What is the maximum possible throughput of this system

Assignment Help Basic Computer Science
Reference no: EM131235595

Repeat Exercise 34.2 using Schweitzer's approximation to MVA with N = 5 users. Use a starting value of 5/3 for each of the three-device queue lengths and stop after five iterations.

Exercise 34.2

For the system of Exercise 33.6, use MVA to compute the system throughput and response time
for N, =1,..., 5 interactive users.

Exercise 33.66

For the system of Exercise 33.5, answer the following:

a. What is the bottleneck device?

b. What is the minimum average response time?

c. What is the maximum possible disk A utilization for this configuration?

d. What is the maximum possible throughput of this system?

e. What changes in CPU speed would you recommend to achieve a response time of 10 seconds with 25 users? Would you also need a faster disk A or disk B?

f. Write the expressions for asymptotic bounds on throughput and response time.

Exercise 33.5

For a timesharing system with two disks (user and system), the probabilities for jobs completing the service at the CPU were found to be 0.80 to disk A, 0.16 to disk B, and 0.04 to the terminals. The user think time was measured to be 5 seconds, the disk service times were 30 and 25 milliseconds, and the average service time per visit to the CPU was 40 milliseconds. Using the queueing network model shown in Figure 32.8, answer the following for this system:

a. For each job, what are the visit ratios for CPU, disk A, and disk B?

b. For each device, what is the total service demand?

c. If disk A utilization is 60%, what is the utilization of the CPU and disk B?

d. If the utilization of disk B is 10%, what is the average response time when there are 20 users on the system?

Reference no: EM131235595

Questions Cloud

What is your real rate of return : Assume the inflation rate is 100% per year and the nominal rate of interest is 700% per year. - What is your real rate of return? What is the formula?
Create a spreadsheet model for this problem : Three products, Product1 and Product2 and Product3, are produced in annual amounts A1, A2 and A3 respectively. Producti (for each i = 1, 2, 3) has annual demand Ai (as above), fixed cost per order ki, unit cost per item ci, annual holding cost hi, an..
Concept of capital budgeting and decisions thereof : Describe the concept of Capital Budgeting and decisions thereof. How does present value analysis impact a firm's investment program ? How is (the) risk of a project accounted for in Capital Budgeting Analysis?
What is post inflation after tax post default rate of return : Assume there is a 10% nominal rate of return, a tax rate of 40%, and an inflation rate of 5%.  -What is the real, post-inflation, after tax, post-default rate of return?
What is the maximum possible throughput of this system : Repeat Exercise 34.2 using Schweitzer's approximation to MVA with N = 5 users. Use a starting value of 5/3 for each of the three-device queue lengths and stop after five iterations.
Substantial debts to finance mergers and acquisitions : 1. The benefits of mergers and acquisitions, and the impact of growth through acquisition strategies. 2. Financing of mergers and acquisitions and the implications of taking substantial debts to finance Mergers and Acquisitions.
Critical understanding on production of petrochemicals : Objective Comprehensive understanding of various chemical process and technology related to petrochemical industry - Aim To test the knowledge and understanding of various manufacturing technologies on production of petrochemical compounds and the s..
What is the minimum average response time : Write the expressions for balanced bounds on the system throughput and response time of the system of Exercise 33.6 and compute the bounds for up to N = 5 users.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What are the values of the normal project completion time

What are the values of the normal project completion time, the total work time using the normal times, and the critical path

  Creating a mockup ui of current android lollipop interface

creating a mockup UI of the current Android Lollipop interface. I basically need the exact same interface layout/design, with few changes.

  For the aside element create a style rule to

float the aside element on the right with a margin of 10 pixels; set the width to 50% of the width of the main section; and add a rounded border with a radius of 30 pixels. For paragraphs within the aside element, set the font size to 90% and the ..

  Give the average number of byte-order conversions needed

Give the average number of byte-order conversions needed for both big-endian network byte order and receiver-makes-right, for p = 0.1, p = 0.5, and p = 0.9.

  Steps to diagnose application changed from original state

Write down steps would you take in diagnosing the application which has been changed from its original state? Describe the answer.

  Which have user profiles that are available for transfer

Which have user profiles that are available for transfer?

  Create an application that lets the user enter a series

Create an application that lets the user enter a series of numbers. The program should store the numbers in an array and then

  Describe and explain internet protocol security

Group Portion As a group, describe and explain Internet protocol security (IPSec), and then as a group, decide who will be assigned the following topic or question: What are the services that are provided by IPSec?

  Calculate the minimum distance from the start to the goal

Calculate the minimum distance from the start to the goal with passing all the checkpoints -Specification * A map consists of 5 characters as following.

  Role of technology in the workplace

Consider the role of technology in the workplace today and take a stance on whether or not you believe a company has the right to monitor technology usage of its employees on a constant basis. Give your opinion on whether such limitation could (a)..

  Write a code fragment to load the numbers in addresses

Write a code fragment to load the numbers in addresses

  Layers in the protected mode work together

Describe how the layers in the protected mode work together? How memory space is allocated to a user process? How does the file system NTFS works and how it recovers after a system failure?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd