0% found this document useful (0 votes)
108 views

Structure of Mobile Computing Application

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
108 views

Structure of Mobile Computing Application

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

JOHN MUA

ICT-G-4-1629-21

The structure of mobile computing application

A mobile computing application is usually structured in terms of the functionalities


implemented. The simple three-tier structure of a mobile computing application comprises of
the presentation tier, application tier and data tier.

1. Presentation Layer/User Interface (UI)

This layer is responsible for presenting information to the user and capturing user input.

The presentation tier focuses on delivering a visually appealing and intuitive interface that
enables users to interact with the software effectively. This involves designing layouts,
graphical elements, and navigation structures that enhance usability.

UI components such as buttons, input fields, dropdown menus, and widgets are designed to
provide users with a rich and interactive experience, enabling them to perform actions and
navigate through the application easily.

Compatible with browsers and customized client applications.

Interaction with the UI triggers events that are handled by the application logic layer.

2. Application Logic Layer

The application logic layer contains the core logic of the application. It is therefore considered
as the engine of the application.

It processes user input, performs computations, and orchestrates interactions between


different components.

It handles tasks such as data validation, manipulation, and decision-making based on user
input or system events.

This layer also ensures the integrity and consistency of data transactions. It coordinates
database transactions, handling commit, rollback, and concurrency control to maintain data
integrity and recover from failures.
The application tier authenticates and authorizes users, validates input, and implements
security mechanisms to prevent unauthorized access, data breaches, and other security
threats.

3. Data Access Layer

The data access layer manages the application's data and interactions with data sources.

It abstracts the underlying data storage mechanisms and provides a unified interface for
accessing and manipulating data.

This layer interacts with databases, APIs, or other data sources to retrieve and store data.

For local storage, technologies such as SQLite databases on Android or Core Data on iOS are
commonly used.

The data access layer handles tasks such as data serialization, deserialization, caching, and
error handling.

Depending on the application's requirements, data may be stored locally on the device,
retrieved from remote servers, or synchronized between multiple devices.

The data tier manages concurrency control to handle multiple simultaneous access to data by
multiple users or processes.

Avoiding dependencies on the storage mechanisms allows for updates or changes without the
application tier clients being affected by or even aware of the change.

REFERENCES

PATTNAIK, P. K., & MALL, R. (2012). FUNDAMENTALS OF MOBILE COMPUTING.


New Delhi: Asoke K. Ghosh, PHI Learning Private Limited, M-97, Connaught
Circus,.

You might also like