Flylib.com
List of Figures
Previous page
Table of content
Next page
< Day Day Up >
Chapter 2: RDBMS Features for Availability
Figure 2-1: EM Database Control home page
Figure 2-2: Top Sessions from the Performance page
Figure 2-3: The Administration page
Figure 2-4: The Maintenance page
Chapter 3: Tuning Your Database for Availability
Figure 3-1: Changing default snapshot retention time
Figure 3-2: ADDM report as viewed in EM
Figure 3-3: Memory Advisor
Figure 3-4: Segment Advisor
Figure 3-5: Choosing ASM on the DBCA Storage Options screen
Figure 3-6: Creating the ASM disk group
Figure 3-7: ASM disk groups in Enterprise Manager
Figure 3-8: Viewing ASM files from within Enterprise Manager
Chapter 4: RAC Setup and Configuration
Figure 4-1: Generate Config Window in ocfstool
Figure 4-2: OCFS Format window
Figure 4-3: Mounting the drive via ocfstool
Figure 4-4: Defining cluster name, and public and private node names
Figure 4-5: Private Interconnect Enforcement screen
Figure 4-6: OCR location
Figure 4-7: Cluster Installation screen-select nodes for install
Figure 4-8: Specification of virtual IP addresses
Figure 4-9: Database Storage Options screen in DBCA
Figure 4-10: Database Creation Complete
Chapter 5: Database Administration in a RAC Environment
Figure 5-1: Adding a node at the cluster layer
Figure 5-2: Adding a node at the RDBMS layer
Figure 5-3: Adding virtual IPs for new nodes
Figure 5-4: Naming and node assignment for the new instance
Figure 5-5: Deleting an instance
Figure 5-6: Management Agent install
Figure 5-7: Enterprise Manager Grid Control Home screen
Figure 5-8: Grid Control targets
Chapter 6: Utility Computing: Applications as Services
Figure 6-1: Services Management screen in DBCA
Figure 6-2: Adding database services in DBCA
Figure 6-3: Cluster-managed services in Enterprise Manager
Figure 6-4: Cluster Managed Database Services screen
Figure 6-5: Mapping a service to a consumer group
Figure 6-6: Target availability in EM Grid Control
Chapter 7: Oracle Data Guard: Surviving the Disaster
Figure 7-1: Add a standby
Figure 7-2: Standby Wizard: standby type
Figure 7-3: Standby Wizard: backup type
Figure 7-4: Standby Wizard: backup configuration
Figure 7-5: Standby Wizard: standby Oracle home
Figure 7-6: Standby Wizard: file locations
Figure 7-7: Standby Wizard: standby configuration
Figure 7-8: Standby Wizard: confirmation
Figure 7-9: Standby Wizard: job creation
Figure 7-10: Data Guard Overview page: creation in progress
Figure 7-11: Data Guard Overview page
Figure 7-12: Standby Database Properties page
Figure 7-13: Standby Role Properties page
Figure 7-14: Performance overview
Figure 7-15: Configuration verification
Chapter 8: Backup and Recovery for High-Availability Environments
Figure 8-1: Network topography of an RMAN operation
Figure 8-2: RMAN backup architecture
Figure 8-3: Choosing a backup strategy
Figure 8-4: Backup strategy
Figure 8-5: Scheduling the backup job
Figure 8-6: Incremental backups for a week
Figure 8-7: Anatomy of a duplicate for standby operation
Figure 8-8: The doomed archivelog configuration
Figure 8-9: Sync and split fail-safes
Chapter 9: Oracle Flashback: Surviving User-Induced Trauma
Figure 9-1: Navigating to the table and viewing contents
Figure 9-2: Slot-headed screws
Figure 9-3: All versions of the row
Figure 9-4: Flashback Versions Query SQL
Figure 9-5: Transaction information
Figure 9-6: The row history for the DELETE operation
Figure 9-7: The Recycle Bin of user WS_APP
Figure 9-8: Impact analysis for flashback drop
Chapter 10: Oracle Streams for High Availability
Figure 10-1: Streams translates the redo stream into LCRs in a queue table
< Day Day Up >
Previous page
Table of content
Next page
Oracle Database 10g. High Availablity with RAC Flashback & Data Guard
ISBN: 71752080
EAN: N/A
Year: 2003
Pages: 134
BUY ON AMAZON
VBScript Programmers Reference
Error Handling and Debugging
Adding VBScript to Your VB Applications
Appendix B Variable Naming Convention
Appendix E VBScript Error Codes and the Err Object
Appendix L ActiveX Data Objects
The CISSP and CAP Prep Guide: Platinum Edition
Cryptography
Initiation of the System Authorization Process
Appendix B Glossary of Terms and Acronyms
Appendix D The Information System Security Engineering Professional (ISSEP) Certification
Appendix E The Information System Security Management Professional (ISSMP) Certification
An Introduction to Design Patterns in C++ with Qt 4
Constructors, Destructors, and Copy Assignment Operators
Tree Models
Pointer Arithmetic
Valid Pointer Operations
Functions with Variable-Length Argument Lists
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Overview of Captology
The Functional Triad Computers in Persuasive Roles
Credibility and the World Wide Web
The Ethics of Persuasive Technology
Captology Looking Forward
Understanding Digital Signal Processing (2nd Edition)
THE DFT OF RECTANGULAR FUNCTIONS
HILBERT TRANSFORM DEFINITION
Chapter Ten. Sample Rate Conversion
AN EFFICIENT ARCTANGENT APPROXIMATION
Section G.4. MULTISECTION COMPLEX FSF FREQUENCY RESPONSE
Digital Character Animation 3 (No. 3)
Chapter Six. Walking and Locomotion
Beyond Walking
Chapter Seven. Facial and Dialogue Animation
Conclusion
Chapter Ten. Directing and Filmmaking
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies