: Network Disk Download
Introduction DB2 database is the core product of IBM's relational database, and it is widely used both domestically and globally. For DB2 beginners, the "Step DB2:DBA system Management, operation and application case" gradually introduced the many concepts and knowledge DB2 involved to everyone. Client connectivity, instances, databases, tablespace and buffer pools, data movement, backup recovery, SQL basics, DB2 Basic monitoring methods, settings to run the database, DBA routine maintenance, and database tools are the focus of this book. While introducing these database objects and concepts, the author explores the routine maintenance of DB2 database as far as possible from the perspective of DBA daily work. The book also introduces the application design of database objects, such as table, index, sequence, trigger and so on. This book is suitable for beginners of DB2, DB2 developers, readers who are ready to take DB2 certification exams, and DB2 database managers to learn and read. Author profile New, the domestic top data architecture and information governance experts, as a visiting professor, Beijing Jiaotong University adjunct professors, China DB2 User Association (CDUG) Chairman, Asia Financial Cooperation Alliance Information Technology Committee director. In 2008, he was employed by the CCB Chief technical consultant for 2.17 million annual salary, and was invited to join the Ministry of Science and Technology of China Minsheng Bank in 2009.
Dr. New has more than 20 international manufacturers certification (including all DB2 V5~V9 certification), won the highest honors in the Domestic database field "2006 China's first Outstanding Database Engineer Award", "the first IBM Outstanding Software Expert Award", "2006 IT168 Technology Excellence Award" and other awards. Inner page illustration
Catalogue 1th Chapter DB2 Introduction and Installation
1.1 DB2 Database Overview
1.1.1 DB2 Development History
1.1.2 DB2 version and Platform support
1.1.3 DB2 product components and features
Installation and configuration of 1.2 DB2 database
1.2.1 DB2 installation on Windows
1.2.2 DB2 installation on the Linux/unix
Architecture of the 1.3 DB2 database
2nd. Creating instances and Managing servers
2.1 Example
The concept of 2.1.1 instances
2.1.2 Creating an instance
2.1.3 Instance Directory
Related commands for 2.1.4 instances
2.1.5 Db2instance Variable Introduction
2.1.6 Deleting instances
2.1.7 Configuration Instance
2.2 Management Server
2.2.1 The Management Server concept
2.2.2 Creating a Management Server
2.2.3 commands related to the Management Server
2.2.4 Removing the Management Server
2.2.5 Configuring the Management Server
3rd. Creating a database and table space
3.1 Creating a Database
3.1.1 DB2 Database Storage model
3.1.2 Table Space Management types
3.1.3 Creating a Database
3.1.4 Database Directory
3.2 Design Table Spaces
3.2.1 Creating table Spaces
3.2.2 Maintaining Table space
3.2.3 Table Space Design Considerations
3.2.4 Prefechsize Size Selection
3.2.5 File System (Cio/dio) and bare devices
3.2.6 setting overhead and transferrate
3.2.7 Optimizing the performance of table spaces on RAID devices
3.2.8 set up system temporary table space rationally
3.3 Buffer Pool
How to use 3.3.1 buffer pool
3.3.2 The relationship between the buffer pool and the tablespace
3.3.3 Maintaining the buffer pool
Design principle of 3.3.4 buffer pool
3.4 DB2 V10 new Features--multi-temperature memory
3.4.1 Memory Group
3.4.2 table space and memory group
3.5 Summary of this chapter
4th. Accessing the database
4.1 Visit DB2
4.2 DB2 Graphical operating environment
4.3 DB2 CLP Processing program
4.3.1 DB2 CLP Introduction
4.3.2 DB2 CLP Design
4.3.3 DB2 CLP Command options
4.3.4 setting up db2_clpprompt to customize DB2 CLP
4.4 Configuring TCP/IP communication for the DB2 server
4.4.1 Updating services files on the server
4.4.2 Updating the Database Manager configuration file on the server
4.4.3 setting up communication protocols for DB2 servers
4.4.4 Viewing the status of a server communication port
4.4.5 Configuring DB server communication using Control center
4.5 Configuring client-to-server communication
4.5.1 client-to-server communication overview
4.5.2 Configuring client communication using Control center
4.5.3 using a CA to configure client-to-server communication
4.5.4 in-depth understanding of DB2 node directory, database directory
4.5.5 use CLP to configure client-to-server communication cases
4.6 Various ways to connect databases in real production
4.7 Case: Database Connectivity problem Diagnosis
4.8 Summary of this chapter
5th. Creating a Database object
5.1 Mode
The concept of the 5.1.1 model
5. Mode
5.1.3 setting and getting the current mode
The difference between 5.1.4 mode and user
5.2 Table Design
5.2.1 Choosing the right data type
5.2.2 Selecting the appropriate constraint type
5.2.3 using NOT NULL with default
5.2.4 Generating columns and application cases
5.2.5 automatic numbering and identification column application cases
5.2.6 using the not logged initially feature
5.2.7 using the Append on feature
5.2.8 data, indexes, and large objects separately
5.2.9 Setting Pctfree
Locksize of the 5.2.10 table
Volatile characteristics of 5.2.11 tables
5.2.12 Table Maintenance Related commands
5.2.13 table Design Advanced options
5.3 Index Design
Advantages of the 5.3.1 index
5.3.2 Index Type
5.3.3 Index Structure
5.3.4 Understanding the access mechanism of an index
5.3.5 Creating a clustered index
5.3.6 Creating a bidirectional index
5.3.7 Full Index Access
(Index access only)
5.3.8 Creating an index example
5.3.9 Index Summary
5.4 Using sequences to improve performance
5.4.1 Application Performance and sequencing
Design principles of 5.4.2 sequences
5.4.3 Maintenance Sequence
5.4.4 comparing sequences with identity columns
5.5 views
Types of 5.5.1 views
5.5.2 Creating a with CHECK option view
5.5.3 Maintenance View
5.6 Table Expressions
5.6.1 Nested table expressions
5.6.2 Common table expressions
5.7 Trigger Design
Types of 5.7.1 Triggers
5.7.2 Trigger Creation Example
Summary of design of 5.7.3 Trigger
5.8 Routines
5.9 Summary of this chapter
Chapter 6th Data Movement
6.1 Data Movement format
6.1.1 bound ASCII file format
6.1.2 Non-bound ASCII file format
6.1.3 PC/IXF file format
6.1.4 Worksheet file Format
6.1.5 Cursors
6.2 EXPORT
6.2.1 Export Overview
6.2.2 Exporting data
6.2.3 Export Data sample
6.3 IMPORT
6.3.1 Import Overview
6.3.2 Importing Data
6.3.3 Import Example
6.4 LOAD
6.4.1 Load Overview
6.4.2 Loading Data
6.4.3 Loading Example
6.4.4 Online Load
6.4.5 Monitoring the Load Progress
6.4.6 The table space state during and after load
6.4.7 moving data using the cursor file type
6.4.8 Increase Load Performance
6.4.9 Load Failed Recovery
6.4.10 Load and Import comparison
6.5 Performance issues with data movement
6.6 Db2move and Db2look
6.6.1 Database Move Tool
--db2move
6.6.2 DB2 DDL Extraction Tool
--db2look
6.6.3 uses Db2move and
Db2look cases of mobile data
6.6.4 with copy operation.
Db2move Utility Program
6.7 Summary of this chapter
7th. Database Backup and Recovery
7.1 Concept of recovery
7.1.1 Crash Recovery (Crash Recovery)
7.1.2 Disaster Recovery
(Disaster Recovery)
7.1.3 version Recovery (versions restore)
7.1.4 Roll-forward recovery
(Rollforward Recovery)
7.2 DB2 Log
7.2.1 Use of log files
7.2.2 Log Type
7.2.3 log-related configuration parameters
7.2.4 Database Log Summary
7.2.5 recommended settings for DB2 logs
7.3 Database and table space backups
7.3.1 Database Backup
7.3.2 Table Space Backup
7.3.3 Incremental Backup
7.3.4 Check Backup Integrity--
Db2ckbkp
7.4 Database and table space recovery
7.4.1 Database Recovery
7.4.2 Table Space Recovery
7.4.3 Incremental Recovery
7.4.4 Incremental Recovery Check--
Db2ckrst
7.4.5 REDIRECT Recovery
7.4.6 Recovering a deleted table
7.5 Database and table space roll forward
7.5.1 Database Roll Forward
7.5.2 Table Space Roll forward
7.6 Recover Utility Program
7.7 Restore History files
7.8 Database Rebuild
The concept of 7.8.1 database rebuilding
7.8.2 using tablespace backups to rebuild recoverable
Database
7.8.3 Use only partial table space backup rebuild
Recoverable database
7.8.4 using a log file that contains the online
Backup Rebuild Database
7.8.5 rebuilding with an incremental backup image
Recoverable database
7.8.6 using redirection option to rebuild recoverable
Database
7.8.7 rebuilding a non-recoverable database
Limitations of 7.8.8 Database rebuilds
7.9 Monitor backup, recovery, and recovery progress
7.10 Tables during backup, recovery, and recovery
Space state
7.11 Optimizing Backup, recovery, and recovery
Performance
7.12 Backup Recovery Best Practices
The 8th chapter of SQL Basics
8.1 Getting started with simple queries
8.1.1 Select and from
8.1.2 WHERE
8.1.3 ORDER by
8.1.4 GROUP by and having
8.2 Search Criteria
8.2.1 predicate types
8.2.2 BASIC Predicate
8.2.3 quantization predicate
8.2.4 between, exists and in
Predicate
8.2.5 LIKE predicate
8.2.6 NULL predicate
8.3 Data Manipulation language
8.3.1 INSERT
8.3.2 DELETE
8.3.3 UPDATE
8.3.4 MERGE
8.4 Multi-Table query
8.4.1 Join Connection
8.4.2 Set operation
8.5 High-Performance SQL statements
8.5.1 Guidelines for Efficient SQL
8.5.2 Guidelines for improving insert performance
8.5.3 Criteria for complex queries
Considerations for 8.5.4 Indexes
8.6 Summary of this chapter
9th Chapter DB2 Basic Monitoring method
9.1 Overview of monitoring tools
9.2 Snapshot Monitor
9.3 Monitoring with Table functions
9.4 Performance management views and cases
9.5 Snapshot Monitor case
9.5.1 monitoring case for dynamic SQL
Statement
9.5.2 monitoring case 2--through table functions
Monitoring
9.5.3 Writing Snapshot monitoring scripts
9.5.4 DB2PD and Monitoring cases
9.5.5 Event monitor and monitoring case
9.5.6 DB2MTRK and Monitoring cases
9.6 Summary of this chapter
10th database to be considered in the running database
Set up
10.1 Overview of database configuration parameters
10.2 Communication settings
10.3 Memory-related settings
10.4 Lock-related settings
10.5 Log-related configuration
10.6 Automatic Maintenance-related configuration
10.7 Monitoring-related configuration
10.8 Security-related Settings
10.9 for reference DB2 pre-line Setup
10.10 Summary of this chapter
11th DBA daily Operation Maintenance
11.1 Update of statistical information
11.1.1 the importance of statistical information
11.1.2 reduce runstats to
Strategies for the impact of system performance
11.1.3 DB2 Automatic Statistical information collection
11.2 Statistical Information Update case study
11.2.1 Runstats Update Example
11.2.2 Collecting distributed statistics
11.2.3 contains frequency and number of bits statistics
Runstats of information
11.2.4 that contains column group statistics
Runstats
11.2.5 contains like STATISTICS
The Runstats
11.2.6 contains the statistics configuration file
The Runstats
11.2.7 with sampled Runstats
11.2.8 with System page-level sampling
Runstats
11.2.9 other information available for collection of statistics
Choice of method
11.2.10 Runstats Summary
11.3 Defragmentation
11.3.1 table Reorganization (REORG)
11.3.2 Index Reorganization
11.3.3 Cost of reorganizing tables and indexes
11.3.4 reasonable design to reduce debris
Generated
11.3.5 Enable automatic indexing of tables and indexes
Recombinant
11.4 Defragmentation Case Study
11.4.1 Execution table, index check whether
Need to do reorg
11.4.2 table and Index defragmentation
11.5 Cases: Generating fragmentation checks, statistics
Information updates, defragmentation, and
rebind script
11.6 rebind Packages
11.7 DB2 Health Check
11.7.1 See if there are any zombie instances
Process
11.7.2 Check that the database is consistent
11.7.3 find the diagnostic log to determine whether
Have an exception
11.7.4 Check Database backup integrity,
Log archive is normal
11.7.5 maintaining the instance directory and database
Permissions for the Directory
11.7.6 Viewing disk space
11.8 Database Monitoring
11.8.1 Monitoring Tools
11.8.2 calculating the size of a database
11.8.3 physical size of the monitoring table
11.8.4 monitoring the size of a single index
The 11.8.5 Monitoring Database utility
Progress
11.8.6 Monitoring database Crash recovery
Progress
11.8.7 Monitor Catalog Cache Hit rate
11.8.8 Monitoring Package Cache
Shooting
11.8.9 Monitoring sorting overflow rate
11.8.10 Monitoring the table being reorg
11.8.11 monitoring buffer pool hit rate
11.8.12 monitoring high-cost applications
11.8.13 monitoring the time that is being executed
The longest SQL statement
11.8.14 Monitoring SQL Preparation and precompilation
The longest-time SQL statement
11.8.15 monitor the most execution times
SQL statements
11.8.16 monitor the longest execution time
SQL statements
11.8.17 monitoring the most ranked number of
SQL statements
11.8.18 monitoring of SQL causing lock waits
Statement
11.8.19 to find newly created objects
11.8.20 Finding Invalid objects
11.8.21 Check table space status
11.8.22 Check table status
11.8.23 find a table that needs to be reorg
and index
11.8.24 to find the Runstats
Tables and Indexes
11.8.25 Regular Cleanup Db2diag.log
File
11.8.26 looking for abnormally growing tablespaces
and table
11.8.27 Database Maintenance Summary
The 12th chapter of the database common tools
12.1 Interpreting Tools
12.1.1 Visual Explain
(Visual Interpretation)
12.1.2 DB2EXPLN
12.1.3 db2exfmt
12.1.4 Comparison of various explanatory tools
12.1.5 how to obtain from the explanatory information
Recommendations for value
12.2 Index design tool (Db2advis)
12.2.1 DB2 Design Advisor
(Db2advis)
12.2.2 DB2 Design Advisor
(Db2advis) Case explanation
12.3 Benchmark Test Tool Db2batch
12.3.1 Db2batch
12.3.2 Db2batch Benchmark Program test
Analysis examples
12.4 Data Consistency Check tool
12.4.1 Db2dart and Cases
12.4.2 Inspect and cases
12.5 Db2look
12.5.1 Db2look Overview
12.5.2 using Db2look to build simulations
Test database
12.6 Other Tools
12.6.1 DB2BFD
12.6.2 Db2_kill and Db2nkill
12.6.3 Db2tbst
12.7 Summary of this chapter
13th Chapter DB2 V10.1 new Features
13.1 Fen Dafa--purescale
13.1.1 Basic Introduction
13.1.2 Installation and Management
13.1.3 Performance Monitoring
13.2 Nine yin Bones claw--continue Data
Ingest
13.2.1 Continue Data Ingest
Introduced
13.2.2 CDI actual Operation case
13.3 Bone-shrinking DAFA--Adaptive compression
13.3.1 Basic Introduction
13.3.2 Adaptive compression mode of operation
13.3.3 enabling or disabling adaptive compression
13.3.4 Evaluation Table Compression rate
13.3.5 Classic row Compression and adaptive
Compression comparison test
13.3.6 Archive Log Compression
13.4 A great diversion--disaster preparedness function
Enhance
13.4.1 Basic Introduction
13.4.2 Super Async
13.4.3 Spool Log
13.4.4 Redo Delay
13.4.5 Multi-Standby machine
13.4.6 monitoring indicators
13.5 Lingbo Micro-step-performance enhancement
13.5.1 improves a common set of SQL
Query performance for statements
13.5.2 runstats Support Index
Sampling
13.5.3 Optimization profile can support
Registry variables and non-precision
The
13.5.4 Statistics view improves statistical information
And the statistics for the query optimizer
Collect
Improvement of parallelism in 13.5.5 partition
13.5.6 through more efficient data and
Index prefetching to improve queries
Performance
13.5.7 improves the combination of
Performance of the query executed by the table
13.5.8 improves the star-based model
Performance of Queries
13.6 Eyes--monitoring enhancements
13.6.1 events for tracking configuration changes
Monitor
13.6.2 Usage List Object record impact
Statement for table or index
13.6.3 using the new statement
Threshold domain created for a specific statement
Threshold value
13.6.4 new letter for access to monitoring information
Number and changed functions
13.6.5 Work Unit Event Monitor capture
The executable that is now included in the information
Identity List
13.6.6 using ALTER event monitoring
The event monitor capture is modified by the debugger statement
The information scope
13.6.7 Other Monitoring enhancements
13.7 Admiralty Cover--Safety enhancements
13.7.1 RCAC Features
13.7.2 RCAC Rules
13.7.3 RCAC Combat
13.8 Summary of this chapter
: Network Disk Download
Progressive DB2.DBA System Management, operation and application case PDF