SlideShare a Scribd company logo
1 of 16
Download to read offline
11CS403:MobileSystemEngineering
UNIT5NOTES
StorageOptionsForData:
Androidprovidesseveral optionsfor youto savepersistent applicationdata.
Thesolutionyouchoosedependsonyourspecific needs, suchaswhether
thedatashouldbeprivatetoyourapplicationor accessible toother
applications(andtheuser) andhowmuchspaceyourdatarequires.
Thedatastorageoptionsarethefollowing:
• SharedPreferences
• Internal Storage
• External Storage
• SQLiteDatabases
• NetworkConnection
SharedPreferences:
o Storeprivateprimitivedatain key-valuepairs.
o TheSharedPreferences classprovidesageneral frameworkthat
allowsonetosaveandretrievepersistent key-valuepairsof primitive
datatypes.
o OnecanuseSharedPreferences to saveanyprimitivedata:
booleans, floats, ints, longs, andstrings.
o Thisdatawill persist acrossusersessions(evenif yourapplicationis
killed)
Internal Storage:
o Storeprivatedataonthedevicememory.
o Onecansavefilesdirectly onthedevice's internal storage.
o Bydefault, filessavedto theinternal storageareprivateto your
applicationandotherapplicationscannot accessthem(nor canthe
user).
o Whentheuseruninstalls your application, thesefiles areremoved.
External Storage:
o Storepublic dataonthesharedexternal storage.
o EveryAndroid-compatible devicesupports ashared"external
storage" that youcanuseto savefiles. Thiscanbearemovable
storagemedia(suchasanSDcard) oraninternal (non-removable)
storage.
o Filessavedto theexternal storageareworld-readableandcanbe
modifiedbytheuser whentheyenableUSBmassstoragetotransfer
filesonacomputer.
SQLiteDatabases:
o Storestructureddatain aprivatedatabase.
o Androidprovidesfull support for SQLite databases. Anydatabases
youcreatewill beaccessiblebynameto anyclassin theapplication,
but notoutsidetheapplication.
o Therecommendedmethodto createanewSQLitedatabaseis to
createasubclassof SQLiteOpenHelper andoverride
theonCreate() method,in whichyoucanexecuteaSQLitecommandto
createtablesin thedatabase. Youcanthenget aninstanceof your
implementationusingtheconstructor you'vedefined.
o YoucanexecuteSQLitequeriesusingthequery() methods, which
accept variousqueryparameters, suchasthetabletoquery, theprojection,
selection, columns, grouping, andothers.
o Forcomplexqueries, suchasthosethat requirecolumnaliases, you
shoulduseSQLiteQueryBuilder, whichprovidesseveral convienent
methodsfor buildingqueries.
o EverySQLitequery will returnaCursorthat points toall therows
foundbythequery. TheCursor is alwaysthemechanismwithwhichyou
cannavigateresults fromadatabasequery andreadrowsandcolumns.
Parameter Comment
StringdbName Thetablenameto compilethequeryagains
String[] columnNames Alist of whichtablecolumnsto return.
Passing"null" will returnall columns.
StringwhereClause Where-clause, i.e. filter for theselection
ofdata, null will select all data.
String[] selectionArgs Youmayinclude?sin the"whereClause"".
Theseplaceholderswill get replaced
bythevaluesfromtheselectionArgsarray.
String[] groupBy Afilter declaringhowtogrouprows,
null will causetherowsto notbegrouped.
String[] having Filter for thegroups, null meansnofilter.
String[] orderBy Tablecolumnswhichwill beusedto
order thedata, null meansnoordering.
o Thequerymethodtakes5parameterswhicharedescribedbelow:
NetworkConnection:
o Youcanusethenetwork(whenit's available) to storeandretrieve
dataonyour ownweb-basedservices. Todonetworkoperations, use
classesin thefollowingpackages:
 java.net.*
 android.net.*
Androidprovidesawayfor youto exposeevenyourprivatedatatoother
applications—withcontentprovider. Acontent provider is anoptional
component that exposesread/write accessto yourapplicationdata, subject to
whateverrestrictionsyouwanttoimpose.
MOBILECLOUDCOMPUTING(MCC):
Whatis MCC?
MCCat its simplest referstoaninfrastructurewhereboththedatastorage
andthedataprocessinghappenoutsideof themobile device. Mobile cloud
applicationsmovethecomputingpoweranddatastorageawayfrommobile
phonesandintothecloud, bringingapplicationsandmobile computingto notjust
smartphoneusersbut alsoamuchbroaderrangeof mobile subscribers.
MCCintegratescloudcomputinginto themobileenvironmentand
overcomesobstaclesrelatedto theperformance(e.g., battery life, storage, and
bandwidth), environment(e.g., heterogeneity, scalability, andavailability), and
security (e.g., reliability andprivacy)discussedin mobile computing. In termsof
services, MCCextendsprocessingandstoragebeyonddevicesandseamlessly
integrateswithother servicesandsensordatatoopenupnewclassesof
applicationsknownascontext-awareapplications.
DifferencebetweenMobileComputingandCloudComputing:
1) First, thereis anoverlapbetweenthetwocomputingparadigms.Cloud
computingaimsto provideservicesto userswithout lettingthemknowwhere
theseservicesarehostedorhowtheyaredelivered. Mobile computingaimsto
support mobility sothat userscanaccessresourceswithwirelesstechnology.
2) Second,it is possibleto build cloudswithinmobile devicesfor datastorage
andprocessing. Althoughmobile devicesnowadaysareweakin termsofenergy,
power, storage, andcommunication, this situationwill beimproveddramatically
with thedevelopmentof technology.Hyraxshowsthat aplatformderivedfrom
Hadoopcansupport cloudcomputingonAndroidsmartphones. It demonstrates
thepossibility that acloudcomposedof mobiledevicescanprovidebasic
functionsandservicesofcloudcomputing.
3) Lastly, cloudcomputingservicesaredevelopedmainly for enterprises
whereasmobile computingservicesaredevelopedmainly for individuals.
Whydoweneedmobilecloudcomputing?
1) Mobile cloudcomputingexploits informationaboutauser’s location,
context, andrequestedservicesandsignificantly evolvesthe
heterogeneousaccessmanagementschemesfor traditional
heterogeneousaccessscenarios. Thisis called“intelligent access”. It
cannoticeably improveuser experience.
2) Capacity ofmobile deviceshasincreaseddramatically withthe
growthofmobile users, especially withtheprevalenceof smartphone
users. Eachmobiledevicehasstorage, computing, sensing, and
powerresources. Byusingtheseresources, applicationsorservices
canbeeasily accessedbyusersinsideandoutsidethemobile
network.
3) Therearestill someobstaclesto implementingcloudcomputing, and
mobile computingtechnologycanhelpovercometheseobstacles.
LongWANlatenciesareafundamental obstacle whenamobile
deviceexecutesaresource-intensiveapplicationonadistant high-
performanceserver or cluster. Asolutionis to instantiatecustomized
servicesoftwareonanearbycloudlet andthento usethat service
overawirelessLAN.
MCCArchitecture:
• In theabovefigure, mobile devicesareconnectedto themobile
networksviabasestations(e.g., basetransceiver station(BTS), access
point, orsatellite) that establishandcontrol theconnections(air links) and
functional interfacesbetweenthenetworksandmobile devices.
• Mobile users’ requestsandinformation(e.g., IDandlocation) are
transmittedto thecentral processors that areconnectedtoservers
providingmobile networkservices.
• Here, mobile networkoperatorscanprovideservicestomobile users
asAAA(for authentication, authorization, andaccounting) basedonthe
homeagent (HA)andsubscribers’ datastoredin databases.
• After that, thesubscribers’ requestsaredeliveredtoacloudthrough
theInternet.
• In thecloud, cloudcontrollers processtherequeststo providemobile
userswiththecorrespondingcloudservices. Theseservicesaredeveloped
with theconceptsof utility computing, virtualization, andservice-oriented
architecture
AdvantagesofMCC:
• Extendingbatterylifetime: bymovingtheexecutionofcomputation
intensiveapplication‘to thecloud’.
• Improvingdatastoragecapacityandprocessingpower:MCCis
developedtoenablemobile usersto store/accessthelargedataonthe
cloudthroughwirelessnetworks.
• Improvingreliability: Storingdataorrunningapplicationsonclouds
is aneffectivewayto improvethereliability sincethedataandapplication
arestoredandbackeduponanumberof computers. This reducesthe
chanceof dataandapplicationlost onthemobile devices.
• MCCalsoinherits someadvantagesof cloudsfor mobile services
suchas dynamicprovisioning, scalibility, multi-tenancyandeasyof
integration.
• Mobile cloudsmight provideanumberofnewtechnical
functionalities. In particular, provisioningof context- andlocation-awareness
enablespersonalizationof servicesis anattractivefunctionality.
IssuesofMCC:
1. IssuesinMobileCommunicationSide:
a) LowBandwidth: Bandwidthis oneofthebigissuesin MCC
sincetheradioresourcefor wirelessnetworksis muchscarce
ascomparedwiththetraditional wirednetworks.
b) Availability: Serviceavailability becomesmoreimportant
issuein MCCthanthat in thecloud
computingwithwirednetworks. Mobileusersmaynotbeable
to connect tothecloudtoobtainservicedueto traffic
congestion, networkfailures, andtheout-of-signal.
c) Heterogeneity: MCCwill beusedin thehighly heterogeneous
networksin termsof wirelessnetworkinterfaces. Different
mobile nodesaccessto thecloudthroughdifferent radio
accesstechnologiessuch. Asaresult, anissueofhowto
handlethewirelessconnectivity while satisfyingMCC’s
requirementsarises.
2. IssuesinComputingSide:
a) EnhancingtheEfficiencyofDataAccess:Withan
increasingnumberof cloudservices, thedemandof accessing
dataresources(e.g., image, files, anddocuments) onthe
cloudincreases. Asaresult, amethodto deal with(i.e., store,
manage, andaccess) dataresourcesoncloudsbecomesa
significant challenge. However, handlingthedataresourceson
cloudsis not aneasyproblemduetothelowbandwidth,
mobility, andthelimitationof resourcecapacity of mobile
devices.
b) Security: Protectinguserprivacyanddata/applicationsecrecy
fromadversary is akeyto establishandmaintain consumers’
trust in themobile platform,especially in MCC.Tocombat the
security threats, current mobiledevicesrunthethreat detection
servicesonthemobile deviceitself. Suchanexercisewarrants
intensiveusageofresourcesbothin termsofcomputationand
power. Apossiblesolutionis to comewithanewmodel of
security wheredetectionservicescanbemovedto cloud. It
significantly savesthedeviceCPUandmemoryrequirements
but at thecost of increasingbandwidth. Suchanapproachhas
several benefits:
-- Better detectionofmalicioussoftware.
-- Reduceon-deviceResourcesconsumption.
-- Reduceon-deviceSoftwarecomplexity.
3. AbsenceofStandards:
Althoughthey’reanumberof advantagesof MCC,thereis noopen
acceptedstandardavailablefor Cloudcomputing. Followingarethe
problemsexistingdueto lackof openstandards:
a) Limitedscalability.
b) Unreliableavailability of aservice, in caseofabreakdown.
c) Serviceprovider lock-in, duetoabsenceof portability
betweenvariousproviders.
d) Unableto deployserviceovermultiple CCSPs,sincethere
is nointeroperability betweenthem.
CONTEXT-AWARECOMPUTING:
Context-awarecomputingis amobile computingparadigmin which
applicationscandiscoverandtakeadvantageofcontextual informationsuchas
userlocation, timeof day,neighboringusersanddevices, anduseractivity.
Whatis context-awarecomputing?
It is definedassoftwarethat examinesandreacts to anindividual’s changing
context. In other words, theapplicationis awareof its user’s stateand
surroundings, andhelpsto adaptits behavior.
Basicfunctionsofanycontext-awareapplication:
1. Presentationofinformationandservices: refers tofunctionsthat
either present context informationto theuser, orusecontext topropose
appropriateselectionsof actionstotheuser. Anexamplecanbeshowinga
usertheir locationonamapandpossibly indicatingnearbysitesof interest
orpresentingachoiceof servicescloseby.
2. Automaticexecutionofservices: describesfunctionsthat trigger a
commandorreconfigurethesystemonbehalf of theuser accordingto
context changes. Anexamplecanbeacar navigationsystemthat
recomputesdrivingdirectionswhentheusermissesaturn. 
3. Storageandretrievalofcontext information: applicationstag
captureddatawithrelevant context information. Forexample, azoology
applicationmaytagnotestakenbytheuser withthelocationandtimeof a
speciesobservation.
Frameworkofcontext-awaresystems:
Fromthefunctional viewpoint, context-awaresystemscanberepresentedas
alayeredframework. Thisframeworkconsistsof 5layers:
1. Thefirst layer (sensors) is acollectionof sensorsresponsible for raw
datafromtheuser environment. (e.g. user device, social network, or
useraccessnetwork)
2. Thesecondlayer(rawdataretrieval) makesuseofspecific
applicationprogramminginterfacesorprotocolsto request datafrom
thesensorlayer. Thesequeriesmustasfar aspossible be
implementedin ageneric way,makingit possible toreplacesensors.
3. Thethird layer(preprocessing) is responsiblefor reasoningand
interpretingcontextual information. It transformstheinformation
returnedbytheunderlyinglayer toahigher abstractionlevel (e.g. it
transformsaGPSpositiontoonesuchasat homeorat work). Not
onlysensedordeduceddatahaveto bemodeled, but alsodata
describingthem(e.g. accuracyandrecall, or lifecycleinformation).
4. Thefourth layer(storageandmanagement) organizesthegathered
dataandmakesthemavailable tothirdparties’ applicationsin a
synchronousor asynchronousway.In thefirst modethethird-party
applicationsuseremotemethodcalls topoll theserver for changes.
In thesecondmodetheysubscribeto specific eventsofinterest and
arenotifiedwhentheeventoccurs(e.g. byacall back).
5. Thefifth layer (application) is wherethereactionsto context changes
areimplemented(e.g. displayingtext in ahighercolour contrast if
illuminationis bad).
INTERNETOFTHINGS(IoT):
Whatis IoT?
TheInternet of Things, alsocalledTheInternet of Objects, refers toa
wirelessnetworkbetweenobjects; usually thenetworkwill bewirelessand
self-configuring, suchashouseholdappliances.
CharacteristicsofIoT:
1. Ambient Intelligence
2. Event Driven
3. ComplexAccessTechnologies:
4. Semantic Sharing
5. Flexible Structure
WhyIoT?
1. Dynamiccontrol of industry anddaily life.
2. Improvetheresourceutilizationratio.
3. Better relationshipbetweenhumanandnature.
4. Forminganintellectual entity byintegratinghumansociety and
physical systems.
5. Universal transport andinternetworking
EnablingTechnologiesofIoT:
1. RFID- Toidentify andtrackthedataof things.
2. Sensor - Tocollect andprocessthedatato detect thechangesin the
physical statusofthings.
3. Smart Technologies- Toenhancethepowerof thenetworkby
devolvingprocessingcapabilitiestodifferent part ofthenetwork.
4. NanoTechnologies- Tomakethesmaller andsmaller thingshavethe
ability to connect andinteract.
IoTapplicationsareapart ofvariousdomainslikefood, education,
management, retail, logistics.
Mse unit5

More Related Content

Similar to Mse unit5

Cloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptxCloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptxraghavanp4
 
Cloud Computing for Mobile Robots
Cloud Computing for Mobile RobotsCloud Computing for Mobile Robots
Cloud Computing for Mobile RobotsDarshan Rajagopal
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyKingsley Mensah
 
Mobile Data Analytics
Mobile Data AnalyticsMobile Data Analytics
Mobile Data AnalyticsRICHARD AMUOK
 
thilaganga journal 1
thilaganga journal 1thilaganga journal 1
thilaganga journal 1thilaganga
 
CHAPTER 2 cloud computing technology in cs
CHAPTER 2 cloud computing technology in csCHAPTER 2 cloud computing technology in cs
CHAPTER 2 cloud computing technology in csTSha7
 
Cloud white paper v3.0
Cloud white paper v3.0Cloud white paper v3.0
Cloud white paper v3.0CK Toh
 
Moses supporting and enforcing security profiles on smartphones
Moses supporting and enforcing security profiles on smartphonesMoses supporting and enforcing security profiles on smartphones
Moses supporting and enforcing security profiles on smartphonesJPINFOTECH JAYAPRAKASH
 
JPA1414 MOSES: Supporting and Enforcing Security Profiles on Smartphones
JPA1414  MOSES: Supporting and Enforcing Security Profiles on SmartphonesJPA1414  MOSES: Supporting and Enforcing Security Profiles on Smartphones
JPA1414 MOSES: Supporting and Enforcing Security Profiles on Smartphoneschennaijp
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSHREYASSRINATH94
 
CloudComputingJun28.ppt
CloudComputingJun28.pptCloudComputingJun28.ppt
CloudComputingJun28.pptVipin Singhal
 
CloudComputingJun28.ppt
CloudComputingJun28.pptCloudComputingJun28.ppt
CloudComputingJun28.pptgeminass1
 
Cloud Computing_ICT Concepts & Trends.pptx
Cloud Computing_ICT Concepts & Trends.pptxCloud Computing_ICT Concepts & Trends.pptx
Cloud Computing_ICT Concepts & Trends.pptxssuser6063b0
 
Virtualization on embedded boards
Virtualization on embedded boardsVirtualization on embedded boards
Virtualization on embedded boardsMohamed Ramadan
 
Scientific Cloud Computing: Present & Future
Scientific Cloud Computing: Present & FutureScientific Cloud Computing: Present & Future
Scientific Cloud Computing: Present & Futurestratuslab
 
Cloud Computing Nist Paul Pajo
Cloud Computing Nist Paul PajoCloud Computing Nist Paul Pajo
Cloud Computing Nist Paul PajoPaul Pajo
 

Similar to Mse unit5 (20)

Cloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptxCloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptx
 
Cloud Computing for Mobile Robots
Cloud Computing for Mobile RobotsCloud Computing for Mobile Robots
Cloud Computing for Mobile Robots
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper company
 
Mobile Data Analytics
Mobile Data AnalyticsMobile Data Analytics
Mobile Data Analytics
 
thilaganga journal 1
thilaganga journal 1thilaganga journal 1
thilaganga journal 1
 
CHAPTER 2 cloud computing technology in cs
CHAPTER 2 cloud computing technology in csCHAPTER 2 cloud computing technology in cs
CHAPTER 2 cloud computing technology in cs
 
Cloud white paper v3.0
Cloud white paper v3.0Cloud white paper v3.0
Cloud white paper v3.0
 
Moses supporting and enforcing security profiles on smartphones
Moses supporting and enforcing security profiles on smartphonesMoses supporting and enforcing security profiles on smartphones
Moses supporting and enforcing security profiles on smartphones
 
JPA1414 MOSES: Supporting and Enforcing Security Profiles on Smartphones
JPA1414  MOSES: Supporting and Enforcing Security Profiles on SmartphonesJPA1414  MOSES: Supporting and Enforcing Security Profiles on Smartphones
JPA1414 MOSES: Supporting and Enforcing Security Profiles on Smartphones
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
 
CloudComputingJun28.ppt
CloudComputingJun28.pptCloudComputingJun28.ppt
CloudComputingJun28.ppt
 
CloudComputingJun28.ppt
CloudComputingJun28.pptCloudComputingJun28.ppt
CloudComputingJun28.ppt
 
CloudComputingJun28.ppt
CloudComputingJun28.pptCloudComputingJun28.ppt
CloudComputingJun28.ppt
 
Cloud Computing_ICT Concepts & Trends.pptx
Cloud Computing_ICT Concepts & Trends.pptxCloud Computing_ICT Concepts & Trends.pptx
Cloud Computing_ICT Concepts & Trends.pptx
 
Cs6703 grid and cloud computing unit 3
Cs6703 grid and cloud computing unit 3Cs6703 grid and cloud computing unit 3
Cs6703 grid and cloud computing unit 3
 
Virtualization on embedded boards
Virtualization on embedded boardsVirtualization on embedded boards
Virtualization on embedded boards
 
Scientific Cloud Computing: Present & Future
Scientific Cloud Computing: Present & FutureScientific Cloud Computing: Present & Future
Scientific Cloud Computing: Present & Future
 
Cloud Computing and It's Types in Mobile Network
Cloud Computing and It's Types in Mobile NetworkCloud Computing and It's Types in Mobile Network
Cloud Computing and It's Types in Mobile Network
 
Module-1 introductaion cloud computing.pdf
Module-1 introductaion cloud computing.pdfModule-1 introductaion cloud computing.pdf
Module-1 introductaion cloud computing.pdf
 
Cloud Computing Nist Paul Pajo
Cloud Computing Nist Paul PajoCloud Computing Nist Paul Pajo
Cloud Computing Nist Paul Pajo
 

More from NikithaNag (13)

Class 2
Class 2Class 2
Class 2
 
Activity
ActivityActivity
Activity
 
Activity
ActivityActivity
Activity
 
Roopa 21:47
Roopa 21:47Roopa 21:47
Roopa 21:47
 
Roopa 21:46
Roopa 21:46Roopa 21:46
Roopa 21:46
 
ppt_type.ppt
ppt_type.pptppt_type.ppt
ppt_type.ppt
 
Gobhi manchuri
Gobhi manchuriGobhi manchuri
Gobhi manchuri
 
Biryani
BiryaniBiryani
Biryani
 
09 cs491 st-t1
09 cs491 st-t109 cs491 st-t1
09 cs491 st-t1
 
1
11
1
 
doc
docdoc
doc
 
doc
docdoc
doc
 
Tips1
Tips1Tips1
Tips1
 

Recently uploaded

0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 

Recently uploaded (20)

0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 

Mse unit5

  • 2. StorageOptionsForData: Androidprovidesseveral optionsfor youto savepersistent applicationdata. Thesolutionyouchoosedependsonyourspecific needs, suchaswhether thedatashouldbeprivatetoyourapplicationor accessible toother applications(andtheuser) andhowmuchspaceyourdatarequires. Thedatastorageoptionsarethefollowing: • SharedPreferences • Internal Storage • External Storage • SQLiteDatabases • NetworkConnection SharedPreferences: o Storeprivateprimitivedatain key-valuepairs. o TheSharedPreferences classprovidesageneral frameworkthat allowsonetosaveandretrievepersistent key-valuepairsof primitive datatypes. o OnecanuseSharedPreferences to saveanyprimitivedata: booleans, floats, ints, longs, andstrings. o Thisdatawill persist acrossusersessions(evenif yourapplicationis killed) Internal Storage: o Storeprivatedataonthedevicememory. o Onecansavefilesdirectly onthedevice's internal storage. o Bydefault, filessavedto theinternal storageareprivateto your applicationandotherapplicationscannot accessthem(nor canthe user). o Whentheuseruninstalls your application, thesefiles areremoved.
  • 3. External Storage: o Storepublic dataonthesharedexternal storage. o EveryAndroid-compatible devicesupports ashared"external storage" that youcanuseto savefiles. Thiscanbearemovable storagemedia(suchasanSDcard) oraninternal (non-removable) storage. o Filessavedto theexternal storageareworld-readableandcanbe modifiedbytheuser whentheyenableUSBmassstoragetotransfer filesonacomputer. SQLiteDatabases: o Storestructureddatain aprivatedatabase. o Androidprovidesfull support for SQLite databases. Anydatabases youcreatewill beaccessiblebynameto anyclassin theapplication, but notoutsidetheapplication. o Therecommendedmethodto createanewSQLitedatabaseis to createasubclassof SQLiteOpenHelper andoverride theonCreate() method,in whichyoucanexecuteaSQLitecommandto createtablesin thedatabase. Youcanthenget aninstanceof your implementationusingtheconstructor you'vedefined. o YoucanexecuteSQLitequeriesusingthequery() methods, which accept variousqueryparameters, suchasthetabletoquery, theprojection, selection, columns, grouping, andothers. o Forcomplexqueries, suchasthosethat requirecolumnaliases, you shoulduseSQLiteQueryBuilder, whichprovidesseveral convienent methodsfor buildingqueries. o EverySQLitequery will returnaCursorthat points toall therows foundbythequery. TheCursor is alwaysthemechanismwithwhichyou cannavigateresults fromadatabasequery andreadrowsandcolumns.
  • 4. Parameter Comment StringdbName Thetablenameto compilethequeryagains String[] columnNames Alist of whichtablecolumnsto return. Passing"null" will returnall columns. StringwhereClause Where-clause, i.e. filter for theselection ofdata, null will select all data. String[] selectionArgs Youmayinclude?sin the"whereClause"". Theseplaceholderswill get replaced bythevaluesfromtheselectionArgsarray. String[] groupBy Afilter declaringhowtogrouprows, null will causetherowsto notbegrouped. String[] having Filter for thegroups, null meansnofilter. String[] orderBy Tablecolumnswhichwill beusedto order thedata, null meansnoordering. o Thequerymethodtakes5parameterswhicharedescribedbelow: NetworkConnection: o Youcanusethenetwork(whenit's available) to storeandretrieve dataonyour ownweb-basedservices. Todonetworkoperations, use classesin thefollowingpackages:  java.net.*  android.net.* Androidprovidesawayfor youto exposeevenyourprivatedatatoother applications—withcontentprovider. Acontent provider is anoptional component that exposesread/write accessto yourapplicationdata, subject to whateverrestrictionsyouwanttoimpose.
  • 5.
  • 6. MOBILECLOUDCOMPUTING(MCC): Whatis MCC? MCCat its simplest referstoaninfrastructurewhereboththedatastorage andthedataprocessinghappenoutsideof themobile device. Mobile cloud applicationsmovethecomputingpoweranddatastorageawayfrommobile phonesandintothecloud, bringingapplicationsandmobile computingto notjust smartphoneusersbut alsoamuchbroaderrangeof mobile subscribers. MCCintegratescloudcomputinginto themobileenvironmentand overcomesobstaclesrelatedto theperformance(e.g., battery life, storage, and bandwidth), environment(e.g., heterogeneity, scalability, andavailability), and security (e.g., reliability andprivacy)discussedin mobile computing. In termsof services, MCCextendsprocessingandstoragebeyonddevicesandseamlessly integrateswithother servicesandsensordatatoopenupnewclassesof applicationsknownascontext-awareapplications. DifferencebetweenMobileComputingandCloudComputing: 1) First, thereis anoverlapbetweenthetwocomputingparadigms.Cloud computingaimsto provideservicesto userswithout lettingthemknowwhere theseservicesarehostedorhowtheyaredelivered. Mobile computingaimsto support mobility sothat userscanaccessresourceswithwirelesstechnology. 2) Second,it is possibleto build cloudswithinmobile devicesfor datastorage andprocessing. Althoughmobile devicesnowadaysareweakin termsofenergy, power, storage, andcommunication, this situationwill beimproveddramatically with thedevelopmentof technology.Hyraxshowsthat aplatformderivedfrom Hadoopcansupport cloudcomputingonAndroidsmartphones. It demonstrates thepossibility that acloudcomposedof mobiledevicescanprovidebasic functionsandservicesofcloudcomputing. 3) Lastly, cloudcomputingservicesaredevelopedmainly for enterprises whereasmobile computingservicesaredevelopedmainly for individuals. Whydoweneedmobilecloudcomputing?
  • 7. 1) Mobile cloudcomputingexploits informationaboutauser’s location, context, andrequestedservicesandsignificantly evolvesthe heterogeneousaccessmanagementschemesfor traditional heterogeneousaccessscenarios. Thisis called“intelligent access”. It cannoticeably improveuser experience. 2) Capacity ofmobile deviceshasincreaseddramatically withthe growthofmobile users, especially withtheprevalenceof smartphone users. Eachmobiledevicehasstorage, computing, sensing, and powerresources. Byusingtheseresources, applicationsorservices canbeeasily accessedbyusersinsideandoutsidethemobile network. 3) Therearestill someobstaclesto implementingcloudcomputing, and mobile computingtechnologycanhelpovercometheseobstacles. LongWANlatenciesareafundamental obstacle whenamobile deviceexecutesaresource-intensiveapplicationonadistant high- performanceserver or cluster. Asolutionis to instantiatecustomized servicesoftwareonanearbycloudlet andthento usethat service overawirelessLAN. MCCArchitecture:
  • 8. • In theabovefigure, mobile devicesareconnectedto themobile networksviabasestations(e.g., basetransceiver station(BTS), access point, orsatellite) that establishandcontrol theconnections(air links) and functional interfacesbetweenthenetworksandmobile devices. • Mobile users’ requestsandinformation(e.g., IDandlocation) are transmittedto thecentral processors that areconnectedtoservers providingmobile networkservices. • Here, mobile networkoperatorscanprovideservicestomobile users asAAA(for authentication, authorization, andaccounting) basedonthe homeagent (HA)andsubscribers’ datastoredin databases. • After that, thesubscribers’ requestsaredeliveredtoacloudthrough theInternet. • In thecloud, cloudcontrollers processtherequeststo providemobile userswiththecorrespondingcloudservices. Theseservicesaredeveloped with theconceptsof utility computing, virtualization, andservice-oriented architecture AdvantagesofMCC:
  • 9. • Extendingbatterylifetime: bymovingtheexecutionofcomputation intensiveapplication‘to thecloud’. • Improvingdatastoragecapacityandprocessingpower:MCCis developedtoenablemobile usersto store/accessthelargedataonthe cloudthroughwirelessnetworks. • Improvingreliability: Storingdataorrunningapplicationsonclouds is aneffectivewayto improvethereliability sincethedataandapplication arestoredandbackeduponanumberof computers. This reducesthe chanceof dataandapplicationlost onthemobile devices. • MCCalsoinherits someadvantagesof cloudsfor mobile services suchas dynamicprovisioning, scalibility, multi-tenancyandeasyof integration. • Mobile cloudsmight provideanumberofnewtechnical functionalities. In particular, provisioningof context- andlocation-awareness enablespersonalizationof servicesis anattractivefunctionality. IssuesofMCC: 1. IssuesinMobileCommunicationSide: a) LowBandwidth: Bandwidthis oneofthebigissuesin MCC sincetheradioresourcefor wirelessnetworksis muchscarce ascomparedwiththetraditional wirednetworks. b) Availability: Serviceavailability becomesmoreimportant issuein MCCthanthat in thecloud computingwithwirednetworks. Mobileusersmaynotbeable to connect tothecloudtoobtainservicedueto traffic congestion, networkfailures, andtheout-of-signal. c) Heterogeneity: MCCwill beusedin thehighly heterogeneous networksin termsof wirelessnetworkinterfaces. Different mobile nodesaccessto thecloudthroughdifferent radio accesstechnologiessuch. Asaresult, anissueofhowto handlethewirelessconnectivity while satisfyingMCC’s requirementsarises.
  • 10. 2. IssuesinComputingSide: a) EnhancingtheEfficiencyofDataAccess:Withan increasingnumberof cloudservices, thedemandof accessing dataresources(e.g., image, files, anddocuments) onthe cloudincreases. Asaresult, amethodto deal with(i.e., store, manage, andaccess) dataresourcesoncloudsbecomesa significant challenge. However, handlingthedataresourceson cloudsis not aneasyproblemduetothelowbandwidth, mobility, andthelimitationof resourcecapacity of mobile devices. b) Security: Protectinguserprivacyanddata/applicationsecrecy fromadversary is akeyto establishandmaintain consumers’ trust in themobile platform,especially in MCC.Tocombat the security threats, current mobiledevicesrunthethreat detection servicesonthemobile deviceitself. Suchanexercisewarrants intensiveusageofresourcesbothin termsofcomputationand power. Apossiblesolutionis to comewithanewmodel of security wheredetectionservicescanbemovedto cloud. It significantly savesthedeviceCPUandmemoryrequirements but at thecost of increasingbandwidth. Suchanapproachhas several benefits: -- Better detectionofmalicioussoftware. -- Reduceon-deviceResourcesconsumption. -- Reduceon-deviceSoftwarecomplexity. 3. AbsenceofStandards: Althoughthey’reanumberof advantagesof MCC,thereis noopen acceptedstandardavailablefor Cloudcomputing. Followingarethe problemsexistingdueto lackof openstandards: a) Limitedscalability. b) Unreliableavailability of aservice, in caseofabreakdown.
  • 11. c) Serviceprovider lock-in, duetoabsenceof portability betweenvariousproviders. d) Unableto deployserviceovermultiple CCSPs,sincethere is nointeroperability betweenthem. CONTEXT-AWARECOMPUTING:
  • 12. Context-awarecomputingis amobile computingparadigmin which applicationscandiscoverandtakeadvantageofcontextual informationsuchas userlocation, timeof day,neighboringusersanddevices, anduseractivity. Whatis context-awarecomputing? It is definedassoftwarethat examinesandreacts to anindividual’s changing context. In other words, theapplicationis awareof its user’s stateand surroundings, andhelpsto adaptits behavior. Basicfunctionsofanycontext-awareapplication: 1. Presentationofinformationandservices: refers tofunctionsthat either present context informationto theuser, orusecontext topropose appropriateselectionsof actionstotheuser. Anexamplecanbeshowinga usertheir locationonamapandpossibly indicatingnearbysitesof interest orpresentingachoiceof servicescloseby. 2. Automaticexecutionofservices: describesfunctionsthat trigger a commandorreconfigurethesystemonbehalf of theuser accordingto context changes. Anexamplecanbeacar navigationsystemthat recomputesdrivingdirectionswhentheusermissesaturn.  3. Storageandretrievalofcontext information: applicationstag captureddatawithrelevant context information. Forexample, azoology applicationmaytagnotestakenbytheuser withthelocationandtimeof a speciesobservation. Frameworkofcontext-awaresystems: Fromthefunctional viewpoint, context-awaresystemscanberepresentedas alayeredframework. Thisframeworkconsistsof 5layers:
  • 13. 1. Thefirst layer (sensors) is acollectionof sensorsresponsible for raw datafromtheuser environment. (e.g. user device, social network, or useraccessnetwork) 2. Thesecondlayer(rawdataretrieval) makesuseofspecific applicationprogramminginterfacesorprotocolsto request datafrom thesensorlayer. Thesequeriesmustasfar aspossible be implementedin ageneric way,makingit possible toreplacesensors. 3. Thethird layer(preprocessing) is responsiblefor reasoningand interpretingcontextual information. It transformstheinformation returnedbytheunderlyinglayer toahigher abstractionlevel (e.g. it transformsaGPSpositiontoonesuchasat homeorat work). Not onlysensedordeduceddatahaveto bemodeled, but alsodata describingthem(e.g. accuracyandrecall, or lifecycleinformation). 4. Thefourth layer(storageandmanagement) organizesthegathered dataandmakesthemavailable tothirdparties’ applicationsin a synchronousor asynchronousway.In thefirst modethethird-party applicationsuseremotemethodcalls topoll theserver for changes. In thesecondmodetheysubscribeto specific eventsofinterest and
  • 14. arenotifiedwhentheeventoccurs(e.g. byacall back). 5. Thefifth layer (application) is wherethereactionsto context changes areimplemented(e.g. displayingtext in ahighercolour contrast if illuminationis bad). INTERNETOFTHINGS(IoT): Whatis IoT? TheInternet of Things, alsocalledTheInternet of Objects, refers toa wirelessnetworkbetweenobjects; usually thenetworkwill bewirelessand self-configuring, suchashouseholdappliances.
  • 15. CharacteristicsofIoT: 1. Ambient Intelligence 2. Event Driven 3. ComplexAccessTechnologies: 4. Semantic Sharing 5. Flexible Structure WhyIoT? 1. Dynamiccontrol of industry anddaily life. 2. Improvetheresourceutilizationratio. 3. Better relationshipbetweenhumanandnature. 4. Forminganintellectual entity byintegratinghumansociety and physical systems. 5. Universal transport andinternetworking EnablingTechnologiesofIoT: 1. RFID- Toidentify andtrackthedataof things. 2. Sensor - Tocollect andprocessthedatato detect thechangesin the physical statusofthings. 3. Smart Technologies- Toenhancethepowerof thenetworkby devolvingprocessingcapabilitiestodifferent part ofthenetwork. 4. NanoTechnologies- Tomakethesmaller andsmaller thingshavethe ability to connect andinteract. IoTapplicationsareapart ofvariousdomainslikefood, education, management, retail, logistics.