Tuning with oracle
-
Users and Security Security domain The database administrator defines the names of the users who are allowed to access a database. A security domain defines the settings that apply to the user. Authentication mechanism A user who requires access to the database can be authenticated by one of the following: Data dictionary Operating system Network The means of authentication is specified at the time the user is defined in the database and can be altered later. This lesson covers authentication by database and by operating system only.
20p trinh02 28-01-2013 81 3 Download
-
After completing this lesson, you should be able to do the following: Identify issues associated with managing users in an Oracle Shared Server environment Configure the Oracle Shared Server environment to optimize performance Diagnose and resolve performance issues with Oracle Shared Server processes
14p trinh02 28-01-2013 61 5 Download
-
Control File The control file is a small binary file necessary for the database to start and operate successfully. Each control file is associated with only one Oracle database. Before a database is opened, the control file is read to determine whether the database is in a valid state to use. A control file is updated continuously by the Oracle server during database use, so it must be available for writing whenever the database is open. The information in the control file can be modified only by the Oracle server; no database administrator or end user can edit the control file....
16p trinh02 28-01-2013 56 2 Download
-
After completing this lesson, you should be able to do the following: Define the roles associated with the database tuning process Describe the dependencies between tuning in different development phases Describe service level agreements Identify tuning goals Identify common tuning problems Employ tuning activities during developmentand production Balance performance and safety trade-offs
16p trinh02 28-01-2013 49 5 Download
-
Workshop Methodology Group-Oriented and Interactive Structure The workshop is structured to allow individuals to work in groups to perform database backup, restore, and recovery operations. Each group is encouraged to share its approach to resolving database failures with other groups in the class. Intensive Hands-On Diagnosis and Problem Resolution The intent is to provide you with as much hands-on experience as possible to diagnose and work through backup and recovery scenarios.
18p trinh02 28-01-2013 71 3 Download
-
Cross Checks of RMAN Backups and Copies Performing a cross check provides you with a way to ensure that data about backup sets and image copies in the RMAN repository is synchronized with corresponding data on disk or in the media management catalog. You can use the LIST command to obtain a report of the backups and copies that you have made and then use the CROSSCHECK command to check that these files still exist. If RMAN cannot find a file, it updates the repository records to EXPIRED. You can determine which files are marked EXPIRED by issuing a LIST EXPIRED command....
18p trinh02 28-01-2013 46 5 Download