SlideShare a Scribd company logo
Mobile Systems
Engineering
1. Introduction
Topics
Introduction to Mobile Systems
Mobile Systems vs Wireless Systems vs
Embedded Systems
Mobile Applications
Syllabus, Evaluation and Class Policies
Evolution of the Computing
Paradigm
Evolution of the Computing
Paradigm
1.Early computers 2.Punch cards 3.Command
Line
4. First PC 5. SmartPhone
Evolution of the Computing
Paradigm
Evolution of the Computing
Paradigm
Mobile Devices
Smartphones
Tablets
Netbooks
Laptops
E-book readers
PDAs
Mobile Devices
The Players:
Google’s Android
Apple’s iPhone
RIM
Microsoft
Nokia
Palm
What is different about
Mobile Computing??
Is it same as Embedded computing?
Is it a special case of Embedded computing?
Is it just Wireless communications?
Mobile Systems in
perspective
• Mobile Systems = Wireless communication + Computing
• Wireless Communication
- Is a distinguishing aspect of mobile systems – without wireless, mobile systems
can’t communicate (voice or data). Imagine a cell phone without wireless.
- Wireless communication is used between fixed devices also that need not
necessarily be mobile. For example, home networking where a TV (non mobile
device), Audio system (non- mobile), laptop (mobile), Desktop (non mobile),
Washing machine etc may be networked.
Embedded Systems
- Specialized for the application it caters to as against being general purpose, Often resour
(CPU power, memory etc) constrained, characterized by special hardware and
associated system software
Need not be mobile and hence may have wired connectivity (eg printer/scanner using
a USB)
Mobile Systems in
perspective
Applications
1. Mobile centric applications – those specialized for mobile scenarios – for
example, location dependent services, cell phone telephony based services
2.Applications that may be classified as personal and micro applications – for
example, applications that assist in personal finance management, personal
diary etc
3. Application architectures specialized for mobile – mobile application
design patterns. For example, consider the intersection of cloud and a mobile
device where the cloud serves as a backup medium to store data from the
mobile device. Another example is that complex computations can be
offloaded to cloud, while the rich multimedia capabilities of Smartphones/
Tablets can be leveraged to provide a rich user experience to the client
applications
Characteristics of a Mobile
System
Portable: Mobile systems can be carried (In this discussion we
consider the devices that are carried by people and exclude
devices such as Robots or missiles that can move without
needing to carried by humans)
- Weight, size, form factor, heat dissipation
- Resource constraints
Battery Powered : (This discussion is focused on devices that
are portable and have a battery that is portable as against car
batteries that are huge)
- System software to control energy optimization
- Processor support for energy optimization
- Application architecture driven optimization
- Optimization in communication systems
Characteristics of a Mobile
System
Wireless connected
- Different protocols result in different speeds (hence
different power
requirements), different error rates or reliability and
routing
requirements
Limitations:
Bandwidth: Insufficient bandwidth and hence mobile
internet access is generally slower than wired access
Security: Dependency on public networks
Power consumption: Dependent on battery
Transmission interferences: Terrain,Weather..
Why Mobile Applications?
Most computers will be portable
Need to access network – need wireless
Many people will be mobile
Consider air travellers inside an aircraft. This is an example
of a mobile network moving at high speed above the ground
– wireless communication is the only mode of data
communication.
User Mobility: Refers to a user who has access to same or
similar telecommunication services at different places –
services follow the user
Device Portability: The communication device moves
(with or without the user). Many mechanisms in the network
inside and outside the device need to make sure that the
communication is still possible while on the move.
The term wireless is used with regard to the devices. This
only refers to a way of accessing the network or other
communication partners – transmission of electromagnetic
Communication Patterns
Wireless networking and mobile computing
are related but not identical
Fixed and Wired
Eg Desktop
Mobile and Wired
Eg, laptops carried from one room to
another and connected to wired network
Fixed and Wireless
Eg, printers connected through wireless,
Washing machines that can be
connected through
wireless
Mobile and Wireless
Applications
Vehicles
Nomadic user
Smart mobile phone
Invisible computing
Wearable computing
Intelligent house or office
Meeting room/conference
Taxi/Police/Fire squad fleet
Service worker
Lonely wolf
Disaster relief and Disaster alarm
Games
Scope of Mobile Systems
Application Architecture
Work within constraints
- Design Patterns that handle the constraints effectively
- Constraints in CPU speed, memory, persistent storage,
network speed,
network reliability, power consumption, screen size,
input methods
- Push versus pull to handle transmission power, Use the
wake_lock
effectively, move heavy computation to the server, use
the local database effectively to handle network unreliability,
backup of device data on server, integration of cloud and device,
content adaptation,
- Perform the right trade offs in building applications
Take advantage of devices
- Devices: Camera, GPS, Compos, Accelerometer,
Audio/Speaker/microphone
- New gestures as input/output (eg: multitouch, accelerometer)
- New class of applications (mobile video conferencing,
connectivity to social
System Architecture
System
Handle constraints: Bionic library (as against a complete libc
– make a
measurement of bionic size versus full libc size), utilities
and tools that are subset of Linux, DVM to effectively use
memory/power, Power management, Network management to
take care of reliability and low bandwidth aspects
Support new devices: Consistent model for accessing
devices, system
guarantees on availability of devices, Interfaces between
devices, libraries and applications, device specific events (eg,
camera_ready)
Support different wireless protocols
Support detection of mobility and changes to the
environment
Mobile Operating System

...also known as MobileOS, Handheld OS or
Mobile Platform, is the operating system
that controls a mobile device.

Why do we need a mobile OS?

How do current mobile OSs compare?
Demands from a Mobile OS

Short start-up time

Quick response to user actions

Portable

Power efficient

Extensible
Characteristics of a Mobile
OS

Multitasking system – ability to run multiple
applications simultaneously, respond to
asynchronous events

Memory protection – secure environment
for running applications without
compromising user privacy and data
security

Power conscious

Extensible – can run third party
applications

Support for wide variety of communication
Comparison of Mobile
Platforms
Multi-ta
sking
Java
support
Flash
support
Browser License
Android Yes Yes Yes WebKit Open
source
Blackberry Yes Yes Yes Proprietary Proprietary
iPhone Yes No No WebKit Semi-propr
ietary
WinMobile Yes Yes Yes IE Proprietary
, with
partial
sources
Comparison of Mobile Platforms -
Development Tools
Primary
language(s)
Debugger IDE Availability
Android Java
(limited C/C++)
ADT
Eclipse
plugin
ADT
Eclipse
plugin
Free
Blackberry Java Integrated
in JDE
JDE Free
iPhone Objective-C Integrated
in XCode
IDE
XCode Free on
Intel-Mac,
fee-based
deployment
WinMobile C/C++, C#,
VB.Net
Yes Visual
Studio,
eVC++
Commercial
(Visual
Studio), free
(eVC++)

More Related Content

What's hot

Chapter 3 cloud computing and intro parrallel computing
Chapter 3 cloud computing and intro parrallel computingChapter 3 cloud computing and intro parrallel computing
Chapter 3 cloud computing and intro parrallel computing
Praveen M Jigajinni
 
Unit 1.2 move to cloud computing
Unit 1.2   move to cloud computingUnit 1.2   move to cloud computing
Unit 1.2 move to cloud computing
eShikshak
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Syam Lal
 
Unit 1.1 introduction to cloud computing
Unit 1.1   introduction to cloud computingUnit 1.1   introduction to cloud computing
Unit 1.1 introduction to cloud computing
eShikshak
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Ripal Ranpara
 
Distributed Computing
Distributed ComputingDistributed Computing
Distributed Computing
Prashant Tiwari
 
Distributed Computing
Distributed ComputingDistributed Computing
Distributed Computing
Sudarsun Santhiappan
 
Unit 1.3 types of cloud
Unit 1.3 types of cloudUnit 1.3 types of cloud
Unit 1.3 types of cloud
eShikshak
 
Distributed computing
Distributed computingDistributed computing
Distributed computing
Alokeparna Choudhury
 
Unit 1.4 working of cloud computing
Unit 1.4 working of cloud computingUnit 1.4 working of cloud computing
Unit 1.4 working of cloud computing
eShikshak
 
cloud computing basics
cloud computing basicscloud computing basics
cloud computing basics
Sweta Kumari Barnwal
 
Cloud ready reference
Cloud ready referenceCloud ready reference
Cloud ready reference
Helly Patel
 
Distributed computing ).ppt him
Distributed computing ).ppt himDistributed computing ).ppt him
Distributed computing ).ppt him
Himanshu Saini
 
Distributed Computing
Distributed Computing Distributed Computing
Distributed Computing
Megha yadav
 
Distributed computing
Distributed computingDistributed computing
Distributed computingshivli0769
 
Data centre administration
Data centre administrationData centre administration
Data centre administrationUjjwal 'Shanu'
 
Synopsis on cloud computing by Prashant upta
Synopsis on cloud computing by Prashant uptaSynopsis on cloud computing by Prashant upta
Synopsis on cloud computing by Prashant uptaPrashant Gupta
 
Distributed computing
Distributed computingDistributed computing
Distributed computingKeshab Nath
 
Cloud computing
Cloud computingCloud computing
Cloud computing
ABDALLA SAID
 
Cloud computing
Cloud computingCloud computing
Cloud computing
ABDALLA SAID
 

What's hot (20)

Chapter 3 cloud computing and intro parrallel computing
Chapter 3 cloud computing and intro parrallel computingChapter 3 cloud computing and intro parrallel computing
Chapter 3 cloud computing and intro parrallel computing
 
Unit 1.2 move to cloud computing
Unit 1.2   move to cloud computingUnit 1.2   move to cloud computing
Unit 1.2 move to cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Unit 1.1 introduction to cloud computing
Unit 1.1   introduction to cloud computingUnit 1.1   introduction to cloud computing
Unit 1.1 introduction to cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Distributed Computing
Distributed ComputingDistributed Computing
Distributed Computing
 
Distributed Computing
Distributed ComputingDistributed Computing
Distributed Computing
 
Unit 1.3 types of cloud
Unit 1.3 types of cloudUnit 1.3 types of cloud
Unit 1.3 types of cloud
 
Distributed computing
Distributed computingDistributed computing
Distributed computing
 
Unit 1.4 working of cloud computing
Unit 1.4 working of cloud computingUnit 1.4 working of cloud computing
Unit 1.4 working of cloud computing
 
cloud computing basics
cloud computing basicscloud computing basics
cloud computing basics
 
Cloud ready reference
Cloud ready referenceCloud ready reference
Cloud ready reference
 
Distributed computing ).ppt him
Distributed computing ).ppt himDistributed computing ).ppt him
Distributed computing ).ppt him
 
Distributed Computing
Distributed Computing Distributed Computing
Distributed Computing
 
Distributed computing
Distributed computingDistributed computing
Distributed computing
 
Data centre administration
Data centre administrationData centre administration
Data centre administration
 
Synopsis on cloud computing by Prashant upta
Synopsis on cloud computing by Prashant uptaSynopsis on cloud computing by Prashant upta
Synopsis on cloud computing by Prashant upta
 
Distributed computing
Distributed computingDistributed computing
Distributed computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

Similar to Class 2

Lesson one introduction to mc
Lesson one  introduction to mcLesson one  introduction to mc
Lesson one introduction to mc
ssuser8662bb
 
Mobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSMMobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSM
Pallepati Vasavi
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
Kathirvel Ayyaswamy
 
A Study Mobile Computing
A Study   Mobile ComputingA Study   Mobile Computing
A Study Mobile Computing
Sara Alvarez
 
1.intro. to distributed system
1.intro. to distributed system1.intro. to distributed system
1.intro. to distributed system
Gd Goenka University
 
CS8601 Unit-1.pptx
CS8601 Unit-1.pptxCS8601 Unit-1.pptx
CS8601 Unit-1.pptx
VenkatesanSatheeswar
 
Distributed systems
Distributed systemsDistributed systems
Distributed systems
sree kanth
 
Mobile Computing Complete Introduction
Mobile Computing Complete IntroductionMobile Computing Complete Introduction
Mobile Computing Complete Introduction
Denis R
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingEditor IJCATR
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Editor IJCATR
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
Editor IJCATR
 
WAP
WAPWAP
Mobile system overview
Mobile system overviewMobile system overview
Mobile system overview
Jack Zheng
 
Basics of Mobile COmmunication.pptx
Basics of Mobile COmmunication.pptxBasics of Mobile COmmunication.pptx
Basics of Mobile COmmunication.pptx
Dr.R.SUGANYA RENGARAJ
 
Mobile Computing I-Unit Notes
Mobile Computing I-Unit NotesMobile Computing I-Unit Notes
Mobile Computing I-Unit Notes
gouse_1210
 
Overview of mobile computing
Overview of mobile computingOverview of mobile computing
Overview of mobile computing
VENNILAV6
 
mdm-intro-chapter1.ppt
mdm-intro-chapter1.pptmdm-intro-chapter1.ppt
mdm-intro-chapter1.ppt
Akttripathi
 
MOBILE COMPUTING Unit 1.pptx
MOBILE COMPUTING Unit 1.pptxMOBILE COMPUTING Unit 1.pptx
MOBILE COMPUTING Unit 1.pptx
karthiksmart21
 
Ch1
Ch1Ch1

Similar to Class 2 (20)

Lesson one introduction to mc
Lesson one  introduction to mcLesson one  introduction to mc
Lesson one introduction to mc
 
Mobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSMMobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSM
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
A Study Mobile Computing
A Study   Mobile ComputingA Study   Mobile Computing
A Study Mobile Computing
 
1.intro. to distributed system
1.intro. to distributed system1.intro. to distributed system
1.intro. to distributed system
 
CS8601 Unit-1.pptx
CS8601 Unit-1.pptxCS8601 Unit-1.pptx
CS8601 Unit-1.pptx
 
Distributed systems
Distributed systemsDistributed systems
Distributed systems
 
Mobile Computing Complete Introduction
Mobile Computing Complete IntroductionMobile Computing Complete Introduction
Mobile Computing Complete Introduction
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
 
WAP
WAPWAP
WAP
 
Mobile system overview
Mobile system overviewMobile system overview
Mobile system overview
 
Basics of Mobile COmmunication.pptx
Basics of Mobile COmmunication.pptxBasics of Mobile COmmunication.pptx
Basics of Mobile COmmunication.pptx
 
Mobile Computing I-Unit Notes
Mobile Computing I-Unit NotesMobile Computing I-Unit Notes
Mobile Computing I-Unit Notes
 
Overview of mobile computing
Overview of mobile computingOverview of mobile computing
Overview of mobile computing
 
mdm-intro-chapter1.ppt
mdm-intro-chapter1.pptmdm-intro-chapter1.ppt
mdm-intro-chapter1.ppt
 
Mdm intro-chapter1
Mdm intro-chapter1Mdm intro-chapter1
Mdm intro-chapter1
 
MOBILE COMPUTING Unit 1.pptx
MOBILE COMPUTING Unit 1.pptxMOBILE COMPUTING Unit 1.pptx
MOBILE COMPUTING Unit 1.pptx
 
Ch1
Ch1Ch1
Ch1
 

More from NikithaNag

Mse unit5
Mse unit5Mse unit5
Mse unit5
NikithaNag
 
Activity
ActivityActivity
Activity
NikithaNag
 
Activity
ActivityActivity
Activity
NikithaNag
 
Roopa 21:47
Roopa 21:47Roopa 21:47
Roopa 21:47
NikithaNag
 
Roopa 21:46
Roopa 21:46Roopa 21:46
Roopa 21:46
NikithaNag
 
Gobhi manchuri
Gobhi manchuriGobhi manchuri
Gobhi manchuri
NikithaNag
 
Biryani
BiryaniBiryani
Biryani
NikithaNag
 
09 cs491 st-t1
09 cs491 st-t109 cs491 st-t1
09 cs491 st-t1
NikithaNag
 
doc
docdoc
doc
docdoc
Tips1
Tips1Tips1
Tips1
NikithaNag
 

More from NikithaNag (13)

Mse unit5
Mse unit5Mse unit5
Mse unit5
 
Activity
ActivityActivity
Activity
 
Activity
ActivityActivity
Activity
 
Roopa 21:47
Roopa 21:47Roopa 21:47
Roopa 21:47
 
Roopa 21:46
Roopa 21:46Roopa 21:46
Roopa 21:46
 
ppt_type.ppt
ppt_type.pptppt_type.ppt
ppt_type.ppt
 
Gobhi manchuri
Gobhi manchuriGobhi manchuri
Gobhi manchuri
 
Biryani
BiryaniBiryani
Biryani
 
09 cs491 st-t1
09 cs491 st-t109 cs491 st-t1
09 cs491 st-t1
 
1
11
1
 
doc
docdoc
doc
 
doc
docdoc
doc
 
Tips1
Tips1Tips1
Tips1
 

Recently uploaded

The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 

Recently uploaded (20)

The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 

Class 2

  • 2. Topics Introduction to Mobile Systems Mobile Systems vs Wireless Systems vs Embedded Systems Mobile Applications Syllabus, Evaluation and Class Policies
  • 3. Evolution of the Computing Paradigm
  • 4. Evolution of the Computing Paradigm 1.Early computers 2.Punch cards 3.Command Line 4. First PC 5. SmartPhone
  • 5. Evolution of the Computing Paradigm
  • 6. Evolution of the Computing Paradigm
  • 8. Mobile Devices The Players: Google’s Android Apple’s iPhone RIM Microsoft Nokia Palm
  • 9. What is different about Mobile Computing?? Is it same as Embedded computing? Is it a special case of Embedded computing? Is it just Wireless communications?
  • 10. Mobile Systems in perspective • Mobile Systems = Wireless communication + Computing • Wireless Communication - Is a distinguishing aspect of mobile systems – without wireless, mobile systems can’t communicate (voice or data). Imagine a cell phone without wireless. - Wireless communication is used between fixed devices also that need not necessarily be mobile. For example, home networking where a TV (non mobile device), Audio system (non- mobile), laptop (mobile), Desktop (non mobile), Washing machine etc may be networked.
  • 11. Embedded Systems - Specialized for the application it caters to as against being general purpose, Often resour (CPU power, memory etc) constrained, characterized by special hardware and associated system software Need not be mobile and hence may have wired connectivity (eg printer/scanner using a USB)
  • 12. Mobile Systems in perspective Applications 1. Mobile centric applications – those specialized for mobile scenarios – for example, location dependent services, cell phone telephony based services 2.Applications that may be classified as personal and micro applications – for example, applications that assist in personal finance management, personal diary etc 3. Application architectures specialized for mobile – mobile application design patterns. For example, consider the intersection of cloud and a mobile device where the cloud serves as a backup medium to store data from the mobile device. Another example is that complex computations can be offloaded to cloud, while the rich multimedia capabilities of Smartphones/ Tablets can be leveraged to provide a rich user experience to the client applications
  • 13. Characteristics of a Mobile System Portable: Mobile systems can be carried (In this discussion we consider the devices that are carried by people and exclude devices such as Robots or missiles that can move without needing to carried by humans) - Weight, size, form factor, heat dissipation - Resource constraints Battery Powered : (This discussion is focused on devices that are portable and have a battery that is portable as against car batteries that are huge) - System software to control energy optimization - Processor support for energy optimization - Application architecture driven optimization - Optimization in communication systems
  • 14. Characteristics of a Mobile System Wireless connected - Different protocols result in different speeds (hence different power requirements), different error rates or reliability and routing requirements Limitations: Bandwidth: Insufficient bandwidth and hence mobile internet access is generally slower than wired access Security: Dependency on public networks Power consumption: Dependent on battery Transmission interferences: Terrain,Weather..
  • 15. Why Mobile Applications? Most computers will be portable Need to access network – need wireless Many people will be mobile Consider air travellers inside an aircraft. This is an example of a mobile network moving at high speed above the ground – wireless communication is the only mode of data communication. User Mobility: Refers to a user who has access to same or similar telecommunication services at different places – services follow the user Device Portability: The communication device moves (with or without the user). Many mechanisms in the network inside and outside the device need to make sure that the communication is still possible while on the move. The term wireless is used with regard to the devices. This only refers to a way of accessing the network or other communication partners – transmission of electromagnetic
  • 16. Communication Patterns Wireless networking and mobile computing are related but not identical Fixed and Wired Eg Desktop Mobile and Wired Eg, laptops carried from one room to another and connected to wired network Fixed and Wireless Eg, printers connected through wireless, Washing machines that can be connected through wireless Mobile and Wireless
  • 17. Applications Vehicles Nomadic user Smart mobile phone Invisible computing Wearable computing Intelligent house or office Meeting room/conference Taxi/Police/Fire squad fleet Service worker Lonely wolf Disaster relief and Disaster alarm Games
  • 18. Scope of Mobile Systems
  • 19.
  • 20. Application Architecture Work within constraints - Design Patterns that handle the constraints effectively - Constraints in CPU speed, memory, persistent storage, network speed, network reliability, power consumption, screen size, input methods - Push versus pull to handle transmission power, Use the wake_lock effectively, move heavy computation to the server, use the local database effectively to handle network unreliability, backup of device data on server, integration of cloud and device, content adaptation, - Perform the right trade offs in building applications Take advantage of devices - Devices: Camera, GPS, Compos, Accelerometer, Audio/Speaker/microphone - New gestures as input/output (eg: multitouch, accelerometer) - New class of applications (mobile video conferencing, connectivity to social
  • 21. System Architecture System Handle constraints: Bionic library (as against a complete libc – make a measurement of bionic size versus full libc size), utilities and tools that are subset of Linux, DVM to effectively use memory/power, Power management, Network management to take care of reliability and low bandwidth aspects Support new devices: Consistent model for accessing devices, system guarantees on availability of devices, Interfaces between devices, libraries and applications, device specific events (eg, camera_ready) Support different wireless protocols Support detection of mobility and changes to the environment
  • 22. Mobile Operating System  ...also known as MobileOS, Handheld OS or Mobile Platform, is the operating system that controls a mobile device.  Why do we need a mobile OS?  How do current mobile OSs compare?
  • 23. Demands from a Mobile OS  Short start-up time  Quick response to user actions  Portable  Power efficient  Extensible
  • 24. Characteristics of a Mobile OS  Multitasking system – ability to run multiple applications simultaneously, respond to asynchronous events  Memory protection – secure environment for running applications without compromising user privacy and data security  Power conscious  Extensible – can run third party applications  Support for wide variety of communication
  • 25. Comparison of Mobile Platforms Multi-ta sking Java support Flash support Browser License Android Yes Yes Yes WebKit Open source Blackberry Yes Yes Yes Proprietary Proprietary iPhone Yes No No WebKit Semi-propr ietary WinMobile Yes Yes Yes IE Proprietary , with partial sources
  • 26. Comparison of Mobile Platforms - Development Tools Primary language(s) Debugger IDE Availability Android Java (limited C/C++) ADT Eclipse plugin ADT Eclipse plugin Free Blackberry Java Integrated in JDE JDE Free iPhone Objective-C Integrated in XCode IDE XCode Free on Intel-Mac, fee-based deployment WinMobile C/C++, C#, VB.Net Yes Visual Studio, eVC++ Commercial (Visual Studio), free (eVC++)