[go: up one dir, main page]

0% found this document useful (0 votes)
9 views25 pages

Chapter1 3

The document outlines the architecture of mobile computing, which is structured into three tiers: Presentation Tier, Application Tier, and Data Tier. Each tier serves distinct functions, with the Presentation Tier handling user interfaces, the Application Tier managing processes and business logic, and the Data Tier storing necessary data. The architecture is designed for effective networked client/server design, enhancing performance, flexibility, and scalability for internet applications.

Uploaded by

Roba Shelema
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views25 pages

Chapter1 3

The document outlines the architecture of mobile computing, which is structured into three tiers: Presentation Tier, Application Tier, and Data Tier. Each tier serves distinct functions, with the Presentation Tier handling user interfaces, the Application Tier managing processes and business logic, and the Data Tier storing necessary data. The architecture is designed for effective networked client/server design, enhancing performance, flexibility, and scalability for internet applications.

Uploaded by

Roba Shelema
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

ADAMA SCIENCE AND TECHNOLOGY UNIVERSITY

SCHOOL OF ELECTRICAL ENGINEERING AND COMPUTING


Department of Computer Science and Engineering

Mobile Computing
Chapter 3
Mobile Computing
Architecture
1 15/01/2025
Architecture of Mobile Computing
 Mobile computing architecture uses Three tier
Architecture
 First tier is User Interface or Presentation
Tier
 Second tier is Process Management or
Application Tier
 Third tier is Database Management or
Data Tier
2 15/01/2025
Architecture of Mobile
Computing

3 15/01/2025
Architecture of Mobile Computing
1. Presentation Tier (Tier I):-
 User interfacing system tier
 These applications run on the client device and offer all the user interfaces
 Responsible for presenting the information to the end user
 Eg: web browsers, web scrapers etc
 Web scraper picks up part of the data from the web page and filters off the remaining
data according to some predefined template
 It manage device and rendering function
 It incorporates user services such as session,

text input , dialog and display management.
2. Application Tier (Tier II):
 It is the middle tier and acts as the engine.
 It is responsible for processing user input, obtaining data and making decisions
 Tier II functions are implemented using Middleware software

4 15/01/2025
Architecture of Mobile Computing
 Application Tier (Tier II): is process management and application tier,


This layer is for process management and application programs

Here business logic and rules are executed.

It also controls transactions and asynchronous queuing
3. Data Tier (Tier III) :

Used to store data needed by the application and acts as a repository
for both temporary and permanent data.

Database middleware runs between the application program and the
database. Eg: ODBC, JDBC etc

Generically, it is for data base access and management

5 15/01/2025
Architecture of Mobile Computing
 This architecture more suitable for effective networked
client/server design.
 Thus 3 tier architecture is most suitable for internet
applications and net centric information systems.
 It provides increased performance, flexibility,
maintainability, reusability, and scalability while hiding
design complexity of distributed processing.

6 15/01/2025
Mobile Computing Architecture

7 15/01/2025
Mobile Computing Architecture
 To design a mobile computing network we need to
know that system will be used through Any
Network, Bearer, agent, and device.
 For universal Access Internet should available as
ubiquitous with browsers as Agents.
 System should be context aware.
 The three tier architecture includes Presentation
tier, application tier and Data tier.

8 15/01/2025
Mobile Computing Architecture
This tier include Web browsers , WAP browsers
and customized client programs.
 Responsible for presenting the information to
the end user
 Run on the client device and offer all the user
interfaces
 Includes web browsers, WAP browsers and
client programs
9 15/01/2025
Application Tier
 Independent of presentation and database management
 Handles functions related to middleware
 Many types of middleware
 Message Oriented Middleware,
 Transaction Processing Middleware,
 Communication Middleware,
 Distributed Objects and Components,
 Transcoding Middleware,
 Web Services, etc.

10 15/01/2025
Message Oriented Middleware
 Loosely connects different applications through

asynchronous exchange of messages


 Works independent of platform or processor

configuration
 Generally asynchronous and peer to peer

 Works in publish / subscribe fashion

 Examples – MQ series from IBM, JMS, etc.

11 15/01/2025
Transaction Processing Middleware

 Provides tools and environment for developing transaction

based distributed applications


 It uses Ideal TP in data management,

 Network access,

 Security Systems ,

 Delivery order processing ,

 Airline reservations,

 Customer service etc.,,

12 15/01/2025
Transaction Processing Middleware
 TP includes management features such as restarting failed

process, dynamic load balancing and ensuring consistency of


distributed data.
 Capable of providing services to thousands of clients in a

distributed client – server environment Independent of database


architecture
 Example – CICS(customer information control system)
from IBM
 MVC(model view controller) is used in JAVA as TP.
13 15/01/2025
Transaction Processing Middleware

14 15/01/2025
Communication Middleware

 Used to connect one application to another

 Quite useful in the telecommunications world

 Uses mediation server to automate the telnet protocol

to communicate to nodes in the network


 Example – Using telnet to connect one application to

another
15 15/01/2025
Transcoding Middleware

 Used to transcode one format of data to another suiting the


needs of the client
 Example: if we want to access a website through mobile
phone supporting WAP need to transcode HTML page to
WML page.
 Useful for content adaptation to fit the needs of device
 Content adaptation is done through proprietary protocols.
 Example – Internet Content Adaptation Protocol (ICAP) from
IETF

16 15/01/2025
Web Services
 Provides a standard means of communication and information exchange among
different software applications.
 Public interfaces and bindings are defined using XML(eXtensible Markup
Language).
 The basic architecture includes web service technologies capable of Exchanging
messages
 Describing Web services
 -Publishing and discovering Web service descriptions.
 Standards for service requestor and service provider
 Service requestor – find and discover the description of services
 Service provider – publish the description of services it provides
 Discovery Agency- agency through which a web service description is published
and made available.

17 15/01/2025
3. Data Tier
 Used to store data needed by the application and acts as a repository
for both temporary and permanent data
 Can use XML for interoperability of data with other systems and data

sources
 Might incorporate the use of Database Middleware and SyncML

 Database Middleware – interfaces application programs and the

database
 Database Middleware – helps business logic run independent and

transparent from database technology and database vendor

18 15/01/2025
Design Considerations for Mobile computing
 Context information is the information related to the
surrounding environment of an actor in that environment.
 Mobility implies that attributes associated with devices
and users will change constantly.
 Such changes shall mean that content and behavior of
applications should be adapted to suit the current
situation.
 Some examples are:(Read Assignment...)
1. Content with context awareness
2. Content switch on context
3. Content transcoding on context

19 15/01/2025
Computing

20 15/01/2025
Security Manager
 Secures connection between client device and origin server should
handle:
 Confidentiality (managed by encryption)

-No information being accessible by third party.


 Integrity (managed by algorithms)
- Tamper Resistant – no body can change/alter the content.
 Availability (relates to peripheral security)

- service available always. Nobody can stop the service


 Non – repudiation (managed by digital signatures)

- Users of the system can be identified.


 Trust –The system has formalities to trust recourses, Services and
agents.
21 15/01/2025
Autonomous Computing
 The purpose of autonomous computing is to free users and system

administrators from the details of the system operation and


maintenance complexity.
 It combines the following functions:

 Self configurable: Configurable itself automatically in accordance

with High level policies.


 Self optimizing: The system will continuously look for the ways

to improve its operation with respect to resource ,cost and


performance.
22 15/01/2025
Autonomous Computing
 Self healing: The system detects ,diagnose and repair

localized problems resulting from bugs and failures.


 Self protecting: It will protect it self in two aspects. It will

defined itself from external attacks. And it will not propagate


or cascade failure to other parts of the system.
 Self upgradable: It is able to grow and upgrade itself within

the control and the above properties.


23 15/01/2025
Global Positioning System
 Gives the exact positioning on Earth
 Funded and controlled by US Department of Defense
 Has three parts – the space segment, the user segment and control
segment.
 Has 24 satellites , each in its own orbit 11,000 nautical miles above
Earth.
Making existing applications mobile enabled
 Enhancing an existing application
 Renting an application
 Developing a new application
 Buying a packaged solution
 Bridging the gap through middleware
24 15/01/2025
nk
h a
T
o u
25
y 15/01/2025

You might also like