Explain response time for jobs in observed system

Assignment Help Basic Computer Science
Reference no: EM1386186

We observe the closed system for 30 minutes, during which 1600 tasks are completed, from 12 terminals. Each terminal (source of tasks) has think time of 12s between receiving response to one task, and submitting next task. System has CPU and two disks, one is fast, other is slow. Fast disk can deliver block in 1/2 of time that slow disk would take. During observation period, 32000 accesses happen at fast disk, and 12000 accesses at slow disk. During observation period, CPU is busy for 1080s, fast disk is busy for 400s, and slow disk is busy for 600s.

a) Explain the response time for jobs in observed system?
b) As function of N, number of terminals, give high-load bounds for throughput and response time; also provide low-load bounds.
c) How many terminals can we support, while keeping response time below 3 s?
d) Assume we plan to replace CPU with CPU whose speed is double (therefore time to execute each job would decrease so it becomes 1/2 of current time). Evaluate number of terminals we can support, with response time below 3s. "

Reference no: EM1386186

Questions Cloud

Normally distributed stock fund annual expenses : Suppose that 10 years ago the average annual expense for stock funds was 1.19 percent. Let µ be the current mean annual expense for all stock funds, and assume that stock fund annual expenses are approximately normally distributed.
Compute the multifactor productivity measure for each : Compute the multifactor productivity measure for each of the weeks shown. What do the productivity figures suggest?
Important concept about critical thinking for person : Critically discuss the most important concept about critical thinking for a person? What tools/insights does critical thinking give someone to make positive change in their life?
Many strategic leaders say that they want managers : Many strategic leaders say that they want managers to think strategically. How strategic leader can facilitate a middle manager to "think strategically?
Explain response time for jobs in observed system : Explain the response time for jobs in observed system? As function of N, number of terminals, give high-load bounds for throughput and response time; also provide low-load bounds.
Find expected value for the trait among their offspring : The mean value of a trait is 250 units and the h2 for the trait is .50. A male and female measuring 240 and 280 units respectively are selected for breeding and they produce several offspring. Find expected value for the trait among their offspring.
Causal hypothesis experiment analysis : Discuss the control and experimental groups-control group where the 28 second graders that did not recieve piano instruction. Experimental group were the 26 second graders that did receive piano instruction
Checking of variables using the chi-square tests : Chi-square tests are great to show if distributions differ or if two variables interact in producing outcomes. What are some examples of variables that you might want to check using the chi-square tests? What would these results tell you?
Promoter region from the trp operon upstream : Assume you decide to make a by placing the promoter region from the Trp operon upstream of the coding region for the enzymes responsible for lactose metabolism.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Find speedup gain of using simd computer over sisd computer

If both SISD and SIMD machines run at same clock speed, determine the speedup gain of using the SIMD computer over the SISD computer?

  Explaining competition in early years of telephone industry

Was regulation alternative to competition in early years of telephone industry?

  Explain classic five-stage risc integer pipeline

Assume that the initial value of R3 is R2 + 496. Use the classic five-stage RISC integer pipeline and assume all memory accesses take 1 clock cycle.

  Threat to ships-which manufactures have instituted control

Provide two examples of threats to boats/ships for which manufactures and/or regulators have instituted controls. Describe the vulnerabilities for which the controls were created.

  Explaining origins or genesis of wireless networking

Explain origins/genesis of wireless networking.

  Suggest a way to find web servers for the department

Can you suggest a way to roughly find out the web servers (outside your department) which are not popular among the users in the department? Describe.

  Explain techniques to recover passwords from protected files

Explain techniques to apply to recover passwords from the protected files.

  Question about materialism philosophy

The mind body dualism, in philosophy, maintains that mind and the brain are 2-distinct categories and one cannot be explained in terms of the other, Mental phenomena are not physical and cannot be explained in physical terms.

  Determining smallest-last vertex ordering

Determine a smallest-last vertex ordering and plot degree when deleted diagram for given random geometric graphs.

  Explaining smartphones as important digital devices

Many resources will suggest that in the next few coming years, smartphones will become the one of the most important digital devices we own. Explain the implications of this statement.

  Describe method to execute account harvesting

Describe the threat of account harvesting. Suggest a method to execute an account harvesting attack on a Windows platform.

  Explain elements of enterprise information security policy

Write and explain briefly the three kinds of information security policy as described by NIST SP 800-14. Write and explain briefly four elements that must be present in Enterprise Information Security Policy.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd