Free Essay

The Five State Processor Model

In:

Submitted By mkshann
Words 509
Pages 3
The Five State Processor Model
Michael K. Shannon
POS355
October 15th, 2014
Gary Teed

The Five State Processor Model
Our lives have become very dependent on computers. We use them for EVERYTHING from playing games, being the brains behind our phones to running our automobiles. As complicated as these have all become they all still depend on a microprocessor to make the decisions happen and all microprocessors have the same five state model used to make decisions on what runs when. These five states are new, running, ready, blocked, and exit (Sinapova, 2001). This paper will cover provide a brief explanation of each of these states.
The first state we will cover is the “new” state. The “new” state can simply be described as what a process becomes when it is first accessed by the user. You can think of this as when you double click an icon on your desktop. When the user double clicks the icon the processors receives a request to start up a new process and depending on what the processor is already doing will depend on how quickly it answers the request to start that application.
The second state we will cover is the “running” state. The “running” state can be thought of as a process that is currently being attended to by the processor. A simple example of this would be using the calculator function of the operating system and having it execute a simple math function.
The third state we will cover is the “ready” state. The “ready” state can simply be thought of as a process waiting to happen. The process will stand by until the processor has the time and/or resources to transfer the “ready” state process to a “running” process and execute the needed task.
The fourth state we will cover is the “blocked” state. The “blocked” state will usually occur when a “running” process runs into an error of some sort. An example of these errors could be an arithmetic error such as a process attempts a prohibited computation such has division by zero or stores numbers larger than the hardware can handle (Stallings, 2015).
The last state we will cover is the “exit” state. This state can simply be explained as the state a program becomes when its process becomes completed. An example of this is what the calculator function becomes once it has completed its computation.
In conclusion, our world has become dependent of complex computers to run our daily lives. These system have become very large and extremely complex but they all still have the basic five model processor at their cores. The five process were discussed in this paper to include new, ready, running, blocked, and exit.

References

Sinapova, L. (2001, July 17th). CmSc 335 Operating Systems. Retrieved from faculty.simpson.edu: faculty.simpson.edu/lydia.sinapova/www/cmsc335/cmsc335-01/CH03-Processes.htm
Stallings, W. (2015). Operating Systems: Internals and Design Principles, 8e. In W. Stallings, Operating Systems: Internals and Design Principles, 8e (pp. 105-148). Upper Saddle River: Prentice Hall.

Similar Documents

Free Essay

A Survey of Checkpointing Strategies for Shared-Memory Hpc Applications

...A Survey of Checkpointing Strategies for Shared-Memory HPC Applications Ana Gainaru,Aparna Sasidharan,Jorge Mario Cara Carmona University of Illinois, Urbana-Champaign April 25, 2012 1 Introduction Fault tolerant protocols have always been a major research topic for the HPC community. Harnessing microprocessors to solve large computational problems has required the use of many microprocessors in a single system. Whereas today the large server machines in the business sector may have as many as 32 processors, large supercomputers can have thousands or tens of thousands of processors in a single machine. While this approach has proven itself to be highly effective in expanding the limits of computational capability, it has also brought to the foreground new challenges that did not arise in smaller systems. Fault tolerance is one such critical challenge.The problem of fault tolerance in modern systems arises from two important HPC trends. First is the rising frequency of faults in systems. Second is the increasing size and running times of applications running on these systems, making them more vulnerable to these faults. HPC systems are vulnerable to faults for three major reasons. First, whereas older machines were built from custommade,high-quality components, modern systems use commodity components that were designed and built for a less reliability-aware market. Second, as modern systems are made from more and more components, the probability of one of them failing...

Words: 7288 - Pages: 30

Free Essay

Features Explained Laptop

...Processor, graphics and memory Processor (CPU) The processor, usually Intel or AMD, is the main brain of your computer and has the biggest effect on how your laptop will run. Most are at least dual-core - two processors on one chip sharing the workload. Some Intel's processors use 'Hyper-threading', boosting the dual core processor to act like a quad-core one. Processor clock speed (in GHz) has some impact on performance - the higher the figure, the faster the computer. If you’re looking for a high-performance laptop, or something that'll last you for a good few years, go for a faster processor. Memory (Ram) Ram (random access memory) is your laptop's short-term memory, storing information while you're using the laptop (the hard drive is used for long-term file storage). The amount of Ram your laptop has determines how many tasks it can accomplish simultaneously. Aim for as much Ram as you can afford – ideally at least 4GB to make it easier to rip music while you're surfing the net, updating your security software, and sending and receiving emails. With some laptops you can add more Ram later, but it’s more complicated than adding Ram to a desktop PC. For serious gaming, you'll need a higher spec laptop. Graphics card Laptops come with either integrated or dedicated graphics. Laptops with integrated graphics use a chunk of the laptop’s memory (Ram). This is fine if you’re just planning to do basic, everyday tasks, but if you want to play games or use video-editing...

Words: 973 - Pages: 4

Free Essay

Melp Final

...the TMS320C6416 DSP [pic] Electrical Engineering Department National University of Computer and Emerging Sciences Islamabad Session 2009-2010 Abstract The purpose of our project is real-time implementation and optimization of a 2.4 Kbps mixed excitation linear prediction (MELP) speech-coding algorithm on a Texas instrument TMS320C64xx digital signal processor. The main emphases of the project is on efficient coding and optimization strategies in computationally intensive modules by exploiting fast L1/L2 memory architecture, 8-parallel data paths, enhanced direct memory access module and instruction set features of TMS320C6000 architecture. The implementation would be based on generic TMS320C6000 DSP series; the optimization techniques aimed are applicable to all types of DSP platforms. Lastly the enhanced DSP/BIOS features were used to implement a real time data handling technique to port the MELP vocoder for real time applications. Contents 1 Introduction 6 1.1 THE MELP SPEECH PRODUCTION MODEL 6 2 Development Process 29 2.1 DSP Architecture 29 2.1.1 INTRODUCTION 29 2.1.2 DSK SUPPORT TOOLS 30 2.1.3 CODE COMPOSER STUDIO 32 2.1.4 SUPPORT FILES 32 2.2 DSP Supporting Architecture 34 2.2.1 AIC-23 Codec 34 2.2.2 Multi-Channel Serial Buffered Port 43 2.2.3 Enhanced Direct Memory Access 52 ...

Words: 9574 - Pages: 39

Free Essay

Voice Chat System

...Voice Chat & Video Conferencing INDEX Title of Project……………………………………………………. i Certificate………………………………………………………… ii Acknowledgements……………………………………………… iii 1 Introduction 2 Design & Implementation 2.1 Why Java Platform 2.2 Java Media Framework Streaming Media Architecture Presentation Processing Capture Media Data Storage & Transmission 2.3 Real-time Transport Protocol Streaming Media RTP Architecture RTP Application 2.4 JMF RTP Application Programming Interface RTP API Architecture Reception Transmission 2.5 Requirements & Specification Feasibility Analysis Requirements Functionality Specification 2.6 Diagrams 3 Results 3.1 Snapshots 3.2 Future Offshoots 3.3 Conclusion References CHAPTER 1 INTRODUCTION Introduction To sum up, the at most priority must be given to the definition of the problem statement of the project to be undertaken. So the project is a set of file related with each other developed by the creators of the system to accomplish a specific purpose. Our purpose is to design project for “VOICE CHATTING & VIDEO CONFERENCING”. As the name suggests, our project is based on audio/video transmission & reception. Through our application two or more persons in an intranet can Chat with one another & they can have Video Conferencing...

Words: 5465 - Pages: 22

Free Essay

Buying Laptop

...A ∑ E= This eBook is provided by www.PlentyofeBooks.net mc 2 Plenty of eBooks is a blog with an aim of helping people, especially students, who cannot afford to buy some costly books from the market. For more Free eBooks and educational material visit www.PlentyofeBooks.net Uploaded By Bhavesh Pamecha (samsexy98) 1 By Matt Smith http://smidgenpc.com/ Edited by Justin Pot This manual is the intellectual property of MakeUseOf. It must only be published in its original form. Using parts or republishing altered parts of this guide is prohibited without permission from MakeUseOf.com Think you’ve got what it takes to write a manual for MakeUseOf.com? We’re always willing to hear a pitch! Send your ideas to justinpot@makeuseof.com; you might earn up to $400. BUYING LAPTOP COMPUTERS 2012 Table of Contents 1. Introduction 1.1: The Current Laptop Market 1.2: Ultrabooks Hit The Spotlight 1.3: Buy The Whole Laptop 2. Discovering What You Need From A Laptop 2.1: Performance: What Do You Really Need? 2.2: Portability And Battery Life: Still Exaggerated, Still Good Chapter 2.3: Screen Size Showdown Chapter 2.4: Thick or Thin? Think About It 3. Hardware Explained 3.1. Central Processing Unit (CPU) Basic – Will get the job done. Slowly. Entry – Quick enough for most tasks Performance – Can quickly handle almost any task 3.2: Graphics Processing Unit (GPU) 3.3: Random Access Memory (RAM) 3.4: Hard Drives Chapter 3.5: The Display Chapter 3.6: Connectivity 4. Brand Reliability And Customer...

Words: 5770 - Pages: 24

Free Essay

Get File

...Memory Mapping and Task Scheduling Techniques for Computation Models of Image Processing on Many-Core Platforms Memory Mapping and Task Scheduling Techniques for Computation Models of Image Processing on Many-Core Platforms Abstract Adding more processor core can help in the improvement of a computer performance. As a result in the number of high specification application being run on the computer, it reduces the processing ratio of processor core. This journal focuses on how the system resources is being shared. It also explains how an algorithm is being use to share, map and schedule task for more processor cores. At the end of the research, the algorithm states how the processor core are being improved greatly by 64.77% . with the speed up ratio of 43.55 can be obtained if 48 process unit is employed and are all activated and 10% will be the performance ratio. Introduction Demand for high definition image of modern images made the computation working application much higher. To achieve efficiency improvements were needed on the system architecture. The frequency of single core processors could not have any impact on the processor cores even when the frequency is increased, as a result processors with higher computation power were employed. Today a number of parallel image processing algorithms with emphasis in manipulating the arithmetical level ignoring the limitation of hardware in a many processor core machine and are also developed for many core system. In other to...

Words: 2232 - Pages: 9

Premium Essay

Apple Case Study

...| | |Case Study #3: “Apple Vs. Samsung” | | | | | |Anna Cunningham | |Aaron Keith | |Katherine Seo | |Xiaotao Wu | |Luke Revitsky | |Jiayi Ge | |Monday October 10, 2012 ...

Words: 1432 - Pages: 6

Free Essay

Case Study

...Internet programming and Web Design Data Mining and Warehousing Internet programming and Web Design Lab Project Work and Viva Voce Total University Examinations Durations Max in Hrs Marks 3 100 3 100 3 100 3 100 3 100 3 3 3 3 100 100 100 100 100 1000 II For project work and viva voce (External) Breakup: Project Evaluation : 75 Viva Voce : 25 1 Anx.31 J - M Sc CS (SDE) 2007-08 with MQP Page 2 of 16 YEAR – I PAPER I: ADVANCED COMPUTER ARCHITECTURE Subject Description: This paper presents the concept of parallel processing, solving problem in parallel processing, Parallel algorithms and different types of processors. Goal: To enable the students to learn the Architecture of the Computer. Objectives: On successful completion of the course the students should have: Understand the concept of Parallel Processing. Learnt the different types of Processors. Learnt the Parallel algorithms. Content: Unit I Introduction to parallel processing – Trends towards parallel processing – parallelism in uniprocessor Systems – Parallel Computer structures – architectural classification schemes – Flynn’ Classification – Feng’s Classification – Handler’s Classification – Parallel Processing Applications. Unit II Solving problems in Parallel: Utilizing Temporal Parallelism – Utilizing Data Parallelism –...

Words: 3613 - Pages: 15

Free Essay

Amd Valuation

...control basis. My report starts with an introductory analysis of the company and industry, focus on three methods I used to evaluate AMD and all related assumptions to support these methods. After all, I’ll conclude a price I would like to pay to acquire and control AMD on Mar-31-2013. Please read it of more. This is Gong Chen’s final project of Valuation Model and Practice for summer 2013. Hope you enjoy it! Company Overview 1. Background Founded in 1969 and headquartered in Sunnyvale, California, Advanced Micro Devices (AMD) operates as a semiconductor company worldwide. It operates in two segments, Computing Solutions and Graphics. The company designs, develops, and sells microprocessor products, such as central processing units (CPU) and accelerated processing units (APU) for servers, desktop PCs, and mobile devices. Advanced Micro Devices, Inc. also offers embedded processor products for vendors in industrial controls, digital signage, point of sale/self-service kiosks, medical imaging, set-top box, and casino gaming machines. In addition, it provides chipset products with and without integrated graphics processors for desktop PCs and servers, and AMD controller hub-based chipsets for its APUs; and graphics, video, and multimedia products for use in desktop and notebook computers. The company serves original equipment manufacturers, original design manufacturers, system builders, and independent distributors directly, as well as through independent distributors and sales...

Words: 1986 - Pages: 8

Premium Essay

Very Long Instruction Word Architecture

...V Term Paper Course code :CSE 211 Course title: Computer Organisation and Architecture Submitted to: Ramanpreet Kaur Lamba Madam Submitted by: K. Nabachandra Singha Very-Long Instruction Word (VLIW) Computer Architecture ABSTRACT VLIW architectures are distinct from traditional RISC and CISC architectures implemented in current mass-market microprocessors. It is important to distinguish instruction-set architecture—the processor programming model—from implementation—the physical chip and its characteristics. VLIW microprocessors and superscalar implementations of traditional instruction sets share some characteristics—multiple execution units and the ability to execute multiple operations simultaneously. The techniques used to achieve high performance, however, are very different because the parallelism is explicit in VLIW instructions but must be discovered by hardware at run time by superscalar processors. VLIW implementations are simpler for very high performance. Just as RISC architectures permit simpler, cheaper high-performance implementations than do CISCs, VLIW architectures are simpler and cheaper than RISCs because of further hardware simplifications. VLIW architectures, however, require more compiler support. INTRODUCTION AND MOTIVATION Currently, in the mid 1990s, IC fabrication technology is advanced enough to allow unprecedented implementations of computer architectures...

Words: 3947 - Pages: 16

Premium Essay

Knec

...KNEC 2005 Computer Applications Question Paper 1. (a) Outline FIVE advantages of application packages as compared to the in-house programs developed by the organization's programmers. (10 marks) (b) Explain FIVE factors that the buyer intending to acquire an application package should consider. (10 marks) 2. (a) Explain the following functions of an operating system. (i) Job scheduling (ii) Memory allocation and loading of programs (iii) Interface the user or the operator to the system's hardware. (9 marks) (b) Explain any THREE characteristics of an operating system. (6 marks) (c) Define the following service programs (i) Text Editors (ii)Loaders (iii) Language Translators 3. (a) List FIVE controls to prevent computer fraud. (5 marks) (b) Explain the following computer crimes (i) Theft of computer time (ii) Hacking (iii) Sabotage (c) Outline THREE Security measures against each of the following threats to computer security. (i) Terrorist Attack (ii) Fire 4. (a) Explain FOUR benefits from use of the internet. (8 marks) (b) Explain FOUR problems on the internet. (8 marks) (c) Define the following terms. (i) Intranets (ii) Extranets 5. (a) (i) Define the term "Paperless office (ii) Explain two electronic publishing systems. (7 marks) (b) Explain the stand alone word processors. (3 marks) (c) Explain the following word-procesor facilities. (i) Glossary (ii) Text Editing (iii) Line-wrap-around (iv) Ranner (v) Bullet (10 marks) 6. (a)...

Words: 4015 - Pages: 17

Premium Essay

Telecommunications and Networks

...Provide examples of the business value of Internet, intranet, and extranet applications. Learning Objectives Identify the basic components, functions, and types of telecommunications networks used in business. Explain the functions of major components of telecommunications network hardware, software, media, and services. Explain the concept of client/server networking. Understand the two forms of peer-to-peer networking. Learning Objectives Explain the difference between digital and analog signals. Identify the various transmission media and topologies used in telecommunications networks. Understand the fundamentals of wireless network technologies. Explain the concepts behind TCP/IP. Understand the seven layers of the OSI network model. Reference Introduction To Information Systems, 16th Edition, Marakas & O’Brien, The McGraw-Hill Company, Inc. The Networked Enterprise Networking The Organization Telecommunications and network technologies are internetworking and revolutionizing business and society. The Internet, the Web, and intranets and extranets are networking business process and employees together; and connecting them to their customers, suppliers, and other business stakeholders. Companies and workgroups can thus collaborate more compete successfully in a fast-changing global economy. The Concept Of A Network The term network means an interconnected or interrelated chain, group, or system. Examples of networks: a chain of hotels, the road system...

Words: 5527 - Pages: 23

Premium Essay

Retail Banking

...World retail Banking report 2012 Contents 3 4 7 Preface Key Findings Chapter 1: 8 12 21 Unlocking Pathways to Greater Customer Loyalty Customers Express Conflicting Sentiments toward Banks The Need for a Customer Experience Index The Growth of Mobile Banking 25 Chapter 2: At a Crossroads, Retail Banks Must Identify and Prioritize Core Strengths The Ground Beneath Banks Is Shifting Traditional Tactics Are Less Effective in the Current Environment The Way Forward: Extreme Measures for Extreme Times 26 28 32 40 41 Methodology About Us Preface Capgemini and Efma are pleased to present the 2012 World Retail Banking Report. Retail banks around the world are struggling to maintain their competitiveness in the face of severe external challenges. Massive debt loads are threatening the global economy, while stringent regulations put in place as a result of the financial crisis of 2008 are staunching traditional revenue streams. Customers, still distrustful of the industry, have become increasingly accepting of nonbank alternatives, and social media is giving them an opportunity to publicly explore them. More than ever, retail banks must strive to create stronger bonds with their customers. The 2012 World Retail Banking Report addresses this imperative by establishing a new framework for identifying and measuring success in retail banking. Specifically, our Customer Experience Index (CEI) offers a mechanism for accurately taking stock of the critical...

Words: 17918 - Pages: 72

Free Essay

Computer Generation

...Computer Organization 1. Introduction STUDY MATERIALS ON COMPUTER ORGANIZATION (As per the curriculum of Third semester B.Sc. Electronics of Mahatma Gandh Uniiversity) Compiled by Sam Kollannore U.. Lecturer in Electronics M.E.S. College, Marampally 1. INTRODUCTION 1.1 GENERATION OF COMPUTERS The first electronic computer was designed and built at the University of Pennsylvania based on vacuum tube technology. Vacuum tubes were used to perform logic operations and to store data. Generations of computers has been divided into five according to the development of technologies used to fabricate the processors, memories and I/O units. I Generation II Generation III Generation IV Generation V Generation : 1945 – 55 : 1955 – 65 : 1965 – 75 : 1975 – 89 : 1989 to present First Generation (ENIAC - Electronic Numerical Integrator And Calculator EDSAC – Electronic Delay Storage Automatic Calculator EDVAC – Electronic Discrete Variable Automatic Computer UNIVAC – Universal Automatic Computer IBM 701) Vacuum tubes were used – basic arithmetic operations took few milliseconds Bulky Consume more power with limited performance High cost Uses assembly language – to prepare programs. These were translated into machine level language for execution. Mercury delay line memories and Electrostatic memories were used Fixed point arithmetic was used 100 to 1000 fold increase in speed relative to the earlier mechanical and relay based electromechanical technology Punched cards and paper tape were...

Words: 3359 - Pages: 14

Premium Essay

Ba Case Study

...followers know, September announcements usually mean a new iPhone. And Apple followed the script once again this year.But this time, Apple introduced two new phones. The 5C comes with a plastic cover and will sell at a lower price point than usual for new iPhones. The 5S has all the latest technology from the company, including a faster processing chip and improved camera. Both phones come in a variety of colors. Iphone5s looks almost identical to the iPhone 5, except that it's available in black, white or a classy-looking coppery gold. It's priced the same as last year's model, too: $200, $300 and $400 for the models with 16, 32 and 64 gigabytes of storage. Inside, though, there’s a new processor, which Apple says is twice as fast as before. It’s also the cellphone world’s first 64-bit processor, according to the company, which is an especially attractive feature for game makers; it can “load in” new scenes five times faster than the previous chip. There’s also a coprocessor — a smaller, assistant chip — dedicated to monitoring and processing data from the phone’s motion and location circuits. It can...

Words: 889 - Pages: 4