+I7Berkeley DB: Reference Table of Contents[P1

Reference Table of Contents


    5
  1. Introduction
      :
    1. What is Berkeley DB?B
    2. Where does Berkeley DB run?X
    3. What does the Berkeley DB distribution include?E
    4. What can you do with Berkeley DB?
    P
  2. Getting Started: A Simple Tutorial
      8
    1. Introduction<
    2. Key/data pairs:
    3. Error returns=
    4. Opening a databaseG
    5. Adding elements to a databaseM
    6. Retrieving elements from a databaseK
    7. Removing elements from a database>
    8. Closing a database
    >
  3. Access Method Operations
      :
    1. Access method operations
        1
      1. Retrieving records.
      2. Storing records2
      3. Deleting records;
      4. Flushing the database cache3
      5. Database statistics3
      6. Closing a database
      5
    2. Database cursors
        F
      1. Retrieving records with a cursorC
      2. Storing records with a cursorD
      3. Deleting records with a cursor0
      4. Logical join8
      5. Closing a cursor
      J
    3. Partial Record Storing and Retrieval
    E
  4. Access Method Configuration
      J
    1. What are the available access methods??
    2. Selecting an access method;
    3. Logical record numbers+
    4. General access method configuration
        G
      1. Selecting a page size (db_pagesize)J
      2. Selecting a cache size (db_cachesize)G
      3. Selecting a byte order (db_lorder)M
      4. Sorting duplicate data items (dup_compare)I
      5. Non-local memory allocation (db_malloc)
      3
    5. B+tree access method specific configuration
        L
      1. Btree comparison function (bt_compare)F
      2. Btree prefix function (bt_prefix)F
      3. Minimum keys per page (bt_minkey)F
      4. Maximum keys per page (bt_maxkey)?
      5. Duplicate data items (DB_DUP)b
      6. Retrieving Btree records by logical record number (DB_RECNUM)
      1
    6. Hash access method specific configuration
        A
      1. Page fill factor (h_ffactor)O
      2. Specifying your own hashing function (h_hash)<
      3. Hash table size (h_nelem)>
      4. Duplicate data items (DB_DUP)
      2
    7. Recno access method specific configuration
        N
      1. Record delimiters (re_delim, DB_DELIMITER)E
      2. Record length (re_len, DB_FIXEDLEN)L
      3. Record padding byte value (re_pad, DB_PAD)Q
      4. Record backing file (re_source, DB_SNAPSHOT)O
      5. Logically renumbering records (DB_RENUMBER)
    @
  5. Berkeley DB Architecture
      6
    1. The big picture/
    2. Environment4
    3. Subsystems>
    4. Supporting utilities(
    5. Application architectural issues
        ?
      1. Programming model7
      2. Available APIs>
      3. Scripting languagesC
      4. Extending Berkeley DB
    B
  6. The Berkeley DB Environment
      =
    1. Creating an environmentL
    2. Opening databases within the environment1
    3. File naming0
    4. Security;
    5. Shared memory regions
    Y
  7. Berkeley DB Concurrent Access Methods Applications
      S
    1. Building concurrent access method applications
    a
  8. Berkeley DB Transactional Access Methods Applications
      6
    1. IntroductionT
    2. Building transaction protected applications8
    3. Administration?
    4. Deadlock detectionE
    5. Performing checkpoints@
    6. Archival procedures@
    7. Recovery proceduresN
    8. Recovery and filesystem operationsE
    9. Transaction throughput
    ;
  9. Programmer Notes
      I
    1. Application signal handlingI
    2. Error returns to applicationsN
    3. Building multi-threaded applications>
    4. Java programming notesB
    5. Environmental variablesF
    6. Library version information:
    7. Database limits:
    8. Byte orderingT
    9. Compatibility with historic interfacesP
    10. Integrating version 1.85 applicationsA
    11. Run-time configuration
    @
  10. The Transaction Subsystem
      $
    1. Berkeley DB and transactions
    2. Taking checkpoints
    3. Transaction restrictions9
    4. Cursor stability8
    5. Transaction limits
    6. Configuring transactions
    7. Tuning transactionsR
    8. Transactions and non-Berkeley DB applications
    B
  11. The Memory Pool Subsystem
      C
    1. Berkeley DB and the memory pool@
    2. Configuring the memory pool
    =
  12. The Locking Subsystem(
      
    1. Berkeley DB and lockingo
    2. Page Locks
        y8
      1. Standard lock modes-
      2. Two-phase locking using transactionse/
      3. Two-phase locking without transactionsc
      (
    3. Deadlocks and deadlock avoidance
    4. Configuring lockingm
    5. Tuning locking0
    6. Locking and non-Berkeley DB applications
    s<
  13. The Logging Subsystem
      
    1. Berkeley DB and logging
    2. Reclaiming log space5
    3. Log file limits+
    4. Configuring logging 
    5. Tuning logging0
    6. Logging and non-Berkeley DB applications
    iG
  14. Dumping and Reloading Databasesd
      M
    1. The db_dump and db_load utilitiesd>
    2. Dump output formatsD
    3. Loading text into databases
    ,
  15. Perl
      A
    1. Using Berkeley DB with Perl>
    a4
  16. Sendmail
      I
    1. Using Berkeley DB with Sendmailu
    >=
  17. Installation Notes/
      K
    1. File utility /etc/magic informationl
    eM
  18. Building client-server applications @
  19. Building Web applications?
  20. Debugging Applicationsc
      D
    1. Run-time error information.+
    2. Displaying and interpreting the logc2
    3. Including operation information in the log
    <
rs>tÿÿ database cache3
  • Database statistics3
  • Closing a database