<!--$Id: what.so,v 10.23 2001/03/01 15:58:06 bostic Exp $-->
<!--Copyright (c) 1997,2008 Oracle.  All rights reserved.-->
<!--See the file LICENSE for redistribution information.-->
<html>
<head>
<title>Berkeley DB Reference Guide: What other services does Berkeley DB provide?</title>
<meta name="description" content="Berkeley DB: An embedded database programmatic toolkit.">
<meta name="keywords" content="embedded,database,programmatic,toolkit,btree,hash,hashing,transaction,transactions,locking,logging,access method,access methods,Java,C,C++">
</head>
<body bgcolor=white>
<table width="100%"><tr valign=top>
<td><b><dl><dt>Berkeley DB Reference Guide:<dd>Introduction</dl></b></td>
<td align=right><a href="../intro/need.html"><img src="../../images/prev.gif" alt="Prev"></a><a href="../toc.html"><img src="../../images/ref.gif" alt="Ref"></a><a href="../intro/distrib.html"><img src="../../images/next.gif" alt="Next"></a>
</td></tr></table>
<p align=center><b>What other services does Berkeley DB provide?</b></p>
<p>Berkeley DB also provides core database services to developers.  These
services include:</p>
<br>
<b>Page cache management:</b><ul compact><li>The page cache provides fast access to a cache of database pages,
handling the I/O associated with the cache to ensure that dirty pages
are written back to the file system and that new pages are allocated on
demand.  Applications may use the Berkeley DB shared memory buffer manager to
serve their own files and pages.</ul>
<b>Transactions and logging:</b><ul compact><li>The transaction and logging systems provide recoverability and atomicity
for multiple database operations. The transaction system uses two-phase
locking and write-ahead logging protocols to ensure that database
operations may be undone or redone in the case of application or system
failure.  Applications may use Berkeley DB transaction and logging subsystems
to protect their own data structures and operations from application or
system failure.</ul>
<b>Locking:</b><ul compact><li>The locking system provides multiple reader or single writer access to
objects.  The Berkeley DB access methods use the locking system to acquire
the right to read or write database pages.  Applications may use the
Berkeley DB locking subsystem to support their own locking needs.</ul>
<br>
<p>By combining the page cache, transaction, locking, and logging systems,
Berkeley DB provides the same services found in much larger, more complex and
more expensive database systems.  Berkeley DB supports multiple simultaneous
readers and writers and guarantees that all changes are recoverable, even
in the case of a catastrophic hardware failure during a database update.</p>
<p>Developers may select some or all of the core database services for any
access method or database.  Therefore, it is possible to choose the
appropriate storage structure and the right degrees of concurrency and
recoverability for any application.  In addition, some of the subsystems
(for example, the Locking subsystem) can be called separately from the
Berkeley DB access method.  As a result, developers can integrate non-database
objects into their transactional applications using Berkeley DB.</p>
<table width="100%"><tr><td><br></td><td align=right><a href="../intro/need.html"><img src="../../images/prev.gif" alt="Prev"></a><a href="../toc.html"><img src="../../images/ref.gif" alt="Ref"></a><a href="../intro/distrib.html"><img src="../../images/next.gif" alt="Next"></a>
</td></tr></table>
<p><font size=1>Copyright (c) 1996,2008 Oracle.  All rights reserved.</font>
</body>
</html>
