Scanned by Camscanner Scanned by Camscanner

Total Page:16

File Type:pdf, Size:1020Kb

Scanned by Camscanner Scanned by Camscanner Scanned by CamScanner Scanned by CamScanner Ans 1 a). Message passing provides a mechanism to allow processes to communicate and to synchronize their actions without sharing the same address space and is particularly useful in a distributed environment, where the communicating processes may reside on different computers connected by a network. For example, a chat program used on the World Wide Web could be designed so that chat participants communicate with one another by exchanging messages. A message-passing facility provides at least two operations: send (message) and receive (message). Messages sent by a process can be of either fixed or variable size. If only fixed-sized messages can be sent, the system-level implementation is straightforward. This restriction, however, makes the task of programming more difficult. Conversely, variable-sized messages require a more complex system-level implementation, but the programming task becomes simpler. This is a common kind of tradeoff seen throughout operating system design. If processes P and Q want to communicate, they must send messages to and receive messages from each other; a communication link must exist between them. This link can be implemented in a variety of ways. Here are several methods for logically implementing a link and the send()/receive () operations: • Direct or indirect communication • Synchronous or asynchronous communication • Automatic or explicit buffering We look at issues related to each of these features next. 1 Naming Processes that want to communicate must have a way to refer to each other. They can use either direct or indirect communication. Under direct communication, each process that wants to communicate must explicitly name the recipient or sender of the communication. In this scheme, the send0 and receive() primitives are defined as: • send (P, message)—Send a message to process P. • receive (Q, message)—Receive a message from process Q. This scheme exhibits symmetry in addressing; that is, both the sender process and the receiver process must name the other to communicate. A variant of this scheme employs asymmetry in addressing. Here, only the sender names the recipient; the recipient is not required to name the sender. In this scheme, the send() and receive () primitives are defined as follows: • send(P, message)—Send a message to process P. • receive(id, message)—-Receive a message from any process; the variable id is set to the name of the process with which communication has taken place. With indirect communication, the messages are sent to and received from mailboxes, or ports. A mailbox can be viewed abstractly as an object into which messages can be placed by processes and from which messages can be removed. Each mailbox has a unique identification. For example, POSIX message queues use an integer value to identify a mailbox. In this scheme, a process can communicate with some other process via a number of different mailboxes. Two processes can communicate only if the processes have a shared mailbox, however. The send () and receive () primitives are defined as follows: • send(A, message)—Send a message to mailbox A. • receive(A, message)—Receive a message from mailbox A. 2 Synchronization Communication between processes takes place through calls to send () and receive () primitives. There are different design options for implementing each primitive. Message passing may be blocking or nonblocking— also known as synchronous and asynchronous. • Blocking send. The sending process is blocked until the message is received by the receiving process or by the mailbox. • Nonblocking send. The sending process sends the message and resumes operation. • Blocking receive. The receiver blocks until a message is available. • Nonblocking receive. The receiver retrieves either a valid message or a null. Different combinations of send() and receive () are possible. When both send() and receive() are blocking, we have a rendezvous between the sender and the receiver. Buffering Whether communication is direct or indirect, messages exchanged by communicating processes reside in a temporary queue. Basically, such queues can be implemented in three ways: • Zero capacity. The queue has a maximum length of zero; thus, the link cannot have any messages waiting in it. In this case, the sender must block until the recipient receives the message. • Bounded capacity. The queue has finite length n; thus, at most n messages can reside in it. If the queue is not full when a new message is sent, the message is placed in the queue (either the message is copied or a pointer to the message is kept), and the sender can continue execution without waiting. The links capacity is finite, however. If the link is full, the sender must block until space is available in the queue. • Unbounded capacity. The queues length is potentially infinite; thus, any number of messages can wait in it. The sender never blocks. The zero-capacity case is sometimes referred to as a message system with no buffering; the other cases are referred to as systems with automatic buffering. Advantage of Message passing system in Windows Ansb) Following are some of important functions of an operating System. Memory Management Processor Management Device Management File Management Security Control over system performance Job accounting Error detecting aids Coordination between other software and users Memory Management Memory management refers to management of Primary Memory or Main Memory. Main memory is a large array of words or bytes where each word or byte has its own address. Main memory provides a fast storage that can be accessed directly by the CPU. For a program to be executed, it must in the main memory. An Operating System does the following activities for memory management − Keeps tracks of primary memory, i.e., what part of it are in use by whom, what part are not in use. In multiprogramming, the OS decides which process will get memory when and how much. Allocates the memory when a process requests it to do so. De-allocates the memory when a process no longer needs it or has been terminated. Processor Management In multiprogramming environment, the OS decides which process gets the processor when and for how much time. This function is called process scheduling. An Operating System does the following activities for processor management − Keeps tracks of processor and status of process. The program responsible for this task is known as traffic controller. Allocates the processor (CPU) to a process. De-allocates processor when a process is no longer required. Device Management An Operating System manages device communication via their respective drivers. It does the following activities for device management − Keeps tracks of all devices. Program responsible for this task is known as the I/O controller. Decides which process gets the device when and for how much time. Allocates the device in the efficient way. De-allocates devices. File Management A file system is normally organized into directories for easy navigation and usage. These directories may contain files and other directions. An Operating System does the following activities for file management − Keeps track of information, location, uses, status etc. The collective facilities are often known as file system. Decides who gets the resources. Allocates the resources. De-allocates the resources. Other Important Activities Following are some of the important activities that an Operating System performs − Security − By means of password and similar other techniques, it prevents unauthorized access to programs and data. Control over system performance − Recording delays between request for a service and response from the system. Job accounting − Keeping track of time and resources used by various jobs and users. Error detecting aids − Production of dumps, traces, error messages, and other debugging and error detecting aids. Coordination between other softwares and users − Coordination and assignment of compilers, interpreters, assemblers and other software to the various users of the computer systems. OR Ansa)Client and Server model A client and server networking model is a model in which computers such as servers provide the network services to the other computers such as clients to perform a user based tasks. This model is known as client-server networking model. The application programs using the client-server model should follow the given below strategies: A computer network diagram of clients communicating with a server via the Internet. An application program is known as a client program, running on the local machine that requests for a service from an application program known as a server program, running on the remote machine. A client program runs only when it requests for a service from the server while the server program runs all time as it does not know when its service is required. A server provides a service for many clients not just for a single client. Therefore, we can say that client-server follows the many-to-one relationship. Many clients can use the service of one server. Services are required frequently, and many users have a specific client-server application program. For example, the client-server application program allows the user to access the files, send e-mail, and so on. If the services are more customized, then we should have one generic application program that allows the user to access the services available on the remote computer. Client A client is a program that runs on the local machine requesting service from the server. A client program is a finite program means that the service started by the user and terminates when the service is completed. Server A server is a program that runs on the remote machine providing services to the clients. When the client requests for a service, then the server opens the door for the incoming requests, but it never initiates the service. A server program is an infinite program means that when it starts, it runs infinitely unless the problem arises.
Recommended publications
  • Compatibilité Connecteur De Charge De Téléphone Mobile
    Sheet1 Compatibilité Connecteur de Charge de Téléphone Mobile Pour vérifier la compatibilité de votre téléphone : - Veuillez chercher votre modèle de téléphone dans la liste ci-dessous. ( Vous pouvez utiliser la fonction Recherche Ctrl+F) - Notez le type du connecteur de votre téléphone. - Assurez vous que le type de connecteur choisi est indiqué dans le descriptif du chargeur. Si votre appareil ne figure pas dans la liste, merci de le signaler : [email protected] Marque Modèle Connecteur Type Acer beTouch E110 microUSB TC4 Acer beTouch E120 microUSB TC4 Acer beTouch E130 microUSB TC4 Acer beTouch E140 microUSB TC4 Acer beTouch E210 microUSB TC4 Acer beTouch E400 microUSB TC4 Acer Inconia Smart microUSB TC4 Acer Liquid Metal microUSB TC4 Acer neoTouch P300 microUSB TC4 Acer neoTouch P400 microUSB TC4 Acer Stream microUSB TC4 Apple Iphone Apple OEM TC1 Apple Iphone 3G Apple OEM TC1 Apple Iphone 3GS Apple OEM TC1 Apple Iphone 4 Apple OEM TC1 Apple Iphone 4S Apple OEM TC1 Apple Iphone 5 Apple Lightning TC9 Blackberry 5790 Mini USB TC5 Blackberry 5820 Mini USB TC5 Blackberry 6210 Mini USB TC5 Blackberry 6220 Mini USB TC5 Blackberry 6230 Mini USB TC5 Blackberry 6280 Mini USB TC5 Blackberry 6510 Mini USB TC5 Blackberry 7210 Mini USB TC5 Blackberry 7230 Mini USB TC5 Blackberry 7250 Mini USB TC5 Blackberry 7280 Mini USB TC5 Blackberry 7290 Mini USB TC5 Blackberry 7510 Mini USB TC5 Blackberry 7520 Mini USB TC5 Blackberry 8800 Mini USB TC5 Blackberry 8820 Mini USB TC5 Blackberry 8830 Mini USB TC5 Blackberry 7100g Mini USB TC5 Blackberry 7100i Mini
    [Show full text]
  • Exceed® 2006
    Transforming Information into Intelligence™ > Data Sheet Exceed® 2006 Exceed is the most secure and popular PC X server in the market. It allows users to cost-effectively connect powerful Microsoft® Windows® desktops to a wide variety of X Window enabled servers, and access high-end X applications. Exceed is renowned for its performance, stability and user-friendliness. Integrated with a powerful terminal emulation package — HostExplorer,® and the optional security suite — Connectivity Secure Shell,™ Exceed is the most versatile Enterprise Connectivity software available. X Server User Exceed Exceed User > Support for X11R6.8 > Publishes X applications using Xweb Wizard > True Color Desktop sharing feature > Interactive support for password aging events Microsoft Windows Platform, Microsoft Windows Platform, Windows Server 2003/2003 x64 Windows Server 2003/2003 x64 > Local X support — X clients, Window Management, Edition, XP/2000/XP Prof x64 Edition, Edition, XP/2000/XP Prof x64 Edition, Font RGB, XRDB, Xtrace Microsoft Terminal Server Edition, Microsoft Terminal Server Edition, Citrix Presentaion Server for Windows Citrix Presentaion Server for Windows > Extensive Server Visual and multiple color depths Support > Support advanced input devices including SpaceBall 5000 > Support for local and remote Window Managers X connections over X connections over TCP/IP TCP/IP > Double Byte Character Set Support > Multiple monitors and screens support — Up to 8 screens > Remember session information for speedy restart Dial-up (LBX) LAN WAN Secure
    [Show full text]
  • 2014 BT Compatibility List 20141030
    Item Brand Name Model 1 Acer Acer beTouch E210 2 Acer acer E400 3 Acer acer P400 4 Acer DX650 5 Acer E200 6 Acer Liquid E 7 Acer Liquid Mini (E310) 8 Acer M900 9 Acer S110 10 Acer Smart handheld 11 Acer Smart handheld 12 Acer Smart handheld E100 13 Acer Smart handheld E101 14 Adec & Partner AG AG vegas 15 Alcatel Alcatel OneTouch Fierce 2 16 Alcatel MISS SIXTY MSX10 17 Alcatel OT-800/ OT-800A 18 Alcatel OT-802/ OT-802A 19 Alcatel OT-806/ OT-806A/ OT-806D/ OT-807/ OT-807A/ OT-807D 20 Alcatel OT-808/ OT-808A 21 Alcatel OT-880/ OT-880A 22 Alcatel OT-980/ OT-980A 23 Altek Altek A14 24 Amazon Amazon Fire Phone 25 Amgoo Telecom Co LTD AM83 26 Apple Apple iPhone 4S 27 Apple Apple iPhone 5 28 Apple Apple iPhone 6 29 Apple Apple iPhone 6 Plus 30 Apple iPhone 2G 31 Apple iPhone 3G 32 Apple iPhone 3Gs 33 Apple iPhone 4 34 Apple iPhone 5C 35 Apple iPHone 5S 36 Aramasmobile.com ZX021 37 Ascom Sweden AB 3749 38 Asustek 1000846 39 Asustek A10 40 Asustek G60 41 Asustek Galaxy3_L and Galaxy3_S 42 Asustek Garmin-ASUS M10E 43 Asustek P320 44 Asustek P565c 45 BlackBerry BlackBerry Passport 46 BlackBerry BlackBerry Q10 47 Broadcom Corporation BTL-A 48 Casio Hitachi C721 49 Cellnet 7 Inc. DG-805 Cellon Communications 50 C2052, Technology(Shenzhen) Co., Ltd. Cellon Communications 51 C2053, Technology(Shenzhen) Co., Ltd. Cellon Communications 52 C3031 Technology(Shenzhen) Co., Ltd. Cellon Communications 53 C5030, Technology(Shenzhen) Co., Ltd.
    [Show full text]
  • Unit 10: Interoperability
    Unit 10: Interoperability 10.2. Windows 2000 in an UNIX Environment AP 9/01 Windows 2000 in an UNIX Environment • Windows/UNIX Interoperability Strategy • Services For UNIX 2.0 • SFU Future Planning • Microsoft Interix 2.2 AP 9/01 Windows/UNIX Interoperability Microsoft Interoperability Framework • Leverage Existing Network Resources • Simplify Account Management • Leverage Existing UNIX Expertise • Simplify Network Administration AP 9/01 Microsoft Windows Services for UNIX 2.0 (SFU) • Leverage Existing Network Resources – NFS Client, Server, Gateway, PCNFS Server • Simplify Account Management – NIS Migration Wizard, Server, Password Synch, User Name Mapping • Leverage Existing UNIX Knowledge – Core set of utilities based on UNIX • Simplify Network Administration – Telnet Client/Server, ActiveState Win32 PERL, Windows Technology AP 9/01 NFS Support (Leverage Existing Network Resources) UNIX NFS Servers SFU NFS Servers SFU NFS SFU NFS Clients Gateway UNIX NFS Clients AP 9/01 Client for NFS • Seamless access to NFS servers – Access NFS servers using Windows credentials – Maps Windows name to UNIX UID • Integration of NFS with Windows UI – Browsing NFS network, servers and shares • Windows semantics – case sensitivity, 8.3 naming, share locks, access to NFS via DFS, UNC naming, ‘net’ commands AP 9/01 Server for NFS • Allow UNIX clients to access files on Windows servers • File access using UNIX UID/GID – Map UID to a domain users – File access privileges according to mapped user • NFS access with just UNIX sign-on • NFS semantics – Support
    [Show full text]
  • Nokia 603 User Guide
    Nokia 603 User Guide Issue 2.0 2Contents Contents Organise your apps 35 Nokia Store 35 Safety 5 Telephone 37 Call a phone number 37 Get started 6 Search for a contact from the dialler 38 Keys and parts 6 Call a contact 38 Insert the SIM card 6 Switch the loudspeaker on during a Insert a memory card 8 call 39 Charge your phone 10 Make a conference call 39 Switch the phone on or off 11 Call the numbers you use the most 40 Lock or unlock the keys and screen 12 Use your voice to call a contact 40 Change the volume of a call, song, or Make calls over the internet 41 video 13 Call the last dialled number 42 Nokia account 13 Record a phone conversation 42 Copy contacts or photos from your Turn to silence your phone 42 old phone 13 View your missed calls 43 Antennas 14 Call your voice mailbox 43 Headset 15 Forward calls to your voice mailbox or About NFC 15 another phone number 43 Activate NFC 16 Prevent making or receiving calls 44 Connect to a Bluetooth accessory Allow calls only to certain numbers 45 using NFC 16 Attach the wrist strap or lanyard 17 Contacts 45 Use the user guide in your phone 17 About Contacts 45 Save phone numbers and mail Basic use 18 addresses 45 Use the toolbar 18 Save a number from a received call or Touch screen actions 18 message 46 Use shortcuts 21 Contact your most important people Switch between open applications 21 quickly 46 Write text 22 Add your important contacts to the Display indicators 26 home screen 47 Set your phone to blink for missed Add a picture for a contact 47 calls or messages 27 Set a ringtone for
    [Show full text]
  • Manuel D'utilisation Nokia 5230
    Manuel d'utilisation Nokia 5230 Édition 1 DÉCLARATION DE CONFORMITÉ Par la présente, NOKIA CORPORATION déclare que l'appareil RM-588 est conforme aux exigences essentielles et aux autres dispositions pertinentes de la directive 1999/5/ CE. La déclaration de conformité peut être consultée à l'adresse suivante : http:// www.nokia.com/phones/declaration_of_conformity/. © 2009 Nokia. Tous droits réservés. Nokia, Nokia Connecting People, Nokia Care et Ovi sont des marques ou des marques déposées de Nokia Corporation. Nokia tune est une marque sonore de Nokia Corporation. Les autres noms de produits et de sociétés mentionnés dans ce document peuvent être des marques ou des noms de marques de leurs propriétaires respectifs. La reproduction, le transfert, la distribution ou le stockage d'une partie ou de la totalité du contenu de ce document, sous quelque forme que ce soit, sans l'autorisation écrite et préalable de Nokia sont interdits. Nokia applique une méthode de développement continu à ses produits. Par conséquent, Nokia se réserve le droit d'apporter des changements et des améliorations à tout produit décrit dans ce document, sans aucun préavis. Ce produit contient un logiciel sous licence Symbian Software Ltd © 1998-2009. Symbian et Symbian OS sont des marques commerciales de Symbian Ltd. Java et tous les produits Java sont des marques commerciales ou des marques déposées de Sun Microsystems, Inc. Certaines parties du logiciel Nokia Maps sont protégées par copyright : © 1996-2009 The FreeType Project. Tous droits réservés. Ce produit est sous licence MPEG-4 Visual Patent Portfolio License (i) pour tout usage strictement personnel et non commercial en relation avec les informations codées conformément à la norme vidéo MPEG-4 par un consommateur agissant pour un usage strictement personnel et en dehors de toute activité commerciale et (ii) pour un usage en relation avec la norme vidéo MPEG-4 accordée par un fournisseur de vidéo autorisé.
    [Show full text]
  • Developing Your App for Nokia: Symbian Belle, NFC, the Next Billion and Windows Phone! Andreas Jakl Senior Technical Consultant Nokia
    Developing your App for Nokia: Symbian Belle, NFC, the next billion and Windows Phone! Andreas Jakl Senior Technical Consultant Nokia 1 © 2011 Nokia Developing your App for Nokia Mobile2Days, Sofia November 4, 2011 Andreas Jakl Agenda • Platforms & Development – Series 40 (Asha) – Windows Phone (Lumia) – MeeGo Harmattan, Symbian Belle: Qt – Now & Future (Qt Project) • Near Field Communication (NFC) • Nokia Store 2 © 2011 Nokia Developing your App for Nokia Mobile2Days, Sofia November 4, 2011 Andreas Jakl Nokia World & Qt Dev Days 3 © 2011 Nokia Developing your App for Nokia Mobile2Days, Sofia November 4, 2011 Andreas Jakl Nokia World & Qt Dev Days 4 © 2011 Nokia Developing your App for Nokia Mobile2Days, Sofia November 4, 2011 Andreas Jakl Nokia World & Qt Dev Days 5 © 2011 Nokia Developing your App for Nokia Mobile2Days, Sofia November 4, 2011 Andreas Jakl Nokia World & Qt Dev Days 6 © 2011 Nokia Developing your App for Nokia Mobile2Days, Sofia November 4, 2011 Andreas Jakl Platforms & Development 7 © 2011 Nokia Developing your App for Nokia Mobile2Days, Sofia November 4, 2011 Andreas Jakl Your Development Options Series 40 Symbian MeeGo / Maemo Windows Phone Java Silverlight Native (Qt) XNA Web 8 © 2011 Nokia Developing your App for Nokia Mobile2Days, Sofia November 4, 2011 Andreas Jakl Series 40 (Asha) 9 © 2011 Nokia Developing your App for Nokia Mobile2Days, Sofia November 4, 2011 Andreas Jakl Series 40 Java Nokia SDK for Java http://www.developer.nokia.com/Develop/Java/ 10 © 2011 Nokia Developing your App for Nokia Mobile2Days, Sofia November 4, 2011 Andreas Jakl New Java APIs • Nokia Maps for Java • Extension to existing Location API – Cell-ID based Location • System Information extension – Dual SIM – Battery level, network status, etc.
    [Show full text]
  • Mini Bluetooth Keyboard User’S Guide
    IRXON Mini Bluetooth Keyboard User’s Guide The nicely designed Mini Bluetooth Keyboard is a palm-sized wireless keyboard consisting of 83 keys. It gives you all the advantages of a full-size standard keyboard and can connect via Bluetooth to almost any information appliance, including: PCs, Tablet PCs, Laptops, PDAs, Smartphones and Series 60 mobilephones, with the use of appropriate driver. It is specially designed for people who have connected their PC to big screen TV or projector, the highly compact keyboard makes it easy to access your Home Theater PC (HTPC) remotely from anywhere in the room. System requirement • Windows 2000, Windows XP, Windows Vista; Mac OS X 10.3 or higher, either with a built-in Bluetooth component, or via an external Bluetooth adapter. • Series 60 phones: - S60 3rd FP1/FP2: NOKIA: 5320XM, 5700, 6110N, 6120C, 6122C, 6210S, 6220C, 6290, 6650F, E51, E62, E63, E66, E71, E90, N76, N78, N79, N81, N82, N85, N95, N95 8GB, N96 SAMSUNG: G810, G818, 400, i408, i450, i458, i550, i558, i560, i568, i8510, L870, L878 - S60 3rd: NOKIA 3250, 5500, E50, E60, E61, E61i, E65, E70, N71, N73, N75, N77, N80, N91, N93, N93i - S60 2nd: NOKIA 3230, 6260, 6630, 6670, 6680, 6681, 7610, N70 MUSIC, N72, N90 • Windows Mobile 5.0 and higher smartphone and PocketPC that support Bluetooth wireless technology Quick Start Guide 1, Open battery cover of the Mini keyboard by pressing the cover and sliding to the direction of arrow. 2, Insert two AAA batteries into battery compartment. Ensure that the correct polarity is observed when inserting batteries.Do not mix batteries of different types, brands, or ages.
    [Show full text]
  • Secure Communications in the Smart Grid
    University of Nevada, Reno Secure Communications in the Smart Grid A thesis submitted in partial fulfillment of the requirements for the degree of Master of Science in Computer Science and Engineering by Hayreddin Ceker Dr. Mehmet H. Gunes/Thesis Advisor Aug 2013 Copyright by Hayreddin Ceker 2013 UNIVERSITY OF NEVADA RENO THE GRADUATE SCHOOL We recommend that the thesis prepared under our supervision by HAYREDDIN CEKER entitled Secure Communications in the Smart Grid be accepted in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Mehmet H Gunes, Ph.D., Advisor Murat Yuksel, Ph.D., Committee Member Yantao Shen, Ph.D., Graduate School Representative Marsha H. Read, Ph.D., Dean, Graduate School August, 2013 i Secure Communications in the Smart Grid Hayreddin Ceker University of Nevada, Reno, 2013 Supervisor: Mehmet Hadi Gunes Abstract Smart grid has diverse stake holders that often require varying levels of access to grid state and measurements. At the distribution level (i.e., MAN), smart grid provides two way communication between households and utilities. At the transmis- sion level (i.e., WAN), multiple organizations need to share the transmission lines and cooperate with participants in their region. Efficient and reliable operation of the grid depends on accurate state measurements and secure data transfer to oper- ation centers. These tasks are complicated by the vast amount of data from diverse sources that are owned by multiple entities that impose physical, economic, market, and political constraints on the data sharing. However, to protect against grid-wide failures and defend against coordinated attacks, power grid operators need to increase data sharing.
    [Show full text]
  • Nokia 5230 User Guide
    Nokia 5230 User Guide Issue 4.0 DECLARATION OF CONFORMITY Hereby, NOKIA CORPORATION declares that this RM-593/RM-594 product is in compliance with the essential requirements and other relevant provisions of Directive 1999/5/EC. A copy of the Declaration of Conformity can be found at http:// www.nokia.com/phones/declaration_of_conformity/. © 2010 Nokia. All rights reserved. Nokia, Nokia Connecting People, Nokia Care, Nokia Original Accessories logos, and Ovi are trademarks or registered trademarks of Nokia Corporation. Nokia tune is a sound mark of Nokia Corporation. Other product and company names mentioned herein may be trademarks or tradenames of their respective owners. Reproduction, transfer, distribution, or storage of part or all of the contents in this document in any form without the prior written permission of Nokia is prohibited. Nokia operates a policy of continuous development. Nokia reserves the right to make changes and improvements to any of the products described in this document without prior notice. This product includes software licensed from Symbian Software Ltd ©1998-2010. Symbian and Symbian OS are trademarks of Symbian Ltd. Java and all Java-based marks are trademarks or registered trademarks of Sun Microsystems, Inc. Portions of the Nokia Maps software are © 1996-2010 The FreeType Project. All rights reserved. This product is licensed under the MPEG-4 Visual Patent Portfolio License (i) for personal and noncommercial use in connection with information which has been encoded in compliance with the MPEG-4 Visual Standard by a consumer engaged in a personal and noncommercial activity and (ii) for use in connection with MPEG-4 video provided by a licensed video provider.
    [Show full text]
  • The Symbian OS Architecture Sourcebook
    The Symbian OS Architecture Sourcebook The Symbian OS Architecture Sourcebook Design and Evolution of a Mobile Phone OS By Ben Morris Reviewed by Chris Davies, Warren Day, Martin de Jode, Roy Hayun, Simon Higginson, Mark Jacobs, Andrew Langstaff, David Mery, Matthew O’Donnell, Kal Patel, Dominic Pinkman, Alan Robinson, Matthew Reynolds, Mark Shackman, Jo Stichbury, Jan van Bergen Symbian Press Head of Symbian Press Freddie Gjertsen Managing Editor Satu McNabb Copyright 2007 Symbian Software, Ltd John Wiley & Sons, Ltd The Atrium, Southern Gate, Chichester, West Sussex PO19 8SQ, England Telephone (+44) 1243 779777 Email (for orders and customer service enquiries): [email protected] Visit our Home Page on www.wileyeurope.com or www.wiley.com All Rights Reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except under the terms of the Copyright, Designs and Patents Act 1988 or under the terms of a licence issued by the Copyright Licensing Agency Ltd, 90 Tottenham Court Road, London W1T 4LP, UK, without the permission in writing of the Publisher. Requests to the Publisher should be addressed to the Permissions Department, John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex PO19 8SQ, England, or emailed to [email protected], or faxed to (+44) 1243 770620. Designations used by companies to distinguish their products are often claimed as trademarks. All brand names and product names used in this book are trade names, service marks, trademarks or registered trademarks of their respective owners.
    [Show full text]
  • INTERIX: UNIX Application Portability to Windows NT Via an Alternative Environment Subsystem
    INTERIX: UNIX Application Portability to Windows NT via an Alternative Environment Subsystem Stephen R. Walli Softway Systems, Inc. 185 Berry Street, Suite 5514, San Francisco, CA 94107 [email protected] 0. Introduction today. It does this in a price competitive manner with respect to the hardware platforms on which This paper was originally written for and it runs. The problem becomes protecting the presented at the USENIX Windows NT huge investment in applications development over Workshop, Seattle, Washington, August 1997. the past decade or more in UNIX applications. The original paper was presented under the How does one leverage and protect the existing OPENNT name. It has been updated to reflect application base while moving to Windows NT? the current architecture and experience with INTERIX. 2. Alternatives 1. The Problem There are several ways to move existing applications to Windows NT. These range from Walli’s First Law of Applications Portability: the expense of a complete re-write of the Every useful application outlives the platform on application to some form of application port. We which it was developed and deployed. will briefly look at the pros and cons of the following: Application source code portability is one of the • cornerstones of most open systems definitions. a complete re-write of the application to the The intention is that if an application is written to Win32 environment subsystem • a particular model of source-code portability, it the UNIX emulation library approach to can port relatively easily to any platform that porting the application supports the portability model. This model is • the common library strategy for porting often based on source code portability standards applications such as the ISO/IEEE family of POSIX • the Microsoft POSIX subsystem standards [1,2] and ISO/ANSI C[3], and • the INTERIX subsystem specifications that include these standards such as the Open Group's Single UNIX Specification[4].
    [Show full text]