SlideShare a Scribd company logo
Pervasive Web Application
       Architecture

      Narendran Thangarajan,
          IV year, CSE,
   SSN College of Engg, Chennai.
Why are we studying this?

   You got a Phone
   And a Laptop.




                         Task :
                          Order Meals from KFC
Why are we studying this?


   Why?
   So the traditional web applications
    need to be tweaked!
   And thats why we are here. :)
The first person
who thought about this
   is Mark Weiser.
Why the name ”Pervasive” Web Applications?

   Pervade = diffuse or spread through
   Supports multiple devices
       PC's
       WAP phones
       PDA's
       Voice only phones

   Before Pervasive Computing – there were only PC based
    web applications
   After Pervasive Computing – HP just closed its PC market!
    :D → Devices are in various other forms.
Challenges faced

   Different Devices have different standards
        WML for WAP - Monochrome
        VoiceXML for voice interaction
        HTML for PC's
   Not just the looks, even the capabilities!! Say, a PC and WAP phone
    (Sounds like Silk, doesn't it?)


   Major Challenges
        Scalability – due to increased number of mobile phones
        Availability – due to the type of application used – look up a
         meaning or order something
Scalability and Availability
   Ever-growing number of pervasive computing devices
    (scalability)




   ”Server Currently Down for Maintenance” (availability)
The solution

   Can be solved by implementing a scalable physical
    topology :
       Adding more servers to the backend.
       Adding a backup server that would take-over during
        accidents.
       Generally parallelism and redundancy.

   Implementing the server using a more optimized stack
       Eg : All three-tiers being implemented using JavaScript.
Implementing a Pervasive Web Application
Development Team

   Traditional Web Applications
       Business Logic Designers
       User Interface Designers
       Application Programmers
       Database experts


   Pervasive computing Web applications
       Traditional + Pervasive Computing Specialists
Pervasive Application Architecture

   MVC Architecture
       M – Model – EJB
       V – View – JSPs
       C – Controller – Servlets

   Challenge is to make the controller identify the type of
    device and serve accordingly.
Security!!

   Encryption – Using Algorithms for confidentiality
   Authentication – Username and Password
   Authorization – Security Policies for accessing
    Application functions
   Client to Web Application → Convert device-specific
    requests to canonical form (HTTP requests with
    device type, desired language, desired reply content-
    type)
   When the secure access component receives a
    request, it checks if the session in authenticated. What
    happens in either cases.
Ways of Authentication
   Authentication Proxy
       Diagram
       Advantage – Only authenticated and authorized requests
        can reach protected web applications.
   Framework
       Attaches an authentication object to the session.
       Secure Servlet – inherits HttpServlet – Securitypolicy check
        done before calling super class function ”service”
       SecureJSP – Extends SecureServlet and implements
        HttpJspPage
       AuthenticationServlets – Can be implemented in many ways
        but SecurityState Object must be created and added to the
        user session.
   SecurityState Object – holds the security state of a
    session
       UserID
       Authenticated Method
       Potential Error Codes
   SecurityPolicy class – accesses the policy database
    and decides whether to allow further processing.
Theory is BORING!
Example Application

   How Java applications can be extended to
    support different kinds of device.
   Scenario – Uncle Enzo's Shop
       Specializes in Italian Food
       Wants to improve ordering process for the
        customers.
       First Step – Make an e-business
       Next Step – Support for Smart Cards
User Interface Overview

   Registration
   Login Screen
   Menu
   Ordering
   Review Former Purchases
   Self Care
   Log Off
Architecture (Demo)
   Database Schema
       Store Persistent Data (UserData)
   Servlets
       Identify the Device type and call the appropriate controller
        (DeviceMapper and Registration Servlet)
   Controllers
       Process requests by invoking application logic via command
        (Registration controller)
   Commands
       Excapsulate access to models and act as result containters
   Views
       Display the output of the controllers.
Thus..

   Understand how to make a single web
    application handle requests from variety of
    devices
   Understand the MVC
   Understand the Design Pattern used.
Queries?
Thats hell of a patience!! :P

More Related Content

PPTX
Sandbox
PPTX
Face detection presentation slide
PPTX
Types of cyber attacks
PPTX
Responsive web designing ppt(1)
PPTX
M2M systems layers and designs standardizations
PPTX
Web authentication & authorization
PPT
Face Detection and Recognition System
PDF
Malicious software
Sandbox
Face detection presentation slide
Types of cyber attacks
Responsive web designing ppt(1)
M2M systems layers and designs standardizations
Web authentication & authorization
Face Detection and Recognition System
Malicious software

What's hot (20)

PPTX
Three Level Security System Using Image Based Aunthentication
PDF
Difference between authentication and authorization in asp.net
PPTX
Basics of Denial of Service Attacks
PDF
Using Machine Learning in Networks Intrusion Detection Systems
PPTX
Sources of IoT (JNTUK - UNIT 1)
PPTX
Firewall in Network Security
PPT
Software security
PPTX
Authentication vs authorization
PPTX
Cloud Computing Design Considerations
PPTX
Project Face Detection
PDF
Web Application Security 101
DOCX
Online Quiz System Project Report
PDF
An introduction to M2M / IoT technologies
PPTX
Mobile based attandance system
PPT
Wireless security presentation
ODP
Https presentation
PPTX
Security threats
PPTX
Online Admission System
PPTX
Ai lecture 03 computer vision
Three Level Security System Using Image Based Aunthentication
Difference between authentication and authorization in asp.net
Basics of Denial of Service Attacks
Using Machine Learning in Networks Intrusion Detection Systems
Sources of IoT (JNTUK - UNIT 1)
Firewall in Network Security
Software security
Authentication vs authorization
Cloud Computing Design Considerations
Project Face Detection
Web Application Security 101
Online Quiz System Project Report
An introduction to M2M / IoT technologies
Mobile based attandance system
Wireless security presentation
Https presentation
Security threats
Online Admission System
Ai lecture 03 computer vision
Ad

Viewers also liked (20)

PPTX
Pervasive computing and its Security Issues
PDF
Application Architecture: The Next Wave | MuleSoft
PDF
Web of Things Application Architecture
PPT
Pervasive Computing
PDF
Scalable web application architecture
PDF
Web architecture pocket guide
PPT
Restructuring a Web Application, Using Spring and Hibernate
PDF
Trustparency web doc spring 2.5 & hibernate
PDF
Web application architecture
PPTX
Web Application Architecture
PPT
Introduction to Google Web Toolkit
PPTX
It applications
PDF
Convolution discrete and continuous time-difference equaion and system proper...
PDF
Software requirementspecification
PDF
Java scalability considerations yogesh deshpande
PPTX
Introduction To Building Enterprise Web Application With Spring Mvc
PPT
Pervasive computing
PPTX
Pervasive Computing
PDF
Scaling tokopedia-past-present-future
PDF
The Emerging Integration Reference Architecture | MuleSoft
Pervasive computing and its Security Issues
Application Architecture: The Next Wave | MuleSoft
Web of Things Application Architecture
Pervasive Computing
Scalable web application architecture
Web architecture pocket guide
Restructuring a Web Application, Using Spring and Hibernate
Trustparency web doc spring 2.5 & hibernate
Web application architecture
Web Application Architecture
Introduction to Google Web Toolkit
It applications
Convolution discrete and continuous time-difference equaion and system proper...
Software requirementspecification
Java scalability considerations yogesh deshpande
Introduction To Building Enterprise Web Application With Spring Mvc
Pervasive computing
Pervasive Computing
Scaling tokopedia-past-present-future
The Emerging Integration Reference Architecture | MuleSoft
Ad

Similar to Pervasive Web Application Architecture (20)

PDF
Spring Into the Cloud
PDF
Keynote | Middleware Everywhere - Ready for Mobile and Cloud | Dr. Mark Little
PDF
Mobile application security – effective methodology, efficient testing! hem...
PDF
Find me if you can – smart fuzzing and discovery! shreeraj shah
PPT
Mobile Application Security – Effective methodology, efficient testing!
PDF
Amish Umesh - Future Of Web App Testing - ClubHack2007
PPT
Planning A Web Application
PPT
FIND ME IF YOU CAN – SMART FUZZING AND DISCOVERY
PDF
Ibrussels For Stedenlink
PDF
OreDev 2008: Software + Services
PDF
Unit 05: Physical Architecture Design
PDF
Past, Present and Future of APIs of Mobile and Web Apps
PPTX
[DSBW Spring 2009] Unit 05: Web Architectures
PPTX
webinos - Architecture and Strategy
PDF
Java Edge.2008.Web.Frameworks.Catagorized
PDF
Will Web 2.0 applications break the cloud?
PDF
Shreeraj-Hacking_Web_2
PPTX
BASC presentation on security and application architecture
PDF
Protecting Your APIs Against Attack & Hijack
ODP
Trends in Technology
Spring Into the Cloud
Keynote | Middleware Everywhere - Ready for Mobile and Cloud | Dr. Mark Little
Mobile application security – effective methodology, efficient testing! hem...
Find me if you can – smart fuzzing and discovery! shreeraj shah
Mobile Application Security – Effective methodology, efficient testing!
Amish Umesh - Future Of Web App Testing - ClubHack2007
Planning A Web Application
FIND ME IF YOU CAN – SMART FUZZING AND DISCOVERY
Ibrussels For Stedenlink
OreDev 2008: Software + Services
Unit 05: Physical Architecture Design
Past, Present and Future of APIs of Mobile and Web Apps
[DSBW Spring 2009] Unit 05: Web Architectures
webinos - Architecture and Strategy
Java Edge.2008.Web.Frameworks.Catagorized
Will Web 2.0 applications break the cloud?
Shreeraj-Hacking_Web_2
BASC presentation on security and application architecture
Protecting Your APIs Against Attack & Hijack
Trends in Technology

More from UC San Diego (20)

PDF
A primer on network devices
PDF
Datacenter traffic demand characterization
PDF
Smart Homes, Buildings and Internet-of-things
PDF
Social Networks analysis to characterize HIV at-risk populations - Progress a...
PDF
eyeTalk - A system for helping people affected by motor neuron problems
PDF
Pirc net poster
PDF
Ajaxism
PDF
Basic terminologies for a developer
PDF
Fields in computer science
PDF
Understanding computer networks
PDF
FOSS Introduction
PDF
Network Programming with Umit project
PDF
Introduction to Python
PDF
Airline reservation system db design
PDF
Workshop on Network Security
PPTX
Socket programming in Java (PPTX)
PDF
Socket programming using java
PDF
Routing basics
PDF
Technology Quiz
PDF
Android application development
A primer on network devices
Datacenter traffic demand characterization
Smart Homes, Buildings and Internet-of-things
Social Networks analysis to characterize HIV at-risk populations - Progress a...
eyeTalk - A system for helping people affected by motor neuron problems
Pirc net poster
Ajaxism
Basic terminologies for a developer
Fields in computer science
Understanding computer networks
FOSS Introduction
Network Programming with Umit project
Introduction to Python
Airline reservation system db design
Workshop on Network Security
Socket programming in Java (PPTX)
Socket programming using java
Routing basics
Technology Quiz
Android application development

Recently uploaded (20)

PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
RMMM.pdf make it easy to upload and study
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Pre independence Education in Inndia.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
TR - Agricultural Crops Production NC III.pdf
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Module 4: Burden of Disease Tutorial Slides S2 2025
Pharmacology of Heart Failure /Pharmacotherapy of CHF
O7-L3 Supply Chain Operations - ICLT Program
Anesthesia in Laparoscopic Surgery in India
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
RMMM.pdf make it easy to upload and study
VCE English Exam - Section C Student Revision Booklet
Microbial disease of the cardiovascular and lymphatic systems
Supply Chain Operations Speaking Notes -ICLT Program
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
human mycosis Human fungal infections are called human mycosis..pptx
Pre independence Education in Inndia.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf

Pervasive Web Application Architecture

  • 1. Pervasive Web Application Architecture Narendran Thangarajan, IV year, CSE, SSN College of Engg, Chennai.
  • 2. Why are we studying this?  You got a Phone  And a Laptop.  Task : Order Meals from KFC
  • 3. Why are we studying this?  Why?  So the traditional web applications need to be tweaked!  And thats why we are here. :)
  • 4. The first person who thought about this is Mark Weiser.
  • 5. Why the name ”Pervasive” Web Applications?  Pervade = diffuse or spread through  Supports multiple devices  PC's  WAP phones  PDA's  Voice only phones  Before Pervasive Computing – there were only PC based web applications  After Pervasive Computing – HP just closed its PC market! :D → Devices are in various other forms.
  • 6. Challenges faced  Different Devices have different standards  WML for WAP - Monochrome  VoiceXML for voice interaction  HTML for PC's  Not just the looks, even the capabilities!! Say, a PC and WAP phone (Sounds like Silk, doesn't it?)  Major Challenges  Scalability – due to increased number of mobile phones  Availability – due to the type of application used – look up a meaning or order something
  • 7. Scalability and Availability  Ever-growing number of pervasive computing devices (scalability)  ”Server Currently Down for Maintenance” (availability)
  • 8. The solution  Can be solved by implementing a scalable physical topology :  Adding more servers to the backend.  Adding a backup server that would take-over during accidents.  Generally parallelism and redundancy.  Implementing the server using a more optimized stack  Eg : All three-tiers being implemented using JavaScript.
  • 9. Implementing a Pervasive Web Application
  • 10. Development Team  Traditional Web Applications  Business Logic Designers  User Interface Designers  Application Programmers  Database experts  Pervasive computing Web applications  Traditional + Pervasive Computing Specialists
  • 11. Pervasive Application Architecture  MVC Architecture  M – Model – EJB  V – View – JSPs  C – Controller – Servlets  Challenge is to make the controller identify the type of device and serve accordingly.
  • 12. Security!!  Encryption – Using Algorithms for confidentiality  Authentication – Username and Password  Authorization – Security Policies for accessing Application functions  Client to Web Application → Convert device-specific requests to canonical form (HTTP requests with device type, desired language, desired reply content- type)  When the secure access component receives a request, it checks if the session in authenticated. What happens in either cases.
  • 13. Ways of Authentication  Authentication Proxy  Diagram  Advantage – Only authenticated and authorized requests can reach protected web applications.  Framework  Attaches an authentication object to the session.  Secure Servlet – inherits HttpServlet – Securitypolicy check done before calling super class function ”service”  SecureJSP – Extends SecureServlet and implements HttpJspPage  AuthenticationServlets – Can be implemented in many ways but SecurityState Object must be created and added to the user session.
  • 14. SecurityState Object – holds the security state of a session  UserID  Authenticated Method  Potential Error Codes  SecurityPolicy class – accesses the policy database and decides whether to allow further processing.
  • 16. Example Application  How Java applications can be extended to support different kinds of device.  Scenario – Uncle Enzo's Shop  Specializes in Italian Food  Wants to improve ordering process for the customers.  First Step – Make an e-business  Next Step – Support for Smart Cards
  • 17. User Interface Overview  Registration  Login Screen  Menu  Ordering  Review Former Purchases  Self Care  Log Off
  • 18. Architecture (Demo)  Database Schema  Store Persistent Data (UserData)  Servlets  Identify the Device type and call the appropriate controller (DeviceMapper and Registration Servlet)  Controllers  Process requests by invoking application logic via command (Registration controller)  Commands  Excapsulate access to models and act as result containters  Views  Display the output of the controllers.
  • 19. Thus..  Understand how to make a single web application handle requests from variety of devices  Understand the MVC  Understand the Design Pattern used.
  • 21. Thats hell of a patience!! :P