Explain performance evaluation in parallel computing, Computer Engineering

Assignment Help:

Explain Performance Evaluation in parallel Computing

In this section, we will discuss the key attributes used to measure performance of a computer system. The performance characteristics are:

i)  Cycle time (T): It's the unit of time for all operations of a computer system. It is the inverse of clock rate (l/f). The cycle time is signified in n sec. 

ii) Cycles per Instruction (CPI): Different instructions receive different number of cycles for execution. Cycles per Instruction (CPI) is measurement of number of cycles per instruction

iii) Instruction count(IC): Number of total instructions in a program is known as instruction count.

If we presume that all instructions have equal number of cycles, then total execution time of a program would be

                                              = Number of instruction in program * Number of cycle required by one instruction * Time of one cycle.

Hence, execution time would be T=IC*CPI*Tsec.

Basically the clock frequency of system is specified in MHz Also, the processor speed is measured in terms of million instructions per sec (MIPS).

 


Related Discussions:- Explain performance evaluation in parallel computing

How to access the disk data, Q. How to Access the Disk Data? Disks oper...

Q. How to Access the Disk Data? Disks operate is semi-random mode of operation and generally referenced block wise. The data access time on a disk comprises two major component

Explain topology method used in lan technology in detail, Explain topology ...

Explain topology method used in LAN technology in detail. LAN Topologies: Network topology is a physical schematic that shows interconnection of the various users. There are

What is control function, Q. What is control function? If transfer is t...

Q. What is control function? If transfer is to take place only under a predetermined control condition then this condition can be specified as a control function. For illustrat

What are the steps comprised in authentication, What are the steps comprise...

What are the steps comprised in authentication? Steps in Authentication: The control over the access of the resources within the repository is exercised in two steps tha

Programming with parallel virtual machine, Q. Programming with parallel vir...

Q. Programming with parallel virtual machine? The general method for writing a program with PVM is like this:  A user writes one or more sequential programs in C++, C or FOR

What are common reason for error massages while copying file, Q. What are c...

Q. What are common reason for error massages while copying file? While copying files with copy, DOS in encounters any error, it displays a suitable error massage. The common re

What are the disadvantages of public key cryptography, What are the disadva...

What are the disadvantages of Public Key Cryptography? Disadvantages of Public Key Cryptography are as given below: a) It is used to encrypt a secret key that is used to e

Cloud computing assignment, In the module on WSDL you were presented with t...

In the module on WSDL you were presented with the details of the WSDL service that receives a request for a stock market quote and returns the quote. The basic structure of a WSDL

Determine about the information centres, Determine about the Information ce...

Determine about the Information centres Airports, supermarkets and any application where information needs to be relayed to customers, gain advantage from having automatic inf

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd