You are on page 1of 19

DFP6033 Secure Mobile Computing Version 1 :2018

TABLE OF CONTENTS
CHAPTER 12
2.0 MOBILE COMPUTING SYSTEM ARCHITECTURE

2.1 Introduction to mobile computing

2.1.1 Describe mobile computing aspect:


a. Mobile Communication
b. Mobile Hardware
c. Mobile Software

2.1.2 Evolution of mobile computing


2.1.3 Identify mobile computing:
a. Infrastructure
b. Communication
c. Devices
d. Platform
e. Application

2.1.4 Identify three tier architecture for mobile computing:


a. Presentation tiers
b. Application tiers
c. Data tiers

2.2 Understands wireless system architecture

2.2.1 Explain wireless system architecture:


a. Logical architecture of wireless network
b. Physical architecture of a wireless network
2.2.2 Identify wireless network system components
2.2.3 Discover cellular network basic concept
2.2.4 Identify the evolution of wireless generation
a. 1G
b. 2G
c. 3G
d. 4G
e. 5G
2.2.5 Explain information signal

2.3 Mobile computing OS

2.3.1 Discover mobile computing OS


a. iOS technology
b. Android technology

Copyright @2018 JUSRORIZAL FADLY JUSOH 1|Page


DFP6033 Secure Mobile Computing Version 1 :2018

2.1 Introduction to mobile computing

2.1.1 Describe mobile computing aspect:

a. Mobile Communication []

 It using mobile phones and portable computing devices such as smartphones


and tablet computers.
 It is talking, texting or sending data or image files over a wireless network
 An example of it is chatting on the cell phone with a friend, sending email
from a computer using a wireless network at your local coffee shop.
 Any radio telephone capable of operating while moving at any speed, battery
operated and small enough to be carried by a person comes under the mobile
communication systems.
 These communication systems may have different facilities.
 The different types of mobile communication systems are mobile two-way
radio, public land radio, mobile telephone and amateur radio.

b. Mobile Hardware[]

 It is includes mobile devices or device components


 A mobile device is an electronic device which its user can easily carry with
them.
 An examples are a mobile phone, PDA and handheld game consoles. 
 Mobile devices do not need an external power supply to work.
 It’s have a battery to hold electricity to work without electric wires.
 Laptop computers use x86-based CPUs.
 Smartphones and non-Windows tablets employ ARM processors.
 For example, Apple's A series, NVIDIA's Tegra, Qualcomm's Snapdragon,
Texas Instrument's OMAP and Samsung's Exynos chips are all based on ARM
chips.

c. Mobile Software[]

 It is deals with the characteristics and requirements of mobile applications.


 It also referred to mobile app is a computer program designed to run on a
mobile device such as a phone/tablet or watch.

2.1.2 Evolution of mobile computing[]

 The Idea of mobile computing has only been around since the 1990s.
 It has evolved from two-way radios that use large antennas to communicate
simple messages to three inch personal computers that can do almost everything
a regular computer does.
 People can’t go to their local Starbucks and not see a laptop linked up to a hotspot
Static network.
 This actually used to mean radio transmitters that operated on a stable base,
usually with the help of large antennas.

Copyright @2018 JUSRORIZAL FADLY JUSOH 2|Page


DFP6033 Secure Mobile Computing Version 1 :2018

 2 way radios used by police officers were also considered mobile technology but
now, it means people can connect wirelessly to the internet or to a private
network almost anywhere.
 As long as a person has one of the devices capable of wirelessly accessing the
internet, they are participating in mobile computing.
 Chances are, you have done it with a laptop computer or a personal digital
assistant or PDA.
 So they decide to come up with an idea of portable devices.
 These days, Pocket PCs are another way to conveniently access the internet on the
earth devices that have been developed for mobile computing has taken over the
wireless industry.
 This new type of communication is a very powerful tool for both businesses and
personal use.
 The portable computer has change computing world confiered to hundred years’
back.
 From huge machines that could not do much more than word processing to tiny
hand held device.
 It offers the opportunity to bring people together and give everyone access to a
greater wealth of information and knowledge, and to share their knowledge with
others.

2.1.3 Identify mobile computing:


a. Infrastructure[]

b. Communication[]

Copyright @2018 JUSRORIZAL FADLY JUSOH 3|Page


DFP6033 Secure Mobile Computing Version 1 :2018

c. Devices[]

 Types of mobile computing have been introduced since the 1990s including
the:
 Portable computers
It compact, lightweight units including a full character set keyboard and
primarily intended as hosts for software that may be parameterized, such
as desktops/laptops, smartphones/tablets, etc.
 Tablets
It is shaped like a paper notebook.
 Smartphones
It are the same devices as tablets
It are much smaller and pocket able.
It has a touchscreen including a combination of a virtual keyboard
It can also link to a physical keyboard via wireless Bluetooth or USB. It
can also have features other computer systems would not be able to
incorporate, such as built-in cameras, because of their portability.
 Cellular telephones
It can call from a distance through cellular networking technology.
 Wearable computers
It mostly limited to functional keys and primarily intended as
incorporation of software agents, such as bracelets, keyless implants, etc.
 A carputer 
It is installed in an automobile.
It operates as a wireless computer, sound system, GPS, and DVD player.
It also contains word processing software and is Bluetooth compatible.[4]
 Smart cards that can run multiple applications but are typically used for
payment travel and secure area access.

d. Platform []

 It is a group of technologies that are used as a base upon which other


applications, processes or technologies are developed.

Copyright @2018 JUSRORIZAL FADLY JUSOH 4|Page


DFP6033 Secure Mobile Computing Version 1 :2018

 It is the hardware and software environment for developing or can be run


mobile apps for a particular type of device such as laptops, tablets,
smartphones and other portable devices.
 Windows and Mac dominate the laptop world, with Linux a distant third.
 While iOS (Apple) and Android (Google) rule the smartphone universe, tablet
platforms are iOS (Apple), Android (Google) and Windows (Microsoft)

e. Application []

 It is most commonly referred to as an app


 It also may be known as an app, web app, online app, iPhone app or
smartphone app.
 Apps are generally small, individual software units with limited function
 It is a type of application software designed to run on a mobile device, such as
a smartphone or tablet computer.
 It is frequently serve to provide users with similar services to those accessed
on PCs.
 It also called mobile apps is a term used to describe Internet applications that
run on smartphones and other mobile devices.
 Mobile applications usually help users by connecting them to Internet services
more commonly accessed on desktop or notebook computers, or help them by
making it easier to use the Internet on their portable devices.
 A mobile app may be a mobile site bookmarking utility, a mobile-based
instant messaging client, Gmail for mobile, and many other applications.
 App software was originally popularized by Apple Inc. and its App Store,
which offers thousands of applications for the iPhone, iPad and iPod Touch.

2.1.4 Identify three tier architecture for mobile computing:


a. Presentation tiers
b. Application tiers
c. Data tiers

Copyright @2018 JUSRORIZAL FADLY JUSOH 5|Page


DFP6033 Secure Mobile Computing Version 1 :2018

 A three-tier architecture is a client-server architecture in which the functional


process logic, data access, computer data storage and user interface are
developed and maintained as independent modules on separate platforms.
 It is a software design pattern and a well-established software architecture.

1. Presentation Tier []

 It is occupies the top level and displays information related to services available
on a website. []
 It communicates with other tiers by sending results to the browser and other tiers
in the network[]
 It is the front end layer in the 3-tier system and consists of the user interface. []
 This user interface is often a graphical one accessible through a web browser or
web-based application and which displays content and information useful to an
end user. []
 It is deployed to a desktop, laptop, tablet or mobile device either via a web
browser or a web-based application utilizing a web server.
 It is often built on web technologies such as HTML5, JavaScript, CSS, or through
other popular web development frameworks, and communicates with others layers
through API calls. []

2. Application Tier []

 It also called the middle tier, logic tier, business logic or logic tier. []
 It is pulled from the presentation tier. []
 It controls application functionality by performing detailed processing. []
 It contains the functional business logic which drives an application’s core
capabilities.
 It is usually hosted on one or more application servers, also be hosted in the cloud,
or on a dedicated workstation depending on the complexity and processing power
needed by the application.
 It’s often written in Java, .NET, C#, Python, C++, etc.

3. Data Tier []

 It is houses database servers where information is stored and retrieved. []


 Data in this tier is kept independent of application servers or business logic. []
 It comprises of the database/data storage system and data access layer. []

Copyright @2018 JUSRORIZAL FADLY JUSOH 6|Page


DFP6033 Secure Mobile Computing Version 1 :2018

 It is normally comprise of one or more relational databases, big data sources, or


other types of database systems hosted either on-premises or in the cloud.
 An examples of such systems are MySQL, Oracle, PostgreSQL, Microsoft SQL
Server, MongoDB, etc. []
 Data is accessed by the application layer via API calls. []

 The Benefits of Using a 3-Layer Architecture for mobile computing. []

 There are many benefits to using a 3-layer architecture including speed of development,
scalability, performance and availability. 

 Speed []

 It can gives development teams the ability to develop and enhance a product with
greater speed than developing a singular code base because a specific layer can be
upgraded with minimal impact on the other layers.
 It can also help improve development efficiency by allowing teams to focus on
their core competencies.
 Many development teams have separate developers who specialize in front- end,
server back-end, and data back-end development.
 By modularizing these parts of an application you no longer have to rely on full
stack developers and can better utilize the specialties of each team.

 Scalability []

 By separating out the different layers you can scale each independently depending
on the need at any given time.
 For example, if you are receiving many web requests but not many requests which
affect your application layer, you can scale your web servers without touching
your application servers.
 Similarly, if you are receiving many large application requests from only a
handful of web users, you can scale out your application and data layers to meet
those requests without touch your web servers

 Performance []

 This allows you to load balance each layer independently, improving overall
performance with minimal resources.

Copyright @2018 JUSRORIZAL FADLY JUSOH 7|Page


DFP6033 Secure Mobile Computing Version 1 :2018

 With a full stack system you have to worry about a server going down and greatly
affecting performance throughout your entire system, but with a 3-layer application,
the increased independence created when physically separating different parts of an
application minimizes performance issues when a server goes down.

 Availability []

 By having disparate layers you can also increase reliability and availability by hosting
different parts of your application on different servers and utilizing cached results.
 Additionally, the independence created from modularizing the different tiers gives
you many deployment options.
 For example, you may choose to have your web servers hosted in a public or private
cloud while you’re application and data layers may be hosted onsite.
 Or you may have your application and data layers hosted in the cloud while your web
servers may be locally hosted, or any combination thereof.

Example of a 3-tier architecture: JReport.

 A simple example of a 3-tier architecture in action would be logging into a media


account such as Netflix and watching a video.
o You start by logging in either via the web or via a mobile application.
o Once you’ve logged in you might access a specific video through the Netflix
interface which is the presentation tier used by you as an end user.
o Once you’ve selected a video that information is passed on to the application tier
which will query the data tier to call the information or in this case a video back
up to the presentation tier.
o This happens every time you access a video from most media sites.

Copyright @2018 JUSRORIZAL FADLY JUSOH 8|Page


DFP6033 Secure Mobile Computing Version 1 :2018

2.2 Understands wireless system architecture

2.2.1 Explain wireless system architecture: []


a. Logical architecture of wireless network
 It is explained how packets of user traffic are moved across these topologies.
 The logical parts of computer networks entail the invocation of software to
“propel” the packets across the physical media and to receive them at the other
end.
 The logical network is not visible. It uses the physical network for transport of
data.

b. Physical architecture of a wireless network


 The physical network is easy to understand because it’s usually visible.
Mainly, it consists of hardware: the wiring, plugs such as computer ports,
printers, mail servers, and other devices that process and store our data.
 The physical network also includes the important (read: vital) signals that
represent the user data.
 Wireless connections are nonetheless physical, taking the form of
electromagnetic radio waves.
 How we explain the layout or topology of a wireless network is no different
from that of a wire-based network.
 As mentioned, the physical aspect of the network consists of the components
that support the physical connection between computers. In today’s networks,
four topologies are employed: (a) star, (b) ring, (c) bus, and (d)
cell. 

 Cellular topology is employed in wireless networks

Copyright @2018 JUSRORIZAL FADLY JUSOH 9|Page


DFP6033 Secure Mobile Computing Version 1 :2018

 Cellular networks use broadcast protocols; all nodes (cellular phones) are
capable of receiving transmissions on a control channel from a central site.
 A wireless control node (called the base station) uses this common channel to
direct a node to lock onto a specific (user) channel for its connection.
 During the ongoing connection, the cell phone is simultaneously
communicating with the base station with the control link and the user link.
 Cellular networks—The cell phone networks (WAN); Bluetooth (LAN); Wi-
Fi (LAN)

Figure: WAN Topology


2.2.2 Identify wireless network system components []

Figure: Wireless Networks Include Computer Devices, Base Stations, and a Wireless
Infrastructure

2.2.3 Discover cellular network basic concept []


 A cellular network or mobile network is a communication network where the last
link is wireless.

Copyright @2018 JUSRORIZAL FADLY JUSOH 10 | P a g e


DFP6033 Secure Mobile Computing Version 1 :2018

 The network is distributed over land areas called cells, each served by at least one
fixed-location transceiver, but more normally three cell sites or base transceiver
stations.
 These base stations provide the cell with the network coverage which can be used
for transmission of voice, data, and other types of content.
 A cell typically uses a different set of frequencies from neighbouring cells, to
avoid interference and provide guaranteed service quality within each cell.[10]
 When joined together, these cells provide radio coverage over a wide geographic
area.
 This enables a large number of portable transceivers (e.g., mobile
phones, tablets and laptops equipped with mobile broadband modems, pagers,
etc.) to communicate with each other and with fixed transceivers and telephones
anywhere in the network, via base stations, even if some of the transceivers are
moving through more than one cell during transmission.
 Cellular networks offer a number of desirable features:[10]
o More capacity than a single large transmitter, since the same frequency can be
used for multiple links as long as they are in different cells
o Mobile devices use less power than with a single transmitter or satellite since
the cell towers are closer
o Larger coverage area than a single terrestrial transmitter, since additional cell
towers can be added indefinitely and are not limited by the horizon
 Major telecommunications providers have deployed voice and data cellular
networks over most of the inhabited land area of Earth.
 This allows mobile phones and mobile computing devices to be connected to
the public switched telephone network and public Internet.
 Private cellular networks can be used for research [11] or for large organizations
and fleets, such as dispatch for local public safety agencies or a taxicab company.
[12]

2.2.4 Identify the evolution of wireless generation []

a. 1G

 1G system.
 1G specifications were released in 1990 to be used in GSM.
 1G systems are analogue systems such as AMPS that use FDM to divide
the bandwidth into specific frequencies that are assigned to individual
calls.

b. 2G
Copyright @2018 JUSRORIZAL FADLY JUSOH 11 | P a g e
DFP6033 Secure Mobile Computing Version 1 :2018

 2G system.
 These second-generation mobile systems are digital and use either TDMA
or CDMA method.
 Digital cellular systems use digital modulation and have several
advantages over analogue systems, including better utilisation of
bandwidth, more privacy, and incorporation of error detection and
correction.
 2.5G system.
   It was introduced mainly to add latest bandwidth technology to the
existing 2G generation.
 It supports higher-data-rate transmission for Web browsing and also
supports a new browsing format language called wireless application
protocol (WAP).
 The different upgrade paths include high-speed circuit-switched data
(HSCSD), GPRS and EDGE.
 HSCSD increases the available application data rate to 14.4 kbps as
compared to 9.6 kbps of GSM.
 By using four consecutive time slots, HSCSD is able to provide a raw
transmission rate of up to 57.6 kbps to individual users.
 GPRS supports multi-user network sharing of individual radio channels
and time slots.
 Thus GPRS supports many more users than HSCSD but in a bursty
manner.
 When all the eight time slots of a GSM radio channel are dedicated to
GPRS, an individual can achieve as much as 171.2 kbps.
 But this has not brought any new evolution.
 EDGE introduces a new digital modulation format called 8-PSK (octal
phase-shift keying).
 It allows nine different air interface formats, known as multiple
modulation and coding schemes, with varying degree of error control and
protection.
 These formats are automatically and rapidly selectable.
 Of course, the covering range is smaller in EDGE than in HSCSD or
GRPS.

c. 3G
 3G system. 
 To overcome the short-comings of 2G and 2.5G, 3G has been developed.
 It uses a wideband wireless network that offers increased clarity in
conversations.
 Countries throughout the world are currently determining new radio
spectrum bands to accommodate 3G networks.
 ITU has established 2500-2690MHz, 1700-1855MHz and 806-960MHz
bands. Here the target data rate is 2 Mbps.
 The data is sent through packet switching.
 Voice calls are interpreted through circuit switching.
 3G W-CDMA (UMTS). 
Copyright @2018 JUSRORIZAL FADLY JUSOH 12 | P a g e
DFP6033 Secure Mobile Computing Version 1 :2018

 Universal Mobile Telecommunication System (UMTS) or W-CDMA


assures backward compatibility with 2G and 2.5G TDMA technologies.
 W-CDMA, which is an air interface standard, has been designed for
always-on packet-based wireless service, so that computers and
entertainment devices may all share the same wireless network and
connect to the Internet anytime, anywhere.
 W-CDMA supports data rates of up to 2.048 Mbps if the user is stationary,
thereby allowing high-quality data, multimedia, streaming audio,
streaming video and broadcast type services to consumers.
 With W-CDMA, data rates from as low as 8 kbps to as high as 2 Mbps can
be carried simultaneously on a single W-CDMA 5MHz radio channel,
with each channel supporting between 100 and 350 simultaneous voice
calls at once, depending on antenna sectoring, propagation conditions, user
velocity and antenna polarisation.
 Time slots in W-CDMA are not used for user separation but to support
periodic functions. (This is in contrast to GSM where time slots are used to
separate users).
 The bandwidth per W-CDMA channel is 4.4 to 5 MHz.
 Since the global standard was difficult to evolve, three operating modes
have been specified: A 3G device will be a personal, mobile, multimedia
communication device (e.g., TV provider redirects a TV channel directly
to the subscriber’s phone where it can be watched).
 Second, it will support video conferencing, i.e., subscribers can see as well
as talk to each other.
 Third, it will also support location-based services, where a service provider
sends localised weather or traffic conditions to the phone or the phone
allows the subscriber to find nearby businesses or friends.
 3.5G. 
 It supports a higher through-put and speed at packet data rates of 14.4
Mbps, supporting higher data needs of consumers.

d. 4G
 It offers additional features such as IP telephony, ultra broadband Internet
access, gaming services and HDTV streamed multimedia.
 Flash-OFDM, the 802.16e mobile version of WiMax (also known as
WiBro in South Korea), can support cellular peak data rates of approx. 100
Mbps for high-mobility communications such as mobile access and up to 1
Gbps for low-mobility communications such as nomadic/local wireless
access, using scalable bandwidths of up to 40 MHz. The infrastructure for
4G is only packet-based (all-IP).

e. 5G
 5G systems
 Future generation after 4G system
 Hope 5G can problems such as call loss and difficulty in
connection leads to distrust in services and inconvenience to
users.

Copyright @2018 JUSRORIZAL FADLY JUSOH 13 | P a g e


DFP6033 Secure Mobile Computing Version 1 :2018

 So is there a solution? How significant a change can 5G bring


about?

 What’s new in 5G?


 Expectation high speed transmission rather than 4G.
 Let’s start with the introductory change in signal usage of the new telecom
tech.
 The ultra-high frequency was thought unsuitable for mobile data
communications until recently, but now parts of the spectrum will be
utilised by 5G.
 Another interesting feature is the line of sight (LOS) requirement.

2.2.5 Explain information signal

 Data is a type of information that the network stores in a computer or retrieves


from it.

 As a result, wireless networks transfer data from one computer to another.

 This data can include e-mail messages, files, web pages, video, music, and voice
conversations.

 Communications systems such as a wireless network symbolize data using codes


that electrical, radio, and light signals efficiently represent.

 The signals carry the information through the system from one point to another.
The signals are either digital or analog, depending on their location within the
system.

Copyright @2018 JUSRORIZAL FADLY JUSOH 14 | P a g e


DFP6033 Secure Mobile Computing Version 1 :2018

Digital Signals

 Which are found inside computers, vary in amplitude steps as time advances. (See
Figure 2 -.)

 Digital signals are usually binary (two-state);

 It is common to refer to the signal as a string of binary digits (bits) or binary data.

 Digital circuitry inside the computer easily stores and processes these digital
signals in binary form.

F
igure 2-: Digital Signals Are Ideal for Use in Computers

 Binary is a system that only uses 0s and 1s to represent the numbers.

 Conversions are easy from the more familiar decimal numbering system to binary,
and computers can readily store binary numbers.

 With some protocols, the binary values within a data frame represent specific
protocol information.

 One of the advantages of digital signals is easy signal regeneration.

 As a signal propagates through the air medium, it might encounter noise or


interference that changes the appearance of the signal's waveform.

 To clean up and regenerate the signal, digital circuitry can detect if a digital pulse
is present at a certain period of time and create a new pulse that is exactly equal to
the one originally sent.

 As a result, a digital signal can be sent over vast distances through periodic
repeaters while preserving the integrity of the information. This is not possible
with analog signals.

 For security purposes, it is often necessary to encrypt and later decode a signal at
the destination.
Copyright @2018 JUSRORIZAL FADLY JUSOH 15 | P a g e
DFP6033 Secure Mobile Computing Version 1 :2018

 This process is simple with digital signals because all that is necessary is to
rearrange the bits using some type of secret keying process. When the destination
receives the data, a device can use the same key and decrypt the data.

 The following defines important characteristics of digital signals:

 Data rate

 The data rate corresponds to the speed that a digital signal transfers data across
a wireless network.

 As a result, the data rate of a digital signal gives some insight on how long it
will take to send data from one point to another, as well as identify the amount
of bandwidth that the medium must supply to effectively support the signal.

 The data rate of a signal is equal to the total number of bits transmitted in
relation to the time it takes to send them.

 The common unit of measure for bit rate is bits per second (bps). As an
example, consider a signal that moves 1,000,000 bits in 1 second.

 The data rate is 1,000,000/1 = 1,000,000 bps (or 1 Mbps).

 Throughput

 Throughput is similar to data rate; however, throughput calculations generally


exclude the bits that correspond to the overhead that communications
protocols include.

 There are no standards for representing throughput, but it usually includes


only the actual information being sent across the network. As a result,
throughput gives a more accurate way of representing the true performance
and efficiency of a network. This makes throughput important when
comparing wireless networks because it's directly related to performance. The
higher the throughput, the higher the performance.

 The data rate of a wireless LAN, for example, might be 11 Mbps, but the
throughput might be only 5 Mbps. After removing the overhead—frame
headers, error checking fields, acknowledgement frames, and retransmissions
because of errors—the resulting information transfer is considerably lower. As
the number of users increases, contention for the shared medium increases,
which drives throughput even lower because computer devices (wireless NICs,
to be more precise) must wait longer before sending data. This delay, which is
a form of overhead, can significantly lower the throughput.

 With wireless networks, it is common to say that the system sends data bits. In
reality, a wireless network converts the binary digital signals into analog
before transmitting the signal through the air medium.

Copyright @2018 JUSRORIZAL FADLY JUSOH 16 | P a g e


DFP6033 Secure Mobile Computing Version 1 :2018

 Analog Signals

 An analog signal, shown in Figure 2 -, is one where the amplitude of the signal
varies continuously as time progresses.

 Much of the natural environment produces signals that are analog in form.
Examples of this are light and the human voice.

 Man-made signals, such as radio waves, are also analog in form.

Figure 2-: Analog Signals Carry Information through the Air Medium

 In the early days of electronic communication, most systems processed signals in


analog form, mainly because their inputs were information coming from humans.

 An analog signal has amplitude, in units of voltage or power, and a frequency


(having a specific number of cycles per second often referred to as Hertz).
Wireless networks generally use analog signals at 2.4 GHz, which is in a band of
frequencies referred to as radio waves.

 There are several different methods for describing the amplitude of wireless
signals. Refer to Chapter 3 for details on wireless analog signals.

2.3 Mobile computing OS

2.3.1 Discover mobile computing OS


a. iOS technology
 Apple iOS
 Apple's iOS mobile operating system powers the company's line of mobile
devices like the iPhone, iPad, iPodtouch and Apple TV.
 Apple iOS was originally called the iPhone OS but was renamed in 2010 to
reflect the operating system's evolving support for additional Apple devices.

Copyright @2018 JUSRORIZAL FADLY JUSOH 17 | P a g e


DFP6033 Secure Mobile Computing Version 1 :2018

 Apple updated iOS to iOS 9 in 2015 in conjunction with the company's OS X
El Capitan operating system release.

b. Android technology

 Google Android
 Google Android is a mobile operating system based on Linux that has quickly become
the biggest competitor to Apple iOS in the mobile device market. Google originally
released Android's source code under open sourcelicenses, and today the company
continues to develop the mobile OS privately prior to major update releases that are
made available to OEMs and the public.Manufacturers of Android-powered
smartphone and tablet devices include Samsung, Sony, Asus, Amazon, HTC and LG,
as well as Google itself.
 Windows Phone
 Originally called the Windows Mobile platform and then Windows Phone,
Microsoft's mobile OS is available on a variety of devices from a variety of wireless
operators. You will find Windows Phone on Microsoft hardware devices as well as
Nokia, Dell, HP, Motorola, Palm and i-mate products. Microsoft unveiled the latest
release of its mobile operating system, Windows 10 Mobile, in late 2015 as part of
the Windows 10 family of operating systems.

References

1. Vangie Beal (2015). Introduction to Mobile Devices


https://www.webopedia.com/quick_ref/mobile_OS.asp

2. Mobile communication
http://www.yourdictionary.com/mobile-communication

3. Definition of: mobile platform


https://www.pcmag.com/encyclopedia/term/47144/mobile-platform

4. What is a Platform? - Definition from Techopedia.


https://www.techopedia.com/definition/3411/platform

5. John Spacey, December 15, (2016). 7 Types of Computing Platform


https://simplicable.com/new/computing-platform

6. Vangie Beal mobile application


https://www.webopedia.com/TERM/M/mobile_application.html

7. Definition - What does Mobile Application (Mobile App) mean?


https://www.techopedia.com/definition/2953/mobile-application-mobile-app

8. Three-Tier Architecture
https://www.techopedia.com/definition/24649/three-tier-architecture
Copyright @2018 JUSRORIZAL FADLY JUSOH 18 | P a g e
DFP6033 Secure Mobile Computing Version 1 :2018

9. Jreport (2018) 3-Tier Architecture: A Complete Overview


https://www.jinfonet.com/resources/bi-defined/3-tier-architecture-complete-overview/

10. Sams (2009) Sams Teach Yourself Networking in 24 Hours, 4th Edition. ISBN-13: 978-
0-7686-8576-3

 
11. Guowang Miao; Jens Zander; Ki Won Sung; Ben Slimane (2016). Fundamentals of
Mobile Data Networks. Cambridge University Press. ISBN 1107143217.

12. Tom Simonite (24 January 2013). "Google's Private Cell Phone Network Could Be a
Threat to Cellular Carriers | MIT Technology Review". Technologyreview.com.
Retrieved 23 November 2013.

13.   "Be Mobile, Stay Connected | PMN". Privatemobilenetworks.com. Retrieved 23


November 2013

14. Dr John Deo. Jain (2017). Mobile Communication: From 1G to 4G.


https://electronicsforu.com/technology-trends/mobile-communication-1g-4g/4

Copyright @2018 JUSRORIZAL FADLY JUSOH 19 | P a g e

You might also like