没有合适的资源?快使用搜索试试~ 我知道了~
首页Oracle数据库概念详解10g Release 2
Oracle数据库概念详解10g Release 2
需积分: 20 1 下载量 108 浏览量
更新于2024-07-24
收藏 6.07MB PDF 举报
"Oracle数据库概念"
Oracle数据库概念是Oracle公司官方发布的一份文档,主要涵盖了Oracle Database 10g Release 2 (10.2)的核心原理和基础知识。这份文档由Michele Cyran为主编,多位专家共同撰写,旨在帮助用户理解和掌握Oracle数据库的运作机制和管理方法。
文档详细阐述了以下几个关键知识点:
1. 数据库架构:介绍了Oracle数据库的逻辑和物理结构,包括表空间、数据文件、控制文件、重做日志、实例和进程等核心组成部分。它解释了这些元素如何协同工作以确保数据的存储、安全性和性能。
2. SQL语言基础:概述了SQL在Oracle中的应用,包括查询、插入、更新和删除数据的基本语法,以及更复杂的DML和DDL操作,如创建表、索引和视图。
3. 数据库安全性:讨论了用户管理、权限和角色,以及如何通过访问控制列表(ACL)和审计功能来保护数据库免受未经授权的访问。
4. 存储与索引:深入解析了Oracle的行存储方式、簇和索引的类型,如B树索引、位图索引和函数索引,以及它们对查询性能的影响。
5. 并发控制:讲解了Oracle的事务处理机制,包括并发控制的锁定策略,如行级锁、表级锁和多版本并发控制(MVCC),以及死锁检测和避免。
6. 高可用性与灾难恢复:涵盖了数据库备份、恢复策略、闪回技术和数据守护等技术,以确保数据库在故障发生时能够快速恢复。
7. 性能优化:讨论了性能监视工具,如动态性能视图(V$视图)和AWR报告,以及如何使用SQL*Plus、Explain Plan和 tkprof进行查询优化。
8. 分布式数据库系统:介绍了Oracle的分布式特性,如分布式事务处理、全局唯一标识符(GUID)和分布式查询。
9. 网络配置:讲解了Oracle Net Services,它是连接数据库客户端和服务器的网络组件,包括Net Manager的使用和网络配置文件(tnsnames.ora)的管理。
10. 存储过程和包:阐述了PL/SQL编程语言,包括存储过程、函数、触发器和包的创建和管理,以及如何在数据库中实现业务逻辑。
11. 数据仓库与OLAP:探讨了Oracle在数据仓库和在线分析处理(OLAP)领域的解决方案,如星型模式、雪花模式和物质化视图。
这份文档对于Oracle数据库管理员、开发人员和任何希望深入了解Oracle数据库的人来说都是宝贵的参考资料。它不仅提供了理论知识,还包含了许多实用技巧和最佳实践,有助于读者在实际工作中解决各种问题。
xvi
Nonvolatile ............................................................................................................................... 16-2
Time Variant ............................................................................................................................. 16-2
Differences Between Data Warehouse and OLTP Systems ...................................................... 16-2
Workload................................................................................................................................... 16-2
Data Modifications................................................................................................................... 16-2
Schema Design ......................................................................................................................... 16-3
Typical Operations................................................................................................................... 16-3
Historical Data.......................................................................................................................... 16-3
Data Warehouse Architecture....................................................................................................... 16-3
Data Warehouse Architecture (Basic)................................................................................... 16-3
Data Warehouse Architecture (with a Staging Area) ......................................................... 16-4
Data Warehouse Architecture (with a Staging Area and Data Marts)............................. 16-5
Overview of Extraction, Transformation, and Loading (ETL) ...................................................... 16-6
Transportable Tablespaces............................................................................................................. 16-7
Table Functions................................................................................................................................ 16-7
External Tables ................................................................................................................................ 16-8
Table Compression ......................................................................................................................... 16-8
Change Data Capture ..................................................................................................................... 16-9
Overview of Materialized Views for Data Warehouses................................................................. 16-9
Overview of Bitmap Indexes in Data Warehousing..................................................................... 16-10
Overview of Parallel Execution ........................................................................................................ 16-11
How Parallel Execution Works................................................................................................... 16-11
Overview of Analytic SQL ................................................................................................................ 16-12
SQL for Aggregation..................................................................................................................... 16-13
SQL for Analysis............................................................................................................................ 16-13
SQL for Modeling.......................................................................................................................... 16-14
Overview of OLAP Capabilities....................................................................................................... 16-14
Benefits of OLAP and RDBMS Integration ............................................................................... 16-14
Scalability ................................................................................................................................ 16-15
Availability.............................................................................................................................. 16-15
Manageability......................................................................................................................... 16-15
Backup and Recovery............................................................................................................ 16-15
Security.................................................................................................................................... 16-16
Overview of Data Mining.................................................................................................................. 16-16
17 High Availability
Introduction to High Availability ...................................................................................................... 17-1
Overview of Unplanned Downtime.................................................................................................. 17-1
Oracle Solutions to System Failures............................................................................................. 17-1
Overview of Fast-Start Fault Recovery ................................................................................ 17-2
Overview of Real Application Clusters................................................................................ 17-2
Oracle Solutions to Data Failures.................................................................................................. 17-2
Overview of Backup and Recovery Features for High Availability................................. 17-2
Overview of Partitioning ....................................................................................................... 17-3
Overview of Transparent Application Failover .................................................................. 17-4
Oracle Solutions to Disasters......................................................................................................... 17-5
Overview of Oracle Data Guard............................................................................................ 17-5
xvii
Oracle Solutions to Human Errors ............................................................................................... 17-6
Overview of Oracle Flashback Features............................................................................... 17-7
Overview of LogMiner............................................................................................................ 17-7
Overview of Security Features for High Availability......................................................... 17-8
Overview of Planned Downtime ....................................................................................................... 17-8
System Maintenance....................................................................................................................... 17-8
Data Maintenance ........................................................................................................................... 17-9
Database Maintenance.................................................................................................................... 17-9
18 Partitioned Tables and Indexes
Introduction to Partitioning ................................................................................................................ 18-1
Partition Key .................................................................................................................................... 18-3
Partitioned Tables ........................................................................................................................... 18-3
Partitioned Index-Organized Tables ............................................................................................ 18-3
Overview of Partitioning Methods.................................................................................................... 18-3
Range Partitioning .......................................................................................................................... 18-4
Range Partitioning Example................................................................................................... 18-5
List Partitioning............................................................................................................................... 18-5
List Partitioning Example ....................................................................................................... 18-5
Hash Partitioning ............................................................................................................................ 18-6
Hash Partitioning Example .................................................................................................... 18-6
Composite Partitioning .................................................................................................................. 18-7
Composite Partitioning Range-Hash Example.................................................................... 18-7
Composite Partitioning Range-List Example ...................................................................... 18-8
When to Partition a Table .............................................................................................................. 18-9
Overview of Partitioned Indexes ....................................................................................................... 18-9
Local Partitioned Indexes............................................................................................................. 18-10
Global Partitioned Indexes .......................................................................................................... 18-10
Global Range Partitioned Indexes....................................................................................... 18-10
Global Hash Partitioned Indexes......................................................................................... 18-11
Maintenance of Global Partitioned Indexes....................................................................... 18-11
Global Nonpartitioned Indexes................................................................................................... 18-12
Miscellaneous Information about Creating Indexes on Partitioned Tables ......................... 18-12
Using Partitioned Indexes in OLTP Applications.................................................................... 18-13
Using Partitioned Indexes in Data Warehousing and DSS Applications ............................. 18-13
Partitioned Indexes on Composite Partitions ........................................................................... 18-13
Partitioning to Improve Performance.............................................................................................. 18-13
Partition Pruning........................................................................................................................... 18-13
Partition Pruning Example................................................................................................... 18-14
Partition-wise Joins....................................................................................................................... 18-14
Parallel DML.................................................................................................................................. 18-14
19 Content Management
Introduction to Content Management............................................................................................... 19-1
Overview of XML in Oracle ................................................................................................................ 19-2
Overview of LOBs................................................................................................................................. 19-3
xviii
Overview of Oracle Text....................................................................................................................... 19-3
Oracle Text Index Types................................................................................................................. 19-4
Oracle Text Document Services .................................................................................................... 19-4
Oracle Text Query Package............................................................................................................ 19-4
Oracle Text Advanced Features.................................................................................................... 19-4
Overview of Oracle Ultra Search........................................................................................................ 19-5
Overview of Oracle interMedia.......................................................................................................... 19-5
Overview of Oracle Spatial ................................................................................................................. 19-6
20 Database Security
Introduction to Database Security ..................................................................................................... 20-1
Database Users and Schemas ........................................................................................................ 20-1
Security Domain ...................................................................................................................... 20-1
Privileges .......................................................................................................................................... 20-2
Roles.................................................................................................................................................. 20-2
Storage Settings and Quotas.......................................................................................................... 20-2
Default Tablespace .................................................................................................................. 20-2
Temporary Tablespace ........................................................................................................... 20-2
Tablespace Quotas ................................................................................................................... 20-2
Profiles and Resource Limits.................................................................................................. 20-2
Overview of Transparent Data Encryption ...................................................................................... 20-3
Overview of Authentication Methods ............................................................................................. 20-4
Authentication by the Operating System ................................................................................... 20-4
Authentication by the Network ................................................................................................... 20-4
Third Party-Based Authentication Technologies ................................................................ 20-5
Public-Key-Infrastructure-Based Authentication................................................................ 20-5
Remote Authentication ........................................................................................................... 20-5
Authentication by the Oracle Database ...................................................................................... 20-5
Password Encryption .............................................................................................................. 20-6
Account Locking ..................................................................................................................... 20-6
Password Lifetime and Expiration ....................................................................................... 20-6
Password Complexity Verification ....................................................................................... 20-6
Multitier Authentication and Authorization ............................................................................. 20-7
Authentication by the Secure Socket Layer Protocol................................................................. 20-7
Authentication of Database Administrators .............................................................................. 20-7
Overview of Authorization ................................................................................................................ 20-8
User Resource Limits and Profiles................................................................................................ 20-9
Types of System Resources and Limits ................................................................................ 20-9
Profiles .................................................................................................................................... 20-11
Introduction to Privileges ............................................................................................................ 20-11
System Privileges ................................................................................................................... 20-12
Schema Object Privileges...................................................................................................... 20-12
Introduction to Roles .................................................................................................................... 20-12
Common Uses for Roles ....................................................................................................... 20-13
Role Mechanisms ................................................................................................................... 20-14
The Operating System and Roles ........................................................................................ 20-14
Secure Application Roles ............................................................................................................. 20-15
xix
Overview of Access Restrictions on Tables, Views, Synonyms, or Rows................................ 20-15
Fine-Grained Access Control....................................................................................................... 20-15
Dynamic Predicates .............................................................................................................. 20-16
Application Context...................................................................................................................... 20-16
Dynamic Contexts.................................................................................................................. 20-16
Fine-Grained Auditing................................................................................................................. 20-17
Overview of Security Policies .......................................................................................................... 20-17
System Security Policy ................................................................................................................. 20-18
Database User Management................................................................................................. 20-18
User Authentication............................................................................................................... 20-18
Operating System Security................................................................................................... 20-18
Data Security Policy...................................................................................................................... 20-18
User Security Policy...................................................................................................................... 20-19
General User Security............................................................................................................ 20-19
End-User Security .................................................................................................................. 20-19
Administrator Security.......................................................................................................... 20-20
Application Developer Security........................................................................................... 20-20
Application Administrator Security.................................................................................... 20-21
Password Management Policy.................................................................................................... 20-21
Auditing Policy.............................................................................................................................. 20-21
Overview of Database Auditing....................................................................................................... 20-21
Types and Records of Auditing .................................................................................................. 20-22
Audit Records and the Audit Trails.................................................................................... 20-23
21 Data Integrity
Introduction to Data Integrity............................................................................................................. 21-1
Types of Data Integrity .................................................................................................................. 21-3
Null Rule ................................................................................................................................... 21-3
Unique Column Values........................................................................................................... 21-3
Primary Key Values................................................................................................................. 21-3
Referential Integrity Rules...................................................................................................... 21-3
Complex Integrity Checking.................................................................................................. 21-3
How Oracle Enforces Data Integrity ........................................................................................... 21-3
Integrity Constraints Description.......................................................................................... 21-4
Database Triggers .................................................................................................................... 21-4
Overview of Integrity Constraints ..................................................................................................... 21-4
Advantages of Integrity Constraints ........................................................................................... 21-5
Declarative Ease ....................................................................................................................... 21-5
Centralized Rules..................................................................................................................... 21-5
Maximum Application Development Productivity............................................................ 21-5
Immediate User Feedback ...................................................................................................... 21-5
Superior Performance.............................................................................................................. 21-5
Flexibility for Data Loads and Identification of Integrity Violations............................... 21-6
The Performance Cost of Integrity Constraints ......................................................................... 21-6
Types of Integrity Constraints ............................................................................................................ 21-6
NOT NULL Integrity Constraints ................................................................................................ 21-6
UNIQUE Key Integrity Constraints ............................................................................................ 21-7
xx
Unique Keys.............................................................................................................................. 21-7
UNIQUE Key Constraints and Indexes................................................................................ 21-8
Combine UNIQUE Key and NOT NULL Integrity Constraints....................................... 21-9
PRIMARY KEY Integrity Constraints ......................................................................................... 21-9
Primary Keys ............................................................................................................................ 21-9
PRIMARY KEY Constraints and Indexes........................................................................... 21-10
Referential Integrity Constraints ................................................................................................ 21-10
Self-Referential Integrity Constraints.................................................................................. 21-12
Nulls and Foreign Keys......................................................................................................... 21-13
Actions Defined by Referential Integrity Constraints...................................................... 21-13
Concurrency Control, Indexes, and Foreign Keys............................................................ 21-14
CHECK Integrity Constraints ..................................................................................................... 21-16
The Check Condition............................................................................................................. 21-16
Multiple CHECK Constraints .............................................................................................. 21-17
The Mechanisms of Constraint Checking ...................................................................................... 21-17
Default Column Values and Integrity Constraint Checking ................................................. 21-19
Deferred Constraint Checking.......................................................................................................... 21-19
Constraint Attributes ................................................................................................................... 21-19
SET CONSTRAINTS Mode ........................................................................................................ 21-19
Unique Constraints and Indexes ................................................................................................ 21-20
Constraint States.................................................................................................................................. 21-20
Constraint State Modification...................................................................................................... 21-21
22 Triggers
Introduction to Triggers ...................................................................................................................... 22-1
How Triggers Are Used ................................................................................................................ 22-2
Some Cautionary Notes about Triggers .............................................................................. 22-3
Triggers Compared with Declarative Integrity Constraints ............................................. 22-4
Parts of a Trigger.................................................................................................................................... 22-5
The Triggering Event or Statement ............................................................................................. 22-5
Trigger Restriction .......................................................................................................................... 22-6
Trigger Action ................................................................................................................................. 22-6
Types of Triggers ................................................................................................................................... 22-7
Row Triggers and Statement Triggers ........................................................................................ 22-7
Row Triggers ........................................................................................................................... 22-7
Statement Triggers .................................................................................................................. 22-7
BEFORE and AFTER Triggers ...................................................................................................... 22-7
BEFORE Triggers .................................................................................................................... 22-8
AFTER Triggers ....................................................................................................................... 22-8
Trigger Type Combinations .................................................................................................. 22-8
INSTEAD OF Triggers ................................................................................................................... 22-9
Modify Views .......................................................................................................................... 22-9
Views That Are Not Modifiable ............................................................................................ 22-9
INSTEAD OF Triggers on Nested Tables .......................................................................... 22-10
Triggers on System Events and User Events ............................................................................ 22-10
Event Publication .................................................................................................................. 22-11
Event Attributes .................................................................................................................... 22-11
剩余541页未读,继续阅读
2012-10-11 上传
2015-07-03 上传
2011-03-29 上传
2012-12-22 上传
2011-11-16 上传
2013-09-06 上传
2010-01-29 上传
2013-10-31 上传
2014-06-07 上传
maliang1202
- 粉丝: 0
- 资源: 9
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- 黑板风格计算机毕业答辩PPT模板下载
- CodeSandbox实现ListView快速创建指南
- Node.js脚本实现WXR文件到Postgres数据库帖子导入
- 清新简约创意三角毕业论文答辩PPT模板
- DISCORD-JS-CRUD:提升 Discord 机器人开发体验
- Node.js v4.3.2版本Linux ARM64平台运行时环境发布
- SQLight:C++11编写的轻量级MySQL客户端
- 计算机专业毕业论文答辩PPT模板
- Wireshark网络抓包工具的使用与数据包解析
- Wild Match Map: JavaScript中实现通配符映射与事件绑定
- 毕业答辩利器:蝶恋花毕业设计PPT模板
- Node.js深度解析:高性能Web服务器与实时应用构建
- 掌握深度图技术:游戏开发中的绚丽应用案例
- Dart语言的HTTP扩展包功能详解
- MoonMaker: 投资组合加固神器,助力$GME投资者登月
- 计算机毕业设计答辩PPT模板下载
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功