Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

We observe a closed system for 30 minutes, during which 1600 tasks are completed, from 12 terminals. Each terminal (source of tasks) has a think time of 12s between receiving the response to one task, and submitting the next task. The system has a CPU and two disks, one is fast, the other is slow. The fast disk can deliver a block in 1/2 of the time that the slow disk would take. During the observation period, 32000 accesses occur at the fast disk, and 12000 accesses at the slow disk. During the observation period, the CPU is busy for 1080s, the fast disk is busy for 400s, and the slow disk is busy for 600s.

* a) [1 mark] What is the response time for jobs in the observed system?
* b) [1 mark] As a function of N, the number of terminals, give the high-load bounds for throughput and response time; also give the low-load bounds.
* c) [1 mark] How many terminals can we support, while keeping the response time below 3 s?
* d) [1 mark] Suppose we plan to replace the CPU with a CPU whose speed is double (thus the time to execute each job would decrease so it becomes 1/2 of the current time). Estimate the number of terminals we can support, with response time below 3s. 

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9653680

Have any Question?


Related Questions in Computer Engineering

Your university is running a special offer on tuition this

Your university is running a special offer on tuition. This year's tuition cost is $18,000. Next year's tuition cost is scheduled to be $19080. The university offers to discount next year's tuition at a rate of 6% If you ...

Suppose two nodes a and b are attached to opposite ends of

Suppose two nodes, A and B, are attached to opposite ends of an 800 m cable, and that they each have one frame of 1, 500 bits (including all headers and preambles) to send to each other. Both nodes attempt to transmit at ...

A student goes to the library let events b the student

A student goes to the library. Let events B = the student checks out a book and D = the student checks out a DVD. Suppose that P(B) = 0.52, P(D) = 0.85 and P(B AND D) = 0.05. Find P(B|D). Give your answer as a decimal ro ...

A community hospital wants to estimate the body mass index

A community hospital wants to estimate the body mass index (BMI) of its local population. To estimate the BMI with an error of at most 0.5 at a 95% confidence level, what sample size should they use? The standard deviati ...

Help me define corporate social responsibilityhelp me

Help me define corporate social responsibility. Help me conduct research on a Fortune 500 company and how do you determine just how (or if) the company ranks from a CSR perspective. Help me understand if the findings cha ...

1 under what circumstances is it advantageous for a company

1. Under what circumstances is it advantageous for a company competing in foreign markets to concentrate its value chain activities in a select few locations? Under what circumstances is it advantageous for a company com ...

Question purpose to assess your ability tobulldiscuss

Question: Purpose: To assess your ability to: • Discuss terminology, concepts, and procedures related to database management systems. Action Items: • Write your response to 2 of the following discussion topics and post y ...

Question in this assignment you will begin to create your

Question: In this assignment, you will begin to create your own formal website plan by defining the website's goals and objectives, writing a formal purpose statement, and creating a target audience profile and needs ass ...

Penetration testing is a technique used to identify

Penetration testing is a technique used to identify security weaknesses in your network. Discuss a type of penetration testing and the different methods utilized to recognize vulnerabilities in your network.

Question critical infrastructures -1discuss cybersecurity

Question: Critical Infrastructures - 1. Discuss cybersecurity policy issues affecting SCADA and ICS systems for Critical Infrastructure services for the public, and compare those issues to the policy issues that affect t ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As