... June 2014 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 A New Approach for Inter Process Communication with Hybrid of Message Passing Mechanism and Event based Software Architecture Farhad Soleimanian Gharehchopogh*, Esmail Amini and Isa Maleki Computer Engineering Department, Science and Research Branch, Islamic Azad University, West Azerbaijan, Iran; bonab.farhad@gmail.com, es.amini56@gmail.com, maleki.misa@gmail.com Abstract In this paper, we use software architecture style based on event-driven and message passing communication method and determine a framework for interaction among practicable processes on Operating System (OS). In the proposed method, the required data are sent to the process or other processes in a standard message frame and with determined structure to the OS, then, the OS distributes the received message considering its recipient processes in the system, rather a process communicates directly with other specific process. The major features of the proposed method include the synchronization among the processes, the simplicity of implementation, easy extensibility, remote access which finally can improve the interaction between the OS and processes. Along with producing the systems based on an integrated frame, we obtain a determined standard in Inter Process Communication (IPC) by mediating an OS. 1. Introduction Keywords: Event-driven, IPC, Message Passing, OS, Software Architecture The software architecture style based on...
Words: 6185 - Pages: 25
...decoding process | | How could the misunderstanding have been avoided? The miss understanding could have been avoided if I would have paid more attention to the end portion of the message. | | 1. What did you learn about the communication process from this activity? What I learned about the communication process in this exercise is the complexity of the communication process steps. Every step is important to the complete success of the message leaving the sender and arriving to the receiver. In this example the message was distorted by distractions or noise that cause me to miscode the message during the decoding process. 2. What seemed to be the main causes of the misunderstandings? The main causes of the misunderstanding was the fact that I was excited and in a hurry to meet up with my friend that I didn’t pay enough attention to the details of the message and missed understood. Chart Two Who was the sender? Myself | | Who was the receiver? Coworkers | | What was the message? Grab large packages off the belt before they jam in curb. | | What channel was used to send the message? Verbal channel was used. | | What was the misunderstanding that occurred? Coworker didn’t understand which packages I was referring. | | How could the misunderstanding have been avoided? The misunderstanding could have been avoided if my coworker paid more attention or had asked for clarification. | | 1. What did you learn about the communication ...
Words: 380 - Pages: 2
...every company. The company I am choosing to write about is the Department of Veteran Affairs for which I work for. Information systems within the Department of Veteran Affairs make the job a lot easier. It simplifies the way we write letters to veterans because we have a program that once you put in the veterans file number it puts in all of his information into the letter such as his address and then it comes up with prompts to choose what to input in the letter. It requires little modification once you choose all the prompts. Information systems also stores most of the veterans information making it quicker to process claims because we don’t have to look into the veteran’s paper file all of the time. They also reduce the amount of mistakes that we make because if you input wrong information most of the time the system won’t process the claim, if it won’t process you know something isn’t matching up and you did something wrong. Our information systems also act as a tracking system. We have a program that can look up a veteran’s file anywhere in the country and can tell who has the file and when they scanned it in. Of course the accuracy of this program still relies on the human input but it is a VA policy that you must scan all the files into your desk as soon as they get to you and you are supposed to scan them to the next location when you send the file away. All the information systems at the VA are designed to store data, make the job easier, standardize processes, and...
Words: 445 - Pages: 2
...James F Sloan III 4/2/15 IT250 Chapter 5 1. The “who” command helps you determine who is logged in on a specific terminal. 2. Give the command “mesg n” to keep other ordinary users from writing to your terminal. You can take this action when you do not want to be disturbed or are viewing something on your screen that you do not want overwritten. 3. $ cp to_do done – it will overwrite the done file with the new file names to_do. $ mv to_do done- it will do the same as cp, the to_do file will overwrite the done file. 4. Give the command apropos editor. Most systems have vim, ex, ed, and more. 5. $ grep "Ace Electronics" phone $ sort phone $ uniq phone 6. When you compare binary files with diff, diff displays a message saying the files differ when the files differ or no message when the files are the same. The diff utility compares ASCII files on a line-by-line basis; it is not designed to compare binary files on a byte-by-byte basis. Use cmp to compare binary files in that manner. 7. The answer is system dependent. 8. The utility displays a message saying that the command you are looking for is not in the list of directories that are in your search path. For example, $ which me /usr/bin/which: no me in (/usr/local/bin:/bin:/usr/bin:/usr/X11R6bin:. 9. No. However, some commands that are built into a shell have an executable counterpart that exists as a file (for example, echo). 10. Approximately twenty, not counting...
Words: 283 - Pages: 2
...This week I worked on virtual taxes for the first time. I did a few preps and a quality review, it is pretty much the same process but without the pressure of the clients in front of you. It was helpful when there were notes for some situations. For example, the calculations were already done for tuition so it made it easy to just input the numbers. I did run into one where they did not include their birthday or did not answer the healthcare portion, therefore, I was not able to continue with the return. Towards the end of the night I had a client that just recently got married last year and wanted to file separate. The problem I came across was that she did not know her husband’s social security. I was then informed we could not process her return at this time and to come back once she has the information. Amy also explained to me and the client that is always better to file jointly if the couple is married and on good terms and it could really only benefit them more versus filing separately. The highlight of this week of VITA for me was on one of my virtual returns a client wrote a sweet message at the end stating how thankful she was for the program and all of the volunteers. It really shows that what we are doing is so great and just knowing that we are helping people out is so heart...
Words: 253 - Pages: 2
...You can access the Main forum by singing into your student webpage. Once there you click on the Classroom tab and then the Discussion section. From here you will see a forums menu box you will then click on the section titled Main. You can access the Individual forum by singing into your student webpage. Once there you click on the Classroom tab and then the Discussion section. From here you will see a forums menu box you will then see a section titled Individual Forum you will click on your name under that section. To find the Orientation Workshop readings you will sign into your student webpage, click on the classroom then the materials section. All the reading materials you will need underlined in blue text and are clickable all beginning with the word Reading. After you log into your student webpage you will go to the classroom tab and then click on the Assignments section. From there you will click on the week you are doing the assignment for in the Assignments menu under the summary section. You then will see the list of assignments for the week; you will click on the due assignment and then upload it from your folder on your computer by clicking the browse button. It will automatically upload when you select the file from your computer. Class discussions for participation take place in the Discussion section in the Main Forum. For participation you will reply to the DQ threads two times a day for four days. To read replies in the main forum you will click the Discussion...
Words: 446 - Pages: 2
...Distributed Operating Systems Communication (II) Ewa Niewiadomska-Szynkiewicz ens@ia.pw.edu.pl Institute of Control and Computation Engineering Warsaw University of Technology E&IT Department, WUT DOS / Communication (II) – p. 1 Communication (II) 1. Message-oriented Communication 2. Stream-oriented Communication E&IT Department, WUT DOS / Communication (II) – p. 2 Message-oriented Communication – Introduction √ When it cannot be assumed that the receiving side is executing at the time a request (in RPC or RMI) is issued, alternative communication services are needed. The inherent synchronous nature of RPCs and RMIs, by which a client is blocked until its request has been processed, sometimes has to be replaced. Message-oriented communication is proposed. √ √ The message-passing paradigm is widely used approach for programming parallel machines, especially those with distributed memory. E&IT Department, WUT DOS / Communication (II) – p. 3 Message-passing Paradigm – Attributes Two key attributes characterizing the message-passing paradigm: √ it assumes a partitioned address space, √ it supports only explicit parallelization. The logical view of a machine supporting the message-passing paradigm consists of P processes, each with its own exclusive address space. E&IT Department, WUT DOS / Communication (II) – p. 4 Communication System (1) Assumption – communication system organized as follows: √ applications are executed...
Words: 3031 - Pages: 13
...Dynamic Computation Migration in Distributed Shared Memory Systems by Wilson Cheng-Yi Hsieh S.B., Massachusetts Institute of Technology (1988) S.M., Massachusetts Institute of Technology (1988) Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Science at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY September 1995 c Massachusetts Institute of Technology 1995. All rights reserved. Author : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Department of Electrical Engineering and Computer Science September 5, 1995 Certified by : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : M. Frans Kaashoek Assistant Professor of Computer Science and Engineering Thesis Supervisor Certified by : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : William E. Weihl Associate Professor of Computer Science and Engineering Thesis Supervisor Accepted by : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Frederic R. Morgenthaler Chairman, Departmental Committee on Graduate Students 1 2 Dynamic Computation Migration...
Words: 40765 - Pages: 164
...Question#1 There is only two other possibilities 1. Process is blocked while it was in ready state. 2. Process running from blocked state. Only transition 2 is possible because when it is possible that process is waiting for input that is yet not available and it is also possible that operating system has decided to allocate CPU time to any other process. The transition 1 is not possible because when a process Is in ready state it cannot block itself while it is not waiting for input and only in ready state. Question#2 In this problem we have five process i.e. Customer, order takers, cook, packaging specialists, cashiers. We have sequential inter process communication between processes which uses pipes for communication between processes. Our chain of communication should be like this Customer Order Takers Cook packaging specialists Cashiers Question#3 In this problem T=Running time for any process S=switch time for a process Q=time Quantum (a) Q = infinite Process has infinite time quantum Q so it will run until it blocks itself CPU efficiency=Q/Q+S In reality it will be CPU efficiency=T/T+S Since it has infinite time quantum and switch time will be very little as compared to quantum Then efficiency will be CPU efficiency=T/T=1 (b) Q > T In this case CPU has also time quantum greater than process completion time then its efficiency will be CPU efficiency=Q/Q+S This will be CPU efficiency=T/T+S (c) S < Q < T Since Q<T ...
Words: 418 - Pages: 2
...dollars, once you consider the number of doors in, say, a 30-story office tower The order processing department is another example. Peter has a very specific and detailed way he wants the order written up, but most of the order clerks do not understand how to use the multipage order form. They simply improvise when it comes to a detailed question such as whether to classify the customer as industrial or commercial. The current training process is as follows. None of the jobs has a training manual, although several have somewhat out-of-date job descriptions. The training for new people is all on the job. Usually, the person leaving the company trains the new person during the 1- or 2-week overlap period, but if there is no overlap, the new person is trained as well as possible by other employees who have filled in occasionally on the job in the past. The training is the same throughout the company for machinists, secretaries, assemblers, engineers, and accounting clerks, for example. Questions: 1/ What do you think of Green Supplies training process? Could you explain why employees “do things their way”, and If so, how? 2/ What role should job descriptions play in training at Green supplies? 3. Explain in detail what you would do to improve the...
Words: 330 - Pages: 2
...This is a temporary file to get an account. Really sorry about it. This is a temporary file to get an account. Really sorry about it. This is a temporary file to get an account. Really sorry about it. This is a temporary file to get an account. Really sorry about it. This is a temporary file to get an account. Really sorry about it. This is a temporary file to get an account. Really sorry about it. This is a temporary file to get an account. Really sorry about it. This is a temporary file to get an account. Really sorry about it. This is a temporary file to get an account. Really sorry about it. This is a temporary file to get an account. Really sorry about it. This is a temporary file to get an account. Really sorry about it. This is a temporary file to get an account. Really sorry about it. This is a temporary file to get an account. Really sorry about it. This is a temporary file to get an account. Really sorry about it. This is a temporary file to get an account. Really sorry about it. This is a temporary file to get an account. Really sorry about it. This is a temporary file to get an account. Really sorry about it. This is a temporary file to get an account. Really sorry about it. This is a temporary file to get an account. Really sorry about it. This is a temporary file to get an account. Really sorry about it. This is a temporary file to get an account. Really sorry about it. This is a temporary file to get an account. Really sorry about it. This...
Words: 924 - Pages: 4
...Operating Systems Question#1 There is only two other possibilities 1. Process is blocked while it was in ready state. 2. Process running from blocked state. Only transition 2 is possible because when it is possible that process is waiting for input that is yet not available and it is also possible that operating system has decided to allocate CPU time to any other process. The transition 1 is not possible because when a process Is in ready state it cannot block itself while it is not waiting for input and only in ready state. Question#2 In this problem we have five process i.e. Customer, order takers, cook, packaging specialists, cashiers. We have sequential inter process communication between processes which uses pipes for communication between processes. Our chain of communication should be like this Customer Order Takers Cook packaging specialists Cashiers Question#3 In this problem T=Running time for any process S=switch time for a process Q=time Quantum (a) Q = infinite Process has infinite time quantum Q so it will run until it blocks itself CPU efficiency=Q/Q+S In reality it will be CPU efficiency=T/T+S Since it has infinite time quantum and switch time will be very little as compared to quantum Then efficiency will be CPU efficiency=T/T=1 (b) Q > T In this case CPU has also time quantum greater than process completion time then its efficiency will be CPU efficiency=Q/Q+S This will be CPU efficiency=T/T+S (c) S < Q < T Since...
Words: 261 - Pages: 2
...Phase 1 is that, BTC of the node j parent node field. After broadcastingADV1 message, if a node receives any of the ADV1 message from any type of other node, then the all node compare its own ID with the parent node ID stored in the received broadcast the message. If its own ID is equal to that the parent node ID in received ADV1 message, the node declares itself as an internal node, If the node does not receive any type of the ADV1 message where its own ID is equal to the parent node ID stored in that broadcast message, after then the node declare itself as an leaf node. The algorithm to add second parent to each of the node,the tree constructed in phase 1 is given in the procedure BTC phase2 in which performs its all task as follows. At the starting of this phase, sink node broadcasts anADV2 message to all its neighbours,the node executes the following steps 1. If the node receives the ADV2 message from the sink node, then it computes the new cost by adding reciprocal of its left over power to the received cost, and sets its two cost fields to new cost and its stores the sink node ID in its both parent node fields. 2. If both the parent node fields of the receiving node are equal, then it stores that new cost value as computed in step 1 in the second cost field and stores the received node ID in the second parent node field. 3. If both the parent node fields of the receiving node are not equal, then it compares the new cost with that cost are stored in the second cost field,...
Words: 501 - Pages: 3
...Document design – a control plan in which source document is designed to make it easier to prepare the document initially and later to input data from the document. Written/electronic approvals – form of signature or initials on a document to indicate that someone has authorized the event. Preformatted screens – control the entry of data be defining the acceptable format of each data field. Online prompting – requests user input or asks questions that the user must answer. Populate input screens with master data – the clerk enters the identification code for an entity and the system retrieves data about that entity from the master data. Compare input data with master data – we can determine the accuracy and validity of the input data. Procedures for rejected inputs – designed to ensure that erroneous data are corrected and resubmitted for processing. Programmed edit checks – automatically performed by data entry programs upon entry of the input data. Reasonableness checks or limit checks – test whether the contents of the data entered fall within predetermined limits. Document/record hash totals – reflect a summarization of any numeric data field within the input document or record, such as item numbers or quantities on a customer order. Mathematical accuracy checks – compare calculations performed manually to those performed by the computer to determine whether a document has been entered correctly. Check digit verification – involves the inclusion...
Words: 504 - Pages: 3
...3/5/15 Salesperson SeeMeNow Inc. is a reseller of reflective running gear. It has six departments: salesperson, sales order entry, warehouse, shipping, billing, and A/R. The process begins with the salesperson making a sale. The inputs into the "create territory sales order process" are the sales person's password, and the inventory and customer master files. The output of this process is a territory sales order, which resides on a temporary holding file. The process then shifts to the to the Sales Order Entry department where they perform 2 processes. The first process is the "check credit" computer process. The inputs are sales order department's password, the territory sales order (transferred from salesperson using a communication link), and customer master file, A/R ledger, and the open sales order. The output of this process is a decision. If the customer fails credit a credit rejection document gets sent to the customer. If the customer passes credit, the sales order entry department performs "check inventory available". The inputs into this process are the sales order entry password, the preliminary territory sales order file, and the inventory transaction file. The outputs of this process are an updated open sales order file and updated back order file (both of which reside on a magnetic disk). The open sales order then gets sent in read only mode to the warehouse. Steps that reflect proper authorization: password is used as authorization for the sales...
Words: 422 - Pages: 2