A Study of Application Programming Interfaces for Mobile Operating Systems by Ashok Chakravarthy Mandala

Total Page:16

File Type:pdf, Size:1020Kb

A Study of Application Programming Interfaces for Mobile Operating Systems by Ashok Chakravarthy Mandala Platform Leadership through System Interfaces: A Study of Application Programming Interfaces for Mobile Operating Systems by Ashok Chakravarthy Mandala Bachelor of Engineering, Computer Science Birla Institute of Technology and Science, Pilani, India Submitted to the System Design and Management Program in Partial Fulfillment of the Requirements for the Degree of Master of Science in Engineering and Management at the Massachusetts Institute of Technology February 2007 © 2007 Ashok Mandala All rights reserved The author hereby grants to MIT permission to reproduce and to distribute publicly paper and electronic copies of this thesis document in whole or in part. Signature of Auiithnr - Ashok Mandala System Design and Management Program February 2007 Certified by Michael A. Cusumano Thesis Supervisor Sloan School of Management Certified by Patrick Hale MASSACHUSETTS INSTITUT OF TEO-NOLOGY Director System Design and Management Program MAY 0 6 2008 ARCHGES LIBRARIES Platform Leadership through System Interfaces: A Study of Application Programming Interfaces for Mobile Operating Systems By Ashok C. Mandala Submitted to the System Design and Management Program on January 19, 2007 in Partial Fulfillment of the Requirements for the Degree of Master of Science in Engineering and Management ABSTRACT The Smart Mobile device industry is witnessing rapid growth with the increased convergence of voice-centric mobile phones and data-centric personal digital assistant systems. Improving capabilities in device hardware have allowed development of complex user interfaces, multimedia and communication capabilities on these devices. Modem Mobile Operating Systems manage this complexity in the mobile device by administering hardware resources and providing a platform for development of new consumer and enterprise applications. This thesis studies the architecture, design goals and services offered by the three major mobile operating systems - Palm OS, Symbian OS and Windows Mobile. The Mobile Operating Systems studied in this thesis differ in their architectures, services and programming interfaces offered to application software developers, independent hardware vendors and OEM licensees. Their design reflects the OS vendor's strategy toward the mobile platform which is decipherable based on a study of the OS architecture and application programming interface. Three conclusions are made based on this study - each of them suggests a strategy that the vendor has attempted to use to gain platform leadership through product architecture and degree of openness of interfaces. Thesis Supervisor: Michael A. Cusumano Title: Sloan Management Review Distinguished Professor of Management, Technological Innovation & Entrepreneurship. -1- Table of Contents TA BLE OF C O N TEN TS ............................................................................................................................. 2 LIST O F FIG U RES ...................................................................................................................................... 4 C H A PTER 1 .................................................................................................................................................. 5 1.1 INTRODUCTION ..................................................................................................................................... 5 1.2 O RGANIZATION OF THE THESIS ............................................................................................................. 6 C H A PTER 2 .................................................................................................................................................. 7 2.1 PALM OPERATING SYSTEM - HIGH LEVEL ARCHITECTURE ............................................................... 7 User Interface.......................................................................................................... ..................... 8 Mem ory Managem ent.............................................................................................. ........................ 10 Object Exchange ................................................................................................................................. 13 Infrared (IR) Library........................................................................................................................... 13 Serial Comm unications.......... ............................................................................................................ 14 Bluetooth ............................................................................................................................................. 14 Network Library .................................................................................................................................. 15 Telephony ............................................................................................................................................ 16 2.2 SYMBIAN OPERATING SYSTEM - HIGH LEVEL ARCHITECTURE ................................. ....................... 17 Base API................................................................................................................ .......................... 20 H andles ............................................................................................ ............................................ 21 Inter-Process Comm unication............................................................................................................. 22 Sym bian Client-ServerFram ework..................................................................................................... 24 Mem ory Managem ent.............................................................................................. ........................ 24 ProcessM odel........................................................................................................ ......................... 26 File System .......................................................................................................................................... 27 Bluetooth ............................................................................................................................................. 27 Communications Infrastructure................................... ..................... 28 Infrared Comm unications.................................................................................................................... 29 Messaging ........................................................................................................................................... 30 Graphics................................................... ......................................................... 30 Multim edia .......................................................................................................................................... 33 Security............................................................................................................. 34 Telephony ............................................................................................................................................ 35 Application Engines ............................................................................................................................ 37 Text H andling................................................................................................................................... 37 Base UI Framework............................................................................................................................ 37 2.3 WINDOWS MOBILE OPERATING SYSTEM - HIGH LEVEL ARCHITECTURE............................................ 38 K ernel.............................................................................................................. 41 Mem ory Managem ent.............................................................................................. ........................ 43 UserInterface................................................................................................................................... 45 N etworking .......................................................................................................................................... 48 Infrared Comm unications.............................................................. ........................... 50 Bluetooth ............................................................................................................................................. 51 Telephony ............................................................................................................................................ 52 Security.................................................. ........................................................... 53 C H A PTER 3 ................................................................................................................................................ 55 3.1 PALM O S EVOLUTION ................................ ........................................................ ........................ 55 3.2 SYM BIAN O S EVOLUTION ................................ ................................................................................... 62 3.3 W INDOW S CE EVOLUTION ................................ ................................................................................. 68 3.4 A NALYSIS ..........................................................................................................................................
Recommended publications
  • Active @ UNDELETE Users Guide | TOC | 2
    Active @ UNDELETE Users Guide | TOC | 2 Contents Legal Statement..................................................................................................4 Active@ UNDELETE Overview............................................................................. 5 Getting Started with Active@ UNDELETE........................................................... 6 Active@ UNDELETE Views And Windows......................................................................................6 Recovery Explorer View.................................................................................................... 7 Logical Drive Scan Result View.......................................................................................... 7 Physical Device Scan View................................................................................................ 8 Search Results View........................................................................................................10 Application Log...............................................................................................................11 Welcome View................................................................................................................11 Using Active@ UNDELETE Overview................................................................. 13 Recover deleted Files and Folders.............................................................................................. 14 Scan a Volume (Logical Drive) for deleted files..................................................................15
    [Show full text]
  • Microsoft Windows Common Criteria Evaluation Security Target
    Microsoft Common Criteria Security Target Microsoft Windows Common Criteria Evaluation Microsoft Windows 10 version 1809 (October 2018 Update) Microsoft Windows Server 2019 (October 2018 Update) Security Target Document Information Version Number 0.05 Updated On June 18, 2019 Microsoft © 2019 Page 1 of 126 Microsoft Common Criteria Security Target Version History Version Date Summary of changes 0.01 June 27, 2018 Initial draft 0.02 December 21, 2018 Updates from security target evaluation 0.03 February 21, 2019 Updates from evaluation 0.04 May 6, 2019 Updates from GPOS PP v4.2.1 0.05 June 18, 2019 Public version Microsoft © 2019 Page 2 of 126 Microsoft Common Criteria Security Target This is a preliminary document and may be changed substantially prior to final commercial release of the software described herein. The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. This work is licensed under the Creative Commons Attribution-NoDerivs- NonCommercial License (which allows redistribution of the work). To view a copy of this license, visit http://creativecommons.org/licenses/by-nd-nc/1.0/ or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA.
    [Show full text]
  • Customising Handset Settings
    UG.A1000.book Page 1 Wednesday, September 15, 2004 2:35 PM Welcome Welcome to the world of Motorola digital wireless communications! We are pleased that you have chosen the Motorola A1000 multimedia handset. Camera (Point 2 Point) Two-way video conferencing Earpiece Game Key B Status Light Speakerphone Key Game A Key Navigation Key Push center Touchscreen button left, right, up, or down to move through Send Key items. Press Press to make center button to and answer select voice or video highlighted item. calls. When not in a call, press to End Key display call Press and Triangle Key history. release to end calls and to display phone dial pad. Welcome - 1 UG.A1000.book Page 2 Wednesday, September 15, 2004 2:35 PM www.motorola.com MOTOROLA and the Stylised M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective owners. The Bluetooth trademarks are owned by their proprietor and used by Motorola, Inc. under licence. © Motorola, Inc. 2004. Software Copyright Notice The Motorola products described in this manual may include copyrighted Motorola and third party software stored in semiconductor memories or other media. Laws in the United States and other countries preserve for Motorola and third party software providers certain exclusive rights for copyrighted software, such as the exclusive rights to distribute or reproduce the copyrighted software. Accordingly, any copyrighted software contained in the Motorola products may not be modified, reverse-engineered, distributed, or reproduced in any manner to the extent allowed by law.
    [Show full text]
  • SEFS: Security Module for Extensible File System Architectures
    SEFS: Security Module for Extensible File System Architectures Þ Þ Lu´ıs FerreiraÝ , Andr´eZ´uquete and Paulo Ferreira Ý ISEL/INESC, Þ IST/INESC g fluis.ferreira, andre.zuquete, paulo.ferreira @inesc.pt Abstract ethical access by file server’s administrators; or (iv) unauthorized accesses to users’ files by an attacker Data security is a fundamental issue in modern com- capable of impersonating them. Whence, access con- puter systems. In particular, data storage systems are trol mechanisms, either physical or logical, aren’t bul- frequently subject to attacks and so need protection. letproof, and that may be a major concern for people Typical storage systems rely on access control mecha- dealing with sensitive data. nisms, either physical or logical, to prevent unautho- To make it even worse, current distributed file sys- rized users from accessing stored data. However, such tems exacerbate some of the previous problems and mechanisms are useless against non-ethical attitudes introduce new ones. On distributed file systems peo- taken by privileged users, like system administrators. ple have to trust on: (i) the physical security of remote Thus, the ultimate solution for ensuring the privacy of file servers, (ii) administration teams (that may blur sensitive data is to use cryptographic techniques. individual non-ethical attitudes), (iii) the capability This article describes the design and implemen- of remote authentication mechanisms to prevent per- tation of a security module, for extensible file sys- sonification, and, finally, (iv) they have to trust that tem architectures (SEFS), that enforces file security attackers cannot understand or modify data flows using cryptographic techniques.
    [Show full text]
  • Copyrighted Material
    24_038624 bindex.qxp 4/4/06 10:57 PM Page 363 Index A anti-static bags, 21, 23 Access Data’s Forensic Toolkit, 9 AOL Instant Messenger (AIM), active partition, 62 306–307 ActivePERL (ActiveState), 189 application logs, 110, 146, 250–251 adapters as keystroke recorders, 155 ARP (Address Resolution Protocol) Ad-aware Antispyware, 114 spoofing, 158, 159 Address Book Recovery tool, arp -a command, 179 319–320 at command, 186 address books, 319–320, 323, ATA hard disks, 52, 55 333–334 Autocomplete feature (IE), 132, 284 Address Resolution Protocol (ARP) autoexec.bat file, 108, 115 spoofing, 158, 159 Autoruns (SysInternals), 131, 136 ADSs (alternate data streams), 76–78, 194 B AIM (AOL Instant Messenger), backup tapes. See tapes 306–307 Bearshare clients, 297–299 AIM password decoder (Digital best evidence rules, 26, 29 Detectives),COPYRIGHTED 309 bitwise MATERIAL duplication. See forensic AIM password recovery tool duplication (ElcomSoft), 309 bitwise searching AirMagnet sniffer, 160–161 index-based searching versus, alternate data streams (ADSs), 211–212, 219–220 76–78, 194 overview, 217–219 AnaDisk recovery software (NTI), 58 regular expressions for, 212–214 AnaDisk software (NTI), 41 search methodology and, 219–220 Analog Web analyzer, 263, 270 bookmarks (Firefox), 285–288 363 24_038624 bindex.qxp 4/4/06 10:57 PM Page 364 364 Index Bookmarks.htm file (IE), 276 commercially pressed, 46 Boot and Nuke utility (Darik), 67, 96 common file types, 124 boot partition, 62 direct duplication for, 203 boot process, 60–61. See also startup for hard disk duplication storage, boot sector 205–206 FAT32 file system, 68–69, 349–351 lifespan issues for CD-Rs, 195 NTFS file system, 78–81, 353–354 rewritable, 46–47 bootable CDs scratched, repairing, 47–48 for hard disk duplication, 198, 199 volatility of data, 141–142 Helix forensics environment, write-once, 46 85, 96, 190, 199, 210 CERT (Computer Emergency Internet resources, 210 Response Team), 7, 9 with NTFS support, 85, 198 certification, 6, 8 BOOT.INI file, 99, 108 chain of custody, 25–26, 339–340 browsers.
    [Show full text]
  • Symbian in the Enterprise
    Symbian in the Enterprise Symbian OS is the world-leading open operating system that powers the most popular and advanced smartphones from the world’s leading handset manufacturers. Symbian OS is the industry's standard choice for smartphones that not only feature calendars, contacts, messaging, push email and web browsing, but can also extend easily to any enterprise information system. Maximize productivity from one converged device Email and messaging – all Symbian OS phones have email Staying connected with colleagues, customers and partners support out of the box. Emails can be composed, read and throughout the day is fundamental to business. Symbian managed offline as well as online. The phone can support OS smartphones for mobile professionals are, first and several email accounts and, depending on available memory, foremost, uncompromised great phones, robust and can store around 1000 emails. Email attachments can be capable, with excellent battery life, size and usability. In viewed using downloadable viewers. Some Symbian OS addition to regular voice, messaging and email, the open phones are supplied with these viewers already installed. nature of Symbian OS phones enables a range of advanced solutions, such as voice conferencing and push-to-talk. Push email – business users can access their full corporate Lotus Notes/Microsoft Exchange email and additionally have it ‘pushed’ to their phone using downloadable applications Extend the phone to any back-end infrastructure from companies such as Intellisync, Smartner, Visto, Symbian’s approach to enterprise connectivity is to ensure Extended Systems, JP Mobile and others. These solutions that Symbian OS phones can be extended to any existing have end-to-end security.
    [Show full text]
  • Review NTFS Basics
    Australian Journal of Basic and Applied Sciences, 6(7): 325-338, 2012 ISSN 1991-8178 Review NTFS Basics Behzad Mahjour Shafiei, Farshid Iranmanesh, Fariborz Iranmanesh Bardsir Branch, Islamic Azad University, Bardsir, Iran Abstract: The Windows NT file system (NTFS) provides a combination of performance, reliability, and compatibility not found in the FAT file system. It is designed to quickly perform standard file operations such as read, write, and search - and even advanced operations such as file-system recovery - on very large hard disks. Key words: Format, NTFS, Volume, Fat, Partition INTRODUCTION Formatting a volume with the NTFS file system results in the creation of several system files and the Master File Table (MFT), which contains information about all the files and folders on the NTFS volume. The first information on an NTFS volume is the Partition Boot Sector, which starts at sector 0 and can be up to 16 sectors long. The first file on an NTFS volume is the Master File Table (MFT). The following figure illustrates the layout of an NTFS volume when formatting has finished. Fig. 5-1: Formatted NTFS Volume. This chapter covers information about NTFS. Topics covered are listed below: NTFS Partition Boot Sector NTFS Master File Table (MFT) NTFS File Types NTFS File Attributes NTFS System Files NTFS Multiple Data Streams NTFS Compressed Files NTFS & EFS Encrypted Files . Using EFS . EFS Internals . $EFS Attribute . Issues with EFS NTFS Sparse Files NTFS Data Integrity and Recoverability The NTFS file system includes security features required for file servers and high-end personal computers in a corporate environment.
    [Show full text]
  • Building Windows File Systems: a Look at the Openafs Client for Windows
    Building Windows File Systems: A Look at the OpenAFS Client for Windows Peter Scott Kernel Drivers, LLC Jeffrey Altman Your File System, Inc 2010 Storage Developer Conference. Kernel Drivers, LLC. All Rights Reserved. AFS History … on Windows The SMB Interface Used the Loopback Adapter for NetBIOS name registration All requests were processed by the AFS Service in user mode Minimal kernel level caching Lack of support for network browsing within Explorer 2010 Storage Developer Conference. Kernel Drivers, LLC. All Rights Reserved. 2 More History … ‘Relatively’ easy to implement but problems … Performance Generic solution to fit all situations Microsoft components, very difficult to get bugs fixed Several critical bugs found in SMB with no fix in sight Ex: Static thread worker pool count leads to dead locks Documentation is minimal, at best Reliant on the Windows redirector for network behavior … good and bad 2010 Storage Developer Conference. Kernel Drivers, LLC. All Rights Reserved. 3 A Native Approach … Custom File System Pros … Complete control of name space parsing Reparse Points Mount Points DFS Links Better optimization of IO pathways Minimize Kernel to User transitions Cache invalidation requirements Better system cache integration Support for write-through behavior when needed 2010 Storage Developer Conference. Kernel Drivers, LLC. All Rights Reserved. 4 A Native Approach … And the down side … Complex implementation Undocumented interfaces srvsvc, wkssvc, IPC$ Network Provider support Cache and Memory Manager Must deal with 3rd party products File system filters 2010 Storage Developer Conference. Kernel Drivers, LLC. All Rights Reserved. 5 Windows File System Model Windows IFS (Installable File System) Interface IRP Based model IO Request Packets ‘Fast IO’ Interface used for more than just IO Direct-call model, no IRPs … almost Network Provider Interface for Network Redirectors only Support for drive mappings UNC Browsing 2010 Storage Developer Conference.
    [Show full text]
  • Microsoft NTFS for Linux by Paragon Software 9.7.5
    Paragon Technologie GmbH Leo-Wohleb-Straße 8 ∙ 79098 Freiburg, Germany Tel. +49-761-59018-201 ∙ Fax +49-761-59018-130 Website: www.paragon-software.com E-mail: [email protected] Microsoft NTFS for Linux by Paragon Software 9.7.5 User manual Copyright© 1994-2021 Paragon Technologie GmbH. All rights reserved. Abstract This document covers implementation of NTFS & HFS+ file system support in Linux operating sys- tems using Paragon NTFS & HFS+ file system driver. Basic installation procedures are described. Detailed mount options description is given.File system creation (formatting) and checking utilities are described.List of supported NTFS & HFS+ features is given with limitations imposed by Linux. There is also advanced troubleshooting section. Information Copyright© 2021 Paragon Technologie GmbH All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording, taping, or information storage and re- trieval systems - without the written permission of the publisher. Products that are referred to in this document may be trademarks and/or registered trademarks of the respective owners. The publisher and the author make no claim to these trademarks. While every precaution has been taken in the preparation of this document, the publisher and the author assumes no responsibility for errors or omissions, or for damages resulting from the use of information contained in this document or from the use of programs and source code that may ac- company it. In no event shall the publisher and the author be liable for any loss of profit or any other commercial damage caused or alleged to have been caused directly or indirectly by this document.
    [Show full text]
  • Microsoft Windows Common Criteria Evaluation Security Target
    Microsoft Common Criteria Security Target Microsoft Windows Common Criteria Evaluation Microsoft Windows 10 (Creators Update) Security Target Document Information Version Number 0.06 Updated On June 14, 2018 Microsoft © 2017 Page 1 of 102 Microsoft Common Criteria Security Target This is a preliminary document and may be changed substantially prior to final commercial release of the software described herein. The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. This work is licensed under the Creative Commons Attribution-NoDerivs- NonCommercial License (which allows redistribution of the work). To view a copy of this license, visit http://creativecommons.org/licenses/by-nd-nc/1.0/ or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. The example companies, organizations, products, people and events depicted herein are fictitious.
    [Show full text]
  • Mobile Connection Explorer for Windows Introduction and Features
    Mobile Connection Explorer 15 May 2013 for Windows Version 21 Introduction and Features Public version Gemfor s.r.o. Tyršovo nám. 600 252 63 Roztoky Czech Republic Gemfor s.r.o. Tyršovo nám. 600 252 63 Roztoky Czech Republic e-mail: [email protected] Contents Contents ...................................................................................................................... 2 History ......................................................................................................................... 3 1. Scope ..................................................................................................................... 3 2. Abbreviations ......................................................................................................... 4 3. Solution .................................................................................................................. 5 4. Specification ........................................................................................................... 5 5. Product description ................................................................................................. 9 5.1 Supported operating systems ....................................................................... 9 5.2 Hardware device connections ....................................................................... 9 5.3 Network connection types ............................................................................. 9 5.4 Customizable graphical skin ......................................................................
    [Show full text]
  • Radioactive: Enabling Large-Scale Asynchronous Audio Discussions on Mobile Devices
    RadioActive: Enabling large-scale asynchronous audio discussions on mobile devices Aaron Zinman B.S. Cognitive Science University of California, San Diego June 2004 MASSACHUSETTS INSTrWUE OF TECHNOLOGY SEPB 1 2006 Submitted to the Program in Media Arts and Sciences, LIBRARIES School of Architecture and Planning, in partial partial fulfillment of the requirements for the degree of Master of Science in Media Arts and Sciences at the Massachusetts Institute of Technology August 2006 ARCHIVES © 2006 Massachusetts Institute of Technology Author Aaron Zinman Program in Media Arts and Sciences AV-gist 11, 2006 Certified by Judith S. Donath Associate Professor ofl edia Arts and Sciences Thesis Supervisor Acceptd by Andrew Lippman Chair, Department Committee on Graduate Students Program in Media Arts and Sciences RadioActive: Enabling large-scale asynchronous audio discussions on mobile devices Aaron Zinman Submitted to the Program in Media Arts and Sciences, School of Architecture and Planning, in partial fulfillment of the requirements for the degree of Master of Science in Media Arts and Sciences at the Massachusetts Institute of Technology August 2006 Abstract Current mobile technology works well to connect individuals together at any time or place. However, general focus on one-to-one conversations has overlooked the poten- tial of always-on group and community links. I hypothesize that asynchronous persist- ent audio is a superior medium to support scalable always-on group communication for mobile devices. To evaluate this claim, one must first have an adequate interaction de- sign before its possible to investigate the qualities and usage patterns over the long- term. This design does not exist for mobile devices.
    [Show full text]