Sumário Itens Encontrados: 145Introduction 1System Planning 1Resource and Capacity Planning 2Resource Specification for Oracle 2Optimal Flexible Architecture (OFA) 7Minimum OFA Configuration 8Oracle Structures and How They Affect Installation 10Executables 11Data Files 11Redo Logs 12Control Files 12Exports 13Archive Logs 13LOB Storage 14BFILE Storage 14Disk Striping, Shadowing, RAID, and Other Topics 14Disk Striping 15Disk Shadowing or Mirroring 16RAIDâRedundant Arrays of Inexpensive Disks 17New Technologies 18Optical Disk Systems 18Tape Systems 19RAM Drives (Random Access Memory) 19Backup & recovery 20Backups 21Cold Backups 21Hot Backups 23Example Documentation Procedure for NT Online Backup andRecovery Scripts 48Imports/Exports 51Limitations on export/import: 51Exports 51IMPORT 53Archive Logs 54Backup Methodologies 56NT or UNIX System Backup 56Import/Export 57Archive Logging 57Recovery Types 57Oracle7 Enterprise Backup Utility 59Oracle8 RECOVERY MANAGER FACILITY 63Installing the RMAN Catalog 66Incomplete restore scenario 69DB_VERIFY UTILITY 71The following example shows how to get on-line help: 72The DBMS_REPAIR Utility 73DBMS_REPAIR Enumeration Types 74DBMS_REPAIR Exceptions 74DBMS_REPAIR Procedures 75ADMIN_TABLES 76CHECK_OBJECT 81DUMP_ORPHAN_KEYS 84FIX_CORRUPT_BLOCKS 85REBUILD_FREELISTS 86SKIP_CORRUPT_BLOCKS 88Oracle RDBMS Architecture 89Background Processes 90Datafiles 94Datafile Sizing 96Rollback Segments 102Redo log files 104Control files 105Initialization File 105The Undocumented Initialization Parameters (â_â) 126The Initialization File Event Settings 145System Global Area 157SGA 157Modifying the INITORA 158Allocating And Caching Memory 159Use of the Default Pool 159Use of The KEEP Pool 160Use of the RECYCLE Pool 160Tuning the Three Pools 161Shared Pool 162Putting it All In Perspective 180What to Pin 185The Shared Pool and MTS 190Large Pool Sizing 191A Matter Of Hashing 194Disk IO and the Shared Pool 198Monitoring Library and Data Dictionary Caches 201In Summary 204Managing the Database 209Find USER locking others/Kill problem USER 209Methods of Murder 213Killing From the Oracle Side 213Killing From the Operating System Side 215Creating and starting the database 215Database Creation 216Re-creation of a Database 219Database Startup and Shutdown 229Startup 230Shutdown 232Tuning Responsibilities 234Step 1: Tune the Business Rules 234Step 2: Tune the Data Design 234Step 3: Tune the Application Design 235Step 4: Tune the Logical Structure of the Database 235Step 5: Tune Database Operations 235Step 6: Tune the Access Paths 236Step 7: Tune Memory Allocation 236Step 8: Tune I/O and Physical Structure 237Step 9: Tune Resource Contention 238Step 10: Tune the Underlying Platform(s) 238Tuning Summary 238Layout & Fragmentation 239Tablespace Segments & Free Space 241Tables & Indexes/Partitioning 242The V$ views 243How are they used? 244The Optimizers & the Analyze Command 248RULE Based Optimizer 249COST Based Optimizer 250The Parallel Query Option 253Parallel query settings 253Problems In Parallel Query Usage 258Security 258Users 258Altering Users 264Dropping Users 265Grants 266System Privileges 267Object Privileges 276Column Privileges 281View Grants 283Other Grants 283Revoking Grants 283Use Of Roles 285Creating Roles 286Grants To Roles 287Setting Roles 289Special Roles 290OSOPER And OSDBA 292CONNECT, RESOURCE, And DBA Roles 293Export/Import Roles 294Using PROFILES 295Profiles and Resource Limits 297Altering Profiles 300Profiles and Passwords 301Managing CPU Utilization for in Oracle8i 303Creating a Resource Plan 304Restricting Access by Rows in Oracle8i 329Policy Usage 335DBMS_RLS Package 337Summary 340