Database Architecture:




The database architecture was introduced to manage the large number of PCs that are connected with a same network. This also includes work stations, web servers and other components that are connected within the same network.




The DBMS architecture is considered to be as the client/server architecture that consists of clients and servers. A client is the user that can obtain the information from the server and can also use the server computers’ hardware and software. The database architecture has two main parts:

Two tier client/server architecture:

The two tier architecture has applications through which the Database management system can be accessed. The two tier architecture is used when the programmer want to access the database management system through applications. In this type of architecture the DBMS is divided into clients and servers. The client/server architectures include many work stations and PCs.




The client level involves the understanding of the compiler of programming language and the user interface. The application programs in the two tier architecture run on the client computer. The API is used to allow the client computer to call the database management system; this API is provided by the open database connectivity (ODBC). The open database connectivity drivers are mostly supported by the DBMS. The client computer can access the database management system.

Three tier client/server architecture:

The tree tier architecture is used as it includes a middle layer between the client and the server. The client is the web interface, the middle layer is the application server and the server is the database server.

The end users control the client tier to communicate with the server through the middle or intermediate layer. The client tier can be a web interface or GUI that is the graphical user interface. The three tier client/server architecture is used for the web applications.




The middle tier is used to accept the request of the client and the processes it. The request is then transferred to the server computer. This server is the database server which includes the management of data. The middle tier also protects the database tier. Therefore there are no security issues.