State the steps to provide more computing power, Computer Networking

Assignment Help:

State the Steps to provide more computing power

In order to provide more computing power, the following steps may be taken:

  • Add more processing power by addition of more number of processors. But there is a limitation to this also. In most servers, it may not be possible to add more than six processors. The number of processors required should be carefully decided keeping in view the future requirements of the company. The Xeon based Intel processors are of extremely high capacity as compared to the traditional processors.
  • Add more memory (both hard disk as well as primary memory). This means that extra memory cards for primary memory may be added. Usually, the main memory is doubled and kept in terms of any value raised to the power of 2; for instance, 8 MB, 16 MB, 32 MB, 64 MB, 128 MB, 256 MB, 512 MB, 1024 MB (or 1 GB), etc. are acceptable memory space indicators. It may also be necessary that the amount of cache be enhanced based on the need. The cache memory is normally counted in terms of kilobytes. The hard disks come in different capacities like 8 GB, 18 GB, 40 GB, 72 GB, etc. to choose from. Addition of more memory indicates that there will be lesser read/write operations on the hard disk as well as the processing speed would be higher as the primary memory is faster than the secondary.

 


Related Discussions:- State the steps to provide more computing power

Show nonreturn to zero encoding, Q. Show Nonreturn to Zero encoding? - ...

Q. Show Nonreturn to Zero encoding? - Value of signal is for all time positive or negative - NRZ-L Signal level depends on bit represented; positive typically means 0

Verify network connectivity- ccna, Verify Network Connectivity Step 1: ...

Verify Network Connectivity Step 1: Use the ping command to determine network connectivity. You can determine network connectivity using the ping command.  Note: If pings

Layer of security, Other than performance  issues, there could be security ...

Other than performance  issues, there could be security reasons for using something like xinetd.  Make simple design in which a new version of xinetd gives a layer of security.

Install, how to install xp via network

how to install xp via network

Node selection principle, QUESTION (a) Briefly describe the steps invol...

QUESTION (a) Briefly describe the steps involved in Network Simplex Method. (b) In Radix Heap Algorithm, the technique of buckets is employed. However this idea is an extens

What is domain names, Q. What is Domain Names ? - Full domain name is a...

Q. What is Domain Names ? - Full domain name is a sequence of labels separated by dots (.) - Fully competent domain name (FQDN) contains the full name of a host cis.usouthal

Sockets, When programming a server or a client, we have to deal with port n...

When programming a server or a client, we have to deal with port numbers and IP addresses, but we usually do this through an abstraction called a socket. Sockets are the standard A

Distinguish between physical topology and logical topology, Question: (...

Question: (a) (i) Distinguish between Physical topology and Logical topology. (ii) Explain the following statement with the help of a diagram: "A star topology can have a l

Receive window - transport layer, Receive Window This  field  defin...

Receive Window This  field  defines the size  of the  window in bytes  that the  other party  must  maintain. Note  that the  length  of this  field 16 bits  which  means

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd