SlideShare a Scribd company logo
BACKGROUND
• Performance evaluation aims at predicting a system’s behavior in a
quantitative manner
• When a new computer and telecommunication system is to be built
or an existing system has to be tuned, reconfigured, or adapted, a
performance evaluation can be employed to forecast the impact of
architectural or implementation modifications on the overall system
performance
GOALS OF PERFORMANCE EVALUATION
• Compare alternative system designs.
• Procurement.
• Capacity planning
• System tuning
• Performance debugging
• Set expectation
• Recognize relative performance
APPLICATIONS OF PERFORMANCE EVALUATION
• Design of systems.
It is important that before implementing any system, we conduct a performance evaluation
analysis to select the best and most cost-effective design
• System upgrade and tuning.
This process is needed to upgrade or tune the performance of the system or components
of the system by either replacing some components with new ones that have better
capabilities or by replacing the entire system or subsystem with one depending on the
required performance and capacities
• Procurement.
In this application, the objective is to select the best system from a group of other
competing systems. The main criteria are usually the cost, availability, compatibility,
and reliability.
• System analysis
When the system is not performing as it is expected, a performance analysis is conducted
to find the bottleneck device or cause of sluggish behavior
TECHNIQUES
• (a) analytic modeling, (b) simulation, and (c) measurement and testing
• These alternatives are arranged here in increasing order of cost and
accuracy. Analytic models are always approximate: This price must be paid
for tractability and obtaining closed-form solution expressions of the
performance metrics in terms of design parameters and variables.
• Simulations require considerable investment of time in deriving the model,
designing and coding the simulator, and verifying and validating the model,
but they are more flexible, accurate, and credible.
• Real measurements and experiments on a variation of a prototype or on
the actual system are the most expensive of all and require considerable
engineering efforts; however, these measurements are the most accurate
METRICS OF PERFORMANCE
A good performance metric should have the following characteristics
• (a) the performance metric should allow an unambiguous comparison
to be made between systems,
• (b) it should be possible to develop models to estimate the metric,
• (c) it should be relevant or meaningful
• (d) the model used to estimate the metric should not be difficult to
estimate.
In general, performance evaluation analysts are typically interested in
the:
• frequency of occurrence of a specific event
• duration of specific time intervals, and
• size of some parameter. In other words, the interest is in count, time,
and size measures.
Performance evaluation metrics of a computer and telecommunication
systems can be classified into the following chief categories
• Higher better metrics (HB). In this category, the higher the value of
the metric, the better it is. Productivity comes under this category.
• Lower better metrics (LB). Here, the lower the value of the metric, the
better it is. Responsiveness is an example of this type.
• Nominal better metrics (NB). In this class, the performance metric
should not be too high or too low. A value of usage between 0.5 and
0.75 is desired. Utilization is an example on such metrics.
• Other performance measures that are becoming of great interest to
performance analysts are availability and reliability.
• Availability is quantified by two known measures: (a) mean time to
failure (MTTF) and (b) mean time between failures (MTBT)
• Reliability is defined as the probability that the system survives until
some time t.
WORKLOAD CHARACTERIZATION AND
BENCHMARKING
• Within the confines of a network, workload is the amount of work assigned
to, or done by, a client, workgroup, server, or internetwork in a given time
period. Therefore, workload characterization is the science that observes,
identifies and explains the phenomena of work in a manner that simplifies
your understanding of how the network is being used.
• Understanding the characteristics of today’s emerging workloads is
essential to design efficient and cost-effective architectures for them.
• Hence, It is important to characterize web servers, database systems,
transaction processing systems, multimedia, networks, ATM switches, and
scientific workloads. It is also useful to design models for workloads
• An accurate characterization of application and operation system behavior
leads to improved architectures and designs.
In this context, there are two types of relevant inputs:
• (a) parameters that can be controlled by the system designer, such as
resource allocation buffering technique and scheduling scheme
• (b) input generated by the environments in which the system under
study is used such as interarrival times
Among the techniques that can be used to specify workload are
• (a) averaging,
• (b) single-parameter histogram,
• (c) multiparameter histogram,
• (d) Markov models.
• (e) clustering,
• (f) use of dispersion measures such as coefficient of variation (COV), and
• (g) principal component analysis
COV = s/x’
where x’ is the sample mean with size n
• The principal-component analysis is used to categorize workload
components using the weighted sum of their parameter values. If di is
the weight for the ith parameter xi, then the weighted sum W is as
follows:
• A benchmark program is used as a standard reference for comparing
performance results using different hardware or different software
tools.
• It is supposed to capture processing and data movement
characteristics of a category of application.
• Benchmarks are meant to measure and predict the performance of
systems under study and to reveal their design weakness and strong
aspects.
• A benchmark suite is basically a set of benchmark programs together
with a set of specific rules that govern the test conditions and
methods such as testbed platform environment, input data, output
results, and evaluation metrics
• In computer systems, benchmarks can be classified based on the
application, such as commercial applications, scientific computing,
network services, signal processing, scientific computing, and image
processing.
• Moreover, we can classify benchmarks into microbenchmarks,
macrobenchmarks, synthetic benchmark programs, program kernels,
and application benchmark programs
• Microbenchmarks measure a specific portion of the computer
system, such as the CPU speed, memory speed, I/O speed,
interconnection network, and so on.
• A macrobenchmark measures the performance of the system as a
whole. Basically, it compares different systems when running a
specific application on them. Usually, this class of benchmarks is used
for parallel computer systems.
• An instruction mix is a specification of different instructions coupled
with their usage frequency. The program kernel is a generalization of
the instruction mix. It is used to characterize the main portion of a
specific type of application program.
• Kernel benchmark is usually a small program that has been extracted
from a large application program. Because the kernel is small,
including a dozen lines of code, it should be easy to port it to many
different systems.
• Application benchmark programs are often used when the computer
system under evaluation is meant to be used for a specific
application, such as an airline reservation or scientific computing.
• Synthetic benchmarks do this by specially created programs that
impose the workload on the component.

More Related Content

Similar to module 1.pptx

Testing of Object-Oriented Software
Testing of Object-Oriented SoftwareTesting of Object-Oriented Software
Testing of Object-Oriented Software
Praveen Penumathsa
 
Software archiecture lecture06
Software archiecture   lecture06Software archiecture   lecture06
Software archiecture lecture06Luktalja
 
Chapter 15 software product metrics
Chapter 15 software product metricsChapter 15 software product metrics
Chapter 15 software product metrics
SHREEHARI WADAWADAGI
 
software Engineering process
software Engineering processsoftware Engineering process
software Engineering process
Raheel Aslam
 
Software Engineering Lec 4-requirments
Software Engineering Lec 4-requirmentsSoftware Engineering Lec 4-requirments
Software Engineering Lec 4-requirments
Taymoor Nazmy
 
Chapter Three.pptx
Chapter Three.pptxChapter Three.pptx
Chapter Three.pptx
ThedronBerhanu
 
Unit 7 verification & validation
Unit 7 verification & validationUnit 7 verification & validation
Unit 7 verification & validation
raksharao
 
Software development life cycle (SDLC)
Software development life cycle (SDLC)Software development life cycle (SDLC)
Software development life cycle (SDLC)
Simran Kaur
 
Enterprise resource planning_system
Enterprise resource planning_systemEnterprise resource planning_system
Enterprise resource planning_system
Jithin Zcs
 
What is Benchmarking & how it work in power system
What is Benchmarking & how it work in power system What is Benchmarking & how it work in power system
What is Benchmarking & how it work in power system
Power System Operation
 
Mc seminar
Mc seminarMc seminar
Mc seminar
Ankit Anand
 
340_18CS35_se_mod1(secab).pdf
340_18CS35_se_mod1(secab).pdf340_18CS35_se_mod1(secab).pdf
340_18CS35_se_mod1(secab).pdf
krishnaraj714229
 
Cp7101 design and management of computer networks -network
Cp7101 design and management of computer networks -networkCp7101 design and management of computer networks -network
Cp7101 design and management of computer networks -network
Dr Geetha Mohan
 
Software Metrics - Software Engineering
Software Metrics - Software EngineeringSoftware Metrics - Software Engineering
Software Metrics - Software Engineering
Drishti Bhalla
 
Software Reliability
Software ReliabilitySoftware Reliability
Software Reliability
Gurkamal Rakhra
 
Unit 3 for st
Unit 3 for stUnit 3 for st
Unit 3 for st
Poonkodi Jayakumar
 
Pressman ch-22-process-and-project-metrics
Pressman ch-22-process-and-project-metricsPressman ch-22-process-and-project-metrics
Pressman ch-22-process-and-project-metrics
Seema Kamble
 
Unit 1 sepm cleanroom engineering
Unit 1 sepm cleanroom engineeringUnit 1 sepm cleanroom engineering
Unit 1 sepm cleanroom engineering
KanchanPatil34
 
Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for Exams
MuhammadTalha436
 
Software engineering
Software engineeringSoftware engineering
Software engineering
sakthibalabalamuruga
 

Similar to module 1.pptx (20)

Testing of Object-Oriented Software
Testing of Object-Oriented SoftwareTesting of Object-Oriented Software
Testing of Object-Oriented Software
 
Software archiecture lecture06
Software archiecture   lecture06Software archiecture   lecture06
Software archiecture lecture06
 
Chapter 15 software product metrics
Chapter 15 software product metricsChapter 15 software product metrics
Chapter 15 software product metrics
 
software Engineering process
software Engineering processsoftware Engineering process
software Engineering process
 
Software Engineering Lec 4-requirments
Software Engineering Lec 4-requirmentsSoftware Engineering Lec 4-requirments
Software Engineering Lec 4-requirments
 
Chapter Three.pptx
Chapter Three.pptxChapter Three.pptx
Chapter Three.pptx
 
Unit 7 verification & validation
Unit 7 verification & validationUnit 7 verification & validation
Unit 7 verification & validation
 
Software development life cycle (SDLC)
Software development life cycle (SDLC)Software development life cycle (SDLC)
Software development life cycle (SDLC)
 
Enterprise resource planning_system
Enterprise resource planning_systemEnterprise resource planning_system
Enterprise resource planning_system
 
What is Benchmarking & how it work in power system
What is Benchmarking & how it work in power system What is Benchmarking & how it work in power system
What is Benchmarking & how it work in power system
 
Mc seminar
Mc seminarMc seminar
Mc seminar
 
340_18CS35_se_mod1(secab).pdf
340_18CS35_se_mod1(secab).pdf340_18CS35_se_mod1(secab).pdf
340_18CS35_se_mod1(secab).pdf
 
Cp7101 design and management of computer networks -network
Cp7101 design and management of computer networks -networkCp7101 design and management of computer networks -network
Cp7101 design and management of computer networks -network
 
Software Metrics - Software Engineering
Software Metrics - Software EngineeringSoftware Metrics - Software Engineering
Software Metrics - Software Engineering
 
Software Reliability
Software ReliabilitySoftware Reliability
Software Reliability
 
Unit 3 for st
Unit 3 for stUnit 3 for st
Unit 3 for st
 
Pressman ch-22-process-and-project-metrics
Pressman ch-22-process-and-project-metricsPressman ch-22-process-and-project-metrics
Pressman ch-22-process-and-project-metrics
 
Unit 1 sepm cleanroom engineering
Unit 1 sepm cleanroom engineeringUnit 1 sepm cleanroom engineering
Unit 1 sepm cleanroom engineering
 
Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for Exams
 
Software engineering
Software engineeringSoftware engineering
Software engineering
 

Recently uploaded

block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 

Recently uploaded (20)

block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 

module 1.pptx

  • 1. BACKGROUND • Performance evaluation aims at predicting a system’s behavior in a quantitative manner • When a new computer and telecommunication system is to be built or an existing system has to be tuned, reconfigured, or adapted, a performance evaluation can be employed to forecast the impact of architectural or implementation modifications on the overall system performance
  • 2. GOALS OF PERFORMANCE EVALUATION • Compare alternative system designs. • Procurement. • Capacity planning • System tuning • Performance debugging • Set expectation • Recognize relative performance
  • 3. APPLICATIONS OF PERFORMANCE EVALUATION • Design of systems. It is important that before implementing any system, we conduct a performance evaluation analysis to select the best and most cost-effective design • System upgrade and tuning. This process is needed to upgrade or tune the performance of the system or components of the system by either replacing some components with new ones that have better capabilities or by replacing the entire system or subsystem with one depending on the required performance and capacities • Procurement. In this application, the objective is to select the best system from a group of other competing systems. The main criteria are usually the cost, availability, compatibility, and reliability. • System analysis When the system is not performing as it is expected, a performance analysis is conducted to find the bottleneck device or cause of sluggish behavior
  • 4. TECHNIQUES • (a) analytic modeling, (b) simulation, and (c) measurement and testing • These alternatives are arranged here in increasing order of cost and accuracy. Analytic models are always approximate: This price must be paid for tractability and obtaining closed-form solution expressions of the performance metrics in terms of design parameters and variables. • Simulations require considerable investment of time in deriving the model, designing and coding the simulator, and verifying and validating the model, but they are more flexible, accurate, and credible. • Real measurements and experiments on a variation of a prototype or on the actual system are the most expensive of all and require considerable engineering efforts; however, these measurements are the most accurate
  • 5. METRICS OF PERFORMANCE A good performance metric should have the following characteristics • (a) the performance metric should allow an unambiguous comparison to be made between systems, • (b) it should be possible to develop models to estimate the metric, • (c) it should be relevant or meaningful • (d) the model used to estimate the metric should not be difficult to estimate.
  • 6. In general, performance evaluation analysts are typically interested in the: • frequency of occurrence of a specific event • duration of specific time intervals, and • size of some parameter. In other words, the interest is in count, time, and size measures.
  • 7. Performance evaluation metrics of a computer and telecommunication systems can be classified into the following chief categories • Higher better metrics (HB). In this category, the higher the value of the metric, the better it is. Productivity comes under this category. • Lower better metrics (LB). Here, the lower the value of the metric, the better it is. Responsiveness is an example of this type. • Nominal better metrics (NB). In this class, the performance metric should not be too high or too low. A value of usage between 0.5 and 0.75 is desired. Utilization is an example on such metrics.
  • 8. • Other performance measures that are becoming of great interest to performance analysts are availability and reliability. • Availability is quantified by two known measures: (a) mean time to failure (MTTF) and (b) mean time between failures (MTBT) • Reliability is defined as the probability that the system survives until some time t.
  • 9. WORKLOAD CHARACTERIZATION AND BENCHMARKING • Within the confines of a network, workload is the amount of work assigned to, or done by, a client, workgroup, server, or internetwork in a given time period. Therefore, workload characterization is the science that observes, identifies and explains the phenomena of work in a manner that simplifies your understanding of how the network is being used. • Understanding the characteristics of today’s emerging workloads is essential to design efficient and cost-effective architectures for them. • Hence, It is important to characterize web servers, database systems, transaction processing systems, multimedia, networks, ATM switches, and scientific workloads. It is also useful to design models for workloads • An accurate characterization of application and operation system behavior leads to improved architectures and designs.
  • 10.
  • 11. In this context, there are two types of relevant inputs: • (a) parameters that can be controlled by the system designer, such as resource allocation buffering technique and scheduling scheme • (b) input generated by the environments in which the system under study is used such as interarrival times
  • 12. Among the techniques that can be used to specify workload are • (a) averaging, • (b) single-parameter histogram, • (c) multiparameter histogram, • (d) Markov models. • (e) clustering, • (f) use of dispersion measures such as coefficient of variation (COV), and • (g) principal component analysis
  • 13.
  • 14.
  • 15. COV = s/x’ where x’ is the sample mean with size n
  • 16. • The principal-component analysis is used to categorize workload components using the weighted sum of their parameter values. If di is the weight for the ith parameter xi, then the weighted sum W is as follows:
  • 17. • A benchmark program is used as a standard reference for comparing performance results using different hardware or different software tools. • It is supposed to capture processing and data movement characteristics of a category of application. • Benchmarks are meant to measure and predict the performance of systems under study and to reveal their design weakness and strong aspects.
  • 18. • A benchmark suite is basically a set of benchmark programs together with a set of specific rules that govern the test conditions and methods such as testbed platform environment, input data, output results, and evaluation metrics • In computer systems, benchmarks can be classified based on the application, such as commercial applications, scientific computing, network services, signal processing, scientific computing, and image processing.
  • 19. • Moreover, we can classify benchmarks into microbenchmarks, macrobenchmarks, synthetic benchmark programs, program kernels, and application benchmark programs • Microbenchmarks measure a specific portion of the computer system, such as the CPU speed, memory speed, I/O speed, interconnection network, and so on. • A macrobenchmark measures the performance of the system as a whole. Basically, it compares different systems when running a specific application on them. Usually, this class of benchmarks is used for parallel computer systems.
  • 20. • An instruction mix is a specification of different instructions coupled with their usage frequency. The program kernel is a generalization of the instruction mix. It is used to characterize the main portion of a specific type of application program. • Kernel benchmark is usually a small program that has been extracted from a large application program. Because the kernel is small, including a dozen lines of code, it should be easy to port it to many different systems.
  • 21. • Application benchmark programs are often used when the computer system under evaluation is meant to be used for a specific application, such as an airline reservation or scientific computing. • Synthetic benchmarks do this by specially created programs that impose the workload on the component.