Browse Definitions :

wall time

What is wall time?

Wall time, also called real-world time, clock time, wall-clock time or -- more accurately -- elapsed real time, is the amount of time that a program or process takes to run from start to finish as measured by a person. Wall time is important because how a computer measures time and how it is perceived by the user may be different.

Computers measure time based on the CPU clock speed. Any given task will take a certain number of cycles to complete. Most computers run many different tasks each second. The CPU's time is split depending on the needs of the program.

In Linux and Unix, the amount of time that the program is running on the CPU is measured. This is called CPU time. Even though a program may be running for several real seconds, it may only show less than one second of CPU time because the computer was switching between other processes.

Additionally, modern multicore/multiprocessor CPUs can run several threads at once. This may mean that if a process can run on several threads at once it may use more CPU time than real time.

diagram illustrating the architecture of multicore processors
Multicore processors, which incorporate multiple processing units, can run several threads at once to use more CPU time than real (wall) time.

What influences wall time?

Many factors can influence how much real time a process takes to complete on a computer:

wall time is how a computer user experiences time
Wall time is the real-word time a user of a computer perceives time, which is often different than the computer itself.
  • CPU clock speed and instruction set.
  • How many other processes are running.
  • Waiting for disk I/O.
  • Waiting for network I/O.

If a process takes too much wall time to complete, the user may get impatient. They may think it has hung, frozen or timed out and shut down the process. For the best user experience, it is important to keep programs responsive and to prioritize the amount of wall time it takes over CPU time.

How is wall time minimized?

To illustrate, modern CPUs can operate at rates of about 5 GHz, or 5 billion operations in a second. For most end user computers, CPUs spend more time doing nothing than doing useful work. The CPU can usually process data faster than it can be read off a hard disk or from a network.

To minimize the wall time, some programs keep the data on the disk compressed and spend extra CPU time decompressing the data to keep the much slower process of reading the data off the disk to a minimum.

Some program monitoring and profiling tools give the option to show CPU time or wall time that a process takes. This can help users to optimize for one or the other depending on their needs.

Web page rendering wall time is an important factor for website development. If a website takes too long to load, the user may leave the site. Developers may minify the code, use optimized javascript, and minimize the amount of server calls needed.

Wall time and modern workloads

New workloads also require new methods to minimize the wall time taken for processes.

Video processing may uses dedicated video coprocessors to speed up certain codec encryption, such as Intel QuickSync, Nvidia NVENC, or the Apple silicon media engine.

Artificial intelligence (AI) and machine learning process may employ GPU processing or dedicated circuitry to run in seconds a process that may take minutes or hours on a traditional CPU.

For some life safety processes, such as in medical equipment or transportation safety equipment, having a deterministic and exact amount of wall time is important. In these cases, a real time operating system may be needed.

Explore CPUs vs. GPUs for AI workloads and see how improvements in CPU features help shape selection. Learn about real time operating systems and how they work in internet of things edge computing. Compare Red Hat vs. Ubuntu Linux distributions.

This was last updated in June 2023

Continue Reading About wall time

  • User Datagram Protocol (UDP)

    User Datagram Protocol (UDP) is a communications protocol primarily used to establish low-latency and loss-tolerating connections...

  • Telnet

    Telnet is a network protocol used to virtually access a computer and provide a two-way, collaborative and text-based ...

  • big-endian and little-endian

    The term endianness describes the order in which computer memory stores a sequence of bytes.

  • advanced persistent threat (APT)

    An advanced persistent threat (APT) is a prolonged and targeted cyber attack in which an intruder gains access to a network and ...

  • Mitre ATT&CK framework

    The Mitre ATT&CK (pronounced miter attack) framework is a free, globally accessible knowledge base that describes the latest ...

  • timing attack

    A timing attack is a type of side-channel attack that exploits the amount of time a computer process runs to gain knowledge about...

  • employee resource group (ERG)

    An employee resource group is a workplace club or more formally realized affinity group organized around a shared interest or ...

  • employee training and development

    Employee training and development is a set of activities and programs designed to enhance the knowledge, skills and abilities of ...

  • employee sentiment analysis

    Employee sentiment analysis is the use of natural language processing and other AI techniques to automatically analyze employee ...

Customer Experience
  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

  • customer insight (consumer insight)

    Customer insight, also known as consumer insight, is the understanding and interpretation of customer data, behaviors and ...

  • buyer persona

    A buyer persona is a composite representation of a specific type of customer in a market segment.