EBK SOFTWARE ENGINEERING
10th Edition
ISBN: 9780133943238
Author: SOMMERVILLE
Publisher: PEARSON CO
expand_more
expand_more
format_list_bulleted
Concept explainers
Expert Solution & Answer
Chapter 21, Problem 21.3E
Explanation of Solution
Workflow for embedded software for a voice mail system:
The workflow for embedded software for a voice mail system is represented below:
A voicemail system is a centralized system used in businesses for sending, storing and retrieving audio messages.
The steps or processes in the embedded software for a voice mail system are:
- First the phone displays the number of messages.
- Then the while the phone rings, it counts the number of rings and if the number of rings is more than the stipulated limit, then answering mashing is activated which plays message...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Suppose that there are three stations labelled A, B, and C, where A and C are transmitting while B is receiving. The stations are in a configuration such that the two transmitters A and C are not in the radio range of each other. Since station C is out of the radio range of A, it does not know the presence of A. That’s why C perceives that channel B is free and starts transmitting to B. Also ‘A’ transmit signal at the same time to Channel B. The frames are garbled and a collision occurs. This is shown in the following figure: I. What is the name of this problem? II. How can we overcome this problem?
Consider a health monitoring system deployed in a hospital. It has a lightweight, wearable, wireless, single-use patch attached to the patient's body. It transmits the heart rate, respiration rate, and temperature of a patient every two minutes to a server. Cardiac arrest or respiratory arrest is a common problem in the hospital. The goal of collecting this data is to detect such attacks 90 seconds in advance so that doctors can attend to the patient.
Show a sample of the tuple generated out of the device.
Give two examples of exploratory analysis you will do on this data? Give details.
What can be the target variable in this example?
What sort of data modeling technique can be utilized for it?
Which type of system architecture will be useful in this scenario?
Pls solve sub parts 4&5
When a network satisfies what three conditions, can it be said to have achieved its desired goals? Allow me to dissect each one separately.
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Computer Science Draw a time-line diagram for sliding-window to show how receiver may obtain the duplicate frames. What condition is necessary to detect duplicate frames. Draw both scenarios i.e.in which duplicate frames are detected and not detected by the receiverarrow_forwardA businessman implemented a locking mechanism for the main door using an IOT-powered smart door lock where the VAULT and supplies for the business are stored. The smart door lock is implemented by keying in a 5-digit alphanumeric passcode to open the door and the self-locking mechanism allows the password to be utilized once and is reset when the door is locked again. The store owner encodes the passcode via the network for the door to be opened. Moreover, whenever there is a need to get items from the protected room including the vault, the store manager requests the binary-represented passcode wherein which is passed on to the store manager using SMS using a binary stream that represents the 5 alphanumeric passcodes. The bitstream is utilized to make sure that it is protected and can only be decrypted by someone who knows the process of decoding the binary bitstream. The rules of encoding the binary bitstream follow these steps/information: Bitstream represents a 5-digit…arrow_forwardA businessman implemented a locking mechanism for the main door using an IOT-powered smart door lock where the VAULT and supplies for the business are stored. The smart door lock is implemented by keying in a 5-digit alphanumeric passcode to open the door and the self-locking mechanism allows the password to be utilized once and is reset when the door is locked again. The store owner encodes the passcode via the network for the door to be opened. Moreover, whenever there is a need to get items from the protected room including the vault, the store manager requests the binary-represented passcode wherein which is passed on to the store manager using SMS using a binary stream that represents the 5 alphanumeric passcodes. The bitstream is utilized to make sure that it is protected and can only be decrypted by someone who knows the process of decoding the binary bitstream. The rules of encoding the binary bitstream follow these steps/information: Bitstream represents a 5-digit…arrow_forward
- Consider the behavior of two machines in a distributed system. Both have clocks that are supposed to tick 1000 times per millisecond. One of them actually does, but the other ticks only 990 times per millisecond. If UTC updates come in once a minute, what is the maximum clock skew thatwill occur?arrow_forwardQ3) Consider weighted queueing scheme with three queues at the output port. The weights assigned to queues are w = 4, w = 2, and w = 1. The contents of each queue at time t1 are shown in below Figure. Assume packets are all the same size and that transmission time for each is 1 micro-second. Answer the following: b) Find the departure delay of each packet with respect to the previous packet in each class .arrow_forwardAn example of a communication network is a WSN. Sensor nodes are used in WSNs to relay data between base stations and other nodes. Processing and memory capabilities of a sensor node are constrained. Think of an algorithm that can be divided up into smaller issues. Would you prefer carry out these sub-problems at various sensor nodes using dynamic programming or divide & conquer? Write clearly.arrow_forward
- 6.4-6. Self Learning Switches (c). Consider the network below with six nodes, star-connected into an Ethernet switch. Suppose that A sends a frame to A', A’ replies to A, then B sends a message to B’ and B’ replies to B, and then A sends to B and B replies to A. In this sequence of frame transmissions, how many frames have appeared at the interface at C'? Assume that the switch's table is initially empty. [Note: You can find more examples of problems similar to this here.]arrow_forwardLet’s consider the operation of a learning switch in the context of a network in which 6 nodes labeled A through F are star connected into an Ethernet switch. Suppose that (i) B sends a frame to E, (ii) E replies with a frame to B, (iii) A sends a frame to B, (iv) B replies with a frame to A. The switch table is initially empty. Show the state of the switch table before and after each of these events. For each of these events, identify the link(s) on which the transmitted frame will be forwarded, and briefly justify your answers.arrow_forwardConsider the following two queueing systems.■ System 1: An M/M/1 system with arrival rate l and service rate 3µ■ System 2: An M/M/3 system with arrival rate l and each server working at rate µ Which system will have the smaller W and L?arrow_forward
- Give an example of activities of the last network construction. (A must finish before B can start, and A and C must finish before D can start.arrow_forwardSuppose that a binary message – either 0 or 1 – must be transmitted by wire from location Ato location B. However, the data sent over the wire are subject to a channel noise disturbance,so to reduce the possibility of error, the value 2 is sent over the wire when the message is1, and the value −2 is sent when the message is 0. If X, X = {−2,2}, is the value sent atlocation A, the value received at location B, denoted as R, is given byR = X + N ,where N is the channel noise disturbance, which is independent of X. When the message isreceived at location B, the receiver decodes it according to the following rule:if R ≥.5, then conclude that message 1 was sentif R < .5, then conclude that message 0 was sentAssuming that the channel noise, N, is a unit normal random variable and that the message0 or 1 is sent with equal probability, what is the probability that we conclude that the wrongmessage was sent? This is the probability of error for this communication channelarrow_forwardThe one-way communication model by Berlo refers to component? A. Penerima Mesej-Komputer-Maklum balas / Receiver-Message-Computer-Respond B. Sumber-Mesin-Saluran-Penerima / Source-Machine-Channel-Receiver C. Sumber-Mesin-Saluran-Maklum balas / Source-Machine-Channel-Respond D. Pengirim-Mesej-Saluran-Penerima / Sender-Message-Channel-Receiverarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Operations Research : Applications and AlgorithmsComputer ScienceISBN:9780534380588Author:Wayne L. WinstonPublisher:Brooks Cole
Operations Research : Applications and Algorithms
Computer Science
ISBN:9780534380588
Author:Wayne L. Winston
Publisher:Brooks Cole