The document provides an overview of mobile platforms and applications. It discusses mobile device operating systems, their requirements and constraints. It describes several commercial mobile operating systems including iOS, Android, BlackBerry and Windows Phone. It also covers mobile commerce structures and applications, mobile payment systems, and related security issues. Software development kits for platforms like iOS and Android are explained.
In the seven-layer OSI model of computer networking, media access control (MAC) data communication protocol is a sublayer of the data link layer (layer 2). The MAC sublayer provides addressing and channel access control mechanisms that make it possible for several terminals or network nodes to communicate within a multiple access network that incorporates a shared medium, e.g. an Ethernet network. The hardware that implements the MAC is referred to as a media access controller.
The MAC sublayer acts as an interface between the logical link control (LLC) sublayer and the network's physical layer. The MAC layer emulates a full-duplex logical communication channel in a multi-point network. This channel may provide unicast, multicast or broadcast communication service.
UNIT I INTRODUCTION
Introduction to Mobile Computing – Applications of Mobile Computing- Generations of Mobile Communication Technologies- Multiplexing – Spread spectrum -MAC Protocols – SDMA- TDMA- FDMA- CDMA
This ppt define the basic concepts of mobile computing. It is the first part of mobile computing.
It defines the following terms
Introduction to mobile computing
Generations of mobile computing
Cellular concepts
Signalling, modulation and Demodulation
Spread Spectrum
Frequency Reuse
Multiple access schemes
GSM
GPRS
CDMA
Motivation for a specialized MAC (Hidden and exposed terminals, Near and far terminals), SDMA, FDMA, TDMA, CDMA, Wireless LAN/(IEEE 802.11)
Mobile Network Layer: IP and Mobile IP Network Layers, Packet Delivery and Handover Management, Location Management, Registration, Tunneling and Encapsulation, Route Optimization, DHCP
In the seven-layer OSI model of computer networking, media access control (MAC) data communication protocol is a sublayer of the data link layer (layer 2). The MAC sublayer provides addressing and channel access control mechanisms that make it possible for several terminals or network nodes to communicate within a multiple access network that incorporates a shared medium, e.g. an Ethernet network. The hardware that implements the MAC is referred to as a media access controller.
The MAC sublayer acts as an interface between the logical link control (LLC) sublayer and the network's physical layer. The MAC layer emulates a full-duplex logical communication channel in a multi-point network. This channel may provide unicast, multicast or broadcast communication service.
UNIT I INTRODUCTION
Introduction to Mobile Computing – Applications of Mobile Computing- Generations of Mobile Communication Technologies- Multiplexing – Spread spectrum -MAC Protocols – SDMA- TDMA- FDMA- CDMA
This ppt define the basic concepts of mobile computing. It is the first part of mobile computing.
It defines the following terms
Introduction to mobile computing
Generations of mobile computing
Cellular concepts
Signalling, modulation and Demodulation
Spread Spectrum
Frequency Reuse
Multiple access schemes
GSM
GPRS
CDMA
Motivation for a specialized MAC (Hidden and exposed terminals, Near and far terminals), SDMA, FDMA, TDMA, CDMA, Wireless LAN/(IEEE 802.11)
Mobile Network Layer: IP and Mobile IP Network Layers, Packet Delivery and Handover Management, Location Management, Registration, Tunneling and Encapsulation, Route Optimization, DHCP
What is GSM?
The Global System for Mobile communications is a digital cellular communications system. It was developed in order to create a common European mobile telephone standard but it has been rapidly accepted worldwide.
Formerly it was “Groupe Spéciale Mobile” (founded in 1982)
now: Global System for Mobile Communication.
Services:
Tele-services
Bearer or Data Services
Supplementary services
Applications:
Mobile telephony
GSM-R
Telemetry System
- Fleet management
- Automatic meter reading
- Toll Collection
- Remote control and fault reporting of DG sets
Value Added Services
Advantages:
Better Quality of speech
Data transmission is supported
New services offered due to ISDN compatibility
International Roaming possible
Large market
Crisper, cleaner quieter calls
disadvantages:
Dropped and missed calls
Less Efficiency
Security Issues
conclusion
The mobile telephony industry rapidly growing and that has become backbone for business success and efficiency and a part of modern lifestyles all over the world.
In this session I have tried to give and over view of the GSM system. I hope that I gave the general flavor of GSM and the philosophy behind its design.
The GSM is standard that insures interoperability without stifling competition and innovation among the suppliers to the benefit of the public both in terms of cost and service quality.
Mobile Device Operating Systems – Special Constrains & Requirements – Commercial Mobile Operating Systems – Software Development Kit: iOS, Android, BlackBerry, Windows Phone – M-Commerce – Structure – Pros & Cons – Mobile Payment System – Security Issues.
Introduction: Mobile Communications, Mobile Computing – Paradigm, Promises/Novel Applications and Impediments and Architecture; Mobile and Handheld Devices, Limitations of Mobile and Handheld Devices.
GSM – Services, System Architecture, Radio Interfaces, Protocols, Localization, Calling, Handover, Security, New Data Services, GPRS, CSHSD, DECT.
Wireless communication is the transfer of information between two or more points that are not connected by an electrical conductor.
The most common wireless technologies use radio
What is GSM?
The Global System for Mobile communications is a digital cellular communications system. It was developed in order to create a common European mobile telephone standard but it has been rapidly accepted worldwide.
Formerly it was “Groupe Spéciale Mobile” (founded in 1982)
now: Global System for Mobile Communication.
Services:
Tele-services
Bearer or Data Services
Supplementary services
Applications:
Mobile telephony
GSM-R
Telemetry System
- Fleet management
- Automatic meter reading
- Toll Collection
- Remote control and fault reporting of DG sets
Value Added Services
Advantages:
Better Quality of speech
Data transmission is supported
New services offered due to ISDN compatibility
International Roaming possible
Large market
Crisper, cleaner quieter calls
disadvantages:
Dropped and missed calls
Less Efficiency
Security Issues
conclusion
The mobile telephony industry rapidly growing and that has become backbone for business success and efficiency and a part of modern lifestyles all over the world.
In this session I have tried to give and over view of the GSM system. I hope that I gave the general flavor of GSM and the philosophy behind its design.
The GSM is standard that insures interoperability without stifling competition and innovation among the suppliers to the benefit of the public both in terms of cost and service quality.
Mobile Device Operating Systems – Special Constrains & Requirements – Commercial Mobile Operating Systems – Software Development Kit: iOS, Android, BlackBerry, Windows Phone – M-Commerce – Structure – Pros & Cons – Mobile Payment System – Security Issues.
Introduction: Mobile Communications, Mobile Computing – Paradigm, Promises/Novel Applications and Impediments and Architecture; Mobile and Handheld Devices, Limitations of Mobile and Handheld Devices.
GSM – Services, System Architecture, Radio Interfaces, Protocols, Localization, Calling, Handover, Security, New Data Services, GPRS, CSHSD, DECT.
Wireless communication is the transfer of information between two or more points that are not connected by an electrical conductor.
The most common wireless technologies use radio
UNIT V MOBILE PLATFORMS AND APPLICATIONS
Mobile Device Operating Systems – Special Constrains & Requirements – Commercial Mobile Operating Systems – Software Development Kit: iOS, Android, BlackBerry, Windows Phone – M-Commerce – Structure – Pros & Cons – Mobile Payment System – Security Issues.
Mobile Bootcamp Presentation: Mobile Application Development PlatformsWilfred Mutua Mworia
A broad presentation on the various mobile application development platforms that exist. From programming for low end devices, at the SMS and SIM card level to Smartphone platforms
American Megatrends (AMI) Embedded software company focused on Embedded OS porting and Validation Services for the “Platform bring-up” and this moment we are aggressively pushing our services to enable customers with our Embedded OS Porting and Validation Services for the various Embedded-OS-es they need support for.
I would appreciate if you could help us accelerate our services by referring some of your requirement which will need our services.
Our experience in the Embedded Devices :
(1) MeeGo, Chrome OS, WinCE 6.0 & Embedded Linux, Home Server Porting and Validation Services for “Intel’s PineView Platform”.
(2) Windows* 7 Embedded Standard, Windows* XP Embedded, Meego, Android, Chromium Porting and Validation Services for “Intel’s Cougar Point Platform”.
(3) Driver Development for USB, Ethernet, PCI, PCI-X, RAID, Modem & Network Interface Cards
(4) UEFI compliant BIOS/Boot loader for the ARM Platform
(5) Linux and Windows Driver (2000, XP, Vista)Development Services
(6) Firmware Development Services (ARM, MIPS, TI OMAP, Xilinx…………….)
(7) Android Porting and Application Development for Mobile & Embedded Devices
(8) PC and Server Diagnostics for UEFI and Legacy environment (http://www.amiindia.co.in/diagnostic.html )
(9) Embedded XP (XPe) Development Services
(10) WinCE / Windows Mobile Embedded & Applications Software Development Services
Services specific to the computing domain:
(2) Pre-boot Applications
(3) Option ROM Customisation & Development
(4) IPMI, Service Processor and Remote Management (http://www.ami.com/serviceprocessors/)
(5) Extense on Custom Drivers in Windows and Linux.
American Megatrends
Email.: sunilp@amiindia.co.in
Mobile.: +91 96000 10071
Tel.: +91 44 66540922 Extn: 112
MODULE III Parallel Processors and Memory Organization 15 Hours
Parallel Processors: Introduction to parallel processors, Concurrent access to memory and cache
coherency. Introduction to multicore architecture. Memory system design: semiconductor memory
technologies, memory organization. Memory interleaving, concept of hierarchical memory
organization, cache memory, cache size vs. block size, mapping functions, replacement
algorithms, write policies.
Case Study: Instruction sets of some common CPUs - Design of a simple hypothetical CPU- A
sequential Y86-64 design-Sun Ultra SPARC II pipeline structure
MODULE II Control unit, I/O systems and Pipelining 15 Hours
CPU control unit design: Hardwired and micro-programmed design approaches, Peripheral
devices and their characteristics: Input-output subsystems, I/O device interface, I/O transfersprogram controlled, interrupt driven and DMA, privileged and non-privileged instructions, software
interrupts and exceptions. Programs and processes-role of interrupts in process state transitions,
I/O device interfaces - SCII, USB. Basic concepts of pipelining, throughput and speedup, pipeline
hazards.
Functional Blocks of a Computer: Functional blocks and its operations. Instruction set architecture of a CPU - registers, instruction execution cycle, Data path, RTL interpretation of
instructions, instruction set. Performance metrics. Addressing modes. Data Representation:
Signed number representation, fixed and floating point representations, character representation.
Computer arithmetic - integer addition and subtraction, ripple carry adder, carry look-ahead
adder, etc. multiplication - shift-and add, Booth multiplier, carry save multiplier, etc. Division
restoring and non-restoring techniques, floating point arithmetic.
Module II - Distributed objects and file systems:
Introduction - Communication between distributed objects - Remote procedure call - Events and notifications - case study - Operating system support - introduction - operating system layer - protection - process and threads - communication and invocation - architecture - Introduction to DFS - File service architecture - Sun network file system - Andrew file system - Enhancements and future developments.
Module 2 - Distributed Objects and File Systems
Introduction - Communication between distributed objects - Remote procedure call - Events and notifications - case study - Operating system support - introduction - operating system layer - protection - process and threads - communication and invocation - architecture - Introduction to DFS - File service architecture - Sun network file system - Andrew file system - Enhancements and future developments.
Module I
Introduction to Distributed systems - Examples of distributed systems, resource sharing and the web, challenges - System model - introduction - architectural models - fundamental models - Introduction to inter-process communications - API for Internet protocol - external data.
Module I
Introduction to Distributed systems - Examples of distributed systems, resource sharing and the web, challenges - System model - introduction - architectural models - fundamental models - Introduction to inter-process communications - API for Internet protocol - external data.
Module 6: IP and System Security
IP security overview-IP security policy-Encapsulating Security payload-intruders-intrusion detectionvirus/worms-countermeasure-need for firewalls-firewall characteristics-types of fire
Module 4: Key Management and User Authentication
X.509 certificates- Public Key infrastructure-remote user authentication principles-remote user
authentication using symmetric and asymmetric encryption-Kerberos V5
Module 1: Introduction to Cryptography and Symmetric Key Ciphers
Computer Security Concepts - OSI Security Architecture -Security Attacks - Services, Mechanisms -
Symmetric Cipher Model - Traditional Block Cipher Structure - The Data Encryption Standard -The Strength of DES - Advanced Encryption Standard.
Module 6
Advanced Networking
Security problems with internet architecture, Introduction to Software defined networking, Working of SDN, SDN in data centre, SDN applications, Data centre networking, IoT.
Module 6: Standards for Information Security Management
Information Security Management Systems (ISMS) - ISO 27001 - Framing Security Policy of
Organization- Committees- Security Forum, Core Committee, Custodian and Users, Business
Continuity Process Team & Procedure- Information Security Auditing Process. IT Security Incidents
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...ssuser7dcef0
Power plants release a large amount of water vapor into the
atmosphere through the stack. The flue gas can be a potential
source for obtaining much needed cooling water for a power
plant. If a power plant could recover and reuse a portion of this
moisture, it could reduce its total cooling water intake
requirement. One of the most practical way to recover water
from flue gas is to use a condensing heat exchanger. The power
plant could also recover latent heat due to condensation as well
as sensible heat due to lowering the flue gas exit temperature.
Additionally, harmful acids released from the stack can be
reduced in a condensing heat exchanger by acid condensation. reduced in a condensing heat exchanger by acid condensation.
Condensation of vapors in flue gas is a complicated
phenomenon since heat and mass transfer of water vapor and
various acids simultaneously occur in the presence of noncondensable
gases such as nitrogen and oxygen. Design of a
condenser depends on the knowledge and understanding of the
heat and mass transfer processes. A computer program for
numerical simulations of water (H2O) and sulfuric acid (H2SO4)
condensation in a flue gas condensing heat exchanger was
developed using MATLAB. Governing equations based on
mass and energy balances for the system were derived to
predict variables such as flue gas exit temperature, cooling
water outlet temperature, mole fraction and condensation rates
of water and sulfuric acid vapors. The equations were solved
using an iterative solution technique with calculations of heat
and mass transfer coefficients and physical properties.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Fundamentals of Electric Drives and its applications.pptx
CS8601 MOBILE COMPUTING
1. CS8601 MOBILE COMPUTING
UNIT – V
Dr.A.Kathirvel, Professor and Head, Dept of CSE
Misrimal Navajee Munoth Jain Engineering College, Chennai
2. Unit - V
MOBILE PLATFORMS &APPLICATIONS
Mobile Device Operating Systems – Special
Constraints & Requirements – Commercial Mobile
Operating Systems – Software Development Kit:
iOS, Android, BlackBerry, Windows Phone –
MCommerce – Structure – Pros & Cons – Mobile
Payment System – Security Issues
TEXT BOOKS:Jochen Schiller, Mobile Communications, PHI, Second Edn, 2003.
2
3. Synopsis
❑Mobile Device Operating Systems
❑Mobile Operating System Structure
❑JAVAME Platform
❑Special Constrains & Requirements
❑Commercial Mobile Operating Systems
❑Windows Mobile
❑Palm OS
❑Symbian OS
❑iOS
❑Android
❑Blackberry Operating system
3
4. Synopsis
❑Software Development Kit
❑M- Commerce
❑Applications of M- Commerce
❑Structure of M- Commerce
❑Pros and cons of M- Commerce
❑Mobile Payment Systems
❑Security issues
4
5. Mobile Device Operating Systems
❑ A mobile operating system, also called a mobile OS, is an
operating system that is specifically designed to run on mobile
devices such as mobile phones, smartphones, PDAs, tablet
computers and other handheld devices.
❑ The mobile operating system is the software platform on top of
which other programs, called application programs, can run on
mobile devices.
❑ Managing Resources: The resources that are managed by the
operating system include processor, memory, files, and various
types of attached devices such as camera, speaker, keyboard and
screen.
❑ Interface: interactive interface between devices and networks.
Control, data and voice communication with BS using different
types of protocols.
5
6. Mobile Device Operating Systems
A mobile OS is a software platform on top of which other
programs called application programs, can run on mobile
devices such as PDA, cellular phones, smart phone and etc.
6
Applications
OS Libraries
Device Operating System Base, Kernel
Low-Level Hardware, Manufacturer DeviceDrivers
7. Mobile Operating System
❑ Features
❑Multitasking
❑Scheduling
❑MemoryAllocation
❑File System Interface
❑Keypad Interface
❑I/O Interface
❑Protection and Security
❑Multimedia features
7
8. Java ME Platform
❑J2ME platform is a set of technologies,
specifications and libraries developed for small
devices like mobile phones, pagers, and
personal organizers.
❑Java ME was designed by Sun Microsystems. It
is licensed under GNU General Public License
❑Configuration: it defines a minimum platform
including the java language, virtual machine
features and minimum class libraries for a
grouping of devices. E.g. CLDC
8
9. Java ME Architecture
❑ Profile: it supports higher-level services common to a more specific class of
devices. A profile builds on a configuration but adds more specific APIs to
make a complete environment for building applications. E.g. MIDP
❑ Java ME platforms are composed of the following elements:
Application
Profile
Optional
Packages
Vendor
specific
classes - OEM
Configuration
Native Operating System
Device/ Hardware
9
10. Java ME Platform
❑ It includes two kinds of platforms:
❑High-end platform for high-end consumer devices. E.g. TV set-
top boxes, Internet TVs, auto-mobile navigation systems
❑Low-end platform for low-end consumer
devices. E.g. cell
phones, and pagers
Platforms Device Characteristics
High-End
consumer
devices
❑ a large range of user interface capabilities
❑ total memory budgets starting from about two to four MB
❑ persistent, high-bandwidth network connections, often using
TCP/IP
Low-end
consumer
devices
❑ simple user interfaces
❑ minimum memory budgets starting from about 128–256 KB
❑ low bandwidth, intermittent network connections that is often
not based on the TCP/IP protocol suite.
❑ most of these devices are battery-operated
10
11. Commercial Mobile Operating Systems
❑Windows Mobile
❑Palm OS
❑Symbian OS
❑iOS
❑Android
❑Blackberry Operating system
11
12. Windows Mobile OS
❑Windows Mobile is a compact operating system designed
for mobile devices and based on Microsoft Win32.
❑It provides ultimate interoperability. Users with various
requirements are able to manipulate their data.
❑Windows CE (Compact Edtion) - designed specifically for
handheld devices, based on Win32 API.
❑PDA (personal digital assistant), palmtop computer,
PocketPC were original intended platform for the Windows
Mobile OS.
❑For devices without mobile phone capabilities, and those
that included mobile phone capabilities
12
13. Family of Windows Mobile OS
❑ 1996 – Windows CE 1.0
❑ 1997 – Windows CE 2.0 (ATM, games consoles, Handheld PC's,
kitchen utensils)
❑ 2000 - Windows CE 3.0 - Pocket PC 2000 - (became the os of
choice on many Pocket PCs, looked and worked like Windows
98, no phone feature)
❑ 2001 - CE 3.0 - Smartphone 2002– used for Pocket PC phones
and Smartphones, UI reflect the new Windows XP
❑ 2003 – Windws Mobile 2003 (Windows CE 4.2) - first release
under the Windows Mobile banner - name changed form
PocketPC to Windows Mobile
❑ 2005 - WM5 (CE5.0) - new standard API created for a simplified
programming of 3D apps and games with Direct3Dmobile. It use
.Net Compact Framework environment
13
14. Family of Windows Mobile OS
❑ 2007 – WM6 (CE 5.2) – (also
year of introducing iPhone)
similar in design to the Vista,
works much like WM5, but
with much better stability
❑ 2008 – WM 6.1 – (year of
releasing Android)
❑ 2009 –
scrollable
WM6.5,
labels,
vertically
Windows
Marketplace announced
❑ Feb 2010 – WM6.5.3, was
first
6.5.3
officially
Windows
announced as
Phone
smartphone
14
15. Palm OS
❑Palm OS is an embedded operating system
designed for ease of use with a touch
screen-based graphical user interface.
❑It has been implemented on a wide variety
of mobile devices such as smart phones,
barcode readers, and GPS devices.
❑It is run on Arm architecture-based
It isprocessors. designed as a 32-bit
architecture.
15
16. Palm OS
❑The key features of Palm OS
❑A single-tasking OS:
❑Palm OS Garnet (5.x) uses a kernel developed at
Palm, but it does not expose tasks or threads to
user applications. In fact, it is built with a set of
threads that can not be changed at runtime.
❑Palm OS Cobalt (6.0 or higher) does support
multiple threads but does not support creating
additional processes by user applications.
16
17. Palm OS
❑Palm OS has a preemptive multitasking kernel
that provides basic tasks but it does not expose
this feature to user applications.
❑Memory Management: The Memory, RAM
and ROM, for each Palm resides on a memory
module known as card. In other words, each
memory card contains RAM, ROM or both.
Palms can have no card, one card or multiple
cards.
❑Handwriting recognition input called Graffiti 2
17
18. Palm OS
❑Expansion support: This capability not only
augments the memory and I/O , but also it
facilitates data interchanges with other Palm
devices and with other non-Palm devices
such as digital cameras, and digital audio
players.
❑HotSync technology for synchronization
with PC computers
❑Sound playback and record capabilities
❑TCP/IP network access
18
19. Palm OS
❑Support of serial port, USB,
Infrared, Bluetooth and Wi-
Fi connections
❑Defined standard data
format for PIM (Personal
Information Management)
applications to store
calendar, address, task and
note entries, accessible by
third-party applications
19
20. Symbian OS
❑Symbian OS is 32 bit, little-endian
system, running on
flavors of ARM
operating
different
architecture
❑It is a multitasking operating system and very less
dependence on peripherals.
❑Kernel runs in the privileged mode and exports its
service to user applications via user libraries.
20
21. Symbian OS
❑User libraries include networking,
communication, I/O interfaces and etc.
❑Access to these services
and resources is coordinated through
a client-server framework.
❑Clients use the service
APIs exposed by the server
to communicate with the server.
❑The client-server communication is conducted
by the kernel. 21
22. Symbian OS
The following demonstrates the Symbian OS
architecture
Symbian OS Libraries
KVM
Application Engines
Servers
Symbian OS Base- Kernel
Hardware
22
23. Symbian OS Features
❑ Real-time: it has a real-time, multithreaded kernel.
❑ Data Caging
❑it allows applications to have their own private data
partition. This feature allows for applications to guarantee a
secure data store. It can be used for e-commerce
applications, location aware applications and etc.
❑ Platform Security
❑Symbian provides a security mechanism against malware. It
allows sensitive operations can be accessed by applications
which have been certified by a signing authority. In addition,
it supports full encryption and certificate management,
secure protocols (HTTPS, TLS and SSL) and WIM
framework.
23
24. Symbian OS Features
❑Multimedia
❑it supports audio, video recording, playback and streaming,
and Image conversion.
❑Internationalization support
❑it supports Unicode standard.
❑Fully object-oriented and component- based
❑Optimized memory management
❑Client-server architecture
❑it provides simple and high-efficient inter process
communication. This feature also eases porting of code
written for other platforms to Symbian OS.
24
25. Symbian OS Features
❑A Hardware Abstraction Layer (HAL)
❑This layer provides a consistent
interface to hardware and supports device-
independency
❑Kernel offers hard real-time guarantees to
kernel and user mode threads.
25
26. iPhone OS
BSD File Systems
I/O systems
Networking
components
Based on Mach
kernel and Darwin
Core as Mac OS X
26
27. iOS
Apple’s Proprietary Mobile
❑iOS is Apple’s proprietary mobile
operating system initially developed for
iPhone and now extended to iPAD, iPod
Touch and Apple TV.
❑Initially known as “iPhone OS”, in
June 2010 renamed “iOS”.
❑iOS is not enabled for cross licensing,
it can only be used on Apple’s devices.
27
28. iOS
Apple’s Proprietary Mobile OS
❑The user interface of iOS is based on
the concept of usage of multi touch
gestures.
❑iOS is a Unix based OS.
❑iOS uses four abstraction layers,
namely: the Core OS layer, the Core
Services layer, the Media layer, and the
Cocoa Touch layer.
❑Apple’s App store contains close to
550,000 applications as of March 2012. 28
29. iOS
Apple’s Proprietary Mobile OS
❑It is estimated that the APPs are
downloaded 25B times till now.
❑First version of iOS is released in 2007
with the mane ‘OS X’ and then in 2008
the first beta version of ‘iPhone OS’ is
released.
❑In 2007 September Apple released first
iPod Touch that also used this OS.
❑In 2010 iPad is released that has a
bigger screen than the iPod and iPhone.29
30. iOS
❑Cisco owns the trademark for ‘IOS’;
Apple licenses the usage of ‘iOS’ from
Cisco.
30
31. Mac OS X Architecture
Multitasking
Pre-emptive, i.e. act of
taking the control of
operating system from
one task and giving it
to another task.
Real-time
Strong memory
protection
Each application has
4GB space
31
32. Android
❑Google owns a trademark for Android – Google’s
permission is necessary to use Android’s
trademark
❑In 2011, Microsoft announced it has made an
agreement with Android device manufacturers
(including Samsung and HTC) to collect fees
from them.
❑Android’s source code is available under Apache
License version 2.0. The Linux kernel changes are
available under the GNU General Public License
version 2.
32
33. Android OS
❑Android is Linux based mobile OS for mobile
devices such as Tablets and Smartphones.
❑In 2005 Google acquired the initial developer of
the OS, Android Inc.
❑Then in 2007 Google formed an Open Handset
Alliance with 86 hardware, software and telecom
companies.
❑This alliance developed and announced Android
as an open source mobile OS under the Apache
License.
33
34. Android
❑Now, this OS is being used by multiple device
manufacturers (Samsung, Motorola, HTC, LG,
Sony etc) in their handsets
❑Android developer community has large
number of developers preparing APPs in Java
environment and the APP store ‘Google Play’
now has close to 450,000 APPs, among which
few are free and others are paid.
❑It is estimated that, as of December 2011,
almost 10B APPs were downloaded.
34
35. Android
❑It is estimated that as of February 2012 there
are over 300M Android devices and
approximately 850,000 Android devices are
activated every day.
❑The earliest recognizable Android version is
2.3 Gingerbread, which supports SIP and NFC.
❑In 2011 Android Honeycomb version (3.1 and
3.2) are released with focus on Tablets. This is
mainly focused on large screen devices.
35
36. Android
❑Handset
handset
layouts – compatible with different
designs such as larger, VGA, 2D
graphics library, 3D graphics library based.
❑Storage– a lightweight relational
database, is used for data storage
❑Connectivit: GSM/EDGE, IDEN,
CDMA, EV- DO,UMTS,Bluetooth,WiFi,
LTE, NFC &WiMAX❑Messaging – SMS, MMS, threaded text
messaging and Android Cloud To Device
Messaging (C2DM)
36
37. Android
❑Google faced many patent lawsuits against
Android such as by Oracle in 2006 that included
patents US5966702 and US6910205.
Distributed under
Apache License
Created by Android Inc.,
as part of Google in
2005
Development is Open
Source; source code is
publicly available
Programmers are
welcome to contribute
via Software
Development Kit (SDK)
Linux Kernel
Java-based
application
framework
37
38. Blackberry OS
❑The first operating system launched by
Research in Motion(RIM -the company
behind BlackBerry)
❑Operating system structure
consists of following: -
❑GUI (Graphic User Interface).
❑Command processor.
❑Kernel.
mainly
38
40. Blackberry OS Features
❑ Gestures
❑ Multi-tasking
❑ Blackberry Hub
❑ Blackberry Balance
❑ Keyboard
❑ Voice Control
40
41. Key Terms in Blackberry OS
❑Process Management
❑Memory Management
❑Types of Kernel – Microkernel
41
42. Advantages of Blackberry OS
❑It provides good security for data.
❑It avoids collusion of personal and business data.
❑Content promotion: Dedicated content channels
and feature banners that provide prime real estate to
help distribute your app to the right users.
❑App discovery: Universal search, top lists, social
sharing, reviews, and ratings help users find the
right app.
❑The Games app (in combination with Score loop):
A specialized portal for gaming allowing
multiplayer, social connections.
42
43. Disadvantages of Blackberry OS
❑New operating system was introduced too late
into the ever-growing market.
❑Yet to have as many apps available for
purchase or download compared to other phone
in the market.
❑Consumers have switched over to other devices
made by Apple or Android.
❑Swipe vs. home button. Once an application is
opened, you have to swipe up to return to the
main display.
43
44. Android Software Development Kit
❑A software development kit that enables developers
to create applications for the Android platform.
❑The Android SDK includes sample projects with
source code, development tools, an emulator, and
required libraries to build Android applications.
❑Applications are written using the Java
programming language and run on Dalvik, a
custom virtual machine designed for embedded use
which runs on top of a Linux kernel.
44
45. Android SDK Environment
❑The Android Development Tools (ADT) plugin for
Eclipse adds powerful extensions to the Eclipse
integrated development environment. It allows you to
create and debug Android applications easier and
faster.
❑Advantages:
❑It gives you access to other Android development tools from
inside the Eclipse IDE. For example, ADT lets you access
the many capabilities of the DDMS tool: take screenshots,
manage port‐forwarding, set breakpoints, and view thread
and process information directly from Eclipse.
45
46. Android SDK Environment Advantages
❑It provides a New Project Wizard, which helps you
quickly create and set up all of the basic files you'll
need for a new Android application.
❑It automates and simplifies the process of building
your Android application.
❑It provides an Android code editor that helps you write
valid XML for your Android manifest and resource
files.
❑ It will export your project into a signed APK,
which can be distributed to users.
46
47. Creation of Android SDK Environment
❑Download and Install the Android
SDK and test the Emulator
❑Install Java
❑Install Eclipse
❑Install the ADT Plug-in in Eclipse
❑Create Hello World Application
47
48. Android Application Components
Components Description
Activities They dictate the UI and handle the user
interaction to the smart phone screen
Services They handle background processing
associated with an application.
Broadcast
Receivers
They handle communication between
Android OS and applications.
Content
Providers
They handle data and database
management issues.
48
49. Android Application Components
Components Description
Fragments Represents a portion of user interface in an
Activity.
Views UI elements that are drawn on-screen including
buttons, lists forms etc.
Layouts View hierarchies that control screen format and
appearance of the views.
Intents Messages wiring components together.
Resources External elements, such as strings, constants and
drawable pictures.
Manifest Configuration file for the application.
49
51. Advantages of Android
❑ Android is open
❑ Multitasking
❑Easy access to the Android AppMarket
❑Can install a modified ROM
❑Phone options are diverse
❑Ease of notification
❑Widget
51
52. M- Commerce
❑M-commerce (mobile commerce) is the buying and
selling of
handheld
goods
devices
and services through wireless
such as cellular telephone and
personal digital assistants (PDAs). Known as next-
generation e-commerce, m-commerce enables users to
access the Internet without needing to find a place to
plug in.
❑The emerging technology behind m-commerce,
which is based on the Wireless Application Protocol
(WAP), has made far greater strides in Europe, where
mobile devices equipped with Web-ready micro-
browsers are much more common than in the United
States. 52
53. M- Commerce
❑M-commerce can be seen as means of selling and
purchasing of goods and services using mobile
communication devices such as cellular phones,
PDA s etc, which are able to connect to the Internet
through wireless channels and interact with e-
commerce systems
❑M-commerce can be referred to as an act of carrying-
out transactions using a wireless device
❑It is understood as a data connection that results in
the transfer of value in exchange for information,
services or goods
53
54. M- Commerce
❑ It can also bye seen as a natural extension of e-commerce that
allows users to interact with other users or businesses in a
wireless mode, anytime/anywhere.
❑ It can be perceived to be any electronic transaction or
information interaction conducted using a mobile device and
mobile network thereby guaranteeing customers virtual and
physical mobility, which leads to the transfer of real or
perceived value in exchange for personalized, location-based
information, services, or goods.
❑ M-commerce can also be seen and referred to as wireless
commerce.
❑ It is any transaction with a monetary value that is conducted
via a mobile telecommunications network.
54
55. M- Commerce
❑M-commerce can also be seen and referred to
as wireless commerce.
❑It is any transaction with a monetary value
that is conducted via a mobile
telecommunications network .
❑An ability to access an IT-System whilst
moving from one place to the other using a
mobile device and carry out transactions and
transfer information wherever and whenever
needed to.
55
56. Mobile commerce from the
Customer‘s point of view
❑The customer wants to access information, goods
and services any time and in any place on his
mobile device.
❑It can use his mobile device to purchase tickets
for events or public transport, pay for parking,
download content and even order books and CDs.
❑It should be offered appropriate payment
methods. They can range from secure mobile
micropayment to service subscriptions.
56
57. Mobile commerce from the
Provider‘s point of view
❑The future development of the mobile telecommunication
sector is heading more and more towards value-added
services. Analysts forecast that soon half of mobile operators
revenue will be earned through mobile commerce.
❑Consequently operators as well as third party providers will
focus on value-added-services. To enable mobile services,
providers with expertise on different sectors will have to
cooperate.
❑Innovative service scenarios will be needed that meet the
customer‘s expectations and business models that satisfy all
partners involved.
57
58. M-Commerce Terminology
❑Generations
❑1G: 1979-1992 wireless technology
❑2G: current wireless technology;
mainly accommodates text
❑2.5G: interim technology accommodates graphics
3rd❑3G: generation technology (2001-2005)
supports rich media (video clips)
❑4G: will provide faster multimedia display
(2006- 2010)
58
59. Terminology and Standards
❑GPS: Satellite-based Global Positioning System
❑PDA: Personal Digital Assistant—
handheld wireless computer
❑SMS: Short Message Service
❑EMS: Enhanced Messaging Service
❑MMS: Multimedia Messaging Service
❑WAP: Wireless Application Protocol
❑Smart phones—Internet-enabled cell
phones with attached applications
59
61. Pros of M- Commerce
❑M-commerce is creating entirely new service
opportunities - such as payment, banking, and
ticketing transactions - using a wireless device .
❑M-commerce allows one-to-one communication
between the business and the client and also
business-to-business communication .
❑M-commerce is leading to expectations of
revolutionary changes in business and markets.
❑M-commerce widens the Internet business
because of the wide coverage by mobile networks.
61
62. Cons of M- Commerce
❑Cell phones have small screen displays and that might be
irritating to someone who has the experience of the
desktop environment.
❑Another issue that can be seen as a disadvantage to m-
commerce is the limitation in bandwidth. The GSM
technology has the data rate of 9.3 Kbps and the current
3-G technology offers a data rate goes up to 2 Mbps.
❑Mobile devices use batteries as their form of power
supply . Normally, power for a cell phone battery lasts
up to 2-3 days depending on how new the battery is. It
then gives the owner the burden of having to remember
to recharge it every now and then.
62
63. Cons of M- Commerce
❑Mobile devices do not have enough processing
power and the developer has to be careful about
loading an application that requires too much
processing. Also, mobile devices do not have
enough storage space. The developer has to be
also concerned about the size of his application in
the due process of development.
❑Mobile appliances are quite vulnerable to theft,
loss and corruptibility. Security solutions for
mobile appliances must, therefore, provide for
security under these challenging scenarios.
63
64. Mobile Payment System
❑Mobile Payment can be offered as a stand-alone
service.
❑Mobile Payment could also be an important
enabling service for other m-commerce services (e.g.
mobile ticketing, shopping, gambling…)
❑It could improve user acceptance by making the
services more secure and user-friendly.
❑In many cases offering mobile payment methods
is the only chance the service providers have to
gain revenue from an m-commerce service.
64
65. Mobile Payment System (cont.)
❑the consumer must be informed of:
❑what is being bought, and
❑how much to pay
❑options to pay
❑the payment must be made
❑payments must be traceable.
65
66. Mobile Payment System (cont.)
❑Customer requirements:
❑a larger selection of merchants with whom they can trade
❑a more consistent payment interface when making the
purchase with multiple payment schemes, like:
❑Credit Card payment
❑Bank Account/Debit Card Payment
❑ Merchant benefits:
❑brands to offer a wider variety of payment
❑Easy-to-use payment interface development
❑ Bank and financial institution benefits
❑to offer a consistent payment interface to consumer and
merchants
66
67. Payment via Internet Payment Provider
SSL tunnel
MeP
GSM Security
SMS-
C
User
WAP
GW/Proxy
Browsing (negotiation)
Merchant
Mobile Wallet
CC/Bank
IPP
67
68. Payment via integrated Payment Server
WAP
GW/Proxy
ISO8583 Based
CP
GSM Security
SMS-
C
User
Browsing (negotiation)
Mobile
Commerce
Server
CC/Bank
Merchant
Mobile Wallet
Voice PrePaid
VPP IF
SSL tunnel
68
69. Security in M-Commerce
Operator centric model
CA
Bank (FI)
Merchant
Content
Aggregation
Internet
SAT GW
WAP GW
Mobile
Network
Mobile Bank
WAP1.1(+SIM where avail.)
WAP1.2(WIM)
(SIM)
Mobile e-Commerce
Server
Security and
Payment
Mobile IP
Service
Provider
Network
69
71. Comparison between Internet and
WAP technologies
HTML
JavaScript
HTTP
TLS - SSL
TCP/IP
UDP/IP
Wireless Application Protocol
Wireless Application
Environment (WAE)
Session Layer (WSP)
Security Layer (WTLS)
Transport Layer (WDP)
Other Services and
Applications
Transaction Layer (WTP)
IS-136 CDPD PDC-P Etc..
Bearers:
SMS USSD CSD CDMA
71
72. WAP Risks
❑WAP Gap
❑Claim: WTLS protects WAP as SSL
protects HTTP
❑Problem: In the process of translating one
protocol to another, information is
decrypted and re-encrypted
❑ Recall the WAP Architecture
❑Solution: Doing decryption/re-encryption
in the same process on the WAP gateway
❑Wireless gateways as single point of failure
72
73. Platform Risks
❑Without a secure OS, achieving security on
mobile devices is almost impossible
❑Learned lessons:
❑Memory protection of processes
❑Protected kernel rings
❑File access control
❑Authentication of principles to resources
❑Differentiated user and process privileges
❑Sandboxes for untrusted code
❑Biometric authentication
73
74. Risks of WML Script
❑ Lack of Security Model
❑ Does not differentiate trusted local code from untrusted code
downloaded from the Internet. So, there is no access control!!
❑ WML Script is not type-safe.
❑ Scripts can be scheduled to be
pushed to the client device without the user’s
knowledge
❑ Does not prevent access to persistent storage
❑ Possible attacks:
❑Theft or damage of personal information
❑Abusing user’s authentication information
❑Maliciously offloading money saved on smart cards
74
75. Bluetooth Security
❑Bluetooth provides security between any two Bluetooth
devices for user protection and secrecy
❑mutual and unidirectional authentication
❑encrypts data between two devices
❑Session key generation
❑configurable encryption key length
❑keys can be changed at any time during a connection
❑Authorization (whether device X is allowed
to have access service Y)
❑Trusted Device: The device has been previously
authenticated, a link key is stored and the device is
marked as “trusted” in the Device Database.
75
76. Bluetooth Security (Cont..)
❑Untrusted Device: The device has been
previously authenticated, link key is stored
but the device is not marked as “trusted” in
the Device Database
❑Unknown Device: No security
information is available for this device.
This is also an untrusted device.
❑automatic output power adaptation to
reduce the range exactly to requirement,
makes the system extremely difficult to
eavesdrop 76
77. New Security Risks in M-Commerce
❑Abuse of cooperative nature of ad-hoc networks:
An adversary that compromises one node can
disseminate false routing information.
❑Malicious domains: A single malicious domain
can compromise devices by downloading malicious
code
❑Roaming: Users roam among non-trustworthy
domains
77
78. New Security Risks (cont.)
❑Launching attacks from mobile devices
❑With mobility, it is difficult to identify attackers
❑Loss or theft of device
❑More private information than desktop computers
❑Security keys might have been saved on the device
❑Access to corporate systems
❑Bluetooth provides security at the
lower layers only: a stolen device can still be
trusted
78
79. New Security Risks (cont.)
❑Problems with Wireless Transport Layer Security (WTLS)
protocol
❑Security Classes:
❑ No certificates
❑ Server only certificate (Most Common)
❑ Server and client Certificates
❑Re-establishing connection without re-authentication
❑Requests can be redirected to malicious sites
79
80. New Privacy Risks
❑Monitoring user’s private information
❑Offline telemarketing
❑Who is going to read the “legal jargon”
❑Value added services based on
location awareness (Location-Based
Services)
80