SlideShare une entreprise Scribd logo
1  sur  14
Télécharger pour lire hors ligne
Windows Phone 8
                                                                                        Architecture
                                                                            App Model and Navigation



                                                                                                          http://www.paxcel.net




                                                                        Contributors : -

                                                                        Pallavi Vasishta - pallavi.vasishta@paxcel.net
                                                                        Ranjan Baryal - ranjan.baryal@paxcel.net

                                                                          Paxcel technologies. www.paxcel.net
This is the exclusive property of Paxcel Technologies. This may not be reproduced or given to third parties without their consent.
Windows Phone Architecture




Note : Although Win32/COM APIs are only shown in the Core Application box , they are
actually callable by managed apps, as well, as long as they are wrapped in a custom
WinPRT component.

                                                                                           Paxcel technologies. www.paxcel.net
                 This is the exclusive property of Paxcel Technologies. This may not be reproduced or given to third parties without their consent.
App Types




                                                                          Paxcel technologies. www.paxcel.net
This is the exclusive property of Paxcel Technologies. This may not be reproduced or given to third parties without their consent.
App’s Lifetime Management Events




                                                                           Paxcel technologies. www.paxcel.net
 This is the exclusive property of Paxcel Technologies. This may not be reproduced or given to third parties without their consent.
Transitions from Foreground App to Back stack
The Closing case This is when an app terminates and receives the Closing
event. This is unambiguous and simple to handle: it happens when a user
presses the hardware Back button from the first page in the app, which kills the
app instance and the process itself.

The Deactivated case This is when an app is moved to the background and
receives the Deactivated event. It happens when the user leaves your app in
the back stack. The app must save sufficient transient state to recreate its
current UI in case the user returns to the app instance, even if the process has
been terminated in the meantime.

    –    Tombstoning The app is deactivated and the process is killed,
         but the app instance is maintained. There’s nothing actively
         running or even sitting in memory, but the system remembers the
         app’s critical details and can bring it back to life if needed.

    –    Fast app resume The app is deactivated and then immediately
         reactivated, without being tombstoned in between.


                                                                                          Paxcel technologies. www.paxcel.net
                This is the exclusive property of Paxcel Technologies. This may not be reproduced or given to third parties without their consent.
Normal Termination




                                                                          Paxcel technologies. www.paxcel.net
This is the exclusive property of Paxcel Technologies. This may not be reproduced or given to third parties without their consent.
Fast Resume State




                                                                          Paxcel technologies. www.paxcel.net
This is the exclusive property of Paxcel Technologies. This may not be reproduced or given to third parties without their consent.
Tombstone State




                                                                          Paxcel technologies. www.paxcel.net
This is the exclusive property of Paxcel Technologies. This may not be reproduced or given to third parties without their consent.
Some Fact About Deactivating App



•   In the fast app resume scenario, the IsApplicationInstancePreserved
    property is true on Application.Activated, whereas in the tombstone
    scenario, the IsApplicationInstancePreserved property is false on
    Application.Activated.

•   The system retains only five apps on the backstack, including the
    one that is currently active. As soon the user launches the sixth app,
    the app at the beginning of the backstack (that is, the one that was
    used least recently) is discarded completely.

•   If memory pressure increases to the point at which the system
    needs to reclaim memory from deactivated apps, it will first start
    tombstoning apps from the end of the back-stack.



                                                                                         Paxcel technologies. www.paxcel.net
               This is the exclusive property of Paxcel Technologies. This may not be reproduced or given to third parties without their consent.
Resource Management During Deactivation of Apps
•   When App is Deactivate especially hardware resources such as sensors, and camera etc. ,
    which can only be used by one app at a time can be deactivated using standard
    OnNavigatedFrom and Deactivated events. However, if you do not proactively release
    resources, the framework will do the job for you. It’s best to keep control of this yourself so
    that you can track which resources you were used and reinstate them as needed, if the app
    is later reactivated.




                                                                                              Paxcel technologies. www.paxcel.net
                    This is the exclusive property of Paxcel Technologies. This may not be reproduced or given to third parties without their consent.
Resuming The App
•   When an app is reactivated from the deactivated state, the framework resumes
    timers and threads, and reattaches some (but not all) resources that it previously
    detached. The developer is responsible for reconnecting/resuming media playback,
    HTTP requests, sockets, and the camera.




                                                                                            Paxcel technologies. www.paxcel.net
                  This is the exclusive property of Paxcel Technologies. This may not be reproduced or given to third parties without their consent.
Obscured And Cancelling Navigation Events
•   Some external operations Lock Button Pressed merely result in the app becoming temporarily
    obscured. In this scenario, there is no NavigatedFrom or Deactivated event. Instead, the system
    raises an Obscured event.

•   The system’s normal assumption is that if an app is running and the lock screen engages, it is
    reasonable to deactivate the app.

•   By disabling ApplicationIdleDetectionMode, the app can continue to run under screen lock. Then if
    you want to reduce battery consumption you will have to removes un necessary Resources
    yourself.

•   The Obscured event does not imply that the entire app UI is obscured. In many cases like for an
    incoming phone call, the UI is only partially obscured (at least until the call is accepted). the app
    does actually continue running, executing whatever operations it was performing when it was
    interrupted.

•   If you want to handle the Obscured and Unobscured events, you attach event handlers to the
    RootFrame object.

•   Cancelling Navigation Event - Navigations that are initiated by the user by interacting with your
    app UI can generally be cancelled,whereas navigations initiated by the user interacting with
    hardware buttons or initiated by the system generally cannot be cancelled. This can be accessed
    from NavigatingCancelEventArgs in NavigatedFrom Event.



                                                                                               Paxcel technologies. www.paxcel.net
                     This is the exclusive property of Paxcel Technologies. This may not be reproduced or given to third parties without their consent.
The Page Model

•   All the inter-app and intra-app instances are stored in a back stack as a
    collection of pages.

•   The inter-app backstack of app instances is limited to five apps but there is
    no hard limit to the number of intra-app pages that can be kept in the page
    backstack.

•   The app platform keeps track of which page (in a multipage app) the user
    was on when he navigated away.

•   The Creation order of pages might not be same as in original App.

•   One consequence of this is that the app should not rely on a hierarchical
    relationship between pages in terms of object lifetime.

•   Instead, all pages should be responsible for maintaining their own private
    state, and any state that is used across multiple pages should be held in the
    Viewmodel


                                                                                           Paxcel technologies. www.paxcel.net
                 This is the exclusive property of Paxcel Technologies. This may not be reproduced or given to third parties without their consent.
Thank You !




                                                                          Paxcel technologies. www.paxcel.net
This is the exclusive property of Paxcel Technologies. This may not be reproduced or given to third parties without their consent.

Contenu connexe

Similaire à Window phone 8 introduction

B04010 01 0917
B04010 01 0917B04010 01 0917
B04010 01 0917IJMER
 
Android Code Optimization Techniques 2
Android Code Optimization Techniques 2Android Code Optimization Techniques 2
Android Code Optimization Techniques 2Ishrat khan
 
Web application penetration testing lab setup guide
Web application penetration testing lab setup guideWeb application penetration testing lab setup guide
Web application penetration testing lab setup guideSudhanshu Chauhan
 
Openspasn Interview question.docx
Openspasn Interview question.docxOpenspasn Interview question.docx
Openspasn Interview question.docxShashikumar983614
 
Application Express - A web development environment for the masses - and for ...
Application Express - A web development environment for the masses - and for ...Application Express - A web development environment for the masses - and for ...
Application Express - A web development environment for the masses - and for ...Sage Computing Services
 
Progressive Web Apps - Up & Running
Progressive Web Apps - Up & RunningProgressive Web Apps - Up & Running
Progressive Web Apps - Up & RunningSuraj Kumar
 
Windows phone 8 session 9
Windows phone 8 session 9Windows phone 8 session 9
Windows phone 8 session 9hitesh chothani
 
15minutesintroductiontoappdynamics1.pdf
15minutesintroductiontoappdynamics1.pdf15minutesintroductiontoappdynamics1.pdf
15minutesintroductiontoappdynamics1.pdfAnuSelvaraj2
 
Have we forgotten how to program? - Tunisian WebDev MeetUp
Have we forgotten how to program? - Tunisian WebDev MeetUpHave we forgotten how to program? - Tunisian WebDev MeetUp
Have we forgotten how to program? - Tunisian WebDev MeetUpBedis ElAchèche
 
PERFORMANCE ENHANCEMENT OF WEBPAGE USING PROGRESSIVE WEB APP FEATURES
PERFORMANCE ENHANCEMENT OF WEBPAGE USING PROGRESSIVE WEB APP FEATURESPERFORMANCE ENHANCEMENT OF WEBPAGE USING PROGRESSIVE WEB APP FEATURES
PERFORMANCE ENHANCEMENT OF WEBPAGE USING PROGRESSIVE WEB APP FEATURESAM Publications
 
Whats new Primavera P6 Professional 15.2?
Whats new Primavera P6 Professional 15.2?Whats new Primavera P6 Professional 15.2?
Whats new Primavera P6 Professional 15.2?p6academy
 
Functional requirements and their poor cousins nfr's
Functional requirements and their poor cousins nfr'sFunctional requirements and their poor cousins nfr's
Functional requirements and their poor cousins nfr'sMarkus Slooff
 
Progressive Web Apps
Progressive Web AppsProgressive Web Apps
Progressive Web AppsUnfold UI
 
List of 12 best software performance testing tools
List of 12 best software performance testing toolsList of 12 best software performance testing tools
List of 12 best software performance testing toolsJanBask Training
 
Progressive Web Apps –The Future of Apps
Progressive Web Apps –The Future of Apps   Progressive Web Apps –The Future of Apps
Progressive Web Apps –The Future of Apps Ashish Saxena
 

Similaire à Window phone 8 introduction (20)

B04010 01 0917
B04010 01 0917B04010 01 0917
B04010 01 0917
 
Android Code Optimization Techniques 2
Android Code Optimization Techniques 2Android Code Optimization Techniques 2
Android Code Optimization Techniques 2
 
Web application penetration testing lab setup guide
Web application penetration testing lab setup guideWeb application penetration testing lab setup guide
Web application penetration testing lab setup guide
 
Openspasn Interview question.docx
Openspasn Interview question.docxOpenspasn Interview question.docx
Openspasn Interview question.docx
 
Application Express - A web development environment for the masses - and for ...
Application Express - A web development environment for the masses - and for ...Application Express - A web development environment for the masses - and for ...
Application Express - A web development environment for the masses - and for ...
 
Progressive Web Apps - Up & Running
Progressive Web Apps - Up & RunningProgressive Web Apps - Up & Running
Progressive Web Apps - Up & Running
 
Windows phone 8 session 9
Windows phone 8 session 9Windows phone 8 session 9
Windows phone 8 session 9
 
15minutesintroductiontoappdynamics1.pdf
15minutesintroductiontoappdynamics1.pdf15minutesintroductiontoappdynamics1.pdf
15minutesintroductiontoappdynamics1.pdf
 
Have we forgotten how to program? - Tunisian WebDev MeetUp
Have we forgotten how to program? - Tunisian WebDev MeetUpHave we forgotten how to program? - Tunisian WebDev MeetUp
Have we forgotten how to program? - Tunisian WebDev MeetUp
 
Progressive Web Apps
Progressive Web AppsProgressive Web Apps
Progressive Web Apps
 
Lecture1 oopj
Lecture1 oopjLecture1 oopj
Lecture1 oopj
 
PERFORMANCE ENHANCEMENT OF WEBPAGE USING PROGRESSIVE WEB APP FEATURES
PERFORMANCE ENHANCEMENT OF WEBPAGE USING PROGRESSIVE WEB APP FEATURESPERFORMANCE ENHANCEMENT OF WEBPAGE USING PROGRESSIVE WEB APP FEATURES
PERFORMANCE ENHANCEMENT OF WEBPAGE USING PROGRESSIVE WEB APP FEATURES
 
Pwa.pptx
Pwa.pptxPwa.pptx
Pwa.pptx
 
pwa-170717082930.pdf
pwa-170717082930.pdfpwa-170717082930.pdf
pwa-170717082930.pdf
 
Whats new Primavera P6 Professional 15.2?
Whats new Primavera P6 Professional 15.2?Whats new Primavera P6 Professional 15.2?
Whats new Primavera P6 Professional 15.2?
 
Functional requirements and their poor cousins nfr's
Functional requirements and their poor cousins nfr'sFunctional requirements and their poor cousins nfr's
Functional requirements and their poor cousins nfr's
 
Progressive Web Apps
Progressive Web AppsProgressive Web Apps
Progressive Web Apps
 
List of 12 best software performance testing tools
List of 12 best software performance testing toolsList of 12 best software performance testing tools
List of 12 best software performance testing tools
 
Progressive Web Apps –The Future of Apps
Progressive Web Apps –The Future of Apps   Progressive Web Apps –The Future of Apps
Progressive Web Apps –The Future of Apps
 
jfx
jfxjfx
jfx
 

Plus de Paxcel Technologies

Binary Class and Multi Class Strategies for Machine Learning
Binary Class and Multi Class Strategies for Machine LearningBinary Class and Multi Class Strategies for Machine Learning
Binary Class and Multi Class Strategies for Machine LearningPaxcel Technologies
 
Ssrs 2012(powerview) installation ans configuration
Ssrs 2012(powerview) installation ans configurationSsrs 2012(powerview) installation ans configuration
Ssrs 2012(powerview) installation ans configurationPaxcel Technologies
 
Risk Oriented Testing of Web-Based Applications
Risk Oriented Testing of Web-Based ApplicationsRisk Oriented Testing of Web-Based Applications
Risk Oriented Testing of Web-Based ApplicationsPaxcel Technologies
 
Html5 deciphered - designing concepts part 1
Html5 deciphered - designing concepts part 1Html5 deciphered - designing concepts part 1
Html5 deciphered - designing concepts part 1Paxcel Technologies
 

Plus de Paxcel Technologies (10)

Binary Class and Multi Class Strategies for Machine Learning
Binary Class and Multi Class Strategies for Machine LearningBinary Class and Multi Class Strategies for Machine Learning
Binary Class and Multi Class Strategies for Machine Learning
 
Async pattern
Async patternAsync pattern
Async pattern
 
Ssrs 2012(powerview) installation ans configuration
Ssrs 2012(powerview) installation ans configurationSsrs 2012(powerview) installation ans configuration
Ssrs 2012(powerview) installation ans configuration
 
Sequence diagrams in UML
Sequence diagrams in UMLSequence diagrams in UML
Sequence diagrams in UML
 
Introduction to UML
Introduction to UMLIntroduction to UML
Introduction to UML
 
Risk Oriented Testing of Web-Based Applications
Risk Oriented Testing of Web-Based ApplicationsRisk Oriented Testing of Web-Based Applications
Risk Oriented Testing of Web-Based Applications
 
Knockout.js explained
Knockout.js explainedKnockout.js explained
Knockout.js explained
 
All about Contactless payments
All about Contactless paymentsAll about Contactless payments
All about Contactless payments
 
Html5 deciphered - designing concepts part 1
Html5 deciphered - designing concepts part 1Html5 deciphered - designing concepts part 1
Html5 deciphered - designing concepts part 1
 
Paxcel Snapshot
Paxcel SnapshotPaxcel Snapshot
Paxcel Snapshot
 

Dernier

Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 

Dernier (20)

Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 

Window phone 8 introduction

  • 1. Windows Phone 8 Architecture App Model and Navigation http://www.paxcel.net Contributors : - Pallavi Vasishta - pallavi.vasishta@paxcel.net Ranjan Baryal - ranjan.baryal@paxcel.net Paxcel technologies. www.paxcel.net This is the exclusive property of Paxcel Technologies. This may not be reproduced or given to third parties without their consent.
  • 2. Windows Phone Architecture Note : Although Win32/COM APIs are only shown in the Core Application box , they are actually callable by managed apps, as well, as long as they are wrapped in a custom WinPRT component. Paxcel technologies. www.paxcel.net This is the exclusive property of Paxcel Technologies. This may not be reproduced or given to third parties without their consent.
  • 3. App Types Paxcel technologies. www.paxcel.net This is the exclusive property of Paxcel Technologies. This may not be reproduced or given to third parties without their consent.
  • 4. App’s Lifetime Management Events Paxcel technologies. www.paxcel.net This is the exclusive property of Paxcel Technologies. This may not be reproduced or given to third parties without their consent.
  • 5. Transitions from Foreground App to Back stack The Closing case This is when an app terminates and receives the Closing event. This is unambiguous and simple to handle: it happens when a user presses the hardware Back button from the first page in the app, which kills the app instance and the process itself. The Deactivated case This is when an app is moved to the background and receives the Deactivated event. It happens when the user leaves your app in the back stack. The app must save sufficient transient state to recreate its current UI in case the user returns to the app instance, even if the process has been terminated in the meantime. – Tombstoning The app is deactivated and the process is killed, but the app instance is maintained. There’s nothing actively running or even sitting in memory, but the system remembers the app’s critical details and can bring it back to life if needed. – Fast app resume The app is deactivated and then immediately reactivated, without being tombstoned in between. Paxcel technologies. www.paxcel.net This is the exclusive property of Paxcel Technologies. This may not be reproduced or given to third parties without their consent.
  • 6. Normal Termination Paxcel technologies. www.paxcel.net This is the exclusive property of Paxcel Technologies. This may not be reproduced or given to third parties without their consent.
  • 7. Fast Resume State Paxcel technologies. www.paxcel.net This is the exclusive property of Paxcel Technologies. This may not be reproduced or given to third parties without their consent.
  • 8. Tombstone State Paxcel technologies. www.paxcel.net This is the exclusive property of Paxcel Technologies. This may not be reproduced or given to third parties without their consent.
  • 9. Some Fact About Deactivating App • In the fast app resume scenario, the IsApplicationInstancePreserved property is true on Application.Activated, whereas in the tombstone scenario, the IsApplicationInstancePreserved property is false on Application.Activated. • The system retains only five apps on the backstack, including the one that is currently active. As soon the user launches the sixth app, the app at the beginning of the backstack (that is, the one that was used least recently) is discarded completely. • If memory pressure increases to the point at which the system needs to reclaim memory from deactivated apps, it will first start tombstoning apps from the end of the back-stack. Paxcel technologies. www.paxcel.net This is the exclusive property of Paxcel Technologies. This may not be reproduced or given to third parties without their consent.
  • 10. Resource Management During Deactivation of Apps • When App is Deactivate especially hardware resources such as sensors, and camera etc. , which can only be used by one app at a time can be deactivated using standard OnNavigatedFrom and Deactivated events. However, if you do not proactively release resources, the framework will do the job for you. It’s best to keep control of this yourself so that you can track which resources you were used and reinstate them as needed, if the app is later reactivated. Paxcel technologies. www.paxcel.net This is the exclusive property of Paxcel Technologies. This may not be reproduced or given to third parties without their consent.
  • 11. Resuming The App • When an app is reactivated from the deactivated state, the framework resumes timers and threads, and reattaches some (but not all) resources that it previously detached. The developer is responsible for reconnecting/resuming media playback, HTTP requests, sockets, and the camera. Paxcel technologies. www.paxcel.net This is the exclusive property of Paxcel Technologies. This may not be reproduced or given to third parties without their consent.
  • 12. Obscured And Cancelling Navigation Events • Some external operations Lock Button Pressed merely result in the app becoming temporarily obscured. In this scenario, there is no NavigatedFrom or Deactivated event. Instead, the system raises an Obscured event. • The system’s normal assumption is that if an app is running and the lock screen engages, it is reasonable to deactivate the app. • By disabling ApplicationIdleDetectionMode, the app can continue to run under screen lock. Then if you want to reduce battery consumption you will have to removes un necessary Resources yourself. • The Obscured event does not imply that the entire app UI is obscured. In many cases like for an incoming phone call, the UI is only partially obscured (at least until the call is accepted). the app does actually continue running, executing whatever operations it was performing when it was interrupted. • If you want to handle the Obscured and Unobscured events, you attach event handlers to the RootFrame object. • Cancelling Navigation Event - Navigations that are initiated by the user by interacting with your app UI can generally be cancelled,whereas navigations initiated by the user interacting with hardware buttons or initiated by the system generally cannot be cancelled. This can be accessed from NavigatingCancelEventArgs in NavigatedFrom Event. Paxcel technologies. www.paxcel.net This is the exclusive property of Paxcel Technologies. This may not be reproduced or given to third parties without their consent.
  • 13. The Page Model • All the inter-app and intra-app instances are stored in a back stack as a collection of pages. • The inter-app backstack of app instances is limited to five apps but there is no hard limit to the number of intra-app pages that can be kept in the page backstack. • The app platform keeps track of which page (in a multipage app) the user was on when he navigated away. • The Creation order of pages might not be same as in original App. • One consequence of this is that the app should not rely on a hierarchical relationship between pages in terms of object lifetime. • Instead, all pages should be responsible for maintaining their own private state, and any state that is used across multiple pages should be held in the Viewmodel Paxcel technologies. www.paxcel.net This is the exclusive property of Paxcel Technologies. This may not be reproduced or given to third parties without their consent.
  • 14. Thank You ! Paxcel technologies. www.paxcel.net This is the exclusive property of Paxcel Technologies. This may not be reproduced or given to third parties without their consent.