The daytime processing load consists

Assignment Help Basic Computer Science
Reference no: EM13992555

  1. Suppose the daytime processing load consists of 60% CPU activity and 40% disk activity. Your customers are complaining that the system is slow. After doing some research, you have learned that you can upgrade your disks for $8,000 to make them 2.5 times as fast as they are currently. You have also learned that you can upgrade your CPU to make it 1.4 as fast for $5,000.a. Which would you choose to yield the best performance improvement for the least amount of money?
    b. Which option would you choose if you don't care about the money, but want a faster system?
    c. What is the break-even point for the upgrades? That is, what price would we need to charge for the CPU (or the disk - change only one) so the result was the same cost per 1% increase for both?
  2. Suppose a disk drive has the following characteristics: • 5 surfaces • 1024 tracks per surface • 256 sectors per track • 512 bytes/sector • Track-to-track seek time of 8 milliseconds • Rotational speed of 7500 RPM.a. What is the capacity of the drive?
    b. What is the access time?
  3. Suppose you have a 100GB database housed on a disk array that supports a transfer rate of 60MBps and a tape drive that supports 200GB cartridges with a transfer rate of 80MB per second. How long will it take to back up the database? What is the transfer time if 2:1 compression is possible?
  4. A particular high-performance computer system has been functioning as an e-business server on the Web. This system supports $10,000 per hour in gross business volume. It has been estimated that the net profit per hour is $1,200. In other words, if the system goes down, the company will lose $1,200 every hour until repairs are made. Furthermore, any data on the damaged disk would be lost. Some of this data could be retrieved from the previous night's backups, but the rest would be gone forever. Conceivably, a poorly-timed disk crash could cost your company hundreds of thousands of dollars in immediate revenue loss, and untold thousands in permanent business loss. The fact that this system is not using any type of RAID is disturbing to you. Although your chief concern is data integrity and system availability, others in your group are obsessed with system performance. They feel that more revenue would be lost in the long run if the system slows down after RAID is installed. They have stated specifically that a system with RAID performing at half the speed of the current system would result in gross revenue dollars per hour declining to $5,000 per hour. In total, 80% of the system e-business activity involves a database transaction. The database transactions consist of 60% reads and 40% writes. On average, disk access timeis 20ms. The disks on this system are nearly full and are nearing the end of their expected life, so new ones must be ordered soon. You feel that this is a good time to try to install RAID, even though you'll need to buy extra disks. The disks that are suitable for your system cost $2000 for each 10 gigabyte spindle. The average access time of these new disks is 15ms with a MTTF of 20,000 hours and a MTTR of 4 hours. You have projected that you will need 60 gigabytes of storage to accommodate the existing data as well as the expected data growth over the next 5 years. (All of the disks will be replaced.)a. Are the people who are against adding RAID to the system correct in their assertion that 50% slower disks will result in revenues declining to $5,000 per hour? Justify your answer.
    b. What would be the average disk access time on your system if you decide to use RAID-1?
    c. What would be the average disk access time on your system using a RAID-5 array with two sets of 4 disks if 25% of the database transactions must wait behind one transaction for the disk to become free?
    d. Which configuration has a better cost-justification, RAID-1 or RAID-5? Explain your answer.
  5. Which of the types of storage architectures discussed in this section would you expect to find in a large data center or server farm? What would be the problem with using one of the other architectures in the data center environment?

Reference no: EM13992555

Questions Cloud

The mother board to the hard drive and cd/dvd drive : Cables inside of the computer that connect the mother board to the hard drive and CD/DVD drive.
A control character is sent at the beginning as well : A control character is sent at the beginning as well as at the end of each block in the synchronous-transmission in order to?
What is the coefficient of restitution for the collision : What is the coefficient of restitution for this collision? Does the change in internal energy of a system increase or decrease if the coefficient of restitution gets smaller?
Compuer architecture addition substraction multiplication : 0ver view of compuer architecture addition substraction multiplication
The daytime processing load consists : Suppose the daytime processing load consists of 60% CPU activity and 40% disk activity. Your customers are complaining that the system is slow. After doing some research, you have learned that you can upgrade your disks for $8,000 to make them 2.5 ti..
Problem regarding the business professional look : The presentation should include a minimum 20-25 slides and a business professional look, with Times New Roman, 12-point font. Any sources used should be appropriately cited using APA style writing.
For automatic objects : For automatic objects, constructors and destructors are called each time the objects
What do you mean by speaker adaptation : What do you mean by speaker adaptation? how it useful to reduce the computational load of the system
Summarise three functions carried out by this professional : Submit a paper in which you address the concept of ‘professional bodies' as it relates to the technology industry. To do this, first explain what is meant by ‘professional bodies'

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Fsm packet sending and receiving protocols

Consider a scenario in which a Host, A, wants to simultaneously send messages to Hosts B, C, and D. A is connected to B, C, and D via a broadcast channel, and a packet sent by A is carried by this channel to each of B, C, and D.

  Difference between twitter and instant messaging

Question 1: What is the difference between Twitter and Instant Messaging? Question 2: List and briefly discuss three

  Design and test in logic works

Design and test in Logic works

  Implement encryption and decryption with modied simplied des

Please note that you do not have to actually implement these operations as bit operations. For example, you can store the plaintext as an array of integers.

  Write an essay paper addressing what is coso

Write an essay paper addressing what is COSO

  Identify five different it systems

Identify five different IT systems that have affected business in the past few years. For each system, briefly note the following: · A name for the system

  Write a program to simulate the operation of a simple robot

Write a program to simulate the operation of a simple robot . the robot moves in fourdirections :forward , right , left. the job of the robot is to move items and place it in the right slots in each station. there are 8 stations plus the pick up stat..

  Internet class

i have four diferent paper in diferent subjct first one is Choose a topic recently in the news that concerns the Internet.

  Circut which detects even parity

Consider the following circuit, which detects even parity. There are one output, even, and three inputs, a(2), a(l) and a(0), which are grouped as a vector or bus. The output is asserted when there are even numbers (i.e., 0 or 2) of 1s from the in..

  Safeguards against unreasonable searches and seizures

In this assignment, you need to work on the Fourth Amendment. Before starting on the assignment, make sure that you read about the Fourth Amendment and understand the nature/features of this amendment related to privacy. The Fourth Amendment safeguar..

  Critical infrastructure protection

According to the text, Critical Infrastructure Protection (CIP) is an important cybersecurity initiative that requires careful planning and coordination in protecting our infrastructure.

  Write one function that reads the input using alias paramete

Write one function that reads the input using alias parameters (reference parameters).Write a second function that calculates the pay amount. If the salesperson owes money, thereturn amount from the function is a negative number.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd