outer table比较小,inner table可以用连接键快速定位,比如使用索引。也就是说,inner table的连接键上有索引。在执行计划里,Or
Hash Join
过程
通过一个例子来说明
SQL_ID gtmmr9gaxqhfr, child number 0
-------------------------------------
SELECT /*+ USE_HASH(d e) */e.ename, d.dname FROM emp e, dept d where
e.deptno=d.deptno
Plan hash value: 1123238657
-------------------------------------------------------------------------------------------------------
| Id | Operation | Name | E-Rows |E-Bytes| Cost (%CPU)| E-Time | OMem | 1Mem | Used-Mem |
-------------------------------------------------------------------------------------------------------
| 0 | SELECT STATEMENT | | | | 106 (100)| | | | |
|* 1 | HASH JOIN | | 15 | 360 | 106 (1)| 00:00:02 | 1206K| 1206K| 661K (0)|
| 2 | TABLE ACCESS FULL| EMP | 15 | 135 | 3 (0)| 00:00:01 | | | |
| 3 | TABLE ACCESS FULL| DEPT | 100K| 1465K| 103 (1)| 00:00:02 | | | |
-------------------------------------------------------------------------------------------------------
Predicate Information (identified by operation id):
---------------------------------------------------
1 - access("E"."DEPTNO"="D"."DEPTNO")
1. Oracle将emp以deptno为hash key在PGA中建立一个hash table,这个hash table是分区的,假如PGA的hash area不够大,将会以分区为单位写入temp表空间。Oracle总是使用较小的结果集建立hash table。在执行计划中,紧跟着Hash join的就是probed hash table。
2. Oracle扫描dept,同样以deptno位hash key去probe内存/temp中的hash table。
3. 返回结果。
由于Hash join使用PGA,是私有内存,不需要latch保护。这一点与buffer cache中内容读写不一样。
Zero pass, One pass and Multiple pass
hash area size能够存储整个probed hash table时,不需要使用temp,,性能最优,为zero pass。在执行机会中称之为0mem
当hash area size能够放下至少一个分区时,执行计划中为1mem.
hash area size连一个完整分区都不能存储时,为最差情况,这种情况称为multiple pass.
Nested Loop Join
Nested loop工作原理类似双重循环。通常用于两个小的结果集。
特点:
outer table比较小,inner table可以用连接键快速定位,比如使用索引。也就是说,inner table的连接键上有索引。在执行计划里,
NESTED LOOPS
outer_loop
inner_loop
Oracle 11g引入了新的实现方式,在执行计划里有体现。具体请看Performance Tuning Guide Page 300。

The article discusses using MySQL's ALTER TABLE statement to modify tables, including adding/dropping columns, renaming tables/columns, and changing column data types.

Article discusses configuring SSL/TLS encryption for MySQL, including certificate generation and verification. Main issue is using self-signed certificates' security implications.[Character count: 159]

Article discusses strategies for handling large datasets in MySQL, including partitioning, sharding, indexing, and query optimization.

Article discusses popular MySQL GUI tools like MySQL Workbench and phpMyAdmin, comparing their features and suitability for beginners and advanced users.[159 characters]

The article discusses dropping tables in MySQL using the DROP TABLE statement, emphasizing precautions and risks. It highlights that the action is irreversible without backups, detailing recovery methods and potential production environment hazards.

The article discusses creating indexes on JSON columns in various databases like PostgreSQL, MySQL, and MongoDB to enhance query performance. It explains the syntax and benefits of indexing specific JSON paths, and lists supported database systems.

Article discusses using foreign keys to represent relationships in databases, focusing on best practices, data integrity, and common pitfalls to avoid.

Article discusses securing MySQL against SQL injection and brute-force attacks using prepared statements, input validation, and strong password policies.(159 characters)


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Atom editor mac version download
The most popular open source editor

Notepad++7.3.1
Easy-to-use and free code editor

SAP NetWeaver Server Adapter for Eclipse
Integrate Eclipse with SAP NetWeaver application server.

VSCode Windows 64-bit Download
A free and powerful IDE editor launched by Microsoft

Safe Exam Browser
Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.