没有合适的资源?快使用搜索试试~ 我知道了~
首页Oracle 10g数据库基础概念详解
"Oracle 10g基本概念"
Oracle 10g是Oracle公司推出的一款数据库管理系统,其核心组件包括数据库引擎、SQL查询处理、存储系统、安全性、网络、备份和恢复等多个方面。Oracle 10g引入了许多新的特性和改进,以提升性能、可用性、可管理性和安全性。以下是对Oracle 10g基本概念的详细说明:
1. **数据库实例与数据库**: 数据库是数据的实际物理存储,包含数据文件、控制文件、重做日志文件等。而数据库实例是内存结构和后台进程的集合,它提供对数据库的访问。当数据库启动时,实例在内存中加载数据,使用户能够与数据进行交互。
2. **表空间与数据文件**: 表空间是存储数据的逻辑单位,由一个或多个数据文件组成。每个数据库可以有多个表空间,用于组织和存储不同类型的数据库对象,如表、索引等。
3. **ASM (Automatic Storage Management)**: Oracle 10g引入了ASM,这是一种集成的存储管理解决方案,自动管理数据文件和重做日志文件的存储,简化了存储管理并提高了性能。
4. **RAC (Real Application Clusters)**: RAC允许多台服务器共享同一数据库,提供高可用性和负载均衡。当一台服务器出现故障,其他服务器可以接管工作,确保服务连续性。
5. **数据块与行链接**: Oracle以数据块为单位存储数据,每个数据块包含多行。行链接(Row Chaining)是指当一行数据无法完全存放在一个数据块中时,剩余部分会链接到其他数据块,这可能导致I/O性能下降。
6. **分区**: 分区是将大表或索引分成较小、更易管理的部分,提高查询性能和管理效率。Oracle 10g支持多种分区策略,如范围分区、列表分区、哈希分区和复合分区。
7. **物化视图**: 物化视图是预先计算好的查询结果,存储在数据库中,提供快速的数据访问。它们特别适用于定期更新但查询需求不变的情况。
8. **闪回技术**: 闪回功能允许用户撤销数据库到过去某个时间点的状态,包括闪回查询(查看过去的记录)、闪回事务(回滚未提交的事务)和闪回表空间(恢复整个表空间到先前状态)。
9. **高级安全特性**: 包括加密、审计、访问控制和身份验证机制,增强了数据保护和合规性。
10. **XML支持**: Oracle 10g加强了对XML的支持,提供了XMLDB(XML数据库),可以直接存储和检索XML文档,同时支持XML索引和XML类型。
11. **网格计算**: Oracle 10g的设计考虑了网格计算环境,使得在大规模分布式计算环境中部署和管理数据库变得更加简单。
12. **性能优化**: 包括自动工作负载库(AWR)和统计信息收集,以及SQL优化顾问,帮助识别和解决性能问题。
13. **PL/SQL**: Oracle的编程语言PL/SQL允许开发者创建存储过程、函数、触发器等,实现业务逻辑并提高数据库操作的效率。
以上是Oracle 10g的一些基本概念,这些概念构成了Oracle数据库的核心组成部分,为用户提供了一个高效、可靠和灵活的数据管理平台。了解和掌握这些概念对于理解和使用Oracle 10g至关重要。
xvi
Nonvolatile ............................................................................................................................... 16-2
Time Variant ............................................................................................................................. 16-2
Differences Between Data Warehouse and OLTP Systems ...................................................... 16-2
Workload................................................................................................................................... 16-2
Data Modifications................................................................................................................... 16-2
Schema Design ......................................................................................................................... 16-3
Typical Operations................................................................................................................... 16-3
Historical Data.......................................................................................................................... 16-3
Data Warehouse Architecture....................................................................................................... 16-3
Data Warehouse Architecture (Basic)................................................................................... 16-3
Data Warehouse Architecture (with a Staging Area) ......................................................... 16-4
Data Warehouse Architecture (with a Staging Area and Data Marts)............................. 16-5
Overview of Extraction, Transformation, and Loading (ETL) ...................................................... 16-6
Transportable Tablespaces............................................................................................................. 16-7
Table Functions................................................................................................................................ 16-7
External Tables ................................................................................................................................ 16-8
Table Compression ......................................................................................................................... 16-8
Change Data Capture ..................................................................................................................... 16-9
Overview of Materialized Views for Data Warehouses................................................................. 16-9
Overview of Bitmap Indexes in Data Warehousing..................................................................... 16-10
Overview of Parallel Execution ........................................................................................................ 16-11
How Parallel Execution Works................................................................................................... 16-11
Overview of Analytic SQL ................................................................................................................ 16-12
SQL for Aggregation..................................................................................................................... 16-13
SQL for Analysis............................................................................................................................ 16-13
SQL for Modeling.......................................................................................................................... 16-14
Overview of OLAP Capabilities....................................................................................................... 16-14
Benefits of OLAP and RDBMS Integration ............................................................................... 16-14
Scalability ................................................................................................................................ 16-15
Availability.............................................................................................................................. 16-15
Manageability......................................................................................................................... 16-15
Backup and Recovery............................................................................................................ 16-15
Security.................................................................................................................................... 16-16
Overview of Data Mining.................................................................................................................. 16-16
17 High Availability
Introduction to High Availability ...................................................................................................... 17-1
Overview of Unplanned Downtime.................................................................................................. 17-1
Oracle Solutions to System Failures............................................................................................. 17-1
Overview of Fast-Start Fault Recovery ................................................................................ 17-2
Overview of Real Application Clusters................................................................................ 17-2
Oracle Solutions to Data Failures.................................................................................................. 17-2
Overview of Backup and Recovery Features for High Availability................................. 17-2
Overview of Partitioning ....................................................................................................... 17-3
Overview of Transparent Application Failover .................................................................. 17-4
Oracle Solutions to Disasters......................................................................................................... 17-5
Overview of Oracle Data Guard............................................................................................ 17-5
xvii
Oracle Solutions to Human Errors ............................................................................................... 17-6
Overview of Oracle Flashback Features............................................................................... 17-7
Overview of LogMiner............................................................................................................ 17-7
Overview of Security Features for High Availability......................................................... 17-8
Overview of Planned Downtime ....................................................................................................... 17-8
System Maintenance....................................................................................................................... 17-8
Data Maintenance ........................................................................................................................... 17-9
Database Maintenance.................................................................................................................... 17-9
18 Partitioned Tables and Indexes
Introduction to Partitioning ................................................................................................................ 18-1
Partition Key .................................................................................................................................... 18-3
Partitioned Tables ........................................................................................................................... 18-3
Partitioned Index-Organized Tables ............................................................................................ 18-3
Overview of Partitioning Methods.................................................................................................... 18-3
Range Partitioning .......................................................................................................................... 18-4
Range Partitioning Example................................................................................................... 18-5
List Partitioning............................................................................................................................... 18-5
List Partitioning Example ....................................................................................................... 18-5
Hash Partitioning ............................................................................................................................ 18-6
Hash Partitioning Example .................................................................................................... 18-6
Composite Partitioning .................................................................................................................. 18-7
Composite Partitioning Range-Hash Example.................................................................... 18-7
Composite Partitioning Range-List Example ...................................................................... 18-8
When to Partition a Table .............................................................................................................. 18-9
Overview of Partitioned Indexes ....................................................................................................... 18-9
Local Partitioned Indexes............................................................................................................. 18-10
Global Partitioned Indexes .......................................................................................................... 18-10
Global Range Partitioned Indexes....................................................................................... 18-10
Global Hash Partitioned Indexes......................................................................................... 18-11
Maintenance of Global Partitioned Indexes....................................................................... 18-11
Global Nonpartitioned Indexes................................................................................................... 18-12
Miscellaneous Information about Creating Indexes on Partitioned Tables ......................... 18-12
Using Partitioned Indexes in OLTP Applications.................................................................... 18-13
Using Partitioned Indexes in Data Warehousing and DSS Applications ............................. 18-13
Partitioned Indexes on Composite Partitions ........................................................................... 18-13
Partitioning to Improve Performance.............................................................................................. 18-13
Partition Pruning........................................................................................................................... 18-13
Partition Pruning Example................................................................................................... 18-14
Partition-wise Joins....................................................................................................................... 18-14
Parallel DML.................................................................................................................................. 18-14
19 Content Management
Introduction to Content Management............................................................................................... 19-1
Overview of XML in Oracle ................................................................................................................ 19-2
Overview of LOBs................................................................................................................................. 19-3
xviii
Overview of Oracle Text....................................................................................................................... 19-3
Oracle Text Index Types................................................................................................................. 19-4
Oracle Text Document Services .................................................................................................... 19-4
Oracle Text Query Package............................................................................................................ 19-4
Oracle Text Advanced Features.................................................................................................... 19-4
Overview of Oracle Ultra Search........................................................................................................ 19-5
Overview of Oracle interMedia.......................................................................................................... 19-5
Overview of Oracle Spatial ................................................................................................................. 19-6
20 Database Security
Introduction to Database Security ..................................................................................................... 20-1
Database Users and Schemas ........................................................................................................ 20-1
Security Domain ...................................................................................................................... 20-1
Privileges .......................................................................................................................................... 20-2
Roles.................................................................................................................................................. 20-2
Storage Settings and Quotas.......................................................................................................... 20-2
Default Tablespace .................................................................................................................. 20-2
Temporary Tablespace ........................................................................................................... 20-2
Tablespace Quotas ................................................................................................................... 20-2
Profiles and Resource Limits.................................................................................................. 20-2
Overview of Transparent Data Encryption ...................................................................................... 20-3
Overview of Authentication Methods ............................................................................................. 20-4
Authentication by the Operating System ................................................................................... 20-4
Authentication by the Network ................................................................................................... 20-4
Third Party-Based Authentication Technologies ................................................................ 20-5
Public-Key-Infrastructure-Based Authentication................................................................ 20-5
Remote Authentication ........................................................................................................... 20-5
Authentication by the Oracle Database ...................................................................................... 20-5
Password Encryption .............................................................................................................. 20-6
Account Locking ..................................................................................................................... 20-6
Password Lifetime and Expiration ....................................................................................... 20-6
Password Complexity Verification ....................................................................................... 20-6
Multitier Authentication and Authorization ............................................................................. 20-7
Authentication by the Secure Socket Layer Protocol................................................................. 20-7
Authentication of Database Administrators .............................................................................. 20-7
Overview of Authorization ................................................................................................................ 20-8
User Resource Limits and Profiles................................................................................................ 20-9
Types of System Resources and Limits ................................................................................ 20-9
Profiles .................................................................................................................................... 20-11
Introduction to Privileges ............................................................................................................ 20-11
System Privileges ................................................................................................................... 20-12
Schema Object Privileges...................................................................................................... 20-12
Introduction to Roles .................................................................................................................... 20-12
Common Uses for Roles ....................................................................................................... 20-13
Role Mechanisms ................................................................................................................... 20-14
The Operating System and Roles ........................................................................................ 20-14
Secure Application Roles ............................................................................................................. 20-15
xix
Overview of Access Restrictions on Tables, Views, Synonyms, or Rows................................ 20-15
Fine-Grained Access Control....................................................................................................... 20-15
Dynamic Predicates .............................................................................................................. 20-16
Application Context...................................................................................................................... 20-16
Dynamic Contexts.................................................................................................................. 20-16
Fine-Grained Auditing................................................................................................................. 20-17
Overview of Security Policies .......................................................................................................... 20-17
System Security Policy ................................................................................................................. 20-18
Database User Management................................................................................................. 20-18
User Authentication............................................................................................................... 20-18
Operating System Security................................................................................................... 20-18
Data Security Policy...................................................................................................................... 20-18
User Security Policy...................................................................................................................... 20-19
General User Security............................................................................................................ 20-19
End-User Security .................................................................................................................. 20-19
Administrator Security.......................................................................................................... 20-20
Application Developer Security........................................................................................... 20-20
Application Administrator Security.................................................................................... 20-21
Password Management Policy.................................................................................................... 20-21
Auditing Policy.............................................................................................................................. 20-21
Overview of Database Auditing....................................................................................................... 20-21
Types and Records of Auditing .................................................................................................. 20-22
Audit Records and the Audit Trails.................................................................................... 20-23
21 Data Integrity
Introduction to Data Integrity............................................................................................................. 21-1
Types of Data Integrity .................................................................................................................. 21-3
Null Rule ................................................................................................................................... 21-3
Unique Column Values........................................................................................................... 21-3
Primary Key Values................................................................................................................. 21-3
Referential Integrity Rules...................................................................................................... 21-3
Complex Integrity Checking.................................................................................................. 21-3
How Oracle Enforces Data Integrity ........................................................................................... 21-3
Integrity Constraints Description.......................................................................................... 21-4
Database Triggers .................................................................................................................... 21-4
Overview of Integrity Constraints ..................................................................................................... 21-4
Advantages of Integrity Constraints ........................................................................................... 21-5
Declarative Ease ....................................................................................................................... 21-5
Centralized Rules..................................................................................................................... 21-5
Maximum Application Development Productivity............................................................ 21-5
Immediate User Feedback ...................................................................................................... 21-5
Superior Performance.............................................................................................................. 21-5
Flexibility for Data Loads and Identification of Integrity Violations............................... 21-6
The Performance Cost of Integrity Constraints ......................................................................... 21-6
Types of Integrity Constraints ............................................................................................................ 21-6
NOT NULL Integrity Constraints ................................................................................................ 21-6
UNIQUE Key Integrity Constraints ............................................................................................ 21-7
xx
Unique Keys.............................................................................................................................. 21-7
UNIQUE Key Constraints and Indexes................................................................................ 21-8
Combine UNIQUE Key and NOT NULL Integrity Constraints....................................... 21-9
PRIMARY KEY Integrity Constraints ......................................................................................... 21-9
Primary Keys ............................................................................................................................ 21-9
PRIMARY KEY Constraints and Indexes........................................................................... 21-10
Referential Integrity Constraints ................................................................................................ 21-10
Self-Referential Integrity Constraints.................................................................................. 21-12
Nulls and Foreign Keys......................................................................................................... 21-13
Actions Defined by Referential Integrity Constraints...................................................... 21-13
Concurrency Control, Indexes, and Foreign Keys............................................................ 21-14
CHECK Integrity Constraints ..................................................................................................... 21-16
The Check Condition............................................................................................................. 21-16
Multiple CHECK Constraints .............................................................................................. 21-17
The Mechanisms of Constraint Checking ...................................................................................... 21-17
Default Column Values and Integrity Constraint Checking ................................................. 21-19
Deferred Constraint Checking.......................................................................................................... 21-19
Constraint Attributes ................................................................................................................... 21-19
SET CONSTRAINTS Mode ........................................................................................................ 21-19
Unique Constraints and Indexes ................................................................................................ 21-20
Constraint States.................................................................................................................................. 21-20
Constraint State Modification...................................................................................................... 21-21
22 Triggers
Introduction to Triggers ...................................................................................................................... 22-1
How Triggers Are Used ................................................................................................................ 22-2
Some Cautionary Notes about Triggers .............................................................................. 22-3
Triggers Compared with Declarative Integrity Constraints ............................................. 22-4
Parts of a Trigger.................................................................................................................................... 22-5
The Triggering Event or Statement ............................................................................................. 22-5
Trigger Restriction .......................................................................................................................... 22-6
Trigger Action ................................................................................................................................. 22-6
Types of Triggers ................................................................................................................................... 22-7
Row Triggers and Statement Triggers ........................................................................................ 22-7
Row Triggers ........................................................................................................................... 22-7
Statement Triggers .................................................................................................................. 22-7
BEFORE and AFTER Triggers ...................................................................................................... 22-7
BEFORE Triggers .................................................................................................................... 22-8
AFTER Triggers ....................................................................................................................... 22-8
Trigger Type Combinations .................................................................................................. 22-8
INSTEAD OF Triggers ................................................................................................................... 22-9
Modify Views .......................................................................................................................... 22-9
Views That Are Not Modifiable ............................................................................................ 22-9
INSTEAD OF Triggers on Nested Tables .......................................................................... 22-10
Triggers on System Events and User Events ............................................................................ 22-10
Event Publication .................................................................................................................. 22-11
Event Attributes .................................................................................................................... 22-11
剩余541页未读,继续阅读
2016-10-04 上传
2013-11-23 上传
2023-09-27 上传
2023-06-06 上传
2023-08-03 上传
2023-09-06 上传
2023-07-09 上传
2023-07-14 上传
2023-05-27 上传
binxinjk
- 粉丝: 1
- 资源: 25
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- Postman安装与功能详解:适用于API测试与HTTP请求
- Dart打造简易Web服务器教程:simple-server-dart
- FFmpeg 4.4 快速搭建与环境变量配置教程
- 牛顿井在围棋中的应用:利用牛顿多项式求根技术
- SpringBoot结合MySQL实现MQTT消息持久化教程
- C语言实现水仙花数输出方法详解
- Avatar_Utils库1.0.10版本发布,Python开发者必备工具
- Python爬虫实现漫画榜单数据处理与可视化分析
- 解压缩教材程序文件的正确方法
- 快速搭建Spring Boot Web项目实战指南
- Avatar Utils 1.8.1 工具包的安装与使用指南
- GatewayWorker扩展包压缩文件的下载与使用指南
- 实现饮食目标的开源Visual Basic编码程序
- 打造个性化O'RLY动物封面生成器
- Avatar_Utils库打包文件安装与使用指南
- Python端口扫描工具的设计与实现要点解析
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功