Follow up on phase 1, in which you identified the behavior of the execution objects, by thinking about how applications will interact.
Typically, a single application behaves differently at different times; that is, it might be alternately intrusive and unintrusive, I/O bound, and CPU intensive. This makes it difficult to predict how applications will interact, but you can look for trends.
Organize the results of the analysis so that you understand as much as possible about each execution object with respect to the others. For example, you might create a table that identifies the objects and their behavior trends.
Using Adaptive Server monitoring tools is one of the best ways to understand how execution objects affect the environment.