0% found this document useful (0 votes)
3 views

unit1 R20-DBMS

This document provides an overview of database systems, including their characteristics, advantages, and various data models. It discusses the roles of different database users and the importance of Database Management Systems (DBMS) in managing data efficiently. Additionally, it outlines the differences between DBMS and traditional file systems, emphasizing data independence, security, and the ability to handle multiple user access.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

unit1 R20-DBMS

This document provides an overview of database systems, including their characteristics, advantages, and various data models. It discusses the roles of different database users and the importance of Database Management Systems (DBMS) in managing data efficiently. Additionally, it outlines the differences between DBMS and traditional file systems, emphasizing data independence, security, and the ability to handle multiple user access.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

UNIT – I

Introduction: Database system, Characteristics (Database vs File System), Database Users


(Actors on Scene, Workers behind the scene), Advantages of Data base systems, Database
applications. Brief introduction of different Data Models; Concepts of Schema, Instance and
data independence; Three tier schema architecture for data independence; Database system
structure, environment, Centralized and Client Server architecture for the database.

Data:
It is a collection of raw facts.
The facts that can be recorded and which have implicit meaning
known as'data'. Example:
Customer -----
1. cname.
2. cno.
3. ccity.
Database:
It is a collection of interrelated data.
These can be stored in the form of tables.
A database can be of any size and varying complexity.
A database may be generated and manipulated manually or it may be computerized.
Example:
Customer database consist the fields as cname, cno, and ccity

cname cno ccity

Database System:
It is computerized system, whose overall purpose is to maintain the information and to make
that theInformation is available on demand.
Advantages:
1. Redundancy can be reduced.
2. Inconsistency can be avoided.
3. Data can be shared.
4. Standards can be enforced.
5. Security restrictions can be applied.
6. Integrity can be maintained.
7. Data gathering can be possible.
8. Requirements can be balanced

Database Management System (DBMS):


It is a collection of programs that enables user to create and maintain a database. In other
words it is general-purpose software that provides the users with the processes of defining,
constructing and manipulating the database for various applications

Advantages of DBMS:
1. Data Independence.
2. Efficient Data Access.
3. Data Integrity and security.

Page 1
4. Data administration.
5. Concurrent access and Crash recovery.
6. Reduced Application Development Time.

Characteristics of Database System:


Self-Describing Nature of a Database System
A Database System contains not only the database itself but also the descriptions of data
structure and constraints (meta-data). This information is used by the DBMS software or
database users if needed. This separation makes a database system totally different from the
traditional file-based system in which the data definition is a part of application programs.

Support multiple views of data


A view is a subset of the database which is defined and dedicated for particular users of the
system. Multiple users in the system might have different views of the system. Each view
might contain only the data of interest to a user or a group of users.

Sharing of data and Multiuser system


A multiuser database system must allow multiple users access to the database at the same
time. As a result, the multiuser DBMS must have concurrency control strategies to ensure
several users access to the same data item at the same time, and to do so in a manner that the
data will always be correct – data integrity

Control Data Redundancy


In the Database approach, ideally each data item is stored in only one place in the database.
In some cases redundancy still exists so as to improve system performance, but such
redundancy is controlled and kept to minimum.

Data Sharing
The integration of the whole data in an organization leads to the ability to produce more
information from a given amount of data.

Restricting Unauthorised Access


Not all users of the system have the same accessing privileges. DBMSs should provide a
security subsystem to create and control the user accounts.

Data Independence
System data (Meta Data) descriptions are separated from the application programs. Changes
to the data structure is handled by the DBMS and not embedded in the program.

Transaction Processing
The DBMS must include concurrency control subsystems to ensure that several users trying
to update the same data do so in a controlled manner. The results of any updates to the
database must maintain consistency and validity.

Providing backup and recovery facilities


If the computer system fails in the middle of a complex update process, the recovery
subsystem is responsible for making sure that the database is restored to the stage it was in
before the process started executing.
DBMS vs File system
DBMS FILE SYSTEM

DBMS is a collection of data. In DBMS, the user is File system is a collection of data. In this system, the
not required to write the procedures. user has to write the procedures for managing the
database.

DBMS gives an abstract view of data that hides the File system provides the detail of the data
details. representation and storage of data.

DBMS provides a crash recovery mechanism, i.e., File system doesn't have a crash mechanism, i.e., if
DBMS protects the user from the system failure. the system crashes while entering some data, then
the content of the file will lost.

DBMS provides a good protection mechanism. It is very difficult to protect a file under the file
system.

DBMS contains a wide variety of sophisticated File system can't efficiently store and retrieve the
techniques to store and retrieve the data. data.

DBMS takes care of Concurrent access of data In the File system, concurrent access has many
using some form of locking. problems like redirecting the file while other deleting
some information or updating some information.
Database Users
Actors on Scene
Actors on the Scene These apply to "large" databases, not "personal" databases that are
defined, constructed, and used by a single person via, say, Microsoft Access. Users may be
divided into Those who actually use and control the database content, and those who design,
develop and maintain database applications (called “Actors on the Scene”), and Those who
design and develop the DBMS software and related tools, and the computer systems
operators (called “Workers behind the Scene”).

1. Database Administrator (DBA): This is the chief administrator, who oversees and
manages the database system (including the data and software). Duties include
authorizinguserstoaccessthedatabase,coordinating/monitoring itsuse,acquiring
hardware/softwarefor upgrades, etc.In largeorganizations, theDBA might haveasupport staff.

2. Database Designers: They are responsible for identifying the data to be stored and for
choosing an appropriate way to organize it. They also define views for different categories of
users. The final design must be able to support the requirements of all the user sub-groups.

3. End Users: These are persons who access the database for querying, updating, and report
generation. They are main reason for database's existence!

Casual end users: use database occasionally, needing different information each time; use
query language to specify their requests; typically middle- or high-level managers.

Naive/Parametric end users: Typically the biggest group of users; frequently query/update
the database using standard canned transactions that have been carefully programmed and
tested in advance. Examples: Bank tellers check account balances, post withdrawals/deposits
Reservation clerks for airlines, hotels, etc., check availability of seats/rooms and make
reservations. Shipping clerks (e.g., at UPS) who use buttons, bar code scanners, etc., to
update status of intransit packages.

Sophisticated end users: engineers, scientists, business analysts who implement their own
applications to meet their complex needs.

Stand-alone users: Use "personal" databases, possibly employing a special purpose (e.g.,
financial) software package. Mostly maintain personal databases using ready-to-use packaged
applications

4. System Analysts, Application Programmers, and Software Engineers: System


Analysts: determine needs of end users, especially naive and parametric users, and develop
specifications for canned transactions that meet these needs. Database Management Systems
(10CS54) 2 Application Programmers: Implement, test, document, and maintain programs
that satisfy the specifications mentioned above.
Workers behind the Scene

DBMS system designers/implementers: provide the DBMS software that is at the


foundation of all this.

Tool developers: design and implement software tools facilitating database system Design,
performance monitoring, creation of graphical user interfaces, prototyping, etc.

Operators and maintenance personnel: responsible for the day-to-day operation of the
system.

Advantages of Data base systems


The database management system has a number of advantages as compared to traditional
computer file-based processing approach

1. Controlling Data Redundancy


In non-database systems each application program has its own private files. In this case, the
duplicated copy of the same data is created in many places. In DBMS, all data of an
organization is integrated into a single database file. The data is recorded in only one place in
the database and it is not duplicated.

2. Sharing of Data
In DBMS, data can be shared by authorized users of the organization. The database
administrator manages the data and gives rights to users to access the data. Many users can be
authorized to access the same piece of information simultaneously. The remote users can also
share same data. Similarly, the data of same database can be shared between different
application programs.

3. Data Consistency
By controlling the data redundancy, the data consistency is obtained. If a data item appears
only once, any update to its value has to be performed only once and the updated value is
immediately available to all users. If the DBMS has controlled redundancy, the database
system enforces consistency.
4. Integration of Data
In Database management system, data in database is stored in tables. A single database
contains multiple tables and relationships can be created between tables (or associated data
entities). This makes easy to retrieve and update data.

5. Integration Constraints
Integrity constraints or consistency rules can be applied to database so that the correct data
can be entered into database. The constraints may be applied to data item within a single
record or they may be applied to relationships between records.

6. Data Security
Form is very important object of DBMS. You can create forms very easily and quickly in
DBMS. Once a form is created, it can be used many times and it can be modified very easily.
The created forms are also saved along with database and behave like a software component.
A form provides very easy way (user-friendly) to enter data into database, edit data and
display data from database. The non-technical users can also perform various operations on
database through forms without going into technical details of a database.

7. Report Writers
Most of the DBMSs provide the report writer tools used to create reports. The users can
create very easily and quickly. Once a report is created, it can be used may times and it can
be modified very easily. The created reports are also saved along with database and behave
like a software component.

8. Control over Concurrency


In a computer file-based system, if two users are allowed to access data simultaneously, it is
possible that they will interfere with each other. For example, if both users attempt to perform
update operation on the same record, then one may overwrite the values recorded by
the other. Most databasesmanagement systems have sub-systems to control the concurrency
so that transactions are always recorded with accuracy.

9. Backup and Recovery Procedures


In a computer file-based system, the user creates the backup of data regularly to protect the
valuable data from damage due to failures to the computer system or application program. It
is very timeConsuming method, if amount of data is large. Most of the DBMSs provide the
'backup and recovery' sub-systems that automatically create the backup of data and restore
data if required.

10. Data Independence


The separation of data structure of database from the application program that uses the data is
called data independence. In DBMS, you can easily change the structure of database without
modifying the application program.

Database applications

Applications where we use Database Management Systems are:


Telecom: There is a database to keeps track of the information regarding calls made,
network usage, customer details etc. Without the database systems it is hard to
maintain that huge amount of data that keeps updating every millisecond.
Industry: Where it is a manufacturing unit, warehouse or distribution centre,
eachone needs a database to keep the records of ins and outs. For example distribution
centre should keep a track of the product units that supplied into the centre as well as
the products that got delivered out from the distribution centre on each day; this is
where DBMS comes into picture.
Banking System: For storing customer info, tracking day to day credit and debit
transactions, generating bank statements etc. All this work has been done with the
help of Database management systems.
Education sector: Database systems are frequently used in schools and colleges ot
store and retrieve the data regarding student details, staff details, course details, exam
details, payroll data, attendance details, fees details etc. There is a hell lot amount of
inter-related data that needs to be stored and retrieved in an efficient manner.
Online shopping: You must be aware of the online shopping websites such as
Amazon, Flipkart etc. These sites store the product information, your addresses and
preferences, credit details and provide you the relevant list of products based on your
query. All this involves a Database management system.
Brief introduction of different Data Models
A Database model defines the logical design and structure of a database and defines how data
will be stored, accessed and updated in a database management system. While the Relational
Model is the most widely used database model, there are other models too:
1. Hierarchical Model
2. Network Model
3. Entity-relationship Model
4. Relational Model
5. Object-Oriented Data Models
6. Object-Relational Models

1. Hierarchical Model
 This database model organizes data into a tree-like-structure, with a single root, to
which all the other data is linked. The hierarchy starts from the Root data, and
expands like a tree, adding child nodes to the parent nodes.
 In this model, a child node will only have a single parent node.
 This model efficiently describes many real-world relationships like index of a book,
recipes etc.
 In hierarchical model, data is organized into tree-like structure with one-to-many
relationship between two different types of data, for example, one department can
have many courses, many professors and of-course many students.

2. Network Model
 This is an extension of the Hierarchical model.
 In this model data is organized more like a graph, and are allowed to have more than
one parent node.
 In this database model data is more related as more relationships are established in
this database model.
 Also, as the data is more related, hence accessing the data is also easier and fast.
 This database model was used to map many-to-many data relationships.
 This was the most widely used database model, before Relational Model was
introduced.
3. Entity-relationship Model
 In this database model, relationships are created by dividing object of interest into
entity and its characteristics into attributes.
 Different entities are related using relationships.
 E-R Models are defined to represent the relationships into pictorial form to make it
easier for different stakeholders to understand.
 This model is good to design a database, which can then be turned into tables in
relational model (explained below).
 Let's take an example, if we have to design a School Database, then Student will be
an entity with attributes name, age, address etc. As Address is generally complex, it
can be another entity with attributes street name, pin code, city etc, and there will be
a relationship between them.
 Relationships can also be of different types. To learn about E-R Diagrams in details,
click on the link.

4. Relational Model
 In this model, data is organized in two-dimensional tables and the relationship is
maintained by storing a common field.
 This model was introduced by E.F Codd in 1970, and since then it has been the most
widely used database model, in fact, we can say the only database model used around
the world.
 The basic structure of data in the relational model is tables.
 All the information related to a particular type is stored in rows of that table.
 Hence, tables are also known as relations in relational model.
 In the coming tutorials we will learn how to design tables, normalize them to reduce
data redundancy and how to use Structured Query language to access data from
tables.
5. Object-Oriented Data Models
 Object oriented data model is one of the developed data model and this can hold the
audio, video and graphic files. These consist of data piece and the methods which are
the DBMS instructions.

6. Object-Relational Models
 Most Recent Trend. Started with InformixUniversal Server.
 Relational systems incorporate concepts from object databases leading to
objectrelational.
 Object relation model is a very powerful model but coming to it’s design it is quiet
complex.
 This complexity is not problem because it gives efficient results and widespread with
huge applications.
 It has a feature which allows working with other models like working with the very
known relation model.
ConceptsofSchema,Instanceand dataindependence

Database Schema
A database schema is the skeleton structure that represents the logical view of the entire
database. It defines how the data is organized and how the relations among them are
associated. It formulates all the constraints that are to be applied on the data.

A database schema defines its entities and the relationship among them. It contains a
descriptive detail of the database, which can be depicted by means of schema diagrams. It’s
the database designers who design the schema to help programmers understand the database
and make it useful.

A database schema can be divided broadly into two categories −


 Physical Database Schema − this schema pertains to the actual storage of data and
its form ofstorage like files, indices, etc. It defines how the data will be stored in a
secondary storage.
 Logical Database Schema − this schema defines all the logical constraints that need
to beapplied on the data stored. It defines tables, views, and integrity constraints.

Database Instance

It is important that we distinguish these two terms individually. Database schema is the
skeleton of database. It is designed when the database doesn't exist at all. Once the database
is operational, it is very difficult to make any changes to it. A database schema does not
contain any data or information.
A database instance is a state of operational database with data at any given time. It contains
a snapshot of the database. Database instances tend to change with time. A DBMS ensures
that its every instance (state) is in a valid state, by diligently following all the validations,
constraints, and conditions that the database designers have imposed.
If a database system is not multi-layered, then it becomes difficult to make any changes in
the database system. Database systems are designed in multi-layers as we learnt earlier.
Data Independence
A database system normally contains a lot of data in addition to users’ data. For example, it
stores data about data, known as metadata, to locate and retrieve data easily. It is rather
difficult to modify or update a set of metadata once it is stored in the database. But as a
DBMS expands, it needs to change over time to satisfy the requirements of the users. If the
entire data is dependent, it would become a tedious and highly complex job.
Data independence is ability to modify a schema definition in one level without affecting a
schema definition in the next higher level.

There are two levels of data independence:

1. Physical Data Independence


2. Logical Data Independence

1. Physical Data Independence:


Physical Data Independence is the ability to modify the physical schema without
requiring any change in application programs.
Modifications at the internal levels are occasionally necessary to improve
performance. Possible modifications at internal levels are change in file structures,
compression techniques, hashing algorithms, storage devices, etc.
Physical data independence separates conceptual levels from the internal levels.
This allows providing a logical description of the database without the need to
specifyphysical structures.
Comparatively, it is easy to achieve physical data independence.

2. Logical Data Independence:


Logical data independence is ability to modify the conceptual schema without
requiring any change in application programs.
Modifications at the logical levels are necessary whenever the logical structure
of thedatabase is altered.
Logical data independence separates external level from the conceptual view.
Comparatively it is difficult to achieve logical data independence.
Application programs are heavily dependent on logical structures of the data they
access.so any change in logical structure also requires programs to change.
Three tier schema architecture for data independence

EXTERNAL LEVEL (highest level)


The user’s view of the database.
Consists of a number of different external views of the DB.
Describes part of the DB for particular group of users.
Provides a powerful and flexible security mechanism by hiding parts of the DB from
certain users. The user is not aware of the existence of any attributes that are missing
from the view
It permits users to access data in a way that is customized to their needs, so that the
same data can be seen by different users in different ways, at the same time.

CONCEPTUAL LEVEL
The logical structure of the entire database as seen by DBA.
What data is stored in the database
The relationships among the data.
Complete view of the data requirements of the organization, independent of any
storageconsideration.
nts: - ∀ entities, Represe
information on dataattributes, relations information
- security, integrity - constraints on data
Supports each-external view:
semantic
any
data available to auser must be contained in, or derivable from the conceptual level.

INTERNAL LEVEL
Physical representation of the DB on the computer.
How the data is stored in the database.
Physical implementation of the DB to achieve optimal run– time performance and
storage space utilization. - Storage space allocation for data and indexes - Record
description for storage - Record placement - Data compression, encryption
Database System Structure

Applications:-Itcanbeconsideredasauserfriendlywebpagewheretheuserenters
therequests.Herehesimply entersthedetailsthatheneedsandpressesbuttonsto get thedata

End User: - They are the real users of the database. They can be developers, designers,
administrator or the actual users of the database.

DDL: - Data Definition Language (DDL) is a query fired to create database, schema, tables,
mappings etc in the database. These are the commands used to create the objects like tables,
indexes in the database for the first time. In other words, they create structure of the database.

DDL Compiler: - This part of database is responsible for processing the DDL
commands. That means these compiler actually breaks down the command into machine
understandable codes. It is also responsible for storing the metadata information like table
name, space used by it, number of columns in it, mapping information etc.

DML Compiler: - When the user inserts, deletes, updates or retrieves the record from the
database, he will be sending request which he understands by pressing some buttons. But for
the database to work/understand the request, it should be broken down to object code. This is
done by this compiler. One can imagine this as when a person is asked some question, how
this is broken down into waves to reach the brain!

Query Optimizer: - When user fires some request, he is least bothered how it will be fired
on the database. He is not all aware of database or its way of performance. But whatever be
the request, it should be efficient enough to fetch, insert, update or delete the data from the
database. The query optimizer decides the best way to execute the user request which is
received from the DML compiler. It is similar to selecting the best nerve to carry the waves
to brain!

Stored Data Manager: - This is also known as Database Control System. It is one the main
central system of the database. It is responsible for various tasks
It converts the requests received from query optimizer to machine
understandable form. It makes actual request inside the database. It is like fetching
the exact part of the brain to answer.
It helps to maintain consistency and integrity by applying the constraints.
That means, it does not allow inserting / updating / deleting any data if it has child
entry. Similarly it does not allow entering anyduplicate value into database tables.
It controls concurrent access. If there is multiple users accessing the database at the
same time, it makes sure, all of them see correct data. It guarantees that there is no
data loss or data mismatch happens between the transactions of multiple users.
It helps to back up the database and recover data whenever required. Since it is a
hugedatabase and when there is any unexpected exploit of transaction, and reverting the
changes are not easy. It maintains the backup of all data, so that it can be recovered.

Data Files: - It has the real data stored in it. It can be stored as magnetic tapes, magnetic
disks or optical disks.

Compiled DML: - Some of the processed DML statements (insert, update, delete) are stored
in it so that if there is similar requests, it will be re-used.

Data Dictionary: - It contains all the information about the database. As the name suggests,
it is the dictionary of all the data items. It contains description of all the tables, view,
materialized views, constraints, indexes, triggers etc.

Database system environment

1. Hardware: Hardware refers to all of the system's physical devices; for example,
computers storagedevices, printers, network devices and etc.

2. Software: Tomakethedatabasesystemworkproperly,threetypesofsoftware areneeded:


Operatingsystem, DBMSsoftware,and application programs.

a) Operatingsystem:It managesallhardwarecomponentsandallowsothersoftwaretorun on the


computers. Examples of operatingsystem softwareincludeWindows, Linuxand etc.

b) DBMSsoftware:Itmanagesthedatabasewithinthedatabasesystem.Someexamplesof
DBMSsoftwareincludeOracle,Access, MySqland etc.

c) Applicationprograms:These areusedtoaccessandmanipulatedataintheDBMS
and to managethecomputerenvironmentinwhichdataaccessandmanipulationtake place.
Applicationsprogramsaremostcommonlyusedtoaccessdatatogeneratereports. Most
of the application programs provide GUI.

3. People: Thiscomponentincludesallusersofthedatabasesystem.Accordingtothejob nature,


five types of users can be identified: systems administrators, database administrators,
database designers, systems analysts and programmers, and end users.

a) Systemadministrators:Theysupervisethe databasesystem'sgeneraloperations.

b) Databaseadministrators: Theyare alsoknownasDBAs.


TheymanagetheDBMSand ensurethat the databaseis functioningproperly.

c) Databasedesigners:Theydesignthedatabasestructure.
TheyarethedatabaseArchitects. As this isverycritical, thedesigner's job responsibilities
areincreased.
d) Systems analysts and programmers: They design and implement the application
programs. Theydesignandcreatethedataentryscreens,reports,andproceduresthroughwhichend
users canaccess and manipulate thedata.

e) End users: They are the people who use the application programs to run the
organization'sdaily operations. For example, sales-clerks, supervisors, managers are
classified as endusers.

4. Procedures: Procedures are the instructions and rules that supervise the design and use of
the databasesystem. Procedures are a critical component of the system. Procedures play an
important role in a company becausethey enforce the standards by which business is
conducted in an organization

5. Data: Data refers the collection of facts stored in the database. Because data are the raw
material from whichinformation is generated, no database can exist without database.
Centralized Architecture of DBMS

Earlier architectures used mainframe computers to provide the main processing


for al system functions, including user application programs and user interface
programs, as well as all the DBMS functionality.
The reason was that most users accessed such systems via computer terminals
that didnot have processing power and only provided display capabilities.
Therefore, all processing was performed remotely on the computer system, and only
display information and controls were sent from the computer to the display
terminals, which were connected to the central computer via various types of
communications networks.
At first, database systems used these computers similarly to how they had used
display terminals, so that the DBMS itself was still a centralized DBMS in which all
the DBMS functionality, application program execution, and user inter-face
processing were carried out on one machine

Basic Client/Server Architectures


The client/server architecture was developed to deal with computing
environments ni which a large number of PCs, workstations, file servers, printers,
database servers, Web servers, e-mail servers, and other software and equipment are
connected via a network.
The idea is to define specialized servers with specific functionalities.
For example, it is possible to connect a number of PCs or small workstations as
clients to a file server that maintains the files of the client machines.
Another machine can be designated as a printer server by being connected to
variousprinters; all print requests by the clients are forwarded to this machine.
Web servers or e-mail servers also fall into the specialized server category.
The resources provided by specialized servers can be accessed by many client
machines.
The client machines provide the user with the appropriate interfaces to utilize these
servers, as well as with local processing power to run local applications.

Three-Tier Client Server Architecture


Many Web applications use an architecture called the three-tier architecture, which adds an
intermediate layer between the client and the database server, as illustrated in Figure below

This intermediate layer or middle tier is called the application server or the Wbe
server, depending on the application.
This server plays an intermediary role by run-ning application programs and storing
business rules (procedures or constraints) that are used to access data from the
database server.
It can also improve database security by checking a client’s credentials before
forwarding a request to the data-base server.
Clients contain GUI interfaces and some additional application-specific business
rules. The intermediate server accepts requests from the client, processes the request
and sends database queries and commands to the database server, and then acts as a
conduit for passing (partially) processed data from the database server to the clients,
where it may be processed further and filtered to be presented to users in GUI format.
Thus, the user interface, application rules, and data access act as the three tiers.
Basic Client/Server Architectures
There are three types of Client/Server Architectures:
1. Single tier architecture
2. Two tier architecture
3. Three tier architecture

1. Single tier architecture


The simplest of Database Architecture are 1 tier where the Client, Server, and Database all
reside on the same machine.
In this type of architecture, the database is readily available on the client machine; any
request made by client doesn’t n require a network connection to perfor m the action on the
database.
For example, let’s say you want to fetch the records of employee from t he database and the
database is available on your computer system, so the request to fetch e mployee details will
be done by your computer and the records will be fetched from the database by your
computer as well. This type of system is generally referred as local database system.

2. Two tier architecture

A two-tier architecture is a database architecture where


1. Presentation layer runs on a client (PC, Mobile, Tablet, etc)
2. Data is stored on a Server.
In two-tier architecture, the Database system is present at the server machine and the DBMS
application is present at the client machine, these two machines are connected with each other
through a reliable network as shown in the above diagram.
Whenever client machine makes a request to access the database present at server using a
query language like sql, the server perform the request on the database and returns the result
back to the client. The application connection interface such as JDBC, ODBC are used for the
interaction between server and client.

3. Three tier architecture

3- tier schema is an extension of the 2-tier architecture. 3-tier architecture has following layers
1. Presentation layer (your PC, Tablet, Mobile, etc.)
2. Application layer (server)
3. Database Server
In three-tier architecture, another layer is present between the clientmachine and server
machine. In this architecture, the client application doesn’t communicate directly with the
database systems present at the server machine, rather the client application communicates
with server application and t he server application internally communicates with the database
system present at the server.

You might also like