ebook img

SQL Server 2000 : the complete reference PDF

954 Pages·2001·7.449 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview SQL Server 2000 : the complete reference

SQL Server 2000: The Complete Reference Jeffrey R. Shapiro Osborne/McGraw-Hill Berkeley New York St. Louis San Francisco Auckland Bogotá Hamburg London Madrid Mexico City Milan Montreal New Delhi Panama City Paris São Paulo Singapore Sydney Tokyo Toronto Copyright ©2001 by The McGraw-Hill Companies. All rights reserved. Manufactured in the United States of America. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a data- base or retrieval system, without the prior written permission of the publisher. 0-07-222468-1 The material in this eBook also appears in the print version of this title: 0-07-212588-8. All trademarks are trademarks of their respective owners. Rather than put a trademark symbol after every occurrence of a trademarked name, we use names in an editorial fashion only, and to the benefit of the trademark owner, with no intention of infringement of the trademark. Where such designations appear in this book, they have been printed with initial caps. McGraw-Hill eBooks are available at special quantity discounts to use as premiums and sales promotions, or for use in corporate training pro- grams. For more information, please contact George Hoare, Special Sales, at [email protected] or (212) 904-4069. TERMSOFUSE This is a copyrighted work and The McGraw-Hill Companies, Inc. (“McGraw-Hill”) and its licensors reserve all rights in and to the work. Use of this work is subject to these terms. Except as permitted under the Copyright Act of 1976 and the right to store and retrieve one copy of the work, you may not decompile, disassemble, reverse engineer, reproduce, modify, create derivative works based upon, transmit, distribute, disseminate, sell, publish or sublicense the work or any part of it without McGraw-Hill’s prior consent. You may use the work for your own noncommercial and personal use; any other use of the work is strictly prohibited. Your right to use the work may be terminated if you fail to comply with these terms. THE WORK IS PROVIDED “AS IS”. McGRAW-HILLAND ITS LICENSORS MAKE NO GUARANTEES OR WARRANTIES AS TO THE ACCURACY, ADEQUACYOR COMPLETENESS OF OR RESULTS TO BE OBTAINED FROM USING THE WORK, INCLUDING ANY INFORMATION THATCAN BE ACCESSED THROUGH THE WORK VIAHYPERLINK OR OTHERWISE, AND EXPRESSLYDISCLAIM ANYWARRANTY, EXPRESS OR IMPLIED, INCLUDING BUTNOTLIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR APARTICULAR PURPOSE. McGraw-Hill and its licensors do not warrant or guarantee that the functions contained in the work will meet your requirements or that its operation will be uninterrupted or error free. Neither McGraw-Hill nor its licensors shall be liable to you or anyone else for any inaccuracy, error or omission, regardless of cause, in the work or for any damages resulting therefrom. McGraw-Hill has no responsibility for the content of any information accessed through the work. Under no circumstances shall McGraw-Hill and/or its licen- sors be liable for any indirect, incidental, special, punitive, consequential or similar damages that result from the use of or inability to use the work, even if any of them has been advised of the possibility of such damages. This limitation of liability shall apply to any claim or cause whatsoever whether such claim or cause arises in contract, tort or otherwise. DOI: 10.1036/0072224681 This book is dedicated to the following special people that I miss dearly: my mother, Elaine Shapiro, my grandparents Beno and Rose Frank, and my great aunt, Phyllis Koppel. About the Author... Jeffrey Shapirohas been a consulting engineer and IT specialist for more than 13 years. Hehas writtenseveralbooksonsoftwaredevelopment, technology, and telecommunications, and has written numerous articles on technology for magazinessuchasCallCenterandNetworkWorld. A frequent speaker at software development conferences, Jeffrey has worked with hundreds of companies such as Microsoft, Novell, and IBM; a number of public institutions; and several governments. When he is not writing books,heismanagingcomplexdata, e-commerce, and telecommunications projects. Copyright 2001 The McGraw-Hill Companies, Inc. Click Here for Terms of Use. Contents Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxiii Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxv Part I SQL Server 2000 System and Platform Architecture 1 Getting to Know SQL Server 2000 . . . . . . . . . . . . . . . . . . 3 A DBMS for Everyone . . . and Everything . . . . . . . . . . . . . . . . . . . . 4 How Critical Is Your Data? . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Concurrent Access to Data . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Integrity of Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Availability of Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Line-of-Business Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 The Distributed Network Application . . . . . . . . . . . . . . . . . . . . . . . . 11 So What Is SQL Server 2000? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Central Design Themes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Overview of the Core Architectures . . . . . . . . . . . . . . . . . . . . . . . . . . 15 The Database Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 The DBMS or Administration Architecture . . . . . . . . . . . . . 17 v Copyright 2001 The McGraw-Hill Companies, Inc. Click Here for Terms of Use. vi SQL Server 2000: The Complete Reference The Application Development Architecture . . . . . . . . . . . . 18 New Features for Developers . . . . . . . . . . . . . . . . . . . . . . . . 19 SQL Server and the Internet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Virtual Roots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Native XML Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 The Client/Server Architecture . . . . . . . . . . . . . . . . . . . . . . . 25 The Analysis Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 2 Database Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 Introducing Enterprise Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 Introduction to SQL Server Databases . . . . . . . . . . . . . . . . . . . . . . . . 36 The Logical Database Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 Introduction to SQL Server Tables: The Conceptual Level 40 The Physical Database Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . 56 Pages and Extents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 Transaction Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 Uncovering More About SQL Server . . . . . . . . . . . . . . . . . . . . . . . . . 66 3 SQL Server 2000 Client/Server Architecture . . . . . . . . . 67 What Is a C/S DBMS? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68 SQL Server in a Basket . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 C/S Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 Connecting to SQL Server . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 Security and Access Control in SQL Server 2000 . . . . . . . . . . . . . . . 84 Windows Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85 SQL Server 2000 Authentication . . . . . . . . . . . . . . . . . . . . . . 85 Mixed or Dual-Mode Authentication . . . . . . . . . . . . . . . . . . 85 The SQL Server Login IDs . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 The SQL Server Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 The SQL Server Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 Object Ownership and Permissions . . . . . . . . . . . . . . . . . . . 88 The Server-Side Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 The Database Engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 SQL Server Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 Microsoft Search . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 The Microsoft Distributed Transaction Coordinator . . . . . 91 The Network Ahead . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 4 DBMS Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 The TPC Benchmarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 An Overview of the DBMS Components . . . . . . . . . . . . . . . . . . . . . . 97 The Relational Database Engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 Contents vii Memory Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 Page Files and the VMM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 More About Paging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 Address Windowing Extensions . . . . . . . . . . . . . . . . . . . . . . 102 The SQL Server Address Space . . . . . . . . . . . . . . . . . . . . . . . 102 SQL Server I/O Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 SQL Server’s Thread and Task Architecture . . . . . . . . . . . . . . . . . . . 105 SQL Server Transaction Architecture . . . . . . . . . . . . . . . . . . . . . . . . . 107 Isolation, Concurrency, and Locking Architecture . . . . . . . 108 Reading and Writing the Data Pages . . . . . . . . . . . . . . . . . . . . . . . . . 111 How Data Is Saved . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112 SQL, Query Optimization, and Query Processing . . . . . . . . . . . . . . 112 What Is Query Optimization? . . . . . . . . . . . . . . . . . . . . . . . . 114 The Optimization Process . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 Caching and Reusing Execution Plans . . . . . . . . . . . . . . . . . 120 Inside Data Streams, Again . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122 Pulling the Relational Train . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 5 Meta Data Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 What Is Metadata? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128 Metadata Has Context . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128 Meta Data Services in SQL Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129 The Meta Data Coalition and the OMG . . . . . . . . . . . . . . . . . . . . . . . 130 Information Model Fundamentals . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 Information Models and Meta Data Services . . . . . . . . . . . . . . . . . . 132 Overview of Meta Data Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133 Using the Meta Data Browser . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136 Viewing Meta Data in Meta Data Browser . . . . . . . . . . . . . 137 Working with Meta Data Browser as a Standalone Snap-in . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139 Changing the Browse Mode in Meta Data Browser . . . . . . 141 Setting Display Options in Meta Data Browser . . . . . . . . . 141 Working with Contents in Meta Data Browser . . . . . . . . . . 141 Working with Object and Properties in Meta Data Browser . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143 Where to Next . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146 6 Installing SQL Server 2000 . . . . . . . . . . . . . . . . . . . . . . . . 147 General Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148 SQL Server Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150 File Particulars . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150 The Code Samples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151 viii SQL Server 2000: The Complete Reference Setup Types and Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152 Naming the Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153 New Local Install . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155 Choose Authentication Mode . . . . . . . . . . . . . . . . . . . . . . . . 155 Service Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156 Advanced Installation Options . . . . . . . . . . . . . . . . . . . . . . . 157 New Remote Install . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161 Understanding the Upgrade Process . . . . . . . . . . . . . . . . . . . . . . . . . 162 Upgrading the Host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164 Upgrading SQL Server 7.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164 Upgrading Databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166 How to Do the Copy Upgrade . . . . . . . . . . . . . . . . . . . . . . . . 167 Upgrading SQL Server 6.5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168 Client Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168 Language and Internationalization . . . . . . . . . . . . . . . . . . . . . . . . . . . 170 Where to Next . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 Part II SQL Server 2000 Platform Administration 7 Administration Architecture . . . . . . . . . . . . . . . . . . . . . . 175 The Evolution of the SQL Server DBA . . . . . . . . . . . . . . . . . . . . . . . . 176 SQL Server 2000 Administrative Architecture . . . . . . . . . . . . . . . . . 178 The SQL Distributed Management Framework . . . . . . . . . 179 An Introduction to the SQL-DMF APIs . . . . . . . . . . . . . . . . 180 SQL Server and Windows Management Instrumentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182 Transact-SQL and Stored Procedures for DBAs . . . . . . . . . 184 Introducing SQL Server Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184 Getting Started with SQL Server Enterprise Manager . . . . . . . . . . . 186 Server Groups and Connecting to Servers . . . . . . . . . . . . . . 188 Getting Around Enterprise Manager . . . . . . . . . . . . . . . . . . 194 Configuring the Server Instance . . . . . . . . . . . . . . . . . . . . . . 196 The Command Prompt Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200 8 SQL Server Security and Access Control . . . . . . . . . . . . 205 Data Security Primer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207 Objects and Ownership . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207 Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210 Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210 Levels of Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211 Windows Security 101 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213 Trusted Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215 Shared Secrets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216 Contents ix SQL Server Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218 Kerberos Tickets: The Keys to Trusted Access . . . . . . . . . . . . . . . . . 219 Key Distribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220 Kerberos, Trusts, and Login Delegation . . . . . . . . . . . . . . . . 223 IPSec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228 Secure Sockets Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231 Microsoft Certificate Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231 Public Key Infrastructure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231 Digital Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232 Trusted Access Versus Nontrusted Access . . . . . . . . . . . . . . . . . . . . 232 SQL Server Security: The Internal Environment . . . . . . . . . . . . . . . . 233 Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233 Checking Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236 GUIDS for Nontrusted Users . . . . . . . . . . . . . . . . . . . . . . . . . 238 User Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238 Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239 Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240 Managing SQL Server Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244 Creating and Configuring Database Roles . . . . . . . . . . . . . 245 Creating and Configuring Logins . . . . . . . . . . . . . . . . . . . . . 246 Creating and Configuring Users . . . . . . . . . . . . . . . . . . . . . . 248 Auditing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251 SQL Server Profiler . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252 The SQL Server Security Plan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260 DBMS Security Plan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260 Database Security Plan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260 In Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261 9 SQL Server Disaster Recovery . . . . . . . . . . . . . . . . . . . . . 263 Establishing Baselines for Disaster Recovery . . . . . . . . . . . . . . . . . . 264 Transaction Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270 SQL Server 2000 Recovery Architecture . . . . . . . . . . . . . . . . . . . . . . . 272 Understanding the Recovery Models . . . . . . . . . . . . . . . . . . 274 SQL Server 2000 Backup and Restore Architecture . . . . . . . . . . . . . 276 TypesofDatabaseBackupsforSQLServer2000 . . . . . . . . . . . . . . . . 277 Full Database Backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278 Transaction Log Backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278 Differential Database Backups . . . . . . . . . . . . . . . . . . . . . . . . 279 File/Filegroup Backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280 Snapshot Backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281 Backup Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282 Disk Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282 Tape Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282 x SQL Server 2000: The Complete Reference Named Pipes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283 Device Names . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283 Backing Up SQL Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283 Using Enterprise Manager to Back Up SQL Server . . . . . . 284 Using Enterprise Manager to Restore SQL Server . . . . . . . 290 Using T-SQL Backup Scripts . . . . . . . . . . . . . . . . . . . . . . . . . 294 Restoring a Database to a Point in Time . . . . . . . . . . . . . . . 295 Hardware and Media Formats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296 4mm Digital Audiotape (DAT) . . . . . . . . . . . . . . . . . . . . . . . 297 8mm Digital Audiotape (DAT) . . . . . . . . . . . . . . . . . . . . . . . 297 Digital Linear Tape (DLT) . . . . . . . . . . . . . . . . . . . . . . . . . . . 297 Advanced Intelligent Tape (AIT) . . . . . . . . . . . . . . . . . . . . . 298 (QIC) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298 SQL Server Backup Bandwidth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299 SQL Server Backup by Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300 Practicing Scratch and Save . . . . . . . . . . . . . . . . . . . . . . . . . . 300 Rotation Schemes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301 Sleeping at Night . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303 In Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304 10 SQL Server Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . 305 Distributed Databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306 Establishing Replication Requirements . . . . . . . . . . . . . . . . 309 SQL Server Replication Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 310 Types of Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311 Snapshot Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311 Transactional Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312 Merge Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313 Understanding the Replication Options . . . . . . . . . . . . . . . . . . . . . . . 314 Filtering Published Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314 Publishing Database Objects . . . . . . . . . . . . . . . . . . . . . . . . . 315 Publishing Schema Objects . . . . . . . . . . . . . . . . . . . . . . . . . . 315 Updatable Subscriptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315 Transforming Published Data . . . . . . . . . . . . . . . . . . . . . . . . 316 Alternate Synchronization Partners . . . . . . . . . . . . . . . . . . . 316 Getting Started with Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317 Configuring a Publisher . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317 Creating a Publication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319 Designing a Replication Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . 322 Understanding the Physical Replication Models . . . . . . . . 323 In Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.