A file server uses caching, and achieves a hit rate of 80%. File operations in the server cost 5 ms of CPU time when the server finds the requested block in the cache, and take an additional 15 ms of disk I/O time otherwise. Explaining any assumptions you make, estimate the server’s throughput capacity (average requests/sec) if it is:
i) single-threaded;
ii) two-threaded, running on a single processor;
iii) two-threaded, running on a two-processor computer.
80% of accesses cost 5 ms; 20% of accesses cost 20 ms.
average request time is 0.8*5+.2*20 = 4+4=8ms.
i) single-threaded: rate is 1000/8 = 125 reqs/sec
ii) two-threaded: serving 4 cached and 1 uncached requests takes 25 ms. (overlap I/O with computation). Therefore throughput becomes 1 request in 5 ms. on average, = 200 reqs/sec
iii) two-threaded, 2 CPUs: Processors can serve 2 rqsts in 5 ms => 400 reqs/sec. But disk can serve the 20% of requests at only 1000/15 reqs/sec (assume disk rqsts serialised). This implies a total rate of 5*1000/15 = 333 requests/sec (which the two CPUs can service).
You might also like to view...
Which of the following are valid XML element names?
a) yearBorn. b) year.Born. c) year Born. d) year-Born1. e) 2_year_born. f) --year/born. g) year*born. h) .year_born. i) _year_born_. j) y_e-a_r-b_o-r_n.
All of the following are categories of a computer security threat EXCEPT ____.
A. ?secrecy B. ?subterfuge C. ?integrity D. ?necessity