Books
in black and white
Main menu
Share a book About us Home
Books
Biology Business Chemistry Computers Culture Economics Fiction Games Guide History Management Mathematical Medicine Mental Fitnes Physics Psychology Scince Sport Technics
Ads

Teradata RDBMS Database Administration - NCR

NCR Teradata RDBMS Database Administration - NCR , 2004. - 616 p.
Download (direct link): teradatadatabaseadmin2004.pdf
Previous << 1 .. 5 6 7 8 9 10 < 11 > 12 13 14 15 16 17 .. 218 >> Next


Using Nested Views...................................................................................................6-41

Example of Nested View Privilege Checking........................................................6-42

Limiting Data Access with Macros.............................................................................6-43

Limiting Data Access with Stored Procedures..........................................................6-44

Logging Access Attempts.............................................................................................6-45

Disabling Access Logging.........................................................................................6-46

Chapter 7: Protecting Data

Automatic Data Protection Mechanisms.....................................................................7-2

Transient Journal (TJ)...................................................................................................7-2

Fallback Protection.......................................................................................................7-3

Clustering AMPs..........................................................................................................7-3

Down AMP Recovery Journal....................................................................................7-4

Disk Arrays and RAID Technology..............................................................................7-5

RAID 1............................................................................................................................7-5

xxviii Teradata RDBMS Database Administration Contents

RAID 5............................................................................................................................7-5

Data Recovery with RAID5.........................................................................................7-6

Calculating Parity.........................................................................................................7-6

Using Referential Integrity.............................................................................................7-7

Standard Referential Integrity....................................................................................7-8

Batch Referential Integrity Constraint.......................................................................7-9

Referential Constraint Using WITH NO CHECK OPTION...................................7-9

Table Header Referential Indexes (RIs)...................................................................7-11

Tracking RI Definitions..............................................................................................7-14

Transaction Data Protection.........................................................................................7-15

Transactions and Data Integrity...............................................................................7-15

ANSI Mode..................................................................................................................7-15

Teradata Mode............................................................................................................7-16

2-Phase Commit (2PC) Protocol..................................................................................7-17

Participant and Coordinator.....................................................................................7-17

2PC Protocol Requirements......................................................................................7-17

2PC Protocol Components and Interfaces..............................................................7-18

2PC Processing - Phase 1...........................................................................................7-20

2PC Processing - Phase 2...........................................................................................7-21

In-Doubt Transactions...............................................................................................7-22

In-Doubt Resolution...................................................................................................7-22

2PC Error Handling...................................................................................................7-22

Hardware Data Protection...........................................................................................7-23

RAID Array Configuration.......................................................................................7-23

Disk Array Architecture............................................................................................7-23

Comparison of RAID Levels.....................................................................................7-26

Cliques (UNIX)............................................................................................................7-28

Software Data Protection..............................................................................................7-29
Previous << 1 .. 5 6 7 8 9 10 < 11 > 12 13 14 15 16 17 .. 218 >> Next