Capacity and performance of storage - computer architecture, Computer Engineering

Capacity:

Raw capacity

Total amount of stored information that a medium or storage device can hold is expressed as a quantity of bytes and bits (for example 10.4 megabytes).

Memory storage density

The density of stored information is the storage capacity of a medium divided with a unit of length, area or volume (for example1.2 megabytes per square inch).

Performance:

Latency

Time ,taken by it to access a specific location in storage. The relevant unit of measurement is usually nanosecond for primary storage and millisecond for secondary storage, & second for tertiary storage. It may make sense to separate write latency and read latency, and in case of sequential access storage, maximum, minimum and average latency.

Throughput

The rate at which information can be read from /or written to the storage. In computer data storage the throughput is typically expressed in terms of megabytes per second or say MB/s, though bit rate can also be used. As with latency, write rate and read rate may require to be differentiated. Accessing media sequentially, as opposed to randomly, usually yields maximum throughput.

Posted Date: 10/13/2012 6:11:31 AM | Location : United States







Related Discussions:- Capacity and performance of storage - computer architecture, Assignment Help, Ask Question on Capacity and performance of storage - computer architecture, Get Answer, Expert's Help, Capacity and performance of storage - computer architecture Discussions

Write discussion on Capacity and performance of storage - computer architecture
Your posts are moderated
Related Questions
The binary equivalent of (FA) 16   is ? Ans. (FA) 16 = (11111010) 10

Advantages & Disadvantages Enhanced security and convenience: private keys never require be transmitting or revealing to anyone.  They can givce a method for digital signatu

Cache-Only Memory Access Model (COMA) As we have considered earlier, shared memory multiprocessor systems can use cache memories with each processor for decreasing the execution

Forward Chaining - Artificial intelligence: Imagine we have a set of axioms which we know are true statements regarding the world. If we set these to each be a starting state o

What is Full Trust? Your code is permitted to do anything in the framework, meaning that all (.Net) permissions are granted. The GAC has Full Trust because it's on the local HD

CIH, also known  as Chernobyl or Spacefiller, is a Microsoft Windows computer virus which first emerged in 1998. It is one of the most damaging viruses, overwriting critical inform

Why do we need DMA? DMA is used to transfer the block of data directly among an external device and the main memory without the continuous intervention by the processor.

a. What are the differences among conventional signatures and digital signatures? Write a short note on "Attacks on digital signature". b. What is Public-Key Infrastructures

Main problems with evaluation functions: Superlatively, evaluation functions should be quick calculates. Wherever is chance they take a long time to estimate, so after then le

Enumerate the data structures used during the first pass of the assembler. Indicate the fields of these data structures and their purpose/usage. Three main data structures used