The LRU Algorithm and Full Table Scans .......................................................................... .... 8-8Size of the Database Buffer Cache........................................................................... ................. 8-8Multiple Buffer Pools ................................http://www.wendangwang.com/doc/f6d2729bbb8 43fed64cefeb8................................................................... .............. 8-9Redo Log Buffer ......................................................................... ..................................................... 8-10Shared Pool ........................................................................... .......................................................... 8-10 Library Cache........................................................................... ................................................ Private 8-10Shared SQL Areas and SQL 文档下载 免费文档下载 http://www.wendangwang.com/ Areas........................................................................... 8-10PL/SQL Program Units and the Shared Pool...................................................................... 8-11Dictionary Cache........................................................................... ........................................... 8-11Allocation Mehttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8mory and in Reuse the Pool......................................................... of Shared 8-11Large Pool............................................................................ ............................................................. 8-13Java Pool............................................................................ ............................................................... 8-13Streams Pool............................................................................ ......................................................... SGA’s 8-13Control of the Use of Memory.......................................................................... ................. 8-14Other SGA Initialization Parameters...................................................................... ...................... 8-14 Physical Memory ......................................................................... ................................http://www.wendangwang.com/doc/f6d2729bbb843fed6 4cefeb8........... 8-14SGA Starting Address ........................................................................ .................................... 8-14Extended Buffer Cache Mechanism ...................................................................... ............... 8-14Overview of the Program Global Areas........................................................................... ................. 8-14 文档下载 免费文档下载 http://www.wendangwang.com/ Content of the PGA ............................................................................ ............................................ 8-15 Private SQL Area............................................................................ .......................................... 8-15Session Memory.......................................................................... ............................................. 8-16SQL Work Areas.......................................................................http ://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8............................. .......................... 8-16PGA Memory Management for Dedicated Mode...................................................................... 8-16x Dedicated and Shared Servers......................................................................... ................................... 8-18Software Code Areas .......................................................................... ................................................. 8-189 Process Architecture Introduction to Processes ...................................................................... ................................................. 9-1 Multiple-Process Oracle Systems ........................................................................ ............................ 9-1Types of Processes ...................................................................... 文档下载 免费文档下载 http://www.wendangwang.com/ ..........................................http://www.wendangwang.com/doc/f6d2729 bbb843fed64cefeb8............. 9-2Overview of User Processes....................................................................... ............................................ 9-3 Connections and Sessions ....................................................................... ......................................... 9-3Overview of Oracle Processes....................................................................... ......................................... 9-3 Server Processes....................................................................... .......................................................... 9-3Background Processes....................................................................... ................................................ Database 9-4 Writer Process (DBWn) ......................................................................... ................... 9-6Log Writer Process (LGWR) .........http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8......... ................................................................................ ... 9-6Checkpoint Process (CKPT) ......................................................................... ............................ 9-8System Monitor Process (SMON) ......................................................................... ................... 9-8Process Monitor Process (PMON) ......................................................................... .................. 9-8Recoverer Process (RECO) ......................................................................... 文档下载 免费文档下载 http://www.wendangwang.com/ ............................... 9-9Job Queue Processes....................................................................... ............................................ 9-9Archiver Processes (ARCn) ......................................................................... .......................... 9-10Queue Monitor Processes (QMNn) ....................http://www.wendangwang.com/doc/f6d2729bbb843fed64cefe b8.................................................................. 9-10Other Background Processes....................................................................... ........................... 9-10Trace Files and the Alert Log ............................................................................ ............................ 9-11Shared Server Architecture ................................................................... .............................................. Dispatcher Request 9-11 and Response Queues ......................................................................... ....... 9-12 Dispatcher Processes (Dnnn).......................................................................... ........................ 9-14Shared Server Processes (Snnn).......................................................................... ................... 9-14Restricted Operations of the Shared Server ..http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8................ ............................................................. 9-15Dedicated Server Configuration .................................................................. ..................................... 9-15The Program Interface ...................................................................... 文档下载 免费文档下载 http://www.wendangwang.com/ ................................................... 9-17 Program Interface Structure ...................................................................... ................................... 9-17Program Interface Drivers ........................................................................ .................................... 9-17Communications Software for the Operating System .............................................................. 9-1810 Application Architecture Introduction to Client/Server Architecture.................................................................... ..............http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8.... 10-1Overview of Multitier Architecture ................................................................... ............................... 10-3 Clients......................................................................... ...................................................................... 10-4Application Servers......................................................................... ................................................ 10-4Database Servers......................................................................... .................................................... 10-4Overview of Oracle Net Services........................................................................ ............................... How Oracle 10-5 Net Services Works........................................................................... ........................10-5The 文档下载 免费文档下载 http://www.wendangwang.com/ Listener ....................................http://www.wendangwang.com/doc/f6d2 729bbb843fed64cefeb8............................................................ ..................................... 10-6 Service Information Registration.................................................................... ....................... 10-6 xi 11 Oracle Utilities Introduction to Oracle Utilities ...................................................................... ................................... 11-1Overview of Data Pump Export and Import.......................................................................... .......... 11-2Data Pump Export.......................................................................... ................................................. 11-2Data Pump Import.......................................................................... ................................................ 11-2Overview of the Data Pump API.......................................................http://www.wendangwang .com/doc/f6d2729bbb843fed64cefeb8............................................... .. 11-2Overview of the Metadata API............................................................................. .............................. 11-2Overview of SQL*Loader...................................................................... .............................................. 11-3Overview of External Tables.......................................................................... ..................................... 11-3Overview of 文档下载 免费文档下载 http://www.wendangwang.com/ LogMiner........................................................................ ................................................. 11-4Overview of DBVERIFY Utility......................................................................... ................................Overview of DBNEWID Utility......................................................................... ................................12 Database and Instance Startup and Shutdowhttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8n Introduction to an Oracle Instance ....................................................................... ............................The Instance and the Database ....................................................................... ..............................Connection with Administrator Privileges ..................................................................... ...........Initialization Parameter Files and Server Parameter Files........................................................How Parameter Values Are Changed......................................................................... .......... Overview of Instance and Database Startup ........................................................................ ..........How an Instance Is Started......................................................................... ................................... Restricted Mode of Instance Startup.......http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8........... ................................................................... 文档下载 免费文档下载 http://www.wendangwang.com/ Forced Startup in Abnormal Situations...................................................................... .......... How a Database Is Mounted......................................................................... ................................How a Database Is Mounted with Real Application Clusters.......................................... How a Standby Database Is Mounted......................................................................... ......... How a Clone Database Is Mounted......................................................................... .............. What Happens When You Open a Database........................................................................ ...... Instance Recovery........................................................................ .........................http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8 ................... Undo Space Acquisition and Management...................................................................... .... 文档下载 免费文档下载 http://www.wendangwang.com/ Resolution of In-Doubt Distributed Transaction................................................................. Open a Database in Read-Only Mode ........................................................................... ...... Overview of Database and Instance Shutdown........................................................................ ......Close a Database ....................................................................... ...................................................... Close the Database by Terminating the Instance................................................................ Unmount a Database ....................................................................... ..............................................Shut Down an Instancehttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8 ................ ................................................................................ .................. Abnormal Instance Shutdown........................................................................ ....................... Part III Oracle Database Features 13 Data Concurrency and Consistency 文档下载 免费文档下载 http://www.wendangwang.com/ Introduction to Data Concurrency Environment..................Preventable and Consistency Phenomena and in a Transaction Multiuser Isolation Levels .....................................................Overview of Locking Mechanisms...................................................................... .........................How Oracle Manages Data Concurrency and Consistency..........................................................xii11-411-5 12-112-212-212-312-312-412-412-412-412-412-512-512-512-612-612-612-612-612-712-7 12-712-812-812-813-113-213-213-3 Multiversion Concurrency Control http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8......................... .................................................................... 13-3Statement-Level Read Consistency .................................................................... ......................... 13-4Transaction-Level Read Consistency .................................................................... ...................... 13-4Read Consistency with Real Application Clusters..................................................................... 13-4Oracle Isolation Levels ......................................................................... ......................................... Set 13-5 the Isolation Level .......................................................................... ................................... 13-5Read Committed Isolation....................................................................... ............................... 13-5Serializable Isolation.......http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8......... ................................................................................ 文档下载 免费文档下载 http://www.wendangwang.com/ ................ 13-6Comparison of Read Committed Isolation ................................................... and Serializable 13-7 Transaction Set Consistency..................................................................... .............................. 13-7Row-Level Locking......................................................................... ......................................... 13-8Referential Integrity....................................................................... .......................................... 13-8Distributed Transactions.................................................................... ..................................... 13-9Choice of Isolation Level .......................................................................... ..................................... Read 13-9 Cohttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8mmitted Isolation....................................................................... ............................... 13-9Serializable Isolation....................................................................... ....................................... 13-10Quiesce Database........................................................................ ........................................... 13-11How Oracle Locks Data............................................................................ .......................................... Transactions 13-12 and Data Concurrency .................................................................... ..................... Modes 13-12 of 文档下载 免费文档下载 http://www.wendangwang.com/ Locking......................................................................... .......................................... 13-13Lock Duration........................................................................ ..................http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8....... ........................ 13-13Data Lock Conversion Versus Lock Escalation................................................................. 13-13Deadlocks ................................................................. ..................................................................... 13-14 Deadlock Detection....................................................................... ......................................... 13-14Avoid Deadlocks....................................................................... ............................................. 13-15Types of Locks .......................................................................... .................................................... 13-15DML Locks .......................................................................... .......................................................... 13-15 Row Locks (TX)............................http://www.wendangwang.com/doc/f6d2729bbb843fed6 4cefeb8......................................................................... ................. 13-16Table Locks (TM)............................................................................ ....................................... for DML 13-16DML Locks Automatically Acquired Statements............................................. 13-19DDL Locks........................................................................... ........................................................... Exclusive 13-21 DDL 文档下载 免费文档下载 http://www.wendangwang.com/ Locks........................................................................... .................................. 13-21Share DDL Locks........................................................................... ......................................... 13-22Breakable Parse Locks........................................................................... ................................ 13-22Duration of DDL Locks...........http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8......... ................................................................................ ..... 13-22DDL Locks and Clusters........................................................................ ............................... 13-22Latches and Internal Locks .......................................................................... ............................... 13-22 Latches......................................................................... ............................................................ 13-22Internal Locks........................................................................... .............................................. 13-23Explicit (Manual) Data Locking ........................................................................ ......................... 13-23Oracle Lock Management Services........................................................................ ..................... 13-24Ohttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8verview of Oracle Flashback Query........................................................................... .................. 13-24 Flashback Query Benefits........................................................................ ..................................... 13-25Some Uses of Flashback 文档下载 免费文档下载 http://www.wendangwang.com/ Query........................................................................... ........................ 13-2614 Manageability Installing Oracle and Getting Started......................................................................... ...................... 14-1 xiii Simplified Database Creation........................................................................ ................................ 14-2Instant Client.......................................................................... .......................................................... 14-2Automated Upgrades..........................http://www.wendangwang.com/doc/f6d2729bbb843fe d64cefeb8....................................................................... .................... 14-2Basic Initialization Parameters...................................................................... ................................ 14-2Data Loading, Transfer, and Archiving....................................................................... ................ 14-3Intelligent Infrastructure.................................................................. ................................................... 14-3 Automatic Workload Repository...................................................................... ............................ 14-3Automatic Maintenance Tasks........................................................................... ........................... 14-4Server-Generated Alerts.......................................................................... 文档下载 免费文档下载 http://www.wendangwang.com/ ....................................... 14-4Advhttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8isor Framework....................................................................... ................................................. 14-4Performance Diagnostic and Troubleshooting................................................................. ............... 14-5Application and SQL Tuning.......................................................................... .................................... 14-6Memory Management...................................................................... .................................................... 14-7Space Management...................................................................... ......................................................... 14-9 Automatic Undo Management...................................................................... ............................... 14-9Oracle-Managed Files.........................................................................ht tp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8........................... ............... 14-10Free Space Management...................................................................... ......................................... 14-10Proactive Space Management...................................................................... ................................ 14-10Intelligent Capacity Planning........................................................................ .............................. 14-10Space Reclamation..................................................................... ................................................... 14-11Storage Management...................................................................... .................................................... 14-12Backup and 文档下载 免费文档下载 http://www.wendangwang.com/ Recovery........................................................................ ................................................. 14-12 Recovery Manager.............http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8..... ................................................................................ ...................... 14-13Mean Time to Recovery........................................................................ ........................................ 14-14Self Service Error Correction...................................................................... ................................. 14-14Configuration Management...................................................................... ........................................ 14-14Workload Management...................................................................... ................................................ 14-15 Overview Database of the Resource Manager.......................................................................... 14-15 Database Resource Manager Concepts........................................................................ ....... 14-http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb816Overview of Services........................................................................ ............................................ Workload 14-17 Management with Services........................................................................ ........ 14-17High Availability with 文档下载 免费文档下载 http://www.wendangwang.com/ Services........................................................................ ................... 14-18Automatic Storage Management...................................................................... ................................ Basic Concepts 14-19 Automatic Storage Management .................................................................... 14-20 Disk Groups.......................................................................... .................................................. 14-20Automatic Storage Management Files........................................................................... ..... http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb814-20Automatic Storage Management Templates...................................................................... 14-21Automatic Storage Management Disks........................................................................... ... 14-21Failure Groups.......................................................................... .............................................. 14-22Automatic Storage Management Instances........................................................................ 14-22Benefits of Using Automatic Storage Management................................................................. 14-23Oracle Scheduler....................................................................... .......................................................... 14-24 文档下载 免费文档下载 http://www.wendangwang.com/ What Can the Scheduler Do?............................................................................. .......................... 14-24 Schedule Job Exhttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8ecution................ ................................................................................ ......... 14-25Time-based scheduling...................................................................... ................................... 14-25Event-Based Scheduling...................................................................... .................................. 14-25Define Multi-Step Jobs............................................................................ .............................. 14-25 xiv Schedule Job Processes that Requirements........................................... Model Business 14-25Manage and Monitor Jobs............................................................................ ........................ 14-25Execute and Manage Jobs Environment................................................... in a Clustered 14-26 15 Backup and Recovery Introductihttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8on to Backup.......................................................................... .............................................. Consistent and 15-1 Inconsistent 文档下载 免费文档下载 http://www.wendangwang.com/ Backups......................................................................... .................. 15-2 Overview of Consistent Backups......................................................................... .................. 15-2Overview of Inconsistent Backups......................................................................... ............... 15-3Whole Database and Partial Database Backups......................................................................... 15-3 Whole Database Backups......................................................................... ............................... 15-4Tablespace Backups......................................................................... ........................................ http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8 15-4Datafile Backups......................................................................... .............................................. 15-4RMAN and User-Managed Backups......................................................................... ................... 15-5 RMAN with Online Backups......................................................................... ........................ 15-5Control File Backups......................................................................... ...................................... 15-5Archived Redo Log Backups......................................................................... ......................... 15-6Introduction to Recovery........................................................................ 文档下载 免费文档下载 http://www.wendangwang.com/ ............................................. Overview 15-6 of Media Recovery........................................................................ .......http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8.................. ....... 15-8 Complete Recovery........................................................................ .......................................... 15-8Incomplete Recovery........................................................................ ....................................... 15-8Datafile Media Recovery........................................................................ ............................... 15-10Block Media Recovery........................................................................ ................................... 15-11Overview of RMAN and User-Managed Restore and Recovery........................................... RMAN 15-11 Restore and Recovery........................................................................ ...................... 15-11User-Managed Restore and Recovery........................................................................ ......... http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb815-11Recovery Using Oracle Flashback Technology...................................................................... ... 15-12 Overview of Oracle Flashback Database........................................................................ .... 15-12Overview of Oracle Flashback 文档下载 免费文档下载 http://www.wendangwang.com/ Table........................................................................... ....... 15-13Other Types of Oracle Recovery........................................................................ ......................... 15-14 Overview of Redo Application..................................................................... ....................... 15-14Overview of Instance and Crash Recovery........................................................................ 15-15Deciding Which Recovery Technique to Use............................................................................. .... 15-16 When to Use Media Recovery.....http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8............ ................................................................................ .... 15-16When to Use Oracle Flashback....................................................................... ............................. 15-17When to Use CREATE TABLE AS SELECT Recovery............................................................. 15-17When to Use Import/Export Utilities Recovery....................................................................... 15-18When to Use Tablespace Point-in-Time Recovery................................................................... 15-18Flash Recovery Area............................................................................ ................................................ Flash Recovery 15-18 Area Disk Limit........................................................................... 文档下载 免费文档下载 http://www.wendangwang.com/ ...................... Introduction to 15-1916 Business Intelligence Datahttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8 Warehousing and Business Intelligence..................................................... Characteristics 16-1 of Data Warehousing..................................................................... ...................... 16-1 Subject Oriented........................................................................ ............................................... 16-2Integrated.................................................................. ................................................................ 16-2 xv Nonvolatile..................................................................... .......................................................... 16-2Time Variant......................................................................... .................................................... Data Warehouse 16-2Differences Between and OLTP Systems...........................................http://www.wendangwang.com/doc /f6d2729bbb843fed64cefeb8........... 16-2 Workload........................................................................ ........................................................... 16-2Data Modifications................................................................... ................................................ 16-2Schema 文档下载 免费文档下载 http://www.wendangwang.com/ Design.......................................................................... ............................................... 16-3Typical Operations...................................................................... ............................................. 16-3Historical Data............................................................................ .............................................. 16-3Data Warehouse Architecture.................................................................... ................................... Data 16-3 Warehouse Architecture (Basic)........................http://www.wendangwang.com/doc/f6d2729bbb843fed64 cefeb8........................................................... Warehouse a Staging Area)......................................................... 16-4Data Warehouse Architecture Architecture (with 16-3Data (with Marts)............................. a Staging Area and Data 16-5Overview of Extraction, Transformation, and Loading (ETL)...................................................... 16-6 Transportable Tablespaces..................................................................... ........................................ 16-7Table Functions....................................................................... ......................................................... 16-7External Tables.......................................................................... ...................................................... 16-8Table Compression..................................................................... ...........http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8.............. ........................... 16-8Change Data Capture......................................................................... ............................................ 16-9Overview of Materialized Views 文档下载 免费文档下载 http://www.wendangwang.com/ for Data Warehouses................................................................. 16-9Overview of Bitmap Indexes in Data Warehousing..................................................................... 16-10Overview of Parallel Execution....................................................................... ................................. How 16-11 Parallel Execution Works........................................................................... ........................ 16-11Overview of Analytic SQL............................................................................. ................................... 16-12 SQL for Aggregation.................................................http://www.wendangwa ng.com/doc/f6d2729bbb843fed64cefeb8............................................. ....................... 16-13SQL for Analysis........................................................................ .................................................... 16-13SQL for Modeling........................................................................ .................................................. 16-14Overview of OLAP Capabilities.................................................................... ................................... Benefits of 16-14 OLAP and RDBMS Integration..................................................................... .......... 16-14 Scalability..................................................................... 文档下载 免费文档下载 http://www.wendangwang.com/ ........................................................... 16-15Availability............................................................... ............................................................... 16http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8-15Manageability....... ................................................................................ .................................. 16-15Backup and Recovery........................................................................ .................................... 16-15Security................................................................... ................................................................. 16-16Overview of Data Mining.......................................................................... ........................................ 16-1617 High Availability Introduction to High Availability.................................................................... .................................. 17-1Overview of Unplanned Downtime........................................................................ .......................... Oracle 17-1 Solutions to System Failures....................http://www.wendangwang.com/doc/f6d2729bbb843fed64cef eb8.........................................................................17-1 Overview of Fast-Start Fault Recovery ....................................................................... ......... 17-2Overview of Real Application Clusters........................................................................ ........ 17-2Oracle Solutions to Data Failures........................................................................ 文档下载 免费文档下载 http://www.wendangwang.com/ .......................... Overview of 17-2 Backup and Recovery Features Availability................................. for High 17-2Overview of Partitioning ................................................................... ....................................17-3Overview of Transparent Application Failover.................................................................. 17-4Oracle Solutions to Disasters....................................................................... ..........http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8............... ......... 17-5 Overview of Oracle Data Guard........................................................................... ................. 17-5 xvi Oracle Solutions to Human Errors.......................................................................... ..................... Overview 17-6 of Oracle Flashback Features........................................................................ ....... 17-7Overview of LogMiner........................................................................ ....................................17-7Overview of Security Features for High Availability......................................................... 17-8Overview of Planned Downtime........................................................................ 文档下载 免费文档下载 http://www.wendangwang.com/ ............................... 17-8 System Maintenance..................................................................... ....http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8..................... ......................... 17-8Data Maintenance..................................................................... ...................................................... 17-9Database Maintenance..................................................................... ............................................... 17-918 Partitioned Tables and Indexes Introduction to Partitioning.................................................................... ............................................ 18-1 Partition Key............................................................................. ....................................................... 18-3Partitioned Tables.......................................................................... ................................................. 18-3Partitioned Index-Organized Tables.....................................................................http: //www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8....................... 18-3Overview of Partitioning Methods......................................................................... ........................... 18-3 Range Partitioning.................................................................... 文档下载 免费文档下载 http://www.wendangwang.com/ ...................................................... 18-4 Range Partitioning Example......................................................................... .......................... 18-5List Partitioning.................................................................... ........................................................... 18-5 List Partitioning Example......................................................................... ..............................18-5Hash Partitioning.................................................................... ........................................................ 18-6 Hash Partitioning Example.http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8................. ................................................................................ .. 18-6Composite Partitioning.................................................................... .............................................. Composite 18-7 Partitioning Range-Hash Example.................................................................... 18-7Composite Partitioning Range-List Example...................................................................... 18-8When to Partition a Table........................................................................... ................................... 18-9Overview of Partitioned Indexes......................................................................... .............................. 18-9 文档下载 免费文档下载 http://www.wendangwang.com/ Local Partitioned Indexes......................................................................... .................................... 18-10Global Partitionehttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8d Indexes......................................................................... ................................. Global 18-10 Range Partitioned Indexes......................................................................... .............. 18-10Global Hash Partitioned Indexes......................................................................... ................ 18-11Maintenance of Global Partitioned Indexes....................................................................... 18-11Global Nonpartitioned Indexes......................................................................... .......................... 18-12Miscellaneous Information about Creating Indexes on Partitioned Tables......................... 18-12Using Partitioned Indexes in OLTP Applications.................................................................... 18-13Using Partitioned Indexes in Data Warehousing and DSS Applications..........http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8... ................ 18-13Partitioned Indexes on Composite Partitions...................................................................... ..... 18-13Partitioning to Improve Performance..................................................................... ......................... 18-13 Partition Pruning......................................................................... 文档下载 免费文档下载 http://www.wendangwang.com/ .................................................. 18-13 Partition Pruning Example......................................................................... .......................... 18-14Partition-wise Joins........................................................................... ............................................ 18-14Parallel DML............................................................................. ..................................................... 18-1419 Content Management Introduction to Content Manhttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8agement............... ................................................................................ 19-1Overview of XML in Oracle.......................................................................... ...................................... 19-2Overview of LOBs............................................................................ ..................................................... 19-3 xvii Overview of Oracle Text............................................................................ ........................................... Oracle 19-3 Text Index Types........................................................................... ...................................... 19-4Oracle Text Document Services........................................................................ 文档下载 免费文档下载 http://www.wendangwang.com/ ............................ 19-4Oracle Text Query Package.....................................................http://www.wendangwa ng.com/doc/f6d2729bbb843fed64cefeb8............................................. .......... 19-4Oracle Text Advanced Features........................................................................ ............................ 19-4Overview of Oracle Ultra Search.......................................................................... .............................. 19-5Overview of Oracle interMedia...................................................................... .................................... 19-5Overview of Oracle Spatial......................................................................... ........................................ Introduction 19-620 Database Security to Database Security........................................................................ ............................. Database 20-1 Users and Schemas......................................................................... ............................... 20-http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb81 Security Domain ......................................................................... ............................................. 20-1Privileges.................................................................. ........................................................................ 20-2Roles....................................................................... ........................................................................... 20-2Storage Settings and 文档下载 免费文档下载 http://www.wendangwang.com/ Quotas.......................................................................... ................................ 20-2 Default Tablespace ..................................................................... ............................................. 20-2Temporary Tablespace ..................................................................... ......................................20-2Tablespace Quotas.........................................http://www.wendangwang.com/doc/f6 d2729bbb843fed64cefeb8.......................................................... ................ 20-2Profiles and Resource Limits.......................................................................... ........................ 20-2Overview of Transparent Data Encryption...................................................................... ................ 20-3Overview of Authentication Methods ........................................................................ ..................... 20-4 Authentication by the Operating System ......................................................................... .......... 20-4Authentication by the Network ........................................................................ ........................... 20-4 Third Party-Based Authentication Technologies................................................................ 20-5Public-Key-Infrastructure-Based Authentication.................http://www.wendangwang.com/doc/f6d2729bbb843fed64 cefeb8............................................... 20-5Remote Authentication.................................................................. 文档下载 免费文档下载 http://www.wendangwang.com/ .........................................20-5Authentication by the Oracle Database ....................................................................... ............... 20-5 Password Encryption...................................................................... ........................................ 20-6Account Locking ........................................................................ ............................................. 20-6Password Lifetime and Expiration ..................................................................... .................. 20-6Password Complexity Verification ................................................................... .................... 20-6Multitier Authentication and Authorization .............................................http://www.wendangwan g.com/doc/f6d2729bbb843fed64cefeb8................................ 20-7Authentication by the Secure Socket Layer Protocol................................................................. 20-7Authentication of Database Administrators ................................................................. ............. 20-7Overview of Authorization .................................................................. .............................................. User Resource 20-8 Limits and Profiles........................................................................ ........................ Types of 20-9 System Resources and Limits ......................................................................... ....... 文档下载 免费文档下载 http://www.wendangwang.com/ 20-9Profiles ................................................................... ................................................................. 20-11Introduction to Privileges.........................................................http://www.we ndangwang.com/doc/f6d2729bbb843fed64cefeb8...................................... ............. 20-11 System Privileges...................................................................... ............................................. 20-12Schema Object Privileges...................................................................... ................................ 20-12Introduction to Roles........................................................................... ......................................... Common 20-12 Uses for Roles .......................................................................... ............................. 20-13Role Mechanisms...................................................................... ............................................. 20-14The Operating System and Roles .......................................................................... .............. 20-14Secure Application Roles.........................http://www.wendangwang.com/doc/f6d2729bbb843fed64c efeb8........................................................................... ......... Overview 20-15xviii of Access Restrictions Rows................................ Fine-Grained on Tables, Views, Synonyms, or 20-15 Access 文档下载 免费文档下载 http://www.wendangwang.com/ Control......................................................................... .............................. 20-15 Dynamic Predicates ..................................................................... ......................................... 20-16Application Context......................................................................... ............................................. 20-16 Dynamic Contexts........................................................................ .......................................... 20-16Fine-Grained Auditing........................................................................ ......................................... 20-17Ohttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8verview of Security Policies ....................................................................... ................................... 20-17 System Security Policy.......................................................................... ....................................... 20-18 Database User Management...................................................................... ........................... 20-18User Authentication.................................................................. ............................................. 20-18Operating System Security........................................................................ ........................... 20-18Data Security Policy.......................................................................... 文档下载 免费文档下载 http://www.wendangwang.com/ ............................................ 20-18User Security Policy.......................................................................... http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8......................... ................... 20-19 General User Security........................................................................ .................................... 20-19End-User Security........................................................................ .......................................... 20-19Administrator Security........................................................................ .................................. 20-20Application Developer Security........................................................................ ................... 20-20Application Administrator Security........................................................................ ............ 20-21Password Management Policy.......................................................................... .......................... 20-21Auditing Policy...................................................................http:// www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8................................ ........................... 20-21Overview of Database Auditing........................................................................ ............................... Types 20-21 and Records of Auditing........................................................................ .......................... Audit Records 20-22 and the Audit Trails.......................................................................... 文档下载 免费文档下载 http://www.wendangwang.com/ .......... 20-23 21 Data Integrity Introduction to Data Integrity....................................................................... ...................................... Types 21-1 of Data Integrity ...................................................................... ............................................ 21-3 Null Rule............................................................................ ........................http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8. .............................. 21-3Unique Column Values.......................................................................... ................................. 21-3Primary Key Values.......................................................................... ....................................... 21-3Referential Integrity Rules........................................................................... ........................... 21-3Complex Integrity Checking........................................................................ .......................... 21-3How Oracle Enforces Data Integrity ...................................................................... ..................... Integrity 21-3 Constraints Description..................................................................... ..................... 21-4Database 文档下载 免费文档下载 http://www.wendangwang.com/ Triggers........................................................................ ......http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8................... ................... 21-4Overview of Integrity Constraints..................................................................... ................................ 21-4 Advantages of Integrity Constraints .................................................................... ....................... 21-5 Declarative Ease............................................................................ ........................................... 21-5Centralized Rules........................................................................... .......................................... 21-5Maximum Application Development Productivity............................................................ 21-5Immediate User Feedback........................................................................ .............................. 21-5Superior Performance...........................................................http://www .wendangwang.com/doc/f6d2729bbb843fed64cefeb8................................... ................ 21-5Flexibility for Data Loads and Identification of Integrity Violations............................... 21-6The Performance Cost of Integrity Constraints .................................................................... ..... 21-6Types of Integrity Constraints..................................................................... ....................................... NOT NULL 21-6 Integrity Constraints .................................................................... 文档下载 免费文档下载 http://www.wendangwang.com/ ............................ 21-6UNIQUE Key Integrity Constraints .................................................................... ........................ 21-7 xix Unique Keys............................................................................ .................................................. 21-7UNIQUE Key Constraints and Indexes................................http://www.wendangwang.com/doc/f6d2729bbb 843fed64cefeb8................................................ 21-8Combine UNIQUE Key and NOT NULL Integrity Constraints....................................... 21-9PRIMARY KEY Integrity Constraints .................................................................... ..................... 21-9 Primary Keys............................................................................ ................................................ 21-9PRIMARY KEY Constraints and Indexes......................................................................... .. 21-10Referential Integrity Constraints .................................................................... ............................ 21-10 Self-Referential Integrity Constraints..................................................................... ............. 21-12Nulls and Foreign Keys............................................................................ 文档下载 免费文档下载 http://www.wendangwang.com/ ................http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8......... .... 21-13Actions Defined by Referential Integrity Constraints...................................................... 21-13Concurrency Control, Indexes, and Foreign Keys............................................................ 21-14CHECK Integrity Constraints .................................................................... ................................. 21-16 The Check Condition....................................................................... ...................................... 21-16Multiple CHECK Constraints..................................................................... ......................... 21-17The Mechanisms of Constraint Checking........................................................................ .............. Default Checking 21-17 Column Values and Integrity ................................................. Constraint 21-19Deferred Constraint Checking...http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8.............. ................................................................................ ......... 21-19 Constraint Attributes ..................................................................... .............................................. 21-19SET CONSTRAINTS Mode ........................................................................... ............................. 21-19Unique Constraints and Indexes ........................................................................ 文档下载 免费文档下载 http://www.wendangwang.com/ ........................ 21-20Constraint States.......................................................................... ........................................................ 21-20 Constraint State Modification.................................................................... .................................. 21-2122 Triggers Introduction to Triggers..............................................................http://www .wendangwang.com/doc/f6d2729bbb843fed64cefeb8................................... ..................... 22-1 How Triggers Are Used ........................................................................... ..................................... Some 22-2 Cautionary Notes about Triggers ....................................................................... ....... Constraints 22-3Triggers Compared with Declarative ............................................. Integrity 22-4Parts of a Trigger......................................................................... ........................................................... The Triggering Event 22-5 or Statement ...................................................................... ....................... 22-5Trigger Restriction..................................................................... ..................................................... 22-6Trigger Action .........................http://www.wendangwang.com/doc/f6d2729bbb843fed6 文档下载 免费文档下载 http://www.wendangwang.com/ 4cefeb8......................................................................... ............................... 22-6Types of Triggers........................................................................ ........................................................... Row Triggers 22-7 and Statement Triggers ....................................................................... ................. 22-7 Row Triggers ....................................................................... .................................................... 22-7Statement Triggers ....................................................................... ........................................... 22-7BEFORE and AFTER Triggers ....................................................................... ...............................22-7 BEFORE Triggers ....................................................................... ................http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8......... .................... 22-8AFTER Triggers ....................................................................... ................................................ 22-8Trigger Type Combinations ................................................................... ............................... 22-8INSTEAD OF Triggers ....................................................................... ............................................ 22-9 Modify Views .......................................................................... 文档下载 免费文档下载 http://www.wendangwang.com/ ................................................ 22-9Views That Are Not Modifiable ..................................................................... ....................... 22-9INSTEAD OF Triggers on Nested Tables .......................................................................... 22-10Triggers on System Events and User Events .....................................................http://www.wendangwa ng.com/doc/f6d2729bbb843fed64cefeb8....................... 22-10 Event Publication .................................................................... .............................................. 22-11Event Attributes ..................................................................... ............................................... 22-11 xx System Events ......................................................................... ............................................... 22-11User Events ......................................................................... ................................................... 22-11Trigger Execution....................................................................... .......................................................... The Execution Checking Model for Triggers and ............................... 22-12 Integrity 22-13Data Constraint Access for Triggers ....................http://www.wendangwang.com/doc/f6d2729bbb843fed64ce feb8............................................................................ ............. 22-14Storage of PL/SQL Triggers........................................................................ 文档下载 免费文档下载 http://www.wendangwang.com/ ................................ 22-15Execution of Triggers ....................................................................... ............................................ 22-15Dependency Maintenance for Triggers ....................................................................... .............. 22-15Part IV Oracle Database Application Development 23 Information Integration Introduction to Oracle Information Integration..................................................................... ......... 23-1Federated Access.......................................................................... .......................................................... 23-2 Distributed SQL................................http://www.wendangwang.com/doc/f6d2729bbb843f ed64cefeb8...................................................................... ......................... 23-2Location Transparency.................................................................... ............................................... 23-2SQL and COMMIT Transparency.................................................................... ............................. 23-3Distributed Query Optimization.................................................................... ..............................23-3Information Sharing......................................................................... .................................................... 23-4 Oracle Streams......................................................................... ........................................................ 23-4 文档下载 免费文档下载 http://www.wendangwang.com/ Oracle Streams Architecture.................................................................... .....................http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8.... ...... 23-5Replication with Oracle Streams......................................................................... ................... 23-6Oracle Streams Advanced Queuing......................................................................... ............. 23-8Database Change Notification.................................................................... ........................... 23-9Change Data Capture......................................................................... ................................... 23-10Heterogeneous Environments.................................................................... ......................... 23-10Oracle Streams Use Cases........................................................................... .......................... 23-10Materialized Views........................................................................... ............................................ 23-12Intehttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8grating Non-Oracle Systems......................................................................... ............................. 23-12 Generic Connectivity.................................................................... ................................................ 23-12Oracle Transparent Gateways........................................................................ ............................. 23-1324 SQL, PL/SQL, and Java 文档下载 免费文档下载 http://www.wendangwang.com/ Overview of SQL............................................................................. ...................................................... 24-1 SQL Statements...................................................................... .......................................................... Data 24-2 Manipulation Language Statements...................................................................... ...... 24-2Data Definition Language Statements........http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8....... ................................................................... 24-3Transaction Control Statements...................................................................... ....................... 24-3Session Control Statements...................................................................... .............................. 24-4System Control Statements...................................................................... ............................... 24-4Embedded SQL Statements...................................................................... .............................. 24-4Cursors..................................................................... ......................................................................... 24-4 Scrollable Cursors......................................................................... ........................................... 24-5Shared SQL ....................http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8. ................................................................................ 文档下载 免费文档下载 http://www.wendangwang.com/ ................................. 24-5Parsing .................................................................... ......................................................................... 24-5SQL Processing...................................................................... .......................................................... 24-6 xxi SQL Statement Execution....................................................................... ................................ 24-6DML Statement Processing ..................................................................... .............................. 24-7DDL Statement Processing ..................................................................... ............................. 24-10Control of Transactions.................................................................... ..........http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8............... ............ 24-11Overview of the Optimizer....................................................................... ................................... 24-11 Execution Plans........................................................................... ........................................... 24-11Overview of Procedural Languages....................................................................... .......................... Overview 24-12 of PL/SQL.......................................................................... 文档下载 免费文档下载 http://www.wendangwang.com/ .......................................... 24-12 How PL/SQL Runs ........................................................................... .................................... 24-13Language Constructs for PL/SQL ......................................................................... ............. 24-15PL/SQL Program Units.........................................http://www.wendangwang.com/doc/f6d 2729bbb843fed64cefeb8........................................................... .... 24-16Stored Procedures and Functions ...................................................................... ................. 24-16PL/SQL Packages ....................................................................... .......................................... 24-20PL/SQL Collections and Records......................................................................... ............... 24-23PL/SQL Server Pages........................................................................... ................................. 24-23Overview of Java............................................................................ ............................................... Java and 24-24 Object-Oriented Programming Terminology.................................................... 24-24Class Hierarchy.....................................................................ht tp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8........................... ...................... 24-26Interfaces................................................................. ................................................................ 24-27Polymorphism............................................................... ......................................................... 24-27Overview of the 文档下载 免费文档下载 http://www.wendangwang.com/ Java Virtual Machine (JVM).................................................................... 24-28Why Use Java in Oracle?......................................................................... .............................. 24-29Oracle’s Java Application Strategy........................................................................ .............. 24-32 25 Overview of Application Development Languages Introduction to Oracle Application Development Languages..................................................... 25-1Overview of C/C Programming Languaghttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8es................ ................................................................. Overview of Oracle 25-1 Call Interface (OCI)........................................................................... .......... 25-2Overview of Oracle C Call Interface (OCCI).......................................................................... 25-3 OCCI Associative Relational and Object Interfaces............................................................ 25-3OCCI Navigational Interface....................................................................... ........................... 25-3Overview of Oracle Type Translator ..................................................................... ...................... 25-3Overview of Pro*C/C Precompiler..................................................................... 文档下载 免费文档下载 http://www.wendangwang.com/ .................... Dynamic 25-4 Creation and Access of Type Descriptions...........http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8.. ............................................ 25-5Overview of Microsoft Programming Languages....................................................................... .... 25-5 Open Database Connectivity ................................................................... ..................................... 25-6Overview of Oracle Objects for OLE............................................................................. ............... 25-6 OO4O Automation Server.......................................................................... ............................ 25-6Oracle Data Control......................................................................... ........................................ 25-6The Oracle Objects for OLE C Class Library................................................................... 25-7Oracle Data Provider for .NET...........................................................http://www.we ndangwang.com/doc/f6d2729bbb843fed64cefeb8...................................... ..... 25-7Overview of Legacy Languages....................................................................... ................................... Overview 25-7 of Pro*Cobol Precompiler..................................................................... 文档下载 免费文档下载 http://www.wendangwang.com/ ....................... 25-7Overview of Pro*FORTRAN Precompiler..................................................................... .............. 25-726 Native Datatypes Introduction to Oracle Datatypes....................................................................... ................................ 26-1xxii Overview of Character Datatypes....................................................................... ............................... 26-2 CHAR Datatype ....................................................................... ...................................................... 26-2VARCHhttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8AR2 and VARCHAR Datatypes ...................................................................... .............. 26-2 VARCHAR Datatype ....................................................................... ....................................... 26-3Length Semantics for Character Datatypes....................................................................... .......... 26-3NCHAR and NVARCHAR2 Datatypes ...................................................................... ................ 26-4 NCHAR........................................................................... .......................................................... 26-4NVARCHAR2................................................................... 文档下载 免费文档下载 http://www.wendangwang.com/ ........................................................ Data in 26-4Use of Unicode an Oracle Database........................................................................ ....... 26-4 Imhttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8plicit Type Conversion...................................................................... ................................. 26-5LOB Character Datatypes ...................................................................... ....................................... 26-5LONG Datatype ....................................................................... ...................................................... 26-5Overview of Numeric Datatypes....................................................................... ................................. 26-5 NUMBER Datatype........................................................................ ................................................. Internal 26-6 Numeric Format ......................................................................... .............................. 26-7Floating-Point Numbers....................................................................http: //www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8.............................. ............... 26-7 BINARY_FLOAT Datatype........................................................................ ............................ 26-7BINARY_DOUBLE Datatype........................................................................ 文档下载 免费文档下载 http://www.wendangwang.com/ ......................... 26-7Overview of DATE Datatype........................................................................ ...................................... Use 26-8 of Julian Dates .......................................................................... ............................................... 26-8Date Arithmetic ..................................................................... ......................................................... 26-9Centuries and the Year 2000 ........................................................................... .............................. 26-9Daylight Savings Support................http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8.. ................................................................................ ............ 26-9Time Zones........................................................................... ............................................................ 26-9Overview of LOB Datatypes....................................................................... ...................................... 26-10 BLOB Datatype ....................................................................... ...................................................... 26-11CLOB and NCLOB Datatypes ...................................................................... .............................. 26-11BFILE Datatype ....................................................................... ...................................................... LONG 26-11Overview of RAW and RAW Datatypes....................................................................... 文档下载 免费文档下载 http://www.wendangwang.com/ ...http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8.. ROWID 26-12Overview of and UROWID Datatypes....................................................................... .... 26-12 The ROWID Pseudocolumn ................................................................... .................................... 26-13Physical Rowids ......................................................................... .................................................. 26-13 Extended Rowids ......................................................................... ......................................... 26-13Restricted Rowids ......................................................................... ........................................ 26-14Examples of Rowid Use............................................................................. ........................... 26-15How Rowids Are Used ........................................................................... ........http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8................. .... 26-16Logical Rowids ......................................................................... .................................................... Comparison of Logical 26-16 Rowids with Rowids ................................................... Physical 26-16Guesses in Logical Rowids ......................................................................... ......................... 26-17Rowids in Non-Oracle Databases ...................................................................... 文档下载 免费文档下载 http://www.wendangwang.com/ ........................ 26-17Overview of ANSI, DB2, and SQL/DS Datatypes........................................................................ 26-18Overview of XML Datatypes....................................................................... ...................................... 26-18 XMLType Datatype........................................................................ .....................http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8.... ...................... 26-18Overview of URI Datatypes....................................................................... ....................................... 26-18Overview of Data Conversion...................................................................... .................................... 26-19 xxiii 27 Object Datatypes and Object Views Introduction to Object Datatypes....................................................................... ................................ 27-1Complex Data Models ......................................................................... .......................................... 27-2Multimedia Datatypes....................................................................... ............................................. 27-2Overview of Object Datatype Categories...................................................................... ................... http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8 27-3Object Types .......................................................................... 文档下载 免费文档下载 http://www.wendangwang.com/ .......................................................... 27-3 Types of Methods......................................................................... ............................................ 27-3Object Tables.......................................................................... ................................................... 27-4Object Identifiers..................................................................... ................................................. 27-5Object Views Description..................................................................... ...................................27-5REFs..................................... ................................................................................ ...................... 27-5Collection Types ...................................................http://www.wendangwang. com/doc/f6d2729bbb843fed64cefeb8................................................ .......................... 27-6 VARRAYs......................................................................... ......................................................... 27-6Nested Tables.......................................................................... ................................................. 27-7Overview of Type Inheritance..................................................................... ....................................... 27-7FINAL and NOT FINAL Types........................................................................... ......................... 27-8NOT INSTANTIABLE Types and Methods......................................................................... ....... 27-8Overview of User-Defined Aggregate Functions....................................................................... ..... 27-8Why Have User-Defined Aggregate Functions?..http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8............. 文档下载 免费文档下载 http://www.wendangwang.com/ ......................................................... 27-8Overview of Datatype Evolution....................................................................... ................................ 27-9Introduction to Object Views........................................................................... ................................... 27-9 Advantages of Object Views .......................................................................... ............................. 27-10Use of Object Views........................................................................... ........................................... 27-10Updates of Object Views........................................................................... ................................... 27-11Updates of Nested Table Columns in Views............................................................................ 27-11View Hierarchies.........http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8..... ................................................................................ ............................. 27-11Glossary Index xxiv Preface This manual describes all features of the Oracle database server, an object-relational database management system. It describes how the Oracle database server functions, and it lays a conceptual foundation for much of the practical information contained in other manuals. Information in this manual applies to the 文档下载 免费文档下载 http://www.wendangwang.com/ Oracle database server running on all operating systems. This preface contains these topics: ■ ■ ■ ■AudienceDocumentation AccessibilityRelated DocumentationConventions Audience Oracle Database Concepts is intended for database administrators, system administrators, and database application developers. To use this document, you need to know the following: ://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8■ ■ ■ Relational database concepts in generalConcepts and terminology in Chapter1, "Introduction to the Oracle Database"The operating system environment under which you are running Oracle Documentation Accessibility Our goal is to make Oracle products, services, and supporting documentation 文档下载 免费文档下载 http://www.wendangwang.com/ accessible, with good usability, to the disabled community. To that end, our documentation includes features that make information available to users of assistive technology. This documentation is available in HTML format, and contains markup to facilitate access by the disabled community. Accessibility standards will continue to evolve over time, and Oracle is actively engaged with other market-leading technology vendors to address technical obstacles so that our documentation can be accessible to all of our customers. For more information, visit the Oracle Accessibility Program Web site athttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8 http://www.oracle.com/accessibility/ xxv Accessibility of Code Examples in Documentation Screen readers may not always correctly read the code examples in this document. The conventions for writing code require that closing braces should appear on an otherwise empty line; however, some screen readers may not always read a line of text that consists solely of a bracket or brace. Accessibility of Links to External Web Sites in Documentation This documentation may contain links to Web sites of other companies or organizations that Oracle does not own or control. Oracle neither evaluates nor makes any representations regarding the accessibility of these Web sites. 文档下载 免费文档下载 http://www.wendangwang.com/ TTY Access to Oracle Support Services Oracle provides dedicated Text Telephone (TTY) access to Oracle Support Services within the United States of America 24 hours a day, seven days a whttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8eek. For TTY support, call 800.446.2398. Related Documentation For more information, see these Oracle resources: ■Oracle Database Upgrade Guide for information about upgrading a previous release of Oracle Oracle Database Administrator's Guide for information about how to administer the Oracle database server Oracle Database Application Developer's Guide - Fundamentals for information about developing Oracle database applications Oracle Database Performance Tuning Guide for information about optimizing performance of an Oracle database Oracle Database Data Warehousing Guide for information about data warehousing and business intelligence■■■■ Many books in the documentation set use the sample schemas of the seed database, which is installed by default when you install Oracle. Refer to Oracle Database Sample Schemas for information on how these schemas were 文档下载 免费文档下载 http://www.wendangwang.com/ createhttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8d and how you can use them yourself. Conventions The following text conventions are used in this document:Conventionboldface italic monospaceMeaningBoldface type indicates graphical user interface elements associated with an action, or terms defined in text or the glossary.Italic type indicates book titles, emphasis, or placeholder variables for which you supply particular values.Monospace type indicates commands within a paragraph, URLs, code in examples, text that appears on the screen, or text that you enter. xxvi What Is Oracle? Part I provides an overview of Oracle Database concepts and terminology. It contains the following chapter: ■Chapter1, "Introduction to the Oracle Database" Introduction to the Oracle DatabaseThis chapter provides an overview of the Oracle database server. The topics include:■ ■ 文档下载 免费文档下载 http://www.wendangwang.com/ ■ Oracle Database Ahttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8rchitectureOracle Database FeaturesOracle Database Application Development Oracle Database Architecture An Oracle database is a collection of data treated as a unit. The purpose of a database is to store and retrieve related information. A database server is the key to solving the problems of information management. In general, a server reliably manages a large amount of data in a multiuser environment so that many users can concurrently access the same data. All this is accomplished while delivering high performance. A database server also prevents unauthorized access and provides efficient solutions for failure recovery. Oracle Database is the first database designed for enterprise grid computing, the most flexible and cost effective way to manage information and applications. Enterprise grid computing creates large pools of industry-standard, modular storage and servers. With this architecture, each nehttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8w system can be rapidly provisioned from the pool of components. There is no need for peak workloads, because capacity can be easily added or reallocated from the resource pools as needed. The database has logical structures and physical structures. Because the physical and logical structures are separate, the physical storage of data can be managed without affecting the access to logical storage structures. The section contains the following topics: ■ 文档下载 免费文档下载 http://www.wendangwang.com/ ■ ■ ■ ■ ■ ■ ■ ■Overview of Oracle Grid ArchitectureOverview of Application ArchitectureOverview of Physical Database StructuresOverview of Logical Database StructuresOverview of Schemas and Common Schema ObjectsOverview of the Oracle Data DictionaryOverview of the Oracle InstanceOverview of Accessing the DatabaseOverview of Oracle Utilities Introduction to the Oracle Database1-http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb81 Oracle Database Architecture Overview of Oracle Grid Architecture enterprise information systems. With grid computing, groups of independent, modular hardware and software components can be connected and rejoined on demand to meet the changing needs of businesses. 文档下载 免费文档下载 http://www.wendangwang.com/ The grid style of computing aims to solve some common problems with enterprise IT: the problem of application silos that lead to under utilized, dedicated hardware resources, the problem of monolithic, unwieldy systems that are expensive to maintain and difficult to change, and the problem of fragmented and disintegrated information that cannot be fully exploited by the enterprise as a whole. Benefits of Grid ComputingCompared to other models of computing, IT systems designed and implemented in the grid style deliver higher quality of service, lower cost, and greater flexibility. Higher quality of service results frohttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8m having no single point of failure, a robust security infrastructure, and centralized, policy-driven management. Lower costs derive from increasing the utilization of resources and dramatically reducing management and maintenance costs. Rather than dedicating a stack of software and hardware to a specific task, all resources are pooled and allocated on demand, thus eliminating under utilized capacity and redundant capabilities. Grid computing also enables the use of smaller individual hardware components, thus reducing the cost of each individual component and providing more flexibility to devote resources in accordance with changing needs. Grid Computing Defined The grid style of computing treats collections of similar IT resources holistically as a single pool, while exploiting the distinct nature of individual resources within the pool. To address simultaneously the problems of monolithic systems and http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8fragmented resources, grid computing achieves a balance between the benefits of holistic resource management and flexible independent resource control. IT resources managed in a grid include: 文档下载 免费文档下载 http://www.wendangwang.com/ ■Infrastructure: the hardware and software that create a data storage and program execution environment Applications: the program logic and flow that define specific business processesInformation: the meanings inherent in all different types of data used to conduct business■■ Core Tenets of Grid ComputingTwo core tenets uniquely distinguish grid computing from other styles of computing, such as mainframe, client-server, or multi-tier: virtualization and provisioning. With virtualization, individual resources (e.g. computers, disks, application components and information sources) are pooled together by type then made available to consumers (e.g. people or software programs) through an abstraction. Vihttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8rtualization means breaking hard-coded connections between providers and consumers of resources, and preparing a resource to serve a particular need without the consumer caring how that is accomplished. With provisioning, when consumers request resources through a virtualization layer, behind the scenes a specific resource is identified to fulfill the request and then it is allocated to the consumer. Provisioning as part of grid computing means that the system determines how to meet the specific need of the consumer, while optimizing operation of the system as a whole.■■ 1-2Oracle Database Concepts Oracle Database Architecture 文档下载 免费文档下载 http://www.wendangwang.com/ The specific ways in which information, application or infrastructure resources are virtualized and provisioned are specific to the type of resource, but the concepts apply universally. Similarly, the specific benefits derived from grid computing are particular to http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8each type of resource, but all share the characteristics of better quality, lower costs and increased flexibility. Infrastructure grid resources include hardware resources such as storage, processors, memory, and networks as well as software designed to manage this hardware, such as databases, storage management, system management, application servers, and operating systems.Infrastructure Grid Virtualization and provisioning of infrastructure resources mean pooling resources together and allocating to the appropriate consumers based on policies. For example, one policy might be to dedicate enough processing power to a web server that it can always provide sub-second response time. That rule could be fulfilled in different ways by the provisioning software in order to balance the requests of all consumers.Treating infrastructure resources as a single pool and allocating those resources on demand saves monehttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8y by eliminating under utilized capacity and redundant capabilities. Managing hardware and software resources holistically reduces the cost of labor and the opportunity for human error. Spreading computing capacity among many different computers and spreading storage capacity across multiple disks and disk groups removes single points of 文档下载 免费文档下载 http://www.wendangwang.com/ failure so that if any individual component fails, the system as a whole remains available. Furthermore, grid computing affords the option to use smaller individual hardware components, such as blade servers and low cost storage, which enables incremental scaling and reduces the cost of each individual component, thereby giving companies more flexibility and lower cost. Infrastructure is the dimension of grid computing that is most familiar and easy to understand, but the same concepts apply to applications and information. Application resources in the ghttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8rid are the encodings of business logic and process flow within application software. These may be packaged applications or custom applications, written in any programming language, reflecting any level of complexity. For example, the software that takes an order from a customer and sends an acknowledgement, the process that prints payroll checks, and the logic that routes a particular customer call to a particular agent are all application resources.Applications GridHistorically, application logic has been intertwined with user interface code, data management code, and process or page flow and has lacked well-defined interfaces, which has resulted in monolithic applications that are difficult to change and difficult to integrate. Service oriented architecture has emerged as a superior model for building applications, and service oriented architecture concepts align exactly with the core tenets ohttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8f grid computing. Virtualization and provisioning of application resources involves publishing application components as services for use by multiple 文档下载 免费文档下载 http://www.wendangwang.com/ consumers, which may be people or processes, then orchestrating those services into more powerful business flows. In the same way that grid computing enables better reuse and more flexibility of IT infrastructure resources, grid computing also treats bits of application logic as a resource, and enables greater reuse of application functionality and more flexibility in changing and building new composite applications. Furthermore, applications that are orchestrated from published services are able to view activities in a business as a single whole, so that processes are standardized Introduction to the Oracle Database1-3 Oracle Database Architecture across geography and business units and processes are automated end-to-end.http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8 This generates more reliable business processes and lowers cost through increased automation and reduced variability. Information GridThe third dimension to grid computing, after infrastructure and applications, is information. Today, information tends to be fragmented across a company, making it difficult to see the business as a whole or answer basic questions.about customers. Without information about who the customer is, and what they want to buy, information assets go underexploited. 文档下载 免费文档下载 http://www.wendangwang.com/ In contrast, grid computing treats information holistically as a resource, similar to infrastructure and applications resources, and thus extracts more of its latent value. Information grid resources include all data in the enterprise and all metadata required to make that data meaningful. This data may be structured, semi-structured, or unstructured, stored in any location, such as databases, local file systems, or e-mhttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8ail servers, and created by any application. The core tenets of grid computing apply similarly to information as they do to infrastructure and applications. The infrastructure grid exploits the power of the network to allow multiple servers or storage devices to be combined toward a single task, then easily reconfigured as needs change. A service oriented architecture, or an applications grid, enables independently developed services, or application resources, to be combined into larger business processes, then adapted as needs change without breaking other parts of the composite application. Similarly, the information grid provides a way for information resources to be joined with related information resources to greater exploit the value of the inherent relationships among information, then for new connections to be made as situations change. The relational database, for example, was an early informatiohttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8n virtualization technology. Unlike its predecessors, the network database and hierarchical database models, in which all relationships between data had to be predetermined, relational database enabled flexible access to a general-purpose information resource. Today, XML furthers information virtualization by providing a standard way to represent information along with metadata, which breaks the hard link between information and a specific application used to create and view that information. 文档下载 免费文档下载 http://www.wendangwang.com/ Information provisioning technologies include message queuing, data propagation, replication, extract-transform-load, as well as mapping and cleansing tools to ensure data quality. Data hubs, in which a central operational data store continually syncs with multiple live data sources, are emerging as a preferred model for establishing a single source of truth while maintaining the flexibility of distributed control.Grid Resourhttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8ces Work Well Independently and Best TogetherBy managing any single IT resource – infrastructure, applications, or information - using grid computing, regardless of how the other resources are treated, enterprises can realize higher quality, more flexibility, and lower costs. For example, there is no need to rewrite applications to benefit from an infrastructure grid. It is also possible to deploy an applications grid, or a service oriented architecture, without changing the way information is managed or the way hardware is configured. It is possible, however, to derive even greater benefit by using grid computing for all resources. For example, the applications grid becomes even more valuable when you can set policies regarding resource requirements at the level of individual services and have execution of different services in the same composite application handled differently by the infrastrhttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8ucture - something that can only be done by an application grid in combination with an infrastructure grid. In addition, building an information grid by integrating more information into a single source of truth becomes tenable 1-4Oracle Database Concepts 文档下载 免费文档下载 http://www.wendangwang.com/ Oracle Database Architecture only when the infrastructure is configured as a grid, so it can scale beyond the boundary of a single computer. Grid Computing in Oracle Database 10g On the path toward this grand vision of grid computing, companies need real solutions to support their incremental moves toward a more flexible and more productive IT architecture. The Oracle Database 10g family of software products implements much of the core grid technology to get companies started. And Oracle delivers this grid computing functionality in the context of holistic enterprise architecture, providing a robust security infrastructure, http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8management, centralized intuitive, powerful development tools, and universal access. Oracle Database 10g includes: ■ ■ ■ ■ Oracle Database 10gOracle Application Server 10gOracle Enterprise Manager 10gOracle Collaboration Suite 10g Although the grid features of Oracle 10g span all of the products listed above, this discussion will focus on the grid computing capabilities of Oracle Database 10g.Infrastructure Grid 文档下载 免费文档下载 http://www.wendangwang.com/ ■Server Virtualization. Oracle Real Application Clusters 10g (RAC) enable a single database to run across multiple clustered nodes in a grid, pooling the processing resources of several standard machines. Oracle is uniquely flexible in its ability to provision workload across machines because it is the only database technology that does not require data to be partitioned and distributed along with the work. Oracle 10g Release 2 software includes enhancements for cohttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8nnections balancing across RAC instances, based on policies. ■Storage Virtualization. The Oracle Automatic Storage Management (ASM) feature of Oracle Database 10g provides a virtualization layer between the database and storage so that multiple disks can be treated as a single disk group and disks can be dynamically added or removed while keeping databases online. Existing data will automatically be spread across available disks for performance and utilization optimization. In Oracle 10g Release 2, ASM supports multiple databases, which could be at different software version levels, accessing the same storage pool.Grid Management. Because grid computing pools together multiple servers and disks and allocates them to multiple purposes, it becomes more important that individual resources are largely self-managing and that other management functions are centralized. The Grid Control feature of Enterprihttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8se Oracle Manager 10g provides a single console to manage multiple systems together as a logical group. Grid Control manages provisioning of nodes in the grid with the appropriate full stack of software and enables configurations and security settings to be maintained 文档下载 免费文档下载 http://www.wendangwang.com/ centrally for groups of systems. Another aspect to grid management is managing user identities in a way that is both highly secure and easy to maintain. Oracle Identity Management 10g includes an LDAP-compliant directory with delegated administration and now, in Release 2, federated identity management so that single sign-on capabilities can be securely shared across security domains. Oracle Identity Management 10g closely adheres to grid principles by utilizing a central point for applications to authenticate users - the single sign-on server - while, behind the scenes, Introduction to the Oracle Database1-5■ Oracle Datahttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8base Architecture distributing control of identities via delegation and federation to optimize maintainability and overall operation of the system. Applications Grid Standard Web Services Support. In addition to the robust web services support in Oracle Application Server 10g, Oracle database 10g can publish and consume web services. DML and DDL operations can be exposed as web services, and functions within the database can make a web service appear as a SQL row source, enabling use of powerful SQL tools to analyze web service data in conjunction with relational and non-relational data. 文档下载 免费文档下载 http://www.wendangwang.com/ Oracle Enterprise Manager 10g enhances Oracle’s support for service oriented architectures by monitoring and managing web services and any other administrator-defined services, tracking end-to-end performance and performing root cause analysis of problems encountered. Information Grid://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8ar ■Data Provisioning. Information starts with data, which must be provisioned wherever consumers need it. For example, users may be geographically distributed, and fast data access may be more important for these users than access to an identical resource. In these cases, data must be shared between systems, either in bulk or near real time. Oracle’s bulk data movement technologies include Transportable Tablespaces and Data Pump. For more fine-grained data sharing, the Oracle Streams feature of Oracle Database 10g captures database transaction changes and propagates them, thus keeping two or more database copies in sync as updates are applied. It also unifies traditionally distinct data sharing mechanisms, such as message queuing, replication, events, data warehouse loading, notifications and publish/subscribe, into a single technology. ■ Centralized Data Oraclehttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8 Management. Database 10g manages all types of structured, semi-structured and unstructured information, representing, 文档下载 免费文档下载 http://www.wendangwang.com/ maintaining and querying each in its own optimal way while providing common access to all via SQL and XML Query. Along with traditional relational database structures, Oracle natively implements OLAP cubes, standard XML structures, geographic spatial data and unlimited sized file management, thus virtualizing information representation. Combining these information types enables connections between disparate types of information to be made as readily as new connections are made with traditional relational data. Metadata Management. Oracle Warehouse Builder is more than a traditional batch ETL tool for creating warehouses. It enforces rules to achieve data quality, does fuzzy matching to automatically overcome data inconsistency, and uses statistical analysis to infer data profiles. With Oracle 10g Relhttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8ease 2, its metadata management capabilities are extended from scheduled data pulls to handle a transaction-time data push from an Oracle database implementing the Oracle Streams feature. Oracle’s series of enterprise data hub products (for example, Oracle Customer Data Hub) provide real-time synchronization of operational information sources so that companies can have a single source of truth while retaining separate systems and separate applications, which may include a combination of packaged, legacy and custom applications. In addition to the data cleansing and scheduling mechanisms, Oracle also provides a well-formed schema, established from years of experience building enterprise applications, for certain common types of information, such as customer, financial, and product information.■ 1-6Oracle Database Concepts 文档下载 免费文档下载 http://www.wendangwang.com/ Oracle Database Architecture ■ Metadata Inference. Joining http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8the Oracle 10g software family is the new Oracle Enterprise Search product. Oracle Enterprise Search 10g crawls all information sources in the enterprise, whether public or secure, including e-mail servers, document management servers, file systems, web sites, databases and applications, then returns information from all of the most relevant sources for a given search query. This crawl and index process uses a series of heuristics specific to each data source to infer metadata about all enterprise information that is used to return the most relevant results to any query. Overview of Application Architecture There are two common ways to architect a database: client/server or multitier. As internet computing becomes more prevalent in computing environments, many database management systems are moving to a multitier environment. Client/Server Architecture Multiprocessing uses more http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8than one processor for a set of related jobs. Distributed processing reduces the load on a single processor by allowing different processors to concentrate on a subset of related tasks, thus improving the performance and capabilities of the system as a whole. 文档下载 免费文档下载 http://www.wendangwang.com/ An Oracle database system can easily take advantage of distributed processing by using its client/server architecture. In this architecture, the database system is divided into two parts: a front-end or a client, and a back-end or a server. The Client The client is a database application that initiates a request for an operation to be performed on the database server. It requests, processes, and presents data managed by the server. The client workstation can be optimized for its job. For example, it might not need large disk capacity, or it might benefit from graphic capabilities. Often, the client runs on a different computer than the database serhttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8ver, generally on a PC. Many clients can simultaneously run against one server. The Server The server runs Oracle software and handles the functions required for concurrent, shared data access. The server receives and processes the SQL and PL/SQL statements that originate from client applications. The computer that manages the server can be optimized for its duties. For example, it can have large disk capacity and fast processors. Multitier Architecture: Application Servers A multitier architecture has the following components: ■ ■A client or initiator process that starts an operationOne or more application servers that perform parts of the operation. An application server provides access to the data for the client and performs some of 文档下载 免费文档下载 http://www.wendangwang.com/ the query processing, thus removing some of the load from the database server. It can serve as an interface between clients and multiphttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8le database servers, including providing an additional level of security. An end or database server that stores most of the data used in the operation Validate the credentials of a client, such as a Web browser Connect to an Oracle database server■This architecture enables use of an application server to do the following:■■ Introduction to the Oracle Database1-7 Oracle Database Architecture ■Perform the requested operation on behalf of the client If proxy authentication is being used, then the identity of the client is maintained throughout all tiers of the connection. Overview of Physical Database Structures The following sections explain the physical database structures of an Oracle database, including datafiles, redo log files, and control files. Datafiles Every Oracle database has one or more physical datafiles. The datafiles 文档下载 免费文档下载 http://www.wendangwang.com/ conthttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8ain all the database data. The data of logical database structures, such as tables and indexes, is physically stored in the datafiles allocated for a database. The characteristics of datafiles are: ■ ■A datafile can be associated with only one database. Datafiles can have certain characteristics set to let them automatically extend when the database runs out of space. One or more datafiles form a logical unit of database storage called a tablespace. ■ Data in a datafile is read, as needed, during normal database operation and stored in the memory cache of Oracle. For example, assume that a user wants to access some data in a table of a database. If the requested information is not already in the memory cache for the database, then it is read from the appropriate datafiles and stored in memory. Modified or new data is not necessarily written to a datafile immediately. To reduce thttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8he amount of disk access and to increase performance, data is pooled in memory and written to the appropriate datafiles all at once, as determined by the database writer process (DBWn) background process. "Overview of the Oracle Instance" on page1-13 for more information about Oracle’s memory and process structuresSee Also: 文档下载 免费文档下载 http://www.wendangwang.com/ Control Files Every Oracle database has a control file. A control file contains entries that specify the physical structure of the database. For example, it contains the following information: ■ ■ ■Database name Names and locations of datafiles and redo log filesTime stamp of database creation Oracle can multiplex the control file, that is, simultaneously maintain a number of identical control file copies, to protect against a failure involving the control file. Every time an instance of an Oracle database is started, its control file identifies the http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8database and redo log files that must be opened for database operation to proceed. If the physical makeup of the database is altered (for example, if a new datafile or redo log file is created), then the control file is automatically modified by Oracle to reflect the change. A control file is also used in database recovery. See Also:Chapter3, "Tablespaces, Datafiles, and Control Files" 1-8Oracle Database Concepts Oracle Database Architecture Redo Log Files Every Oracle database has a set of two or more redo log files. The set of redo log 文档下载 免费文档下载 http://www.wendangwang.com/ files is collectively known as the redo log for the database. A redo log is made up of redo entries (also called redo records). The primary function of the redo log is to record all changes made to data. If a failure prevents modified data from being permanently written to the datafiles, then the changes can be obtained from the redo log, so worhttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8k is never lost. To protect against a failure involving the redo log itself, Oracle allows a multiplexed redo log so that two or more copies of the redo log can be maintained on different disks. The information in a redo log file is used only to recover the database from a system or media failure that prevents database data from being written to the datafiles. For example, if an unexpected power outage terminates database operation, then data in memory cannot be written to the datafiles, and the data is lost. However, lost data can be recovered when the database is opened, after power is restored. By applying the information in the most recent redo log files to the database datafiles, Oracle restores the database to the time at which the power failure occurred. The process of applying the redo log during a recovery operation is called rolling forward. See Also:"Overview of Database Backup Rechttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8overy Features" on page1-22 Archive Log Files and 文档下载 免费文档下载 http://www.wendangwang.com/ You can enable automatic archiving of the redo log. Oracle automatically archives log files when the database is in ARCHIVELOG mode. Parameter Files Parameter files contain a list of configuration parameters for that instance and database. Oracle recommends that you create a server parameter file (SPFILE) as a dynamic means of maintaining initialization parameters. A server parameter file lets you store and manage your initialization parameters persistently in a server-side disk file. See Also: ■"Initialization Parameter Files and Server Parameter Files" on page12-3 Oracle Database Administrator's Guide for information on creating and changing parameter files■ Alert and Trace Log Files Each server and background process can write to an associated trace file. When an internal error is detechttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8ted by a process, it dumps information about the error to its trace file. Some of the information written to a trace file is intended for the database administrator, while other information is for Oracle Support Services. Trace file information is also used to tune applications and instances. The alert file, or alert log, is a special trace file. The alert log of a database is a chronological log of messages and errors. 文档下载 免费文档下载 http://www.wendangwang.com/ See Also:Oracle Database Administrator's Guide Introduction to the Oracle Database1-9 Oracle Database Architecture Backup Files To restore a file is to replace it with a backup file. Typically, you restore a file when a media failure or user error has damaged or deleted the original file. User-managed backup and recovery requires you to actually restore backup files before you can perform a trial recovery of the backups. Server-managed backup anhttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8d recovery manages the backup process, such as scheduling of backups, as well as the recovery process, such as applying the correct backup file when recovery is needed. See Also: ■ ■ Chapter15, "Backup and Recovery"Oracle Database Backup and Recovery Advanced User's Guide Overview of Logical Database Structures 文档下载 免费文档下载 http://www.wendangwang.com/ The logical storage structures, including data blocks, extents, and segments, enable Oracle to have fine-grained control of disk space use. Tablespaces A database is divided into logical storage units called tablespaces, which group related logical structures together. For example, tablespaces commonly group together all application objects to simplify some administrative operations. Each database is logically divided into one or more tablespaces. One or more datafiles are explicitly created for each tablespace to physically store the dahttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8ta of all logical structures in a tablespace. The combined size of the datafiles in a tablespace is the total storage capacity of the tablespace. Every Oracle database contains a SYSTEM tablespace and a SYSAUX tablespace. Oracle creates them automatically when the database is created. The system default is to create a smallfile tablespace, which is the traditional type of Oracle tablespace. The SYSTEM and SYSAUX tablespaces are created as smallfile tablespaces. Oracle also lets you create bigfile tablespaces. This allows Oracle Database to contain tablespaces made up of single large files rather than numerous smaller ones. This lets Oracle Database utilize the ability of 64-bit systems to create and manage ultralarge files. The consequence of this is that Oracle Database can now scale up to 8 exabytes in size. With Oracle-managed files, bigfile tablespaces make datafiles completely transparent for users. http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8In other words, you can perform operations on tablespaces, rather than the underlying datafiles. 文档下载 免费文档下载 http://www.wendangwang.com/ See Also:"Overview of Tablespaces" on page3-4 Online and Offline Tablespaces A tablespace can be online (accessible) or offline (not accessible). A tablespace is generally online, so that users can access the information in the tablespace. However, sometimes a tablespace is taken offline to make a portion of the database unavailable while allowing normal access to the remainder of the database. This makes many administrative tasks easier to perform. Oracle Data Blocks At the finest level of granularity, Oracle database data is stored in data blocks. One data block corresponds to a specific number of bytes of physical database space on disk. The standard block size is specified by the DB_BLOCK_SIZE initialization 1-10Oracle Database Concepts Oracle Database Architecture parahttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8meter. In addition, you can specify up to five other block sizes. A database uses and allocates free database space in Oracle data blocks. Extents The next level of logical database space is an extent. An extent is a specific number of contiguous data blocks, obtained in a single allocation, used to store a specific type of information. Segments 文档下载 免费文档下载 http://www.wendangwang.com/ Above extents, the level of logical database storage is a segment. A segment is a set of extents allocated for a certain logical structure. The following table describes the different types of segments. SegmentData segmentDescriptionEach nonclustered table has a data segment. All table data is stored in the extents of the data segment. For a partitioned table, each partition has a data segment. Each cluster has a data segment. The data of every table in the cluster is stored in the cluster’s data segment. Index segment://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8par Temporary segmentEach index has an index segment that stores all of its data. For a partitioned index, each partition has an index segment. Temporary segments are created by Oracle when a SQL statement needs a temporary database area to complete execution. When the statement finishes execution, the extents in the temporary segment are returned to the system for future use. If you are operating in automatic undo management mode, then the database server manages undo space using tablespaces. Oracle recommends that you use automatic undo management. Earlier releases of Oracle used rollback segments to store undo information. The information in a rollback segment was used during database recovery for generating read-consistent database information and for rolling back uncommitted transactions for users. Space management for these rollback segments was complex, and Oracle has deprecated 文档下载 免费文档下载 http://www.wendangwang.com/ that method. Thttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8his book discusses the undo tablespace method of managing undo; this eliminates the complexities of managing rollback segment space, and lets you exert control over how long undo is retained before being overwritten. Oracle does use a SYSTEM rollback segment for performing system transactions. There is only one SYSTEM rollback segment and it is created automatically at CREATE DATABASE time and is always brought online at instance startup. You are not required to perform any operations to manage the SYSTEM rollback segment.Rollback segment Oracle dynamically allocates space when the existing extents of a segment become full. In other words, when the extents of a segment are full, Oracle allocates another extent for that segment. Because extents are allocated as needed, the extents of a segment may or may not be contiguous on disk.Introduction to the Oracle Database1-11 Oracle Database Architecture http://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8See Also: ■ ■ ■ ■ ■Chapter2, "Data Blocks, Extents, and Segments"Chapter3, "Tablespaces, Datafiles, and Control Files""Introduction to Automatic Undo Management" on page2-16"Read Consistency" on page1-18"Overview of Database Backup and Recovery Features" on 文档下载 免费文档下载 http://www.wendangwang.com/ page1-22 Overview of Schemas and Common Schema Objects A schema is a collection of database objects. A schema is owned by a database user and has the same name as that user. Schema objects are the logical structures that directly refer to the database’s data. Schema objects include structures like tables, views, and indexes. (There is no relationship between a tablespace and a schema. Objects in the same schema can be in different tablespaces, and a tablespace can hold objects from different schemas.) Some of the most common schema objects are defined in the following section. Tables Tables are thehttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8 basic unit of data storage in an Oracle database. Database tables hold all user-accessible data. Each table has columns and rows. A table that has an employee database, for example, can have a column called employee number, and each row in that column is an employee’s number. Indexes Indexes are optional structures associated with tables. Indexes can be created to increase the performance of data retrieval. Just as the index in this manual helps you quickly locate specific information, an Oracle index provides an access path to table data. When processing a request, Oracle can use some or all of the available indexes to locate the requested rows efficiently. Indexes are useful when applications frequently query a table for a range of rows (for example, all employees with a salary 文档下载 免费文档下载 http://www.wendangwang.com/ greater than 1000 dollars) or a specific row. Indexes are created on one or more columns of a table. After ihttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8t is created, an index is automatically maintained and used by Oracle. Changes to table data (such as adding new rows, updating rows, or deleting rows) are automatically incorporated into all relevant indexes with complete transparency to the users. Views Views are customized presentations of data in one or more tables or other views. A view can also be considered a stored query. Views do not actually contain data. Rather, they derive their data from the tables on which they are based, referred to as the base tables of the views. Like tables, views can be queried, updated, inserted into, and deleted from, with some restrictions. All operations performed on a view actually affect the base tables of the view. Views provide an additional level of table security by restricting access to a predetermined set of rows and columns of a table. They also hide data complexity and store complex querihttp://www.wendangwang.com/doc/f6d2729bbb843fed64cefeb8es. 1-12Oracle Database Concepts 文档下载 免费文档下载 http://www.wendangwang.com/ 文档下载网是专业的免费文档搜索与下载网站,提供行业资料,考试资料,教 学课件,学术论文,技术资料,研究报告,工作范文,资格考试,word 文档, 专业文献,应用文书,行业论文等文档搜索与文档下载,是您文档写作和查找 参考资料的必备网站。 文档下载 http://www.wendangwang.com/ 亿万文档资料,等你来发现