Write an e-mail simulator that processes mail

Assignment Help Computer Engineering
Reference no: EM131981352

Assignment

Task for this assignment is to investigate some of the properties of queues.

Queues are commonly used in network systems. For example, e-mail is placed in queues while it is waiting to be sent and after it arrives at the recipient's mailbox. A problem occurs, however, if the outgoing mail processor cannot send one or more of the messages in the queue. For example, a message might not be sent because the recipient's system is not available.

Write an e-mail simulator that processes mail at an average of 40 messages per minute. As messages are received, they are placed in a queue. For the simulation, assume that the messages arrive at an average rate of 30 messages per minute. Remember, the messages must arrive randomly, so you will need to use a random number generator to determine when messages are received.

Each minute, you can dequeue up to 40 messages and send them. Assume that 25% of the messages in the queue cannot be sent in any processing cycle. Again, you will need to use a random number to determine whether a given message can be sent. If it cannot be sent, put it back at the end of the queue or enqueue it.

Run the simulator for 10 to 15 minutes, tracking the number of times each message had to be requeued. At the end of the simulation, print the statistics that show:

1. The total messages processed
2. The average time arrival rate, that is, the average number of messages arriving per minute
3. The average number of messages sent per minute
4. The average number of messages in the queue in a minute
5. The number of messages sent on the 1st attempt, the number sent on the 2nd attempt, and so forth
6. The average number of times messages had to be requested (do not include the messages sent the first time in this average)

PS: My lecturer have given us some hint stated below, strongly advised to follow the hint he have given

Everything to be completed using Java
Name of the program: QueueSim.java

Hint

• In some cases where the email account is full, it will rejoin the queue to attempt to send the email again
• Each loop = 1 minute (use loop to stimulate the time)

while (stimulationCount < 15 [use as a parameter that user can specify] )

NumOfEmailArrive = generate a random number between 0 to 60

Add the newEmail to the queue

• 1 minute - can have 1, 2 or even 30 messages coming in
• The above statement generates the number of email arrive in a minute

NumOfEmailDequeue = generate a random number between 0 to 40

NumofemailtobeDueqeue = min (queueSize, NumOfEmailDequeue)

Loop for NumOfEmailtobeDequeue
Generate a random number between 0 to 100
If number is < 25
(0 / 60) / 2 =30

• To do no.5 and no.6, use ArrayOfCount to compute.

Reference no: EM131981352

Questions Cloud

How many families must be served to clear break-even point : Greg Morrison recently graduated from construction engineering school. how many families must be served to clear the break-even point?
How to motivate and inspire different generations : In today's workplace managers must learn how to motivate and inspire different generations to be successful.
Consolidation of positions or reductions in workforce : Often companies undergo mergers and acquisitions. These mergers and acquisitions often lead to the consolidation of positions or reductions in workforce.
Strategic knowledge base in organization : Critically discuss the above statement in relation to effectively developing the strategic knowledge base in YOUR organization.
Write an e-mail simulator that processes mail : Write an e-mail simulator that processes mail at an average of 40 messages per minute. As messages are received, they are placed in a queue.
Bond outstanding-what is the price of the bond : Riordan Inc. has a bond outstanding that has a $1,000 par value, semiannual coupon rate of 4% and a current yield of 7.9%. What is the price of the bond?
Organization development and change : Organization Development And Change 1. Choose a company for study that has gone through a major recent change, turnaround, renewal or transformation.
Blade manufacturing factory turn out to be defective : Q1. One fifth percent of the blades produced by a blade manufacturing factory turn out to be defective.
Why field of information security considered growth industry : Why is the field of Information Security considered a growth industry? What are the costs associated with an information security breach?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd