Mobile App Dev Econtent
Mobile App Dev Econtent
Computer Engineering
6th Semester
Introduction to Mobile Computing
• The rapidly expanding technology of cellular
communication, wireless LANs, and satellite services will
make information accessible anywhere and at any time.
Regardless of size, most mobile computers will be
equipped with a wireless connection to the fixed part of
the network, and, perhaps, to other mobile computers.
The resulting computing environment, which is often
referred to as mobile computing
• Mobile Computing is an umbrella term used to describe
technologies that enable people to access network
services anyplace, anytime, and anywhere.
Introduction to Mobile Computing
A communication device can exhibit any one of the following
characteristics:
• Fixed and wired: This configuration describes the typical
desktop compute rin an office. Neither weight nor power
consumption of the devices allow for mobile usage.
• Mobile and wired: Many of today’s laptops fall into this
category; users carry the laptop from one hotel to the next,
reconnecting to the company’s network via the telephone
network and a modem.
• Fixed and wireless: This mode is used for installing networks,
e.g., in historical buildings to avoid damage by installing wires,
or at trade shows to ensure fast network setup.
• Mobile and wireless: This is the most interesting case. No
cable restricts the user, who can roam between different
wireless networks.
Main principles
Main principles
• Portability: Facilitates movement of device(s) within the
mobile computing environment.
• Connectivity: Ability to continuously stay connected with minimal
amount of lag/downtime, without being affected by movements of
the connected nodes
• Social Interactivity: Maintaining the connectivity to collaborate
with other users, at least within the same environment.
• Individuality: Adapting the technology to suit individual needs. Or
• Portability: Devices/nodes connected within the mobile computing
system should facilitate mobility.
• Connectivity: This defines the quality of service (QoS) of the
network connectivity.
• Interactivity: The nodes belonging to a mobile computing system
are connected with one another to communicate and collaborate
through active transactions of data.
Mobile Computing Architecture
Mobile Computing Architecture
• Presentation Layer (UI):
– This layer presents data to the user and optionally
permits data manipulation and data entry, also
this layer requests the data form Business layer.
– This layer accomplished through use of Dynamic
HTML and client-side data sources and data
cursors.
Mobile Computing Architecture
• Application Layer (AL):
– The business logic acts as the server for client
requests from workstations. It acts according Business
rules fetch or insert data through the Data Layer.
– In turn, it determines what data is needed (and where
it is located) and acts as a client in relation to a third
tier of programming that might be located on a local
or mainframe computer.
– Because these middle-tier components are not tied to
a specific client, they can be used by all applications
and can be moved to different locations, as response
time and other rules require.
Mobile Computing Architecture
• Data Access Layer (DA):
– The third tier of the 3-tier system is made up of
the DBMS that provides all the data for the above
two layers.
– This is the actual DBMS access layer.
– Avoiding dependencies on the storage
mechanisms allows for updates or changes
without the application tier clients being affected
by or even aware of the change.
Mobile computing security issues
• Confidentiality: Preventing unauthorized users from gaining
access to critical information of any particular user.
• Integrity: Ensures unauthorized modification, destruction or
creation of information cannot take place.
• Availability: Ensuring authorized users getting the access they
require.
• Legitimate: Ensuring that only authorized users have access to
services.
• Accountability: Ensuring that the users are held responsible
for their security related activities by arranging the user and
his/her activities are linked if and when necessary.
Mobile computing security issues
• Denial of Service (DOS) attacks: It's one of common attacks which mean
the prevent of users from using network services by sending large
amounts of unneeded data or connection requests to the communication
server by an attacker.
• Traffic Analysis: It's identifying and monitoring the communicating
between users through listening to traffic flowing in the wireless channel,
in order to access to private information of users that can be badly used
by attacker.
• Eavesdropping: The attacker can be log on to the wireless network and get
access to sensitive data, this happens if the wireless a network was not
enough secure and also the information was not encrypted.
• Spoofing: The attacker is impersonating an authorized account of another
user to access sensitive data and unauthorized services.
• Captured and Re transmitted Messages: Its can get some of network
services to attacker by get unauthorized access through capture a total
message and replay it with some modifications to the same destination or
another
Mobile computing Devices
• Laptop Computers
• Tablets
• Smartphones
• E-Readers
• LCD Display
• Handheld Gaming Devices
Types of Wireless Communication
Technologies
• Satellite communication is one of the wireless
technologies, which is widely spread all over the
world allowing users to stay connected virtually
anywhere on the Earth
• Wireless Networking Wireless Networking
technologies connect multiple computers,
systems and devices together without
requiring wires or cables: a wireless local area
network or WLAN comes under Wi-Fi.
Types of Wireless Communication
Technologies
• WiMAX - There are wireless broadband systems that offer fast
Web surfing without being getting connected through cable or
DSL (Example of wireless broadband is WiMAX)
• Wi-Fi - Wi-Fi is a form of low-power wireless communication
used by many electronic devices such as laptops, systems,
smart phones, etc. In a Wi-Fi setup, a wireless router serves as
the communication hub. These networks are extremely
limited in range due to low power of transmissions allowing
users to connect only within close proximity to a router or
signal repeater.
Types of Wireless Communication
Technologies
• Bluetooth technology - allows you to connect a variety of
different electronic devices wirelessly to a system for the
transfer and sharing of data and this is the main function of
Bluetooth. Cell phones are connected to hands-free
earpieces, wireless keyboard, mouse and mike to laptops with
the help of Bluetooth as it transmits information from one
device to other device.
• ZigBee is a wireless communication standard designed to
address the unique needs of low-power, low-cost wireless
sensor, and control networks. ZigBee can be used almost
anywhere, as it is easy to implement and requires little power
to operate.
Bluetooth
• Bluetooth is a network technology that connects mobile
devices wirelessly over a short-range to form a personal area
network (PAN). They use short-wavelength, ultra-high
frequency (UHF) radio waves within the range 2.400 to 2.485
GHz, instead of RS-232 data cables of wired PANs.
Bluetooth
Features of Bluetooth
• Bluetooth technology was released in 1999 as Bluetooth 1.0, by
Special Interest Group (SIG) who continues to manage it.
• It was initially standardized as IEEE 802.15.1.
• Mobile computing devices and accessories are connected wirelessly
by Bluetooth using short-range, low-power, inexpensive radios.
• A PAN or a piconet can be created by Bluetooth within a 10 m
radius.
• Presently, 2 to 8 devices may be connected.
• Bluetooth protocols allow devices within the range to find
Bluetooth devices and connect with them. This is called pairing.
Once, the devices are paired, they can transfer data securely.
• Bluetooth has lower power consumption and lower implementation
costs than Wi-Fi. However, the range and transmission speeds are
typically lower than Wi-Fi.
WiMAX
• WiMAX is a short name for Worldwide Interoperability of
Microwave Access. WiMAX is described in IEEE 802.16 Wireless
Metropolitan Area Network (MAN) standard. It is expected that
WiMAX compliant systems will provide fixed wireless alternative to
conventional DSL and Cable Internet. Typically, a WiMAX system
consists of two parts:
• A WiMAX Base Station: Base station consists of indoor electronics
and a WiMAX tower. Typically, a base station can cover up to 10 km
radius (Theoretically, a base station can cover up to 50 kilo meter
radius or 30 miles, however practical considerations limit it to about
10 km or 6 miles). Any wireless node within the coverage area
would be able to access the Internet.
• A WiMAX Receiver - The receiver and antenna could be a stand-
alone box or a PCMCIA card that sits in your laptop or computer.
Access to WiMAX base station is similar to accessing a Wireless
Access Point in a WiFi network, but the coverage is more.
INTRODUCTION TO ANDROID
ANDROID
• Android is a mobile operating system that is
based on a modified version of Linux.
• It was originally developed by a start-up of the
same name, Android, Inc.
• In 2005, as part of its strategy to enter the
mobile space, Google purchased Android and
took over its development work.
Features of Android
• Storage — Uses SQLite, a lightweight relational
database, for data storage.
• Connectivity — Supports GSM/EDGE, IDEN, CDMA,
EV-DO, UMTS, Bluetooth (includes A2DP and AVRCP),
Wi-Fi, LTE, and WiMAX.
• Messaging — Supports both SMS and MMS. Chapter
8 discusses messaging in more detail.
• Web browser — Based on the open source WebKit,
together with Chrome’s V8 JavaScript
Features of Android
• Hardware support — Accelerometer Sensor, Camera,
Digital Compass, Proximity Sensor, and GPS
• Multi-touch — Supports multi-touch screens
• Multi-tasking — Supports multi-tasking applications
• Tethering — Supports sharing of Internet
connections as a wired/wireless hotspot
Architecture of Android
• The Android OS is roughly divided into five
sections in four main layers:
➤ Linux kernel — This is the kernel on which
Android is based. This layer contains all the low
level device drivers for the various hardware
components of an Android device.
➤ Libraries — These contain all the code that
provides the main features of an Android OS. For
example, the SQLite library provides database
support so that an application
Architecture of Android
➢ Android runtime At the same layer as the libraries, the
Android runtime provides a set of core libraries that enable
developers to write Android apps using the Java
programming language.
➢ Application framework — Exposes the various capabilities
of the Android OS to application developers so that they
can make use of them in their applications.
➢ Applications — At this top layer, you will find applications
that ship with the Android device (such as Phone, Contacts,
Browser, etc.), as well as applications that you download
and install from the Android Market. Any applications that
you write are located at this layer.
Architecture of Android
Activity, Fragments
• An application can have zero or more activities.
Typically, applications have one or more activities; and
the main purpose of an activity is to interact with the
user.
• From the moment an activity appears on the screen to
the moment it is hidden, it goes through a number of
stages, known as an activity’s life cycle.
• Understanding the life cycle of an activity is vital to
ensuring that your application works correctly.
• Fragments as “miniature” activities that can be
grouped to form an activity.
Activity Lifecycle
COMPONENTS OF A SCREEN