Application Architecture of DBMS
Application Architecture of DBMS
Institute
of
Technology
By
• Database (Data) Tier - At this tier, the database resides along with its query processing
languages. We also have the relations that define the data and their constraints at this level.
• Application (Middle) Tier - At this tier reside the application server ad the programs that
access the database. For a user, this application tier presents an abstracted view of the
database. End-users are unaware of any existence of the database beyond the application.
At the other end, the database tier is not aware of any other user beyond the application
tier. Hence, the application layer sits in the middle and acts as a mediator between the end-
user and the database.
• User (Presentation) Tier - End-users operate on this tier, and they know nothing about any
existence of the database beyond this layer. At this layer, multiple views of the database
can be provided by the application. All views are generated by applications that reside in
the application tier
Application Architecture of DBMS:
• A Database Management System (DBMS) typically follows a
layered architecture, which helps in managing, storing, and Madhav
Institute
retrieving data efficiently. The architecture can vary of
Technology
depending on the DBMS type (e.g., relational, NoSQL), but &
a common structure is outlined below: Science
Gwalior (M.P.)
• 1. Physical Layer (Storage Layer) (Deemed
University)
control (MVCC).
• Recovery Manager: Ensures that the database can recover to a consistent
state after a failure. It handles backups, logging, and restoring operations.
Application Architecture of DBMS(Cont.):
Madhav Institute
5. Security and Authorization Layer of
Technology
Access Control: Manages user permissions, ensuring that only &
authorized users can access or modify certain data. Science
Gwalior (M.P.)
Encryption: Protects sensitive data both at rest and in transit by (Deemed
University)
encrypting it.
Auditing: Tracks and logs database activities for security and
compliance purposes
Application Architecture of DBMS(Cont.):
6. Data Integrity Layer
• Integrity Constraints: Ensures that the data stored in the database
remains accurate and consistent. This includes enforcing primary
keys, foreign keys, unique constraints, and other business rules.
• Validation Rules: These are checks applied to data entry or
updates to ensure that the data adheres to predefined formats or
constraints.
Application Architecture of DBMS(Cont.):
7. Communication Layer
Madhav
• Network Communication: Facilitates communication between the DBMS Institute
and client applications over a network. This includes managing data transfer of
Technology
protocols and ensuring data consistency across distributed databases. &
Science
• Middleware: Provides additional services like load balancing, connection Gwalior (M.P.)
(Deemed
pooling, and distributed transaction management. University)
Application Architecture of DBMS(Cont.):
Thank You
Science
Gwalior (M.P.)
(Deemed
University)