Advanced Operations Guide
Total Page:16
File Type:pdf, Size:1020Kb
Pervasive.SQL 2000i Advanced Operations Guide Procedures and References for Advanced Users Pervasive Software, Inc. 12365 Riata Trace Parkway Building II Austin, TX 78727 USA Telephone: +1 512 231 6000 or 800 287 4383 Fax: +1 512 231 6010 E-Mail: [email protected] Web: http://www.pervasive.com disclaimer PERVASIVE SOFTWARE INC. LICENSES THE SOFTWARE AND DOCUMENTATION PRODUCT TO YOU OR YOUR COMPANY SOLELY ON AN “AS IS” BASIS AND SOLELY IN ACCORDANCE WITH THE TERMS AND CONDITIONS OF THE ACCOMPANYING LICENSE AGREEMENT. PERVASIVE SOFTWARE INC. MAKES NO OTHER WARRANTIES WHATSOEVER, EITHER EXPRESS OR IMPLIED, REGARDING THE SOFTWARE OR THE CONTENT OF THE DOCUMENTATION; PERVASIVE SOFTWARE INC. HEREBY EXPRESSLY STATES AND YOU OR YOUR COMPANY ACKNOWLEDGES THAT PERVASIVE SOFTWARE INC. DOES NOT MAKE ANY WARRANTIES, INCLUDING, FOR EXAMPLE, WITH RESPECT TO MERCHANTABILITY, TITLE, OR FITNESS FOR ANY PARTICULAR PURPOSE OR ARISING FROM COURSE OF DEALING OR USAGE OF TRADE, AMONG OTHERS. trademarks Btrieve, Tango, Client/Server in a Box, and the Pervasive Software logo are registered trademarks of Pervasive Software Inc. Built on Pervasive, Built on Pervasive Software, Extranet in a Box, Pervasive.SQL, Jtrieve, Plug n’ Play Databases, SmartScout, Solution Network, Ultra-light Z-DBA, Z-DBA, ZDBA, UltraLight, MicroKernel Database Engine, and MicroKernel Database Architecture are trademarks of Pervasive Software Inc. Microsoft, MS-DOS, Windows, Windows NT, Windows 2000, Windows 98, Windows ME, Win32, Win32s, and Visual Basic are registered trademarks of Microsoft Corporation. Windows 95 is a trademark of Microsoft Corporation. NetWare and Novell are registered trademarks of Novell, Inc. NetWare Loadable Module, NLM, Novell DOS, Transaction Tracking System, and TTS are trademarks of Novell, Inc. All other company and product names are the trademarks or registered trademarks of their respective companies. Copyright 2001 Pervasive Software Inc. All rights reserved. Reproduction, photocopying, or transmittal of this publication, or portions of this publication, is prohibited without the express prior written consent of the publisher. This product includes software developed by Powerdog Industries. Copyright 1994 Powerdog Industries. All rights reserved. The ODBC Driver Manager for NetWare (ODBC.NLM) included in this product is based on the GNU iODBC software Copyright 1995 by Ke Jin <[email protected]> and was modified by Simba Technologies Inc. in June 1999. This library is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details. A copy of the GNU Lesser General Public License is included in your installation of Pervasive.SQL 2000i at \pvsw\doc\lesser.htm. If you cannot find this license, write to the Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111- 1307 USA. You may contact Pervasive Software Inc. using the contact information on the back cover of this manual. Advanced Operations Guide March 2001 100-004076-001 Contents Contents About This Manual . xiii Who Should Read This Manual . xiv Manual Organization . xv Conventions . xvii 1 Concepts of Database Maintenance . 1-1 An Introduction to Database Maintenance File Structure . 1-2 Access Methods . 1-4 Client/Server Communications . 1-5 Configurations . 1-6 Database Security . 1-8 Data Archival and Restoration . 1-9 Troubleshooting . 1-10 Summary of Pervasive.SQL Utilities. 1-11 2 Understanding the Pervasive Component Architecture . 2-1 A Detailed Discussion of Smart Components and Related Features Pervasive.SQL 2000i Database Engine. 2-2 Common Address Space. 2-2 Client/Server Version Checking. 2-2 Row Level Locking . 2-2 MicroKernel Database Engine . 2-3 SQL Relational Database Engine . 2-5 Relational Architectural Overview. 2-7 Pervasive.SQL 2000i Relational Architecture: Server . 2-7 Overview of Smart Components. 2-11 Component Identification . 2-13 Unique Component Naming . 2-14 Dynamic Binding . 2-16 Pervasive.SQL Event Logging . 2-18 Syntax . 2-18 Sample Entry . 2-19 Error Code Clarification . 2-20 Diagnosing Load Errors . 2-21 Pervasive Auto-Reconnect . 2-23 iii Contents 3 Changing Your Configuration . 3-1 How to Work with the Configuration Utility within PCC Configuration Utility Overview . 3-2 Special Notes on the Configuration Utility . 3-4 Ensuring Configuration Changes Take Effect. 3-4 Connecting to Different Machines. 3-4 Interpreting Parameter Settings . 3-5 Windows 2000 and Restricted Users. 3-7 Configuration Utility Tips . 3-8 Tuning Performance . 3-9 Spotting Performance Bottlenecks . 3-9 Before You Modify Configuration Parameters . 3-11 Minimizing Initial Connection Time . 3-11 Maximizing Runtime Throughput. 3-14 4 Configuration Reference. 4-1 Configuration Settings Available in Pervasive.SQL 2000i Server Configuration Parameters . 4-2 Access . 4-2 Communication Buffer Size . 4-5 Communication Protocols . 4-7 Compatibility . 4-10 Data Integrity . 4-11 Debugging . 4-15 Directories . 4-18 Memory Usage. 4-19 Performance Tuning . 4-22 NetWare RTSS (NetWare only) . 4-26 Configuration Mapping . 4-27 Win32 Client Configuration Parameters. 4-31 Access . 4-31 Communication Protocols . 4-33 Performance Tuning . 4-34 Security. 4-34 Application Characteristics . 4-35 Configuration Mapping . 4-36 Win16 Client Configuration Parameters. 4-38 Access . 4-38 Application Characteristics . 4-38 Communication Protocols . 4-39 Security (NetWare server access only). 4-40 Configuration Mapping . 4-40 iv Contents 5 Identifiers, DSNs, and Named Databases . 5-1 An Exploration of Object Names, Named Databases, and DSNs Identifiers and Object Names . 5-2 Regular and Delimited. 5-2 Maximum Length . 5-2 Examples . 5-3 Unique Scope. 5-3 DSN Creation Options . 5-5 Engine DSN Open Mode Options . 5-5 Client DSN Options . 5-7 Connection Strings . 5-9 Maintain Named Databases . 5-12 Creating a New Bound Database . 5-13 6 Setting Up Referential Integrity . 6-1 An Introduction to Referential Integrity Structures Concepts of Referential Integrity . 6-2 Definitions . 6-2 Understanding Keys and Rules . 6-3 Setting up Primary Keys . ..