Sophie

Sophie

distrib > Fedora > 13 > i386 > media > os > by-pkgid > 38d9966b2e862f62a2028762250d72f3 > files > 5

ruby-bdb-0.6.5-3.fc12.i686.rpm

<?xml version="1.0" ?>
<!DOCTYPE html 
  PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
  "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>bdb.rd</title>
</head>
<body>
<h1><a name="label-0" id="label-0">BDB</a></h1><!-- RDLabel: "BDB" -->
<p><a href="ftp://moulon.inra.fr/pub/ruby/">Download</a></p>
<p>Berkeley DB is an embedded database system that supports keyed access
to data.</p>
<p>Developers may choose to store data in any of several different
storage structures to satisfy the requirements of a particular
application. In database terminology, these storage structures and the
code that operates on them are called access methods.</p>
<h2><a name="label-1" id="label-1">...............................................................</a></h2><!-- RDLabel: "..............................................................." -->
<p>With bdb &gt;= 0.5.5 <var>nil</var> is stored as an empty string (when marshal is not
used).</p>
<p>Open the database with</p>
<pre>"store_nil_as_null" =&gt; true</pre>
<p>if you want the old behavior (<var>nil</var> stored as `\000')</p>
<h2><a name="label-2" id="label-2">...............................................................</a></h2><!-- RDLabel: "..............................................................." -->
<p>The library includes support for the following access methods:</p>
<ul>
<li>B+tree: Stores keys in sorted order, using a default function that does
     lexicographical ordering of keys.</li>
<li>Hashing: Stores records in a hash table for fast searches based
     on strict equality, using a default that hashes on the key as a bit
     string. Extended Linear Hashing modifies the hash function used by the
     table as new records are inserted, in order to keep buckets underfull in
     the steady state.</li>
<li>Fixed and Variable-Length Records: Stores fixed- or
     variable-length records in sequential order. Record numbers may be
     immutable, requiring that new records be added only at the end
     of the database, or mutable, permitting new records to be inserted
     between existing records. </li>
</ul>
<p><a href="docs/env.html">Berkeley DB environnement</a></p>
<p>Berkeley DB environment is an encapsulation of one or more databases,
log files and shared information about the database environment such
as shared memory buffer cache pages.</p>
<p>Acces Methods</p>
<ul>
<li><a href="docs/hashlike.html">Hash like interface</a>
      these are the common methods for BDB::Btree,
      BDB::Hash, BDB::Recno, BDB::Queue</li>
<li><a href="docs/arraylike.html">Array like interface</a>
      methods for BDB::Recnum</li>
</ul>
<p><a href="docs/sequence.html">Sequence</a></p>
<p>A sequence is created with BDB::Common::create_sequence or
BDB::Common::open_sequence (only with db &gt;= 4.3)</p>
<p><a href="docs/transaction.html">Transaction Manager</a></p>
<p>The transaction subsystem makes operations atomic, consistent,
isolated, and durable in the face of system and application
failures. The subsystem requires that the data be properly logged and
locked in order to attain these properties. Berkeley DB contains all
the components necessary to transaction-protect the Berkeley DB access
methods and other forms of data may be protected if they are logged
and locked appropriately.</p>
<p><a href="docs/cursor.html">Cursor operation</a></p>
<p>A database cursor is a sequential pointer to the database entries. It
allows traversal of the database and access to duplicate keyed
entries.  Cursors are used for operating on collections of records,
for iterating over a database, and for saving handles to individual
records, so that they can be modified after they have been read.</p>
<p>See also iterators in <a href="docs/hashlike.html#each">Acces Methods</a></p>
<p><a href="docs/lock.html">Lock system</a></p>
<p>The lock subsystem provides interprocess and intraprocess concurrency
control mechanisms. While the locking system is used extensively by
the Berkeley DB access methods and transaction system, it may also be
used as a stand-alone subsystem to provide concurrency control to any
set of designated resources.</p>
<p><a href="docs/log.html">Logging subsystem</a></p>
<p>The logging subsystem is the logging facility used by Berkeley DB. It
is largely Berkeley DB specific, although it is potentially useful
outside of the Berkeley DB package for applications wanting
write-ahead logging support. Applications wanting to use the log for
purposes other than logging file modifications based on a set of open
file descriptors will almost certainly need to make source code
modifications to the Berkeley DB code base.</p>

</body>
</html>