Professional Documents
Culture Documents
Lecture - 7
Lecture - 7
Mobile OS
Course Outline
OS
Middleware
architecture
application development-communication-multimedia.
• Middleware dimensions:
• Request/Reply vs. Asynchronous Messaging
• Language-specific vs. Language-independent
• Proprietary vs. Standards-based
• Small-scale vs. Large-scale
• Tightly-coupled vs. Loosely-coupled components
Introduction to Mobile Operating System
There are many mobile operating systems.
The followings demonstrate the most important ones:
– Java ME Platform
– Palm OS
– Symbian OS
– Linux OS
– Windows Mobile OS
– BlackBerry OS
– iPhone OS
– Google Android Platform ...
Java ME Platform
• J2ME platform is a set of technologies, specifications
– Security model:
• Interrupts:
• Context switching:
• Hardware interrupt:
• Timer expiration:
A Palm device has ROM and RAM. Note:
There is no hard disk. The ROM
contains the OS and some other static
data.
he memory is divided into three logical
heaps namely Dynamic Heap, Storage
Heap and ROM Heap.
Dynamic Heap contains the operating
system’s global variables and data objects.
ROM Heap holds the operating system
kernel.
Storage Heap holds all the applications,
user data, system patches, and any other
persistent data in the system.
Memory Architecture
System Managers
The next layer is the system services.
respective managers.
The CPU, MMU and cache along with timers and hardware drivers,
all reside on the chip.
Symbian OS-architecture-controls-active
objects-localization
Symbian OS Architecture
Overview of a Symbian Application Framework
Components of a Symbian Application
Security Architecture
Symbian OS
• Symbian OS is 32 bit, little-endian operating system,
dependence on peripherals.
• Kernel offers hard real-time guarantees to kernel and user mode threads.
Windows Mobile OS
• Windows Mobile is a compact operating system
– BSD
– I/O component
– File Systems
– Networking components
The following is Mac OS X Architecture
iPhone OS
• Mac OS X has a preemptive multitasking environment.
• Preempting is the act of taking the control of operating system from one
• Not any application can directly modify the memory of the kernel.
– Scheduling
– Memory Allocation
– Keypad Interface
– I/O Interface
– Multimedia features
Mobile Worm
VIRUS stands for “vital information resource under seize”
It does not intentionally try to spread itself from infected computer to others.
Worm is a program that is designed to copy itself from one device to another .
Versatility
Propagation
Effectiveness
Functionality
Persistence
Attack vectors for mobile malware
Bluetooth
Wi-Fi
SMS/MMS
Internet
Serial/USB
Harm causes by mobile malware
Causing financial loss to the user
Q7: Explain the difference between Mobile Virus and Mobile Worm
Q9: What are the different application environments available for Symbian OS?
Q11: What are the different security procedures and protocols available on
Symbian OS?