SlideShare a Scribd company logo
1
© Prentice Hall, 2002
Chapter 9:Chapter 9:
The Client/Server DatabaseThe Client/Server Database
EnvironmentEnvironment
Modern Database Management
6th
Edition
Jeffrey A. Hoffer, Mary B. Prescott, Fred R.
McFadden
2Chapter 9 © Prentice Hall,
Client/Server SystemsClient/Server Systems
Networked computing model
Processes distributed between clients and
servers
Client – Workstation (usually a PC) that
requests and uses a service
Server – Computer (PC/mini/mainframe)
that provides a service
For DBMS, server is a database server
3Chapter 9 © Prentice Hall,
Application Logic in C/SApplication Logic in C/S
SystemsSystems
 Presentation Logic
– Input – keyboard/mouse
– Output – monitor/printer
 Processing Logic
– I/O processing
– Business rules
– Data management
 Storage Logic
– Data storage/retrieval
GUI Interface
Procedures, functions,
programs
DBMS activities
4Chapter 9 © Prentice Hall,
Client/Server ArchitecturesClient/Server Architectures
File Server Architecture
Database Server Architecture
Three-tier Architecture
Client does
extensive processing
Client does little
processing
5Chapter 9 © Prentice Hall,
File Server ArchitectureFile Server Architecture
 All processing is done at the PC that requested the
data
 Entire files are transferred from the server to the
client for processing.
 Problems:
– Huge amount of data transfer on the network
– Each client must contain full DBMS
 Heavy resource demand on clients
 Client DBMSs must recognize shared locks, integrity checks, etc.
FATFAT
CLIENTCLIENT
6Chapter 9 © Prentice Hall,
Figure 9-2 – File Server Architecture
FATFAT
CLIENTCLIENT
7Chapter 9 © Prentice Hall,
Database Server ArchitecturesDatabase Server Architectures
 2-tiered approach
 Client is responsible for
– I/O processing logic
– Some business rules logic
 Server performs all data storage and access processing
 DBMS is only on server
 Advantages
– Clients do not have to be as powerful
– Greatly reduces data traffic on the network
– Improved data integrity since it is all processed centrally
– Stored procedures  some business rules done on server
8Chapter 9 © Prentice Hall,
Advantages ofAdvantages of
Stored ProceduresStored Procedures
Compiled SQL statements
Reduced network traffic
Improved security
Improved data integrity
Thinner clients
9Chapter 9 © Prentice Hall,
Figure 9-3 – Database server architecture
ThinneThinne
rr
clientsclients
DBMS onlyDBMS only
on serveron server
10Chapter 9 © Prentice Hall,
Three-Tier ArchitecturesThree-Tier Architectures
Three layers:
– Client
– Application server
– Database server
Thin Client
 PC just for user interface and a little application
processing. Limited or no data storage (sometimes no
hard drive)
GUI interface
(I/O processing) Browser
Business rules Web Server
Data storage
DBMS
11Chapter 9 © Prentice Hall,
Figure 9-4 -- Three-tier architecture
ThinnestThinnest
clientsclients
Business rules onBusiness rules on
separate serverseparate server
DBMS only onDBMS only on
DB serverDB server
12Chapter 9 © Prentice Hall,
Advantages of Three-TierAdvantages of Three-Tier
ArchitecturesArchitectures
Scalability
Technological flexibility
Long-term cost reduction
Better match of systems to business needs
Improved customer service
Competitive advantage
Reduced risk
13Chapter 9 © Prentice Hall,
Challenges of Three-tierChallenges of Three-tier
ArchitecturesArchitectures
High short-term costs
Tools and training
Experience
Incompatible standards
Lack of compatible end-user tools
14Chapter 9 © Prentice Hall,
Application PartitioningApplication Partitioning
Placing portions of the application code in
different locations (client vs. server)
AFTER it is written
Advantages
– Improve performance
– Improve interoperability
– Balanced workloads
15Chapter 9 © Prentice Hall,
Processing Logic DistributionsProcessing Logic Distributions
2-tier distributions
n-tier distributions
Processing logic could be
at client, server, or both
Processing logic will be at
application server or Web
server
16Chapter 9 © Prentice Hall,
Parallel ComputerParallel Computer
ArchitecturesArchitectures
Tightly Coupled
– Symmetric Multiprocessing (SMP)
– Multiple CPUs
– Shared RAM
Loosely Coupled
– Massively Parallel Processing (MPP)
– Multiple CPUs
– Each CPU has its own RAM space
17Chapter 9 © Prentice Hall,
Parallel Computer ArchitecturesParallel Computer Architectures
Figure 9-6 –
Tightly-coupled – CPUs share
common memory space
Figure 9-7 –
Loosely-coupled – CPUs each
have their own memory space
18Chapter 9 © Prentice Hall,
Query Processing withQuery Processing with
Parallel ProcessorsParallel Processors
Figure 9-5(a) –
Parallel transactions
Figure 9-5(b) –
Parallel query
19Chapter 9 © Prentice Hall,
MiddlewareMiddleware
Software which allows an application to
interoperateinteroperate with other software
No need for programmer/user to understand
internal processing
Accomplished via Application ProgramApplication Program
InterfaceInterface (API)
The “glue”“glue” that holds client/server applications together
20Chapter 9 © Prentice Hall,
Types of MiddlewareTypes of Middleware
 RPC – Remote Procedure Calls (RPC)
– client makes calls to procedures running on remote computers
– synchronous and asynchronous
 Message-Oriented Middleware (MOM)
– asynchronous calls between the client via message queues
 Publish/Subscribe
– push technology  server sends information to client when
available
 Object Request Broker (ORB)
– Object-oriented management of communications between
clients and servers
 SQL-oriented Data Access
– Middleware between applications and database servers
21Chapter 9 © Prentice Hall,
Database MiddlewareDatabase Middleware
ODBC – Open Database Connectivity
– Most DB vendors support this
OLE-DB
– Microsoft enhancement of ODBC
JDBC – Java Database Connectivity
– Special Java classes that allow Java
applications/applets to connect to databases
22Chapter 9 © Prentice Hall,
Client/Server SecurityClient/Server Security
Network environment  complex security
issues
Security levels:
– System-level password security
 for allowing access to the system
– Database-level password security
 for determining access privileges to tables;
read/update/insert/delete privileges
– Secure client/server communication
 via encryption
23Chapter 9 © Prentice Hall,
Query-by-Example (QBE)Query-by-Example (QBE)
Direct-manipulation database language
Graphical approach
Available in MS Access
MS Access translates QBE to SQL and vice
versa
Useful for end-user database programming
Good for ad hoc processing and prototyping
24Chapter 9 © Prentice Hall,
Figure 9-10:
QBE view of
a 2-table join
query
Figure 9-12:
Equivalent
query in SQL
25Chapter 9 © Prentice Hall,
Figure 9-9: Access usability hierarchy
Foundation of MS Access
Simple processes
Stored modules of pre-
existing VBA code
Visual Basic for
Applications…language for
customizing the application
API to call functions in
DLLs external to MS Access
26Chapter 9 © Prentice Hall,
Using ODBC to Link External DatabasesUsing ODBC to Link External Databases
Stored on a Database ServerStored on a Database Server
 Open Database Connectivity (ODBC)
– API that provides a common language for application programs to
access and process SQL databases independent of the particular
RDBMS that is accessed
 Required parameters:
– ODBC driver
– Back-end server name
– Database name
– User id and password
 Additional information:
– Data source name (DSN)
– Windows client computer name
– Client application program’s executable name
Java Database Connectivity (JDBC) is similar to ODBC – built specifically for Java applications
27Chapter 9 © Prentice Hall,
ODBC ArchitectureODBC Architecture
(Figure 9-18)(Figure 9-18)
Each DBMS has its own ODBC-compliant driver
Client does not need
to know anything
about the DBMS
Application Program
Interface (API) provides
common interface to all
DBMSs
28Chapter 9 © Prentice Hall,
Visual Basic for ApplicationsVisual Basic for Applications
VBA is the programming language that
accompanies Access 2000
VBA provides these features:
– Ability to perform complex functionality
– Error handling
– Faster execution than macros
– Easier maintenance
– OLE automation
– Programmatic control
– Ease of reading for programmers
 Event-driven – nonprocedural programming that detects
events and generates appropriate responses

More Related Content

What's hot

The Database Environment Chapter 10
The Database Environment Chapter 10The Database Environment Chapter 10
The Database Environment Chapter 10
Jeanie Arnoco
 
Datastage free tutorial
Datastage free tutorialDatastage free tutorial
Datastage free tutorial
tekslate1
 
DATASTAGE AND QUALITY STAGE 9.1 ONLINE TRAINING
DATASTAGE AND QUALITY STAGE 9.1 ONLINE TRAININGDATASTAGE AND QUALITY STAGE 9.1 ONLINE TRAINING
DATASTAGE AND QUALITY STAGE 9.1 ONLINE TRAINING
Datawarehouse Trainings
 
Week 17 slides 1 7 multidimensional, parallel, and distributed database
Week 17 slides 1 7 multidimensional, parallel, and distributed databaseWeek 17 slides 1 7 multidimensional, parallel, and distributed database
Week 17 slides 1 7 multidimensional, parallel, and distributed database
Anne Lee
 
Datastage parallell jobs vs datastage server jobs
Datastage parallell jobs vs datastage server jobsDatastage parallell jobs vs datastage server jobs
Datastage parallell jobs vs datastage server jobs
shanker_uma
 
Day 1 Data Stage Administrator And Director 11.0
Day 1 Data Stage Administrator And Director 11.0Day 1 Data Stage Administrator And Director 11.0
Day 1 Data Stage Administrator And Director 11.0
kshanmug2
 
Physical Database Design & Performance
Physical Database Design & PerformancePhysical Database Design & Performance
Physical Database Design & Performance
Abdullah Khosa
 
Tuning data warehouse
Tuning data warehouseTuning data warehouse
Tuning data warehouse
Srinivasan R
 
data stage-material
data stage-materialdata stage-material
data stage-material
Rajesh Kv
 
Ibm db2 analytics accelerator high availability and disaster recovery
Ibm db2 analytics accelerator  high availability and disaster recoveryIbm db2 analytics accelerator  high availability and disaster recovery
Ibm db2 analytics accelerator high availability and disaster recovery
bupbechanhgmail
 
Chap02: The database Development process
Chap02: The database Development processChap02: The database Development process
Chap02: The database Development process
ahmed naveed
 
Dynamics of Leading Legacy Databases
Dynamics of Leading Legacy DatabasesDynamics of Leading Legacy Databases
Dynamics of Leading Legacy Databases
Cognizant
 
Db2 migration -_tips,_tricks,_and_pitfalls
Db2 migration -_tips,_tricks,_and_pitfallsDb2 migration -_tips,_tricks,_and_pitfalls
Db2 migration -_tips,_tricks,_and_pitfallssam2sung2
 
Distributed Database System
Distributed Database SystemDistributed Database System
Distributed Database SystemSulemang
 
Datastage Introduction To Data Warehousing
Datastage Introduction To Data WarehousingDatastage Introduction To Data Warehousing
Datastage Introduction To Data Warehousing
Vibrant Technologies & Computers
 
1 introduction ddbms
1 introduction ddbms1 introduction ddbms
1 introduction ddbms
amna izzat
 

What's hot (20)

Ch 13 D B Admin
Ch 13  D B  AdminCh 13  D B  Admin
Ch 13 D B Admin
 
The Database Environment Chapter 10
The Database Environment Chapter 10The Database Environment Chapter 10
The Database Environment Chapter 10
 
Distributed D B
Distributed  D BDistributed  D B
Distributed D B
 
Datastage free tutorial
Datastage free tutorialDatastage free tutorial
Datastage free tutorial
 
DATASTAGE AND QUALITY STAGE 9.1 ONLINE TRAINING
DATASTAGE AND QUALITY STAGE 9.1 ONLINE TRAININGDATASTAGE AND QUALITY STAGE 9.1 ONLINE TRAINING
DATASTAGE AND QUALITY STAGE 9.1 ONLINE TRAINING
 
Week 17 slides 1 7 multidimensional, parallel, and distributed database
Week 17 slides 1 7 multidimensional, parallel, and distributed databaseWeek 17 slides 1 7 multidimensional, parallel, and distributed database
Week 17 slides 1 7 multidimensional, parallel, and distributed database
 
Datastage parallell jobs vs datastage server jobs
Datastage parallell jobs vs datastage server jobsDatastage parallell jobs vs datastage server jobs
Datastage parallell jobs vs datastage server jobs
 
Migration from 8.1 to 11.3
Migration from 8.1 to 11.3Migration from 8.1 to 11.3
Migration from 8.1 to 11.3
 
Day 1 Data Stage Administrator And Director 11.0
Day 1 Data Stage Administrator And Director 11.0Day 1 Data Stage Administrator And Director 11.0
Day 1 Data Stage Administrator And Director 11.0
 
Physical Database Design & Performance
Physical Database Design & PerformancePhysical Database Design & Performance
Physical Database Design & Performance
 
Tuning data warehouse
Tuning data warehouseTuning data warehouse
Tuning data warehouse
 
58750024 datastage-student-guide
58750024 datastage-student-guide58750024 datastage-student-guide
58750024 datastage-student-guide
 
data stage-material
data stage-materialdata stage-material
data stage-material
 
Ibm db2 analytics accelerator high availability and disaster recovery
Ibm db2 analytics accelerator  high availability and disaster recoveryIbm db2 analytics accelerator  high availability and disaster recovery
Ibm db2 analytics accelerator high availability and disaster recovery
 
Chap02: The database Development process
Chap02: The database Development processChap02: The database Development process
Chap02: The database Development process
 
Dynamics of Leading Legacy Databases
Dynamics of Leading Legacy DatabasesDynamics of Leading Legacy Databases
Dynamics of Leading Legacy Databases
 
Db2 migration -_tips,_tricks,_and_pitfalls
Db2 migration -_tips,_tricks,_and_pitfallsDb2 migration -_tips,_tricks,_and_pitfalls
Db2 migration -_tips,_tricks,_and_pitfalls
 
Distributed Database System
Distributed Database SystemDistributed Database System
Distributed Database System
 
Datastage Introduction To Data Warehousing
Datastage Introduction To Data WarehousingDatastage Introduction To Data Warehousing
Datastage Introduction To Data Warehousing
 
1 introduction ddbms
1 introduction ddbms1 introduction ddbms
1 introduction ddbms
 

Similar to The Database Environment Chapter 9

Ch 8 Client Server
Ch 8  Client  ServerCh 8  Client  Server
Ch 8 Client Serverguest8fdbdd
 
CH12.ppt
CH12.pptCH12.ppt
CH12.ppt
ssuser5c874e
 
Hoffer mdm11e pp_ch08
Hoffer mdm11e pp_ch08Hoffer mdm11e pp_ch08
Hoffer mdm11e pp_ch08
Shagufta shaheen
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
Ahmed Magdy
 
client-server-architecture.ppt
client-server-architecture.pptclient-server-architecture.ppt
client-server-architecture.ppt
gowriganesh
 
client-server-architecture ss.ppt
client-server-architecture ss.pptclient-server-architecture ss.ppt
client-server-architecture ss.ppt
OsmanGani61
 
Client server based computing
Client server based computingClient server based computing
Client server based computingMohammad Affan
 
Presentation racsig 090730
Presentation racsig 090730Presentation racsig 090730
Presentation racsig 090730
maclean liu
 
Cloud ppt
Cloud pptCloud ppt
Cloud ppt
Manoj Jhawar
 
3 Tier Architecture
3  Tier Architecture3  Tier Architecture
3 Tier ArchitectureWebx
 
3 Tier Architecture
3 Tier Architecture3 Tier Architecture
3 Tier Architecture
guestd0cc01
 
Peoplesoft PIA architecture
Peoplesoft PIA architecturePeoplesoft PIA architecture
Peoplesoft PIA architectureAmit rai Raaz
 
Bfc Presentation
Bfc PresentationBfc Presentation
Bfc Presentation
Herea Adrian
 
Moving to Design
Moving to DesignMoving to Design
Moving to Design
Henhen Lukmana
 
Architecting and Tuning IIB/eXtreme Scale for Maximum Performance and Reliabi...
Architecting and Tuning IIB/eXtreme Scale for Maximum Performance and Reliabi...Architecting and Tuning IIB/eXtreme Scale for Maximum Performance and Reliabi...
Architecting and Tuning IIB/eXtreme Scale for Maximum Performance and Reliabi...
Prolifics
 
Mainframe Architecture & Product Overview
Mainframe Architecture & Product OverviewMainframe Architecture & Product Overview
Mainframe Architecture & Product Overviewabhi1112
 
engage 2015 - - 2015 - Infrastructure Assessment - Analyze, Visualize and Op...
engage 2015 -  - 2015 - Infrastructure Assessment - Analyze, Visualize and Op...engage 2015 -  - 2015 - Infrastructure Assessment - Analyze, Visualize and Op...
engage 2015 - - 2015 - Infrastructure Assessment - Analyze, Visualize and Op...
Christoph Adler
 
Database and database Application interface
Database and database Application interfaceDatabase and database Application interface
Database and database Application interface
Mozamel Jawad
 
DB2 for z/O S Data Sharing
DB2 for z/O S  Data  SharingDB2 for z/O S  Data  Sharing
DB2 for z/O S Data Sharing
Surekha Parekh
 

Similar to The Database Environment Chapter 9 (20)

Ch 8 Client Server
Ch 8  Client  ServerCh 8  Client  Server
Ch 8 Client Server
 
CH12.ppt
CH12.pptCH12.ppt
CH12.ppt
 
Hoffer mdm11e pp_ch08
Hoffer mdm11e pp_ch08Hoffer mdm11e pp_ch08
Hoffer mdm11e pp_ch08
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Client server
Client serverClient server
Client server
 
client-server-architecture.ppt
client-server-architecture.pptclient-server-architecture.ppt
client-server-architecture.ppt
 
client-server-architecture ss.ppt
client-server-architecture ss.pptclient-server-architecture ss.ppt
client-server-architecture ss.ppt
 
Client server based computing
Client server based computingClient server based computing
Client server based computing
 
Presentation racsig 090730
Presentation racsig 090730Presentation racsig 090730
Presentation racsig 090730
 
Cloud ppt
Cloud pptCloud ppt
Cloud ppt
 
3 Tier Architecture
3  Tier Architecture3  Tier Architecture
3 Tier Architecture
 
3 Tier Architecture
3 Tier Architecture3 Tier Architecture
3 Tier Architecture
 
Peoplesoft PIA architecture
Peoplesoft PIA architecturePeoplesoft PIA architecture
Peoplesoft PIA architecture
 
Bfc Presentation
Bfc PresentationBfc Presentation
Bfc Presentation
 
Moving to Design
Moving to DesignMoving to Design
Moving to Design
 
Architecting and Tuning IIB/eXtreme Scale for Maximum Performance and Reliabi...
Architecting and Tuning IIB/eXtreme Scale for Maximum Performance and Reliabi...Architecting and Tuning IIB/eXtreme Scale for Maximum Performance and Reliabi...
Architecting and Tuning IIB/eXtreme Scale for Maximum Performance and Reliabi...
 
Mainframe Architecture & Product Overview
Mainframe Architecture & Product OverviewMainframe Architecture & Product Overview
Mainframe Architecture & Product Overview
 
engage 2015 - - 2015 - Infrastructure Assessment - Analyze, Visualize and Op...
engage 2015 -  - 2015 - Infrastructure Assessment - Analyze, Visualize and Op...engage 2015 -  - 2015 - Infrastructure Assessment - Analyze, Visualize and Op...
engage 2015 - - 2015 - Infrastructure Assessment - Analyze, Visualize and Op...
 
Database and database Application interface
Database and database Application interfaceDatabase and database Application interface
Database and database Application interface
 
DB2 for z/O S Data Sharing
DB2 for z/O S  Data  SharingDB2 for z/O S  Data  Sharing
DB2 for z/O S Data Sharing
 

More from Jeanie Arnoco

The Database Environment Chapter 15
The Database Environment Chapter 15The Database Environment Chapter 15
The Database Environment Chapter 15
Jeanie Arnoco
 
The Database Environment Chapter 14
The Database Environment Chapter 14The Database Environment Chapter 14
The Database Environment Chapter 14
Jeanie Arnoco
 
The Database Environment Chapter 13
The Database Environment Chapter 13The Database Environment Chapter 13
The Database Environment Chapter 13
Jeanie Arnoco
 
The Database Environment Chapter 8
The Database Environment Chapter 8The Database Environment Chapter 8
The Database Environment Chapter 8
Jeanie Arnoco
 
The Database Environment Chapter 7
The Database Environment Chapter 7The Database Environment Chapter 7
The Database Environment Chapter 7
Jeanie Arnoco
 
The Database Environment Chapter 5
The Database Environment Chapter 5The Database Environment Chapter 5
The Database Environment Chapter 5
Jeanie Arnoco
 
The Database Environment Chapter 4
The Database Environment Chapter 4The Database Environment Chapter 4
The Database Environment Chapter 4
Jeanie Arnoco
 
The Database Environment Chapter 3
The Database Environment Chapter 3The Database Environment Chapter 3
The Database Environment Chapter 3
Jeanie Arnoco
 
Introduction to BOOTSTRAP
Introduction to BOOTSTRAPIntroduction to BOOTSTRAP
Introduction to BOOTSTRAP
Jeanie Arnoco
 
Introduction to programming using Visual Basic 6
Introduction to programming using Visual Basic 6Introduction to programming using Visual Basic 6
Introduction to programming using Visual Basic 6
Jeanie Arnoco
 
Hacking and Online Security
Hacking and Online SecurityHacking and Online Security
Hacking and Online Security
Jeanie Arnoco
 
(CAR)Cordillera Administrative Region
(CAR)Cordillera Administrative Region (CAR)Cordillera Administrative Region
(CAR)Cordillera Administrative Region
Jeanie Arnoco
 
Quick sort-Data Structure
Quick sort-Data StructureQuick sort-Data Structure
Quick sort-Data Structure
Jeanie Arnoco
 
Quality Gurus Student
Quality Gurus StudentQuality Gurus Student
Quality Gurus Student
Jeanie Arnoco
 
QUALITY STANDARDS
QUALITY STANDARDSQUALITY STANDARDS
QUALITY STANDARDS
Jeanie Arnoco
 
Partnering for Competition: External Partnership
Partnering for Competition: External PartnershipPartnering for Competition: External Partnership
Partnering for Competition: External Partnership
Jeanie Arnoco
 
Partnering for Competition:Internal Partnership
Partnering for Competition:Internal PartnershipPartnering for Competition:Internal Partnership
Partnering for Competition:Internal Partnership
Jeanie Arnoco
 
CROSBY’S PHILOSOPHY
CROSBY’S PHILOSOPHYCROSBY’S PHILOSOPHY
CROSBY’S PHILOSOPHY
Jeanie Arnoco
 
Juran’s Trilogy
Juran’s TrilogyJuran’s Trilogy
Juran’s Trilogy
Jeanie Arnoco
 
Deming’s 14 Points for Management
Deming’s 14 Points for ManagementDeming’s 14 Points for Management
Deming’s 14 Points for Management
Jeanie Arnoco
 

More from Jeanie Arnoco (20)

The Database Environment Chapter 15
The Database Environment Chapter 15The Database Environment Chapter 15
The Database Environment Chapter 15
 
The Database Environment Chapter 14
The Database Environment Chapter 14The Database Environment Chapter 14
The Database Environment Chapter 14
 
The Database Environment Chapter 13
The Database Environment Chapter 13The Database Environment Chapter 13
The Database Environment Chapter 13
 
The Database Environment Chapter 8
The Database Environment Chapter 8The Database Environment Chapter 8
The Database Environment Chapter 8
 
The Database Environment Chapter 7
The Database Environment Chapter 7The Database Environment Chapter 7
The Database Environment Chapter 7
 
The Database Environment Chapter 5
The Database Environment Chapter 5The Database Environment Chapter 5
The Database Environment Chapter 5
 
The Database Environment Chapter 4
The Database Environment Chapter 4The Database Environment Chapter 4
The Database Environment Chapter 4
 
The Database Environment Chapter 3
The Database Environment Chapter 3The Database Environment Chapter 3
The Database Environment Chapter 3
 
Introduction to BOOTSTRAP
Introduction to BOOTSTRAPIntroduction to BOOTSTRAP
Introduction to BOOTSTRAP
 
Introduction to programming using Visual Basic 6
Introduction to programming using Visual Basic 6Introduction to programming using Visual Basic 6
Introduction to programming using Visual Basic 6
 
Hacking and Online Security
Hacking and Online SecurityHacking and Online Security
Hacking and Online Security
 
(CAR)Cordillera Administrative Region
(CAR)Cordillera Administrative Region (CAR)Cordillera Administrative Region
(CAR)Cordillera Administrative Region
 
Quick sort-Data Structure
Quick sort-Data StructureQuick sort-Data Structure
Quick sort-Data Structure
 
Quality Gurus Student
Quality Gurus StudentQuality Gurus Student
Quality Gurus Student
 
QUALITY STANDARDS
QUALITY STANDARDSQUALITY STANDARDS
QUALITY STANDARDS
 
Partnering for Competition: External Partnership
Partnering for Competition: External PartnershipPartnering for Competition: External Partnership
Partnering for Competition: External Partnership
 
Partnering for Competition:Internal Partnership
Partnering for Competition:Internal PartnershipPartnering for Competition:Internal Partnership
Partnering for Competition:Internal Partnership
 
CROSBY’S PHILOSOPHY
CROSBY’S PHILOSOPHYCROSBY’S PHILOSOPHY
CROSBY’S PHILOSOPHY
 
Juran’s Trilogy
Juran’s TrilogyJuran’s Trilogy
Juran’s Trilogy
 
Deming’s 14 Points for Management
Deming’s 14 Points for ManagementDeming’s 14 Points for Management
Deming’s 14 Points for Management
 

Recently uploaded

Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 

Recently uploaded (20)

Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 

The Database Environment Chapter 9

  • 1. 1 © Prentice Hall, 2002 Chapter 9:Chapter 9: The Client/Server DatabaseThe Client/Server Database EnvironmentEnvironment Modern Database Management 6th Edition Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden
  • 2. 2Chapter 9 © Prentice Hall, Client/Server SystemsClient/Server Systems Networked computing model Processes distributed between clients and servers Client – Workstation (usually a PC) that requests and uses a service Server – Computer (PC/mini/mainframe) that provides a service For DBMS, server is a database server
  • 3. 3Chapter 9 © Prentice Hall, Application Logic in C/SApplication Logic in C/S SystemsSystems  Presentation Logic – Input – keyboard/mouse – Output – monitor/printer  Processing Logic – I/O processing – Business rules – Data management  Storage Logic – Data storage/retrieval GUI Interface Procedures, functions, programs DBMS activities
  • 4. 4Chapter 9 © Prentice Hall, Client/Server ArchitecturesClient/Server Architectures File Server Architecture Database Server Architecture Three-tier Architecture Client does extensive processing Client does little processing
  • 5. 5Chapter 9 © Prentice Hall, File Server ArchitectureFile Server Architecture  All processing is done at the PC that requested the data  Entire files are transferred from the server to the client for processing.  Problems: – Huge amount of data transfer on the network – Each client must contain full DBMS  Heavy resource demand on clients  Client DBMSs must recognize shared locks, integrity checks, etc. FATFAT CLIENTCLIENT
  • 6. 6Chapter 9 © Prentice Hall, Figure 9-2 – File Server Architecture FATFAT CLIENTCLIENT
  • 7. 7Chapter 9 © Prentice Hall, Database Server ArchitecturesDatabase Server Architectures  2-tiered approach  Client is responsible for – I/O processing logic – Some business rules logic  Server performs all data storage and access processing  DBMS is only on server  Advantages – Clients do not have to be as powerful – Greatly reduces data traffic on the network – Improved data integrity since it is all processed centrally – Stored procedures  some business rules done on server
  • 8. 8Chapter 9 © Prentice Hall, Advantages ofAdvantages of Stored ProceduresStored Procedures Compiled SQL statements Reduced network traffic Improved security Improved data integrity Thinner clients
  • 9. 9Chapter 9 © Prentice Hall, Figure 9-3 – Database server architecture ThinneThinne rr clientsclients DBMS onlyDBMS only on serveron server
  • 10. 10Chapter 9 © Prentice Hall, Three-Tier ArchitecturesThree-Tier Architectures Three layers: – Client – Application server – Database server Thin Client  PC just for user interface and a little application processing. Limited or no data storage (sometimes no hard drive) GUI interface (I/O processing) Browser Business rules Web Server Data storage DBMS
  • 11. 11Chapter 9 © Prentice Hall, Figure 9-4 -- Three-tier architecture ThinnestThinnest clientsclients Business rules onBusiness rules on separate serverseparate server DBMS only onDBMS only on DB serverDB server
  • 12. 12Chapter 9 © Prentice Hall, Advantages of Three-TierAdvantages of Three-Tier ArchitecturesArchitectures Scalability Technological flexibility Long-term cost reduction Better match of systems to business needs Improved customer service Competitive advantage Reduced risk
  • 13. 13Chapter 9 © Prentice Hall, Challenges of Three-tierChallenges of Three-tier ArchitecturesArchitectures High short-term costs Tools and training Experience Incompatible standards Lack of compatible end-user tools
  • 14. 14Chapter 9 © Prentice Hall, Application PartitioningApplication Partitioning Placing portions of the application code in different locations (client vs. server) AFTER it is written Advantages – Improve performance – Improve interoperability – Balanced workloads
  • 15. 15Chapter 9 © Prentice Hall, Processing Logic DistributionsProcessing Logic Distributions 2-tier distributions n-tier distributions Processing logic could be at client, server, or both Processing logic will be at application server or Web server
  • 16. 16Chapter 9 © Prentice Hall, Parallel ComputerParallel Computer ArchitecturesArchitectures Tightly Coupled – Symmetric Multiprocessing (SMP) – Multiple CPUs – Shared RAM Loosely Coupled – Massively Parallel Processing (MPP) – Multiple CPUs – Each CPU has its own RAM space
  • 17. 17Chapter 9 © Prentice Hall, Parallel Computer ArchitecturesParallel Computer Architectures Figure 9-6 – Tightly-coupled – CPUs share common memory space Figure 9-7 – Loosely-coupled – CPUs each have their own memory space
  • 18. 18Chapter 9 © Prentice Hall, Query Processing withQuery Processing with Parallel ProcessorsParallel Processors Figure 9-5(a) – Parallel transactions Figure 9-5(b) – Parallel query
  • 19. 19Chapter 9 © Prentice Hall, MiddlewareMiddleware Software which allows an application to interoperateinteroperate with other software No need for programmer/user to understand internal processing Accomplished via Application ProgramApplication Program InterfaceInterface (API) The “glue”“glue” that holds client/server applications together
  • 20. 20Chapter 9 © Prentice Hall, Types of MiddlewareTypes of Middleware  RPC – Remote Procedure Calls (RPC) – client makes calls to procedures running on remote computers – synchronous and asynchronous  Message-Oriented Middleware (MOM) – asynchronous calls between the client via message queues  Publish/Subscribe – push technology  server sends information to client when available  Object Request Broker (ORB) – Object-oriented management of communications between clients and servers  SQL-oriented Data Access – Middleware between applications and database servers
  • 21. 21Chapter 9 © Prentice Hall, Database MiddlewareDatabase Middleware ODBC – Open Database Connectivity – Most DB vendors support this OLE-DB – Microsoft enhancement of ODBC JDBC – Java Database Connectivity – Special Java classes that allow Java applications/applets to connect to databases
  • 22. 22Chapter 9 © Prentice Hall, Client/Server SecurityClient/Server Security Network environment  complex security issues Security levels: – System-level password security  for allowing access to the system – Database-level password security  for determining access privileges to tables; read/update/insert/delete privileges – Secure client/server communication  via encryption
  • 23. 23Chapter 9 © Prentice Hall, Query-by-Example (QBE)Query-by-Example (QBE) Direct-manipulation database language Graphical approach Available in MS Access MS Access translates QBE to SQL and vice versa Useful for end-user database programming Good for ad hoc processing and prototyping
  • 24. 24Chapter 9 © Prentice Hall, Figure 9-10: QBE view of a 2-table join query Figure 9-12: Equivalent query in SQL
  • 25. 25Chapter 9 © Prentice Hall, Figure 9-9: Access usability hierarchy Foundation of MS Access Simple processes Stored modules of pre- existing VBA code Visual Basic for Applications…language for customizing the application API to call functions in DLLs external to MS Access
  • 26. 26Chapter 9 © Prentice Hall, Using ODBC to Link External DatabasesUsing ODBC to Link External Databases Stored on a Database ServerStored on a Database Server  Open Database Connectivity (ODBC) – API that provides a common language for application programs to access and process SQL databases independent of the particular RDBMS that is accessed  Required parameters: – ODBC driver – Back-end server name – Database name – User id and password  Additional information: – Data source name (DSN) – Windows client computer name – Client application program’s executable name Java Database Connectivity (JDBC) is similar to ODBC – built specifically for Java applications
  • 27. 27Chapter 9 © Prentice Hall, ODBC ArchitectureODBC Architecture (Figure 9-18)(Figure 9-18) Each DBMS has its own ODBC-compliant driver Client does not need to know anything about the DBMS Application Program Interface (API) provides common interface to all DBMSs
  • 28. 28Chapter 9 © Prentice Hall, Visual Basic for ApplicationsVisual Basic for Applications VBA is the programming language that accompanies Access 2000 VBA provides these features: – Ability to perform complex functionality – Error handling – Faster execution than macros – Easier maintenance – OLE automation – Programmatic control – Ease of reading for programmers  Event-driven – nonprocedural programming that detects events and generates appropriate responses