Skip to main content

Mobile OS and Application Protocols

  • Chapter
  • First Online:
Wireless Networking and Mobile Data Management

Abstract

The aim of this chapter to provide the reader with a comprehensive understanding of the softwares and the protocols that define a mobile application framework. This framework depends on the mobile OS support and the services offered by a set of generic mobile application protocols. The design and capabilities of a mobile OS is different from a OS for desktop computers. OS issues are just too many. To keep the content meaningful, the discussion on mobile OS has been organized around the basic features, focusing on the minimality and the essential components related to four different mobile OSes, namely, J2ME, Symbian, Android and iOS. The application protocols are responsible for maintaining internet connectivity when a mobile device moves from one place to another. In this chapter, three mobile application protocols, namely, Mobile IP, Mobile Shell (mosh), and Wireless Application Protocol (WAP), have been described. Mobile IP is a modification of wireline IP at Internet level which allows the mobile users to communicate independent of the point of network attachment. Mosh is a terminal emulation protocol for mobile hand held systems. It uses State Synchronization Protocol (SSP) and speculative display rendering mechanism to synchronize the screen states at both the client and the server. In essence, Mosh uses UDP connection and avoids character-wise echoing mechanism for synching display in the client terminal with the server. WAP defines a set of standards for developing mobile utility services over wireless networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. C.E. Perkins, in Mobile IP Design Principles and Practice (Pearson Education, 1998)

    Google Scholar 

  2. J. Postel, Transmission control protocol, https://tools.ietf.org/html/rfc793, September 1981 (RFC 793)

  3. T. Ylonen, C. Lonvick, The secure shell (SSH) connection protocol, https://tools.ietf.org/html/rfc4254, January 2006 (RFC-4254)

  4. K. Winstein, H. Balakrishnan, Mosh: an interactive remote shell for mobile clients, in 2012 USENIX Annual Technical Conference (Sunny Boston, Mass., USA) pp. 171–182, 13–15 June 2012

    Google Scholar 

  5. O.M. Alliance, Wireless application protocol architecture specification, http://technical.openmobilealliance.org/affiliates/wap/wap-210-waparch-20010712-a.pdf, 12 July 2001

  6. The Statista Portal. Number of smartphone users worldwide from 2014 to 2020 (in billions), https://www.statista.com/statistics/330695/number-of-smartphone-users-worldwide/. Accessed 27 Dec 2016

  7. G. Martin, H. Chang, System-on-chip design, in ASICON 2001, 4th International Conference on ASIC Proceedings (2001), pp. 12–17

    Google Scholar 

  8. F. Engel, I. Kuz, S.M. Petters, S. Ruocco, Operating systems on SOCS: a good idea? in 25th IEEE International Real-Time Systems Symposium (RTSS 2004), pp. 5–8

    Google Scholar 

  9. H. Falaki, R. Mahajan, S. Kandula, D. Lymberopoulos, R. Govindan, D. Estrin, Diversity in smartphone usage, in Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services (ACM, 2010), pp. 179–194

    Google Scholar 

  10. C. Shin, J.-H. Hong, A.K. Dey, Understanding and prediction of mobile application usage for smart phones. in Proceedings of the 2012 ACM Conference on Ubiquitous Computing (ACM, 2012), pp. 173–182

    Google Scholar 

  11. T.M.T. Do, J. Blom, D. Gatica-Perez, Smartphone usage in the wild: a large-scale analysis of applications and context, in Proceedings of the 13th International Conference on Multimodal Interfaces (ACM, 2011), pp. 353–360

    Google Scholar 

  12. A. Rahmati, L. Zhong, Studying smartphone usage: lessons from a four-month field study. IEEE Trans. Mob. Comput. 12(7), 1417–1427 (2013)

    Article  Google Scholar 

  13. The eLinux Community Portal. Android kernel features (2015), http://elinux.org/Android_Kernel_Features. Accessed 28 Dec 2016

  14. F. Maker, Y.-H. Chan, A survey on android vs. linux. Technical report, University of California, 2009

    Google Scholar 

  15. H. Shacham, M. Page, B. Pfaff, E.-J. Goh, N. Modadugu, D. Boneh, On the effectiveness of address-space randomization, in Proceedings of the 11th ACM Conference on Computer and Communications Security (ACM, 2004), pp. 298–307

    Google Scholar 

  16. H. Bojinov, D. Boneh, R. Cannings, I. Malchev, Address space randomization for mobile devices, in Proceedings of the Fourth ACM Conference on Wireless Network Security (ACM, 2011), WiSec’11, pp. 127–138

    Google Scholar 

  17. H. Lockheimer, Android and security, google mobile blog (2012), http://googlemobile.blogspot.fr/2012/02/android-and-security.html. Accessed 27 Dec 2016

  18. Neal Leavitt, Mobile phones: the next frontier for hackers? IEEE Comput. 38(4), 20–23 (2005)

    Article  Google Scholar 

  19. B. Morris, in The Symbian OS Architecture Sourcebook: Design and Solution of a Mobile Phone OS (John Wiley & Sons, 2007)

    Google Scholar 

  20. Community Editors, Android version history (2016), https://en.wikipedia.org/wiki/Android_version_history. Accessed 28 Dec 2016

  21. I. Lunden, Nokia confirms the pureview was officially the last symbian phone, https://techcrunch.com/2013/01/24/nokia-confirms-the-pure-view-was-officially-the-last-symbian-phone/, January 2013. Accessed: 27 Dec 2016

  22. The Statista Portal. Global mobile OS market share in sales to end users from 1st quarter 2009 to 1st quarter 2016 (2016), https://www.statista.com/statistics/266136/global-market-share-held-by-smartphone-operating-systems/. Accessed: 27 Dec 2016

  23. I. Dalmasso, S.K. Datta, C. Bonnet, N. Nikaein, Survey, comparison and evaluation of cross platform mobile application development tools, in 9th International Wireless Communications and Mobile Computing Conference (IWCMC) (IEEE, 2013), pp. 323–328

    Google Scholar 

  24. The Rohmobile Community Portal. Rohmobile suite documentation, http://docs.rhomobile.com/en/5.4/home. Accessed 28 Dec 2016

  25. The Wikipedia Community Portal. Appcelerator titanium, https://en.wikipedia.org/wiki/Appcelerator_Titanium. Accessed 28 Dec 2016

  26. The Wikipedia Community Portal. Apache cordova, https://en.wikipedia.org/wiki/Apache_Cordova. Accessed 28 Dec 2016

  27. R. Droms. Dynamic host configuration protocol (1997), https://tools.ietf.org/html/rfc2131 (RFC 2131)

  28. S. Deering (ed.), The author team of RFC-1256. ICMP router discovery messages, http://www.ietf.org/rfc/rfc1256.txt, September 1991 (RFC-1256)

  29. C. Perkins, Minimal encapsulation within IP, http://tools.ietf.org/html/rfc2004, October 1996 (RFC-2004)

  30. V. Jacobson. Compressing TCP/IP headers for low-speed serial links, https://tools.ietf.org/html/rfc1144, February 1990 (RFC-1144)

  31. W. Simpson, IP in IP tunneling (1995), https://tools.ietf.org/html/rfc1853 (RFC 1853)

  32. C. Perkins, IP encapsulation within IP (1996), http://tools.ietf.org/html/rfc2003 (RFC-2003)

  33. G.E. Montenegro, Reverse tunneling for mobile IP, revised (2001), https://tools.ietf.org/html/rfc3024 (RFC 3024)

  34. G. Bhaskara, A. Helmy, TCP over micro mobility protocols: a systematic ripple effect analysis, in IEEE 60th Vehicular Technology Conference, VTC2004-Fall, vol. 5 (IEEE, 2004), pp. 3095–3099

    Google Scholar 

  35. T. Krovetz, P. Rogaway,The software performance of authenticated-encryption modes, in The 18th International Conference on Fast Software Encryption, 2011 (FSE 2011), pp. 306–327

    Google Scholar 

  36. Ted Krovetz and Phillip Rogaway. The OCB authenticated-encryption algorithm (2014), https://tools.ietf.org/html/rfc7253

  37. O.M. Alliance, Technical_wap2_0_20021106 (2002), http://technical.openmobilealliance.org/Technical/technical-information/material-from-affiliates/wap-forum#previous

  38. R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, T. Berners-Lee, Hypertext transfer protocol-HTTP/1.1, https://www.ietf.org/rfc/rfc2616.txt, June 1999 (RFC-2616)

  39. Tim Berners-Lee and Team of Contributors of HTML. Html living standard (2016), https://whatwg.org/pdf

  40. Wireless Application Protocol Forum. Wireless application protocol wireless markup language specification, http://technical.openmobilealliance.org/tech/affiliates/wap/wap-238-wml-20010911-a.pdf,2000 (Version 1.3)

  41. World Wide Web Consortium et al., Html 4.01 specification (1999)

    Google Scholar 

  42. A. Rauschmayer, in Speaking JavaScript: An In-depth Guide for Progammers (O’Reilly, 2014)

    Google Scholar 

  43. D. Singelée, B. Preneel, The wireless application protocol (WAP). Cosic Internet Report (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. K. Ghosh .

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this chapter

Cite this chapter

Ghosh, R.K. (2017). Mobile OS and Application Protocols. In: Wireless Networking and Mobile Data Management. Springer, Singapore. https://doi.org/10.1007/978-981-10-3941-6_8

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3941-6_8

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3940-9

  • Online ISBN: 978-981-10-3941-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics