Explain performance evaluation in parallel computing, Computer Engineering

Assignment Help:

Explain Performance Evaluation in parallel Computing

In this section, we will discuss the key attributes used to measure performance of a computer system. The performance characteristics are:

i)  Cycle time (T): It's the unit of time for all operations of a computer system. It is the inverse of clock rate (l/f). The cycle time is signified in n sec. 

ii) Cycles per Instruction (CPI): Different instructions receive different number of cycles for execution. Cycles per Instruction (CPI) is measurement of number of cycles per instruction

iii) Instruction count(IC): Number of total instructions in a program is known as instruction count.

If we presume that all instructions have equal number of cycles, then total execution time of a program would be

                                              = Number of instruction in program * Number of cycle required by one instruction * Time of one cycle.

Hence, execution time would be T=IC*CPI*Tsec.

Basically the clock frequency of system is specified in MHz Also, the processor speed is measured in terms of million instructions per sec (MIPS).

 


Related Discussions:- Explain performance evaluation in parallel computing

Describe the concept of value creation, I am required to write about the im...

I am required to write about the impact of the internet on firms with reference to the following questions: 1. Describe the concept of value creation. Explain how a firm can use

Data packet from one network to another, A device that forwards data packet...

A device that forwards data packet from one network to another is known as a  Switch device.

State some of the uses of ms access, MS Access provides a vast range of fun...

MS Access provides a vast range of functions some of them are ? It is used by small business, departments of large corporations, and by amateurs to make applications on their d

Transaction that are programmed by the user, How the transaction that are p...

How the transaction that are programmed by the user can be protected? By executing an authority check.

Describe about directory in doc, Q. Describe about directory in DOC? We...

Q. Describe about directory in DOC? We all know that, the volume of the hard disk is generally quite large (10 MB to a few GB). You can keep hundreds or even thousands of files

Explain the working of master-slave JK flip flop, With relevant diagram exp...

With relevant diagram explain the working of master-slave JK flip flop. Ans. Master-Slave J-K FLIP-FLOP: A cascade of two S-R FLIP-FLOPS is a master-slave J-K FLIP-FLOP. One

Explain about the links and association, Links and Association Links a...

Links and Association Links and associations are the basic means used for establishing relationships among objects and classes of the system. In the next subsection we will di

Write an awk program - unix , Write an AWK program which takes the followin...

Write an AWK program which takes the following input file and processes it. $cat data.txt John Do 111-1111 English 90 Maths 80 Alice Do 222-2222 English 90 Maths 90 Chemistry 93

What are the major components of a web browser, What are the major componen...

What are the major components of a web browser? A browser contains a set of clients, a controller and a set of interpreters which manages them. All browsers must have an HTML

Explain that lost acknowledgement in packet retransmission, Explain that th...

Explain that the lost acknowledgement does not necessarily enforce retransmission of the packet . To guarantee reliable transfer, protocols utilize positive acknowledgement al

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd