SlideShare a Scribd company logo
1 of 10
SERVER SYSTEM ARCHITECTURE
SERVER SYSTEM ARCHITECTURE
 Server systems can be broadly categorized into two kinds:
 transaction servers which are widely used in relational database
systems, and
 data servers, used in object-oriented database systems
TRANSACTION SERVERS
 Also called query server systems or SQL server systems
o Clients send requests to the server
o Transactions are executed at the server
o Results are shipped back to the client.
 Requests are specified in SQL, and communicated to the server through a remote
procedure call (RPC) mechanism.
 Transactional RPC allows many RPC calls to form a transaction.
 Open Database Connectivity (ODBC) is a C language application program interface
standard from Microsoft for connecting to a server, sending SQL requests, and receiving
results.
 JDBC standard is similar to ODBC, for Java
TRANSACTION SERVER PROCESS STRUCTURE
 A typical transaction server consists of multiple processes accessing data in shared
memory.
 Server processes
o These receive user queries (transactions), execute them and send results back
o Processes may be multithreaded, allowing a single process to execute several user
queries concurrently
o Typically multiple multithreaded server processes
 Lock manager process
o More on this later
 Database writer process
o Output modified buffer blocks to disks continually
TRANSACTION SERVER PROCESSES
(CONT.)
 Log writer process
o Server processes simply add log records to log record buffer
o Log writer process outputs log records to stable storage.
 Checkpoint process
o Performs periodic checkpoints
 Process monitor process
o Monitors other processes, and takes recovery actions if any of the other processes fail
 E.g., aborting any transactions being executed by a server process and restarting it
TRANSACTION SYSTEM PROCESSES (CONT.)
TRANSACTION SYSTEM PROCESSES (CONT.)
 Shared memory contains shared data
o Buffer pool
o Lock table
o Log buffer
o Cached query plans (reused if same query submitted again)
 All database processes can access shared memory
 To ensure that no two processes are accessing the same data structure at the same time,
databases systems implement mutual exclusion using either
o Operating system semaphores
o Atomic instructions such as test-and-set
 To avoid overhead of inter process communication for lock request/grant, each database
process operates directly on the lock table
o instead of sending requests to lock manager process
 Lock manager process still used for deadlock detection
DATA SERVERS
 Used in high-speed LANs, in cases where
 The clients are comparable in processing power to the server
 The tasks to be executed are compute intensive.
 Data are shipped to clients where processing is performed, and then shipped results
back to the server.
 This architecture requires full back-end functionality at the clients.
 Used in many object-oriented database systems
 Issues:
 Page-Shipping versus Item-Shipping
 Locking
 Data Caching
 Lock Caching
DATA SERVERS (CONT.)
 Page-shipping versus item-shipping
 Smaller unit of shipping  more messages
 Worth prefetching related items along with requested item
 Page shipping can be thought of as a form of prefetching
 Locking
 Overhead of requesting and getting locks from server is high due to message delays
 Can grant locks on requested and prefetched items; with page shipping, transaction is
granted lock on whole page.
 Locks on a prefetched item can be P{called back} by the server, and returned by client
transaction if the prefetched item has not been used.
 Locks on the page can be deescalated to locks on items in the page when there are lock
conflicts. Locks on unused items can then be returned to server.
DATA SERVERS (CONT.)
 Data Caching
 Data can be cached at client even in between transactions
 But check that data is up-to-date before it is used (cache coherency)
 Check can be done when requesting lock on data item
 Lock Caching
 Locks can be retained by client system even in between transactions
 Transactions can acquire cached locks locally, without contacting server
 Server calls back locks from clients when it receives conflicting lock request. Client
returns lock once no local transaction is using it.
 Similar to de-escalation, but across transactions.

More Related Content

What's hot

Distributed Database Management System
Distributed Database Management SystemDistributed Database Management System
Distributed Database Management SystemAAKANKSHA JAIN
 
Distributed dbms architectures
Distributed dbms architecturesDistributed dbms architectures
Distributed dbms architecturesPooja Dixit
 
Introduction to distributed database
Introduction to distributed databaseIntroduction to distributed database
Introduction to distributed databaseSonia Panesar
 
Concurrency Control in Database Management System
Concurrency Control in Database Management SystemConcurrency Control in Database Management System
Concurrency Control in Database Management SystemJanki Shah
 
Data base security & integrity
Data base security &  integrityData base security &  integrity
Data base security & integrityPooja Dixit
 
Transaction management and concurrency control
Transaction management and concurrency controlTransaction management and concurrency control
Transaction management and concurrency controlDhani Ahmad
 
Distributed Query Processing
Distributed Query ProcessingDistributed Query Processing
Distributed Query ProcessingMythili Kannan
 
Distributed databases
Distributed databasesDistributed databases
Distributed databasessourabhdave
 
Concurrency Control in Distributed Database.
Concurrency Control in Distributed Database.Concurrency Control in Distributed Database.
Concurrency Control in Distributed Database.Meghaj Mallick
 
15. Transactions in DBMS
15. Transactions in DBMS15. Transactions in DBMS
15. Transactions in DBMSkoolkampus
 

What's hot (20)

Distributed Database Management System
Distributed Database Management SystemDistributed Database Management System
Distributed Database Management System
 
The CAP Theorem
The CAP Theorem The CAP Theorem
The CAP Theorem
 
Replication in Distributed Systems
Replication in Distributed SystemsReplication in Distributed Systems
Replication in Distributed Systems
 
Lec 7 query processing
Lec 7 query processingLec 7 query processing
Lec 7 query processing
 
Distributed dbms architectures
Distributed dbms architecturesDistributed dbms architectures
Distributed dbms architectures
 
Introduction to distributed database
Introduction to distributed databaseIntroduction to distributed database
Introduction to distributed database
 
Concurrency Control in Database Management System
Concurrency Control in Database Management SystemConcurrency Control in Database Management System
Concurrency Control in Database Management System
 
Data base security & integrity
Data base security &  integrityData base security &  integrity
Data base security & integrity
 
Demand paging
Demand pagingDemand paging
Demand paging
 
Temporal database
Temporal databaseTemporal database
Temporal database
 
Distributed database
Distributed databaseDistributed database
Distributed database
 
Concurrency Control.
Concurrency Control.Concurrency Control.
Concurrency Control.
 
Transaction management and concurrency control
Transaction management and concurrency controlTransaction management and concurrency control
Transaction management and concurrency control
 
Distributed Query Processing
Distributed Query ProcessingDistributed Query Processing
Distributed Query Processing
 
Distributed databases
Distributed databasesDistributed databases
Distributed databases
 
Deadlock Prevention
Deadlock PreventionDeadlock Prevention
Deadlock Prevention
 
Database recovery
Database recoveryDatabase recovery
Database recovery
 
Concurrency Control in Distributed Database.
Concurrency Control in Distributed Database.Concurrency Control in Distributed Database.
Concurrency Control in Distributed Database.
 
15. Transactions in DBMS
15. Transactions in DBMS15. Transactions in DBMS
15. Transactions in DBMS
 
Object Based Databases
Object Based DatabasesObject Based Databases
Object Based Databases
 

Similar to Server system architecture

Similar to Server system architecture (20)

Csc concepts
Csc conceptsCsc concepts
Csc concepts
 
Sql Server
Sql ServerSql Server
Sql Server
 
Chapter 3-Processes.ppt
Chapter 3-Processes.pptChapter 3-Processes.ppt
Chapter 3-Processes.ppt
 
ScalabilityAvailability
ScalabilityAvailabilityScalabilityAvailability
ScalabilityAvailability
 
11g architecture
11g architecture11g architecture
11g architecture
 
Sayed database system_architecture
Sayed database system_architectureSayed database system_architecture
Sayed database system_architecture
 
Sayed database system_architecture
Sayed database system_architectureSayed database system_architecture
Sayed database system_architecture
 
Database architecture
Database architectureDatabase architecture
Database architecture
 
EAI design patterns/best practices
EAI design patterns/best practicesEAI design patterns/best practices
EAI design patterns/best practices
 
Client server
Client serverClient server
Client server
 
Ch18
Ch18Ch18
Ch18
 
Cookie
CookieCookie
Cookie
 
High volume real time contiguous etl and audit
High volume real time contiguous etl and auditHigh volume real time contiguous etl and audit
High volume real time contiguous etl and audit
 
Chapter 3-Processes2.pptx
Chapter 3-Processes2.pptxChapter 3-Processes2.pptx
Chapter 3-Processes2.pptx
 
Light sayed database_system_architecture
Light sayed database_system_architectureLight sayed database_system_architecture
Light sayed database_system_architecture
 
Light sayed database_system_architecture
Light sayed database_system_architectureLight sayed database_system_architecture
Light sayed database_system_architecture
 
introduction to Web system
introduction to Web systemintroduction to Web system
introduction to Web system
 
L21 scalability
L21 scalabilityL21 scalability
L21 scalability
 
Chapter 4 u
Chapter 4 uChapter 4 u
Chapter 4 u
 
Esc 209 paper_doin
Esc 209 paper_doinEsc 209 paper_doin
Esc 209 paper_doin
 

Recently uploaded

AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 

Recently uploaded (20)

AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 

Server system architecture

  • 2. SERVER SYSTEM ARCHITECTURE  Server systems can be broadly categorized into two kinds:  transaction servers which are widely used in relational database systems, and  data servers, used in object-oriented database systems
  • 3. TRANSACTION SERVERS  Also called query server systems or SQL server systems o Clients send requests to the server o Transactions are executed at the server o Results are shipped back to the client.  Requests are specified in SQL, and communicated to the server through a remote procedure call (RPC) mechanism.  Transactional RPC allows many RPC calls to form a transaction.  Open Database Connectivity (ODBC) is a C language application program interface standard from Microsoft for connecting to a server, sending SQL requests, and receiving results.  JDBC standard is similar to ODBC, for Java
  • 4. TRANSACTION SERVER PROCESS STRUCTURE  A typical transaction server consists of multiple processes accessing data in shared memory.  Server processes o These receive user queries (transactions), execute them and send results back o Processes may be multithreaded, allowing a single process to execute several user queries concurrently o Typically multiple multithreaded server processes  Lock manager process o More on this later  Database writer process o Output modified buffer blocks to disks continually
  • 5. TRANSACTION SERVER PROCESSES (CONT.)  Log writer process o Server processes simply add log records to log record buffer o Log writer process outputs log records to stable storage.  Checkpoint process o Performs periodic checkpoints  Process monitor process o Monitors other processes, and takes recovery actions if any of the other processes fail  E.g., aborting any transactions being executed by a server process and restarting it
  • 7. TRANSACTION SYSTEM PROCESSES (CONT.)  Shared memory contains shared data o Buffer pool o Lock table o Log buffer o Cached query plans (reused if same query submitted again)  All database processes can access shared memory  To ensure that no two processes are accessing the same data structure at the same time, databases systems implement mutual exclusion using either o Operating system semaphores o Atomic instructions such as test-and-set  To avoid overhead of inter process communication for lock request/grant, each database process operates directly on the lock table o instead of sending requests to lock manager process  Lock manager process still used for deadlock detection
  • 8. DATA SERVERS  Used in high-speed LANs, in cases where  The clients are comparable in processing power to the server  The tasks to be executed are compute intensive.  Data are shipped to clients where processing is performed, and then shipped results back to the server.  This architecture requires full back-end functionality at the clients.  Used in many object-oriented database systems  Issues:  Page-Shipping versus Item-Shipping  Locking  Data Caching  Lock Caching
  • 9. DATA SERVERS (CONT.)  Page-shipping versus item-shipping  Smaller unit of shipping  more messages  Worth prefetching related items along with requested item  Page shipping can be thought of as a form of prefetching  Locking  Overhead of requesting and getting locks from server is high due to message delays  Can grant locks on requested and prefetched items; with page shipping, transaction is granted lock on whole page.  Locks on a prefetched item can be P{called back} by the server, and returned by client transaction if the prefetched item has not been used.  Locks on the page can be deescalated to locks on items in the page when there are lock conflicts. Locks on unused items can then be returned to server.
  • 10. DATA SERVERS (CONT.)  Data Caching  Data can be cached at client even in between transactions  But check that data is up-to-date before it is used (cache coherency)  Check can be done when requesting lock on data item  Lock Caching  Locks can be retained by client system even in between transactions  Transactions can acquire cached locks locally, without contacting server  Server calls back locks from clients when it receives conflicting lock request. Client returns lock once no local transaction is using it.  Similar to de-escalation, but across transactions.