AOS Unit 4
AOS Unit 4
Handheld operating systems (OS) are specialized platforms designed to run on mobile devices like
smartphones and tablets. These systems are optimized for the constraints of handheld devices, such as
limited processing power, memory, and battery life. Here’s an overview of the technology behind
handheld operating systems:
Core Technologies:
High-Processing Processors: Handheld devices require processors that can handle multitasking and
complex applications while being energy efficient.
Embedded Sensors: Modern handheld OS are equipped with support for a variety of sensors like
GPS, accelerometers, and gyroscopes to enhance user interaction
Symbian OS
Symbian is a discontinued mobile operating system developed and sold by Symbian LTD. It
was a closed-source mobile operating system designed for smartphones in 1998. Symbian OS
was designed to be used on higher-end mobile phones. It was an operating system for mobile
devices which has limited resources, multitasking needs, and soft real-time requirements.
The Symbian operating system has evolved from the Pison EPOC, which was released on
ARM processors. In June 1998, the Pison software was named Symbian LTD as the result of
a joint venture between Psion and phone manufacturers Ericsson, Motorola, and Nokia.
In** 2008**, Nokia announced the accession of Symbian LTD, and a new open-source,
nonprofit organization called Symbian Foundation was established.
The Symbian OS was written in C++ language. Various versions of Symbian OS:
EPOC32(Electronic Piece of Cheese)
Symbian OS 6.0 and 6.1
Symbian OS 6.2
Symbian OS 7.0
Symbian OS 7.0
Symbian OS 8.0
Symbian OS 9.1
Symbian OS 9.3
Symbian OS 9.5
Uses of Symbian OS
Symbian OS was designed to be used on higher-end mobile phones. The Symbian OS was a
mobile OS used on Nokia advanced smartphones. The majority of manufacturers of cell
phones used Symbian OS before Android. Nokia was a stakeholder and later purchased
Symbian LTD, which had created the Symbian operating system.
he Symbian operating system was discontinued because developers were not interested in
working with the operating system. Symbian OS was an open-source platform many
developers used and created many applications. Suddenly Android came into existence with
its not-so-good module and feature, which didn't get recognized. But after a few years,
Android was the most recognizable and used smartphone.
The problem arose because Nokia and Symbian were satisfied with the solution and never
accepted the radical changes in software technology. Nokia was adding new features and
improvements to the top. They didn't start working with the internal functionality of the
device. Because re-engineering the stuff inside is incredibly difficult and may result in
massive risk.
Unfortunately, Symbian OS is not the platform that caters to developers the most; it is viewed
as a programming environment with unique difficulties and difficult-to-learn procedures for
developers.
Incorrect choices made throughout the software design phase on such a platform may cause
substantial problems at the implementation stage.
Additionally, poor implementation techniques could make it more difficult to test and deploy
software.
Disadvantages of Symbian OS
PALM OS
PALM OS is an operating system for personal digital assistants, designed for touchscreen. It
consists of a limited number of features designed for low memory and processor usage which
in turn helps in getting longer battery life.
Features of PALM OS
Application of PALM OS
For the development of the PALM OS, these are the phases it has to go through before it can
be used in the market:
Editing the code for the operating system that is checking for errors and correcting errors.
Compile and Debug the code to check for bugs and correct functioning of the code.
Run the program on a mobile device or related device.
If all the above phases are passed, we can finally have our finished product which is the
operating system for mobile devices named PALM OS.
Advantages
Fewer features are designed for low memory and processor usage which means longer
battery life.
No need to upgrade the operating system as it is handled automatically in PALM OS.
More applications are available for users.
Extended connectivity for users. Users can now connect to wide areas.
Disadvantages
The user cannot download applications using the external memory in PALM OS. It will
be a disadvantage for users with limited internal memory.
Systems and extended connectivity are less compared to what is offered by other operating
systems.
ARCHITECTURE OF ANDROID
The Android architecture consists of a different number of components depending on the
needs of the device. Android software runs within Dalvik virtual machines, which are mostly
written in Java. In Android application development, many code snippets are copied and
This layer provides higher- level building blocks for developing Android applications. It
includes various APIs for activities, content providers, resource management, notifications,
and more. The core components of the application framework include Activity Manager,
Content Providers, Resource Manager, and Location Manager.
6. System Apps and User Apps:
Android includes a set of pre-installed system apps (e.g., Phone, Contacts, Settings)
and allows users to install their own apps from the Google Play Store or other sources.
These apps run within the Android application framework.
Advantages of Android:
1. Open Source:
Android offers extensive customization options for both users and developers. Users can
customize their device's appearance, home screen layout, and install third-party apps to
tailor their experience. Developers can also create custom ROMs, launchers, and apps to
enhance functionality.
4. Google Integration:
Android seamlessly integrates with Google services such as Gmail, Google Drive,
Google Maps, and Google Assistant. This provides users with a cohesive experience
across multiple devices and services.
5. Large App Ecosystem:
The Google Play Store offers a vast library of apps, ranging from productivity tools to
games and entertainment. Android users have access to millions of apps, providing them
with endless
possibilities for entertainment, productivity, and
utility. Disadvantages of Android
1. Fragmentation:
Android fragmentation refers to the wide variety of devices running different versions of
the Android operating system. This makes it challenging for developers to ensure consistent
performance and compatibility across all devices.
2. Security Concerns:
Due to its open nature, Android is more susceptible to malware, viruses, and security
breaches compared to closed systems like iOS. Users may inadvertently download
malicious apps from third- party sources, leading to compromised security and privacy.
3. Software Updates:
Android software updates are often delayed or inconsistent across devices and
manufacturers.
Some devices may not receive timely updates to the latest Android versions or security
patches, leaving them vulnerable to security threats and missing out on new features.
4.Performance Variability:
The performance of Android devices can vary significantly depending on factors such as
hardware specifications, software optimization, and user customization. Lower-end devices
may experience
lag, stuttering, and slower performance compared to high-end devices.
5. Bloatware:
Many Android devices come pre-installed with bloatware, which are unnecessary apps
and software added by manufacturers or carriers. This not only consumes storage space but
also affects device performance and user experience.
SECURING HANDHELD SYSTEM:
Use device antivirus and firewall software when available. Install updates as they become
available to fix security issues with your device. Do not open attachments or follow links sent from
individuals you do not know as this may result in malware being installed on your device.
Securing a handheld system, such as a smartphone or tablet, involves several measures to
protectboth the device and the data it contains. Here are some steps you can take:
Regularly update your device's operating system and applications to ensure you have
the latest security patches and bug fixes. This helps protect against known vulnerabilities
that could be exploited by attackers.
4.Install security software:
Consider installing reputable antivirus and security software on your handheld device to
detect and remove malware, as well as provide additional security features like remote
locking and wiping in case of loss or theft.
5. Use secure Wi-Fi connections:
Avoid connecting to unsecured Wi-Fi networks, especially when accessing sensitive
information or conducting financial transactions. Use virtual private networks (VPNs) for
added security when connecting to public Wi-Fi hotspots.
6. Be cautious with app permissions:
Review the permissions requested by apps before installing them and only grant
access to the information and features they truly need to function. Limit the use of apps
that require excessive permissions.
7. Backup data regularly:
Regularly back up your data to a secure location, either through cloud storage services or by
transferring files to a computer. This ensures that important information can be recovered in case of
device loss, damage, or data corruption.
By implementing these security measures, you can significantly reduce the risk of
unauthorized access to your handheld system and protect the data it contains.
1. Performance Impact:
Implementing security measures can consume system resources, leading to slower
performance or decreased battery life on handheld devices.
2. Usability Challenges:
Increased security measures may introduce additional steps or authentication requirements,
potentially complicating the user experience an↓ king it less convenient to use the device.
3. Cost:
Implementing robust security features often requires investment in hardware, software, and
ongoing maintenance, which can increase the overall cost of the handheld system.
4. Compatibility Issues:
Some security solutions may not be compatible with certain applications or hardware
configurations, limiting the functionality or interoperability of the handheld device.
5. Overhead:
Constant monitoring and enforcement of security protocols can introduce overhead, impacting the
responsiveness and agility of the handheld system.