Flylib.com
Advanced DBA Certification Guide and Reference for DB2 Universal Database v8 for Linux, UNIX, and Windows
Advanced DBA Certification Guide and Reference for DB2 Universal Database v8 for Linux, UNIX, and Windows
ISBN: 0130463884
EAN: 2147483647
Year: 2003
Pages: 121
Authors:
Dwaine Snow
,
Thomas Xuan Phan
BUY ON AMAZON
Main Page
Table of content
Copyright
IBM Press SeriesInformation Management
About Prentice Hall Professional Technical Reference
Foreword
Preface
DB2: Any Workload, Any Data, All the Time
Conventions Used Throughout the Book
Acknowledgments
Trademarks
Chapter 1. Data Storage
Some Terminology Used in DB2
The Default Database
Table Spaces
Additional Table Space OptionsParameters
Summary
Chapter 2. Data Manipulation
The Buffer Pools
Parallelism
Types of Database Objects
Summary
Chapter 3. Database Availability
Ability to Manage Logs
Developing a Backup and Recovery Strategy
Backup Overview
Restore Overview
Rollforward Overview
High Availability Clustering
Availability Enhancements
Ability to Use db2dart
Summary
Chapter 4. Database Security
Selecting User Names and Group Names for DB2 Installation
Authentication Methods
Privileges, Authorities, and Authorizations
Firewall Support
What Is LDAP?
Security Implementation and Usage
How DB2 for Windows NT2000 Works with Windows NT2000 Security
User Authentication with DB2 for Windows NT
Summary
Chapter 5. Multi-Dimensional Clustering
MDC Terminology
Design Guidelines for MDC Tables
MDC Performance Guidelines
Space Usage with MDC Tables
MDC Indexes
Summary
Chapter 6. The DB2 Optimizer
Joining in DB2 UDB
Materialized Query Tables
Understanding DB2 Query Access Plans
Summary
Chapter 7. Federated Database Access
What Is a Federated System?
Overview of the Tasks to Set Up a Federated System
How Do You Interact with a Federated System?
Setting Up the Federated Server and Database
Working with the Federated Data
Sample Configuration Federated between DB2 on OS390 and DB2 on Sun Solaris
Configuration of a Federated Database System
Nickname Characteristics Affecting Global Optimization
Summary
Chapter 8. Performance Tuning
Performance Fundamentals
Configuration Parameter Tuning
Database Configuration Parameter Tuning and Monitoring
Registry Variable Tuning
Other Important Configuration Parameters
Summary
Chapter 9. Database Communications
Database Partition Configuration File (db2nodes.cfg)
Default Port Range
Non-Partitioned Database Environment
Installing the DB2 Server
Partitioned Database Environment
Post-Installation Setup
Installing and Configuring DB2 Client to DB2 Server Communications
Installing and Configuring DB2 Client to DB2 Host Communications
Installing DB2 Connect Personal Edition
Configuring DB2 Clients in a Two-Tier Environment
Configuring DB2 Clients in a Three-Tier Environment
FCM Communication Buffers Considerations
Summary
Chapter 10. Performance Tuning Examples
Example 1: Create Index Taking Too Long
Example 2: Unable to Get Desired Throughput
Example 3: Query1 Taking Too Long to Run
Example 4: Query2 Taking Too Long to Run
Example 5: Periodic Noticeable Slowdown of Database Response Time
Appendix A. Useful DB2 Commands
System Commands
CLP Commands
ONLINE Utility
Appendix B. parseSQL.pl
Appendix C. exfmtDIF.pl
Appendix D. Comparing Index Advisor Recommended Indexes with Existing Indexes
Appendix E. Configuration Parameters That Can Be Changed Online
Appendix F. Explain Tools
EXPLAIN Tables
EXPLAIN Commands
EXPLAIN Output
Appendix G. Starting and Stopping a DB2 Instance
Appendix H. LDAP Integration in DB2 UDB Using Microsoft Active Directory
Implementation Guidelines
Appendix I. Tuning DB2 UDB in the IBM LDAP Environment
Appendix J. DB2 Support Information
DB2 Support Resources
Opening a PMR
Collecting Diagnostic Information
Sending Diagnostic Information
Appendix K. DB2 Connect Implementation
Installing DB2 Connect Enterprise Edition
Appendix L. Sample Questions
Appendix M. Answers to Sample Questions
About the CD-ROM
License Agreement
Technical Support
Article
Advanced DBA Certification Guide and Reference for DB2 Universal Database v8 for Linux, UNIX, and Windows
ISBN: 0130463884
EAN: 2147483647
Year: 2003
Pages: 121
Authors:
Dwaine Snow
,
Thomas Xuan Phan
BUY ON AMAZON
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 1.1 Install OpenSSH to Replace the Remote Access Protocols with Encrypted Versions
Step 4.4 How to Generate a Key Using PuTTY
Step 4.5 How to use OpenSSH Passphrase Agents
Step 5.1 General Troubleshooting
Step 5.2 Troubleshooting Common OpenSSH Errors/Problems
Oracle Developer Forms Techniques
Base Tables
Handling Errors
Polymorphism
When to Use WHEN-VALIDATE-RECORD and When to Use WHEN-VALIDATE-ITEM
A New Look at Relations Using REFS
Excel Scientific and Engineering Cookbook (Cookbooks (OReilly))
Adding Comments and Equation Notes
Importing Data from Delimited Text Files
Retrieving Data from XML Files
Introduction
Considering Cash Flow Alternatives
Cisco IOS Cookbook (Cookbooks (OReilly))
Loading a New IOS Image
Creating Exception Dump Files
Redistributing Static Routes into RIP
Using eBGP Multihop
Using an Internal T1 CSU/DSU
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 33. Watch Network Traffic
Hack 48. Generate a Tunnel Configuration Automatically
Hack 74. Capture Wireless Users with NoCatAuth
Hack 96. Establish Line of Sight
Hack 98. Align Antennas at Long Distances
Programming .Net Windows Applications
Text and Fonts
Fonts
ProgressBar
TreeView
Toolbars
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies