module1 mobile computing architecture

58
Client layers of the optical layer Module 1 1

Upload: raksharao

Post on 12-Apr-2017

361 views

Category:

Engineering


0 download

TRANSCRIPT

Page 1: Module1 Mobile Computing Architecture

Client layers of the

optical layerModule 1

1

Page 2: Module1 Mobile Computing Architecture

Architecture for mobile computing

The first layer is User Interface or Presentation Tier.

Deals with user facing device handling and rendering

Includes a user system interface where user services reside

Second tier is the Process Management or Application Tier.

Here business logic and rules are executed.

Capable of accommodating hundreds of users

Controls transactions

Asynchronous queuing to ensure reliable completion of transactions.

Third tier is Database Management or Data Tier

For database access and design

Provides increased performance, flexibility, maintainability, reusability and scalability,

while hiding the complexity of distributed processing from the user 2

Page 3: Module1 Mobile Computing Architecture

Three-tier architecture for mobile

computing

3

Page 4: Module1 Mobile Computing Architecture

Three-tier architecture (in detail)

To have universal access, the server is connected to a

ubiquitous network like internet.

To have access with network, an application called web

browser is required such as Internet explorer, Mozilla etc

Three layers

Presentation Tier (Tier 1)

Application Tier (Tier 2)

Data Tier (Tier 3)

4

Page 5: Module1 Mobile Computing Architecture

The mobile

computing

architecture

5

Page 6: Module1 Mobile Computing Architecture

Presentation Tier (Tier 1)

First tier

Layer of agents applications and systems.

Applications run on the client device and offer all the userinterfaces.

Responsible for presenting the information to the end user.

Humans use audio and video to receive information from themachine

Information is given to the system from keyboard(computer,laptop, cell phones ), pen (tablet, palmtop) etc

It includes web browsers

6

Page 7: Module1 Mobile Computing Architecture

Application Tier (Tier 2) Considered as engine of the application

Performs the business logic of the processing input, obtaining data and

making decisions.

Includes technologies like CGIs, Java, JSP, .NET services, PHP etc. deployed

in products such as Apache, Websphere etc.

Tier is presentation and database independent.

Operations such as network management, security are performed using a

middleware software

Middleware is defined as a layer of software, which sits in between the

operating system and user facing software.

Can also be defined as a software gateway connecting two independent open

objects.7

Page 8: Module1 Mobile Computing Architecture

Middleware categories

Message-oriented Middleware (MOM)

Transaction processing (TP) Middleware

Database Middleware

Communication Middleware

Distributed Object and Components

Transcoding Middleware

Internet Content Adaption protocol (ICAP)

Web services

8

Page 9: Module1 Mobile Computing Architecture

Message-oriented Middleware (MOM)

It connects different applications through asynchronous exchange of messages.

Works over a networked environment without knowing what platform or

processor the other application is resident on.

The message can contain formatted data, requests for actions or unsolicited

response.

Provides a message queue between any two interoperating applications.

If the destination process is busy , then message is held in temporary storage

until it is processed.

9

Page 10: Module1 Mobile Computing Architecture

It is asynchronous, peer to peer, works in

Publish/Subscribe fashion.

In this mode, one or more objects subscribe to an event.

As event occurs it will be published by the loosely coupled

asynchronous object.

MOM will notify about this event , Is appropriate for event

driven applications

Eg: Message Queue from IBM known as MQ series

10

Page 11: Module1 Mobile Computing Architecture

Transaction Processing (TP) middleware It provides tools and environment for developing transaction based distributed

applications.

Inputs the data into a system at point of information source and output the

data at information sink.

Used in data management, network access, security systems, delivery order

processing, airline reservations, customer service etc

Capable of providing services to thousands of clients in a distributed client/

server environment.

11

Page 12: Module1 Mobile Computing Architecture

Includes features such as restarting failed process,

dynamic load balancing and ensuring consistency of data.

Independent of database architecture.

It optimises the use of resources by multiplexing many

client functions onto much smaller set of application

service routines.

Eg: MVC

12

Page 13: Module1 Mobile Computing Architecture

Transaction processing middleware

13

Page 14: Module1 Mobile Computing Architecture

Model view controller MVC Java uses MVC architecture , which is an example of TP middleware

It splits application into separate layers i.e. presentation, domain logic anddata access.

Model

domain specific representation of the information on which the application operates.

Domain logic manipulates and adds the meaning to the raw data

View

Responsible for rendering the model into a form suitable for interaction and understood bythe user

Controller

Manages the process and responds to events, typically user actions, may invoke changes inthe model 14

Page 15: Module1 Mobile Computing Architecture

Communication middleware

Similar to connecting one application to another with the

help of telnet

Used in telecommunication world

User interface is through telnet

A mediation server automates the telnet protocol to

communicate with these nodes in the network.

Eg:TN5250, TN3270

15

Page 16: Module1 Mobile Computing Architecture

Distributed Object and Components

Eg: CORBA (Common Object Request Broker Architecture)

Open distributed computing infrastructure being standardizedby object management group.

Is vendor – independent infrastructure.

CORBA based program from any vendor on almost any computer,operating system, programming language and network caninteroperate with a CORBA based program from same oranother vendor

Handles large number of clients at high rates with highreliability.

16

Page 17: Module1 Mobile Computing Architecture

Transcoding Middleware

Used to transcode one format of data to another to suit the

need of the client.

To access web pages on phone, the HTML pages are transcoded

into WML pages so that mobile phone can access it.

It is used for content adaptation to fit the need of the device.

Content adaptation is also required to meet the network

bandwidth.

Content adaptation is done through proprietary protocols

17

Page 18: Module1 Mobile Computing Architecture

Internet Content Adaptation Protocol

(ICAP)

Contents present in the internet is accessed from differentagents and devices.

Is a protocol aimed at providing simple object based contentvectoring for HTTP services.

Lightweight protocol to do transcoding on HTTP messages.

Allows ICAP clients to pass HTTP messages to ICAP servers forsome sort of transformation.

The server sends back the transformed messages back to itsclients.

Before document is displayed for the agent, it is checked virus.

18

Page 19: Module1 Mobile Computing Architecture

Typical data flow in ICAP environment

19

Page 20: Module1 Mobile Computing Architecture

Steps performed

The user agent makes a request to an ICAP client for an objecton an object server.

The client sends the request to the ICAP server

The ICAP server executes the ICAP resource service on therequest and sends the possibly modified request or a responseto the request ICAP client

The client sends the request, possibly different from theoriginal client’s request to the original server.

The origin server responds to the request

The ICAP client sends the reply to the client.

20

Page 21: Module1 Mobile Computing Architecture

Services provided by ICAP servers

Virus checking for the requested content

Content filtering based on the sensor rating like PG(

parental guidance) , R (Restricted)

Local real time advertisement insertion like television

Wireless protocol translation

Image magnification for elderly

Peer to peer compression

Encryption of data and many more.

21

Page 22: Module1 Mobile Computing Architecture

Web services It provides a standard means of communication and information exchange among

different software applications, running on a variety of platforms or frameworks.

Is a software system identified by URL whose public interfaces and bindings are

defined using XML

The basic architecture includes web service technologies capable of:

Exchanging messages

Describing web services

Publishing and discovering web service descriptions.

Web services architecture defines the standard for exchange of messages

between the service requester and service provider.

22

Page 23: Module1 Mobile Computing Architecture

Service providers are responsible for publishing adescription of the services they provide

Requesters must be able to find and discover descriptionsof the services.

Software agents in the basic architecture can take on oneor all of the following:

Service requester: requests the execution of the web service

Service provider: processes a web service request

Discovery agency : agency through which a web service descriptionis published and made discoverable.

23

Page 24: Module1 Mobile Computing Architecture

Data (Tier 3)

Used to store data needed by the application and acts as

repository for both temporary and permanent data.

The data can be stored in any form of datastore or

database.

Data can be stored in XML format for interoperability with

other systems and data sources.

24

Page 25: Module1 Mobile Computing Architecture

Database Middleware Database independence helps in maintenance of the system better.

Allows the business logic to be independent and transparent of the database

technology and the database vendor.

Runs between the application program and the database.

Also called as database connectors as well.

Eg: ODBC, JDBC

With the help of these middleware's, the application will be able to access

data from any data source.

Data sources can be text files, flat files, spreadsheets or network, relational

, indexed, hierarchical, XML database etc.

25

Page 26: Module1 Mobile Computing Architecture

SyncML Is a protocol is an emerging standard for synchronization of data access form

different nodes.

New industry initiative to develop and promote a single common data

synchronization protocol that can be used industry wide.

Supports the naming and identification of records and common protocol

commands to synchronize local and network data.

Supports identification and resolution of synchronization conflicts.

It works over all networks used by mobile devices both wireless and wireline.

26

Page 27: Module1 Mobile Computing Architecture

Design consideration for mobile

computing The term context means , all the information that helps determine the state of an

object or actor

It can be a person, device , a place , a physical or computational object.

Content with context awareness

Build each application with context awareness

There are different services for different client context

Bank providing services on internet, for mobile phones and PDA

Have different URL for each type of device

Content switch on context

Provides adaptation of content within service

Transparent to the client

Here service is the same for internet , PDA and WAP

All access the bank site from same URL

27

Page 28: Module1 Mobile Computing Architecture

Content transcoding on context

Performs the adaptation of content based on the context and

behaviour of the device

Transparent for the client and the application

Middleware is used to perform all the operation

Middleware is intelligent to convert from HTML to XML or vice

versa as need occurs.

28

Page 29: Module1 Mobile Computing Architecture

Client Context Manager

29

Page 30: Module1 Mobile Computing Architecture

Identity information

The device will be in a position to communicate its identity without any ambiguity

Spatial information

Information related to surrounding space i.e. location, orientation, speed , elevation and

acceleration

Temporal information

Information related to time such as time of day, date, time zone, season of the year

Environmental information

Related to environment surroundings such as temperature, air quality, moisture etc

Social information

Related to social environment such as who is with you, people nearby, whether the user

is in the meeting or party. 30

Page 31: Module1 Mobile Computing Architecture

Resource that are nearby

Relates to the resources accessible nearby such as devices, hosts or information sinks.

Availability of resources

Information about the device in use such as battery power , processing power, display etc

Physiological measurements

Relates to physiological state of the user such as blood pressure, heart rate, respiration rate

, tone of voice

Activity

Relates to the activity of the user such as talking, reading, walking and running.

Schedules and agendas

Relates to the schedules and agendas of the user. 31

Page 32: Module1 Mobile Computing Architecture

A system is context aware of it can extract , interpret and use context relatedinformation to adapt its functionality to the current context.

Three aspects of the context management

Context sensing

The way in which the information is obtained

Context representation

The way in which the context information is stored and transcoded.

Context interpretation

The way in which the meaning is obtained from the context representation.

W3C proposed a standard for context information, i.e. Composite Capabilities/ PreferenceProfiles (CP/PP) 32

Page 33: Module1 Mobile Computing Architecture

Composite capabilities/ Preference

Profiles (CC/PP)

Proposed by W3C

Model is based on RDF( Resource Description Framework) andcan be serialized using XML.

Contains a number of attribute names and associated valuesthat are used by an application to determine the appropriateform a resource to deliver to a client.

Help a client/ proxy to describe their capabilities to an originserver or other sender of resource data.

Fir different application to interoperate, some commonvocabulary is needed.

33

Page 34: Module1 Mobile Computing Architecture

Steps are

Device sends serialized profile model with request for content

Origin server receives serialized RDF profile and converts it into

an in-memory model

The profile for the requested document is retrieved and in-

memory model is created.

The device profile model is matched against the document

profile model

A suitable representation of the document is chosen.

Document is returned to device and presented.

34

Page 35: Module1 Mobile Computing Architecture

The simplest use of CC/PP

35

Page 36: Module1 Mobile Computing Architecture

Policy Manager

Responsible for controlling policies related to mobility

A policy is set of rules, these rules need to be followed under differentconditions.

When mobility is considered, the information will be visible from outside thefour walls of the enterprise.

Organizations will have policies regarding the disclosure of the information.

Eg: certain documents can be viewed only at the office of CEO

These kinds of policies must be transferable to mobile computing policymanager.

It will be able to define policy for the documents and assign roles to users.

Each role will have permission , prohibition, obligations associated with it.

Policy manager will have rights to read, write and execute36

Page 37: Module1 Mobile Computing Architecture

Semantic Web

How to make machines understand policies and make thembehave in the expected fashion?

Semantic web addresses this need

Data is defined in the web and linked in such a way that it canbe used by the machine not for just display, but for theautomation. Security, filtering, integration and reuse of dataacross various applications.

It is generally built on syntaxes which use URLs to representdata, usually tuple based structures.

These syntax is called Resource Description Framework (RDF)syntaxes.

37

Page 38: Module1 Mobile Computing Architecture

Security manager

Provides a connection between the client device and the origin server.

Security manager will ensure security with respect to

Confidentiality:

The message transacted needs to be confidential

Nobody should be able to see it.

Managed by encryption eg: AES

Integrity

The message transacted needs to be tamper-resistant

No body should be able to change any part of the message

Managed using various hashing algorithms

38

Page 39: Module1 Mobile Computing Architecture

Availability

The system will be available

Nobody will be able to stop the service

Non-repudiation

Users of the system can be identified

Nobody after using will claim otherwise

Managed by digital signatures

Trust

There are complex issues of knowing what resources, services or agents totrust.

The system will be trusted.

39

Page 40: Module1 Mobile Computing Architecture

Platform for privacy preference project

(P3P)

Is an emerging standard defined by W3C

Enables web sites to express their privacy practices in standardizedformat so that they can be retrieved and interpreted as user agents.

With P3P , users need not read the privacy policies they visit

Instead key information about the content of the web is conveyed tothe user

The goal of P3P is to increase the user trust and confidence in theweb.

This informs the privacy policies about the site, hence makes the userto decide whether to release personal information or not.

40

Page 41: Module1 Mobile Computing Architecture

Adaptability Manager

Responsible for adapting content, behaviour and other

aspects acc. to the context and policy

May take any number of actions depending on the

information passed to the context manager

Most common action performed is transcoding of the

content so that it may be viewed on a particular device

Appending location-specific information to the document.

41

Page 42: Module1 Mobile Computing Architecture

Content adaption and transcoding

Content adaptation can be done at either content level in server endor the agent level in client device

Can be done in intermediate level in a middleware framework.

Content adaptation needs to consider the following attributes:

Physical capabilities of the device

Screen size, width and height in pixels, color

Logical capabilities of the device

Display image, audio, video

Effective network bandwidth

Payload

The total amount of bits can be delivered to the agent for static parts.

42

Page 43: Module1 Mobile Computing Architecture

Types of transcoding

Spatial

Transcoding in space or dimension

A standard frame is downscaled and reduced.

The frame is changed from one size to different size to suit the target device

Temporal

Reduction of number of frames on time scale

Downscales the no. of transferred frames to suit the target device andnetwork bandwidth

Code

Used to change the coding standard from one to another

Eg: transcoding BMP code into WBMP for wireless devices

43

Page 44: Module1 Mobile Computing Architecture

Types of transcoding

Color

Requested for monochrome clients

Uses less pixels and reduces bandwidth consumption

Modifies the perception of the image

Object or semantic

Comprises various techniques based on the computer visiontechniques

Extracts the valuable object from the scene, transfer them withlower amount of compression in order to maintain the both detailsand speed.

44

Page 45: Module1 Mobile Computing Architecture

Server side adaptation , resource requirements are

Static content size in bits

Display size such as height, width and area

Streaming bit-rate

Color requirements

Compression format

Hardware requirement such as display for images, support for

audio and video

45

Page 46: Module1 Mobile Computing Architecture

Transcoding done through middleware

Benefit of the middleware approach is it is totallytransparent to the device and content

Drawback is

Content providers have no control over how their content willappear to different clients

There may be legal issues like copyright

Html tags provides formatting information rather than semanticinformation

Transcoding of videos and audio is not easy

Developing a general purpose transcoding engine is very difficult.

46

Page 47: Module1 Mobile Computing Architecture

Content Rating and Filtering

W3C has proposed a standard called PICS (Platform for Internet Content Selection)for rating of the web content

Filtering of the content takes place based on this rating

It is set of technical specifications for labels that help software and rating to worktogether

Rating is allowed to the service provider , since it involves some amount ofsubjective judgement

Rating can be through self labelling or third part labelling of the content

PICS was concerned about children accessing the inappropriate materials , i.e metadata system, meaning that labels provide any kind of descriptive information aboutinternet material

Controlling was done using :47

Page 48: Module1 Mobile Computing Architecture

Digital Signature:

Coupling the ability to make assertions with cryptographic signature block that ensureintegrity and authenticity

Intellectual Property Right Management

Using the meta-data system to label Web resources with respect to authors, owners, rightsmanagement information

Privacy (P3)

Using Meta-Data system to allow sites to make assertions about their privacy practices andfor users to express their preferences for the type of interaction they want to have withthose sites.

Personalization

Based on some policy, the content can be personalized to suit the need of user and theservice 48

Page 49: Module1 Mobile Computing Architecture

Content Aggregation

Four parties

End User (EU)

Content Provider (CP)

Content Aggregator (CA)

Internet Service Provider (ISP)/ Wireless Network Operator (NO)

NO will have routers, gateways, cache etc to offer service

Any node can be responder and requester

There will be different parameters to determine the content

They can be static or dynamic parameters

Static parameter is received before the service begins

Dynamic parameter are those which are required with every request.

49

Page 50: Module1 Mobile Computing Architecture

Types of service (Content Aggregator ‘s

perspective)

Single Service Request

Works at user level

Works for only one user

Group service request

Works for group of users

Initiated at CA level or the NO level

50

Page 51: Module1 Mobile Computing Architecture

Seamless Communication

A system should be available and accessible from anywhere and

anytime and through any network or device

The user should be able to access the system when travelling.

Patient travelling from house to hospital via ambulance or

helicopter, here information has to exchange without any

interruptions.

Seamless Communication will combine seamless handoffs and

seamless roaming

51

Page 52: Module1 Mobile Computing Architecture

Handoff is the process which the connection to the

network is moved from one base station to another base

station within the same network

Roaming is a process in which connection to the network

is moved from one base station of one network to another

base station of another base station.

Offers freedom to roam across different wireless networks

Roaming works within homogeneous networks like GSM to

GSM or CDMA2000 to CDMA2000

52

Page 53: Module1 Mobile Computing Architecture

Following aspects needs to be maintained in seamlesscommunication

Authentication across network boundaries

Authorization across network boundaries

Billing and charging the data collection

End to end data security across roaming

Handoff between wireless access points

Roaming between the networks

Session migration

IP mobility

53

Page 54: Module1 Mobile Computing Architecture

Autonomous Computing

The purpose of autonomous system is to free users and systemadministrators from the details of the system operation and maintenancecomplexity.

System will run 24 X 7

Combination of the following functions

Self Configurable

Will configure automatically in accordance with high level policies

Self optimizing

Continuously look for ways to improve its operation with respect to cost, resourceand performance

Self Healing

Will detect, diagnose and repair localized problems resulting from bugs or failures.

54

Page 55: Module1 Mobile Computing Architecture

Self Protecting

It will be well defined from external attacks

Will not cascade failures to other parts of the system

Self Upgradeable

Will be able to grow and upgrade itself within the control of the

above properties.

55

Page 56: Module1 Mobile Computing Architecture

Context aware Systems Context manager is to maintain information pertaining to location,

mobile devices, networks, users , the environment around eachmobile device and other context information deemed relevant

Information such as

Location information

Helps to identify the location of the user/device

Can be achieved using device or through network

From device- GPS, can offer location precision of 10 feet radius

From network- timing advanced technology- precision of 100 feet radius

Device information

The know about the characteristics of the device

To determine the resource capability and the user interface capability

User-Agent parameter of HTTP we can obtain the device information56

Page 57: Module1 Mobile Computing Architecture

Network information

Mobile computing environment, device moves from one network to another network

Is required to identify the capability of the network

Includes information such as security infrastructure, services offered by the networks

User information

This information is required to identify the user correctly

The system needs to ensure that the user is genuine and who he claims to be

Information can be validated through authentication independent of device or network

Environment information

Tells about the surrounding environment

Know about the temperature, elevation, moisture etc which is mainly required for sensorbased networks 57

Page 58: Module1 Mobile Computing Architecture

GPS Global Positioning System , is a system that gives exact position on this earth

Funded and controlled by US Department of Defence

GPS satellites are orbiting around the earth, which transmits the signals that can be detected byanyone with a GPS receiver

Has three parts

Space segment

User segment

Control segment

Space Segment

Consists 24 satellites, each in its own orbit

Each GPS satellite takes 12 hours to orbit the earth

Each satellite is equipped with a clock to broadcast signals with respect to time

User segment

Has receivers, which can be users hand, embedded in a mobile device or mounted in a vehicle.

Receives the signal from satellite at the speed of light 58