Calculate the overall speedup of a system

Assignment Help Computer Networking
Reference no: EM13186551

1. How is a Network Layer protocol different from a Transport Layer protocol?

2. Into which Class of networks do the following IP Addresses fall?

a.) 180.265.14.3

b) 218.193.149.222

c) 92.146.292.7

3. Into which class of networks do the following IP addresses fall?

a.) 223.52.176.62

b.)127.255.255.2

c.) 191.57.229.163

4. Calculate the overall speedup of a system that spends 65% of its time on I/O with a disk upgrade that provides for 50% greater throughput.
5. Calculate the overall speedup of a system that spends 40% of its time in calculations with a processor upgrade that provides for 100% greater throughput.

6. Amdahl's Law is as applicable to software as it is to hardware. An oft-cited programming truism states that a program spends 90% of its time executing 10% of its code. Thus, tuning a small amount of program code can often time have an enormous effect on the overall performance of a software product. Determine the overall system speed up if:

a. 90% of a program is made to run 10 times as fast (900% faster)

b. 80% of a program is made to run 20% faster.

7. Suppose a disk has the following characteristics

- 4 Surfaces
-1024 Tracks per surface
-128 Sectors per track
-512 bytes/sector
-Track-to-track seek time of 5 milliseconds
-Rotational speed of 500 RPM

a. What is the capacity of the drive?

b. What is the access time?

8. Suppose a disk has the following characteristics

- 5 Surfaces
-1024 Tracks per surface
-256 Sectors per track
-512 bytes/sector
-Track-to-track seek time of 8 milliseconds
-Rotational speed of 7500 RPM

a. What is the capacity of the drive?

b. What is the access time?

9. Suppose a disk has the following characteristics

- 6 Surfaces
-16,383 Tracks per surface
-63 Sectors per track
-512 bytes/sector
-Track-to-track seek time of 8.5 milliseconds
-Rotational speed of 7200 RPM

a. What is the capacity of the drive?

b. What is the access time?

Reference no: EM13186551

Questions Cloud

What is the interest rate it will have to pay : Suppose that due to a political conflict inside the country, there is a risk the government will default in its debt in t = 2. The investors perceive the probability of that default to be = 0:10. What interest will they demand (HINT: because inves..
State hydrogen gas and aqueous sodium hydroxide : solid sodium is added to liquid water and reacts to produce hydrogen gas and aqueous sodium hydroxide. Write a balanced chemical equation for this reaction.
Define nitrogen dioxide pollutant reacts with gaseous oxygen : that forms when gaseous nitrogen dioxide pollutant reacts with gaseous oxygen and liquid water to form aqueous nitric acid. Write a balanced chemical equation for this reaction.
Show strategies to prevent such cyber warfare attack : Need a 1000 word paper on the various recent/news on the United States (particular the group known as Anonymous and Lulzsec). Also need the various strategies to prevent such cyber warfare attacks and prevention techniques.
Calculate the overall speedup of a system : How is a Network Layer protocol different from a Transport Layer protocol and into which Class of networks do the following IP Addresses fall?
State a balanced chemical equation for the reaction : Write a balanced chemical equation for this reaction. Express your answer as a chemical equation. Identify all of the phases in your answer.
State nitric acid is a component of acid rain : Nitric acid is a component of acid rain that forms when gaseous nitrogen dioxide pollutant reacts with gaseous oxygen and liquid water to form aqueous nitric acid.
Determine what is the expected value of the delay : The internal study could be started immediately, and then the decision on the consultant could be made in three months. If this option is selected, the internal study will reliably indicate the outcome. If the consultant were hired, it would add t..
Depict the major organic product obtained : A) Draw the major organic product obtained when 1,2-dimethylcyclohexane-1,2-diol encounters periodic acid.

Reviews

Write a Review

Computer Networking Questions & Answers

  Compute devices accommodated by t-type tdm line

Determine no. of foll. devices that could be accommodated by T1-type TDM line if 1% of line capacity is reserved for synchronization purposes.

  Establishing own world-wide satellite radio infrastructure

An entrepreneur is interested in establishing her own world-wide satellite radio infrastructure and has requested your help. Describe and justify the infrastructure that you would develop.

  Describe network in file transfer and without file transfers

Observe reply time before and during file transfer. Write down short description of network response time during file transfers and without file transfers.

  Determine actual maximum channel capacity

Determine the theoretical maximum channel capacity (Kbps) of traditional telephone lines (POTS)? Will that be the actual maximum channel capacity?

  Discuss functionality of component of network

Discuss the functionality of each component and the role the components play in the operation of the network and the Internet.

  Explaining multiple mono-alphabetic substitution ciphers

Consider improved version of Vigenere cipher, where instead of using multiple shift ciphers, multiple mono-alphabetic substitution ciphers are used.

  Segment network to reduce scope of compliance

To avoid having whole network subject to PCI specifications, how will you segment network to reduce scope of compliance?

  A rural medical centre in australia

A rural medical centre in Australia plans to improve its services to the community by providing telemedicine and healthcare. The centre has 4 doctors working at a given time and some patients travel over 100km to see a doctor.

  How company can back up and protect network data

Develop the disaster plan for selected organization which includes how you would suggest company back up and protect network data.

  Assume a dual-railed system

(Multiplexers) Assume a dual-railed system, where you have access to any vari- able and its complement. Implement the following four-input Boolean function as indicated in each of the following subsections.

  How is this applied to changing the coding?

when writing a linear cipher using n = 27, if a = ?, b = ? and c = 7, if ac = 1(mod27) how is this applied to changing the coding?

  Benefits of authentication scheme

An example of when a failure may occur is if the clinet's MAC address is explicitly excluded in the AP/router configuration. What are the benefits of this authentication scheme?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd