Using Informix XPS and DB2 Universal Database

Total Page:16

File Type:pdf, Size:1020Kb

Using Informix XPS and DB2 Universal Database Front cover Database Strategies: Using Informix XPS and DB2 Universal Database Understanding and exploiting the strengths of Informix XPS and DB2 UDB Considerations for transitioning data and schemas to DB2 UDB Working with very large data volumes Chuck Ballard Weiren Ding Carlton Doe Glen Mules Rajamani Muralidharan Santosh Sajip Nora Sokolof Andreas Weininger ibm.com/redbooks International Technical Support Organization Database Strategies: Using Informix XPS and DB2 Universal Database August 2005 SG24-6437-00 Note: Before using this information and the product it supports, read the information in “Notices” on page xiii. First Edition (August 2005) This edition applies to Version 8.2 of DB2 Universal Database (UDB) and Version 8.5 of Informix Extended Parallel Server (XPS). © Copyright International Business Machines Corporation 2005. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . xiii Trademarks . xiv Preface . xv The team that wrote this redbook. xvi Become a published author . xix Comments welcome. xix Chapter 1. Introduction to this redbook . 1 1.1 Understanding strategic directions for XPS. 2 1.2 Objective of this redbook. 3 1.3 Chapter abstracts . 4 Chapter 2. XPS and DB2 UDB architectures . 7 2.1 High-level product overviews . 9 2.1.1 IBM Informix Extended Parallel Server . 9 2.1.2 DB2 Data Warehouse Edition . 11 2.2 Understanding the architectures . 20 2.3 Defining an instance . 21 2.3.1 Informix XPS instance architecture . 23 2.3.2 DB2 Universal Database instance architecture. 25 2.4 Storage architecture . 29 2.4.1 Pages . 31 2.4.2 Containers and chunks . 31 2.4.3 Logical disks . 35 2.4.4 Logging . 37 2.4.5 Storage architecture summary . 41 2.5 Parallelism. 42 2.5.1 The process model of XPS . 42 2.5.2 The process model of DB2 . 44 2.5.3 Intra-node parallelism . 47 2.5.4 Inter-node parallelism . 47 2.6 Memory management . 48 2.6.1 XPS memory model . 48 2.6.2 DB2 memory model . 51 2.7 Partitioning . 54 2.7.1 Fragmentation in XPS . 54 2.7.2 Partitioning in DB2 . 58 2.8 Terminology. 60 © Copyright IBM Corp. 2005. All rights reserved. iii Chapter 3. Configuration . 63 3.1 XPS and DB2 configuration. 64 3.1.1 Knobs (configuration files and tuning parameters) . 64 3.1.2 Commands . 64 3.1.3 Granularity. 64 3.1.4 Database manager . 65 3.1.5 Dynamic parameters . 65 3.1.6 Cataloging . 66 3.1.7 Client access to DB2 instances. 66 3.2 Configuration methods . 66 3.2.1 DB2 configuration methods. 67 3.2.2 Configuration Advisor and the AUTOCONFIGURE command . 69 3.3 Configuration files and objects overview . 72 3.3.1 Environment variables and the profile registry . 72 3.3.2 Setting registry and environment variables . 73 3.3.3 DB2 configuration files and objects. 74 3.4 Configuring the instance . 79 3.4.1 Page size(s) . 79 3.4.2 Table spaces. 80 3.4.3 Bufferpools . 81 3.4.4 Physical and Logical Logs. 82 Chapter 4. Instance and database operations . 87 4.1 Instance operation modes . 88 4.1.1 Online mode . 88 4.1.2 Offline mode . 90 4.1.3 Quiescent mode . 90 4.1.4 Creating and dropping the instance . 91 4.2 Modifying the configuration . 91 4.2.1 Working with the DAS . 92 4.2.2 Viewing or updating the configuration using Control Center . 93 4.2.3 Managing database partition groups. 96 4.2.4 Managing buffer pools. 99 4.3 Managing database storage . 100 4.3.1 Table spaces and containers . 100 4.3.2 Monitoring table space and container storage . 103 4.3.3 Transactions and logs . 108 4.4 Backup and recovery. 112 4.4.1 Recovery types . 112 4.4.2 Backup and restore methods . 114 4.4.3 Table level restore. 121 4.5 High availability . 122 4.5.1 Log mirroring . 122 iv Database Strategies: Using Informix XPS and DB2 Universal Database 4.5.2 Replication . 123 4.5.3 Online split mirror and suspended I/O support . 123 4.6 Security . 124 4.6.1 Authorization and privileges . 125 4.6.2 Roles and groups . 128 4.6.3 Security levels . 129 4.6.4 Client/server security. 139 4.6.5 Authentication methods. ..
Recommended publications
  • Netezza EOL: IBM IAS Is a Flawed Upgrade Path Netezza EOL: IBM IAS Is a Flawed Upgrade Path
    Author: Marc Staimer WHITE PAPER Netezza EOL: What You’re Not Being Told About IBM IAS Is a Flawed Upgrade Path Database as a Service (DBaaS) WHITE PAPER • Netezza EOL: IBM IAS Is a Flawed Upgrade Path Netezza EOL: IBM IAS Is a Flawed Upgrade Path Executive Summary It is a common technology vendor fallacy to compare their systems with their competitors by focusing on the features, functions, and specifications they have, but the other guy doesn’t. Vendors ignore the opposite while touting hardware specs that mean little. It doesn’t matter if those features, functions, and specifications provide anything meaningfully empirical to the business applications that rely on the system. It only matters if it demonstrates an advantage on paper. This is called specsmanship. It’s similar to starting an argument with proof points. The specs, features, and functions are proof points that the system can solve specific operational problems. They are the “what” that solves the problem or problems. They mean nothing by themselves. Specsmanship is defined by Wikipedia as: “inappropriate use of specifications or measurement results to establish supposed superiority of one entity over another, generally when no such superiority exists.” It’s the frequent ineffective sales process utilized by IBM. A textbook example of this is IBM’s attempt to move their Netezza users to the IBM Integrated Analytics System (IIAS). IBM is compelling their users to move away from Netezza. In the fall of 2017, IBM announced to the Enzee community (Netezza users) that they can no longer purchase or upgrade PureData System for Analytics (the most recent IBM name for its Netezza appliances), and it will end-of-life all support next year.
    [Show full text]
  • SAP Database Administration with IBM
    André Faustmann, Michael Greulich, André Siegling, Benjamin Wegner, and Ronny Zimmerman SAP® Database Administration with IBM® DB2® Bonn Boston Contents at a Glance 1 Introduction ............................................................................ 19 2 SAP System Landscapes ......................................................... 25 3 Basics and Architecture of the IBM DB2 for LUW Database ................................................................................. 71 4 Lifecycle ................................................................................. 233 5 Administration Tools Inside and Outside the SAP System .... 327 6 Backup, Restore, and Recovery .............................................. 463 7 Monitoring DB2 SAP Systems with SAP Solution Manager .................................................................................. 575 8 SAP NetWeaver Business Warehouse and IBM DB2 for LUW .................................................................................. 647 9 Common Problems and Their Solutions for DB2 Administrators ........................................................................ 697 Contents Foreword .................................................................................... 15 Acknowledgments ....................................................................... 17 1 Introduction ................................................................. 19 1.1 Who This Book Is For .................................................... 21 1.2 Focus of This Book .......................................................
    [Show full text]
  • IBM DB2 for Z/OS: the Database for Gaining a Competitive Advantage!
    Why You Should Read This Book Tom Ramey, Director, DB2 for z/OS IBM Silicon Valley Laboratory “This book is a ‘must read’ for Enterprise customers and contains a wealth of valuable information! “It is clear that there is a technology paradigm shift underway, and this is opening enormous opportunities for companies in all industries. Adoption of Cloud, Mobile, and Analytics promises to revolutionize the way we do business and will add value to a company’s business processes across all functions from sales, marketing, procurement, manufacturing and finance. “IT will play a significant role enabling this shift. Read this book and find out how to integrate the heart of your infrastructure, DB2 for z/OS, with new technologies in order to maximize your investment and drive new value for your customers.” Located at IBM’s Silicon Valley Laboratory, Tom is the director of IBM’s premiere relational database management system. His responsibilities include Architecture, Development, Service, and Customer Support for DB2. He leads development labs in the United States, Germany, and China. Tom works closely with IBM’s largest clients to ensure that DB2 for z/OS continues as the leading solution for modern applications, encompassing OLTP to mobile to analytics. At the same time he continues an uncompromising focus on meeting the needs of the most demanding operational environments on Earth, through DB2’s industry- leading performance, availability, scaling, and security capabilities. IBM DB2 for z/OS: The Database for Gaining a Competitive Advantage! Shantan Kethireddy Jane Man Surekha Parekh Pallavi Priyadarshini Maryela Weihrauch MC Press Online, LLC Boise, ID 83703 USA IBM DB2 for z/OS: The Database for Gaining a Competitive Advantage! Shantan Kethireddy, Jane Man, Surekha Parekh, Pallavi Priyadarshini, and Maryela Weihrauch First Edition First Printing—October 2015 © Copyright 2015 IBM.
    [Show full text]
  • Object-Oriented Databases Need for Complex Data Types
    Object-Oriented Databases! ■" Need for Complex Data Types! ■" The Object-Oriented Data Model! ■" Object-Oriented Languages! ■" Persistent Programming Languages! ■" Persistent C++ Systems! 8.1! Need for Complex Data Types! ■" Traditional database applications in data processing had conceptually simple data types! é" Relatively few data types, first normal form holds! ■" Complex data types have grown more important in recent years! é" E.g. Addresses can be viewed as a ! Ø" Single string, or! Ø" Separate attributes for each part, or! Ø" Composite attributes (which are not in first normal form)! é" E.g. it is often convenient to store multivalued attributes as-is, without creating a separate relation to store the values in first normal form! ■" Applications! é" computer-aided design, computer-aided software engineering! é" multimedia and image databases, and document/hypertext databases.! 8.2! 1! Object-Oriented Data Model! ■" Loosely speaking, an object corresponds to an entity in the E- R model.! ■" The object-oriented paradigm is based on encapsulating code and data related to an object into single unit.! ■" The object-oriented data model is a logical data model (like the E-R model).! ■" Adaptation of the object-oriented programming paradigm (e.g., Smalltalk, C++) to database systems.! 8.3! Object Structure! ■" An object has associated with it:! é" A set of variables that contain the data for the object. The value of each variable is itself an object.! é" A set of messages to which the object responds; each message may have zero, one, or more parameters.! é" A set of methods, each of which is a body of code to implement a message; a method returns a value as the response to the message! ■" The physical representation of data is visible only to the implementor of the object! ■" Messages and responses provide the only external interface to an object.! ■" The term message does not necessarily imply physical message passing.
    [Show full text]
  • IBM Infosphere Optim Data Masking Solution Mask Data on Demand to Protect Privacy Across the Enterprise
    IBM Software Solution Brief IBM InfoSphere Optim Data Masking solution Mask data on demand to protect privacy across the enterprise Today’s organizations realize that data is a critical enterprise asset, so Highlights protecting that data and the applications that hold it makes good business sense. However, different types of information have different ●● ●●Safeguard personally identifiable informa- protection and privacy requirements. Therefore, organizations must tion, trade secrets, financials and other sensitive data take a holistic approach to protecting and securing their business-critical information: ●● ●●Easily mask data on demand using predefined transformations and site-specific routines ●●●Understand where data exists: Organizations can’t protect sensitive data unless they know where it resides and how it’s related across the ●● ●●Respond in real time to suspicious enterprise. requests for data ●●●Safeguard sensitive data, both structured and unstructured: ●● ●●Ensure a valid business need to know for Structured data contained in databases must be protected from sensitive data unauthorized access using data transformation techniques such as ●● ●●Discover hidden instances of private data masking or encryption. Unstructured data in documents, forms, image so they can be fully protected files, GPS systems and more requires privacy policies to de-identify ●● ●●Support compliance with privacy regula- or mask sensitive data while still allowing needed business information tions and corporate governance standards to be shared. ●●●Protect
    [Show full text]
  • IBM Informix 14.10: the High-Performance, Low-Footprint
    Solution Brief IBM Informix 14.10 IBM Informix 14.10 The high-performance, low-footprint database for analytics on the edge, in the cloud and on premises Enterprise databases have always needed to deliver fast transaction IBM Informix delivers: processing and the replication speeds necessary for continuous availability without adding undue administrative effort or sacrificing • Powerful, optimized time series and security. Yet, new opportunities like the Internet of Things (IoT) have geospatial data management also arisen, bringing an increase in data of various types, which businesses hope to turn into competitive advantage. For that reason, • Automated administration and self-management features many companies have turned to IBM® Informix®, a solution capable of satisfying database and analytics needs at the core of the enterprise or • Footprints under 100 MB for easy IoT at the edge of your IoT network. gateway embedding • IBM InformixHQ for collaboration and IBM Informix is an embeddable, high-performance database for management across multiple instances integrating SQL, NoSQL, JSON, time series and spatial data, which can be up and running in minutes, and is accessible from virtually any • Integrated in-memory warehouse desktop, laptop or mobile device. Its small footprint—lower than 100 MB accelerator in some cases1 —and ability to run on distributed devices with a variety of automated administrative capabilities means IBM Informix is easier to install and manage with fewer administrators, even when used across thousands of devices worldwide. These features make IBM Informix the database of choice for high-performance, multidatabase installations with remote management—as is the case for IoT edge gateways.
    [Show full text]
  • Object Oriented Database Management Systems-Concepts
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Global Journal of Computer Science and Technology (GJCST) Global Journal of Computer Science and Technology: C Software & Data Engineering Volume 15 Issue 3 Version 1.0 Year 2015 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: 0975-4172 & Print ISSN: 0975-4350 Object Oriented Database Management Systems-Concepts, Advantages, Limitations and Comparative Study with Relational Database Management Systems By Hardeep Singh Damesha Lovely Professional University, India Abstract- Object Oriented Databases stores data in the form of objects. An Object is something uniquely identifiable which models a real world entity and has got state and behaviour. In Object Oriented based Databases capabilities of Object based paradigm for Programming and databases are combined due remove the limitations of Relational databases and on the demand of some advanced applications. In this paper, need of Object database, approaches for Object database implementation, requirements for database to an Object database, Perspectives of Object database, architecture approaches for Object databases, the achievements and weakness of Object Databases and comparison with relational database are discussed. Keywords: relational databases, object based databases, object and object data model. GJCST-C Classification : F.3.3 ObjectOrientedDatabaseManagementSystemsConceptsAdvantagesLimitationsandComparativeStudywithRelationalDatabaseManagementSystems Strictly as per the compliance and regulations of: © 2015. Hardeep Singh Damesha. This is a research/review paper, distributed under the terms of the Creative Commons Attribution- Noncommercial 3.0 Unported License http://creativecommons.org/licenses/by-nc/3.0/), permitting all non-commercial use, distribution, and reproduction inany medium, provided the original work is properly cited.
    [Show full text]
  • Developing Embedded SQL Applications
    IBM DB2 10.1 for Linux, UNIX, and Windows Developing Embedded SQL Applications SC27-3874-00 IBM DB2 10.1 for Linux, UNIX, and Windows Developing Embedded SQL Applications SC27-3874-00 Note Before using this information and the product it supports, read the general information under Appendix B, “Notices,” on page 209. Edition Notice This document contains proprietary information of IBM. It is provided under a license agreement and is protected by copyright law. The information contained in this publication does not include any product warranties, and any statements provided in this manual should not be interpreted as such. You can order IBM publications online or through your local IBM representative. v To order publications online, go to the IBM Publications Center at http://www.ibm.com/shop/publications/ order v To find your local IBM representative, go to the IBM Directory of Worldwide Contacts at http://www.ibm.com/ planetwide/ To order DB2 publications from DB2 Marketing and Sales in the United States or Canada, call 1-800-IBM-4YOU (426-4968). When you send information to IBM, you grant IBM a nonexclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. © Copyright IBM Corporation 1993, 2012. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Chapter 1. Introduction to embedded Include files for COBOL embedded SQL SQL................1 applications .............29 Embedding SQL statements
    [Show full text]
  • Proc SQL Vs. Pass-Thru SQL on DB2® Or How I Found a Day
    NESUG 15 Beginning Tutorials Proc SQL vs. Pass-Thru SQL on DB2® Or How I Found a Day Jeffrey S. Cohen, American Education Services/PHEAA Abstract When extracting data from multiple tables, you must employ Join conditions to avoid a Cartesian product, Many people use Proc SQL to query DB2 where each row from table one will be joined with databases yet ignore the Pass-thru ability of this each row in table two. A Join condition will tell the Proc. This paper will compare the Proc SQL of DBMS how to match the rows of the two tables. Consider the above example, only now we want the SAS® and Pass-thru SQL on the same 30 million- color of the person's car as well: row table to highlight the time and resource Select A.Name, savings that Pass-through SQL can give. A.Age, A.City, Overview B.Color From Table_Demographics A Inner Join One of the most useful features of SAS software is Table_Cars B on its ability to read data in almost any form or A.Name = B.Name storage medium from multiple data sets. When Where A.Age < 30 and accessing data from a Database Management (A.City = 'Syracuse' or System (DBMS) such as DB2, the SQL procedure A.State = 'Maine') is required. Like many SAS procedures there are a Notice that when selecting multiple columns a variety of options available, some greatly comma must separate them. Also notice that the impacting performance. We will examine three table Table_Demographics is given the pseudonym techniques to use when joining three tables with of A and the table Table_Cars is given the Proc SQL and the results on performance.
    [Show full text]
  • Cisco and IBM Informix Database Software: Enhancing Collaboration
    White paper Cisco and IBM Informix Database Software: Enhancing Collaboration Introduction Cisco® Collaboration solutions help people work together to solve problems, make decisions, accelerate time to market, and transform entire industries faster, no matter how far apart the participants happen to be located. Businesses of all sizes use Cisco Highlights Collaboration solutions, from small businesses to large enterprises. This white paper addresses In fact, IBM® has a sizeable deployment of Cisco Collaboration a number of the features and technology across its offices worldwide. techniques Cisco uses to embed Informix in its solutions, The infrastructure required to power collaboration solutions like this and why. needs to be robust, scalable, and invisible. Cisco chose to embed IBM Informix® database software in their solutions because of the robust embeddability, high reliability, and extreme performance of Informix. Today, Cisco has over 100,000 instances of Informix Contents running in production environments; a number that continues to grow. When a customer makes a VoIP call using a Cisco 1 Introduction Collaboration solution, they have unknowingly just used Informix! 2 Deployment The number of product teams inside of Cisco using Informix is also growing. As a result, Cisco developed its own internal competency 3 Upgrades center around Informix so that its product groups are leveraging Footprint Optimization best practices and have an internal support community, in addition to the enablement support provided by IBM. 4 Backup and Restore This white paper addresses a number of the features and 5 System Monitoring Interface techniques Cisco uses to embed Informix in its solutions, and why. Storage Space Management It also highlights some of Informix’s newer features.
    [Show full text]
  • Object-Relational DBMS
    Session-7: Object-Relational DBMS Cyrus Shahabi 1 Motivation Relational databases (2 nd generation) were designed for traditional banking-type applications with well-structured, homogenous data elements (vertical & horizontal homogeneity) and a minimal fixed set of limited operations (e.g., set & tuple- oriented operations). New applications (e.g., CAD, CAM, CASE, OA, and CAP), however, require concurrent modeling of both data and processes acting upon the data. Hence, a combination of database and software-engineering disciplines lead to the 3 rd generation of database management systems: Object Database Management Systems, ODBMS. Note that a classic debate in database community is that do we need a new model or relational model is sufficient and can be extended to support new applications. 2 Motivation … People in favor of relational model argue that: New versions of SQL (e.g., SQL-92 and SQL3) are designed to incorporate functionality required by new applications (UDT, UDF, …). Embedded SQL can address almost all the requirements of the new applications. “Object people”, however, counter-argue that in the above- mentioned solutions, it is the application rather than the inherent capabilities of the model that provides the required functionality. Object people say there is an impedance mismatch between programming languages (handling one row of data at a time) and SQL (multiple row handling) which makes conversions inefficient. Relational people say, instead of defining new models, let’s introduce set-level functionality into
    [Show full text]
  • IBM Informix Performance Guide
    IBM Informix Version 11.70 IBM Informix Performance Guide SC27-3544-00 IBM Informix Version 11.70 IBM Informix Performance Guide SC27-3544-00 Note Before using this information and the product it supports, read the information in “Notices” on page C-1. This document contains proprietary information of IBM. It is provided under a license agreement and is protected by copyright law. The information contained in this publication does not include any product warranties, and any statements provided in this manual should not be interpreted as such. When you send information to IBM, you grant IBM a nonexclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. © Copyright IBM Corporation 1996, 2010. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Introduction .................................xiii About this publication ...............................xiii Topics beyond the scope of this publication .......................xiii Types of users .................................xiv Software dependencies ..............................xiv Assumptions about your locale ...........................xiv Demonstration databases .............................xiv What's new in performance for Informix, version 11.70 .....................xv Example code conventions ..............................xvii Additional documentation..............................xviii Compliance with industry standards ..........................xviii
    [Show full text]