OS - Module 5
OS - Module 5
Palm Pilot 1000 personal digital assistant was introduced with the Palm OS
mobile operating system in the year 1996.
In 1998, Symbian Ltd. has developed Symbian OS. Symbian was used by
many major mobile phone brands, and above all by Nokia.
* 2000:- Symbian became the first modern mobile OS on a smartphone with
the launch of the Ericsson r380 in the year 2000.
*Kyocera 6035 introduced in the year 2001, became the first smartphone with
palm OS.
*Microsoft's first windows CE (pocket pc) smartphones were introduced in the
year 2002, in the same year, blackberry released its first smartphone.
*In the year 2003, Motorola introduced the first Linux based cell phone
*Motorola a760 based on the Linux Monta vista distribution. in 2005,
*Nokia introduced Maemo OS on the first internet tablet n770 in the year
2007.
*in the year 2008, oha released android (based on Linux kernel) 1.0 with the
HTC dream (T-Mobile g1) as the first android phone.
*In the year 2009, the palm introduced webOS with the palm pre. in the same
year, samsung announced the bada OS with the introduction of the Samsung
$85
2010S
*In November 2010, Windows Phone OS phones were led but
*were not compatible with the prior Windows Mobile OS In July 2011.
*In July 2012. Mozilla announced that the project formerly named Boot
*In September 2013, Apple released iOS 7. In October 2013, the Canonical announced Ubuntu Touch (later
discontinued). The OS was built on the Android Linux kernel, using Android drivers and services.
*In February 2014, Microsoft released Windows Phone 8.1. In September 204, Apple released iOS 8 and
BlackBerry released BlackBerry 10.3 with integration with the Amazon Appstore. *In November 2014, Google
released Android 5.0 "Lollipop".
*In February 2015, Google released Android 5.1 "Lollipop". In September 2015, Apple released iOS 9 and Google
released Android 6.0 Marshmallow". In October 2015, future updates would focus on security and privacy
enhancements only. In November 2015. Microsoft released Windows 10 Mobile. In February 2016, Microsoft
released Windows 10 Mobile Anniversary Update. In June 2016. Apple announced iOS 10In May 2017, Samsung
announced Tizen 41 v Tizen Developer Conference 2017. In August 2017, Google veld Android 8.0 Oreo".
*In August 2017, BlackBerry and the Android-based BlackBerry Secure which focus on security September 2017.
Apple introduced the iPhone 8, iPhone X, and 11. In October 2017, Microsoft announced that developed Windows
10 Mobile will be on maintenance mode only, thus the won't be any new feature would introduce to Windows 10
Mobile
*In February 2018, Samsung released Samsung Experience 95 based on Android "Oreo 8.0 globally to Samsung
Galaxy S8 and S8 .*In June 2019 Apple announced iOS 13.
Popular Mobile Operating Systems
• Android
Android is a Linux-based operating system designed primarily for touchscreen mobile
devices such as smartphones and tablet computers, developed by Google in conjunction
with the Open Handset Alliance.
Android has a large community of developers writing applications ("apps") that extend
the functionality of devices.
The first Android-powered phone was sold in October 2008 and by the end of 2010
Android had become the world's leading smartphone platform. Android has been the
best-selling OS worldwide on smartphones since 2011 and on tablets since 2013. As of
May 2017, it has over two billion monthly active users, the largest installed base of any
operating system.
• Ios
OS (formerly iPhone OS) is a mobile operating system created and developed
by Apple Inc. exclusively for its hardware. It is the operating system that
presently powers many of the company's mobile devices, including the iPhone,
iPad, and iPod Touch.
It is the second most popular mobile operating system globally after Android.
Major versions of iOS are released annually. The current version, iOS 12 was
released on September 17, 2018. On all recent iOS devices, iOS regularly
checks on the availability of an update, and if one is available, prompt the user
to permit its automatic installation.
• Windows
Microsoft launched the Windows Phone operating system as Windows Mobile
in 2003.
Windows Phone replaced Windows Mobile in 2010. Windows Phone offers
users features and applications that are similar to the desktop- computer
version of Windows.
On January 18, 2019, Microsoft announced that support for Windows 10
Mobile would end on December 10, 2019, with no further security updates
released after then, and that Windows 10 Mobile users should migrate to iOS
or Android phones.07:19 PM
• BlackBerry
BlackBerry's OS is comparable to iOS because both systems are closed-
source. This means that users can only use this mobile operating system on
devices that have the corresponding brand name.
When comparing BlackBerry to other mobile devices, it remains solid in
connectivity and user-friendliness BlackBerry users do experience shorter
battery life, however.
In addition, camera on BlackBerry devices are a lower quality than other
devices. BlackBerry appeals more to corporate users than personal users.
• Symbian
The Symbian platform was developed by Nokia for some models of
smartphones.
The operating system was discontinued in 2012, although a slimmed-down
version for basic phones was still developed until July 2014.
Features of
Mobile Operating Systems
A Mobile OS controls everything from handling the
input to the overall functioning of a device.
Common Components found in a mobile:
• A Battery
• SIM tray
• IMEI number
Apart from these, there are features for roaming, WAP, GPRS, Apps like clock, calendar, etc…, and GPS.
Services and Capabilities that a good
Mobile OS should have
>>
Power Management
• OS should collect data about the state of the batteries in the device.
• It should free the memory of unused objects to optimize the memory for other apps.
Reduced Boot-up time
• The OS should boot in less amount of time as it consumes only less memory space.
• The microkernel structure and by deferring the initialization of device drivers, they
achieve this short span of time.
CPU
• Mobile devices also have CPU just like the PCs, but with low battery consumption
environment.
Memory
• Users can also add flash memory for storing other data like audio, video etc…
Synchronization facility
• Most of the devices come with a synchronization facility to sync data with the PC.
Apart from all these, there are options for GPS location, Multimedia, QWERTY keyboard
and Accessing the internet.
Architecture of Mobile Operating
System
Introduction
– Mobile OS design has experienced a three phase evolution : from the PC based
OS to an embedded OS to the current smartphone –oriented OS in the past
decade . Throughout the process , mobile OS Architecture has gone fro complex
to simple to something in b/w.
Advancement in OS
1st evolution
11%
2nd evolution
25%
3rd evolution
64%
This shows the increase in the features of the mobile operating system in the
time evolution of 2 decades.
Architecture of Mobile OS
in the past
CORE LIBRARIES
Java programming language contains all the collection
classes, utilities, IO.
Android Libraries available to the dev :
android.app
android.content
android.database
android.graphics
android.hardware
android.opengl
android.os
android.media
android.net
android.print
android.provider
android.text
android.util
android.view
android.widget
android.webkit
• NATIVE C/C++ LIBRARIES
• SYSTEM APPS
NATIVE C/C++ LIBRARIES
• Android comes with a set of core apps For email,sms messaging ,contacts etc.
• The system apps Function both as a app for users and to provide key Capabilities that
developers can access from their own app
Protection in Operating System
Protection is especially important in a multiuser environment when multiple users
use computer resources such as CPU, memory, etc. It is the operating system's
responsibility to offer a mechanism that protects each process from other processes.
In a multiuser environment, all assets that require protection are classified as
objects, and those that wish to access these objects are referred to as subjects. The
operating system grants different 'access rights' to different subjects.
Need of Protection in Operating System
Various needs of protection in the operating system are as follows:
1.There may be security risks like unauthorized reading, writing,
modification, or preventing the system from working effectively for
authorized users.
2.It helps to ensure data security, process security, and program security
against unauthorized user access or program access.
3.It is important to ensure no access rights' breaches, no viruses, no
unauthorized access to the existing data.
4.Its purpose is to ensure that only the systems' policies access programs,
resources, and data.
Goals of Protection in Operating System
Various goals of protection in the operating system are as follows:
1.The policies define how processes access the computer system's resources,
such as the CPU, memory, software, and even the operating system. It is the
responsibility of both the operating system designer and the app
programmer. Although, these policies are modified at any time.
2.Protection is a technique for protecting data and processes from harmful or
intentional infiltration. It contains protection policies either established by
itself, set by management or imposed individually by programmers to
ensure that their programs are protected to the greatest extent possible.
3.It also provides a multiprogramming OS with the security that its users
expect when sharing common space such as files or directories.
Role of Protection in Operating System
2.Changing or dynamic –
In dynamic association where a process can switch dynamically,
creating a new domain in the process, if need be.
Security Measures :
• Security measures at different levels are taken against malpractices, such as no person
should be allowed on the premises or allowed access to the systems.
• The network that is used for the transfer of files must be secure at all times. No alien
software must be able to extract information from the network while the transfer. This is
known as Network Sniffing, and it can be prevented by introducing encrypted channels of
data transfer. Also, the OS must be able to resist against forceful or even accidental
violations.
• The best ways of authentication are using a username password combination, using
fingerprint, eye retina scan or even user cards to access the system.
• Passwords are a good method to authenticate, but it is also one of the most common as well
as vulnerable methods. To crack passwords is not too hard. While there are weak passwords,
but even hard passwords can be cracked by either sniffing around or giving access to
multiple users or even network sniffing as mentioned above.
MAJOR SECURITY THREATS
MAJOR SECURITY THREATS
• Malware is malicious software that enables the attacker to have full or limited
control over the target system. Malware can damage, modify, and/or steal
information from the system. There are various types of malware such
as viruses, Trojans, worms, rootkits, spyware, and ransomware.
TROJAN HORSE
• Worms are similar to a virus but it does not modify the program. It replicates
itself more and more to cause slow down the computer system. Worms can be
controlled by remote. The main objective of worms is to eat the system
resources.
• A virus is a malicious executable code attached to another executable file that
can be harmless or can modify or delete data. When the computer program
runs attached with a virus it performs some action such as deleting a file from
the computer system. Viruses can’t be controlled by remote.
USER
AUTHENTICATION &
AUTHORIZATION
AUTHORIZATION &
AUTHENTICATION
• Identifying users and actions they are allowed to perform is
vital to maintaining a secure computing system.
• Access to a system and its resources are protected by both
authentication and authorization