The document discusses mobile computing architecture using a three-tier model. The presentation tier handles the user interface. The application tier contains business logic and processes requests from the presentation tier by accessing data from the database tier. Each tier can be distributed across a network with the tiers representing logical rather than physical layers. This architecture provides benefits like flexibility, scalability, and hiding complexity.
The document discusses mobile computing architecture using a three-tier model. The presentation tier handles the user interface. The application tier contains business logic and processes requests from the presentation tier by accessing data from the database tier. Each tier can be distributed across a network with the tiers representing logical rather than physical layers. This architecture provides benefits like flexibility, scalability, and hiding complexity.
The document discusses mobile computing architecture using a three-tier model. The presentation tier handles the user interface. The application tier contains business logic and processes requests from the presentation tier by accessing data from the database tier. Each tier can be distributed across a network with the tiers representing logical rather than physical layers. This architecture provides benefits like flexibility, scalability, and hiding complexity.
The document discusses mobile computing architecture using a three-tier model. The presentation tier handles the user interface. The application tier contains business logic and processes requests from the presentation tier by accessing data from the database tier. Each tier can be distributed across a network with the tiers representing logical rather than physical layers. This architecture provides benefits like flexibility, scalability, and hiding complexity.
SCI4105 Introduction • Mobile communication • Mobile hardware • Mobile software Mobile computing environment
A mobile computing environment involves accessing
information through a wireless network connection. The mobile unit may be stationary, in motion, and/or intermittently connected to a fixed (wired) network. Mobile computing functions/characteristics • User mobility • Network mobility • Bearer mobility • Device mobility • Session mobility_CDMA continues despite disconnection • Agent mobility feature • Host mobility-client-server Mobile computing functions/characteristics • User mobility:means a user who has access to the same or similar telecommunication services at different places, i.e., the user can be mobile, and the services will follow him or her.
• Network mobility: Mobility of an entire
network that changes its point of attachment to the internet as a single unit • Mobile computing functions/characteristics • Bearer mobility :user should be able to move from one bearer to the other and use the same service
• Device mobility: a user should be able able to
move from one device to the other and use the same service Mobile computing functions/characteristics • Session mobility: A user session shuld be able to move from one agent user environment ot the other._CDMA continues despite disconnection
• Agent mobility feature
• Host mobility: The user should be either a client/server Architecture • The network-centric mobile computing architecture uses three-tier architecture 1) Presentation Tiers 2) Application Tiers 3) Data Tier Architecture architecture In three tier architecture, the first layer is User Interface or Presentation Tier. This layer deals with user facing device handling and rendering. this tier includes a user system interface where user service reside Architecture • The second tier is the Process Management or Application Tier • This layer is capable of accommodating hundreds of users. • The middle process management tier controls transaction and asynchronous queuing to ensure reliable completion of transaction. Architecture • The third final tier is the Database Management or Data Tier. • This Layer is for database access and management. • architecture • The three-tier architecture is better suited for an effective networked client/server design. It provide increased performance , flexibility , maintainability , reusability and scalability , while hiding the complexity of distributed processing from user. • All these characteristic have made three-tier architecture a popular choice for Inter application and net-centric information system H/w • Describe the three tier architecture for mobile computing Adaptability in mobile computing
Vision :To be able to roam Seamlessly with your
computing devices while continuing to perform computing and communication tasks uninterrupted Adaptability • Transparency :Transparency is the ability of a system to hide some characteristics of its underlying implementation from users. Much of the research effort in distributed computing has been devoted to developing mechanisms for providing various forms of transparency • Examples of transparency include • Access transparency is the ability of a system to hide the differences in data representation on various machines and the mode of access of a particular resource. • Location transparency is the ability of a system to conceal the location of a resource. Related to location transparency are name transparency (which ensures that the name of a resource does not reveal Adaptability • any hints as to the physical location of the resource) and user mobility (which ensures that no matter which machine a user is logged onto, she should be able to access resources with the same name). • Failure transparency is the ability of the system to hide failure and recovery of a system component. Contsraints • 1. Mobile computers can be expected to be more resource-poor than their static counterparts. • 2. Mobile computers are less secure and reliable • 3. Mobile connectivity can be highly variable in terms of it’s performance (bandwidth and latency) and reliability Adaptation Mechanisms • Functionality • Data Examples of adaptive applications • Odyssey • Rover Introduction • Mobile computing is the field of wireless communication and carry-around computers, such as laptop computers. In some ways the mobile computing field spun out of work initialized within the ubiquitous computing area. Likewise, the early focus on wireless networking led to wireless communication mechanism research. Work on these mechanisms began in the mid-1980s and led up to the standards around wireless local area networks (WiFi) that started forming in the late 1990s. Architecture of mobile computing • With the aid of a diagram Explain Mobile Computing Architecture in detail Mobile computing architecture Mobile computing architecture • A 3-tier architecture is an application program that is organized into three major parts, comprising of: • The data access layer tier at the bottom, • The application tier (business logic) in the middle and • The client tier (presentation) at the top. • Each tier is distributed to a different place or places in a network. These tiers do not necessarily correspond to physical locations on various computers on a network, but rather to logical layers of the application. 1. Presentation Layer (UI):
• This layer presents data to the user and
optionally permits data manipulation and data entry, also this layer requests the data form Business layer. • This layer accomplished through use of Dynamic HTML and client-side data sources and data cursors. 2. Business Logic Layer:
• The business logic acts as the server for client requests
from workstations. It acts according Business rules fetch or insert data through the Data Layer. • In turn, it determines what data is needed (and where it is located) and acts as a client in relation to a third tier of programming that might be located on a local or mainframe computer. • Because these middle-tier components are not tied to a specific client, they can be used by all applications and can be moved to different locations, as response time and other rules require. 3. Data Access Layer:
• The third tier of the 3-tier system is made up
of the DBMS that provides all the data for the above two layers. • This is the actual DBMS access layer. • Avoiding dependencies on the storage mechanisms allows for updates or changes without the application tier clients being affected by or even aware of the change.