State the steps to provide more computing power, Computer Networking

Assignment Help:

State the Steps to provide more computing power

In order to provide more computing power, the following steps may be taken:

  • Add more processing power by addition of more number of processors. But there is a limitation to this also. In most servers, it may not be possible to add more than six processors. The number of processors required should be carefully decided keeping in view the future requirements of the company. The Xeon based Intel processors are of extremely high capacity as compared to the traditional processors.
  • Add more memory (both hard disk as well as primary memory). This means that extra memory cards for primary memory may be added. Usually, the main memory is doubled and kept in terms of any value raised to the power of 2; for instance, 8 MB, 16 MB, 32 MB, 64 MB, 128 MB, 256 MB, 512 MB, 1024 MB (or 1 GB), etc. are acceptable memory space indicators. It may also be necessary that the amount of cache be enhanced based on the need. The cache memory is normally counted in terms of kilobytes. The hard disks come in different capacities like 8 GB, 18 GB, 40 GB, 72 GB, etc. to choose from. Addition of more memory indicates that there will be lesser read/write operations on the hard disk as well as the processing speed would be higher as the primary memory is faster than the secondary.

 


Related Discussions:- State the steps to provide more computing power

Input port - network layer and routing , Input Port The input  ports ...

Input Port The input  ports line  termination functions  and data link processing implement  the physical  and data  link layer  associated with an individual input  link to

Recognize the purpose of icmp, ICMP is used to send error and control messa...

ICMP is used to send error and control messages. Ping uses ICMP to carry the echo-request and echo-reply.

Explain in brief -ring topolgy, Explain in brief -Ring Topolgy Comments 1 ...

Explain in brief -Ring Topolgy Comments 1 - A faulty connection amid two stations can cause network failure 2 - It's difficult to add a new station/device as it has to come betwe

Dns in the internet, DNS in the Internet -Domain name space is split i...

DNS in the Internet -Domain name space is split into three sections: country, generic and inverse -Generic domains define hosts by generic behavior -Country domains are

Show the security policy as well integrated security, Q. Show the Security ...

Q. Show the Security Policy as well Integrated Security ? Security policy is on paper statement describing what assets are to be protected and why who is responsible and which

Difference between a straight-through and crossover cable, What is the diff...

What is the difference between a straight-through and crossover cable? A straight-through cable is used to connect computers to a hub, switch, or router. A crossover cable is u

Security and reciprocity of RSA, Q. Security and Reciprocity of RSA? S...

Q. Security and Reciprocity of RSA? Security and Reciprocity of RSA - Kp and N are issued publicly. - Ks is kept secret. - Since the snooper does not know p and

Urgent pointer - transport layer, Urgent Pointer This 16 bite whic...

Urgent Pointer This 16 bite which is valid  only f the urgent  flag is set is used  when the segment  contains  urgent data. If  defines  the number  that must be  added  t

What are the call routers, What are the Call routers Call routers A, B,...

What are the Call routers Call routers A, B, C, D, and E. There are ten potential lines: AB, AC, AD, AE, BC, BD, BE, CD, CE, and DE. Each of these lines has four possibilities

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd