1. Homepage
  2. Programming
  3. CS-350 - Fundamentals of Computing Systems: Homework Assignment 3 - Dual-class queuing system

CS-350 - Fundamentals of Computing Systems: Homework Assignment 3 - Dual-class queuing system

Engage in a Conversation
USBoston UniversityCS-350CS350Fundamentals of Computing SystemsJava

CS-350 - Fundamentals of Computing Systems Homework Assignment #3 CourseNana.COM

Problem 1 CourseNana.COM

Your job is to dimension a network switch for ultra-high-speed communication. According to your evaluations, the network packets that will be transmitted on this network are exponentially distributed in size with an average of about 1.2 KB (1 KB = 1024 bytes). The switch will need to handle an average traffic of 8200 packets per second. Initially, you decide to go cheap on the design on the switch and use commercial- off-the-shelf (COTS) Ethernet technology, where the maximum bit transmission speed is 100 Mbps (108 bits per second). CourseNana.COM

a)  Packets will be held in memory by the switch while queued and while being processed. How much memory (in bytes) does the switch need to operate such that most of the time no packets are dropped due to memory exhaustion? CourseNana.COM

b)  If a timestamp is taken for each packet when they enter the system and another one when they begin service, what will be (on average) the difference between the two timestamps? CourseNana.COM

c)  The COTS Ethernet chip you want to use requires to be cooled down with a fan if for every 10 seconds of operation, the chip is busy for 7 or more seconds. Do you need to add a fan in your design? CourseNana.COM

d)  What assumptions have you made to solve the system in all the steps above? CourseNana.COM

Your colleagues have reviewed your design and are bringing something you did not consider to your attention. That is, the switch is too slow and will be the bottleneck of the entire network. So here is your plan. You propose to use Gigabit Ethernet technology instead, making your switch capable of processing packets at 1 Gbps (i.e. 109 bits per second). Respond to your colleagues by computing the following: CourseNana.COM

e)  What will be the response time speedup compared to your previous proposal (i.e. standard Ethernet)? CourseNana.COM

f)  Given how expensive are Gigabit Ethernet chips, can we lower the amount of memory to hold in-flight packets in the switch? And by how much? CourseNana.COM

Problem 2 CourseNana.COM

At the Instakilo social network, queries for user profile bios are handled by a dedicated two-stage subsystem. Requests for bios first arrive at a user-facing authentication server. After authentication, they are sent to a backend server. Once they complete handling at the backend server, the response is provided to the users. Thanks to the well-behaved user-base all requests always pass authentication. The authentication server is capable of handling up to 10 requests per second. The backend server, instead, is capable of handling 12 requests per second. But unfortunately, a request at the backend requires a lot of memory and to prevent the server to fail due to memory exhaustion, the engineers have imposed a hard cap on the number of requests that can be admitted at the backend. The limit has been set to 5. Any request arriving while 5 are currently being handled at the backend is rejected and an error response is returned to the user. CourseNana.COM

a)  What is the maximum traffic that the system can handle while still being able to reach steady-state? CourseNana.COM

b)  From now on, consider an input traffic of 8 requests per second. What is the total average number of requests that is either queued or currently being processed in the entire system? CourseNana.COM

c)  When a request is completed at the first stage and then rejected at the second stage, the computation time used to process the request at the first stage is wasted. Over an interval of time of 100 seconds, how much computation time is wasted on average in the system under analysis at steady-state? CourseNana.COM

d)  What is the average response time for requests that are correctly handled (i.e., not rejected)? CourseNana.COM

e)  What is the average response time for a generic request, rejected or not? Assume that the error response to the user is immediately produced if their request is rejected at the second stage. CourseNana.COM

Problem 3 CourseNana.COM

Breaking news! Your multi-million grant to seed your CheckMeOut startup. The idea is the following. Your users upload a selfie and the clever CheckMeOut algorithm checks that everything looks in order. The modern-day version of a pocket mirror. But with an unforgiving computerized eye ready to (constructively) criticize you. For instance, forgot to shave? CheckMeOut: “Have you lost your razor?”; Pillow marks on your cheeks? CheckMeOut: “Them pillow marks make me yawn.”. And so on. CourseNana.COM

With these funds at hand, now it is time to perform system tuning. After observing the system for a while you have noticed the average picture size submitted by the users is 3 MB (1 MB = 1024 KB; and 1 KB = 1024 bytes). Every day, you are receiving about 26,000 CheckMeOut requests that you process in order of arrival. Your want to know the following: CourseNana.COM

a)  How long should your system spend processing each individual request (on average) so that the system ends up handling, on average, about 20 requests—either being currently processed or queued? CourseNana.COM

b)  Assume that you were able to tune your system so that processing each request takes about 2.5 s, what is the time that each user will end up waiting on average before receiving their CheckMeOut response? CourseNana.COM

c)  How would the average response time change if you decided to switch to SJN policy instead of serving requests in their order of arrival? CourseNana.COM

d)  How would the average response time change if you determined that the processing time for each request follows a Normal distribution with mean 2.5 s and standard deviation 0.5 s? CourseNana.COM

From now on, consider the system tuned according to what mentioned in Question b). That includes exponentially distributed service times, with the server employing a FIFO dispath policy. CourseNana.COM

e)  What is the slowdown of the system due to queuing? CourseNana.COM

f)  What is the maximum number of requests that the system can sustain on a daily basis? CourseNana.COM

g)  How much memory will the requests in the system occupy on average, considering that (1) queued requests occupy as much memory as the size of the input image; and (2) requests currently being processed occupy 3× as much until their processing is completed. CourseNana.COM

The federal agency providing the funds got back to you. They say that you must support way more users per day or the deal is off! Overnight, you devise the following optimization. You organize your system in two stages. At the first stage, pictures are compressed down to 450 KB. After compression, they are sent to the main processing server for CheckMeOut caption generation. This way, the final processing stage can take as little as 1.1 s. Now you worry about the following: CourseNana.COM

h)  How long should compression take so that the system can sustain 70,000 requests per day? CourseNana.COM

i)  Assume that compression takes 0.9 s, what is going to be the average time it takes your whole system (compression+processing) to take a new request in and produce the corresponding output when your system reaches 70,000 requests per day? CourseNana.COM

Problem 4 CourseNana.COM

Coding Assignment: In this problem you will develop code to simulate a dual-class queuing system with traffic loopback. The server you simualate accepts requests from two classes of users that send requests with different parameters. Moreover, once a request leaves the server, it might leave the system or go back and ask for more service. The additional amount of service time is distributed in the same was as the originally requested amount. After that, the request might go out or loop back in and so on. Request service times at all the servers are modeled using an exponential distribution, while the arrival process of all the requests follows a Poisson distribution (Hint: recall that if an arrival process is Poissonian, then the inter-arrival time between requests is exponentially distributed). CourseNana.COM

a) Extend your Simulator class to be able to handle two independent streams of requests, of class X and Y, respectively. The Server should still be used to enqueue and process arriving requests following a given policy—FIFO or Shortest Job Next (SJN). Once again, you are free to take any implementation choice that allows the simulator to correctly handle the simulated traffic and service policies. For this part, still assume that once a request has completed processing at the server, it leaves the system immediately. CourseNana.COM

Like before, the simulator should have a method with the following prototype: void simulate(double time), that simulates the arrival and execution of requests at a generic server for time milliseconds, where time is passed as a parameter to the method. The class should be implemented in its own java file, named Simulator.java. The simulator class will internally use a exponentially-distributed random number generator, a timeline and two load generators. For these, you can re-use/adapt the classes you wrote as part of the previous assignment. Please be mindful of the capitalization in all the files you submit. CourseNana.COM

Apart from implementing the simulate(...) method, the class should also include a main(...) function. The main(...) function should accept 6 parameters from the calling environment (in the following order): length of simulation time in milliseconds. This should be passed directly as the time parameter to the simulate(...) function. CourseNana.COM

average arrival rate of requests of class X (λx);
average arrival rate of requests of class Y (
λy);
average service time at the server for requests of class X (
Tsx);
average service time at the server for requests of class Y (
Tsy);
queuing policy which can either be “FIFO” or “SJN”;
probability
pout of leaving the system after completion (set to 1 for this part). CourseNana.COM

It is function only once. In this first version, the simulate(...) function will need to print in the console the simulated time at which each request of class X or Y arrives at the system (ARR), initiates service (START), and completes service (DONE). CourseNana.COM

To generate a sequence of ARR events with the right inter-timing, reuse the loadGenerator approach from HW1. In this case, you will have two LoadGenerator instances, for class X and Y requests, respectively. When their releaseRequest(...) is called, TWO things happen: (1) just like before, generate the next arrival using λx or λy; and (2) create a new Request object with length sampled from an exponential distribution with parameter 1/Tsx or 1/Tsy and pass it to the Server. Thus, the Server class should have some receiveRequest(...) method that can be called by the LoadGenerator for this purpose. At the end of the simulation, still print out global statistics for the utilization (UTIL), average system responsibility of the main(...) function to internally invoke the implemented simulate(...) population (QAVG), and average requests waiting (WAVG). Unlike before, compute average waiting time (TWAIT) and average response time (TRESP) separately for the two X and Y request classes. See output below. CourseNana.COM

Under the FIFO policy, the order of service is the same as the order of arrival. In this case, the output must look like this: CourseNana.COM

UTIL: <utilization>
QAVG: <avg. number of requests in the system>
WAVG: <avg. number of requests waiting for service>
TRESP X: <avg. response time of requests of class X>
TWAIT X: <avg. time spent in the queue by X-class requests> TRESP Y: <avg. response time of requests of class Y>
TWAIT Y: <avg. time spent in the queue by Y-class requests>
CourseNana.COM

where <timestamp> is the simulated time in milliseconds at which the event occurred printed in decimal format, and <length> is the service time of the request. Be extremely careful to follow the format described above. CodeBuddy will be very sensitive to output formatting issues. CourseNana.COM

b) Modify the code of the simulator written in the first part of this problem to handle possible loop-back of requests. The simulator remains the same in terms of interface, accepted parameters, and simulation logic. However, whenever a request completes service, you should flip a coin. With probability pout (6- th parameter), the request actually completes at the system and therefore leaves for good. Otherwise, it goes back into the server queue. It keeps the same ID and requests an additional amount of service (length) distributed identically to new requests of the same class. The new output is similar to what you had before. There are only two differences. First, if a requests leaves the system for good, the you still print Y0 DONE: <timestamp>. But if it goes back in, you should print Y0 LOOP: <timestamp> instead. Second, you should keep track of how many times a generic request (regardless of the class) asks for service and compute the average number of times a request demands service. We call this a RUN. A brand new request always asks for a first RUN, then it might ask for one more RUN or exit and so on. Thus, statistics will need to be reported as: CourseNana.COM

UTIL: <utilization>
QAVG: <avg. number of requests in the system>
WAVG: <avg. number of requests waiting for service>
TRESP X: <avg. response time of requests of class X>
TWAIT X: <avg. time spent in the queue by X-class requests> TRESP Y: <avg. response time of requests of class Y>
TWAIT Y: <avg. time spent in the queue by Y-class requests> RUNS: <avg. number of times a request demands service>
CourseNana.COM

Get in Touch with Our Experts

WeChat (微信) WeChat (微信)
Whatsapp WhatsApp
US代写,Boston University代写,CS-350代写,CS350代写,Fundamentals of Computing Systems代写,Java代写,US代编,Boston University代编,CS-350代编,CS350代编,Fundamentals of Computing Systems代编,Java代编,US代考,Boston University代考,CS-350代考,CS350代考,Fundamentals of Computing Systems代考,Java代考,UShelp,Boston Universityhelp,CS-350help,CS350help,Fundamentals of Computing Systemshelp,Javahelp,US作业代写,Boston University作业代写,CS-350作业代写,CS350作业代写,Fundamentals of Computing Systems作业代写,Java作业代写,US编程代写,Boston University编程代写,CS-350编程代写,CS350编程代写,Fundamentals of Computing Systems编程代写,Java编程代写,USprogramming help,Boston Universityprogramming help,CS-350programming help,CS350programming help,Fundamentals of Computing Systemsprogramming help,Javaprogramming help,USassignment help,Boston Universityassignment help,CS-350assignment help,CS350assignment help,Fundamentals of Computing Systemsassignment help,Javaassignment help,USsolution,Boston Universitysolution,CS-350solution,CS350solution,Fundamentals of Computing Systemssolution,Javasolution,