You are on page 1of 12

TECHNOPLEXUS12 ANDROID TECHNOLOGY

BACHELOR OF TECHNOLOGY IN COMPUTER SCIENCE AND ENGINEERING

By P. Sai Vaishnavi K. Vinod Kumar

SRINIVASA INSTITUTE OF TECHNOLOGY & SCIENCE


(Affiliated To J.N.T. University, ANANTAPUR)

KADAPA- 516002

Contents
Introduction History Platform Hardware Security Software Development Advantages Limitations Conclusion

Introduction
What is Android?
Android is a software platform and operating system for mobile devices, based on the Linux kernel, developed by Google and later the Open Handset Alliance. Applications written in C and other languages can be compiled to ARM native code and run, but this development path is not officially supported by Google.

Figure Symbol of an Android

History:

Android, Inc. was founded in Palo Alto, California, United States in October, 2003 by Andy Rubin and Rich Miner (co-founder of Wildfire Communications, Inc.),Nick Sears and Chris White (headed design and interface development at Web TV) to develop, in Rubin's words "...smarter mobile devices that are more aware of its owner's location and preferences. Despite the obvious past accomplishments of the founders and early employees, Android Inc. operated secretly, revealing only that it was working on software for mobile phones.

Platform

Hardware

Open source source code is open and contributions are welcome Dalvik virtual machine optimized for mobile integrated browser based on webkit Optimized graphics 2D graphics library, 3D based on OPEN GL ES Media support (MPEG4, H.264, MP3, AAC, JPG, PNG,) Support for radio interfaces, Bluetooth, Wi-Fi, Camera, GPS, accelerometer

Android Architecture

Security

Android is a multi-process system, in which each application (and parts of the system) runs in its own process. Most security between applications and the system is enforced at the process level through standard Linux facilities, such as user and group IDs that are assigned to applications. finer-grained security features are provided through a "permission" mechanism that enforces restrictions on the specific operations that a particular process can perform, and per- URI permissions for granting adhoc access to specific pieces of data.

Permissions

Android permissions are rights given to applications to allow them to do things like take pictures, use the GPS or make phone calls. The UID of an application is used to protect its data and developers need to be explicit about sharing data with other applications7. Malicious software is an unfortunate reality on popular platforms, and through its features Android tries to minimize the impact of malware

Software Development

Development Requirements - knowledge of programming in Java Android SDK (requires x86 OS like Windows, Linux, Mac; JDK version >=5) Eclipse IDE (at least version 3.3) with Android Development Tools, (ADT) plug-in (optional but recommended) IDE and Tools Programming language(s)

Advantages

The ability for anyone to customize the Google Android platform will open up the applications playing field to small and new players who lack the financial muscle to negotiate with wireless carriers like AT&T and Orange. The consumer will benefit from having a wide range of mobile applications to choose from since the monopoly will be broken by Google Android. In addition, as a result of many mobile phones carrying Google Android, companies will come up with such innovative products like the location aware services that will provide users with any information they might be in need of.

Limitations

Bluetooth limitations Google Talk functions and only the simplest implementation of Bluetooth. It'll work with Bluetooth headsets but that's about it; no Bluetooth stereo, no contacts exchange, no modem pairing and no using wireless keyboards. Firefox Mobile isn't coming to Android because of Android Limitations Fennec won't play nice with Android Market because apps in Android Market need to be programmed with a custom form of Java to run on Android.

Conclusion

Android applications have their own identity enforced by the system. Applications can communicate with each other using system provided mechanisms like files, Activities, Services, BroadcastReceivers, and ContentProviders. If you are exposing your application for programmatic access by others, make sure you enforce permissions so that unauthorized applications cant get the users private data or abuse your program.

Any Querys Please. THANK YOU

You might also like