OverviewThis course, suitable for all DBAs working in Db2 for z/OS environments, builds upon the skills taught in the course 'Db2 for z/OS: Database Design, Implementation and Administration'. It provides attendees with an understanding of additional and advanced administration tasks. It also examines in-depth a number of the subjects covered by the earlier course.<br><br>This course is also available for one-company, on-site presentations and for live presentation over the Internet, via the Virtual Classroom Environment service.
PrerequisitesKnowledge of Db2 database design and database administration. This can be gained by attending the RSM course Db2 for z/OS: Database Design, Implementation and Administration.
Delegates will learn how to
- appreciate the latest on-line schema enhancements
- understand the concept and usage of versioning and pending definition changes
- appreciate the enhanced facilities to manage partitioned data
- identify the need for and definition of distinct data types, user-defined functions, triggers and stored procedures
- describe how large object and XML data is defined and held
- understand the concept and use of in-line LOB data
- understand the recovery implications of LOB and XML data
- appreciate the need for and use of specialised table types including materialized query, clone, temporal and archive tables
- understand how row and column level security may be achieved using multi-level security, row permissions and column masks.
OutlineOn-line Schema Enhancements & Versioning
Enhanced ALTER statement; altering data types; altering index keys; altering tablespace types and attributes; restrictions on altering objects; impact of altering objects; pending definition changes; versioning; reclaiming versions.Partition Management
Index defined vs table defined partitioning; adding new partitions; rotating partitions; changing partition boundaries; rebalancing partitions; impact on user tasks.Distinct Data Types
Need for distinct types; defining and using distinct types; distinct type security.User-defined Functions
Need for user defined functions (UDFs); sourced, external and SQL functions; defining UDFs; using UDFs in SQL; UDF security.Triggers
Use of triggers; before, after and 'instead of' triggers; defining triggers; trigger cascading.Stored Procedures
Need for stored procedures; stored procedure environment; external procedures; native SQL procedures; coding and defining stored procedures; stored procedure security.Large Object & XML Data Types
Large object data; relationship between base and auxiliary tables; defining large objects; large object locking considerations; large object logging and recovery considerations; in-line LOB data; XML data support; XML data model; XML data storage; Indexing XML data; XML data backup & recovery considerations.Specialised Table Types
Materialized Query Tables (MQTs); defining MQTs; converting existing tables; populating MQTs; Automatic Query Rewrite (AQR); defining and using clone tables; clone table limitations; exchanging data with clone table; defining and using temporal tables; defining and using archive tables.Row & Column Level Access Control
Multi-level security concepts; security labels; row-level security granularity; effect of multi-level security on data manipulation language statements; row and column access control; row permissions; column masks.Hands-on Exercises
Hands-on exercises complement the course material to assist in full understanding of the subject matter.