What is the reponse time when the load is low

Assignment Help Basic Computer Science
Reference no: EM131087403

Consider the following simple method to enforce mutual exclusion: All sites are arranged in a logical ring fashion and a unique token circulates around the ring hopping from a site to another site. When a site needs to executes its CS, it waits for the token, grabs the token, executes the CS, and then dispatches the token to the next site on the ring. If a site does not nned the token on its arrival, it immediately dispatches the token to the next site (in zero time).

(i) What is the reponse time when the load is low?

(ii) What is the reponse time when the load is heavy?

Assume there are N sites, the message/token delay is T, and CS axecution time is E.

Reference no: EM131087403

Questions Cloud

Correlation coefficient between two variables : Does a high correlation coefficient between two variables indicate that changes in one of the variables necessarily causes changes in the other variable?
What is the approximate forward exchange rate : Assume the current U.S. dollar-British spot rate is 0.6993£/$. If the current nominal one-year interest rate in the U.S. is 5% and the comparable rate in Britain is 6%, what is the approximate forward exchange rate for 360 days?
Can something be done about it or they are bound to happen : Can something be done about it or they are bound to happen?
State the null and alternative hypotheses : State the null and alternative hypotheses. Give the test statistic and the -value and state the conclusion of the test.
What is the reponse time when the load is low : What is the reponse time when the load is low?
What is the probability distribution : (a) What is the probability distribution of X? Specify any relevant parameter values. (b) What is the probability that at most one of the eight tablets will be defective? (ANSWERS WITH AN EXPLANATION PLEASE)
Draw a kripke structure that describes this situation : Draw a Kripke structure that describes this situation.
Assume the underlying distribution : Use the-distribution and the sample results to complete the test of the hypotheses. Use a 5% significance level. Assume the results come from a random sample, and if the sample size is small, assume the underlying distribution is relatively normal..
Complete the test of the hypotheses : Use the t-distribution and the sample results to complete the test of the hypotheses. Use a 5% significance level. Assume the results come from a random sample, and if the sample size is small, assume the underlying distribution is relatively norm..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Which can be used to parse command-line options

The tee command reads its standard input until end-of-file, writing a copy of the input to standard output and to the file named in its command-line argument.

  Channel width needs to be twice range of frequencies

Based on the protocol,assume the channel width needs to be twice the range of frequencies used. How wide must the band be to accommodate 100 channels?

  Find asymptotic solution to following recurrence relations

Using the master methods find the asymptotic solution to the following recurrence relations, specify the case and the asymptotic solution.

  Digital divide: is technology deepening the economic gap

Digital divide: is technology deepening the economic gap between rich and poor?

  What combination of hardware and software did used

What combination of hardware and software did you use? (i.e. brief description of the computer as well as product names of operating environment, compiler, and SDK (if used)

  Context of information technology and information security

Using any of several different tools (Online White pages, Peoplefinders, Wink People Finder, etc.) someone has found your name and address. What other information would be needed in order for them to access your ONLINE bank account or credit card ..

  Describe the open systems interconnection

Describe the Open Systems Interconnection (OSI) protocol model. Identify the advantages and disadvantages of circuit switching and packet switching-X.25, Frame Relay, Asynchronous Transfer Mode2, and Transmission Control Protocol/Internet Protocol (T..

  Driving on a major highway

Were you ever puzzled by an odd looking tree while driving on a major highway? Perform a web search on "antennas camouflaged as trees" and explain in a few sentences what are they used for and why are they disguised.

  Script section of the body

Within the script section of the body, create an array that will list the names of 7-10 cars that are of the same make. For example you can create a list that will contain cars that are made by Nissan.

  We are interrupted or disintegrated

Research is compelling that it takes us approximately 4 to minutes return to our work with the same level of through processes whenever we are interrupted or disintegrated. Is it possible to information is fairly constant?

  Justify why you have included each factor

Suggest four factors that might have significant effects on the initial COCOMO estimate and propose possible values for these factors. Justify why you have included each factor.

  Determine the information technology/security gaps

Determine the information technology/security gaps and develop a security strategy that includes issues relating to confidentiality

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd