0% found this document useful (0 votes)
78 views9 pages

AOS Unit 4

The document discusses the requirements and features of handheld operating systems, focusing on Symbian OS and Palm OS, along with their advantages and disadvantages. It also provides an overview of Android architecture, its benefits, and security measures for handheld systems. The document emphasizes the importance of securing handheld devices to protect personal data and mitigate financial risks, while also addressing potential drawbacks of implementing security measures.

Uploaded by

Anuradha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
78 views9 pages

AOS Unit 4

The document discusses the requirements and features of handheld operating systems, focusing on Symbian OS and Palm OS, along with their advantages and disadvantages. It also provides an overview of Android architecture, its benefits, and security measures for handheld systems. The document emphasizes the importance of securing handheld devices to protect personal data and mitigate financial risks, while also addressing potential drawbacks of implementing security measures.

Uploaded by

Anuradha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

AOS - Unit - 4

Requirements for Operating system


Certainly! Handheld operating systems are specifically designed to run on devices with
lower-speed processors, limited memory, and fewer resources. These systems cater to
handheld devices such as Smartphones, tablets, and Personal Digital Assistants (PDAs). Let’s
delve into the details:

Features of Handheld Operating Systems:


Real-Time Operations:Handheld OS often provide real-time responses to user inputs and
sensor data..
Interrupt Handling: They efficiently manage interrupts, which are signals to the processor
indicating that an event needs immediate attention..
I/O Device Flexibility: Handheld OS can work with a variety of input/output devices,
adapting to different forms of user interaction.
Configurability: Users can customize and configure their devices to a great extent, tailoring
the experience to their needs.

TECHNOLOGY OVERVIEW OF HANDHELD OPERATING SYSTEM

Handheld operating systems (OS) are specialized platforms designed to run on mobile devices like
smartphones and tablets. These systems are optimized for the constraints of handheld devices, such as
limited processing power, memory, and battery life. Here’s an overview of the technology behind
handheld operating systems:

Core Technologies:

High-Processing Processors: Handheld devices require processors that can handle multitasking and
complex applications while being energy efficient.

Embedded Sensors: Modern handheld OS are equipped with support for a variety of sensors like
GPS, accelerometers, and gyroscopes to enhance user interaction

The evolution of handheld operating systems continues to be driven by advancements in hardware


technology and user demand for more powerful and intuitive user experiences.

Symbian OS

Symbian is a discontinued mobile operating system developed and sold by Symbian LTD. It
was a closed-source mobile operating system designed for smartphones in 1998. Symbian OS
was designed to be used on higher-end mobile phones. It was an operating system for mobile
devices which has limited resources, multitasking needs, and soft real-time requirements.

The Symbian operating system has evolved from the Pison EPOC, which was released on
ARM processors. In June 1998, the Pison software was named Symbian LTD as the result of
a joint venture between Psion and phone manufacturers Ericsson, Motorola, and Nokia.

In** 2008**, Nokia announced the accession of Symbian LTD, and a new open-source,
nonprofit organization called Symbian Foundation was established.

In May 2014 the development of Symbian OS was discontinued.

The Symbian OS was written in C++ language. Various versions of Symbian OS:
 EPOC32(Electronic Piece of Cheese)
 Symbian OS 6.0 and 6.1
 Symbian OS 6.2
 Symbian OS 7.0
 Symbian OS 7.0
 Symbian OS 8.0
 Symbian OS 9.1
 Symbian OS 9.3
 Symbian OS 9.5

Uses of Symbian OS
Symbian OS was designed to be used on higher-end mobile phones. The Symbian OS was a
mobile OS used on Nokia advanced smartphones. The majority of manufacturers of cell
phones used Symbian OS before Android. Nokia was a stakeholder and later purchased
Symbian LTD, which had created the Symbian operating system.

he Symbian operating system was discontinued because developers were not interested in
working with the operating system. Symbian OS was an open-source platform many
developers used and created many applications. Suddenly Android came into existence with
its not-so-good module and feature, which didn't get recognized. But after a few years,
Android was the most recognizable and used smartphone.

The problem arose because Nokia and Symbian were satisfied with the solution and never
accepted the radical changes in software technology. Nokia was adding new features and
improvements to the top. They didn't start working with the internal functionality of the
device. Because re-engineering the stuff inside is incredibly difficult and may result in
massive risk.

Unfortunately, Symbian OS is not the platform that caters to developers the most; it is viewed
as a programming environment with unique difficulties and difficult-to-learn procedures for
developers.

Incorrect choices made throughout the software design phase on such a platform may cause
substantial problems at the implementation stage.

Additionally, poor implementation techniques could make it more difficult to test and deploy
software.

Advantages of Symbian OS:

 Symbian OS provides open platform to enable independent technology and software


vendors to develop third party app.
 Symbian allowed impressive battery life.
 Symbian required lower hardware requirements.

Disadvantages of Symbian OS

 Symbian OS is dependent on Nokia


 Major drawback of Symbian os is it provided a late response as compared to ios and
Android.
 The touch of Symbian use devices are not as smooth as compared to ios and android
devices.

PALM OS

Introduction To Mobile Operating System – PALM OS

PALM OS is an operating system for personal digital assistants, designed for touchscreen. It
consists of a limited number of features designed for low memory and processor usage which
in turn helps in getting longer battery life.

Features of PALM OS

 Elementary memory management system.


 Provides PALM Emulator.
 Handwriting recognition is possible.
 Supports recording and playback.
 Supports C, and C++ software.

Application of PALM OS

 The User Interface in the architecture is used for graphical input-output.


 The Memory Management section is used for maintaining databases, global variables,
etc.
 System Management’s job is to maintain events, calendars, dates, times, etc.
 Communication TCP/IP as the name denotes is simply used for communication.
 Microkernel is an essential tool in architecture. It is responsible for providing the
mechanism needed for the proper functioning of an operating system.
Development Cycle

For the development of the PALM OS, these are the phases it has to go through before it can
be used in the market:

 Editing the code for the operating system that is checking for errors and correcting errors.
 Compile and Debug the code to check for bugs and correct functioning of the code.
 Run the program on a mobile device or related device.
 If all the above phases are passed, we can finally have our finished product which is the
operating system for mobile devices named PALM OS.

Advantages

 Fewer features are designed for low memory and processor usage which means longer
battery life.
 No need to upgrade the operating system as it is handled automatically in PALM OS.
 More applications are available for users.
 Extended connectivity for users. Users can now connect to wide areas.

Disadvantages

 The user cannot download applications using the external memory in PALM OS. It will
be a disadvantage for users with limited internal memory.
 Systems and extended connectivity are less compared to what is offered by other operating
systems.
ARCHITECTURE OF ANDROID
The Android architecture consists of a different number of components depending on the
needs of the device. Android software runs within Dalvik virtual machines, which are mostly
written in Java. In Android application development, many code snippets are copied and

pasted, resulting in spaghetti code.

The architecture of Android can be understood in several layers


1. Linux Kernel:
Android is built on top of the Linux kernel, which provides core system functionalities like
process management, memory management, device drivers, and networking.
2. Hardware Abstraction Layer (HAL):
HAL sits between the kernel and the upper layers of the Android stack. It provides a
standardized interface for hardware vendors to implement device-specific drivers.
3.Platform Libraries:
Android includes a set of native libraries written in C/C++, such as standard C library,
SQLite (database), OpenGL (graphics rendering), and others. These libraries are used by
various parts of the system and provide essential functionalities.
4.Android Runtime (ART):
ART is the runtime environment in which Android applications are executed. It
replaced the earlier Dalvik virtual machine. ART uses Ahead-of-Time (AOT)
compilation, which improves app performance by compiling bytecode into native
machine code during installation.
5. Application Framework:

This layer provides higher- level building blocks for developing Android applications. It
includes various APIs for activities, content providers, resource management, notifications,
and more. The core components of the application framework include Activity Manager,
Content Providers, Resource Manager, and Location Manager.
6. System Apps and User Apps:

Android includes a set of pre-installed system apps (e.g., Phone, Contacts, Settings)
and allows users to install their own apps from the Google Play Store or other sources.
These apps run within the Android application framework.

7. User Interface (UI):


The UI layer includes the graphical user interface components such as the status bar, home
screen, notification bar, and various widgets. Android provides a rich set of UI components
for building
interactive and visually appealing applications. Overall, Android's architecture is designed
to provide a flexible, customizable, and secure platform for running mobile devices and
applications.

Advantages of Android:
1. Open Source:

Android is an open-source platform, allowing developers to customize and modify the


operating system according to their needs. This fosters innovation and a vibrant ecosystem of
apps and devices.
2. Wide Device Variety:

Android runs on a wide range of devices, including smartphones, tablets, smartwatches,


TVs, and even cars. This diversity gives users a lot of options to choose from based on their
preferences and budget.
3. Customization:

Android offers extensive customization options for both users and developers. Users can
customize their device's appearance, home screen layout, and install third-party apps to
tailor their experience. Developers can also create custom ROMs, launchers, and apps to
enhance functionality.
4. Google Integration:
Android seamlessly integrates with Google services such as Gmail, Google Drive,
Google Maps, and Google Assistant. This provides users with a cohesive experience
across multiple devices and services.
5. Large App Ecosystem:

The Google Play Store offers a vast library of apps, ranging from productivity tools to
games and entertainment. Android users have access to millions of apps, providing them
with endless
possibilities for entertainment, productivity, and
utility. Disadvantages of Android
1. Fragmentation:
Android fragmentation refers to the wide variety of devices running different versions of
the Android operating system. This makes it challenging for developers to ensure consistent
performance and compatibility across all devices.
2. Security Concerns:
Due to its open nature, Android is more susceptible to malware, viruses, and security
breaches compared to closed systems like iOS. Users may inadvertently download
malicious apps from third- party sources, leading to compromised security and privacy.
3. Software Updates:
Android software updates are often delayed or inconsistent across devices and
manufacturers.
Some devices may not receive timely updates to the latest Android versions or security
patches, leaving them vulnerable to security threats and missing out on new features.
4.Performance Variability:
The performance of Android devices can vary significantly depending on factors such as
hardware specifications, software optimization, and user customization. Lower-end devices
may experience
lag, stuttering, and slower performance compared to high-end devices.

5. Bloatware:
Many Android devices come pre-installed with bloatware, which are unnecessary apps
and software added by manufacturers or carriers. This not only consumes storage space but
also affects device performance and user experience.
SECURING HANDHELD SYSTEM:

Use device antivirus and firewall software when available. Install updates as they become
available to fix security issues with your device. Do not open attachments or follow links sent from
individuals you do not know as this may result in malware being installed on your device.
Securing a handheld system, such as a smartphone or tablet, involves several measures to
protectboth the device and the data it contains. Here are some steps you can take:

1. Use strong passwords or biometric authentication:


Set up a strong password, PIN, or use biometric authentication methods like fingerprint
or facial recognition to lock your device. This prevents unauthorized access in case the
device is lost or stolen.
2. Enable device encryption:
Most modern handheld devices offer encryption features that protect data stored on the
device from being accessed without the proper credentials. Enable encryption to safeguard
sensitive
information.
3. Keep software up to date:

Regularly update your device's operating system and applications to ensure you have
the latest security patches and bug fixes. This helps protect against known vulnerabilities
that could be exploited by attackers.
4.Install security software:
Consider installing reputable antivirus and security software on your handheld device to
detect and remove malware, as well as provide additional security features like remote
locking and wiping in case of loss or theft.
5. Use secure Wi-Fi connections:
Avoid connecting to unsecured Wi-Fi networks, especially when accessing sensitive
information or conducting financial transactions. Use virtual private networks (VPNs) for
added security when connecting to public Wi-Fi hotspots.
6. Be cautious with app permissions:
Review the permissions requested by apps before installing them and only grant
access to the information and features they truly need to function. Limit the use of apps
that require excessive permissions.
7. Backup data regularly:
Regularly back up your data to a secure location, either through cloud storage services or by
transferring files to a computer. This ensures that important information can be recovered in case of
device loss, damage, or data corruption.

8. Enable remote tracking and wiping:


Activate built-in features or use third-party services that allow you to remotely track the
location of your device and remotely wipe its data in case it's lost or stolen. This helps prevent
unauthorizedaccess to sensitive information.

By implementing these security measures, you can significantly reduce the risk of
unauthorized access to your handheld system and protect the data it contains.

Advantages of securing handheld system:


1. Protection of Personal Data:

Securing handheld systems prevents unauthorized access to sensitive personal information,


suchas contacts, emails, messages, and photos, reducing the risk of identity theft or privacy
breaches.

2. Prevention of Data Loss:


By implementing security measures like data encryption and regular backups, handheld systems
can safeguard important data against loss due to theft, da ge, or software issues.

3. Mitigation of Financial Risks:


Protecting handheld devices against cyber threats like malware and phishing helps prevent
unauthorized transactions or financial fraud, reducing the potential for financial losses.
4. Enhanced Productivity:
Secure handheld systems enable users to work efficiently without concerns about data
security,allowing them to access corporate resources, collaborate with colleagues, and perform
ta remotelywith confidence.

5. Securing Online Transactions:


Handheld systems often facilitate online transactions, such as mobile banking or shopping.
Securing these devices with features like secure sockets layer (SSL) and two-factor authentication
(2FA) can prevent fraud and ensure safe transactions.

Disadvantages of securing handheld system:

1. Performance Impact:
Implementing security measures can consume system resources, leading to slower
performance or decreased battery life on handheld devices.

2. Usability Challenges:
Increased security measures may introduce additional steps or authentication requirements,
potentially complicating the user experience an↓ king it less convenient to use the device.

3. Cost:
Implementing robust security features often requires investment in hardware, software, and
ongoing maintenance, which can increase the overall cost of the handheld system.

4. Compatibility Issues:
Some security solutions may not be compatible with certain applications or hardware
configurations, limiting the functionality or interoperability of the handheld device.

5. Overhead:
Constant monitoring and enforcement of security protocols can introduce overhead, impacting the
responsiveness and agility of the handheld system.

You might also like