Metrics for performance evaluation, Computer Networking

Metrics For Performance Evaluation

In this section, we would highlight different kinds of metrics involved for analyzing the performance of parallel algorithms for parallel computers.

Running Time

The running time is the amount of time consumed in implementation of an algorithm for a given input on the N-processor based parallel computer. The running time is indicated by T(n) where n shows the number of processors employed. If the value of n is equal to 1, then the case is same to a sequential computer. The relation among Execution time vs. Number of processors is shown in Figure 1.

804_Execution Time vs. number of processors.png

                                                                 Execution Time vs. number of processors

It can be simply seen from the graph that as the number of processors increases, firstly the implementation time reduces but after a certain optimum level the implementation time increases as number of processors increases. This inconsistency is because of the overheads involved in increasing the number of processes.

Posted Date: 3/4/2013 5:51:09 AM | Location : United States







Related Discussions:- Metrics for performance evaluation, Assignment Help, Ask Question on Metrics for performance evaluation, Get Answer, Expert's Help, Metrics for performance evaluation Discussions

Write discussion on Metrics for performance evaluation
Your posts are moderated
Related Questions
ARP is used to search a devices MAC address given an IP address.

OSI= Open System Interconnection.

Can you define the architecture of TCP IP Protocol?

Question 1 Who initiates the ‘Trap' message? When is this message generated? Question 2 Discuss the features of a typical Network Management System.List (Fault Management,

Virtual private network The virtual  private  networks takes the  user data  encrypts them and sends them  to their  destination over  the internet. the sender  and the receiv


Mail Access Protocols The e mail  message  are usually  sent to  an email  server that stores received message  in the  recipient   e mail  mailbox.  The user  retrieves messa

Packet Switching In the  packet  switching network  type on specific  path is  used for  data  transfer. Instead the data is chopped up into  small  pieces called packed and s

Difference between Authentication and Deauthentication Authentication: Used to establish the self of stations to each other. Deauthentication: This service is appealed whene

Q. Explain about Star Backbone network? - Collapsed or switched backbone - Backbone is just one switch that connects LANs - Utilized as distribution backbone inside a bui