没有合适的资源?快使用搜索试试~ 我知道了~
首页Oracle数据库概念10g Release 2详解
Oracle数据库概念10g Release 2详解
需积分: 20 0 下载量 190 浏览量
更新于2024-07-27
收藏 6.07MB PDF 举报
"Oracle数据库概念10g Release 2 (10.2)"
Oracle数据库概念是Oracle公司出版的一本关于Oracle数据库的重要文档,10g Release 2 (10.2)版是该系列的第10代更新版本,发布于2005年10月。这本书由Michele Cyran作为主要作者,并有多位贡献者共同编写,包括Paul Lane、JPPolk等。它详细阐述了Oracle数据库的核心概念和工作原理,旨在帮助用户理解和操作Oracle数据库系统。
本书涵盖了Oracle数据库的基础知识,如数据库体系结构、数据存储、事务处理、并发控制、备份与恢复、性能优化以及安全性等方面。以下是其中的一些关键知识点:
1. **数据库体系结构**:Oracle数据库基于关系型数据库模型,其架构包括数据库实例(Instance)和物理存储结构(Database)。实例由内存结构(如SGA)和后台进程组成,而数据库则包含表空间、数据文件、控制文件、重做日志文件等物理组件。
2. **数据存储**:在Oracle中,数据被组织成表、索引、视图等形式,存储在表空间中。表空间是由一个或多个数据文件组成的逻辑存储单元,数据文件则是实际保存数据的物理文件。
3. **SQL语言**:Oracle支持标准的SQL(结构化查询语言),用于查询、插入、更新和删除数据。还包括PL/SQL,这是一种过程式语言,用于创建存储过程、函数和触发器等数据库对象。
4. **事务管理**:Oracle支持ACID(原子性、一致性、隔离性和持久性)特性,保证了数据库操作的可靠性。事务可以通过COMMIT提交,ROLLBACK回滚,或者使用SAVEPOINT设置可撤销点。
5. **并发控制**:Oracle使用多版本并发控制(MVCC)来处理并发事务,避免锁竞争,提高系统性能。此外,行级锁定和死锁检测也是Oracle并发控制的重要组成部分。
6. **备份与恢复**:Oracle提供了多种备份策略,如完整备份、增量备份和归档日志模式。RMAN(恢复管理器)是Oracle的主要备份工具,同时,Flashback技术可以实现快速的数据恢复。
7. **性能优化**:Oracle提供了一整套性能优化工具,包括SQL*Plus、Explain Plan、性能视图、AWR(自动工作负载Repository)和ASH(Active Session History)。通过优化查询语句、调整表分区、使用索引和调整初始化参数,可以显著提升数据库性能。
8. **安全性**:Oracle数据库支持用户权限和角色管理,通过GRANT和REVOKE语句控制访问权限。审计功能可以记录数据库活动,而网络加密和SSL协议确保了数据传输的安全性。
这本《Oracle Database Concepts》对于数据库管理员、开发人员以及任何需要理解Oracle数据库操作的人来说,都是一份宝贵的参考资料。通过深入学习这些概念,读者将能够更好地管理和维护Oracle数据库系统。
xvi
Nonvolatile ............................................................................................................................... 16-2
Time Variant ............................................................................................................................. 16-2
Differences Between Data Warehouse and OLTP Systems ...................................................... 16-2
Workload................................................................................................................................... 16-2
Data Modifications................................................................................................................... 16-2
Schema Design ......................................................................................................................... 16-3
Typical Operations................................................................................................................... 16-3
Historical Data.......................................................................................................................... 16-3
Data Warehouse Architecture....................................................................................................... 16-3
Data Warehouse Architecture (Basic)................................................................................... 16-3
Data Warehouse Architecture (with a Staging Area) ......................................................... 16-4
Data Warehouse Architecture (with a Staging Area and Data Marts)............................. 16-5
Overview of Extraction, Transformation, and Loading (ETL) ...................................................... 16-6
Transportable Tablespaces............................................................................................................. 16-7
Table Functions................................................................................................................................ 16-7
External Tables ................................................................................................................................ 16-8
Table Compression ......................................................................................................................... 16-8
Change Data Capture ..................................................................................................................... 16-9
Overview of Materialized Views for Data Warehouses................................................................. 16-9
Overview of Bitmap Indexes in Data Warehousing..................................................................... 16-10
Overview of Parallel Execution ........................................................................................................ 16-11
How Parallel Execution Works................................................................................................... 16-11
Overview of Analytic SQL ................................................................................................................ 16-12
SQL for Aggregation..................................................................................................................... 16-13
SQL for Analysis............................................................................................................................ 16-13
SQL for Modeling.......................................................................................................................... 16-14
Overview of OLAP Capabilities....................................................................................................... 16-14
Benefits of OLAP and RDBMS Integration ............................................................................... 16-14
Scalability ................................................................................................................................ 16-15
Availability.............................................................................................................................. 16-15
Manageability......................................................................................................................... 16-15
Backup and Recovery............................................................................................................ 16-15
Security.................................................................................................................................... 16-16
Overview of Data Mining.................................................................................................................. 16-16
17 High Availability
Introduction to High Availability ...................................................................................................... 17-1
Overview of Unplanned Downtime.................................................................................................. 17-1
Oracle Solutions to System Failures............................................................................................. 17-1
Overview of Fast-Start Fault Recovery ................................................................................ 17-2
Overview of Real Application Clusters................................................................................ 17-2
Oracle Solutions to Data Failures.................................................................................................. 17-2
Overview of Backup and Recovery Features for High Availability................................. 17-2
Overview of Partitioning ....................................................................................................... 17-3
Overview of Transparent Application Failover .................................................................. 17-4
Oracle Solutions to Disasters......................................................................................................... 17-5
Overview of Oracle Data Guard............................................................................................ 17-5
xvii
Oracle Solutions to Human Errors ............................................................................................... 17-6
Overview of Oracle Flashback Features............................................................................... 17-7
Overview of LogMiner............................................................................................................ 17-7
Overview of Security Features for High Availability......................................................... 17-8
Overview of Planned Downtime ....................................................................................................... 17-8
System Maintenance....................................................................................................................... 17-8
Data Maintenance ........................................................................................................................... 17-9
Database Maintenance.................................................................................................................... 17-9
18 Partitioned Tables and Indexes
Introduction to Partitioning ................................................................................................................ 18-1
Partition Key .................................................................................................................................... 18-3
Partitioned Tables ........................................................................................................................... 18-3
Partitioned Index-Organized Tables ............................................................................................ 18-3
Overview of Partitioning Methods.................................................................................................... 18-3
Range Partitioning .......................................................................................................................... 18-4
Range Partitioning Example................................................................................................... 18-5
List Partitioning............................................................................................................................... 18-5
List Partitioning Example ....................................................................................................... 18-5
Hash Partitioning ............................................................................................................................ 18-6
Hash Partitioning Example .................................................................................................... 18-6
Composite Partitioning .................................................................................................................. 18-7
Composite Partitioning Range-Hash Example.................................................................... 18-7
Composite Partitioning Range-List Example ...................................................................... 18-8
When to Partition a Table .............................................................................................................. 18-9
Overview of Partitioned Indexes ....................................................................................................... 18-9
Local Partitioned Indexes............................................................................................................. 18-10
Global Partitioned Indexes .......................................................................................................... 18-10
Global Range Partitioned Indexes....................................................................................... 18-10
Global Hash Partitioned Indexes......................................................................................... 18-11
Maintenance of Global Partitioned Indexes....................................................................... 18-11
Global Nonpartitioned Indexes................................................................................................... 18-12
Miscellaneous Information about Creating Indexes on Partitioned Tables ......................... 18-12
Using Partitioned Indexes in OLTP Applications.................................................................... 18-13
Using Partitioned Indexes in Data Warehousing and DSS Applications ............................. 18-13
Partitioned Indexes on Composite Partitions ........................................................................... 18-13
Partitioning to Improve Performance.............................................................................................. 18-13
Partition Pruning........................................................................................................................... 18-13
Partition Pruning Example................................................................................................... 18-14
Partition-wise Joins....................................................................................................................... 18-14
Parallel DML.................................................................................................................................. 18-14
19 Content Management
Introduction to Content Management............................................................................................... 19-1
Overview of XML in Oracle ................................................................................................................ 19-2
Overview of LOBs................................................................................................................................. 19-3
xviii
Overview of Oracle Text....................................................................................................................... 19-3
Oracle Text Index Types................................................................................................................. 19-4
Oracle Text Document Services .................................................................................................... 19-4
Oracle Text Query Package............................................................................................................ 19-4
Oracle Text Advanced Features.................................................................................................... 19-4
Overview of Oracle Ultra Search........................................................................................................ 19-5
Overview of Oracle interMedia.......................................................................................................... 19-5
Overview of Oracle Spatial ................................................................................................................. 19-6
20 Database Security
Introduction to Database Security ..................................................................................................... 20-1
Database Users and Schemas ........................................................................................................ 20-1
Security Domain ...................................................................................................................... 20-1
Privileges .......................................................................................................................................... 20-2
Roles.................................................................................................................................................. 20-2
Storage Settings and Quotas.......................................................................................................... 20-2
Default Tablespace .................................................................................................................. 20-2
Temporary Tablespace ........................................................................................................... 20-2
Tablespace Quotas ................................................................................................................... 20-2
Profiles and Resource Limits.................................................................................................. 20-2
Overview of Transparent Data Encryption ...................................................................................... 20-3
Overview of Authentication Methods ............................................................................................. 20-4
Authentication by the Operating System ................................................................................... 20-4
Authentication by the Network ................................................................................................... 20-4
Third Party-Based Authentication Technologies ................................................................ 20-5
Public-Key-Infrastructure-Based Authentication................................................................ 20-5
Remote Authentication ........................................................................................................... 20-5
Authentication by the Oracle Database ...................................................................................... 20-5
Password Encryption .............................................................................................................. 20-6
Account Locking ..................................................................................................................... 20-6
Password Lifetime and Expiration ....................................................................................... 20-6
Password Complexity Verification ....................................................................................... 20-6
Multitier Authentication and Authorization ............................................................................. 20-7
Authentication by the Secure Socket Layer Protocol................................................................. 20-7
Authentication of Database Administrators .............................................................................. 20-7
Overview of Authorization ................................................................................................................ 20-8
User Resource Limits and Profiles................................................................................................ 20-9
Types of System Resources and Limits ................................................................................ 20-9
Profiles .................................................................................................................................... 20-11
Introduction to Privileges ............................................................................................................ 20-11
System Privileges ................................................................................................................... 20-12
Schema Object Privileges...................................................................................................... 20-12
Introduction to Roles .................................................................................................................... 20-12
Common Uses for Roles ....................................................................................................... 20-13
Role Mechanisms ................................................................................................................... 20-14
The Operating System and Roles ........................................................................................ 20-14
Secure Application Roles ............................................................................................................. 20-15
xix
Overview of Access Restrictions on Tables, Views, Synonyms, or Rows................................ 20-15
Fine-Grained Access Control....................................................................................................... 20-15
Dynamic Predicates .............................................................................................................. 20-16
Application Context...................................................................................................................... 20-16
Dynamic Contexts.................................................................................................................. 20-16
Fine-Grained Auditing................................................................................................................. 20-17
Overview of Security Policies .......................................................................................................... 20-17
System Security Policy ................................................................................................................. 20-18
Database User Management................................................................................................. 20-18
User Authentication............................................................................................................... 20-18
Operating System Security................................................................................................... 20-18
Data Security Policy...................................................................................................................... 20-18
User Security Policy...................................................................................................................... 20-19
General User Security............................................................................................................ 20-19
End-User Security .................................................................................................................. 20-19
Administrator Security.......................................................................................................... 20-20
Application Developer Security........................................................................................... 20-20
Application Administrator Security.................................................................................... 20-21
Password Management Policy.................................................................................................... 20-21
Auditing Policy.............................................................................................................................. 20-21
Overview of Database Auditing....................................................................................................... 20-21
Types and Records of Auditing .................................................................................................. 20-22
Audit Records and the Audit Trails.................................................................................... 20-23
21 Data Integrity
Introduction to Data Integrity............................................................................................................. 21-1
Types of Data Integrity .................................................................................................................. 21-3
Null Rule ................................................................................................................................... 21-3
Unique Column Values........................................................................................................... 21-3
Primary Key Values................................................................................................................. 21-3
Referential Integrity Rules...................................................................................................... 21-3
Complex Integrity Checking.................................................................................................. 21-3
How Oracle Enforces Data Integrity ........................................................................................... 21-3
Integrity Constraints Description.......................................................................................... 21-4
Database Triggers .................................................................................................................... 21-4
Overview of Integrity Constraints ..................................................................................................... 21-4
Advantages of Integrity Constraints ........................................................................................... 21-5
Declarative Ease ....................................................................................................................... 21-5
Centralized Rules..................................................................................................................... 21-5
Maximum Application Development Productivity............................................................ 21-5
Immediate User Feedback ...................................................................................................... 21-5
Superior Performance.............................................................................................................. 21-5
Flexibility for Data Loads and Identification of Integrity Violations............................... 21-6
The Performance Cost of Integrity Constraints ......................................................................... 21-6
Types of Integrity Constraints ............................................................................................................ 21-6
NOT NULL Integrity Constraints ................................................................................................ 21-6
UNIQUE Key Integrity Constraints ............................................................................................ 21-7
xx
Unique Keys.............................................................................................................................. 21-7
UNIQUE Key Constraints and Indexes................................................................................ 21-8
Combine UNIQUE Key and NOT NULL Integrity Constraints....................................... 21-9
PRIMARY KEY Integrity Constraints ......................................................................................... 21-9
Primary Keys ............................................................................................................................ 21-9
PRIMARY KEY Constraints and Indexes........................................................................... 21-10
Referential Integrity Constraints ................................................................................................ 21-10
Self-Referential Integrity Constraints.................................................................................. 21-12
Nulls and Foreign Keys......................................................................................................... 21-13
Actions Defined by Referential Integrity Constraints...................................................... 21-13
Concurrency Control, Indexes, and Foreign Keys............................................................ 21-14
CHECK Integrity Constraints ..................................................................................................... 21-16
The Check Condition............................................................................................................. 21-16
Multiple CHECK Constraints .............................................................................................. 21-17
The Mechanisms of Constraint Checking ...................................................................................... 21-17
Default Column Values and Integrity Constraint Checking ................................................. 21-19
Deferred Constraint Checking.......................................................................................................... 21-19
Constraint Attributes ................................................................................................................... 21-19
SET CONSTRAINTS Mode ........................................................................................................ 21-19
Unique Constraints and Indexes ................................................................................................ 21-20
Constraint States.................................................................................................................................. 21-20
Constraint State Modification...................................................................................................... 21-21
22 Triggers
Introduction to Triggers ...................................................................................................................... 22-1
How Triggers Are Used ................................................................................................................ 22-2
Some Cautionary Notes about Triggers .............................................................................. 22-3
Triggers Compared with Declarative Integrity Constraints ............................................. 22-4
Parts of a Trigger.................................................................................................................................... 22-5
The Triggering Event or Statement ............................................................................................. 22-5
Trigger Restriction .......................................................................................................................... 22-6
Trigger Action ................................................................................................................................. 22-6
Types of Triggers ................................................................................................................................... 22-7
Row Triggers and Statement Triggers ........................................................................................ 22-7
Row Triggers ........................................................................................................................... 22-7
Statement Triggers .................................................................................................................. 22-7
BEFORE and AFTER Triggers ...................................................................................................... 22-7
BEFORE Triggers .................................................................................................................... 22-8
AFTER Triggers ....................................................................................................................... 22-8
Trigger Type Combinations .................................................................................................. 22-8
INSTEAD OF Triggers ................................................................................................................... 22-9
Modify Views .......................................................................................................................... 22-9
Views That Are Not Modifiable ............................................................................................ 22-9
INSTEAD OF Triggers on Nested Tables .......................................................................... 22-10
Triggers on System Events and User Events ............................................................................ 22-10
Event Publication .................................................................................................................. 22-11
Event Attributes .................................................................................................................... 22-11
剩余541页未读,继续阅读
2008-05-28 上传
2014-09-23 上传
2011-01-18 上传
点击了解资源详情
2019-01-14 上传
2013-05-30 上传
2009-11-22 上传
2015-12-26 上传
huawuxiaosanlang
- 粉丝: 0
- 资源: 5
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- C语言数组操作:高度检查器编程实践
- 基于Swift开发的嘉定单车LBS iOS应用项目解析
- 钗头凤声乐表演的二度创作分析报告
- 分布式数据库特训营全套教程资料
- JavaScript开发者Robert Bindar的博客平台
- MATLAB投影寻踪代码教程及文件解压缩指南
- HTML5拖放实现的RPSLS游戏教程
- HT://Dig引擎接口,Ampoliros开源模块应用
- 全面探测服务器性能与PHP环境的iprober PHP探针v0.024
- 新版提醒应用v2:基于MongoDB的数据存储
- 《我的世界》东方大陆1.12.2材质包深度体验
- Hypercore Promisifier: JavaScript中的回调转换为Promise包装器
- 探索开源项目Artifice:Slyme脚本与技巧游戏
- Matlab机器人学习代码解析与笔记分享
- 查尔默斯大学计算物理作业HP2解析
- GitHub问题管理新工具:GIRA-crx插件介绍
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功