Pearson eText for Software Engineering -- Instant Access (Pearson+)
10th Edition
ISBN: 9780137503148
Author: Ian Sommerville
Publisher: PEARSON+
expand_more
expand_more
format_list_bulleted
Concept explainers
Expert Solution & Answer
Chapter 21, Problem 21.3E
Explanation of Solution
Workflow for embedded software for a voice mail system:
The workflow for embedded software for a voice mail system is represented below:
A voicemail system is a centralized system used in businesses for sending, storing and retrieving audio messages.
The steps or processes in the embedded software for a voice mail system are:
- First the phone displays the number of messages.
- Then the while the phone rings, it counts the number of rings and if the number of rings is more than the stipulated limit, then answering mashing is activated which plays message...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Consider a 2G - GSM mobile phone which has been turned off for a while. The user turns it on and tries to make a phone call to another mobile
phone in the same mobile operator's network which is also a 2G network. Write down ALL messaging between various components of the GSM
architecture and the mobile phone being turned on until the call is established (so do not consider the other side of the phone call) in a timeline
with appropriate messaging and names of the channels being used. When making a phone call assume that the user fails in the first 2 random-
access trials and succeeds on the 3rd random-access trial.
Assignment
Consider a 2G - GSM mobile phone which has been turned off for a while. The user turns it on and tries to make a phone call to another mobile
phone in the same mobile operator's network which is also a 2G network. Write down ALL messaging between various components of the GSM
architecture and the mobile phone being turned on until the call is established (so do not consider the other side of the phone call) in a timeline
with appropriate messaging and names of the channels being used. When making a phone call assume that the user fails in the first 2 random-
access trials and succeeds on the 3rd random-access trial.
In a robotic laboratory of one university, the lab members are testing mobile robots. Each robot has a radio transmitter that it uses to communicate with a base station, and they find that if the robots get too close to one another, then there are problems with interference among the transmitters. So a problem arises: how to plan the motion of the robots in such a way that each robot gets to its intended destination, but in the process the robots don’t come close enough together to cause interference problems.
This problem could be modeled as: suppose that we have an undirected graph G=(V,E), representing the floor plan of a building, and there are two robots initially located at nodes a and b in the graph. The robot at node a wants to travel to node c along a path in G, and the robot at node b wants to travel to node d. This is accomplished by means of a schedule: at each time step, the schedule specifies that one of the robots moves across a single edge, from one node to a…
Chapter 21 Solutions
Pearson eText for Software Engineering -- Instant Access (Pearson+)
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Telemedicine is the ability to provide medical assistance from a distance using telecommunication. For this example, imagine that a platoon of soldiers might be out in the battlefield. While a medic might be with them, he/she cannot constantly monitor each soldier’s vital signs, but if various sensors were sewn into soldier uniforms, vital statistics could be monitored from a distance by a doctor at headquarters. That doctor may be able to identify a medical problem for one of the soldiers and relay that information and instructions for care back to a medic in the area. The doctor at headquarters should be able to select a given soldier and see that soldier’s vital signs on a portable computer device (e.g., iPad). Perhaps the medic in the field might even have a video camera so that the doctor may be able to view a wound. Design the interface that the HQ doctor would see. Using the display design principles design an interface mockup using graphics, photos, and/or text to show what…arrow_forwardImagine that you are putting in place for your university's first time a new room reservation system that keeps track of which courses are being taught in which rooms. Imagine that each building is "owned" by a single college or department, and that only one person inside each college or department has the authority to allocate the rooms in that building. In your opinion, what conversion method would you employ?arrow_forwardCreate a Python program that emulates a Banyan-Batcher network with 8 inputs and 8 outputs and then scale the output to a 16 x 16 Delta Network. Use a random generator with 8 (or 16) options to emulate the input table routing list with the assigned input port. Show that your simulation works for all inputs and all outputs. Explain how network routing fabric changes when you have 16 inputs and 16 outputs. Please make sure you are posting a Python script. The last answer was not effective.arrow_forward
- Computer Science Draw a UML design for a Simulation of a DNS Server Using Java. DNS is a directory service that provides a mapping between the name of a host on the network and its numerical address and is required for the functioning of the internet.arrow_forwardLet’s consider the operation of a learning switch in the context of a network in which 6 nodes labeled A through F are star connected into an Ethernet switch. Suppose that (i) B sends a frame to E, (ii) E replies with a frame to B, (iii) A sends a frame to B, (iv) B replies with a frame to A. The switch table is initially empty. Show the state of the switch table before and after each of these events. For each of these events, identify the link(s) on which the transmitted frame will be forwarded, and briefly justify your answers.arrow_forwardSuppose there are three processes A,B and C. All clock runs at the same rate but initially A’s clock reads 10, B’s clock reads 0 and C’s clock reads 5. At time 10 by A’s clock, A sends a message to B, this message takes 4 units of time to reach B. B then waits one unit of time and then sends a message onto C which takes 2 units of time to reach C. Assuming that the system implements Lamport’s timestamps draw a diagram illustrating the timestamps.arrow_forward
- A messaging system reads message as 4-digit positive integer d1d2d3d4 and stores encoding of the message e1e2e3e4 for security reason. The encoding process is as follows: ei = (di+i) mod 3 For example, if message is 4590, the encoded message is 2101. Read any arbitrary message and display the encoded message in the following format: Original message = Encoded message = language : Carrow_forwardElectronic mail systems differ in the manner in which multiple recipients are handled. In some systems, the originating mail handler makes all the necessary copies, and these are sent out independently. An alternative approach is to determine the route for each destination first. Then a single message is sent out on a common portion of the route, and copies are made only when the routes diverge, and this process is referred to as ‘mail bagging’. Leaving aside the considerations of security, discuss the relative advantages and disadvantages of two methods. Discuss the security requirements and implications of the two methods.arrow_forwardImplement a multi-layer perceptron from scratch in python. This would include the following1 Write activation functions.2 Forward propagate the input.3. Backward propagate the error.4 Train the network using stochastic gradient descent.5 Predict the output for a given test sample and compute the accuracy.arrow_forward
- The token bucket algorithm is a popular method for traffic shaping. A computer uses a token bucket with acapacity of 400 megabytes (MB) and a rate of 10 MB/sec. The computer continuously generates20 MB/sec for transmission from time 0. Assume the bucket’s water level is 200 MB at time 0.1a. How long will it take to send 1000 MB? Show the steps.1b. Draw a figure showing how the bucket’s water level evolvesarrow_forwardAs another example, consider a circuit-switched network that connects computers in two remote offices of a private company. The offices are connected using a T-1 line leased from a communication service provider. There are two 4 × 8 (4 inputs and 8 outputs) switches in this network. For each switch, four output ports are folded into the input ports to allow communication between computers in the same office. Four other output ports allow communication between the two offices. Figure shows the situationarrow_forward1. If the values of user tool frame UT[2] is (0, 0, 0, 0, 0, 0) in the robot system, then UT[2] (a) is not activated in the robot system (b) cannot be used in recording robot point P[n] (c) coincides with default TCP frame (Def-TCP) of the robot in the robot system (d) coincides with robot world frame R in the robot system 2. A frame transformation is given as 4T; = (X,Y,Z,W,P, R) = (0,0,0, –90, 0, 90). The corresponding graphical representation of the given frame transformation is (a) (b) y yarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education