SlideShare a Scribd company logo
1 of 40
Client-Server Computing
in Mobile Environments
Client-Server Architecture
 Versatile,

Message based, Modular
Infrastructure intended to improve usability,
flexibility, interoperability and scalability as
compared to Centralized, Mainframe, time
sharing computing.
 Intended to reduce Network Traffic.
 Communication is using RPC or SQL

2
Mobile Computing and Issues
in Client-Server Environment
 Mobile

Computing a new Paradigm

 Issues



Mobility of Users and their computers
Mobile Resource constraints



Wireless Bandwidth
Limited Battery Life

3
Paradigms of Mobile ClientServer Computing
 Mobile



Aware Adaptation

Response to change in environment
Necessary system services that can be utilized

 Extended


Various Architectures that enables functional
participation of applications between client and
servers

 Mobile


Client-Server Model

data Access

Deals with issues like data transfer and consistency of
Client cache
4
Mobile-Aware Adaptation
 Dynamically

adjusting the functionality
between the mobile and stationary host to
cater changes like



Variations and changes in Network Conditions
Local resource availability

 Computations

of Clients and Servers should
be adaptive in response to change in mobile
environment.
5
Mobile-Aware Adaptation
 Application






Transparent Adaptation

Applications work with no modification in mobile
environment
System shield or proxy is provided which hides
the differences between the stationary and mobile
environments from Applications
The proxy / System shield mitigates to the change
in environment and the change is transparent to
the applications.
6
Application Transparent
Adaptation


E.G. File System Proxy (CODA)






File System Proxy hides mobile issues from applications and
emulate file server services on the mobile device.
Proxy Log
Concurrency control after reconnection

Three phases


Hoarding




Emulating





Server Files pre-fetched into Mobile Computers
Upon Disconnection updates are logged
Log optimization is done to improve performance

Reintegrating


Synchronizes cache with the server

7
Application Transparent
Adaptation
 Drawbacks

of this approach



Performance is an issue



It may be sometimes very hard for the system
Some manual user intervention may be needed

8
Application-Aware Adaptation
 Allows

Applications or their extensions to
react to mobile resource changes
 How?






Collaboration between System and individual
Applications
System monitors resource levels and notifies
applications of relevant changes
Application then adapts to the change

9
Application-Aware Adaptation
 It

can be divided into three different
categories




Client- based Application adaptation
Client-server Application adaptation
Proxy-based Application adaptation

10
Client- based Application
Adaptation
 In

the Collaborative adaptation ,System
provides mechanisms of adaptation, while
applications are free to specify adaptation
policy
 Application changes or adaptation is done
only on client side

11
Client-Server Application
Adaptation








The Rover toolkit supports the application aware
adaptation through the use of RDO
http://www.pdos.lcs.mit.edu/rover/
RDOs are relocatable dynamic objects
RDOs are defined for the data types manipulated by
the application and for the data transported between
client and server
Programmers Task
Benefits to Application Designers



Application designers have semantic knowledge
Can tightly couple data with program code and manage
resources
12
Proxy-Based Application
Adaptation
 The

application specific proxy has been
proposed as an intermediary between client
and server
 It performs storage intensive and
computation intensive tasks
 Proxy reduces Bandwidth demands and allow
legacy and non standard client to
communicate with the server
13
Extended Client-Server Model
 Classic

client-server systems assume that
the location of client and server hosts do not
change and also the connection among them
does not change
 Functionality between client and server is
statically partitioned
 Extended Client server Architecture thus
deals with these inconsistencies in network
connections and location specifics
14
Extended Client-Server Model
 Thin

 Full

client architecture

client architecture

 Flexible

client architecture

15
Thin client architecture

16
Full-Client Architecture
 Can

support disconnected or weakly
connected client
 The full client architecture supports
emulations of functions of server at client
host
 Light weight servers or proxy
 E.G CODA , WebExpress

17
Flexible Client-Server
Architecture




Generalizes both thin
client and full client
architecture
Connection between
client and server can be
dynamically established

18
Mobile Objects
 Programming

entities that can freely roam the

network
 Mobile objects allow clients to download the
server code to mobile host for execution
 They can maintain state information and
make intelligent decisions
 Challenge in using mobile objects?


Frequently disconnected or weak environment
19
Collaborative Groups
 Division

of members into groups
 Members can access data for the group
 A client is able to access data residing on
server to which it is communicating and
conversely any machine holding the copy of
the database, including personal laptop,
should be willing to server read and write
requests from nearby machines
 E.G Bayou system
20
Flexible Client-Server
Architecture
 Application




Proxy acts an intermediary between clients and
server
Allows legacy and other non-standard clients to
interoperate with existing servers

 Virtual


specific proxy

mobility of servers

Achieved by replication

21
Mobile Data Access



Mobile data access enables the delivery of server
data and the maintenance of client-server data
Data Access strategies in mobile environment can
be characterized by






Data delivery
Data organization
Consistency requirement

Server Data Delivery Modes




Client –pull
Server-push
Hybrid delivery
22
Server Data Dissemination
 Asymmetrical

communication between clients

and server
 Scalability problems for applications with
asymmetrical communication
 Solution: Broadcast –based dissemination
 Broadcast disk
 Indexing on air



Increases query time
Decreases Listening time
23
Client Cache Management
 Caching

reduces contention and improves
query response time
 Cache data can support disconnected
operations
 Automated Hoarding
 Varied Granularity of Cache coherence



Callback Approach
Detection Approach
24
Disconnected Operation
in a Mobile Computing
Environment
1. Introduction
 Key

requirement of portable computers
→ the ability to access critical data
regardless of location
 Constraints of mobile elements




resource-poor
more prone to loss, destruction, and subversion
must operate under a much broader range of
networking conditions

 Ideally,

mobility should be completely
26
transparent to users
2. Overview of Coda File
System
 Design

optimized for the access and
sharing patterns typical of academic and
research environments
HDB

 Server




replication
ni
ro
ch
yn
s

volume storage group (VSG)
accessible VSG (AVSG)
reintegration
callback-based caching

 Disconnected


hoarding

operation

venus services by
relying on its cache

dis
c

d
ze

on
ne
c

tio
n

emulation
reconnection
Client modify
log

27
3. Implementation Status
1990

1991

1992

1993

October

•minimal functionality
was demonstrated

•a more complete version
•began to be used regularly by
members of the Coda group

•almost all of the functionality
•user community had expanded
outside the Coda group

•about 30 users,
of whom about 20
use on a regular basis

•performance tuning and
bug-fixing

28
3. Implementation Status
(cont’d)
 Server



three DECStation 5000/200 with 2GB HDD
150 volumes




25% - user volumes
65% - project volumes
10% - system volumes

 Clients


15 desktops : DECStation 5000/200, Sun
Sparcstation, IBM RT


user and project volumes - Coda / system volumes 29
AFS
4. Qualitative Evaluation
 The



nature of testbed environment

voluntary disconnected operation of mobile user
involuntary disconnection of desktop user when
Coda server crash

4.1. Hoarding


substantially improved the usefulness of disconnected
operation

 hoard



profiles

common method of user/HDB interactions
little direct sharing of profiles among users
30
 multi-level


hoard priorities

only a single level of hoard priority in earliest Coda
design
→ an object was either sticky or not




much more time and effort
reduce the ability of users to hoard effectively
frequent disconnected misses

 meta-expansion


reduce the verbosity of hoard profiles and simplify
their maintenance




c
d
+

: the command applies to immediate children
: the command applies to all descendants
: the command applies to all future
31
 reference


spy program


record all file references observed by Venus

 periodic


hoard walking

background equilibration of the cache




guard a user who forgets to demand a hoard walk
before voluntary disconnecting
prevents a huge latency hit if and when a walk
demanded

 demand


spying

hoard walking

foreground cache equilibration


invoked before voluntary disconnecting
32
4.2. Server emulation
 transparency


high degree of transparency attribute to a single
client agent supporting both connected and
disconnected operation

 cache


experienced no cache misses





misses

hoarding
most disconnections were voluntary

when disconnected misses occur



block processes
switch to another task
33
4.3. Reintegration
 performance




taken less than a minute to complete (mainly 5~20
seconds)
reintegration storm



server returns a busy message
break operation logs into independent parts

 detected




failures

very rare, however, due to bugs rather than update
conflicts
Venus writes out the operation log and related
container files to a local file called a closure
34
4.4. Other observations
 optimistic replication


vs. pessimistic protocol

 security



no detected violations of security in use of Coda
Coda servers demand to see a user’s credentials
on every client request

 public




workstations

never a primary goal to support disconnected
operation in this domain
not well suited to public access conditions



security problem
hoarding latency

35
5. Quantitative Evaluation




How large a local disk does one need?
How noticeable is reintegration?
How important are optimizations to the operation log?

5.1. Methodology




trace-replay all reference to Coda, AFS or the
local file system
five 12-hour workdays and five week-long
activities

High-water mark : the maximum cache space
in use until current time

5.2. Disk space requirements
36
5.3. Reintegration latency


Back-fetching : the transfer of data from client to server representing disconnected file store
operation

Reintegration Latency

37
5.4. Value of log optimizations

Optimized vs. Unoptimized Cache Space High-Water Marks

Optimized vs. Unoptimized Space Usage

38
6. Work in Progress
 Exploiting


rapid cache validation




large granularity callbacks

trickle reintegration




weak connectivity

log optimization with aging

user-assisted miss handling



patience threshold
status walk & data walk

39
7. Conclusion
 Disconnected

operation is the newer concept
and central to solving the mobile computing
problem
 Importance of server replication
 None of the shortcomings exposed are fatal
 They all point to desirable ways in which the
system should evolve
 Actively refining the Coda system
40

More Related Content

What's hot

web communication protocols in IoT
web communication protocols in IoTweb communication protocols in IoT
web communication protocols in IoTFabMinds
 
TCP/IP 3-way Handshake
TCP/IP 3-way Handshake TCP/IP 3-way Handshake
TCP/IP 3-way Handshake Alok Tripathi
 
RPC: Remote procedure call
RPC: Remote procedure callRPC: Remote procedure call
RPC: Remote procedure callSunita Sahu
 
Asynchronous transfer mode
Asynchronous transfer modeAsynchronous transfer mode
Asynchronous transfer modeaniston0108
 
Mobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUMobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUVinish Alikkal
 
Cloud Resource Management
Cloud Resource ManagementCloud Resource Management
Cloud Resource ManagementNASIRSAYYED4
 
Cloud computing and utility computing
Cloud computing and utility computingCloud computing and utility computing
Cloud computing and utility computingasmita tarar
 
Unicast multicast & broadcast
Unicast multicast & broadcastUnicast multicast & broadcast
Unicast multicast & broadcastNetProtocol Xpert
 
SENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSSENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSjuno susi
 
Scheduling in Cloud Computing
Scheduling in Cloud ComputingScheduling in Cloud Computing
Scheduling in Cloud ComputingHitesh Mohapatra
 
Distributed Operating System
Distributed Operating SystemDistributed Operating System
Distributed Operating SystemAjithaG9
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 
Distributed System-Multicast & Indirect communication
Distributed System-Multicast & Indirect communicationDistributed System-Multicast & Indirect communication
Distributed System-Multicast & Indirect communicationMNM Jain Engineering College
 
Topic: Virtual circuit & message switching
Topic: Virtual circuit & message switchingTopic: Virtual circuit & message switching
Topic: Virtual circuit & message switchingDr Rajiv Srivastava
 

What's hot (20)

web communication protocols in IoT
web communication protocols in IoTweb communication protocols in IoT
web communication protocols in IoT
 
TCP/IP 3-way Handshake
TCP/IP 3-way Handshake TCP/IP 3-way Handshake
TCP/IP 3-way Handshake
 
RPC: Remote procedure call
RPC: Remote procedure callRPC: Remote procedure call
RPC: Remote procedure call
 
Asynchronous transfer mode
Asynchronous transfer modeAsynchronous transfer mode
Asynchronous transfer mode
 
Mobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUMobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTU
 
Mobile computing unit 5
Mobile computing  unit 5Mobile computing  unit 5
Mobile computing unit 5
 
Topic Packet switching
Topic Packet switchingTopic Packet switching
Topic Packet switching
 
Ethernet
EthernetEthernet
Ethernet
 
Cloud Resource Management
Cloud Resource ManagementCloud Resource Management
Cloud Resource Management
 
Cloud computing and utility computing
Cloud computing and utility computingCloud computing and utility computing
Cloud computing and utility computing
 
Gprs
GprsGprs
Gprs
 
Unicast multicast & broadcast
Unicast multicast & broadcastUnicast multicast & broadcast
Unicast multicast & broadcast
 
GSM Protocol Stack and Frame Formating
GSM Protocol Stack and Frame FormatingGSM Protocol Stack and Frame Formating
GSM Protocol Stack and Frame Formating
 
SENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSSENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLS
 
Scheduling in Cloud Computing
Scheduling in Cloud ComputingScheduling in Cloud Computing
Scheduling in Cloud Computing
 
Distributed Operating System
Distributed Operating SystemDistributed Operating System
Distributed Operating System
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
It6601 mobile computing unit 4
It6601 mobile computing unit 4It6601 mobile computing unit 4
It6601 mobile computing unit 4
 
Distributed System-Multicast & Indirect communication
Distributed System-Multicast & Indirect communicationDistributed System-Multicast & Indirect communication
Distributed System-Multicast & Indirect communication
 
Topic: Virtual circuit & message switching
Topic: Virtual circuit & message switchingTopic: Virtual circuit & message switching
Topic: Virtual circuit & message switching
 

Viewers also liked

What Is a Data Management Platform and Why You Should Care?
What Is a Data Management Platform and Why You Should Care?What Is a Data Management Platform and Why You Should Care?
What Is a Data Management Platform and Why You Should Care?IgnitionOne
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device ManagementJohn Rhoton
 
Bluekai: Data Management Platforms (dmp) for Publishers
Bluekai: Data Management Platforms (dmp) for PublishersBluekai: Data Management Platforms (dmp) for Publishers
Bluekai: Data Management Platforms (dmp) for PublishersBrian Crotty
 
Mobile device management presentation
Mobile device management presentationMobile device management presentation
Mobile device management presentationratneshsinghparihar
 
Clientserver Presentation
Clientserver PresentationClientserver Presentation
Clientserver PresentationTuhin_Das
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc networkskobu
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkChandra Meena
 
Mobile dbms
Mobile dbmsMobile dbms
Mobile dbmsTech_MX
 
Client Server Architecture
Client Server ArchitectureClient Server Architecture
Client Server Architecturesuks_87
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc NetworksJagdeep Singh
 
architecture of mobile software applications
architecture of mobile software applicationsarchitecture of mobile software applications
architecture of mobile software applicationsHassan Dar
 
Data management issues
Data management issuesData management issues
Data management issuesNeha Bansal
 
Introduction to soft computing
Introduction to soft computingIntroduction to soft computing
Introduction to soft computingAnkush Kumar
 

Viewers also liked (20)

User types of the Mobile Internet
User types of the Mobile InternetUser types of the Mobile Internet
User types of the Mobile Internet
 
What Is a Data Management Platform and Why You Should Care?
What Is a Data Management Platform and Why You Should Care?What Is a Data Management Platform and Why You Should Care?
What Is a Data Management Platform and Why You Should Care?
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device Management
 
Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]
 
Bluekai: Data Management Platforms (dmp) for Publishers
Bluekai: Data Management Platforms (dmp) for PublishersBluekai: Data Management Platforms (dmp) for Publishers
Bluekai: Data Management Platforms (dmp) for Publishers
 
Mobile device management presentation
Mobile device management presentationMobile device management presentation
Mobile device management presentation
 
L01 Enterprise Application Architecture
L01 Enterprise Application ArchitectureL01 Enterprise Application Architecture
L01 Enterprise Application Architecture
 
Mobile Device Management (MDM)
Mobile Device Management (MDM)Mobile Device Management (MDM)
Mobile Device Management (MDM)
 
Clientserver Presentation
Clientserver PresentationClientserver Presentation
Clientserver Presentation
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc network
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
 
Mobile dbms
Mobile dbmsMobile dbms
Mobile dbms
 
Client Server Architecture
Client Server ArchitectureClient Server Architecture
Client Server Architecture
 
Soft computing
Soft computingSoft computing
Soft computing
 
Client server architecture
Client server architectureClient server architecture
Client server architecture
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
 
architecture of mobile software applications
architecture of mobile software applicationsarchitecture of mobile software applications
architecture of mobile software applications
 
Data management issues
Data management issuesData management issues
Data management issues
 
Introduction to soft computing
Introduction to soft computingIntroduction to soft computing
Introduction to soft computing
 

Similar to Client server computing in mobile environments

Client server computing
Client server computingClient server computing
Client server computingjorge cabiao
 
cloud_load balancing.ppt
cloud_load balancing.pptcloud_load balancing.ppt
cloud_load balancing.pptGirishS95
 
Module1 Mobile Computing Architecture
Module1 Mobile Computing ArchitectureModule1 Mobile Computing Architecture
Module1 Mobile Computing Architectureraksharao
 
Client server architecture
Client server architectureClient server architecture
Client server architectureRituBhargava7
 
Cloud architecture
Cloud architectureCloud architecture
Cloud architectureAdeel Javaid
 
Cgmm presentation on distributed multimedia systems
Cgmm presentation on distributed multimedia systemsCgmm presentation on distributed multimedia systems
Cgmm presentation on distributed multimedia systemsMansi Verma
 
A NOVEL THIN CLIENT ARCHITECTURE WITH HYBRID PUSH-PULL MODEL, ADAPTIVE DISPLA...
A NOVEL THIN CLIENT ARCHITECTURE WITH HYBRID PUSH-PULL MODEL, ADAPTIVE DISPLA...A NOVEL THIN CLIENT ARCHITECTURE WITH HYBRID PUSH-PULL MODEL, ADAPTIVE DISPLA...
A NOVEL THIN CLIENT ARCHITECTURE WITH HYBRID PUSH-PULL MODEL, ADAPTIVE DISPLA...ijasuc
 
NSUT_Lecture1_cloud computing[1].pptx
NSUT_Lecture1_cloud computing[1].pptxNSUT_Lecture1_cloud computing[1].pptx
NSUT_Lecture1_cloud computing[1].pptxUtkarshKumar608655
 
Cloud computing (IT-703) UNIT 1 & 2
Cloud computing (IT-703) UNIT 1 & 2Cloud computing (IT-703) UNIT 1 & 2
Cloud computing (IT-703) UNIT 1 & 2Jitendra s Rathore
 
An Overview To Cloud Computing
An Overview To Cloud ComputingAn Overview To Cloud Computing
An Overview To Cloud ComputingIJSRED
 
client-server.pptx
client-server.pptxclient-server.pptx
client-server.pptxEbukaChikodi
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud ComputingIRJET Journal
 

Similar to Client server computing in mobile environments (20)

Client server computing
Client server computingClient server computing
Client server computing
 
Yongsan presentation 2
Yongsan presentation 2Yongsan presentation 2
Yongsan presentation 2
 
Client server computing
Client server computingClient server computing
Client server computing
 
cloud_load balancing.ppt
cloud_load balancing.pptcloud_load balancing.ppt
cloud_load balancing.ppt
 
Clientserver
ClientserverClientserver
Clientserver
 
Cloud Design Patterns
Cloud Design PatternsCloud Design Patterns
Cloud Design Patterns
 
Module1 Mobile Computing Architecture
Module1 Mobile Computing ArchitectureModule1 Mobile Computing Architecture
Module1 Mobile Computing Architecture
 
Client server architecture
Client server architectureClient server architecture
Client server architecture
 
Cloud architecture
Cloud architectureCloud architecture
Cloud architecture
 
Cgmm presentation on distributed multimedia systems
Cgmm presentation on distributed multimedia systemsCgmm presentation on distributed multimedia systems
Cgmm presentation on distributed multimedia systems
 
A NOVEL THIN CLIENT ARCHITECTURE WITH HYBRID PUSH-PULL MODEL, ADAPTIVE DISPLA...
A NOVEL THIN CLIENT ARCHITECTURE WITH HYBRID PUSH-PULL MODEL, ADAPTIVE DISPLA...A NOVEL THIN CLIENT ARCHITECTURE WITH HYBRID PUSH-PULL MODEL, ADAPTIVE DISPLA...
A NOVEL THIN CLIENT ARCHITECTURE WITH HYBRID PUSH-PULL MODEL, ADAPTIVE DISPLA...
 
E0332427
E0332427E0332427
E0332427
 
NSUT_Lecture1_cloud computing[1].pptx
NSUT_Lecture1_cloud computing[1].pptxNSUT_Lecture1_cloud computing[1].pptx
NSUT_Lecture1_cloud computing[1].pptx
 
Cloud computing (IT-703) UNIT 1 & 2
Cloud computing (IT-703) UNIT 1 & 2Cloud computing (IT-703) UNIT 1 & 2
Cloud computing (IT-703) UNIT 1 & 2
 
Unit -3-Cloud.pptx
Unit -3-Cloud.pptxUnit -3-Cloud.pptx
Unit -3-Cloud.pptx
 
Distributed architecture (SAD)
Distributed architecture (SAD)Distributed architecture (SAD)
Distributed architecture (SAD)
 
An Overview To Cloud Computing
An Overview To Cloud ComputingAn Overview To Cloud Computing
An Overview To Cloud Computing
 
SOFTWARE COMPUTING
SOFTWARE COMPUTINGSOFTWARE COMPUTING
SOFTWARE COMPUTING
 
client-server.pptx
client-server.pptxclient-server.pptx
client-server.pptx
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
 

Recently uploaded

Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 

Recently uploaded (20)

FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 

Client server computing in mobile environments

  • 2. Client-Server Architecture  Versatile, Message based, Modular Infrastructure intended to improve usability, flexibility, interoperability and scalability as compared to Centralized, Mainframe, time sharing computing.  Intended to reduce Network Traffic.  Communication is using RPC or SQL 2
  • 3. Mobile Computing and Issues in Client-Server Environment  Mobile Computing a new Paradigm  Issues   Mobility of Users and their computers Mobile Resource constraints   Wireless Bandwidth Limited Battery Life 3
  • 4. Paradigms of Mobile ClientServer Computing  Mobile   Aware Adaptation Response to change in environment Necessary system services that can be utilized  Extended  Various Architectures that enables functional participation of applications between client and servers  Mobile  Client-Server Model data Access Deals with issues like data transfer and consistency of Client cache 4
  • 5. Mobile-Aware Adaptation  Dynamically adjusting the functionality between the mobile and stationary host to cater changes like   Variations and changes in Network Conditions Local resource availability  Computations of Clients and Servers should be adaptive in response to change in mobile environment. 5
  • 6. Mobile-Aware Adaptation  Application    Transparent Adaptation Applications work with no modification in mobile environment System shield or proxy is provided which hides the differences between the stationary and mobile environments from Applications The proxy / System shield mitigates to the change in environment and the change is transparent to the applications. 6
  • 7. Application Transparent Adaptation  E.G. File System Proxy (CODA)     File System Proxy hides mobile issues from applications and emulate file server services on the mobile device. Proxy Log Concurrency control after reconnection Three phases  Hoarding   Emulating    Server Files pre-fetched into Mobile Computers Upon Disconnection updates are logged Log optimization is done to improve performance Reintegrating  Synchronizes cache with the server 7
  • 8. Application Transparent Adaptation  Drawbacks of this approach  Performance is an issue  It may be sometimes very hard for the system Some manual user intervention may be needed 8
  • 9. Application-Aware Adaptation  Allows Applications or their extensions to react to mobile resource changes  How?    Collaboration between System and individual Applications System monitors resource levels and notifies applications of relevant changes Application then adapts to the change 9
  • 10. Application-Aware Adaptation  It can be divided into three different categories    Client- based Application adaptation Client-server Application adaptation Proxy-based Application adaptation 10
  • 11. Client- based Application Adaptation  In the Collaborative adaptation ,System provides mechanisms of adaptation, while applications are free to specify adaptation policy  Application changes or adaptation is done only on client side 11
  • 12. Client-Server Application Adaptation      The Rover toolkit supports the application aware adaptation through the use of RDO http://www.pdos.lcs.mit.edu/rover/ RDOs are relocatable dynamic objects RDOs are defined for the data types manipulated by the application and for the data transported between client and server Programmers Task Benefits to Application Designers   Application designers have semantic knowledge Can tightly couple data with program code and manage resources 12
  • 13. Proxy-Based Application Adaptation  The application specific proxy has been proposed as an intermediary between client and server  It performs storage intensive and computation intensive tasks  Proxy reduces Bandwidth demands and allow legacy and non standard client to communicate with the server 13
  • 14. Extended Client-Server Model  Classic client-server systems assume that the location of client and server hosts do not change and also the connection among them does not change  Functionality between client and server is statically partitioned  Extended Client server Architecture thus deals with these inconsistencies in network connections and location specifics 14
  • 15. Extended Client-Server Model  Thin  Full client architecture client architecture  Flexible client architecture 15
  • 17. Full-Client Architecture  Can support disconnected or weakly connected client  The full client architecture supports emulations of functions of server at client host  Light weight servers or proxy  E.G CODA , WebExpress 17
  • 18. Flexible Client-Server Architecture   Generalizes both thin client and full client architecture Connection between client and server can be dynamically established 18
  • 19. Mobile Objects  Programming entities that can freely roam the network  Mobile objects allow clients to download the server code to mobile host for execution  They can maintain state information and make intelligent decisions  Challenge in using mobile objects?  Frequently disconnected or weak environment 19
  • 20. Collaborative Groups  Division of members into groups  Members can access data for the group  A client is able to access data residing on server to which it is communicating and conversely any machine holding the copy of the database, including personal laptop, should be willing to server read and write requests from nearby machines  E.G Bayou system 20
  • 21. Flexible Client-Server Architecture  Application   Proxy acts an intermediary between clients and server Allows legacy and other non-standard clients to interoperate with existing servers  Virtual  specific proxy mobility of servers Achieved by replication 21
  • 22. Mobile Data Access   Mobile data access enables the delivery of server data and the maintenance of client-server data Data Access strategies in mobile environment can be characterized by     Data delivery Data organization Consistency requirement Server Data Delivery Modes    Client –pull Server-push Hybrid delivery 22
  • 23. Server Data Dissemination  Asymmetrical communication between clients and server  Scalability problems for applications with asymmetrical communication  Solution: Broadcast –based dissemination  Broadcast disk  Indexing on air   Increases query time Decreases Listening time 23
  • 24. Client Cache Management  Caching reduces contention and improves query response time  Cache data can support disconnected operations  Automated Hoarding  Varied Granularity of Cache coherence   Callback Approach Detection Approach 24
  • 25. Disconnected Operation in a Mobile Computing Environment
  • 26. 1. Introduction  Key requirement of portable computers → the ability to access critical data regardless of location  Constraints of mobile elements    resource-poor more prone to loss, destruction, and subversion must operate under a much broader range of networking conditions  Ideally, mobility should be completely 26 transparent to users
  • 27. 2. Overview of Coda File System  Design optimized for the access and sharing patterns typical of academic and research environments HDB  Server    replication ni ro ch yn s volume storage group (VSG) accessible VSG (AVSG) reintegration callback-based caching  Disconnected  hoarding operation venus services by relying on its cache dis c d ze on ne c tio n emulation reconnection Client modify log 27
  • 28. 3. Implementation Status 1990 1991 1992 1993 October •minimal functionality was demonstrated •a more complete version •began to be used regularly by members of the Coda group •almost all of the functionality •user community had expanded outside the Coda group •about 30 users, of whom about 20 use on a regular basis •performance tuning and bug-fixing 28
  • 29. 3. Implementation Status (cont’d)  Server   three DECStation 5000/200 with 2GB HDD 150 volumes    25% - user volumes 65% - project volumes 10% - system volumes  Clients  15 desktops : DECStation 5000/200, Sun Sparcstation, IBM RT  user and project volumes - Coda / system volumes 29 AFS
  • 30. 4. Qualitative Evaluation  The   nature of testbed environment voluntary disconnected operation of mobile user involuntary disconnection of desktop user when Coda server crash 4.1. Hoarding  substantially improved the usefulness of disconnected operation  hoard   profiles common method of user/HDB interactions little direct sharing of profiles among users 30
  • 31.  multi-level  hoard priorities only a single level of hoard priority in earliest Coda design → an object was either sticky or not    much more time and effort reduce the ability of users to hoard effectively frequent disconnected misses  meta-expansion  reduce the verbosity of hoard profiles and simplify their maintenance    c d + : the command applies to immediate children : the command applies to all descendants : the command applies to all future 31
  • 32.  reference  spy program  record all file references observed by Venus  periodic  hoard walking background equilibration of the cache   guard a user who forgets to demand a hoard walk before voluntary disconnecting prevents a huge latency hit if and when a walk demanded  demand  spying hoard walking foreground cache equilibration  invoked before voluntary disconnecting 32
  • 33. 4.2. Server emulation  transparency  high degree of transparency attribute to a single client agent supporting both connected and disconnected operation  cache  experienced no cache misses    misses hoarding most disconnections were voluntary when disconnected misses occur   block processes switch to another task 33
  • 34. 4.3. Reintegration  performance   taken less than a minute to complete (mainly 5~20 seconds) reintegration storm   server returns a busy message break operation logs into independent parts  detected   failures very rare, however, due to bugs rather than update conflicts Venus writes out the operation log and related container files to a local file called a closure 34
  • 35. 4.4. Other observations  optimistic replication  vs. pessimistic protocol  security   no detected violations of security in use of Coda Coda servers demand to see a user’s credentials on every client request  public   workstations never a primary goal to support disconnected operation in this domain not well suited to public access conditions   security problem hoarding latency 35
  • 36. 5. Quantitative Evaluation    How large a local disk does one need? How noticeable is reintegration? How important are optimizations to the operation log? 5.1. Methodology   trace-replay all reference to Coda, AFS or the local file system five 12-hour workdays and five week-long activities High-water mark : the maximum cache space in use until current time 5.2. Disk space requirements 36
  • 37. 5.3. Reintegration latency  Back-fetching : the transfer of data from client to server representing disconnected file store operation Reintegration Latency 37
  • 38. 5.4. Value of log optimizations Optimized vs. Unoptimized Cache Space High-Water Marks Optimized vs. Unoptimized Space Usage 38
  • 39. 6. Work in Progress  Exploiting  rapid cache validation   large granularity callbacks trickle reintegration   weak connectivity log optimization with aging user-assisted miss handling   patience threshold status walk & data walk 39
  • 40. 7. Conclusion  Disconnected operation is the newer concept and central to solving the mobile computing problem  Importance of server replication  None of the shortcomings exposed are fatal  They all point to desirable ways in which the system should evolve  Actively refining the Coda system 40