ADAMA SCIENCE AND TECHNOLOGY UNIVERSITY
SCHOOL OF ELECTRICAL ENGINEERING AND COMPUTING
Department of Computer Science and Engineering
Mobile Computing
Chapter 3
Mobile Computing
Architecture
1 15/01/2025
Architecture of Mobile Computing
Mobile computing architecture uses Three tier
Architecture
First tier is User Interface or Presentation
Tier
Second tier is Process Management or
Application Tier
Third tier is Database Management or
Data Tier
2 15/01/2025
Architecture of Mobile
Computing
3 15/01/2025
Architecture of Mobile Computing
1. Presentation Tier (Tier I):-
User interfacing system tier
These applications run on the client device and offer all the user interfaces
Responsible for presenting the information to the end user
Eg: web browsers, web scrapers etc
Web scraper picks up part of the data from the web page and filters off the remaining
data according to some predefined template
It manage device and rendering function
It incorporates user services such as session,
text input , dialog and display management.
2. Application Tier (Tier II):
It is the middle tier and acts as the engine.
It is responsible for processing user input, obtaining data and making decisions
Tier II functions are implemented using Middleware software
4 15/01/2025
Architecture of Mobile Computing
Application Tier (Tier II): is process management and application tier,
This layer is for process management and application programs
Here business logic and rules are executed.
It also controls transactions and asynchronous queuing
3. Data Tier (Tier III) :
➢
Used to store data needed by the application and acts as a repository
for both temporary and permanent data.
➢
Database middleware runs between the application program and the
database. Eg: ODBC, JDBC etc
➢
Generically, it is for data base access and management
5 15/01/2025
Architecture of Mobile Computing
This architecture more suitable for effective networked
client/server design.
Thus 3 tier architecture is most suitable for internet
applications and net centric information systems.
It provides increased performance, flexibility,
maintainability, reusability, and scalability while hiding
design complexity of distributed processing.
6 15/01/2025
Mobile Computing Architecture
7 15/01/2025
Mobile Computing Architecture
To design a mobile computing network we need to
know that system will be used through Any
Network, Bearer, agent, and device.
For universal Access Internet should available as
ubiquitous with browsers as Agents.
System should be context aware.
The three tier architecture includes Presentation
tier, application tier and Data tier.
8 15/01/2025
Mobile Computing Architecture
This tier include Web browsers , WAP browsers
and customized client programs.
Responsible for presenting the information to
the end user
Run on the client device and offer all the user
interfaces
Includes web browsers, WAP browsers and
client programs
9 15/01/2025
Application Tier
Independent of presentation and database management
Handles functions related to middleware
Many types of middleware
Message Oriented Middleware,
Transaction Processing Middleware,
Communication Middleware,
Distributed Objects and Components,
Transcoding Middleware,
Web Services, etc.
10 15/01/2025
Message Oriented Middleware
Loosely connects different applications through
asynchronous exchange of messages
Works independent of platform or processor
configuration
Generally asynchronous and peer to peer
Works in publish / subscribe fashion
Examples – MQ series from IBM, JMS, etc.
11 15/01/2025
Transaction Processing Middleware
Provides tools and environment for developing transaction
based distributed applications
It uses Ideal TP in data management,
Network access,
Security Systems ,
Delivery order processing ,
Airline reservations,
Customer service etc.,,
12 15/01/2025
Transaction Processing Middleware
TP includes management features such as restarting failed
process, dynamic load balancing and ensuring consistency of
distributed data.
Capable of providing services to thousands of clients in a
distributed client – server environment Independent of database
architecture
Example – CICS(customer information control system)
from IBM
MVC(model view controller) is used in JAVA as TP.
13 15/01/2025
Transaction Processing Middleware
14 15/01/2025
Communication Middleware
Used to connect one application to another
Quite useful in the telecommunications world
Uses mediation server to automate the telnet protocol
to communicate to nodes in the network
Example – Using telnet to connect one application to
another
15 15/01/2025
Transcoding Middleware
Used to transcode one format of data to another suiting the
needs of the client
Example: if we want to access a website through mobile
phone supporting WAP need to transcode HTML page to
WML page.
Useful for content adaptation to fit the needs of device
Content adaptation is done through proprietary protocols.
Example – Internet Content Adaptation Protocol (ICAP) from
IETF
16 15/01/2025
Web Services
Provides a standard means of communication and information exchange among
different software applications.
Public interfaces and bindings are defined using XML(eXtensible Markup
Language).
The basic architecture includes web service technologies capable of Exchanging
messages
Describing Web services
-Publishing and discovering Web service descriptions.
Standards for service requestor and service provider
Service requestor – find and discover the description of services
Service provider – publish the description of services it provides
Discovery Agency- agency through which a web service description is published
and made available.
17 15/01/2025
3. Data Tier
Used to store data needed by the application and acts as a repository
for both temporary and permanent data
Can use XML for interoperability of data with other systems and data
sources
Might incorporate the use of Database Middleware and SyncML
Database Middleware – interfaces application programs and the
database
Database Middleware – helps business logic run independent and
transparent from database technology and database vendor
18 15/01/2025
Design Considerations for Mobile computing
Context information is the information related to the
surrounding environment of an actor in that environment.
Mobility implies that attributes associated with devices
and users will change constantly.
Such changes shall mean that content and behavior of
applications should be adapted to suit the current
situation.
Some examples are:(Read Assignment...)
1. Content with context awareness
2. Content switch on context
3. Content transcoding on context
19 15/01/2025
Computing
20 15/01/2025
Security Manager
Secures connection between client device and origin server should
handle:
Confidentiality (managed by encryption)
-No information being accessible by third party.
Integrity (managed by algorithms)
- Tamper Resistant – no body can change/alter the content.
Availability (relates to peripheral security)
- service available always. Nobody can stop the service
Non – repudiation (managed by digital signatures)
- Users of the system can be identified.
Trust –The system has formalities to trust recourses, Services and
agents.
21 15/01/2025
Autonomous Computing
The purpose of autonomous computing is to free users and system
administrators from the details of the system operation and
maintenance complexity.
It combines the following functions:
Self configurable: Configurable itself automatically in accordance
with High level policies.
Self optimizing: The system will continuously look for the ways
to improve its operation with respect to resource ,cost and
performance.
22 15/01/2025
Autonomous Computing
Self healing: The system detects ,diagnose and repair
localized problems resulting from bugs and failures.
Self protecting: It will protect it self in two aspects. It will
defined itself from external attacks. And it will not propagate
or cascade failure to other parts of the system.
Self upgradable: It is able to grow and upgrade itself within
the control and the above properties.
23 15/01/2025
Global Positioning System
Gives the exact positioning on Earth
Funded and controlled by US Department of Defense
Has three parts – the space segment, the user segment and control
segment.
Has 24 satellites , each in its own orbit 11,000 nautical miles above
Earth.
Making existing applications mobile enabled
Enhancing an existing application
Renting an application
Developing a new application
Buying a packaged solution
Bridging the gap through middleware
24 15/01/2025
nk
h a
T
o u
25
y 15/01/2025