THREE TIER MOBILE COMPUTING ARCHITECTURE

Slides:



Advertisements
Similar presentations
SIP and Instant Messaging. SIP Summit SIP and Instant Messaging What Does Presence Have to Do With SIP? How to Deliver.
Advertisements

Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
TU/e technische universiteit eindhoven Hera: Development of Semantic Web Information Systems Geert-Jan Houben Peter Barna Flavius Frasincar Richard Vdovjak.
PROF. MAULIK PATEL CED, GPERI Mobile Computing Gujarat Power Engineering and Research Institute 1 Prepared By: Prof. Maulik Patel.
Panasonic Singapore Labs – Network Team QoS and Delivery Context in Rule-Based Edge Services Prepared for IWCW2002 By Ng Chan Wah
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Notes to the presenter. I would like to thank Jim Waldo, Jon Bostrom, and Dennis Govoni. They helped me put this presentation together for the field.
What is adaptive web technology?  There is an increasingly large demand for software systems which are able to operate effectively in dynamic environments.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
1 Enabling Secure Internet Access with ISA Server.
Online Game JAVA for PDA WAP for Mobile Phone. Java for PDA  Hardware limit - Java API Power Memory  JDK 2M byte. Connectivity Display size.
Advances in Technology and CRIS Nikos Houssos National Documentation Centre / National Hellenic Research Foundation, Greece euroCRIS Task Group Leader.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Chapter 1 Lecture 2 By :Jigar M Pandya WCMP 1. Architecture of Mobile Computing The three tier architecture contains the user interface or the presentation.
Client – Server Architecture. Client Server Architecture A network architecture in which each computer or process on the network is either a client or.
A bad case of content reuse Validator Website to Validate License Violations Validator – Only requires the URI of the site to check This work by Oshani.
Page 1 WWRF Briefing WG2-br2 · Kellerer/Arbanowski · · 03/2005 · WWRF13, Korea Stefan Arbanowski, Olaf Droegehorn, Wolfgang.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
Dr. Azeddine Chikh IS444: Modern tools for applications development.
1 Metadata –Information about information – Different objects, different forms – e.g. Library catalogue record Property:Value: Author Ian Beardwell Publisher.
Cooperation & Competition in building the Web, « the universe of network-accessible information » Jean-François Abramatic Chief Product Officer ILOG.
How the Web Works Building a Website – Lesson 1. How People Access the Web Browsers People access websites using software called a web browser. To view.
Semantic Clipboard User Interface is integrated in the Browser Architecture of the Semantic Clipboard Illustration of a license incompliant content reuse.
1 Device Descriptions and User Profiles 인공지능연구실 정홍석.
Review of Paper: Johan Hjelm “Position dependent services using metadata profile matching” Youyong Zou Apr.15,2001.
FriendFinder Location-aware social networking on mobile phones.
MPEG-4: Multimedia Coding Standard Supporting Mobile Multimedia System Lian Mo, Alan Jiang, Junhua Ding April, 2001.
WWW Programming Model. WWW Model The Internet WWW architecture provides a flexible and powerful programming model. Applications and content are presented.
Providing web services to mobile users: The architecture design of an m-service portal Minder Chen - Dongsong Zhang - Lina Zhou Presented by: Juan M. Cubillos.
Client – Server Architecture A Basic Introduction 1.
Web Design New Brighton High School Exploring the History of the World Wide WebWorld Wide Web.
Wireless Communication & Mobile Programming 1 UNIT- 1 – MOBILECOMPUTINGINTRODUCTION Blog: aforajayshahnirma.wordpress.com.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
 Background  Introduction  Purpose  Basic rover services  Physical architecture of Rover System  Server operation  Logical Architecture of A Rover.
12. DISTRIBUTED WEB-BASED SYSTEMS Nov SUSMITHA KOTA KRANTHI KOYA LIANG YI.
4.01 How Web Pages Work.
4.01 How Web Pages Work.
4.01 How Web Pages Work.
Chapter 3 Mobile Computing.
Instructor Materials Chapter 5 Providing Network Services
CIIT-Human Computer Interaction-CSC456-Fall-2015-Mr
Instructor: Ahmed Jafer
Building the Semantic Web
WEB SERVICES.
CS1: Wireless Communication and Mobile Programming
Knowledge Management Systems
CT1303 LAN Rehab AlFallaj.
Chapter 18 MobileApp Design
Processes The most important processes used in Web-based systems and their internal organization.
ICT in Our Everyday Lives:
Introduction to Cloud Computing
WAP.
Model-View-Controller Patterns and Frameworks
Mobile Agents.
Introduction to Databases Transparencies
Lecture 1: Multi-tier Architecture Overview
Configuring Internet-related services
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
Unit V Mobile Middleware.
Unit# 5: Internet and Worldwide Web
A Component-based Architecture for Mobile Information Access
WELCOME TO SEMINAR.
AbbottLink™ - IP Address Overview
敦群數位科技有限公司(vanGene Digital Inc.) 游家德(Jade Yu.)
4.01 How Web Pages Work.
4.01 How Web Pages Work.
And Mobile Web Browsers
Iserve – Bulk Cash Deposit Kiosk
Presentation transcript:

THREE TIER MOBILE COMPUTING ARCHITECTURE 12/31/2018

Presentation tier This is the topmost level of the application. The presentation tier displays information related to such services as browsing merchandise, purchasing, and shopping cart contents. It communicates with other tiers by outputting results to the browser/client tier and all other tiers in the network. Application tier (business logic, logic tier, data access tier, or middle tier) The logic tier controls an application’s functionality by performing detailed processing. Data tier This tier consists of database servers. Here information is stored and retrieved. This tier keeps data neutral and independent from application servers or business logic. Giving data on its own tier also improves scalability and performance. 12/31/2018

Design considerations for mobile computing 1. Content with context awareness 2. content switch on context 3. content transcoding on context. 12/31/2018

Build each application with context awareness Different services for different client context(devices) Example: Bank decides to offer mobile banking application through internet, PDA and mobile using WAP. These services are different like http://www.mybank.com/palm.html http://www.mybank.com/inet.html http://www.mybank.com/wap.wml Etc…. 12/31/2018

This adaption happens transparent to the client http://www.mybank.com/ Another way is to provide intelligence for the application of content within the service. This adaption happens transparent to the client http://www.mybank.com/ An intelligent piece of code identifies the agent to decide what type of device or content it is.? 12/31/2018

Provide middleware platform that perform the adaption of the content. It identify the context either from HTML or XML or other… Middleware platform transcode the code from html to xml and wml on the fly 12/31/2018

Continue.. The mobile computing environment needs to be context independent as well as context sensitive. Context information is related to the environment. The term context means all the information that helps to determine the state of the object. In a mobile computing environment the context data is captured so that decisions can be made about how to adapt content or behavior to suit this context. 12/31/2018

Client context Manager Continue.. Client context Manager We need a client context manager to gather & maintain information pertaining to the client device,user,network and the surrounding environment. Mobile computing applications are needs to operate in dynamic conditions which is due to different network conditions. 12/31/2018

Most applications developed for Web access by keeping large screen and browser in mind. So therefore a context manager is need to maintain the information pertaining to the client device (ie mobile phone ) 12/31/2018

Awareness modules are available are of sensors Either h/w or s/w or both. H/W can find the precise location of user S/W can be used to determine the type of the user agent. Middleware Is of both. 12/31/2018

12/31/2018

Examples of context information 12/31/2018

12/31/2018

Context management means A system is context-aware if it can extract, interpret and use related information . Context management means 1. Context sensing : the way in which context data is obtained 2. Representation : information stored and transported 3. Interpretation : the way in which meaning is obtained from the context representation. 12/31/2018

Composite capabilities/preference profiles A CC/PP profile is a description of device capabilities and user preferences. This is often referred to as a device's delivery context and can be used to guide the adaptation of content presented to that device. 12/31/2018

12/31/2018

Device sends serialized profile with request for content. The CC/PP is designed in such a way that an origin or proxy server can perform some sort of content to device matching. Device sends serialized profile with request for content. Origin server received Resource Description Framework (RDF)  & convert it into a memory model. Document is retrieved as per request. Representation of doc is chosen. Document is presented to device. 12/31/2018

Responsible for controlling policies related to mobility. Roles: Policy manager : The role of policy manager is to create a set of rules needed to be followed under different conditions. Responsible for controlling policies related to mobility. Roles: Permission Prohibition. Authentication etc….. 12/31/2018

Semantic Web : The Semantic Web is a collaborative movement led by the World Wide Web Consortium (W3C)that promotes common formats for data on the WWW By encouraging the inclusion of semantic content in web pages, the Semantic Web aims at converting the current web of unstructured  into a "web of data". It builds on the W3C's Resource Description Framework(RDF). 12/31/2018

Confidentiality : nobody will able to see message. Security Manager : Provides secure connection between client device and a server. Depending on the policies of an organization. It includes : Confidentiality : nobody will able to see message. Integrity : cant change any part of message 12/31/2018

Continue. C . Availability: nobody will be able to stop the service D. Non-repudiation – identification of user, nobody can claim the system E. Trust : there are complex issues of knowing what resources, services or agents to trust. 12/31/2018

Platform for privacy preference project(P3P) The Platform for Privacy Preferences Project (P3P) enables Websites to express their privacy practices in a standard format that can be retrieved automatically and interpreted easily by user agents. P3P user agents will allow users to be informed of site practices (in both machine- and human-readable formats) and to automate decision-making based on these practices when appropriate. Thus users need not read the privacy policies at every site they visit. Have a look at the list of P3P software. 12/31/2018

Content adaptation and Transcoding It checks : Adaptability Manager It is responsible for adapting content, behavior and other aspects according to context and policy. Content adaptation and Transcoding It checks : Physical capabilities of the device : screen size, pixels. Color etc.. Logical capabilities of the device : video, audio… Network effect : bandwidth Payload : total amounts of bits that can deliver to agent 12/31/2018

Content rating and Filtering PICS(Platform for Internet Content Selection) Digital signature : authentication Intellectual property rights management Privacy Personalization Content aggregation OEM(Original Equipment Manufacturer) creates content for their devices. 12/31/2018

Seamless Communication Collaboration with the GSM, CDMA etc which provide Authentication Authorization Billing charges End to end data security Roaming Session migration IP mobility 12/31/2018

Autonomous Computing Self configurable Self optimization Self healing Self protecting Self upgradable 12/31/2018

Content Aware Systems Description of information : Location information : include cell structure and cell ID. Device information : EIR(equipment identity register), IMEI number (International mobile equipment identity) Network information : GSM or GPRS User information : SIM Environment information : surroundings 12/31/2018