Sql Server Development Series – SQl Server Architecture Day 2 of 60


Sql Server is perfect RDMS product from Microsoft used to perform day to day operations and management activities

How sql server manages Client server communication:

MSN uses sql server as backend

Below is the picture of sql server architecture

 

Whenever you are login into the msn account using the credentials these credentials are passed from the client API to server API (sql server)and validation is done

If we are sending directly the credentials from the client API to server API , security issues will raise.

So we are using the encryption here

At the client API, the credentials are encrypted so that only target server can only understand. For this we are sending the data in the TDS (tabular data stream) format to the protocols

API (application programming interface): in order to interact with database or s/w to pull or push the data ( Ex:HTML )

For the encryption at sql server, we are using the protocols and these protocols are also called network libraries (net Libs)

TCP/IP, named pipes, shared memory, VIA

TCP/IP is mostly and widely used protocol

After data is encrypted using the protocols and this data is routed to specific destination server using the drivers (OLEDB,ODBC)

OLEDB- specific for Microsoft technologies like IE->sql server,.net to sql server, SharePoint to sql server, sql server to sql server

ODBC is used for data communication of sql server with non-MS technologies.

Driver should not know what the data it contains and how the data is encrypted and its job is to route the data

And these encrypted information (packets) are called TDS packets and why we are converting these into tabular formats is RDBS only understands tabular formats

After the data is converted Tabular format, we are applying security mechanisms and send to server

 

Client is sending the data to the server using the LCM (least cost method)

At the server we are taking the data using drivers and gave to netlibs(protocol’s) and they will convert the encrypted data to decrypted one using the same protocol the client is using for the encryption. Otherwise the connection failures will occur even though the server is up and running fine

Here client net lib and server net lib should be same

After the data is converted into decrypted format(TDS packets) then this data is given the server and server executed and gives the response to the client

There are 2 types of connections:

Server centric connection: syntax check will occur at server

Client centric: syntax check will occur at client

Now – a –days, we are using client centric connections so that traffic to the server will be reduced and performance will be increased

Please check and let us know if you have any concerns on this.

Thanks for viewing this.

Regards,

Chaitanya

Visit site: http://www.sqlblogging.com

Send an Email: sqlblogging@outlook.com

Leave a comment

Design a site like this with WordPress.com
Get started