Pervasive.SQL Library Index

Pervasive logo


Advanced Operations Guide - Contents


About This Manual

Who Should Read This Manual

Manual Organization

Conventions

Pervasive.SQL Databases

Pervasive.SQL Database Concepts

    Named Database

    Identifiers and Object Names

    The Default Database and the Current Database

    File Structure

    Access Methods

    Client/Server Communications

    ODBC DSN Creation Options

    ODBC Connection Strings

Pervasive.SQL Database GUI Reference

Pervasive.SQL Database Tasks

    Creating a New Bound Database

    Modifying Named Databases

    Deleting Named Databases

Concepts of Database Maintenance

Configurations

Database Security

Data Archival and Restoration

Troubleshooting

Summary of Pervasive.SQL Utilities

Understanding the Pervasive Component Architecture

Pervasive.SQL Database Engine

    Common Address Space

    Row Level Locking

    MicroKernel Database Engine

    SQL Relational Database Engine

Relational Architectural Overview

    Pervasive.SQL Relational Architecture: Server

Overview of Smart Components

Component Identification

Unique Component Naming

Dynamic Binding

Pervasive.SQL Event Logging

    Syntax

    Sample Entry

Error Code Clarification

Diagnosing Load Errors

Pervasive Auto-Reconnect

Changing Your Configuration

Configuration Utility Overview

Special Notes on the Configuration Utility

    Ensuring Configuration Changes Take Effect

    Connecting to Different Machines

    Interpreting Parameter Settings

    Access to Client Configuration Settings

Configuration Utility Tips

Tuning Performance

    SMP Support

    Spotting Performance Bottlenecks

    Before You Modify Configuration Parameters

    Minimizing Initial Connection Time

    Maximizing Runtime Throughput

Configuration Reference

Server Configuration Parameters

    Access

    Communication Buffer Size

    Communication Protocols

    Compatibility

    Data Integrity

    Debugging

    Directories

    Memory Usage

    Performance Tuning

    NetWare RTSS (NetWare only)

    Configuration Mapping

Win32 Client Configuration Parameters

    Access

    Cache Engine Debugging

    Communication Protocols

    Performance Tuning

    Security

    Application Characteristics

    Configuration Mapping

Win16 Client Configuration Parameters

    Access

    Application Characteristics

    Communication Protocols

    Security (NetWare server access only)

    Configuration Mapping

Linux Client Configuration Parameters

    Using the pvclientcfg Script

    Using the psregedit Utility

    Configuration Notes

    Configuration Reference for the Linux Client

    Btrieve Requester Settings

    Comm Settings

    MicroKernel Router Settings

    Diagnostic Configuration

    Target Engine and UNC Paths

Settings and Features that are Not Applicable to Linux Client

    I*net Data Server

    TCP/IP Timeout

Setting Up Referential Integrity

Concepts of Referential Integrity

    Definitions

    Understanding Keys and Rules

Setting up Primary Keys

    Creating a Primary Key During Table Creation

    Adding a Primary Key to an Existing Table

Setting up Foreign Keys

    Creating a Foreign Key During Table Creation

    Adding a Foreign Key to an Existing Table

Interactions Between Btrieve and Relational Constraints

    Bound Database versus Integrity Enforced

    See Also

Pervasive.SQL Security

Security Models and Concepts

    Available Models for Btrieve

    Setting up Classic Security

    Setting up Mixed or Database Security

    Summary of Tasks for Security Models

    Available Models for SQL

    Users and Groups

    Owner Names

    Extracting Security Information using SQL

Planning Your Security Scheme

    Available Options

    Choosing Your Policy

    Before you Begin

    Process Overview

Btrieve Security Quick Start

Security Tasks

    General Tasks

    Securing a Database Tasks

    Btrieve Security Policy Tasks

    User and Group Tasks

    Assigning Permissions Tasks

Data Encryption

    Configuration Parameters for Wire Encryption

    Encryption Notes

    Setting Up Encryption

    Effects of Encryption

    Owner Name Encryption

Logging, Backup, and Restore

Transaction Logging and Durability

    Using These Features

    Feature Comparison

    Which Feature Should I Use?

    How Logging Works

    See Also

Understanding Archival Logging and Continuous Operations

    Difference Between Archival Logging and Transaction Logging

    What if a File Restore is Needed

Using Archival Logging

    General Procedures

    Setting up Archival Logging

    Roll Forward Command

Using Continuous Operations

    Starting and Ending Continuous Operations

    Backing Up a Database with BUTIL

    Backing Up a Database with SQLUTIL

    Restoring Data Files when Using Continuous Operations

Server High-Availability Support

Server Clustering

    Failure Behavior

    Modes

    Licensing

Microsoft Cluster Service

    How to Proceed

    Verify Cluster Service Functioning Correctly

    Add a Cluster Group for Pervasive.SQL

    Install Pervasive.SQL on the Cluster Nodes

    Add Pervasive.SQL Services to Cluster Group

    Configure the Engines with PCC

    Establish Pervasive.SQL Databases on the Cluster Shared Disk

NetWare Cluster Services

    How to Proceed

    Verify Cluster Services is Functioning Correctly

    Modify Load Script if Required

    Configure Engines and Ensure Identical Configuration Information

    Establish Databases on the Cluster Shared Disk

SFT III for NetWare 4.2

Workgroup Engine in Depth

Networking

    NetBIOS

    MicroKernel Router Decision Algorithm

Technical Differences Server vs. Workgroup

Troubleshooting Workgroup Issues

Re-directing Locator Files

Accessing Data on NetWare using Workgroup Engine

    The Best Choice

    Using the Workgroup Engine

Monitoring Database Resources

Monitor Utility Overview

    Starting the Monitor Utility

Setting Monitor Utility Options

Monitoring MicroKernel Resources

    Setting Screen Refresh Options

    Viewing Active Files

    Viewing User Information

    Viewing MicroKernel Resource Usage

    Viewing MicroKernel Communications Statistics

Monitoring SQL Interface Resources

    Monitoring Active SQL Connection Manager Sessions

    Understanding Session Information

    Refreshing the Active Session List

    Deleting an Active Session

Testing Btrieve Operations

Function Executor Concepts

    Overview

    What Function Executor Can Do

    Features Unique to the Win3 Function Executor

    Automatic Mode in 32-bit Function Executor

    Where to Learn More

Function Executor GUI Reference

    Application Window (32-Bit)

    Main Window (32-Bit)

    Main Window (16-Bit)

    Login GUI Reference

    Open File Dialog GUI Reference

    Create a File Dialog GUI Reference

    Create a File Dialog GUI Reference (Advanced)

    Transactions GUI Reference

    File Statistics GUI Reference

    History GUI Reference

Function Executor Tasks

    Starting Function Executor Tasks

    Performing Operations Tasks

    Opening a File Tasks

    Creating a Btrieve File Tasks

    Login Tasks

    File Statistics Tasks

    History Tasks

Adding Relational Access to Btrieve Files

How to Use this Chapter

    Before you Begin

Creating a Database

Associating a Data File with a Database

Building a Table Definition

    Determining background information

    Naming Known Fields

    Defining Remaining Columns

    Summary of Sample

    Generating a Table Definition

    Verifying a Table Definition

    Conclusion

Manipulating Btrieve Data Files with Maintenance

Maintenance Utilities Overview

Btrieve Interactive Maintenance Utility

    Extended File Support

    Long File Names and Embedded Spaces Support

    The Btrieve Maintenance Utility Interface

File Information Editor

    File Information Editor Dialog Elements

    Information Editor Tasks

Owner Names

    Owner Names Tasks

Statistics Report

    Statistics Report Tasks

Indexes

    Index Tasks

Data

    Importing and Exporting ASCII File Format

    Data Tasks

Btrieve Command-Line Maintenance Utility (BUTIL)

    Return Codes

    Commands

    Viewing Command Usage Syntax

    Command Format

    Command Files

    Description Files

    Extended File Support

    Owner Names

    Redirecting Error Messages

    ASCII File Format

    Rules for Specifying File Names on Different Platforms

Importing and Exporting Data

    COPY

    LOAD

    RECOVER

    SAVE

Creating and Modifying Data Files

    CLONE

    CLROWNER

    CREATE

    DROP

    INDEX

    SETOWNER

    SINDEX

    Compacting Btrieve Data Files

Viewing Data File Statistics

    STAT

Displaying Btrieve Interface Module Version

    VER

Unloading the Btrieve Interface and Requester (DOS only)

    STOP

Performing Continuous Operations

Converting Data Files

Rebuild Utility Concepts

    Platforms Supported

    File Formats

    Command Line Parameters

    Temporary Files

    Optimizing the Rebuild Process

    Log File

Rebuild Utility GUI Reference

    File Options Screen

    Rebuild Options Screen

    Rebuild Progress Screen

Rebuild Utility Tasks

    GUI Tasks

    CLI Tasks

Null Conversion

Description Files

Rules for Description Files

Description File Examples

Description File Elements


Pervasive logo
Pervasive Software, Inc.
http://www.pervasive.com
Voice: (512) 231-6000
Fax: (512) 231-6597
Pervasive Sales Support
Documentation Feedback
Contact Technical Support
Pervasive DevTalk Forums
Pervasive DeveloperZone
Pervasive.SQL Library Index