Sie sind auf Seite 1von 2

OBJECT ORIENTED DATABASES

MID-TREM COURSE OUTLINE


1.

Lecture # 3 (Chapter 25 Introduction to


Object DBMS)
Requirement of Advance
Database Application
Weakness of RDBMS
Object Oriented Concepts
o Object Identity ( and its
implementation and
advantages)
SubClass, SuperClass and
Inheritance
Overriding, Overloading and
polymorphism (examples also)
Storing Objects in RDBMS
Mapping Class to Relation
Relationships and Referential
Integrity

2.

Lecture # 4
(Object Relational
Mapping and Hibernate)
Why ORM with example
Five Mismatch Problems
ORM advantages and Solutions
Hibernate Advantage
Hibernate High Level and
Detailed View
Different Objects (Configuration,
Session, Transaction, Query
..etc.)
Hibernate Mapping Files
Session and Criteria Interface
Advantages of ORM
Mappings (Collection,
Association, Component)

3.

Lecture # 5
(Chapter 14 Object
Relational Databases)
Stages in OO Systems
Impedance Mismatch between
Object and Relation
Call Level API
SQL Mapping Framework
ORM Framework
Proprietary Framework
Examples of Hibernate Mappings
Schema and Conversion
examples
Hibernate HQL Query Language

4.

Lecture # 6
(Object Database
Manifesto)
Persistent Programming
Language
Object Oriented Database
Manifesto
(OO system features and
Database features)
ODMG Object Model
Objects and Literal types
Data Types and Object Classes
Declarative Query Language

5.

Lecture # 7
(Object Persistence &
Db4o)
Principle of Persistence
Range of Persistence
Problem of Java Object
Serialization
Persistent Programming
Language
P Jama and its Architecture
Creating Persistent Data
Persistence Independence
Accessing Persistent Objects
Introducing Db4o and its
architecture
Object Container
Storing and Retrieving Objects
Native and SODA Queries
Updating and Deleting Objects

OBJECT ORIENTED DATABASES


REMAINING COURSE OUTLINE
6.

Lecture # 8 (Query Processing in


OODBS Research Paper)
Important Issues in Query
Processing in OODBMS
Query Processing Methodology
Optimizer Architecture
Algebraic Optimization
Path Expression
Query Execution Algorithms

7.

Lecture # 4
(Query Optimization
Lecture)
Why Query Optimization
Need for Query Optimization
Class Problem
Four Stages of Query
Optimization

8.

Lecture # 9
(Security of OODBMS
Research Paper)
Security Challenges of next
generation OODBMS
DAC in RDBMS and OODBMS
DAC Issues and Approaches
Mandatory Access Control
Mandatory Security Models
Role Based Access Control

9.

Lecture # 11 (Security)
Authorization and Authentication
Discretionary Access Control
Mandatory Access Control
Bell-LaPadula Model
Encryption, DES and RSA
Security in Microsoft Access and
Oracle
Secure Electronic Transaction

10. Lecture # 10 & 11 (Commercial


OODBMS)
C++ Application Development
Process
Storage Classes
Logical Storage Model
Containers
Associations
Defining Associations
Retrieving Objects
Post Processing
Required Steps
Object Deletion and Queries
Versant Object Database
Architecture
Java Versant Interface
JVI Layers
Connecting to Databases
Updating Objects
Deleting Objects

Das könnte Ihnen auch gefallen