0% found this document useful (0 votes)
28 views28 pages

Andriod Development Report

Uploaded by

athrav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
28 views28 pages

Andriod Development Report

Uploaded by

athrav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 28
A SEMINAR REPORT ON Android OS SUBMITTED BY Name : Ganesh Waghmare_ University Exam No. : 73384333 ‘UNDER GUIDANCE OF Prof. Smt. Sukhada Bhingarkar COMPUTER ENGINEERING DEPARTMENT, MAEER’S MIT COLLEGE OF ENGINEERING, PUNE, * 2009-2010 * MAHARASHTRA ACADEMY OF ENGINEERING AND EDUCATIONAL RESEARCH’S MIT COLLEGE OF ENGINEERING, PUNE DEPARTMENT OF COMPUTER ENGINEERING CERTIFICATE This is to certify that Mr. Ganesh Waghmare of TE Computer, Roll No. T3274, has successfully completed se Android OS To my satisfaction and submitted the same during the academie year 2009-2010 jar on towards the partial fulfillment of degree of Bachelor of Engineering under Pune University, under the Department of Computer Engineering , MIT College of Engineering, Pune, Prof. Sukhada Bhingarkar Prof. R. K. Bedi Seminar Guide HOD (Computer Department) ACKNOWLEDGEMENT It gives me immense pleasure in presenting seminar on the topic Android OS. I acknowledge the enormous assistance and excellent co-operation extended to by my respected guide Prof. (Smt.) Sukhada Bhingarkar. I would also like to thank the staff members for their valuable support. Lastly I would like to express my heartfelt indebtedness towards all those who have helped me directly or indirectly for the success of the seminar. - Mr. Ganesh Waghmare {Roll No. 13274) Table of Contents Chapter 2 2.1 Introduction Chapter 3 31 Features of Android OS ==» 7 Chapter 4 4.1 Android Architecture 4.1.1 Application Framework: Chapter 5 5.1 Architecture for Secure Data storage- Chapter 6 6.1 Execution Environment -~- 6.2 The Dalvik Virtual Machine~ Chapter 7 7.1 Lifecycle of an Android Application - 7.2 Security and permissions in Android 7.3 Development Tools Conclusion = - a naasenpeeamiats a GODS ALY Hansascansenscensensnccnssasetesanssensessnensunsnssessnnseessniensenensenneseesiee}7 White Paper cio Chapter 1 I. ABSTRACT Android is a software stack for mobile devices that includes an operating system, middleware and key applications. Android is a software platform and operating system for mobile devices based on the Linux operating system and developed by Google and the Open Handset Alliance. It allows developers to wile managed code in a Java-like language that utilizes Google-developed Java libraries, but does not support programs developed in native code. The un fing of the Android platform cin $ November 2007 was announced with the founding of the Open Handset Alliance, a consortium of 34 hardware, software and telecom companies devoted 10 advancing open standards for mobile devices, When released in 2008, most af the Android platform will be made available under the Apache free-software and open-source license. 1Open - Android allows to access core mobile device functionality through standard API calls, Atl applications are equal - Android does not differentiate between the phone's busic and third-party applications ~ even the dialer or home screen can be replaced. Breaking down boundaries - Combine information from the web with data on the phon user experiences, Fast and easy development - The SDK contsins what need to build and run Android applications, including a truc device emulator and advanced debugging tools. -~ such as contacts or geographic location -- to create new Chapter 2 2.1 Android is @ software stack for mobile devices that includes an operating system, middleware and TRODUCTION key applications. Android is-a software platform and operating system for mobile devices based on the Linux operating system and developed by Google and the Open Handset Alliance, It allows developers to wi ‘managed code in a Java-like language that utilizes Google-developed Java libraries, but does not support programs developed in native code. ‘The unveiling of the Android platform on 5 November 2007 was announced with the founding of the Open Handset Alliance, a consortium of 34 hardware, software and telecom companies devoted to advancing open standards for mobile devices. When released in 2008, most of the Android platform will be made available under the Apache free-software and open-source license, 2.1.1 THE BIRTH OF ANDROID Google Acquires Android Inc. In July 2005, Android's co-founders who went to work at Google included Andy Rubin (co-founder of Danger), Rich Google acquired Android Inc., a small startup company based in Palo Alto, CA. Miner (co-founder of Wildfire Communications, Inc), Nick Sears (once VP at T-Mobile), and Chris White (one of the first engineers at WebTV). At the time, little was known about the functions of Android I other than they made software for mobile phones. 2.1.2 Open Handset Alliance Founded On 5 November 2007, the Open Handset Alliance, a consortium of several companies which include Google, HTC, Intel, Motorola, Qualcomm, T-Mobile, Sprint Nextel and NVIDIA, was unveiled with the goal to develop open standards for mobile devices. Along with the formation of the Open Handset Alliance, the OHA also unveiled their first product, Android, an open source mobile device platform based on the Linux operating system. 2.1.3 Hardware Google has unveiled at least three prototypes for Android, at the Mobile World Congress on February 12, 2008. One prototype at the ARM booth displayed several basic Google applications, A ‘d-pad! control zooming of items in the dock with a relatively quick response. Chapter 3 3.1 Features of Android OS Application framework enabling reuse and replacement of components Dalvik virtual machine optimized for mobile devices Integrated browser based on the open source WebKit engine Optimized graphies powered by a cusiom 2D graphics library; 3D graphics based on the OpenGL ES 1.0 specification (hardware acceleration optional) SQLite for structured data storage Media support for common audio, video, and still image formats (MPEGS, AAC, AMR, JPG, PNG, GIF) GSM Telephony (hardware dependent) Bluetooth, EDGE, 3G, and WIFI (hardware dependent) Camera, GPS, compass, and accelerometer (hardware dependent) Rich development environment including a device emulator, tools for debugging, memory and performance profiling, and a plugin for the Eclipse IDE © Chapter 4 Peete) aid tee ota Figure 1: Architecture of Android OS 4.1.1 Application Framework Developers have full access to the same framework APIs used by the core applications, The application architecture is designed to simplify the reuse of components; any application can publish its capabilities and any other applieation may then make use of those capabi ies (subject to sceurity constraints enforced by the framework), This same mechanism allows components to be replaced by the user. Underlying all applications is a set of services and systems, including: A rich and extensible set of Views that can be used to build an appli boxes, buttons, and even an embeddable web browser jon, ineluding lists, grids, text ‘Content Providers that cnable applications to access data from other applications (such as Contacts), orto share their own data A Resource Manager, providing access to non-code resources such as localized strings, graphics, and lat files + A Notification Manager that enables all applications to display custom alerts in the status bar An Activity Manager that manages the life cycle of applications and provides a common navigation backstack 4.1.2 Libraries Android includes a set of C/C++ libraries used by various components of the Android system. These capal are exposed to developers through the Android application framework. Some of the core libraries are listed below: System C library - a BSD-derived implementation of the standard C system library (libe), tuned for embedded Linux-based devices Media Libraries - based on PacketVideo's Open CORE; the libraries support playback and recording of many popular audio and video formats, as well as statie image files, including MPEG4, H.264, MP3, AAC, AMR, JPG, and PNG 2D and 3D Surface Manager « manages access to the display subsystem and seamlessly composi graphic layers from multiple applications LibWebCore - a modem web browser engine which powers both the Android browser and an embeddable web view SGL - the underlying 2D graphies engine 3D libraries - an implementation based on OpenGL ES 1.0 APIs; the libraries use either hardware 3D acceleration (where available) or the included, highly optimized 3D software rasterizer Free Type - bitmap and yeetor font rendering SQLite -a powerful and lightweight relational database engine available to all applications. 10 4.13 Android Runtime Andioid includes a set of core libraries that provides most of the funetionality available in the core libraries of the Java programming language. Every Android application runs in its own process, with its own instance of the Dalvik virtual machine. Dalvik has been written so that a device can run multiple VMs efficiently. The Dalvik VM executes files in the Dalvik Executable (.dex) format which is optimized for ininimal memory footprint. The VM is régister-based, and runs classes compiled by a Java language compiler that have been transformed into the dex format by the included "dx" tool. The Dalvik VM relies ‘on the Linux kernel for underlying functionality such as threading and low-level memory management, At the same level there is Android Runtime, where the main component Dalvik Virtual Machine is located. It was designed specifically for Android running in limited environment, where the limited battery, CPU, memory and data storage are the main issues. Android gives an imegrated tool “dx”, which converts generated byte code from .jar to .dex file, after this byte code becomes much more efficient to run on the small processors, Figure 2: Conversion from java to dex file ‘As the result, it is possible to have multiple instances of Dalvik virtual machine running on the single device at the same time, The Core libraries are written in Java language and contains of the collection classes, the utilities, 1O and other tools. 4.1.4 Linux Kernal Android Architecture is based on Linux 2.6 kemel, It helps to manage security, memory management, process management, network stack and other important issues. Therefore, the user should bring Linux in his mobile device as the main operating system and install all the drivers required in order to run it, Android provides the support for the Qualeomm MSM7K chipset family. For instance, the current kernel tree supports Qualcomm MSM 7200A chipsets, but in the second half of 2008 we should see mobile devices with stable version Qualcomm MSM 7200, which includes major features: |, WCDMA/HSUPA and EGPRS network support 2. Bluetooth 1.2 and Wi support 3.Di | audio support for mp3 and other formats 4, Support for nux and other third-party operating systems S, Java hardware acceleration and support for Java applications 6. Qcamera up to 6.0 megapixels 7. gpsOne ~ solution for GPS 2 Chapter 5 5.1 Architecture for Secure Data Storage Resful Web Soren Figure 3 Android and Secure Local Data Storage Secure data storage solution that could potentially be deployed on Android. [tis as shown in the figure. However, many shortcomings of the design have been addressed. Additional security highlights will be presented at the end of the section, Using figure 3, we have the following workflow: 1, The user enters his credentials on the handset. 2. The credentials are not sent to the SSO service over the network. Instead, the credentials are used as the passphrase to deerypt the local publie/private key pair of the user. We define the public/private key pair to be of type RSA and of at least 4096 bits in size. Already we gain the advantage that the user's password is not sent over the network. 3. The private key is used to decrypt the symmetric cipher key. The symmetric cipher key is used to ‘enerypU/ decrypt any locally enehed data, A strong symmetric cipher like 3DES is used, 4. All data found in the local cache is encrypted with the symmetric cipher key defined in step #3. 5. If the requested data is not locally cached or expired. We must communicate with the SSO service again to be able to receive fresh data from the Restful web services. However, unlike the architecture presented in section 2 of this document, we login to the SSO server using a hostile challenge based ‘on the private key of the user. As such, we login with the SSO system using public/private key infrastructure, The user name and the password are never sent over the network. The SSO system ‘can identify the user based on this challenge and retums a 496 bit alpha numeric token. 6 The tokens generated by the SSO system are set to automatically expire after a given period of time. 7, On reception of the SSO token, The Anciroid background application can now communicate with any Restful web services that adhere to the same SSO federation, Public/private key inffastructure is, ‘once again used to setup-a secure communication channel between the phone and the server. The certificates of the servers that host the web services are procured from the same certificate authority ‘that shipped with the phone. 8. On reception of a request, the SSO token is extracted from the request. The web service ealts upon the SSO system to authorize the operation. 9. On reception of the data, the symmetric cipher described in bullet #3 above is used to encrypt the data before it reaches any local persistent storehouse. 10. Data is returned to the user facing application. Additional security not 1. The public/private key pair of the user is generated directly on the handset at install time, As such, the private key has never left the phone nor has it been transferred over any network. 2, The certificate of the user must af least be registered once in the SSO applicatian, This could be done at install time of the handset application. 3. “Man-in-the-middle”38 attacks are not possible since the application is deployed with the CA certificate of the company that will be Hosting the web services, 4. Ifthe device is lost, all the locally cached data is completely unreadable. The symmetric key that encrypted this data is also unreadable. The public’private keys that are central to the security architecture are protected by a passphrase, $. The passphrase is the weakest link in the chain, Ifthe user enters an overly simple password, access could be gained to the private key and hence the locally cached data. 6. That being said, it would be possible to further extend this architecture to store the enicrypted symmetric key on the server. This way, even if the passphrase of the private key is compromised, the locally cached data siill cannot be accessed. This is because the encrypted strong symmeirie cipher key is stored on the server. By the time the passphrase has been cracked, there has been ample time to report the stolen phone and revoke this key from this user account on the server, Furthermore, under this scheme, the key stored on the server is still encrypted. Even if this key is intercepted in tra useless without the user's private key. 7. Its also possible to enforee a strong password policy directly from the handset application, 8, Even if this design is significantly more secure than the previous iteration, to the user, the experience is the same. ‘The user must enter a username and password to prove his identify. 9, We could augment the architecture in yet another direction. The local caching system eauld also require an SSO token and subsequently request authorization from an SSO system. Such a design would, prevent terminated employees, i., an Individual who already knows what the local credentials are, from accessing the locally cached data 15 Chapter 6 6.1 Execution Environment tt ia i Figure 4 Regular Java Exeeution Process 16 ire 8 Android Exceution Environment v Figures 4 and 5 represent the regular Java and Android execution paths respectively. It is interesting to note here however is that the Android compilers do not operate on Java language code, Instead, the Android translators work on the resulting Java bytecode emitted from a jonal Java compiler As such, itis possible to reuse existing Java libraries, even if the original source code is not available, Such libraries must meet stringent requirements however, they need to: 1. adhere to the Java SE 5 dialect 2. not uée any Java classes or packages found in Java ‘not found in the Android platform 3, not use any packages or élasses specific to the Sun Microsystems platform 4, still behave in a predictable manner under the Apache Harmony Java environment Following these guidelines, it’s possible to intograte existing Java source code, packages and libraries piecemeal, Special care will be needed in the integration phase af such cade but the potential savings offered by such integration far ounweighs the cost of rewriting well-coded, well-documented and well-tested libraries ready for use, Furthermore, it is expected that has Apache Harmony matures, more and nore compatibility issues will be resolved further increasing the pool of available Java code that will be able to execute unmodified under the Android platform. 38 6.2 The Dalvik Virtual Machine The Dalvik Virtual Machine ‘The Dalvik virtual machine is an interpreter only machine optimized for use on low powered, low memory devices like phones. Notably, Dalvik does not make use of just im time (JIT) Compilation to improve the performance of an application at runtime, Furthermore, Dalvik is not a Java virtual machine, This is because Dalvik is unable to read Java bytecode34, instead it uses its own bytecode format called “dex”. Google claims this format allows battery power to be better-conserved at all different stages of execution of an application, This means that standard Java SE applications and libraries cannot be used directly on the Android Dalvik virtual machine D consumption, rich libraries, and unified, non-fragmented appli however stands at the center of the Android value proposition. Its low electrical power tion programming interfaces make it stand out, oF so Google hopes, over the fragmented ecosystem that is Java ME3S today. Furthermore, since Dalvik uses the Java programming language but not the Java exeeution environment (JVM), Google is free to develop Android without the need to license or obtain certification from Sun Microsystems Inc, the legal owner of the Java trademark and brands, 19 Chapter 7 7.1 Lifecycle of an Android Application In most cases, every Android application runs in its own Linux process. This process is exeated for the application when some of its code needs to be run, and will remain running until itis no longer needed and the system needs to reclaim its memory for use by other applications. An important and unusual feature of Android is that an application process's lifetime is aor directly controlled by the application itself, Instcad, it is determined by the system through a combination of the parts of the application that the system knows are running, how important these things are to the user, and how much overall memory is available in the system. 1 is imporiant that application developers understand how different application components (in particular Activity, Service, and IntentReceiver) impact the lifetime of the application's process. Not using these components correctly can result in the system killing the application's process while it is doing important work. A common example of a process life-cycle bug is an IntentReceiver that starts a thread when it receives an Intent in its onReceivelntent{) method, and then returns from the function, Once it retwms, the system considers that IntentReceiver to be no longer active, and thus its hosting process no longer needed (unless other application components are active in it). Thus, it may kill the process at any timie to reclaim memory, terminating the spawned thread that is running in it. The solution to this problem is to start a Service from the IntentR¢ eiver, so the system knows that there is still active work being done in the process. ‘To determine which processes should be killed when low on memory, Android places them into an “importance hierarehy” based on the components running in them and the state of those components, These are, in order of importance: 1. A foreground process is one holding an Activity at the top of the screen that the user is interacting with (its onResume (} method has been called) or an IntentReceiver that is currently running (its onReccivelntent () method is executing). There will only ever be a few such processes in the system, and these will only be killed:as a last resort if memory is so low that not even these processes can continue to run, Generally at this point the device has reached a memory paging state, so this ac to keep the user interface responsive, s required in order 20 2. A visible process is one holding an Activity that is visible to the user on-sereen but nat in the foreground {its onPause() method has been called). This may occur, for example, if the foreground activity has been displayed with a dialog appearance that allows the previous activity to be seen behind it, Such a process is considered exiremely important and will not be killed unless doing so is required 10 keep all foreground processes running. 3. A service pracess is one holding a Servive that has been started with the statServiee() method, Though these processes are not directly visible to the user, they are generally doing things that the user cares about (such as background mp3 playback or background network data upload or download), so the system will always keep such processes rutting unless there is not enough memory to retain all foreground and visible process. 4. A background process is one holding an Activity that is not curre ly visible to the user (its ‘onStop() method has been called). These processes have no direct impact on the user experience, Provided they implement their activity life cycle correctly (see Activity for more details), the system can kill such processes at any ti many of these processes running, so they are kept in an LRU list to ensure the process that was most recently seen by the user is the last to be killed when running low on memory. ye 10 reclaim memory for one of the three previous processes types. Usually there are 5. Anempty process is ane that doesn't hold any active application components. The only reason to keep such a process around is as a cache to improve startup time the next time a component of its application needs to run, As such, the system will often kill these processes in order to balance overall system resources between these empty cached processes and the underlying kernel caches. ‘When deciding how to classify a process, the system picks the most important level of all the components currently active in the process. 7.2 Security and Permissions in Android Android is a multisprocess system, where each application (and parts of the system) run enforced at the process level through siandard Linux facilities, such as user and group IDs thai are assigned io applications. Additional finer- own process. Most security between applications and the system is grained security features are provided through a “permission” mechanism that enforces restrictions on the specific operations that a particular process ean perform, Android mobile phone platform is going to be more secure than Apple's iPhone or any other device in the long run, There are several solutions nowadays to protect Google phone from various attacks. One of thom is security vendor McAfee, a member of Linux Mobile (LiMo) Foundation, This foundation joins particular companies to develop an open mobile-device software platform. the LiMo Foundation have also become members of the Open Handset Alliance (OHA). Jany of the companies listed in AS a result, Linux secure coding practice should successfully be built into the Android development process. However, open platform has its own disadvantages, such as source code vulnerability for black-hat hackers. In parallel with great opportunities for mobile application developers, there is an expectation for exploitation and harm. Stealthy Trojans hidden in animated images, particular viruses passed from friend to friend, used for spying and identity the, all these threats will be active for a long run. Another solution for such attacks is SMobile Systems mobile package. Security Shield ~an integrated application that includes anti-virus, anti-spam, firewall and other mobile protection is up and ready to run on the Android operating system. Currently, the main problem is availability for viruses to pose as an application and do things like dial phone numbers, send text messages or multi-media messages ‘or make connections to the Iniernet during normal device use. It is possible for somebody to use the GPS feature 10 track a person’s location without their knowledge. Hence SMobile Systems is ready to notify and block these secure alerts, But the truth is that it is not possible to secure r mobile device or personal computer completely, as it conneets to the intemet, And neither the Android phone nor other devices will prove to be the exception, 22 7.3 Development Tools ‘The Android SDK includes a variety of custom tools that help develop mobile applications on the Android platform, The most important of these are the Android Emulator and the Android Development ‘Tools plugin for Eclipse, but the SDK also includes a variety of other tools for debugging, packaging, and installing rapplications on the emulator. Android Emulator A virtual mobile deviee that runs on computer use the emulator to design, debug, and test applications in an actual Android run-time environment. Android Development Tools Plugin for the Eclipse IDE ‘The ADT plugin adds powerful extensions to the Eclipse integrated environment, making creating and debugging r Android applications easier and faster. If use Eclipse, the ADT plugin gives an incredible boost in developing Android applications; It gives access to other Android development tools from inside the Eclipse IDE. For example, ADT lets access the many capabi jes of the DDMS tool — taking sereenshots, managing port- forwarding, setting breakpoints, and viewing thread and process information — directly from Eclipse: 11 provides a New Project Wizard, which helps quickly create and set up all of the basic files*Il need for anew Android application, I automates and simplifies the process of building r Android application It provides an Android code editor that helps write valid XML for r Android manifest and resource files, Dalvik Debug Monitor Service (ddms) Integrated with Dulvik, the Android platforms custom VM, this tool lets manage processes: on an debugging, can usc it to kill processes, select a specific process to debug, emulator or device and assis generate trace data, view heap and thread information, take screenshots of the emulator or device, and mare. Android Debug Bridge (adh) 23 The ad toof lets install application's .apk files on an emulator or deviee and access the emulator or device from a command line. ean also use it to link a standard debugger to application code running on an Android emulator or device. Android Asset Packaging Too! (aapt) The aa tool lets create .apk files containing the binaries and resources of Android applications, Android Interface Description Language (aidl) Aidl Lets generate code for an interprocess interface, such as what a service might use. sqlite Included as a convenience, this tool lets access the SQLite data files created and used by Android applications ‘Trace view This tool produces graphical analysis views of trace log data that can generate from r Android application, mksdeard Helps create a disk image that can use with the emulator, to simulate the presence of an extemal storage card (such as an SD card). dx ‘The dx tool rewrites .class bytecode into Android bytecode (stored in .dex files.) activityCreator A script that generates Ant build files that can use to compile t Android applications. If are developing on Eclipse with the ADT plugin, won't need to use this seript, 24 Conclusion Android isa truly open, fice development platform based on Linux and open source, Handset makers can use and customize the platform without paying a royalty. A component-based architecture inspired by Internet mash-ups. Parts of one application can be used in another in ways not originally envisioned by the developer, can even replace buill-in components with own improved versions. This will unleash a new round of creativity in the mobile space. * Android is open to all: industry, developers and users © Participati many of the successful open source projects + Aims to be as easy ta build for as the web, © Google Android is stepping into the next level of Mobile Internet 2 References White paper for “A Spectrum White Paper: Thoughts on Google Android” fram Spectrum data ‘Technology. bttn//www.spectrumsdt.com http://code.google.com/android/ - Google Android official webpage |. http://www.openhandsetalliance.com/ - Open Handset Alliance webpage |. http://en.wikipedia.org/wiki/Android_{mobile_phone_platform)-Wikipedia information . http://googleblog.blogspot.com/ - Official Google Blog 26 Glossary SDK - Software Development Kit APIs - Application Program Interfaces GUI - Graphical User Interface OHA - Open Handset Alliance GPS — Global Positioning system LRU — Last Recently Used MITML ~ Mobile HTML QoS — Quality of Service WAP ~ Web Application Protocol CSD — Cireuit Switched Data OTA —Over-the-Air a is | 5 spectrum data technolo gies

You might also like