Mobile Device Operating Systems – Special Constrains & Requirements – Commercial Mobile Operating Systems – Software Development Kit: iOS, Android, BlackBerry, Windows Phone – M-Commerce – Structure – Pros & Cons – Mobile Payment System – Security Issues.
This ppt define the basic concepts of mobile computing. It is the first part of mobile computing.
It defines the following terms
Introduction to mobile computing
Generations of mobile computing
Cellular concepts
Signalling, modulation and Demodulation
Spread Spectrum
Frequency Reuse
Multiple access schemes
GSM
GPRS
CDMA
UNIT V MOBILE PLATFORMS AND APPLICATIONS
Mobile Device Operating Systems – Special Constrains & Requirements – Commercial Mobile Operating Systems – Software Development Kit: iOS, Android, BlackBerry, Windows Phone – M-Commerce – Structure – Pros & Cons – Mobile Payment System – Security Issues.
This ppt define the basic concepts of mobile computing. It is the first part of mobile computing.
It defines the following terms
Introduction to mobile computing
Generations of mobile computing
Cellular concepts
Signalling, modulation and Demodulation
Spread Spectrum
Frequency Reuse
Multiple access schemes
GSM
GPRS
CDMA
UNIT V MOBILE PLATFORMS AND APPLICATIONS
Mobile Device Operating Systems – Special Constrains & Requirements – Commercial Mobile Operating Systems – Software Development Kit: iOS, Android, BlackBerry, Windows Phone – M-Commerce – Structure – Pros & Cons – Mobile Payment System – Security Issues.
Client-Centric Consistency
Provide guarantees about ordering of operations only for a single client, i.e.
Effects of an operations depend on the client performing it
Effects also depend on the history of client’s operations
Applied only when requested by the client
No guarantees concerning concurrent accesses by different clients
Assumption:
Clients can access different replicas, e.g. mobile users
IT6601 MOBILE COMPUTING UNITI
INTRODUCTION
Mobile Computing – Mobile Computing Vs wireless Networking – Mobile Computing Applications – Characteristics of Mobile computing – Structure of Mobile Computing Application. MAC Protocols – Wireless MAC Issues – Fixed Assignment Schemes – Random Assignment Schemes – Reservation Based Schemes.
Although the OSI reference model is universally recognized, the historical and technical open standard of the Internet is Transmission Control Protocol / Internet Protocol (TCP/IP).
The TCP/IP reference model and the TCP/IP protocol stack make data communication possible between any two computers, anywhere in the world, at nearly the speed of light.
The Network File System (NFS) is the most widely used network-based file system. NFS’s initial simple design and Sun Microsystems’ willingness to publicize the protocol and code samples to the community contributed to making NFS the most successful remote access file system. NFS implementations are available for numerous Unix systems, several Windows-based systems, and others.
UNIT II MOBILE INTERNET PROTOCOL AND TRANSPORT LAYER
Overview of Mobile IP – Features of Mobile IP – Key Mechanism in Mobile IP – route Optimization. Overview of TCP/IP – Architecture of TCP/IP- Adaptation of TCP Window – Improvement in TCP Performance.
Client-Centric Consistency
Provide guarantees about ordering of operations only for a single client, i.e.
Effects of an operations depend on the client performing it
Effects also depend on the history of client’s operations
Applied only when requested by the client
No guarantees concerning concurrent accesses by different clients
Assumption:
Clients can access different replicas, e.g. mobile users
IT6601 MOBILE COMPUTING UNITI
INTRODUCTION
Mobile Computing – Mobile Computing Vs wireless Networking – Mobile Computing Applications – Characteristics of Mobile computing – Structure of Mobile Computing Application. MAC Protocols – Wireless MAC Issues – Fixed Assignment Schemes – Random Assignment Schemes – Reservation Based Schemes.
Although the OSI reference model is universally recognized, the historical and technical open standard of the Internet is Transmission Control Protocol / Internet Protocol (TCP/IP).
The TCP/IP reference model and the TCP/IP protocol stack make data communication possible between any two computers, anywhere in the world, at nearly the speed of light.
The Network File System (NFS) is the most widely used network-based file system. NFS’s initial simple design and Sun Microsystems’ willingness to publicize the protocol and code samples to the community contributed to making NFS the most successful remote access file system. NFS implementations are available for numerous Unix systems, several Windows-based systems, and others.
UNIT II MOBILE INTERNET PROTOCOL AND TRANSPORT LAYER
Overview of Mobile IP – Features of Mobile IP – Key Mechanism in Mobile IP – route Optimization. Overview of TCP/IP – Architecture of TCP/IP- Adaptation of TCP Window – Improvement in TCP Performance.
MOBILE INTERNET PROTOCOL AND TRANSPORT LAYER
Overview of Mobile IP – Features of Mobile IP – Key Mechanism in Mobile IP – route Optimization. Overview of TCP/IP – Architecture of TCP/IP- Adaptation of TCP Window – Improvement in TCP Performance.
Cluster computing is a type of computing where a group of several computers are linked together, allowing the entire group of computers to behave as if it were a single entity. There are a wide variety of different reasons why people might use cluster computing for various computer tasks. It s also used to make sure that a computing system will always be available. It is unknown when this cluster computing concept was first developed, and several different organizations have claimed to have invented it.
UNIT V MOBILE PLATFORMS AND APPLICATIONS
Mobile Device Operating Systems – Special Constraints & Requirements – Commercial Mobile Operating Systems – Software Development Kit: iOS, Android, BlackBerry, Windows Phone – MCommerce – Structure – Pros & Cons – Mobile Payment System – Security Issues
MODULE III Parallel Processors and Memory Organization 15 Hours
Parallel Processors: Introduction to parallel processors, Concurrent access to memory and cache
coherency. Introduction to multicore architecture. Memory system design: semiconductor memory
technologies, memory organization. Memory interleaving, concept of hierarchical memory
organization, cache memory, cache size vs. block size, mapping functions, replacement
algorithms, write policies.
Case Study: Instruction sets of some common CPUs - Design of a simple hypothetical CPU- A
sequential Y86-64 design-Sun Ultra SPARC II pipeline structure
MODULE II Control unit, I/O systems and Pipelining 15 Hours
CPU control unit design: Hardwired and micro-programmed design approaches, Peripheral
devices and their characteristics: Input-output subsystems, I/O device interface, I/O transfersprogram controlled, interrupt driven and DMA, privileged and non-privileged instructions, software
interrupts and exceptions. Programs and processes-role of interrupts in process state transitions,
I/O device interfaces - SCII, USB. Basic concepts of pipelining, throughput and speedup, pipeline
hazards.
Functional Blocks of a Computer: Functional blocks and its operations. Instruction set architecture of a CPU - registers, instruction execution cycle, Data path, RTL interpretation of
instructions, instruction set. Performance metrics. Addressing modes. Data Representation:
Signed number representation, fixed and floating point representations, character representation.
Computer arithmetic - integer addition and subtraction, ripple carry adder, carry look-ahead
adder, etc. multiplication - shift-and add, Booth multiplier, carry save multiplier, etc. Division
restoring and non-restoring techniques, floating point arithmetic.
Module II - Distributed objects and file systems:
Introduction - Communication between distributed objects - Remote procedure call - Events and notifications - case study - Operating system support - introduction - operating system layer - protection - process and threads - communication and invocation - architecture - Introduction to DFS - File service architecture - Sun network file system - Andrew file system - Enhancements and future developments.
Module 2 - Distributed Objects and File Systems
Introduction - Communication between distributed objects - Remote procedure call - Events and notifications - case study - Operating system support - introduction - operating system layer - protection - process and threads - communication and invocation - architecture - Introduction to DFS - File service architecture - Sun network file system - Andrew file system - Enhancements and future developments.
Module I
Introduction to Distributed systems - Examples of distributed systems, resource sharing and the web, challenges - System model - introduction - architectural models - fundamental models - Introduction to inter-process communications - API for Internet protocol - external data.
Module I
Introduction to Distributed systems - Examples of distributed systems, resource sharing and the web, challenges - System model - introduction - architectural models - fundamental models - Introduction to inter-process communications - API for Internet protocol - external data.
Module 6: IP and System Security
IP security overview-IP security policy-Encapsulating Security payload-intruders-intrusion detectionvirus/worms-countermeasure-need for firewalls-firewall characteristics-types of fire
Module 4: Key Management and User Authentication
X.509 certificates- Public Key infrastructure-remote user authentication principles-remote user
authentication using symmetric and asymmetric encryption-Kerberos V5
Module 1: Introduction to Cryptography and Symmetric Key Ciphers
Computer Security Concepts - OSI Security Architecture -Security Attacks - Services, Mechanisms -
Symmetric Cipher Model - Traditional Block Cipher Structure - The Data Encryption Standard -The Strength of DES - Advanced Encryption Standard.
Module 6
Advanced Networking
Security problems with internet architecture, Introduction to Software defined networking, Working of SDN, SDN in data centre, SDN applications, Data centre networking, IoT.
Module 6: Standards for Information Security Management
Information Security Management Systems (ISMS) - ISO 27001 - Framing Security Policy of
Organization- Committees- Security Forum, Core Committee, Custodian and Users, Business
Continuity Process Team & Procedure- Information Security Auditing Process. IT Security Incidents
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
IT6601 MOBILE COMPUTING
1. IT6601 MOBILE COMPUTING
UNIT – V
Dr.A.Kathirvel, Professor and Head, Dept of IT
Anand Institute of Higher Technology, Chennai
1
2. Unit - V
MOBILE PLATFORMS AND APPLICATIONS
Mobile Device Operating Systems – Special Constrains &
Requirements – Commercial Mobile Operating Systems –
Software Development Kit: iOS, Android, BlackBerry,
Windows Phone – M- Commerce – Structure – Pros & Cons –
Mobile Payment System – Security Issues.
*Prasant Kumar Pattnaik, Rajib Mall, “Fundamentals of Mobile Computing”, PHI Learning Pvt. Ltd, New Delhi
2
3. Synopsis
Mobile Device Operating Systems
Mobile Operating System Structure
JAVA ME Platform
Special Constrains & Requirements
Commercial Mobile Operating Systems
Windows Mobile
Palm OS
Symbian OS
iOS
Android
Blackberry Operating system
3
4. Synopsis
Software Development Kit
M- Commerce
Applications of M- Commerce
Structure of M- Commerce
Pros and cons of M- Commerce
Mobile Payment Systems
Security issues
4
5. Mobile Device Operating Systems
A mobile operating system, also called a mobile OS, is an
operating system that is specifically designed to run on mobile
devices such as mobile phones, smartphones, PDAs, tablet
computers and other handheld devices.
The mobile operating system is the software platform on top of
which other programs, called application programs, can run on
mobile devices.
Managing Resources: The resources that are managed by the
operating system include processor, memory, files, and various
types of attached devices such as camera, speaker, keyboard
and screen.
Interface: interactive interface between devices and networks.
Control, data and voice communication with BS using
different types of protocols.
5
6. Mobile Device Operating Systems
A mobile OS is a software platform on top of which other
programs called application programs, can run on mobile
devices such as PDA, cellular phones, smart phone and etc.
6
Applications
OS Libraries
Device Operating System Base, Kernel
Low-Level Hardware, Manufacturer Device Drivers
7. Mobile Operating System
Features
Multitasking
Scheduling
Memory Allocation
File System Interface
Keypad Interface
I/O Interface
Protection and Security
Multimedia features
7
8. Java ME Platform
8
J2ME platform is a set of technologies,
specifications and libraries developed for small
devices like mobile phones, pagers, and
personal organizers.
Java ME was designed by Sun Microsystems. It
is licensed under GNU General Public License
Configuration: it defines a minimum platform
including the java language, virtual machine
features and minimum class libraries for a
grouping of devices. E.g. CLDC
9. Java ME Architecture
Profile: it supports higher-level services common to a more specific class of
devices. A profile builds on a configuration but adds more specific APIs to
make a complete environment for building applications. E.g. MIDP
Java ME platforms are composed of the following elements:
9
Application
Profile
Optional
Packages
Vendor
specific
classes - OEM
Configuration
Native Operating System
Device/ Hardware
10. Java ME Platform
It includes two kinds of platforms:
High-end platform for high-end consumer devices. E.g. TV set-
top boxes, Internet TVs, auto-mobile navigation systems
Low-end platform for low-end consumer devices. E.g. cell
phones, and pagers
10
Platforms Device Characteristics
High-End
consumer
devices
a large range of user interface capabilities
total memory budgets starting from about two to four MB
persistent, high-bandwidth network connections, often using
TCP/IP
Low-end
consumer
devices
simple user interfaces
minimum memory budgets starting from about 128–256 KB
low bandwidth, intermittent network connections that is often
not based on the TCP/IP protocol suite.
most of these devices are battery-operated
11. Commercial Mobile Operating Systems
Windows Mobile
Palm OS
Symbian OS
iOS
Android
Blackberry Operating system
11
12. Windows Mobile OS
12
Windows Mobile is a compact operating system designed
for mobile devices and based on Microsoft Win32.
It provides ultimate interoperability. Users with various
requirements are able to manipulate their data.
Windows CE (Compact Edtion) - designed specifically for
handheld devices, based on Win32 API.
PDA (personal digital assistant), palmtop computer,
PocketPC were original intended platform for the Windows
Mobile OS.
For devices without mobile phone capabilities, and those
that included mobile phone capabilities
13. Family of Windows Mobile OS
13
1996 – Windows CE 1.0
1997 – Windows CE 2.0 (ATM, games consoles, Handheld PC's,
kitchen utensils)
2000 - Windows CE 3.0 - Pocket PC 2000 - (became the os of
choice on many Pocket PCs, looked and worked like Windows
98, no phone feature)
2001 - CE 3.0 - Smartphone 2002– used for Pocket PC phones
and Smartphones, UI reflect the new Windows XP
2003 – Windws Mobile 2003 (Windows CE 4.2) - first release
under the Windows Mobile banner - name changed form
PocketPC to Windows Mobile
2005 - WM5 (CE5.0) - new standard API created for a simplified
programming of 3D apps and games with Direct3Dmobile. It use
.Net Compact Framework environment
14. Family of Windows Mobile OS
14
2007 – WM6 (CE 5.2) – (also
year of introducing iPhone)
similar in design to the Vista,
works much like WM5, but
with much better stability
2008 – WM 6.1 – (year of
releasing Android)
2009 – WM6.5, vertically
scrollable labels, Windows
Marketplace announced
Feb 2010 – WM6.5.3, was
officially announced as first
Windows Phone 6.5.3
smartphone
15. Palm OS
Palm OS is an embedded operating system
designed for ease of use with a touch
screen-based graphical user interface.
It has been implemented on a wide variety
of mobile devices such as smart phones,
barcode readers, and GPS devices.
It is run on Arm architecture-based
processors. It is designed as a 32-bit
architecture.
15
16. Palm OS
The key features of Palm OS
A single-tasking OS:
Palm OS Garnet (5.x) uses a kernel developed at
Palm, but it does not expose tasks or threads to
user applications. In fact, it is built with a set of
threads that can not be changed at runtime.
Palm OS Cobalt (6.0 or higher) does support
multiple threads but does not support creating
additional processes by user applications.
16
17. Palm OS
Palm OS has a preemptive multitasking kernel
that provides basic tasks but it does not
expose this feature to user applications.
Memory Management: The Memory, RAM
and ROM, for each Palm resides on a memory
module known as card. In other words, each
memory card contains RAM, ROM or both.
Palms can have no card, one card or multiple
cards.
Handwriting recognition input called Graffiti 2
17
18. Palm OS
Expansion support: This capability not only
augments the memory and I/O , but also it
facilitates data interchanges with other Palm
devices and with other non-Palm devices
such as digital cameras, and digital audio
players.
HotSync technology for synchronization
with PC computers
Sound playback and record capabilities
TCP/IP network access
18
19. Palm OS
Support of serial port, USB,
Infrared, Bluetooth and Wi-
Fi connections
Defined standard data
format for PIM (Personal
Information Management)
applications to store
calendar, address, task and
note entries, accessible by
third-party applications
19
20. Symbian OS
Symbian OS is 32 bit, little-endian
operating system, running on
different flavors of ARM
architecture
It is a multitasking operating
system and very less dependence
on peripherals.
20
Kernel runs in the privileged mode and exports its
service to user applications via user libraries.
21. Symbian OS
User libraries include networking,
communication, I/O interfaces and etc.
Access to these services and resources is
coordinated through a client-server framework.
Clients use the service APIs exposed by the
server to communicate with the server.
The client-server communication is conducted
by the kernel.
21
22. Symbian OS
The following demonstrates the Symbian OS
architecture
22
Symbian OS Libraries
Application Engines
KVM
Servers
Symbian OS Base- Kernel
Hardware
23. Symbian OS Features
Real-time: it has a real-time, multithreaded kernel.
Data Caging
it allows applications to have their own private data
partition. This feature allows for applications to guarantee a
secure data store. It can be used for e-commerce
applications, location aware applications and etc.
Platform Security
Symbian provides a security mechanism against malware. It
allows sensitive operations can be accessed by applications
which have been certified by a signing authority. In addition,
it supports full encryption and certificate management,
secure protocols (HTTPS, TLS and SSL) and WIM
framework.
23
24. Symbian OS Features
Multimedia
it supports audio, video recording, playback and streaming,
and Image conversion.
Internationalization support
it supports Unicode standard.
Fully object-oriented and component- based
Optimized memory management
Client-server architecture
it provides simple and high-efficient inter process
communication. This feature also eases porting of code
written for other platforms to Symbian OS.
24
25. Symbian OS Features
A Hardware Abstraction Layer (HAL)
This layer provides a consistent interface to
hardware and supports device-independency
Kernel offers hard real-time guarantees to kernel
and user mode threads.
25
26. iPhone OS
BSD File Systems
I/O systems
Networking
components
Based on Mach
kernel and Darwin
Core as Mac OS X
26
27. iOS
About Apple’s Proprietary Mobile OS – iOS
iOS is Apple’s proprietary mobile operating
system initially developed for iPhone and now
extended to iPAD, iPod Touch and Apple TV.
Initially known as “iPhone OS”, in June 2010
renamed “iOS”.
iOS is not enabled for cross licensing, it can
only be used on Apple’s devices.
27
28. iOS
Apple’s Proprietary Mobile OS
The user interface of iOS is based on the
concept of usage of multi touch gestures.
iOS is a Unix based OS.
iOS uses four abstraction layers, namely: the
Core OS layer, the Core Services layer, the
Media layer, and the Cocoa Touch layer.
Apple’s App store contains close to 550,000
applications as of March 2012.
28
29. iOS
Apple’s Proprietary Mobile OS
It is estimated that the APPs are downloaded
25B times till now.
First version of iOS is released in 2007 with the
mane ‘OS X’ and then in 2008 the first beta
version of ‘iPhone OS’ is released.
In 2007 September Apple released first iPod
Touch that also used this OS.
In 2010 iPad is released that has a bigger screen
than the iPod and iPhone.
29
30. iOS
Cisco owns the trademark for ‘IOS’;
Apple licenses the usage of ‘iOS’ from
Cisco.
30
31. Mac OS X Architecture
Multitasking
Pre-emptive, i.e. act of
taking the control of
operating system from
one task and giving it
to another task.
Real-time
Strong memory
protection
Each application has
4GB space
31
32. Android
Google owns a trademark for Android – Google’s
permission is necessary to use Android’s
trademark
In 2011, Microsoft announced it has made an
agreement with Android device manufacturers
(including Samsung and HTC) to collect fees
from them.
Android’s source code is available under Apache
License version 2.0. The Linux kernel changes are
available under the GNU General Public
License version 2.
32
33. Android OS
Android is Linux based mobile OS for mobile
devices such as Tablets and Smartphones.
In 2005 Google acquired the initial developer of
the OS, Android Inc.
Then in 2007 Google formed an Open Handset
Alliance with 86 hardware, software and telecom
companies.
This alliance developed and announced Android
as an open source mobile OS under the Apache
License.
33
34. Android
Now, this OS is being used by multiple device
manufacturers (Samsung, Motorola, HTC, LG,
Sony etc) in their handsets
Android developer community has large
number of developers preparing APPs in Java
environment and the APP store ‘Google Play’
now has close to 450,000 APPs, among which
few are free and others are paid.
It is estimated that, as of December 2011,
almost 10B APPs were downloaded.
34
35. Android
It is estimated that as of February 2012 there
are over 300M Android devices and
approximately 850,000 Android devices are
activated every day.
The earliest recognizable Android version is
2.3 Gingerbread, which supports SIP and NFC.
In 2011 Android Honeycomb version (3.1 and
3.2) are released with focus on Tablets. This is
mainly focused on large screen devices.
35
36. Android
Handset layouts – compatible with different
handset designs such as larger, VGA, 2D
graphics library, 3D graphics library based.
Storage – a lightweight relational database, is
used for data storage
Connectivit: GSM/EDGE, IDEN, CDMA, EV-
DO,UMTS,Bluetooth,WiFi, LTE, NFC &WiMAX
Messaging – SMS, MMS, threaded text
messaging and Android Cloud To Device
Messaging (C2DM)
36
37. Android
Google faced many patent lawsuits against
Android such as by Oracle in 2006 that included
patents US5966702 and US6910205.
Distributed under
Apache License
Created by Android
Inc., as part of Google
in 2005
Development is Open
Source; source code is
publicly available
Programmers are
welcome to contribute
via Software
Development Kit (SDK)
Linux Kernel
Java-based
application
framework
37
38. Blackberry OS
The first operating system launched by
Research in Motion(RIM -the company
behind BlackBerry)
Operating system structure mainly
consists of following: -
GUI (Graphic User Interface).
Command processor.
Kernel.
38
40. Blackberry OS Features
Gestures
Multi-tasking
Blackberry Hub
Blackberry Balance
Keyboard
Voice Control
40
41. Key Terms in Blackberry OS
Process Management
Memory Management
Types of Kernel – Microkernel
41
42. Advantages of Blackberry OS
It provides good security for data.
It avoids collusion of personal and business data.
Content promotion: Dedicated content channels
and feature banners that provide prime real estate to
help distribute your app to the right users.
App discovery: Universal search, top lists, social
sharing, reviews, and ratings help users find the
right app.
The Games app (in combination with Score loop):
A specialized portal for gaming allowing
multiplayer, social connections.
42
43. Disadvantages of Blackberry OS
New operating system was introduced too late
into the ever-growing market.
Yet to have as many apps available for
purchase or download compared to other phone
in the market.
Consumers have switched over to other
devices made by Apple or Android.
Swipe vs. home button. Once an application is
opened, you have to swipe up to return to the
main display.
43
44. Android Software Development Kit
A software development kit that enables developers
to create applications for the Android platform.
The Android SDK includes sample projects
with source code, development tools, an emulator,
and required libraries to build Android applications.
Applications are written using
the Java programming language and run on Dalvik,
a custom virtual machine designed for embedded
use which runs on top of a Linux kernel.
44
45. Android SDK Environment
The Android Development Tools (ADT) plugin for
Eclipse adds powerful extensions to the Eclipse
integrated development environment. It allows you to
create and debug Android applications easier and
faster.
Advantages:
It gives you access to other Android development tools from
inside the Eclipse IDE. For example, ADT lets you access
the many capabilities of the DDMS tool: take screenshots,
manage port‐forwarding, set breakpoints, and view thread
and process information directly from Eclipse.
45
46. Android SDK Environment Advantages
It provides a New Project Wizard, which helps you
quickly create and set up all of the basic files you'll
need for a new Android application.
It automates and simplifies the process of building
your Android application.
It provides an Android code editor that helps you write
valid XML for your Android manifest and resource
files.
It will export your project into a signed APK, which
can be distributed to users.
46
47. Creation of Android SDK Environment
Download and Install the Android
SDK and test the Emulator
Install Java
Install Eclipse
Install the ADT Plug-in in Eclipse
Create Hello World Application
47
48. Android Application Components
Components Description
Activities They dictate the UI and handle the user
interaction to the smart phone screen
Services They handle background processing
associated with an application.
Broadcast
Receivers
They handle communication between
Android OS and applications.
Content
Providers
They handle data and database
management issues.
48
49. Android Application Components
Components Description
Fragments Represents a portion of user interface in an
Activity.
Views UI elements that are drawn on-screen including
buttons, lists forms etc.
Layouts View hierarchies that control screen format and
appearance of the views.
Intents Messages wiring components together.
Resources External elements, such as strings, constants and
drawable pictures.
Manifest Configuration file for the application.
49
51. Advantages of Android
Android is open
Multitasking
Easy access to the Android App Market
Can install a modified ROM
Phone options are diverse
Ease of notification
Widget
51
52. M- Commerce
M-commerce (mobile commerce) is the buying and
selling of goods and services through wireless
handheld devices such as cellular telephone and
personal digital assistants (PDAs). Known as next-
generation e-commerce, m-commerce enables users to
access the Internet without needing to find a place to
plug in.
The emerging technology behind m-commerce, which
is based on the Wireless Application Protocol (WAP),
has made far greater strides in Europe, where mobile
devices equipped with Web-ready micro-browsers are
much more common than in the United States.
52
53. M- Commerce
M-commerce can be seen as means of selling and
purchasing of goods and services using mobile
communication devices such as cellular phones,
PDA s etc, which are able to connect to the Internet
through wireless channels and interact with e-
commerce systems
M-commerce can be referred to as an act of carrying-
out transactions using a wireless device
It is understood as a data connection that results in
the transfer of value in exchange for information,
services or goods
53
54. M- Commerce
It can also bye seen as a natural extension of e-commerce that
allows users to interact with other users or businesses in a
wireless mode, anytime/anywhere.
It can be perceived to be any electronic transaction or
information interaction conducted using a mobile device and
mobile network thereby guaranteeing customers virtual and
physical mobility, which leads to the transfer of real or
perceived value in exchange for personalized, location-based
information, services, or goods.
M-commerce can also be seen and referred to as wireless
commerce.
It is any transaction with a monetary value that is conducted
via a mobile telecommunications network.
54
55. M- Commerce
M-commerce can also be seen and referred to
as wireless commerce.
It is any transaction with a monetary value
that is conducted via a mobile
telecommunications network .
An ability to access an IT-System whilst
moving from one place to the other using a
mobile device and carry out transactions and
transfer information wherever and whenever
needed to.
55
56. Mobile commerce from the
Customer‘s point of view
The customer wants to access information, goods
and services any time and in any place on his
mobile device.
It can use his mobile device to purchase tickets
for events or public transport, pay for parking,
download content and even order books and CDs.
It should be offered appropriate payment
methods. They can range from secure mobile
micropayment to service subscriptions.
56
57. Mobile commerce from the
Provider‘s point of view
The future development of the mobile telecommunication
sector is heading more and more towards value-added
services. Analysts forecast that soon half of mobile operators
revenue will be earned through mobile commerce.
Consequently operators as well as third party providers will
focus on value-added-services. To enable mobile services,
providers with expertise on different sectors will have to
cooperate.
Innovative service scenarios will be needed that meet the
customer‘s expectations and business models that satisfy all
partners involved.
57
58. M-Commerce Terminology
Generations
1G: 1979-1992 wireless technology
2G: current wireless technology; mainly
accommodates text
2.5G: interim technology accommodates graphics
3G: 3rd generation technology (2001-2005)
supports rich media (video clips)
4G: will provide faster multimedia display (2006-
2010)
58
59. Terminology and Standards
GPS: Satellite-based Global Positioning System
PDA: Personal Digital Assistant—handheld wireless
computer
SMS: Short Message Service
EMS: Enhanced Messaging Service
MMS: Multimedia Messaging Service
WAP: Wireless Application Protocol
Smart phones—Internet-enabled cell phones with
attached applications
59
61. Pros of M- Commerce
M-commerce is creating entirely new service
opportunities - such as payment, banking, and
ticketing transactions - using a wireless device .
M-commerce allows one-to-one communication
between the business and the client and also
business-to-business communication .
M-commerce is leading to expectations of
revolutionary changes in business and markets.
M-commerce widens the Internet business
because of the wide coverage by mobile networks.
61
62. Cons of M- Commerce
Cell phones have small screen displays and that might be
irritating to someone who has the experience of the
desktop environment.
Another issue that can be seen as a disadvantage to m-
commerce is the limitation in bandwidth. The GSM
technology has the data rate of 9.3 Kbps and the current
3-G technology offers a data rate goes up to 2 Mbps.
Mobile devices use batteries as their form of power
supply . Normally, power for a cell phone battery lasts
up to 2-3 days depending on how new the battery is. It
then gives the owner the burden of having to remember
to recharge it every now and then.
62
63. Cons of M- Commerce
Mobile devices do not have enough processing
power and the developer has to be careful about
loading an application that requires too much
processing. Also, mobile devices do not have
enough storage space. The developer has to be
also concerned about the size of his application in
the due process of development.
Mobile appliances are quite vulnerable to theft,
loss and corruptibility. Security solutions for
mobile appliances must, therefore, provide for
security under these challenging scenarios.
63
64. Mobile Payment System
Mobile Payment can be offered as a stand-alone
service.
Mobile Payment could also be an important
enabling service for other m-commerce services (e.g.
mobile ticketing, shopping, gambling…)
It could improve user acceptance by making the
services more secure and user-friendly.
In many cases offering mobile payment methods
is the only chance the service providers have to
gain revenue from an m-commerce service.
64
65. Mobile Payment System (cont.)
the consumer must be informed of:
what is being bought, and
how much to pay
options to pay
the payment must be made
payments must be traceable.
65
66. Mobile Payment System (cont.)
Customer requirements:
a larger selection of merchants with whom they can trade
a more consistent payment interface when making the
purchase with multiple payment schemes, like:
Credit Card payment
Bank Account/Debit Card Payment
Merchant benefits:
brands to offer a wider variety of payment
Easy-to-use payment interface development
Bank and financial institution benefits
to offer a consistent payment interface to consumer and
merchants
66
67. Payment via Internet Payment Provider
WAP
GW/Proxy
SSL tunnel
MeP
GSM Security
SMS-
C
User
Browsing (negotiation)
Merchant
Mobile Wallet
CC/Bank
IPP
67
68. Payment via integrated Payment Server
WAP
GW/Proxy
ISO8583 Based
CP
Mobile Commerce
Server
GSM Security
SMS-
C
User
Browsing (negotiation)
CC/Bank
Merchant
Mobile Wallet
Voice PrePaid
VPP IF
SSL tunnel
68
69. Security in M-Commerce
Operator centric model
CA
Bank (FI)
Merchant
Content
Aggregation
Internet
SAT GW
WAP GW
Mobile
Network
Mobile Bank
WAP1.1(+SIM where avail.)
WAP1.2(WIM)
(SIM)
Security and
Payment
Mobile e-Commerce
Server
Mobile IP
Service
Provider
Network
69
71. Comparison between Internet and
WAP technologies
HTML
JavaScript
HTTP
TLS - SSL
TCP/IP
UDP/IP
Wireless Application Protocol
Wireless Application
Environment (WAE)
Session Layer (WSP)
Security Layer (WTLS)
Transport Layer (WDP)
Other Services and
Applications
Transaction Layer (WTP)
SMS USSD CSD IS-136 CDMA CDPD PDC-P Etc..
Bearers:
71
72. WAP Risks
WAP Gap
Claim: WTLS protects WAP as SSL
protects HTTP
Problem: In the process of translating one
protocol to another, information is
decrypted and re-encrypted
Recall the WAP Architecture
Solution: Doing decryption/re-encryption
in the same process on the WAP gateway
Wireless gateways as single point of failure
72
73. Platform Risks
Without a secure OS, achieving security on
mobile devices is almost impossible
Learned lessons:
Memory protection of processes
Protected kernel rings
File access control
Authentication of principles to resources
Differentiated user and process privileges
Sandboxes for untrusted code
Biometric authentication
73
74. Risks of WML Script
Lack of Security Model
Does not differentiate trusted local code from untrusted code
downloaded from the Internet. So, there is no access control!!
WML Script is not type-safe.
Scripts can be scheduled to be pushed to the client device
without the user’s knowledge
Does not prevent access to persistent storage
Possible attacks:
Theft or damage of personal information
Abusing user’s authentication information
Maliciously offloading money saved on smart cards
74
75. Bluetooth Security
Bluetooth provides security between any two Bluetooth
devices for user protection and secrecy
mutual and unidirectional authentication
encrypts data between two devices
Session key generation
configurable encryption key length
keys can be changed at any time during a connection
Authorization (whether device X is allowed to have
access service Y)
Trusted Device: The device has been previously
authenticated, a link key is stored and the device is
marked as “trusted” in the Device Database.
75
76. Bluetooth Security (Cont..)
Untrusted Device: The device has been
previously authenticated, link key is stored
but the device is not marked as “trusted” in
the Device Database
Unknown Device: No security
information is available for this device.
This is also an untrusted device.
automatic output power adaptation to reduce
the range exactly to requirement, makes the
system extremely difficult to eavesdrop
76
77. New Security Risks in M-Commerce
Abuse of cooperative nature of ad-hoc networks:
An adversary that compromises one node can
disseminate false routing information.
Malicious domains: A single malicious domain
can compromise devices by downloading malicious
code
Roaming: Users roam among non-trustworthy
domains
77
78. New Security Risks (cont.)
Launching attacks from mobile devices
With mobility, it is difficult to identify attackers
Loss or theft of device
More private information than desktop computers
Security keys might have been saved on the device
Access to corporate systems
Bluetooth provides security at the lower layers
only: a stolen device can still be trusted
78
79. New Security Risks (cont.)
Problems with Wireless Transport Layer Security (WTLS)
protocol
Security Classes:
No certificates
Server only certificate (Most Common)
Server and client Certificates
Re-establishing connection without re-authentication
Requests can be redirected to malicious sites
79
80. New Privacy Risks
Monitoring user’s private information
Offline telemarketing
Who is going to read the “legal jargon”
Value added services based on location
awareness (Location-Based Services)
80