The course will enable the students to
Course | Learning Outcome (at course level) | Learning and teaching strategies | Assessment Strategies | |
Course Code | Course Title | |||
24CBCA 405 | DBMS-II(Theory)
| CO223. Analyse ACID properties of transactions and their implications on system correctness and performance. CO224. Evaluate concurrency control techniques and its role in maintaining the database’s integrity. CO225. Exploring the Database recovery and security mechanisms. CO226. Analyzing Emerging Databases and exploring their architectures CO227. Implement different types of DDL and DML statements. CO228. Contribute effectively in course- specific interaction. | Approach in teaching: Interactive Lectures, Discussion, Reading assignments, Demonstration.
Learning activities for the students: Self learning assignments, Effective questions, Seminar presentation, Giving tasks. | Class test, Semester end examinations, Quiz, Assignments, Presentation. |
Transaction Processing
Operations of Transaction, ACID Properties of Transaction, Atomicity, Consistency, Isolation, Durability, States of Transaction, Active State, Partially Committed, Committed, Failed State, Aborted, Transaction Schedule, Serial Schedule, Non-serial Schedule, Serializable Schedule, Serializability, Conflict Serializable Schedule, Conflicting Operations, Conflict Equivalent, View Serializability, View Equivalent
Concurrency Control
Problems of Concurrency Control, Lost Update Problem, Dirty Read, Inconsistent Retrievals Problem, Concurrency Control Protocol, Lock-Based Protocol, Types of Lock Protocols, Simplistic Lock Protocol, Pre-claiming Lock Protocol, Two-Phase Locking (2PL), Strict Two-Phase Locking (Strict-2PL), Timestamp Ordering Protocol, Validation Based Protocol, Thomas Write Rule, Multiple Granularity
Database Recovery & Security Database Recovery:
Concepts, Recovery outline, Caching of Disk blocks, Write ahead logging, Steal/No Steal and Force/No Force, Checkpoints in the System Log and Fuzzy Check pointing, Transaction Rollback. Recovery Techniques Based on Deferred Update and on Immediate Update.
Database Integrity and Security: Domain constraints, Referential Integrity, Introduction to Assertions, Security violation and Authorization.
Emerging Databases Cloud-Based Database Solutions:
Create Tables with constraints, Create, Open, and Remove Databases.
SQL Functions- String, Maths, Date & Time, DML Commands: Group By with having Clause, Queries and Sub-queries, Cartesian Products, Equi Joins, DDL Commands: Alter Table, Drop Table
Introduction to NOSQL: Features, Advantages, Disadvantages, SQL Vs NoSQL, Types of NOSQL Database
Suggested READINGS:
e -RESOURCES:
JOURNALS: