Understand the database query processing and optimization
Know the basics of transaction management
Understand database security
Use different recovery methods when there is a database failure
Assosa University Design a distributed database system in homogenous and
Computing and Informatics collage heterogeneous environments `
Department of Information Technology Course outline
Course Code: ITec3071 Chapter 1: Query processing and Optimization
Course Title: Advanced Database Management
Degree Program: Information Technology Definitions
Module Name: Database Systems Transforming SQL quires to relational algebra operations
Module Number: 7 Basic Algorithms for Executing Query Operations
Pre-requisites ITec2071 Using Heuristic in Query Optimization
Using Selectivity and Cost Estimates in Query
ECTS Credits (CP): 5 Optimization
Contact Hours (per week) Semantic Query Optimization
Lecture, Tutorial, Lab/Practical, Home Study, Total Chapter 2: Database Security and Authorization
2 0 3 5 10 Introduction to DB Security Issues
Status of the Course: Core Discretionary Access Control Based on Granting
Instructor: Bizuayehu S. /Revoking of Privileges
e-mail:
[email protected] Mandatory Access Control for Multilevel Security
Statistical DB Security
Target Group: 3rd year Information Technology Students
Chapter 3: Transaction Processing Concepts
Year /Semester Year: III, Semester: I
Introduction
Course Description Transaction and System Concepts
This course covers file organizations, storage management, query Properties of Transaction
optimization, transaction management, recovery, and concurrency Schedules and Recoverability
control, database authorization and security. Additional topics include Serializability of Schedules
distributed databases, mobile databases, and integration may also be Transaction Support in SQL
covered. A major component of the course is a database
implementation project using current database languages and systems.
Course Objectives At the end of this course the students will be
able to:
Chapter 4: Concurrency Control Techniques Text Book
Locking Techniques for Concurrency Control Elmasri et al (2011). Fundamentals of Database Systems, 6thed,
Concurrency Control Based ON Timestamp Ordering Pearson education
Multisession Concurrency Control Techniques References
Validation (Optimistic) Concurrency Control Technique 1 Thomas M. Connolly and Carolyn E.Begg. (2004). A step by step
Granularity of Data Items and Multiple Granularity Locking approach to building databases, 2nded.Pearson Education Limited.
Using Locks for Concurrency Control in Indexes 2 Ramon A ,etal. Shaum’s outlines, fundamentals of relational
Chapter 5: Database Recovery Techniques databases
Recovery Concepts 3 David M. Kroenke. (1998). Database processing, 6thed. Prentice
Recovery Concepts Based on Deferred Update Hall
Recovery Concepts Based on Immediate Update 4 Van der Lans (2006). Introduction to SQL, Mastering the relational
Shadow Paging database language. 3rd ed. London,
The ARIES Recovery Algorithm Addis Wesley
Recovery in Multi database Systems 5 Silbershatz A. Korth H andSundarshan (2006).Database System
Chapter 6: Distributed Database System concepts, 5th ed. Boston, McGraw Hill
Distributed Database Concepts
Data Fragmentation, Replication, and Allocation Techniques
for Distributed database Design
Types of Distributed Database Systems
Query processing in Distributed Databases
An over view of Client- Server Architecture and its
Relationship to Distributed database
Assessment Method
Assignments ………………………………………10%
Quiz and test……….…………………………….. 30%
Final examination …………………………..……40%
Project and Lab Exercise …………………………20%