SlideShare a Scribd company logo
1 of 32
Download to read offline
© Oxford University Press 2007. All rights reserved. 1
Mobile Operating Systems
Lesson 01
Operating System
© Oxford University Press 2007. All rights reserved. 2
Operating system (OS)
• The master control program
• Manages all software and hardware
resources
• Controls, allocates, frees, and modifies the
memory by increasing or decreasing it
© Oxford University Press 2007. All rights reserved. 3
Operating system (OS)
• Also manages files, disks, and security,
provides device drivers and GUIs for
desktop or mobile computer, other
functions, and applications
• Enables the assignment of priorities for
requests to the system and controls IO
devices and network
© Oxford University Press 2007. All rights reserved. 4
Device driver
• As software component which enables the
use of a device, port, or network by
configuring (for open, close, connect, or
specifying a buffer size, mode, or control
word) and sends output or receives input
• Driver Functions─ create, delete, open,
close, read, write, io_control, connect,
bind, listen and accept
© Oxford University Press 2007. All rights reserved. 5
Operating system (OS)
• Has the utility programs, for example, file
manager and configuration of OS (memory
and resource allocation and enabling and
disabling the use of specific resources and
functions)
• Can be accompanied by a specific suite of
applications, for example, Internet
Explorer and MS Office
© Oxford University Press 2007. All rights reserved. 6
Process
• A program unit which runs when
scheduled to do so by OS and each state
of which is controlled by OS
• Can call a function (method) but cannot
call another process directly
© Oxford University Press 2007. All rights reserved. 7
States of a process
• Can be in any of the states—
1. created
2. active
3. running
4. suspended
5. pending for a specified time interval
© Oxford University Press 2007. All rights reserved. 8
Pending state of a process for a specific
communication from other process
• Signal
• Semaphore
• Mailbox-message
• Queue-message
• Socket
© Oxford University Press 2007. All rights reserved. 9
Task
• An application process which runs
according to its schedule set by the OS
• Each state of which is controlled by OS
• Can be a real-time task which has time
constraints or maximum defined latency
within which it must run or finish
© Oxford University Press 2007. All rights reserved. 10
Thread
• An application process or a process sub-
unit (when a process or task has multiple
threads)
• Runs as scheduled by the OS
• Each state controlled by OS
• Runs as a light-weight process
© Oxford University Press 2007. All rights reserved. 11
Light-weight
• Does not depend on certain system
resources, for example, memory
management unit (MMU), GUI functions
provided by the OS, or the functions
which need running of other processes
or threads for their implementation
© Oxford University Press 2007. All rights reserved. 12
Interrupt service routine (ISR)
• A program unit (function, method, or
subroutine) which runs when a hardware
or software event occurs
• Running of which can be masked and
can be prioritized by assigning a priority
• Higher priority than any other process or
task or thread
© Oxford University Press 2007. All rights reserved. 13
Hardware events for interrupts
• Time-out of a timer (clock tick)
• Division by zero
• Overflow
• Underflow detection by hardware during
computation
© Oxford University Press 2007. All rights reserved. 14
Hardware events for interrupts
• Finishing of DMA (direct memory access
by a peripheral) transfer
• Data abort
• External FIQ (fast interrupt request
through a pin input)
• External IRQ (interrupt request through a
pin input)
• A memory buffer becoming full
© Oxford University Press 2007. All rights reserved. 15
Hardware events for interrupts
• Port, transmitter, receiver, or device
buffer─ becoming half filled, buffer with
at least one memory address filled, and
buffer becoming empty
• Buffer─ associated with the memory
addresses for the LCD, printer, serial or
USB port, keypad, or modem
© Oxford University Press 2007. All rights reserved. 16
Software related events for interrupts
• Exception─ software instruction for
interrupt on detection of a certain
condition during computations or error
while logging in
• Illegal operation code provided to CPU
© Oxford University Press 2007. All rights reserved. 17
Interrupt service thread (IST)
• A special type of ISR or ISR unit
(function, method, or subroutine) which
initiates and runs on an event or
message from an high priority ISR
• ISTs can be prioritized by assigning a
priority
• The type of IST depends on the specific
OS
© Oxford University Press 2007. All rights reserved. 18
Windows CE IST
• One which is placed in a priority queue
so that the ISTs execute turn by turn—
FIFO (first-in first-out)
• An IST is initiated and put in the FIFO
according to ISR priority after the
execution of an ISR starts on an event
and the ISR puts a message or
semaphore or signal for the IST
© Oxford University Press 2007. All rights reserved. 19
ISR and IST
• The ISR, therefore, has an event-initiated
short piece of code, which runs only the
critical part of the code and rest of the
code runs at the IST initiated by it
• The IST priority─ lower than the ISR but
higher than the processes or tasks or
threads
© Oxford University Press 2007. All rights reserved. 20
Page
• A unit of memory which can load from a
program stored in a hard drive or from
any other storage device to the program
memory, RAM, before the execution of a
program
• A contiguous memory address block of 4
kB (in x86 processors), 2 kB, or 1 kB
© Oxford University Press 2007. All rights reserved. 21
Page table
• For address mapping
• Provides the mapping of fragmented
physical memory pages with the pages
of the virtual addresses which are the
memory addresses
• Pages of memory are spread over the
memory-address space leading to
fragmentation of codes and data in
physical memory space
© Oxford University Press 2007. All rights reserved. 22
MMU
• Creates and maintains the page table and
hence performs address mapping and
translation
• Program during execution first translates
the accessed address (virtual address)
into a physical address using the page
table at the MMU and then accesses the
physical address and fetches the code or
data
© Oxford University Press 2007. All rights reserved. 23
Priority inversion
• Takes place when a process or thread
which is to provide a waiting object to a
higher priority process or thread gets
preempted by a middle priority process
or thread and thus the middle priority
process or thread starts running on
obtaining the object for which it was
waiting and higher priority process or
thread keeps waiting for wait object.
© Oxford University Press 2007. All rights reserved. 24
Priority inheritence
• Process or thread which is to provide a
waiting object to a higher priority process
or thread, gets the priority of that
process or thread
• Waiting object─ signal, semaphore,
queue, mailbox message, or bytes from
a pipe
© Oxford University Press 2007. All rights reserved. 25
Pipe
• A virtual device which sends the bytes
from a thread to another thread
© Oxford University Press 2007. All rights reserved. 26
Example of Linux OS – Mobile
• An open source OS
• Enables the user to customize their
device to suit their specific needs
• Provides ease to suit different sorts of
hardware and software applications
© Oxford University Press 2007. All rights reserved. 27
Linux
• Embedded Linux Consortium (ELC)
standards for Linux for designing user
interfaces, managing power consumption
in devices, and real-time operation
• Also considered to be more secure than
most other operating systems
• Several international mobile phone
manufacturers use Linux for their OS
requirements
© Oxford University Press 2007. All rights reserved. 28
Motorola Rokr E2 music phone
• A Linux-based mobile phone
• A 240 x 320 TFT display with 262,000
colours
• USB 2.0 PC networking for fast ‘drag-
and-drop’ data transfer
• Built-in FM radio
• Support for Motorola’s iRadio service
• Support for Bluetooth
© Oxford University Press 2007. All rights reserved. 29
Motorola Rokr E2 music phone
• 1.3-megapixel camera for video capture
and playback
• MMS (multimedia messaging service)
enabled
• Opera web browser
• Airplane mode for safely listening to
music when aboard an aircraft
• PIM (personal information manager) with
picture caller ID
© Oxford University Press 2007. All rights reserved. 30
Summary
• OS─ a master control program
• Manages all software and hardware
resources
• Controls, allocates, frees, and modifies
the memory by increasing or decreasing
it
• Controls processes, tasks, threads, ISRs
and ISTs
© Oxford University Press 2007. All rights reserved. 31
… Summary
• Manages files, disks, and security,
provides device drivers and GUIs for
desktop or mobile computer, other
functions, and applications
• MMU
• Priority inversion and inheritence
• Linux─ An open source OS
• Enables the user to customize their
device to suit their specific needs
© Oxford University Press 2007. All rights reserved. 32
End of Lesson 01
Operating System

More Related Content

What's hot

Symbian OS - Platform Security
Symbian OS - Platform SecuritySymbian OS - Platform Security
Symbian OS - Platform SecurityAndreas Jakl
 
Android : a linux-based mobile operating system
Android : a linux-based mobile operating systemAndroid : a linux-based mobile operating system
Android : a linux-based mobile operating systemClément Escoffier
 
Symbian mobile operating system ppt
Symbian mobile operating system pptSymbian mobile operating system ppt
Symbian mobile operating system pptDevesh Singh
 
889448 634356855122132416
889448 634356855122132416889448 634356855122132416
889448 634356855122132416zxdrtyu
 
Mobile operating systems
Mobile operating systemsMobile operating systems
Mobile operating systemsSriram PV
 
Symbian Operating system
Symbian Operating systemSymbian Operating system
Symbian Operating systemPravin Shinde
 
Introduction to Symbian OS
Introduction to Symbian OSIntroduction to Symbian OS
Introduction to Symbian OSHatem Mahmoud
 
Symbian OS
Symbian OSSymbian OS
Symbian OScomdj
 
J2ME mobile app development
J2ME mobile app developmentJ2ME mobile app development
J2ME mobile app developmentMuthu Kumar
 
Network and Mobile Operating System
Network and Mobile Operating SystemNetwork and Mobile Operating System
Network and Mobile Operating SystemEdwin S. Garcia
 
Introduction to Mobile programming(J2ME)
Introduction to Mobile programming(J2ME)Introduction to Mobile programming(J2ME)
Introduction to Mobile programming(J2ME)Wambua Wambua
 

What's hot (20)

Symbian OS - Platform Security
Symbian OS - Platform SecuritySymbian OS - Platform Security
Symbian OS - Platform Security
 
Android : a linux-based mobile operating system
Android : a linux-based mobile operating systemAndroid : a linux-based mobile operating system
Android : a linux-based mobile operating system
 
MATHS
MATHSMATHS
MATHS
 
J2ME
J2MEJ2ME
J2ME
 
Symbian mobile operating system ppt
Symbian mobile operating system pptSymbian mobile operating system ppt
Symbian mobile operating system ppt
 
889448 634356855122132416
889448 634356855122132416889448 634356855122132416
889448 634356855122132416
 
Mobile operating systems
Mobile operating systemsMobile operating systems
Mobile operating systems
 
Mobile OS Platform
Mobile OS PlatformMobile OS Platform
Mobile OS Platform
 
Symbian Operating system
Symbian Operating systemSymbian Operating system
Symbian Operating system
 
Introduction to Symbian OS
Introduction to Symbian OSIntroduction to Symbian OS
Introduction to Symbian OS
 
Symbian OS
Symbian OSSymbian OS
Symbian OS
 
Symbian OS
Symbian OSSymbian OS
Symbian OS
 
J2ME
J2MEJ2ME
J2ME
 
EOS
EOSEOS
EOS
 
Symbian OS
Symbian OSSymbian OS
Symbian OS
 
J2me
J2meJ2me
J2me
 
Symbian Os
Symbian OsSymbian Os
Symbian Os
 
J2ME mobile app development
J2ME mobile app developmentJ2ME mobile app development
J2ME mobile app development
 
Network and Mobile Operating System
Network and Mobile Operating SystemNetwork and Mobile Operating System
Network and Mobile Operating System
 
Introduction to Mobile programming(J2ME)
Introduction to Mobile programming(J2ME)Introduction to Mobile programming(J2ME)
Introduction to Mobile programming(J2ME)
 

Viewers also liked

Mobile Ad-hoc and Sensor Networks
Mobile Ad-hoc and Sensor NetworksMobile Ad-hoc and Sensor Networks
Mobile Ad-hoc and Sensor NetworksSushant Kushwaha
 
Mobile computing : Indirect TCP
Mobile computing : Indirect TCPMobile computing : Indirect TCP
Mobile computing : Indirect TCPSushant Kushwaha
 
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2Sushant Kushwaha
 
Mobile Ad-hoc Network (MANET) Applications
Mobile Ad-hoc Network (MANET) ApplicationsMobile Ad-hoc Network (MANET) Applications
Mobile Ad-hoc Network (MANET) ApplicationsSushant Kushwaha
 
Mobile computing-tcp data flow control
Mobile computing-tcp data flow controlMobile computing-tcp data flow control
Mobile computing-tcp data flow controlSushant Kushwaha
 
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1Sushant Kushwaha
 
The mHealth Funding Bus
The mHealth Funding BusThe mHealth Funding Bus
The mHealth Funding BusIsaac Holeman
 
Project Management Chapter 1 and chapter 2 Rosetti
Project Management Chapter 1 and chapter 2 RosettiProject Management Chapter 1 and chapter 2 Rosetti
Project Management Chapter 1 and chapter 2 Rosettidrosetti
 
Operating System Chapter 1
Operating System Chapter 1Operating System Chapter 1
Operating System Chapter 1Kasam Sharif
 

Viewers also liked (20)

Mobile Ad-hoc and Sensor Networks
Mobile Ad-hoc and Sensor NetworksMobile Ad-hoc and Sensor Networks
Mobile Ad-hoc and Sensor Networks
 
Mobile computing : Indirect TCP
Mobile computing : Indirect TCPMobile computing : Indirect TCP
Mobile computing : Indirect TCP
 
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
 
ZigBee
ZigBee ZigBee
ZigBee
 
Mobile Ad-hoc Network (MANET) Applications
Mobile Ad-hoc Network (MANET) ApplicationsMobile Ad-hoc Network (MANET) Applications
Mobile Ad-hoc Network (MANET) Applications
 
Snooping TCP
Snooping TCPSnooping TCP
Snooping TCP
 
Mobile computing-tcp data flow control
Mobile computing-tcp data flow controlMobile computing-tcp data flow control
Mobile computing-tcp data flow control
 
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1
 
Operating Systems
Operating SystemsOperating Systems
Operating Systems
 
The mHealth Funding Bus
The mHealth Funding BusThe mHealth Funding Bus
The mHealth Funding Bus
 
Project Management Chapter 1 and chapter 2 Rosetti
Project Management Chapter 1 and chapter 2 RosettiProject Management Chapter 1 and chapter 2 Rosetti
Project Management Chapter 1 and chapter 2 Rosetti
 
Chap001
Chap001Chap001
Chap001
 
Chap010
Chap010Chap010
Chap010
 
Chap012
Chap012Chap012
Chap012
 
Chap015
Chap015Chap015
Chap015
 
Chap004
Chap004Chap004
Chap004
 
Chap011
Chap011Chap011
Chap011
 
Operating System Chapter 1
Operating System Chapter 1Operating System Chapter 1
Operating System Chapter 1
 
Chap007
Chap007Chap007
Chap007
 
Chap003
Chap003Chap003
Chap003
 

Similar to Mobile Operating System

Bca i-fundamental of computer-u-3-functions operating systems
Bca  i-fundamental of  computer-u-3-functions operating systemsBca  i-fundamental of  computer-u-3-functions operating systems
Bca i-fundamental of computer-u-3-functions operating systemsRai University
 
Bsc cs 1 fit u-3 operating systems
Bsc cs 1 fit u-3 operating systemsBsc cs 1 fit u-3 operating systems
Bsc cs 1 fit u-3 operating systemsRai University
 
Bsc cs 1 fit u-3 operating systems
Bsc cs 1 fit u-3 operating systemsBsc cs 1 fit u-3 operating systems
Bsc cs 1 fit u-3 operating systemsRai University
 
Mca i-fundamental of computer-u-3-functions operating systems
Mca  i-fundamental of  computer-u-3-functions operating systemsMca  i-fundamental of  computer-u-3-functions operating systems
Mca i-fundamental of computer-u-3-functions operating systemsRai University
 
Nt introduction(os)
Nt introduction(os)Nt introduction(os)
Nt introduction(os)NehaTadam
 
Kernel security Concepts
Kernel security ConceptsKernel security Concepts
Kernel security ConceptsMohit Saxena
 
MK Sistem Operasi.pdf
MK Sistem Operasi.pdfMK Sistem Operasi.pdf
MK Sistem Operasi.pdfwisard1
 
CSE3120- Module1 part 1 v1.pptx
CSE3120- Module1 part 1 v1.pptxCSE3120- Module1 part 1 v1.pptx
CSE3120- Module1 part 1 v1.pptxakhilagajjala
 
Introduction to Operating system CBSE
Introduction to Operating system CBSE Introduction to Operating system CBSE
Introduction to Operating system CBSE PrashantChahal3
 
Operating system.ppt (1)
Operating system.ppt (1)Operating system.ppt (1)
Operating system.ppt (1)Vaibhav Bajaj
 
fdocuments.in_unit-2-foc.ppt
fdocuments.in_unit-2-foc.pptfdocuments.in_unit-2-foc.ppt
fdocuments.in_unit-2-foc.pptKrishanPalSingh39
 

Similar to Mobile Operating System (20)

Bca i-fundamental of computer-u-3-functions operating systems
Bca  i-fundamental of  computer-u-3-functions operating systemsBca  i-fundamental of  computer-u-3-functions operating systems
Bca i-fundamental of computer-u-3-functions operating systems
 
Bsc cs 1 fit u-3 operating systems
Bsc cs 1 fit u-3 operating systemsBsc cs 1 fit u-3 operating systems
Bsc cs 1 fit u-3 operating systems
 
Bsc cs 1 fit u-3 operating systems
Bsc cs 1 fit u-3 operating systemsBsc cs 1 fit u-3 operating systems
Bsc cs 1 fit u-3 operating systems
 
Mca i-fundamental of computer-u-3-functions operating systems
Mca  i-fundamental of  computer-u-3-functions operating systemsMca  i-fundamental of  computer-u-3-functions operating systems
Mca i-fundamental of computer-u-3-functions operating systems
 
Nt introduction(os)
Nt introduction(os)Nt introduction(os)
Nt introduction(os)
 
Kernel security Concepts
Kernel security ConceptsKernel security Concepts
Kernel security Concepts
 
MK Sistem Operasi.pdf
MK Sistem Operasi.pdfMK Sistem Operasi.pdf
MK Sistem Operasi.pdf
 
Windows XP operating system
Windows XP operating systemWindows XP operating system
Windows XP operating system
 
Operating system
Operating systemOperating system
Operating system
 
Chapter 7A Peter Norton
Chapter 7A Peter NortonChapter 7A Peter Norton
Chapter 7A Peter Norton
 
Unit 2.pptx
Unit 2.pptxUnit 2.pptx
Unit 2.pptx
 
Unit 2.pptx
Unit 2.pptxUnit 2.pptx
Unit 2.pptx
 
unit1 part1.ppt
unit1 part1.pptunit1 part1.ppt
unit1 part1.ppt
 
CSE3120- Module1 part 1 v1.pptx
CSE3120- Module1 part 1 v1.pptxCSE3120- Module1 part 1 v1.pptx
CSE3120- Module1 part 1 v1.pptx
 
OPERATING SYSTEM
OPERATING SYSTEMOPERATING SYSTEM
OPERATING SYSTEM
 
Introduction to Operating system CBSE
Introduction to Operating system CBSE Introduction to Operating system CBSE
Introduction to Operating system CBSE
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.ppt
 
ch1.ppt
ch1.pptch1.ppt
ch1.ppt
 
Operating system.ppt (1)
Operating system.ppt (1)Operating system.ppt (1)
Operating system.ppt (1)
 
fdocuments.in_unit-2-foc.ppt
fdocuments.in_unit-2-foc.pptfdocuments.in_unit-2-foc.ppt
fdocuments.in_unit-2-foc.ppt
 

Recently uploaded

main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixingviprabot1
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 

Recently uploaded (20)

main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixing
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 

Mobile Operating System

  • 1. © Oxford University Press 2007. All rights reserved. 1 Mobile Operating Systems Lesson 01 Operating System
  • 2. © Oxford University Press 2007. All rights reserved. 2 Operating system (OS) • The master control program • Manages all software and hardware resources • Controls, allocates, frees, and modifies the memory by increasing or decreasing it
  • 3. © Oxford University Press 2007. All rights reserved. 3 Operating system (OS) • Also manages files, disks, and security, provides device drivers and GUIs for desktop or mobile computer, other functions, and applications • Enables the assignment of priorities for requests to the system and controls IO devices and network
  • 4. © Oxford University Press 2007. All rights reserved. 4 Device driver • As software component which enables the use of a device, port, or network by configuring (for open, close, connect, or specifying a buffer size, mode, or control word) and sends output or receives input • Driver Functions─ create, delete, open, close, read, write, io_control, connect, bind, listen and accept
  • 5. © Oxford University Press 2007. All rights reserved. 5 Operating system (OS) • Has the utility programs, for example, file manager and configuration of OS (memory and resource allocation and enabling and disabling the use of specific resources and functions) • Can be accompanied by a specific suite of applications, for example, Internet Explorer and MS Office
  • 6. © Oxford University Press 2007. All rights reserved. 6 Process • A program unit which runs when scheduled to do so by OS and each state of which is controlled by OS • Can call a function (method) but cannot call another process directly
  • 7. © Oxford University Press 2007. All rights reserved. 7 States of a process • Can be in any of the states— 1. created 2. active 3. running 4. suspended 5. pending for a specified time interval
  • 8. © Oxford University Press 2007. All rights reserved. 8 Pending state of a process for a specific communication from other process • Signal • Semaphore • Mailbox-message • Queue-message • Socket
  • 9. © Oxford University Press 2007. All rights reserved. 9 Task • An application process which runs according to its schedule set by the OS • Each state of which is controlled by OS • Can be a real-time task which has time constraints or maximum defined latency within which it must run or finish
  • 10. © Oxford University Press 2007. All rights reserved. 10 Thread • An application process or a process sub- unit (when a process or task has multiple threads) • Runs as scheduled by the OS • Each state controlled by OS • Runs as a light-weight process
  • 11. © Oxford University Press 2007. All rights reserved. 11 Light-weight • Does not depend on certain system resources, for example, memory management unit (MMU), GUI functions provided by the OS, or the functions which need running of other processes or threads for their implementation
  • 12. © Oxford University Press 2007. All rights reserved. 12 Interrupt service routine (ISR) • A program unit (function, method, or subroutine) which runs when a hardware or software event occurs • Running of which can be masked and can be prioritized by assigning a priority • Higher priority than any other process or task or thread
  • 13. © Oxford University Press 2007. All rights reserved. 13 Hardware events for interrupts • Time-out of a timer (clock tick) • Division by zero • Overflow • Underflow detection by hardware during computation
  • 14. © Oxford University Press 2007. All rights reserved. 14 Hardware events for interrupts • Finishing of DMA (direct memory access by a peripheral) transfer • Data abort • External FIQ (fast interrupt request through a pin input) • External IRQ (interrupt request through a pin input) • A memory buffer becoming full
  • 15. © Oxford University Press 2007. All rights reserved. 15 Hardware events for interrupts • Port, transmitter, receiver, or device buffer─ becoming half filled, buffer with at least one memory address filled, and buffer becoming empty • Buffer─ associated with the memory addresses for the LCD, printer, serial or USB port, keypad, or modem
  • 16. © Oxford University Press 2007. All rights reserved. 16 Software related events for interrupts • Exception─ software instruction for interrupt on detection of a certain condition during computations or error while logging in • Illegal operation code provided to CPU
  • 17. © Oxford University Press 2007. All rights reserved. 17 Interrupt service thread (IST) • A special type of ISR or ISR unit (function, method, or subroutine) which initiates and runs on an event or message from an high priority ISR • ISTs can be prioritized by assigning a priority • The type of IST depends on the specific OS
  • 18. © Oxford University Press 2007. All rights reserved. 18 Windows CE IST • One which is placed in a priority queue so that the ISTs execute turn by turn— FIFO (first-in first-out) • An IST is initiated and put in the FIFO according to ISR priority after the execution of an ISR starts on an event and the ISR puts a message or semaphore or signal for the IST
  • 19. © Oxford University Press 2007. All rights reserved. 19 ISR and IST • The ISR, therefore, has an event-initiated short piece of code, which runs only the critical part of the code and rest of the code runs at the IST initiated by it • The IST priority─ lower than the ISR but higher than the processes or tasks or threads
  • 20. © Oxford University Press 2007. All rights reserved. 20 Page • A unit of memory which can load from a program stored in a hard drive or from any other storage device to the program memory, RAM, before the execution of a program • A contiguous memory address block of 4 kB (in x86 processors), 2 kB, or 1 kB
  • 21. © Oxford University Press 2007. All rights reserved. 21 Page table • For address mapping • Provides the mapping of fragmented physical memory pages with the pages of the virtual addresses which are the memory addresses • Pages of memory are spread over the memory-address space leading to fragmentation of codes and data in physical memory space
  • 22. © Oxford University Press 2007. All rights reserved. 22 MMU • Creates and maintains the page table and hence performs address mapping and translation • Program during execution first translates the accessed address (virtual address) into a physical address using the page table at the MMU and then accesses the physical address and fetches the code or data
  • 23. © Oxford University Press 2007. All rights reserved. 23 Priority inversion • Takes place when a process or thread which is to provide a waiting object to a higher priority process or thread gets preempted by a middle priority process or thread and thus the middle priority process or thread starts running on obtaining the object for which it was waiting and higher priority process or thread keeps waiting for wait object.
  • 24. © Oxford University Press 2007. All rights reserved. 24 Priority inheritence • Process or thread which is to provide a waiting object to a higher priority process or thread, gets the priority of that process or thread • Waiting object─ signal, semaphore, queue, mailbox message, or bytes from a pipe
  • 25. © Oxford University Press 2007. All rights reserved. 25 Pipe • A virtual device which sends the bytes from a thread to another thread
  • 26. © Oxford University Press 2007. All rights reserved. 26 Example of Linux OS – Mobile • An open source OS • Enables the user to customize their device to suit their specific needs • Provides ease to suit different sorts of hardware and software applications
  • 27. © Oxford University Press 2007. All rights reserved. 27 Linux • Embedded Linux Consortium (ELC) standards for Linux for designing user interfaces, managing power consumption in devices, and real-time operation • Also considered to be more secure than most other operating systems • Several international mobile phone manufacturers use Linux for their OS requirements
  • 28. © Oxford University Press 2007. All rights reserved. 28 Motorola Rokr E2 music phone • A Linux-based mobile phone • A 240 x 320 TFT display with 262,000 colours • USB 2.0 PC networking for fast ‘drag- and-drop’ data transfer • Built-in FM radio • Support for Motorola’s iRadio service • Support for Bluetooth
  • 29. © Oxford University Press 2007. All rights reserved. 29 Motorola Rokr E2 music phone • 1.3-megapixel camera for video capture and playback • MMS (multimedia messaging service) enabled • Opera web browser • Airplane mode for safely listening to music when aboard an aircraft • PIM (personal information manager) with picture caller ID
  • 30. © Oxford University Press 2007. All rights reserved. 30 Summary • OS─ a master control program • Manages all software and hardware resources • Controls, allocates, frees, and modifies the memory by increasing or decreasing it • Controls processes, tasks, threads, ISRs and ISTs
  • 31. © Oxford University Press 2007. All rights reserved. 31 … Summary • Manages files, disks, and security, provides device drivers and GUIs for desktop or mobile computer, other functions, and applications • MMU • Priority inversion and inheritence • Linux─ An open source OS • Enables the user to customize their device to suit their specific needs
  • 32. © Oxford University Press 2007. All rights reserved. 32 End of Lesson 01 Operating System