Explain performance evaluation in parallel computing, Computer Engineering

Assignment Help:

Explain Performance Evaluation in parallel Computing

In this section, we will discuss the key attributes used to measure performance of a computer system. The performance characteristics are:

i)  Cycle time (T): It's the unit of time for all operations of a computer system. It is the inverse of clock rate (l/f). The cycle time is signified in n sec. 

ii) Cycles per Instruction (CPI): Different instructions receive different number of cycles for execution. Cycles per Instruction (CPI) is measurement of number of cycles per instruction

iii) Instruction count(IC): Number of total instructions in a program is known as instruction count.

If we presume that all instructions have equal number of cycles, then total execution time of a program would be

                                              = Number of instruction in program * Number of cycle required by one instruction * Time of one cycle.

Hence, execution time would be T=IC*CPI*Tsec.

Basically the clock frequency of system is specified in MHz Also, the processor speed is measured in terms of million instructions per sec (MIPS).

 


Related Discussions:- Explain performance evaluation in parallel computing

Database management system, what would be the occupancy of each leaf node o...

what would be the occupancy of each leaf node of a B+ tree

What is the difference between wire and register, What is the difference be...

What is the difference between wire and reg Wire Wire is used for designing combinational logic, as we all know that this type of logic cannot store a value.  As  you  can

Where the trunks lines are run between, Trunks are the lines that run betwe...

Trunks are the lines that run between (A)  Subscribers and exchange (B)  Switching system and power plant (C) Local area network (D) Switching stations Ans:

Linq file extension, What is the LINQ file extension that interacts with Co...

What is the LINQ file extension that interacts with Code Behind objects. Ans) its .dbml

Computer systems architecture, Assume that you are working in a software co...

Assume that you are working in a software company as a programmer and a bank is your company's client. The Bank is a most popular and one of the leading banks in Malaysia. Your

Advantage to depth first search, Advantage to depth first search: It j...

Advantage to depth first search: It just looks like it will be a long period it finds 'DAN' until. This highlights an important drawback for depth first search. It can regular

C++, Write a program to find the area under the curve y = f(x) between x = ...

Write a program to find the area under the curve y = f(x) between x = a and x = b, integrate y = f(x) between the limits of a and b. The area under a curve between two points can b

Define security protocols used for e-commerce applications, Define various ...

Define various security protocols used for e-commerce applications. The e-commerce systems of today are composed of very many components as like: a commerce server, client soft

Write a bash-c shell script, Write a BASH/C shell script which takes a name...

Write a BASH/C shell script which takes a name of a directory as a command line argument, and prints unique login name of the users having files in that directory. Your code should

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd