UNIT V MOBILE PLATFORMS AND APPLICATIONS
Mobile Device Operating Systems – Special Constrains & Requirements – Commercial Mobile Operating Systems – Software Development Kit: iOS, Android, BlackBerry, Windows Phone – M-Commerce – Structure – Pros & Cons – Mobile Payment System – Security Issues.
UNIT IV MOBILE AD-HOC NETWORKS
Ad-Hoc Basic Concepts – Characteristics – Applications – Design Issues – Routing – Essential of Traditional Routing Protocols –Popular Routing Protocols – Vehicular Ad Hoc networks ( VANET) – MANET Vs VANET – Security
Unit - I
Mobile Computing – Mobile Computing Vs wireless Networking – Mobile Computing Applications – Characteristics of Mobile computing – Structure of Mobile Computing Application. MAC Protocols – Wireless MAC Issues – Fixed Assignment Schemes – Random Assignment Schemes – Reservation Based Schemes.
Cloud Computing for college presenation project.Mahesh Tibrewal
This presentation I've made on Cloud computing can be used by students for their college projects. I've tried to make this as colourful and attractive as possible without losing the relevance with the topic.
Lecture 23 27. quality of services in ad hoc wireless networksChandra Meena
The document discusses quality of service (QoS) in mobile ad hoc networks (MANETs). It covers several key topics:
1) The challenges of providing QoS in MANETs due to their dynamic and decentralized nature.
2) Different approaches to QoS classification and provisioning at various network layers. This includes MAC layer solutions like IEEE 802.11e and network layer solutions like QoS-aware routing protocols.
3) Specific QoS routing protocols discussed, including ticket-based, predictive location-based, and trigger-based distributed protocols.
1. The document discusses various aspects of mobile internet protocol and transport layer protocols.
2. It provides an overview of Mobile IP including its key components like mobile node, home agent, foreign agent and correspondent node. It also describes how Mobile IP works through agent discovery, registration and tunneling.
3. The document also discusses TCP/IP architecture including its four layers and compares it to the OSI model. It describes various techniques to improve TCP performance over mobile networks like indirect TCP, snooping TCP and mobile TCP.
IT6601 MOBILE COMPUTING UNITI
INTRODUCTION
Mobile Computing – Mobile Computing Vs wireless Networking – Mobile Computing Applications – Characteristics of Mobile computing – Structure of Mobile Computing Application. MAC Protocols – Wireless MAC Issues – Fixed Assignment Schemes – Random Assignment Schemes – Reservation Based Schemes.
Scheduling refers to allocating computing resources like processor time and memory to processes. In cloud computing, scheduling maps jobs to virtual machines. There are two levels of scheduling - at the host level to distribute VMs, and at the VM level to distribute tasks. Common scheduling algorithms include first-come first-served (FCFS), shortest job first (SJF), round robin, and max-min. FCFS prioritizes older jobs but has high wait times. SJF prioritizes shorter jobs but can starve longer ones. Max-min prioritizes longer jobs to optimize resource use. The choice depends on goals like throughput, latency, and fairness.
This document discusses agent discovery and registration in mobile IP networks. It describes how mobile nodes use agent advertisements and solicitations to determine their network attachment and discover available foreign agents. It also explains the registration process, where a mobile node informs its home agent and foreign agent of its current location to setup packet forwarding. Key aspects covered are how registrations establish care-of addresses, are authenticated, and must be periodically renewed to remain valid.
Cloud computing provides a way for organizations to share distributed resources over a network. However, data security is a major concern in cloud computing since data is stored remotely. The document discusses several techniques used for data security in cloud computing including authentication, encryption, data masking, and data traceability. The latest technologies discussed are a cloud information gateway that can control data transmission and secure logic migration that transfers applications to an internal sandbox for secure execution.
A brief study on Storage Area Network (SAN), SAN architecture & its importance. It focuses on the techniques and the technologies that have evolved around SAN & its Security.
This document describes the architecture for mobile computing. It discusses three tiers: the presentation tier which deals with the user interface; the application tier which handles business logic and transactions; and the data tier which manages database access and storage. It also covers various middleware technologies used to connect these tiers, including message-oriented middleware, transaction processing middleware, and database middleware like ODBC and JDBC. Context-awareness and adapting content to different devices based on context is also discussed.
In the seven-layer OSI model of computer networking, media access control (MAC) data communication protocol is a sublayer of the data link layer (layer 2). The MAC sublayer provides addressing and channel access control mechanisms that make it possible for several terminals or network nodes to communicate within a multiple access network that incorporates a shared medium, e.g. an Ethernet network. The hardware that implements the MAC is referred to as a media access controller.
The MAC sublayer acts as an interface between the logical link control (LLC) sublayer and the network's physical layer. The MAC layer emulates a full-duplex logical communication channel in a multi-point network. This channel may provide unicast, multicast or broadcast communication service.
Mobile computing allows users to access network services and computational resources from anywhere using portable devices like laptops, smartphones, and tablets. It is defined as computing using portable devices that maintain network connectivity while on the move. Mobile computing faces challenges like low bandwidth, disconnection, and security risks compared to wired networks. Future advancements may include increased use of artificial intelligence and integrated circuits to develop more compact devices with faster processors. Mobile computing has transitioned through generations from 1G analog cellular to 2G digital cellular to 3G broadband cellular and beyond to 4G and 5G.
Basic definition of computer Network which will brief about types of networks, topology and difference between OSI and TCP/IP.It also elaborate to guided and Unguided media.
This document provides an introduction to computer networks. It discusses the basics of LANs, MANs and WANs. It describes common network topologies like bus, star, ring and mesh. It also discusses the various components that make up a network including physical media, networking devices, computers, networking software and applications. The document is intended to provide a high-level overview of computer networks.
The document discusses the OSI model, which is a standard framework for network communication. It divides network architecture into seven layers: physical, data link, network, transport, session, presentation, and application. Each layer only communicates with the layers directly above and below it and has a specific set of functions. This layered approach makes networks easier to design, troubleshoot, and maintain when changes are made. The physical layer deals with physical connections and bit transmission. The data link layer organizes bits into frames and controls flow. The network layer decides how data moves between networks. Higher layers ensure reliable and secure delivery of data between applications.
This document provides an overview of distributed computing. It discusses the history and introduction of distributed computing. It describes the working of distributed systems and common types like grid computing, cluster computing and cloud computing. It covers the motivations, goals, characteristics, architectures, security challenges and examples of distributed computing. Advantages include improved performance and fault tolerance, while disadvantages are security issues and lost messages.
The document discusses various data hiding techniques used to conceal information, including:
1) Manipulating file attributes like filenames, extensions, and hidden properties.
2) Hiding partitions by deleting references in disk editors or using partition tools.
3) Marking disk clusters as "bad" to hide data in free space.
4) Bit-shifting to alter byte values and make files look like executable code.
5) Using steganography tools to hide data within image or text files by inserting digital watermarks.
The document is a question bank for the cloud computing course CS8791. It contains 26 multiple choice or short answer questions related to key concepts in cloud computing including definitions of cloud computing, characteristics of clouds, deployment models, service models, elasticity, horizontal and vertical scaling, live migration techniques, and dynamic resource provisioning.
Data storage security in cloud computingSonali Jain
The document discusses cloud computing and ensuring data security in cloud storage. It defines cloud computing as internet-based computing using shared resources provided on demand. It then lists advantages and disadvantages of cloud storage. The document proposes using distributed verification protocols and homomorphic tokens to ensure data integrity, error detection, and dependability while supporting dynamic operations like updates, deletes and appends. The goal is to address security threats to confidentiality, integrity and availability of data stored in the cloud.
Group Communication in distributed Systems.docxMsecMca
Group communication allows a process in a distributed system to exchange data with multiple other processes simultaneously. It hides the message passing to make communication appear like a normal procedure call. Group communication also helps processes from different hosts work together synchronously to improve overall system performance. There are three main types of group communication: broadcast sends data to all processes at once; multicast sends to a designated group; and unicast sends to a single process.
Lecture 1 introduction to parallel and distributed computingVajira Thambawita
This gives you an introduction to parallel and distributed computing. More details: https://sites.google.com/view/vajira-thambawita/leaning-materials
This document discusses signals and signal propagation in wireless communication networks. It covers several key topics:
1. Signals are the physical representation of data that is transmitted through communication systems. Signal parameters like amplitude, frequency, and phase shift encode the data.
2. Signals propagate through wireless networks differently than through wired networks due to effects like reflection, scattering, diffraction and multipath propagation. This results in delayed and attenuated signals arriving at the receiver.
3. Techniques like TDMA, CDMA and multiple access protocols are used to allow multiple users to share the same wireless medium and communicate simultaneously. Fixed and dynamic channel allocation schemes are discussed.
The document provides an overview of mobile platforms and applications. It discusses mobile device operating systems, their requirements and constraints. It describes several commercial mobile operating systems including iOS, Android, BlackBerry and Windows Phone. It also covers mobile commerce structures and applications, mobile payment systems, and related security issues. Software development kits for platforms like iOS and Android are explained.
The document provides an introduction to distributed systems, defining them as a collection of independent computers that communicate over a network to act as a single coherent system. It discusses the motivation for and characteristics of distributed systems, including concurrency, lack of a global clock, and independence of failures. Architectural categories of distributed systems include tightly coupled and loosely coupled, with examples given of different types of distributed systems such as database management systems, ATM networks, and the internet.
Cloud service management tools provide visibility, control, and automation to efficiently manage cloud services across public and private implementations. They allow monitoring of cloud performance, continuity, and efficiency in virtual environments. Cloud service management also simplifies user interactions, accelerates time to value through self-service catalogs, and lowers costs by automatically allocating and de-allocating resources according to provisioning policies.
The document discusses database issues related to mobile computing. It describes how mobile devices cache data from servers to reduce latency when the device is offline. The cached data is referred to as being "hoarded" in the device database. It discusses different database architectures including one-tier architectures where the database is specific to a mobile device and two-tier architectures involving client-server models. It also describes different cache invalidation mechanisms used to maintain consistency between cached data on devices and data on servers.
Cloud computing provides a way for organizations to share distributed resources over a network. However, data security is a major concern in cloud computing since data is stored remotely. The document discusses several techniques used for data security in cloud computing including authentication, encryption, data masking, and data traceability. The latest technologies discussed are a cloud information gateway that can control data transmission and secure logic migration that transfers applications to an internal sandbox for secure execution.
A brief study on Storage Area Network (SAN), SAN architecture & its importance. It focuses on the techniques and the technologies that have evolved around SAN & its Security.
This document describes the architecture for mobile computing. It discusses three tiers: the presentation tier which deals with the user interface; the application tier which handles business logic and transactions; and the data tier which manages database access and storage. It also covers various middleware technologies used to connect these tiers, including message-oriented middleware, transaction processing middleware, and database middleware like ODBC and JDBC. Context-awareness and adapting content to different devices based on context is also discussed.
In the seven-layer OSI model of computer networking, media access control (MAC) data communication protocol is a sublayer of the data link layer (layer 2). The MAC sublayer provides addressing and channel access control mechanisms that make it possible for several terminals or network nodes to communicate within a multiple access network that incorporates a shared medium, e.g. an Ethernet network. The hardware that implements the MAC is referred to as a media access controller.
The MAC sublayer acts as an interface between the logical link control (LLC) sublayer and the network's physical layer. The MAC layer emulates a full-duplex logical communication channel in a multi-point network. This channel may provide unicast, multicast or broadcast communication service.
Mobile computing allows users to access network services and computational resources from anywhere using portable devices like laptops, smartphones, and tablets. It is defined as computing using portable devices that maintain network connectivity while on the move. Mobile computing faces challenges like low bandwidth, disconnection, and security risks compared to wired networks. Future advancements may include increased use of artificial intelligence and integrated circuits to develop more compact devices with faster processors. Mobile computing has transitioned through generations from 1G analog cellular to 2G digital cellular to 3G broadband cellular and beyond to 4G and 5G.
Basic definition of computer Network which will brief about types of networks, topology and difference between OSI and TCP/IP.It also elaborate to guided and Unguided media.
This document provides an introduction to computer networks. It discusses the basics of LANs, MANs and WANs. It describes common network topologies like bus, star, ring and mesh. It also discusses the various components that make up a network including physical media, networking devices, computers, networking software and applications. The document is intended to provide a high-level overview of computer networks.
The document discusses the OSI model, which is a standard framework for network communication. It divides network architecture into seven layers: physical, data link, network, transport, session, presentation, and application. Each layer only communicates with the layers directly above and below it and has a specific set of functions. This layered approach makes networks easier to design, troubleshoot, and maintain when changes are made. The physical layer deals with physical connections and bit transmission. The data link layer organizes bits into frames and controls flow. The network layer decides how data moves between networks. Higher layers ensure reliable and secure delivery of data between applications.
This document provides an overview of distributed computing. It discusses the history and introduction of distributed computing. It describes the working of distributed systems and common types like grid computing, cluster computing and cloud computing. It covers the motivations, goals, characteristics, architectures, security challenges and examples of distributed computing. Advantages include improved performance and fault tolerance, while disadvantages are security issues and lost messages.
The document discusses various data hiding techniques used to conceal information, including:
1) Manipulating file attributes like filenames, extensions, and hidden properties.
2) Hiding partitions by deleting references in disk editors or using partition tools.
3) Marking disk clusters as "bad" to hide data in free space.
4) Bit-shifting to alter byte values and make files look like executable code.
5) Using steganography tools to hide data within image or text files by inserting digital watermarks.
The document is a question bank for the cloud computing course CS8791. It contains 26 multiple choice or short answer questions related to key concepts in cloud computing including definitions of cloud computing, characteristics of clouds, deployment models, service models, elasticity, horizontal and vertical scaling, live migration techniques, and dynamic resource provisioning.
Data storage security in cloud computingSonali Jain
The document discusses cloud computing and ensuring data security in cloud storage. It defines cloud computing as internet-based computing using shared resources provided on demand. It then lists advantages and disadvantages of cloud storage. The document proposes using distributed verification protocols and homomorphic tokens to ensure data integrity, error detection, and dependability while supporting dynamic operations like updates, deletes and appends. The goal is to address security threats to confidentiality, integrity and availability of data stored in the cloud.
Group Communication in distributed Systems.docxMsecMca
Group communication allows a process in a distributed system to exchange data with multiple other processes simultaneously. It hides the message passing to make communication appear like a normal procedure call. Group communication also helps processes from different hosts work together synchronously to improve overall system performance. There are three main types of group communication: broadcast sends data to all processes at once; multicast sends to a designated group; and unicast sends to a single process.
Lecture 1 introduction to parallel and distributed computingVajira Thambawita
This gives you an introduction to parallel and distributed computing. More details: https://sites.google.com/view/vajira-thambawita/leaning-materials
This document discusses signals and signal propagation in wireless communication networks. It covers several key topics:
1. Signals are the physical representation of data that is transmitted through communication systems. Signal parameters like amplitude, frequency, and phase shift encode the data.
2. Signals propagate through wireless networks differently than through wired networks due to effects like reflection, scattering, diffraction and multipath propagation. This results in delayed and attenuated signals arriving at the receiver.
3. Techniques like TDMA, CDMA and multiple access protocols are used to allow multiple users to share the same wireless medium and communicate simultaneously. Fixed and dynamic channel allocation schemes are discussed.
The document provides an overview of mobile platforms and applications. It discusses mobile device operating systems, their requirements and constraints. It describes several commercial mobile operating systems including iOS, Android, BlackBerry and Windows Phone. It also covers mobile commerce structures and applications, mobile payment systems, and related security issues. Software development kits for platforms like iOS and Android are explained.
The document provides an introduction to distributed systems, defining them as a collection of independent computers that communicate over a network to act as a single coherent system. It discusses the motivation for and characteristics of distributed systems, including concurrency, lack of a global clock, and independence of failures. Architectural categories of distributed systems include tightly coupled and loosely coupled, with examples given of different types of distributed systems such as database management systems, ATM networks, and the internet.
Cloud service management tools provide visibility, control, and automation to efficiently manage cloud services across public and private implementations. They allow monitoring of cloud performance, continuity, and efficiency in virtual environments. Cloud service management also simplifies user interactions, accelerates time to value through self-service catalogs, and lowers costs by automatically allocating and de-allocating resources according to provisioning policies.
The document discusses database issues related to mobile computing. It describes how mobile devices cache data from servers to reduce latency when the device is offline. The cached data is referred to as being "hoarded" in the device database. It discusses different database architectures including one-tier architectures where the database is specific to a mobile device and two-tier architectures involving client-server models. It also describes different cache invalidation mechanisms used to maintain consistency between cached data on devices and data on servers.
This document provides an overview of mobile telecommunication systems including GSM, GPRS, and UMTS. It describes:
- The key components and architecture of GSM networks including the radio subsystem (mobile station and base station), networking and switching subsystem (MSC, HLR, VLR), and operation subsystem.
- The services provided by GSM like bearer services, teleservices, and supplementary services.
- Enhancements to GSM like GPRS which improved data transfer rates and UMTS which supported higher speech quality and data rates.
- How the transition from GSM to UMTS involved upgrades to network elements like the BTS, BSC, and addition of new
MOBILE INTERNET PROTOCOL AND TRANSPORT LAYER
Overview of Mobile IP – Features of Mobile IP – Key Mechanism in Mobile IP – route Optimization. Overview of TCP/IP – Architecture of TCP/IP- Adaptation of TCP Window – Improvement in TCP Performance.
Mobile Device Operating Systems – Special Constrains & Requirements – Commercial Mobile Operating Systems – Software Development Kit: iOS, Android, BlackBerry, Windows Phone – M-Commerce – Structure – Pros & Cons – Mobile Payment System – Security Issues.
The document discusses various transport layer protocols for mobile computing environments:
- Traditional TCP faces problems with high error rates and mobility-induced packet losses in wireless networks. It can lead to severe performance degradation.
- Indirect TCP segments the TCP connection and uses a specialized TCP for the wireless link, isolating wireless errors. But it loses end-to-end semantics.
- Snooping TCP buffers packets near the mobile host and performs local retransmissions transparently. But wireless errors can still propagate to the server.
- Mobile TCP splits the connection and uses different mechanisms on each segment. It chokes the sender window during disconnections to avoid retransmissions and slow starts. This maintains throughput during
This document discusses different mechanisms for data dissemination to mobile devices. It describes push-based mechanisms where data is broadcast from servers to devices without requests. Pull-based mechanisms allow devices to request specific data from servers. Hybrid mechanisms combine push and pull. The document focuses on communication asymmetry in mobile networks and how this impacts efficient data dissemination. It provides examples and classifications of different data delivery approaches for wireless applications.
This document discusses synchronization in mobile computing systems. It describes how data is replicated and distributed across mobile devices, personal computers, and remote servers. It then discusses various synchronization techniques used to maintain consistency between distributed copies of data, including one-way synchronization initiated by the server or client, two-way synchronization, and refresh synchronization. The document also covers domain-specific rules that govern how data is synchronized across different platforms and data formats.
Mobile ad hoc networks (MANETs) are wireless networks without a fixed infrastructure. Each node acts as both a host and a router, forwarding packets for other nodes. MANETs have dynamic topologies as nodes can move freely. They are used in applications like military operations, emergency response, and conferences. Routing in MANETs is challenging due to the dynamic topology. Common routing protocols for MANETs include DSDV, AODV, DSR, and ZRP. DSDV adds sequence numbers to distance vector routing to avoid loops from topology changes. DSR is an on-demand routing protocol where the source determines the complete path to the destination.
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1Sushant Kushwaha
DSR deploys source routing, reacting dynamically to changes by maintaining only active routing addresses from source to destination. AODV is also a reactive protocol that maintains only active routes, with each node keeping a next-hop routing table. Route entries expire after a time limit. AODV adopts destination sequence numbers to ensure loop-free and up-to-date routes.
The document discusses various medium access control (MAC) protocols for wireless networks. It describes challenges with applying carrier sense multiple access with collision detection (CSMA/CD) to wireless networks due to problems like hidden and exposed terminals. It then covers different MAC schemes like space division multiple access (SDMA), frequency division multiple access (FDMA), time division multiple access (TDMA), and code division multiple access (CDMA) that aim to address these challenges. Specific protocols discussed in more detail include Aloha, slotted Aloha, and how TDMA can be used for fixed or dynamic channel allocation.
The document describes the key steps in natural language processing including morphological analysis, part-of-speech tagging, lexical processing, syntactic processing, semantic analysis, knowledge representation, discourse analysis, and applications such as machine translation. It outlines techniques for analyzing words, assigning parts of speech, determining word meanings, parsing sentences into syntactic structures, assigning semantic meanings, representing knowledge, analyzing discourse, and translating between languages.
INTRODUCTION TO COMPUTER FORENSICS
Introduction to Traditional Computer Crime, Traditional problems associated with Computer Crime. Introduction to Identity Theft & Identity Fraud. Types of CF techniques – Incident and incident response methodology – Forensic duplication and investigation. Preparation for IR: Creating response tool kit and IR team. – Forensics Technology and Systems – Understanding Computer Investigation – Data Acquisition.
Mobile IP allows mobile nodes to change their point of attachment to the internet while maintaining ongoing communications. It includes the following key entities:
- Mobile nodes can move between home and foreign networks while keeping their IP address.
- Foreign agents provide services to visiting mobile nodes and advertise care-of addresses for tunneling packets to mobile nodes' current locations.
- The home agent maintains a location registry with mobile nodes' care-of addresses and tunnels packets to their current points of attachment when away from home.
- Dynamic Host Configuration Protocol (DHCP) can be used by mobile nodes to obtain temporary IP addresses at foreign networks to use as their care-of addresses.
1. Mobile operating systems have special constraints and requirements compared to desktop operating systems due to limitations in mobile devices like small screens, limited memory and battery power.
2. The major commercial mobile operating systems are Android, iOS, BlackBerry OS, Windows Phone and Symbian. Each has its own software development kit for building mobile applications.
3. M-commerce involves buying and selling using mobile devices and has applications in areas like advertising, shopping and business-to-business transactions. Mobile payment systems allow payments from mobile devices through various schemes like bank account-based, credit card-based and micropayments.
1. Mobile operating systems have special constraints and requirements compared to desktop operating systems due to limitations in mobile devices like small screens, limited memory and processing power, and scarce battery life.
2. The major commercial mobile operating systems discussed are Palm OS, Symbian OS, Linux, Windows Mobile, BlackBerry OS, iPhone OS, and Android. Each was designed for the constraints of mobile devices and to support communication protocols and input methods.
3. Software development kits are provided for each major mobile platform to allow developers to create applications and services for that platform, addressing issues like security, interface standards, and market distribution.
This presentation discusses mobile operating systems. It defines a mobile operating system as the software platform that controls functions and features on mobile devices, similar to how desktop OS's work. It then covers several major mobile OS's including: Java ME, Symbian OS, Linux, Windows Mobile, iPhone OS, Palm OS, and Android. For each it provides a brief overview of its origins, features, and development platforms. It concludes that in 2013, Android from Google had the largest worldwide mobile device market share at 78.4%, followed by Apple's iOS at 8.16%, and Microsoft's Windows Mobile at 3.2%.
The document provides an overview of mobile payment systems. It discusses different mobile payment schemes such as bank account based, credit card based, and micropayment schemes. It also outlines desirable properties of a mobile payment system including being easy to use, general purpose, interoperable, trustworthy, cost-effective, swift, and enabling global payments. Popular mobile payment solutions like SMS-based payments, POS-based payments, barcode payments, and NFC-based payments are also mentioned. Finally, the key steps in a typical mobile payment transaction process are summarized.
a study of evolutionary mobile operating system aravindhawan
The document discusses mobile operating systems, including their types, architectures, markets, and security. It outlines the main mobile OSes such as Android, iOS, Symbian, Palm OS, BlackBerry OS, and Windows, describing their origins, programming languages, and market shares. The conclusion states that while each OS has its own architecture, many are Linux-based, and the current leaders are Android, iOS, BlackBerry OS, and Windows Phone.
The document provides information on 10 different mobile operating systems: Symbian OS, Android OS, iPhone OS, BlackBerry OS, Windows Phone 7, Palm OS, Palm webOS, Bada, Maemo OS, and MeeGo OS. It lists these operating systems and then discusses Symbian OS in more detail, covering its history and development, capabilities, security, performance, hardware support and connectivity. It also lists the native programming language of Symbian OS as C++.
This document discusses several mobile operating systems: Symbian OS, Android OS, iPhone OS (iOS), BlackBerry OS, Windows Phone 7, Palm OS, Palm webOS, Bada, Maemo OS, and MeeGo OS. It provides brief descriptions of each platform, including typical programming languages and devices they are used in.
The document discusses several mobile operating systems:
- Android, which is based on the Linux kernel and is the world's best-selling smartphone platform. It is developed through the Android Open Source Project.
- Palm OS, which was designed for PDAs in the 1990s and provided basic applications for personal information management.
- BlackBerry OS, which became the standard for smartphones and is licensed by 85% of manufacturers. It was designed for 2.5G and 3G phones with features like multitasking and memory protection.
The document discusses several mobile operating system platforms including Java ME, Symbian OS, Windows Mobile, iPhone OS, and Google Android. It describes the structure and features of each platform, highlighting their differences from desktop operating systems due to mobile devices' limited resources. Key aspects covered include multitasking, memory management, security features, and each platform's software stack and architecture.
This presentation discuss about Mobile Operating Systems. This would help you in
1. Understanding basic concepts of Operating Systems,
2. Interfaces and functions related to Operating Systems,
3. Mobile OS like Symbian, IOS, Android, Windows, PalmOS
4. Market Capture analysis of various OS along with some upcoming OS in near future.
Mobile operating systems come in different types to support the varying capabilities of mobile devices. The major mobile operating systems discussed are Symbian OS, Windows Mobile OS, Android OS, and iPhone OS. Symbian OS is 32-bit and runs on ARM architecture, while Windows Mobile has had several versions supporting pocket PCs and smartphones. Android OS is an open source platform based on Linux and developed by Google and OHA. iPhone OS, now called iOS, is Apple's proprietary operating system used in iPhones and iPads. Each operating system has distinct features and suits different types of mobile devices.
This document discusses several mobile operating systems, including Android, iOS, Windows Phone, Symbian, and BlackBerry. It provides details on each OS such as their developer, programming languages used, and key features. The most prominent mobile OSs today are Android, developed by Google and based on Linux, iOS developed by Apple for their iPhone/iPad devices based on Mac OS X, and Windows Phone from Microsoft based on their Win32 platform.
The document discusses mobile computing platforms and applications. It covers mobile operating systems like Windows Mobile, Palm OS, Symbian OS, iOS, Android and Blackberry. It describes the key requirements for mobile operating systems including support for communication protocols, input mechanisms, compliance with standards and extensive library support. It also explains some commercial mobile operating systems and their features.
This document provides an overview of mobile operating systems. It discusses the role and key features of mobile OSes, including touchscreens, cellular connectivity, Bluetooth, WiFi and apps. The major mobile OSes covered are iOS, Android, Windows Phone, Blackberry and Symbian. Market share statistics from 2012 show Android and iOS leading. Upcoming mobile OSes include Aliyun, Firefox OS and Tizen. Significant uses of mobile devices discussed include VOIP, mobile banking, document scanning and messaging apps.
Mobile operating systems control and manage mobile devices like smartphones. The document discusses several mobile OSs including Android, iOS, Symbian, Windows Mobile, BlackBerry OS, Palm Web OS, Firefox OS, Ubuntu Touch, and Tizen. It provides an overview of each OS, describing their origins, developers, popular devices used, and key features. The document also notes that Android and iOS have become the most popular and competitive mobile OSs today.
MOBILE PLATFORMS AND APPLICATIONS, Mobile Device Operating Systems , Special Constrains & Requirements , Commercial Mobile Operating Systems , Software Development Kit,sdk, iOS, Android, BlackBerry, Windows Phone , M Commerce , Structure , Pros & Cons , Mobile Payment System , Security Issues
The document provides information about mobile platforms and applications. It discusses mobile device operating systems, their special constraints and requirements. It describes commercial mobile operating systems like iOS, Android, Blackberry and Windows Phone. It covers mobile commerce structure and pros and cons. It discusses mobile payment systems and related security issues. It focuses on different mobile platforms, their application development kits and features of the Android operating system. Specifically, it provides details about the Android architecture including its software stack, application components and SDK.
Android os(comparison all other mobile os)DivyaKS12
The document discusses several mobile operating systems including Android, iOS, Windows Mobile, Blackberry OS, Symbian OS, and webOS. It provides details on the history and key features of each OS. For Android specifically, it describes how Android is built on the Linux kernel and uses Java for applications. It also explains the different layers of the Android software stack including the kernel, libraries and Android runtime.
This document provides an overview of the Android operating system, including:
- A brief history of Android starting from its founding in 2003 by Android Inc. to being acquired by Google in 2005.
- An overview of the architecture of Android including the Linux kernel, libraries, Android runtime based on Java using the Dalvik VM, and core applications.
- A description of key Android features such as connectivity technologies, multitasking, media support, graphics capabilities, and the Android Market app store.
- A comparison of Android to other mobile operating systems such as BlackBerry, iOS, and Symbian.
The document provides an overview of several mobile operating systems including Symbian OS, Android, iPhone OS, Windows Mobile, and Palm OS. It describes key features of each such as supported programming languages, software development kits, user interface elements, and market share. Symbian OS is an open source OS designed for battery powered devices with low memory. Android is an open source OS based on Linux that uses Java and supports voice input. iPhone OS has a multi-touch interface and is Apple's proprietary OS for the iPhone, iPod Touch, and iPad. Windows Mobile supports both touchscreens and keyboards and allows third party development. Palm OS was designed for ease of use on touchscreens.
BJT small signal model – Analysis of CE, CB, CC amplifiers- Gain and frequency response – MOSFET small signal model– Analysis of CS and Source follower – Gain and frequency response- High frequency analysis.
Orbits : types of satellites : frequency used link establishment, MA techniques used in satellite communication, earth station; aperture actuators used in satellite – Intelsat and Insat: fibers – types:
sources, detectors used, digital filters, optical link: power line carrier communications: SCADA
AM – Frequency spectrum – vector representation – power relations – generation of AM – DSB, DSB/SC, SSB, VSB AM Transmitter & Receiver; FM and PM – frequency spectrum – power relations : NBFM & WBFM, Generation of FM and DM, Armstrong method & Reactance modulations : FM & PM frequency.
PN junction diode –structure, operation and V-I characteristics, diffusion and transient capacitance - Rectifiers – Half Wave and Full Wave Rectifier,– Display devices- LED, Laser diodes- Zener diodecharacteristics-Zener Reverse characteristics – Zener as regulator,TRANSISTORS, BJT, JFET, MOSFET- structure, operation, characteristics and Biasing UJT, Thyristor and IGBT Structure and characteristics,BJT small signal model – Analysis of CE, CB, CC amplifiers- Gain and frequency response –
MOSFET small signal model– Analysis of CS and Source follower – Gain and frequency response- High frequency analysis,BIMOS cascade amplifier, Differential amplifier – Common mode and Difference mode analysis – FET input stages – Single tuned amplifiers – Gain and frequency response – Neutralization methods, power amplifiers –Types (Qualitative analysis),Advantages of negative feedback – voltage / current, series , Shunt feedback –positive feedback – Condition for oscillations, phase shift – Wien bridge, Hartley, Colpitts and Crystal oscillators.
(1) The document discusses the various topics related to electronics and instrumentation engineering including aptitude, attitude, attributes of engineers, graduate attributes, technical and soft skills, bridging industry-academic gap, learning environment, levels of learning, and expected profile of IT employees.
(2) It also outlines the core subjects of electronics and instrumentation engineering such as instrumentation, control, electrical, electronics, computer, mechanical, management, and societal subjects.
(3) Important subjects discussed include physics, chemistry, mathematics, programming, civil and mechanical engineering, circuit theory, and specialization subjects in different domains of electronics and instrumentation.
Multinational Corporations – Environmental Ethics – Computer Ethics – Weapons Development – Engineers as Managers – Consulting Engineers – Engineers as Expert Witnesses and Advisors – Moral Leadership –Code of Conduct – Corporate Social Responsibility
Safety and Risk – Assessment of Safety and Risk – Risk Benefit Analysis and Reducing Risk - Respect for Authority – Collective Bargaining – Confidentiality – Conflicts of Interest – Occupational Crime – Professional Rights – Employee Rights – Intellectual Property Rights (IPR) – Discrimination
Senses of “Engineering Ethics” – Variety of moral issues – Types of inquiry – Moral dilemmas – Moral Autonomy – Kohlberg‟s theory – Gilligan‟s theory – Consensus and Controversy – Models of professional roles - Theories about right action – Self-interest – Customs and Religion – Uses of Ethical Theories
This document contains sample questions for the CS6703 GRID AND CLOUD COMPUTING Regulation 2013 exam. It includes multiple choice questions covering topics related to security in grid and cloud computing, including definitions of trust, certificate authorities, authorization models, transport layer security, identity management, data security, and privacy. It also includes short and long answer questions requiring explanations of authentication and authorization methods, grid and cloud security infrastructures, identity and access management architecture, and trust models.
Morals, values and Ethics – Integrity – Work ethic – Service learning – Civic virtue – Respect for others – Living peacefully – Caring – Sharing – Honesty – Courage – Valuing time – Cooperation – Commitment – Empathy – Self confidence – Character – Spirituality – Introduction to Yoga and meditation for professional excellence and stress management.
This document discusses security concepts related to grid and cloud computing, including trust models, authentication and authorization methods, and the grid security infrastructure (GSI). It describes reputation-based and PKI-based trust models, different authorization models, and the layers and functions of GSI, including message protection, authentication, delegation, and authorization. It also discusses risks and security concerns related to cloud computing.
This document contains sample questions for the subject "Grid and Cloud Computing". It includes questions ranging from 2 to 16 marks related to grid middleware packages like Condor-G, Sun Grid Engine, Globus GT4, Hadoop framework, HDFS, MapReduce and other associated concepts. The questions cover topics such as the components, advantages and usage of different middleware, file transfer mechanisms, job scheduling, data storage and processing using MapReduce.
Open source grid middleware packages – Globus Toolkit (GT4) Architecture , Configuration – Usage of Globus – Main components and Programming model - Introduction to Hadoop Framework - Mapreduce, Input splitting, map and reduce functions, specifying input and output parameters, configuring and running a job – Design of Hadoop file system, HDFS concepts, command line and java interface, dataflow of File read & File write.
2. 2
UNIT V
MOBILE PLATFORMS AND APPLICATIONS
Mobile Device Operating Systems – Special Constrains & Requirements –
Commercial Mobile Operating Systems – Software Development Kit: iOS,
Android, BlackBerry, Windows Phone – M-Commerce – Structure – Pros &
Cons – Mobile Payment System – Security Issues.
3. Mobile Device Operating System Introduction
Design and capabilities of a Mobile OS (Operating System) is very different than a
general purpose OS running on desktop machines:
mobile devices have constraints and restrictions on their physical characteristic
such as screen size, memory, processing power and etc.
Scarce availability of battery power
Limited amount of computing and communication capabilities
Thus, they need different types of operating systems depending on the capabilities
they support. e.g. a PDA OS is different from a Smartphone OS.
Operating System is a piece of software responsible for management of operations,
control, coordinate the use of the hardware among the various application programs,
and sharing the resources of a device.
3
4. Operating System Structure
A mobile OS is a software platform on top of which other programs
called application programs, can run on mobile devices such as
PDA, cellular phones, Smartphone and etc.
4
Low-Level Hardware, Manufacturer Device Drivers
Device Operating System Base, Kernel
OS Libraries
Applications
5. Mobile Operating System Platforms
There are many mobile operating systems. The followings
demonstrate the most important ones:
Java ME Platform
Palm OS
Symbian OS
Linux OS
Windows Mobile OS
BlackBerry OS
iPhone OS
Google Android Platform
5
6. Java ME Platform
J2ME platform is a set of technologies, specifications
and libraries developed for small devices like mobile
phones, pagers, and personal organizers.
Java ME was designed by Sun Microsystems. It is
licensed under GNU General Public License
6
7. Special Constraints & Requirements
There are special constrains under which the operating system of a
mobile device to operate
Limited memory
Limited screen size
Miniature keyboard
Limited processing power
Limited battery power
Limited and fluctuating of the wireless medium
7
8. Special service Requirements
Support for specific communication protocols
Support for a variety of input mechanism
Compliance with open standard
Extensive library support
8
9. Commercial Mobile Operating System
Palm OS
Symbian OS
Linux OS
Windows Mobile OS
BlackBerry OS
iPhone OS
Google Android Platform 9
10. Palm OS
Palm OS is an embedded operating system designed for ease of
use with a touch screen-based graphical user interface.
It has been implemented on a wide variety of mobile devices
such as smart phones, barcode readers, and GPS devices.
It is run on Arm architecture-based processors. It is designed as
a 32-bit architecture.
10
11. Palm OS Features
The key features of Palm OS are:
A single-tasking OS:
Palm OS Garnet (5.x) uses a kernel developed at Palm, but it
does not expose tasks or threads to user applications. In fact,
it is built with a set of threads that can not be changed at
runtime.
Palm OS Cobalt (6.0 or higher) does support multiple threads
but does not support creating additional processes by user
applications.
Palm OS has a preemptive multitasking kernel that provides
basic tasks but it does not expose this feature to user
applications .
11
12. Palm OS Features (Cont.)
Memory Management:
The Memory, RAM and ROM, for each Palm resides on a
memory module known as card. In other words, each
memory card contains RAM, ROM or both. Palms can have
no card, one card or multiple cards.
Expansion support:
This capability not only augments the memory and I/O , but
also it facilitates data interchanges with other Palm
devices and with other non-Palm devices such as digital
cameras, and digital audio players.
Handwriting recognition input called Graffiti 2
12
13. Palm OS Features (Cont.)
HotSync technology for synchronization with PC computers
Sound playback and record capabilities
TCP/IP network access
Support of serial port, USB, Infrared, Bluetooth and Wi-Fi
connections
Defined standard data format for PIM (Personal Information
Management) applications to store calendar, address, task
and note entries, accessible by third-party applications
Security model:
Device can be locked by password, arbitrary application records can be made private [2]
Palm OS Cobalt include a certificate manager. The Certificate Manager handles X.509
certificates[3].
13
14. Symbian OS
Symbian OS is 32 bit, little-endian operating system, running
on different flavors of ARM architecture[4].
It is a multitasking operating system and very less
dependence on peripherals.
Kernel runs in the privileged mode and exports its service to
user applications via user libraries.
14
15. Symbian OS Structure
User libraries include networking, communication, I/O
interfaces and etc.
Access to these services and resources is coordinated
through a client-server framework.
Clients use the service APIs exposed by the server to
communicate with the server.
The client-server communication is conducted by the kernel.
15
16. Symbian OS Structure (Cont.)
The following demonstrates the Symbian OS architecture[:
16
Hardware
Symbian OS Base- Kernel
Symbian OS Libraries
Servers
Application Engines
KVM
17. Symbian OS Features
Real-time: it has a real-time, multithreaded kernel.
Data Caging : it allows applications to have their own private data partition. This feature allows for
applications to guarantee a secure data store. It can be used for e-commerce applications, location
aware applications and etc.
Multimedia: it supports audio, video recording, playback and streaming, and Image conversion.
Platform Security : Symbian provides a security mechanism against malware. It allows sensitive
operations can be accessed by applications which have been certified by a signing authority. In addition,
it supports full encryption and certificate management, secure protocols ( HTTPS, TLS and SSL) and
WIM framework.
Internationalization support: it supports Unicode standard.
Fully object-oriented and component- based
Optimized memory management
Client- server architecture : described in previous slides, it provides simple and high-efficient inter-
process communication. This feature also eases porting of code written for other platforms to Symbian
OS.
A Hardware Abstraction Layer (HAL): This layer provides a consistent interface to hardware and
supports device-independency
Kernel offers hard real-time guarantees to kernel and user mode threads.
17
18. Embedded Linux OS
It is known as Embedded Linux which is used in embedded computer systems such
as mobile phones, Personal Digital Assistants, media players and other consumer
devices.
In spite of Linux operating system designed for Servers and desktops, the Embedded
Linux is designed for devices which have relatively limited resources such as small
size of RAM, storage, screen, limited power and etc. Then, they should have an
optimized kernel.
It is a Real-Time Operating System (RTOS). It meets deadlines and switch context
It has relatively a small footprint. Today, mobile phones can ship with a small memory.
Thus, OS must not seek to occupy a large amount of available storage. It should have
a small foot print. Theoretically, they deploy in a footprint of 1MB or less.
It is open source. It has no cost for licensing.
Examples: Motorola Mobile phones such as RAZR V8, RAZR V9, A1200 are based on
MontaVista Linux.
ARM and MIPS structures [7]: Embedded CPU architectures like ARM and MIPS offer
small instruction sets and special execution modes that shrinks application size and
consequently generates smaller code. 18
19. Windows Mobile OS
Windows Mobile is a compact operating system designed for
mobile devices and based on Microsoft Win32.
It is run on Pocket PCs, Smart phones and Portable media
centers.
It provides ultimate interoperability. Users with various
requirements are able to manipulate their data.
19
20. Google Android Platform
It is a platform and an operating system for mobile devices
based on the Linux operating system.
It allows developers design applications in a java-like
language using Google-developed java libraries.
It supports a wide variety of connectivity such as GSM, WiFi,
3G, …
The Operating system has not been implemented yet (Feb,
2008). Several prototypes have been proposed.
20
21. Google Android Platform
Android architecture: http://code.google.com/android/what-is-android.html
21
22. Google Android Platform
As demonstrated in the previous slide, the Android platform contains the
following layers:
Linux Kernel: Android relies on Linux for core system services such as security,
memory management, process management and etc.
Android Runtime: it provides a set of core libraries which supports most of the
functionality in the core libraries of Java. The Android Virtual Machine known as
Dalvik VM relies on the linux kernel for some underlying functionality such as
threading,…
Libraries: Android includes a set of C/C++ libraries. These libraries are exposed to
developers through the Android application framework. They include media
libraries, system C libraries, surface manager, 3D libraries, SQLite and etc.
For more details, please visit the following link:
http://code.google.com/android/what-is-android.html
Application Framework: it provides an access layer to the framework APIs used by
the core applications. It allows components to be used by the developers.
22
23. iPhone OS
iPhone OS is an operating system run on iPhone and iPod.
It is based on Mach Kernel and Drawin core as Mac OS X.
The Mac OS X kernel includes the following component:
Mach Kernel
BSD
I/O component
File Systems
Networking components
23
24. iPhone OS
The following is Mac OS X Architecture:
24
Kernel Environment
Core Services
Application Services
QuickTime
Classic Carbon Cocoa JDK BSD
25. iPhone OS
Mac OS X has a preemptive multitasking environment.
Preempting is the act of taking the control of operating system from one task and giving
it to another task.
It supports real-time behavior.
In Mac OS X, each application has access to its own 4 GB address space.
Not any application can directly modify the memory of the kernel. It has a strong
mechanism for memory protection.
For more details about kernel architecture, please visit the following link:
http://developer.apple.com/documentation/Darwin/Conceptual/KernelProgramming/
Architecture/Architecture.html
25
26. BlackBerry OS
BlackBerry OS has a multitasking environment.
It enables heavy use of input devices like trackball, and scroll wheel. It does not support
touchpad.
It is an event-driven Operating System.
Later BlackBerry Smartphone's CPU architecture is based on ARM XScale. The other
BlackBerry devices has Intel-based processors.
It supports multitasking and multithreading applications.
Security: Any application that want to use certain BlackBerry functionality must be digitally
signed.
26
28. M-Commerce
Involves carrying out any activity related buying and selling of
commodities, services or information using the mobile hand
held devices.
Applications of M-Commerce
M-commerce applications can be broadly categorized into
B2C and B2B.
28
32. M-Commerce Structure
Content provider implements an application by providing two sets of programs: Client-
side and Server-Side
Clint side programs run on the browsers installed on users mobile.
Server side programs performs database access and computations, resides on the
host computers(Servers)
32
33. Mobile devices:
Hand-held devices interfaced to mobile user, user specify their requests using interface programs,
which are transmitted to mobile commerce application
The result obtained from the mobile commerce application are displayed in suitable formats.
Mobile middleware
The purpose of mobile middleware is to seamlessly and transparently map the internet content to
mobile phones
It also handle encrypting and decrypting communication for secure transaction.
Network
The request are delivered to the closet wireless access point or base station or wired network such
as internet for mobile commerce system
Host computers
Process and stores all information needed for mobile commerce.
It consists of three parts web servers, database servers and application program and support
software.
33
34. M-Commerce Pros & Cons
Advantages
For business organization: Customer convenience, cost savings and new business
opportunities.
For customer: Any where, any time shopping using light weight device.
Without physically visiting to store indentifying the right product at the lowest price.
Highly personalized thereby providing an additional level of convenience to customer.
Disadvantages
Mobile device not offer graphics or processing power of a PC
The small screens of mobile devices limit the complexity of application.
Network imposes several types of restriction.
34
35. Mobile Payment System
Mobile payment or m-payment defined as any payment instrument where a
mobile device is used to initiate, authorize and confirm an exchange of
financial value in return for goods and services.
OR
Mobile payment, also referred to as mobile money, mobile money transfer,
and mobile wallet generally refer to payment services operated under
financial regulation and performed from or via a mobile device.
35
36. Mobile Payment Schems
Three popular types of M-payment schemes are currently used are
I. Bank account based
II. Credit card based
III. Micropayment
In each of these approach, a third party service provider (Bank, Credit card
company or telecom company) make payment on the customer’s behalf .
The service provider may charge small amount as service charge
36
37. Bank account based M-payment
The bank account of the customer is linked to his mobile
number.
When the customer makes an M-payment transaction with
vendor, the bank account of the customer is debited and the value
is credited to the vendor’s account.
37
38. Credit card based M-payment
The Credit card number is linked to mobile number of customer.
When the customer makes an M-payment transaction with
vendor, the credit card is charged and the value is credited to the
vendor’s account.
38
39. Micropayment
The Micropayment is for small purchase such as from vending
machines.
A customer makes a call to the number of a service provider where
the per call charge is equal to the cost of the vending item.
The micropayment scheme is implemented thorough the cooperation
of the mobile phone operator and a third party service provider.
39
40. Security Issues
M commerce is anticipated to introduced new security and privacy
risks.
Users of mobile device can be difficult to trace because of roaming
of the users.
The mobile device go on-line and off-line frequently, thus attacks
would be very difficult to trace.
Another risk unique to the mobile devices is the risk of loss or theft.
A major problem in this regard is lack of authenticate a particular
user.
40
41. References
Book: Prasant Kumar Pattnaik, Rajib Mall, “Fundamentals of Mobile Computing”,
PHI Learning Pvt. Ltd, New Delhi – 2012.
http://cmer.cis.uoguelph.ca
PPT:
www.cmer.ca/cmer-ak/AcademicKitV1.0/.../OpSys_slides_1.ppt
www.cmer.ca/cmer-ak/AcademicKitV1.0/.../OpSys_slides_2.ppt
41