1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32
|
<! "@(#)admin.so 10.1 (Sleepycat) 12/11/98">
<!Copyright 1997, 1998 by Sleepycat Software, Inc. All rights reserved.>
<html>
<body bgcolor=white>
<head>
<title>Berkeley DB Reference Guide: Transaction Protected Applications</title>
<meta name="description" content="Berkeley DB: An embedded database programmatic toolkit.">
<meta name="keywords" content="embedded,database,programmatic,toolkit,b+tree,btr
ee,hash,hashing,transaction,transactions,locking,logging,access method,access me
thods,java,C,C++">
</head>
<h3>Berkeley DB Reference Guide: Transaction Protected Applications</h3>
<p>
<h1 align=center>Administration</h1>
<p>
The second part of building transaction protected applications is the
infrastructure necessary to support a transaction environment.
<p>
There are four components to this infrastructure:
<ul type=disc>
<li>Deadlock Detection
<li>Performing Checkpoints
<li>Archival Procedures
<li>Recovery Procedures
</ul>
<p>
<a href="../../ref/transapp/apps.html"><img src="../../images/prev.gif"></a>
<a href="../../ref/toc.html"><img src="../../images/toc.gif"></a>
<a href="../../ref/transapp/deadlock.html"><img src="../../images/next.gif"></a>
</tt>
</body>
</html>
|