Pervasive Web Application Architecture
Pervasive Web Application Architecture
– History
– Scalability
– Availability
– Development
– Application Architecture
• It support multiple devices, such as PCs,
WAP phones, PDAs and voice-only phones
enables to access web servers through voice
gateways.
• The architecture addresses the special
problems associated with pervasive
computing, including diversity of devices,
markup languages and authentication
methods.
History
Authentication
Credential
WAP directory Server
Gateways
Authentication
Proxies
Voice
Gateways Back-end
Network Application
applications
dispatcher Server
PDA
Gateways Database
Network
Server
Demilitarized dispatcher
zone
Scalable topology for PCWA
• Development
– To implement web applications, four roles are
in a team as follows
• Business logic designers – functions and application
flow to be performed.
• User interface designers – responsible for look and
feel, and good usability.
• Application programmers – work with web
applications such as HTML, JSPs, etc.
• Experts for existing legacy database and transaction
systems – for implementing the application logic
and connectivity to database and transaction
systems in the back end.
– In addition to the above team a pervasive
computing specialist, who knows about the
capabilities of devices and the infrastructure
required to support pervasive computing
applications.
– For ex: WAP gateways, Voice gateways and
gateways for PDAs.
– Generally WML, and VoiceXML, which
normally cannot be handled well by traditional
web designers.
Pervasive application architecture
Request Application
Client JSP logic
Response
• Limitations with simple MVC
– It is too inflexible for real-life web applications.
– It does not provide appropriate separation of
responsibilities between Java programmers and
Web designers.
2.Execute Command 3.Access Model
1.Request Controller Model
Beans Ex: EJB
Command
Bean - 2 Model-1
PC Command
Bean - 3 Model-2
Controller
Actio
Actio
Web
WAP Model-3
n
n
Application
(Server) Controller
WAP View-2
PC View-1
Voice View
DB DB DB
Session
Security
State Security Bean
State
Authentication
servlet
Device connectivity infrastructure
Form-based authentication
5.Establish session
Form-based authentication (WML)
authentication
Session
6
3..Invoke
(2, 7) Check
9.Invoke application
1.Request
Proxy 10.Response
Application
11.Response
8.Check policy
Security
Policy
Form-based authentication with a WAP phone (first request)
Session
(2) Check
4.Invoke application
1.Request
Proxy Application
11.Response 5.Response
3. Check policy
Security
Policy