3 Tier Architecture |
3 tier architecture in DBMS
DBMS architecture plays a key role within the design, development, implementation, and maintenance of the management system of the corporate.All the dynamic web application over the web uses this three-tier architecture.
Using the correct architecture will help us solve many problems easily which might lack due to design, although this will help us to secure the data and its access.
Any management system uses any of the subsequent 2 architectures:
- 2 tier architecture (two-level)
- 3 tier architecture (three-level)
Three(3) tier DBMS architecture is widely used in the industry. It gives the extra benefits and security compared to other architectures.
It consists application server layer as an intermediate tier between these Client and Server.
Components of three-tier architecture
- Client-side:
- It is nothing but the presentation layer (your PC, Tablet, Mobile, etc.).
- It sends an invitation to the server-side via the appliance server layer.
- Application server:
- This is also known as the Intermediate Layer or Tier which is used to play an important role between client and server.
Unlike two-tier architecture, during these requests aren't directly send from the client to the server-side, when a client sends an invitation first it's transferred to the appliance server then
this application server transfers request to the server-side, followed by query processing, and transaction management.
This intermediate layer also acts as a senses medium for the exchange of partially processed data between server and client
- Server-side:
- It is a database of the server-side application.
- It sends responses to the requests received from the client-side to the appliance server and therefore, the application server, in turn, transfer them to the client-side.
- Examples of three-tier architecture: All large dynamic web applications present over the web or samples of these 3 tier architecture
Purpose of three-tier architecture
- Integrity:
- Due to the centre layer between the client and server-side data corruption are often removed
- Security:
- As there's no direct interaction between client and server we will restrict unauthorized access if any.
- To provide a transparent separation between the user application and physical database Program data independence and multiple views of knowledge.
- Because of the above features, an outsized number of users can access a database easily Demerits