Mobile computing architecture refers to the definition of multiple layers between user application interfaces, devices, and network hardware. A well-defined architecture is necessary for systematic calculations and access to data and software objects.
Mobile computing usually implies wireless transmission but, wireless transmission does not imply mobile computing. Mobile computing follows some of the attributes. List of attributes are mentioned in this earlier post. Attributes of Mobile Computing.
3-Tier Architecture of Mobile computing
A 3-tier architecture is an application program that is organized into three major parts, comprising of:
- Layer-1 : Presentation Layer (UI)
- Layer-2: Application Layer(AL)
- Layer-3: Data Access Layer(DA)
Each tier is distributed to a different place or places in a network. These tiers do not necessarily correspond to physical locations on various computers on a network, but rather to logical layers of the application.
- Presentation Layer (UI):
- This layer presents data to the user and optionally permits data manipulation and data entry, also this layer requests the data form Business layer.
- This layer accomplished through use of Dynamic HTML and client-side data sources and data cursors.
- Application Layer (AL):
- The business logic acts as the server for client requests from workstations. It acts according Business rules fetch or insert data through the Data Layer.
- In turn, it determines what data is needed (and where it is located) and acts as a client in relation to a third tier of programming that might be located on a local or mainframe computer.
- Because these middle-tier components are not tied to a specific client, they can be used by all applications and can be moved to different locations, as response time and other rules require.
- Data Access Layer (DA):
- The third tier of the 3-tier system is made up of the DBMS that provides all the data for the above two layers.
- This is the actual DBMS access layer.
- Avoiding dependencies on the storage mechanisms allows for updates or changes without the application tier clients being affected by or even aware of the change.
Note: As more users are uses the system a three tier architecture is more scalable than the other solutions you can add as many middle tiers. Security is also the best in the three tier architecture because tier protects the database tier.
You must log in to post a comment.