Oracle® TimesTen In-Memory Database Operations Guide Release 11.2.1 Part Number E13065-08 |
|
|
View PDF |
An acronym referring to the four fundamental properties of a transaction: atomicity, consistency, isolation and durability.
A property of a transaction whereby either all or none of the operations of a transaction are applied to the database.
A set of files containing backup information for a given database, residing at a given backup path. See also "backup path", "full backup" and "incremental backup".
The time at which a backup begins. See also "backup path", "full backup" and "incremental backup".
Indexes are used to speed up queries on a table. Bitmap indexes are useful when searching and retrieving data from columns with low cardinality. That is, these columns can have only a few unique possible values.
A set of rows related through foreign keys. Each cache instance contains exactly one row from the root table of a cache group and zero or more rows from the other tables in the cache group.
An approach to application design and development in which application processing is divided between components running on an end user's machine, such as the client, and a network server. Generally, user interface elements are implemented in the client component, while the server controls database access.
The ability to have multiple transactions access and manipulate the database at the same time.
A character string that defines a connection parameter to be used when connecting to an ODBC data source. Connection attributes have the form name=value, where name is the name of the parameter and value is the parameter value. See also connection string.
A message sent by an application through an ODBC driver to an ODBC data source to request a connection to that data source.
A character string that defines the connection parameters to be used when connecting to an ODBC data source. A connection string is expressed as one or more connection attributes separated by semicolons.
A property of transactions whereby each transaction transforms the database from one consistent state to another.
A named collection of connection attributes that defines the connection parameters to be used when connecting to an ODBC data source. See also "data source name".
A logical name by which an end user or application refers to an ODBC data source definition. Sometimes incorrectly used to mean "data source definition". See also "data source definition", ODBC.INI
file.
A data source name defined on a TimesTen client machine that refers to a Server DSN on a server machine.
A system data source name (system DSN) defined on a server machine. Server Data Source Names become available to all TimesTen clients on a network when the TimesTen Server is running.
A data source name that is accessible by all users of a particular machine.
A data source name that is accessible only by the user who created the data source name.
See "ODBC driver".
See "data source name".
A property of transactions whereby the effects of a committed transaction survive system failures.
A name, value pair maintained by the operating system that can be used to pass configuration parameters to an application.
An activity or occurrence that can be tracked by a logging mechanism in an application, service or operating system. See also "logging", "protocol message logging" and "event viewer".
On Windows, a utility program used to view the contents of the operating system event log.
A database backup procedure in which a complete copy of a database is created. Typically, the first backup of a database must be a full backup. See also "incremental backup".
Indexes are used to speed up queries on a table. Hash indexes are useful for finding rows with an exact match on one or more columns.
A computer. Typically used to refer to a computer on a network that provides services to other computers on the network.
A character string name that uniquely identifies a particular computer on a network. Examples: athena
, thames.mycompany.com
. See also "host".
A column whose values are physically stored together with the other column values of a row.
A database backup procedure in which an existing backup is augmented with all the transaction log records created since its last full or incremental backup. See also "backup instance" and "full backup".
A numeric address that uniquely identifies a computer on a network and consists of four numbers separated by dots. Abbreviation for Internet Protocol address. Example: 123.61.129.91
.
A property of transactions whereby each transaction runs as if it were the only transaction in the system.
A thread that runs on the TimesTen Server that receives and processes connection requests from TimesTen Clients.
The process by which an application, service or operating system records specific events that occur during processing.
A host name, or IP address that uniquely identifies a particular computer on a network. Examples: 123.61.129.91
, athena
, thams.mycompany.com
.
A utility program used on Windows to create, configure and delete data source definitions.
See "data source name" (DSN).
See "data source name" (DSN).
A library that implements the function calls defined in the ODBC API and enables applications to interact with ODBC data sources.
A library that acts as an intermediary between an ODBC application and one or more ODBC drivers.
ODBC initialization file (ODBC INI)
The ODBC.INI file contains a list of Data Sources and any properties for each. Each Data Source name must have a driver property defined. This enables the driver to be loaded when a connect call is made.
Open Database Connectivity (ODBC)
A database-independent application programming interface that enables applications to access data stored in heterogeneous relational and non-relational databases. Based on the Call-Level Interface (CLI) specification developed by X/Open's SQL Access Group and first popularized by Microsoft on the Windows platform.
Open database connectivity (ODBC), is a database access protocol that lets you connect to a database and then prepare and run SQL statements against the database. In conjunction with an ODBC driver, an application can access any data source including data stored in spreadsheets, like Excel. Because ODBC is a widely accepted standard API, applications can be written to comply to the ODBC standard. The ODBC driver performs all mappings between the ODBC standard and the particular database the application is accessing. Using a data source-specific driver, an ODBC compliant program can access any data source without any more development effort.
TimesTen provides the ODBC interface so that applications of any type that are ODBC compliant can access TimesTen using the ODBC driver provided by TimesTen.
A column whose values are physically stored separately from the other column values of a row.
A row that appears during one read but not during another read within the same transaction, due to the actions of other concurrently executing transactions.
A utility that tests the connection between two computers on a network by sending a message from one computer to the other and measuring how long it takes for the receiving system to confirm that the message was received. Typically packaged with network software.
See "TCP/IP port number".
See "stored procedure".
When using IMDB Cache to send table or row modifications from an IMDB Cache to an Oracle database. Compare with "replicate".
The process that the TimesTen Server uses to record each message it receives through the TimesTen network protocol.
Indexes are used to speed up queries on a table. A range index is similar in functionality to a B+-tree index and is best used for retrieving rows with column values within a certain range.
The sending of table or row modifications from one database to another. Compare with "propagate".
To undo the actions of a transaction, thereby returning all items modified by the transaction to their original state.
A performance enhancement used by the TimesTen Client in which the client receives multiple result rows of an SQL query in each message from the TimesTen Server to reduce network communication.
The degree to which a system or application can handle increasing demands on system resources without significant performance degradation.
A schema is automatically created for a user upon user creation. A schema is the namespace for a given user, where all objects owned by this user belong and all objects are identified by schema qualified names. For example, user PAT belongs to the PAT schema. In addition, the object EMPLOYEES
owned by PAT
is identified as PAT.EMPLOYEES
.
If a user refers to an object without the schema name, TimesTen first tries to resolve the name to the user's schema. If this object does not exist, TimesTen tries to resolve the name to SYS.EMPLOYEES
.
A user always has all privileges to all objects in their own schema. These privileges can never be revoked.
A logical name used to refer to a particular TimesTen Server. Shorthand names relieve the end user of having to enter a host name and port number to connect to a TimesTen Server.
Symmetric multi-processing. A hardware configuration in which two or more similar processors are connected via a high-bandwidth link and managed by one operating system, where each processor has equal access to I/O devices.
An error condition in which the stack usage of a thread or process exceeds the amount of space allocated for the stack.
An executable object or named entity stored in a database that can be invoked with input and output parameters and which can return result sets similar to those returned by an SQL query.
A special account on Windows used by the operating system and certain operating system services. The TimesTen service and the TimesTen Server run under the system account.
The communications protocol used by computers on the Internet. Abbreviation for Transport Control Protocol/Internet Protocol.
A number used by TCP/IP that identifies the end point for a connection to a host that supports multiple simultaneous connections.
A utility program and protocol that enables a user on one computer to open a virtual terminal, log in to a remote host and interact as a terminal user of that host.
An independent sequence of execution of program code inside a process. See also "process".
An ODBC driver that supports multithreaded servers and clients. The TimesTen data manager driver and the TimesTen Client driver are thread-safe.
An error condition indicating that the requested operation did not complete within the given amount of time. See also "timeout interval".
A configuration parameter that specifies the maximum amount of time that an operation should take to complete. See also "timeout error".
(1) An ODBC driver that enables end users to access data sources through a TimesTen Server. (2) A computer on which the TimesTen Client software has been installed. Using the TimesTen Client driver, an end user or application can access any data source managed by an available TimesTen Server.
TimesTen Client/Server network protocol
The protocol used by TimesTen Clients and TimesTen Servers to exchange data over a standard TCP/IP network connection.
(1) An application program that makes TimesTen data sources available to the TimesTen Clients on a network. (2) A computer on which the TimesTen Data Server software is running.
The host name or IP address used during installation of the TimesTen Server to identify the computer on which the software is being installed.
An operation or set of operations performed against data in a database. The operations defined in a transaction must be completed as a whole; if any part of the transaction fails, the entire transaction fails. See also "ACID transaction semantics".
A fixed-width, 32-bit Unicode character set. Each character occupies 32 bits of storage. The UCS-2 characters are the first 65,536 code points in this standard, so it can be viewed as a 32-bit extension of UCS-2.
An encoding scheme defined by the ISO/IEC 10646 standard in which each Unicode character is represented by either a two-byte integer or a pair of two-byte integers. Characters from European scripts and most Asian scripts are represented in two bytes. Surrogate pairs are represented in four bytes. Surrogate pairs represent characters such as infrequently used Asian characters that were not included in the original range of two-byte characters.
The combination of a user name, password and access permissions that gives an individual user access to an operating system.
A Windows utility program used to create user accounts and assign access rights and group membership.