In figure 8.2, a user on a client workstation logs into a remote system on which resides the SQL implementation and the database files. From the login client, the user runs an application on the login server which generates SQL statements. These SQL statements provide the access to the database on the login server. A tty style login may be used or, as illustrated in figure 8.2, the SQL application may be a X client application running on the login server. This X application drives the login client's keyboard and screen by means of the X server which is executing on the login client.
Figure 8.3: SQL with transparent file access.