State the steps to provide more computing power, Computer Networking

Assignment Help:

State the Steps to provide more computing power

In order to provide more computing power, the following steps may be taken:

  • Add more processing power by addition of more number of processors. But there is a limitation to this also. In most servers, it may not be possible to add more than six processors. The number of processors required should be carefully decided keeping in view the future requirements of the company. The Xeon based Intel processors are of extremely high capacity as compared to the traditional processors.
  • Add more memory (both hard disk as well as primary memory). This means that extra memory cards for primary memory may be added. Usually, the main memory is doubled and kept in terms of any value raised to the power of 2; for instance, 8 MB, 16 MB, 32 MB, 64 MB, 128 MB, 256 MB, 512 MB, 1024 MB (or 1 GB), etc. are acceptable memory space indicators. It may also be necessary that the amount of cache be enhanced based on the need. The cache memory is normally counted in terms of kilobytes. The hard disks come in different capacities like 8 GB, 18 GB, 40 GB, 72 GB, etc. to choose from. Addition of more memory indicates that there will be lesser read/write operations on the hard disk as well as the processing speed would be higher as the primary memory is faster than the secondary.

 


Related Discussions:- State the steps to provide more computing power

What are hold-downs used for, Hold-Down Timers - Routers ignore network upd...

Hold-Down Timers - Routers ignore network update information for a number of periods.

Explain the bit-level encryption, Q. Explain the Bit-Level Encryption? ...

Q. Explain the Bit-Level Encryption? Bit-Level Encryption - Data is divided into blocks of bits then altered by encoding/decoding, permutation, substitution, exclusive OR

What is aspects of security, Q. What is Aspects of Security? - Securit...

Q. What is Aspects of Security? - Security Attack: Any action whichcompromises the security of information owned by an organization. - Security Mechanism: A mechanism th

Define character stuffing, Define Character Stuffing? In byte stuffing ...

Define Character Stuffing? In byte stuffing (or character stuffing), a particular byte is added to the data section of the frame when there is a character with the same pattern

Program, i need the job to be done within 3days

i need the job to be done within 3days

Determine the functioning of service support, Determine the functioning of ...

Determine the functioning of Service Support Service Support must be considered a strong point for hardware, especially for servers and should be available readily. Many brande

Name the layers of osi, List the layers of OSI There are seven layers i...

List the layers of OSI There are seven layers in OSI model a. Physical Layer b. Data Link Layer c. Network Layer d. Transport Layer e. Session Layer f. Presen

Describe about data communications, Q. Describe about Data Communications? ...

Q. Describe about Data Communications? - Data - Information presented in whatsoever form is agreed upon by the parties creating and using the data - Data Communications - ex

What is data traffic, Q. What is Data traffic? Data traffic ...

Q. What is Data traffic? Data traffic Peak data rate : max data rate of the traffic Average data rate = (amount of data)/time Maximum Burst size: max. l

Simple mail transfer protocoland secure sockets layer, Simple Mail Transfer...

Simple Mail Transfer Protocoland Secure Sockets Layer SMTP: Simple Mail Transfer Protocol is a server-to-server protocol for delivering electronic mail. SSL: Secure Sockets

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd