Skip to:Content
|
Bottom
Cover image for Computer system performance modeling in perspective : a tribute to the work of Professor Kenneth C. Sevcik
Title:
Computer system performance modeling in perspective : a tribute to the work of Professor Kenneth C. Sevcik
Series:
Advances in computer science and engineering ; 1
Publication Information:
London : Imperial College Press, 2006
ISBN:
9781860946615
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010124252 QA76.9.E94 C656 2006 Open Access Book Book
Searching...

On Order

Summary

Summary

Computer system performance evaluation is a key discipline for the understanding of the behavior and limitations of large scale computer systems and networks. This volume provides an overview of the milestones and major developments of the field.The contributions to the book include many of the principal leaders from industry and academia with a truly international coverage, including several IEEE and ACM Fellows, two Fellows of the US National Academy of Engineering and a Fellow of the European Academy, and a former President of the Association of Computing Machinery.


Table of Contents

Ed Lazowska and Satish Tripathi and John Zahorjan and Derek EagerJeffrey P. BuzenEd CoffmanPeter J. DenningErol Gelenhe and Zhi-Hong Mao and Van-Da LiVittoria De Nitto Persone and Giuseppe IazeollaSatish K. Tripathi and J. Jobin and Michalis FaloutsosGuoqiang Wang and Yongchang Ji and Dan C. Marinescu and Damla Turgut and Ladislau BoloniGreg Franks and Murray Woodside and Jerry RoliaPeter G. Harrison and William J. KnottenbeltYaakov Kogan and Gagan ChoudhuryTzvetelina Battestilli and Harry PerrosMark S. SquillanteHelen Karatza
Prefacep. V
Chapter 1 Ken Sevcik as an Advisor and Mentorp. 1
Chapter 2 Shadow Servers and Priority Schedulingp. 47
1 Introductionp. 7
2 Single Class Modelsp. 8
3 Multi-Class Modelsp. 8
4 Importance of Prioritiesp. 9
5 The Shadow Server Approximationp. 10
6 Extensionsp. 12
7 Comments on Significancep. 13
Referencesp. 14
Chapter 3 On the Chronology of Dynamic Allocation Index Policies: The Pioneering Work of K. C. Sevcikp. 15
1 Introductionp. 15
2 Sevcik's Smallest-Rank-First Index Policyp. 16
3 Background and Chronologyp. 17
4 Examplesp. 18
5 Concluding Remarksp. 19
Referencesp. 19
Chapter 4 Operational Analysisp. 21
1 Introductionp. 21
2 Dead Cowsp. 21
3 Dead Cows in Markovian Queueing Networksp. 22
4 The Birth of Operational Analysisp. 24
5 The Fundamental Assumptions of Operational Analysisp. 25
6 Controversyp. 28
7 Salutep. 29
8 An Historical Footnotep. 29
References (Published)p. 29
References (Unpublished Technical Reports)p. 30
Appendix Operational Analysis: A Fablep. 31
Chapter 5 Function Approximation by Random Neural Networks with a Bounded Number of Layersp. 35
1 Introductionp. 35
2 The GNN and Its Extensionsp. 36
2.1 The BGNN modelp. 38
3 Approximation of Functions of One Variable by the GNN with a Bounded Number of Layersp. 40
3.1 Technical premisesp. 41
3.2 BGNN approximation of continuous functions of one variablep. 44
3.3 CGNN approximation of continuous functions of one variablep. 46
4 Approximation of Continuous Functions of s Variablesp. 49
5 Conclusionsp. 53
Referencesp. 54
Appendix Proof of Technical Lemmasp. 56
Chapter 6 The Achilles' Heel of Computer Performance Modeling and the Model Building Shieldp. 59
1 Introductionp. 59
2 The Current Status of Model Buildingp. 60
3 System Multilevel Descriptionp. 61
3.1 The system vertical descriptionp. 62
3.2 The system horizontal descriptionp. 63
3.3 The system software descriptionp. 64
4 The Multilevel Model Building Methodp. 68
4.1 The top-down bottom-up processp. 68
5 Comparison with Existing Approachesp. 71
6 Conclusionsp. 72
Acknowledgmentp. 72
Referencesp. 73
Chapter 7 Wireless Network Simulation: Towards a Systematic Approachp. 75
1 Introductionp. 76
2 Background and Modelp. 78
3 Description of Our Frameworkp. 79
3.1 System parametersp. 79
3.2 Performance metricsp. 80
3.3 Our frameworkp. 81
4 Experimental Resultsp. 82
4.1 Parameters that affect steady state utilizationp. 82
4.2 The significance of steady state arrival ratep. 86
4.3 Discussion and applicationsp. 87
5 Homogeneityp. 90
5.1 Related workp. 91
5.2 Metrics for comparisonp. 92
6 Evaluationp. 92
6.1 Cell shape (number of neighbors)p. 92
6.2 User speedp. 96
6.3 User bandwidth requirementp. 97
7 Conclusionp. 98
Referencesp. 99
Chapter 8 Location- and Power-Aware Protocols for Wireless Networks with Asymmetric Linksp. 101
1 Introduction and Motivationp. 102
2 Related Workp. 104
3 The Model of the Systemp. 106
4 m-Limited Forwardingp. 110
4.1 Simulation studyp. 112
5 Routing Protocolp. 118
5.1 Neighbor discoveryp. 119
5.2 Location and power updatep. 120
5.3 Route discoveryp. 120
5.4 Route maintenancep. 121
6 MAC Protocolp. 121
6.1 Topological considerationsp. 121
6.2 A solution to the hidden node problemp. 124
6.3 Node statusp. 126
6.4 Medium access modelp. 126
6.5 A simulation studyp. 128
7 Cross-Layer Architecturep. 130
8 Work in Progressp. 131
9 Summaryp. 132
Acknowledgmentsp. 133
Referencesp. 133
Chapter 9 Multi-Threaded Servers with High Service Time Variation for Layered Queueing Networksp. 137
1 Introductionp. 137
2 Residence Time Expressionsp. 138
2.1 MVA waiting time expressionsp. 139
3 Accuracy and Computation-Time Comparisonsp. 141
4 Example Case Studiesp. 143
4.1 Systems management examplep. 143
4.2 Electronic bookstore examplep. 144
5 Conclusionsp. 148
Acknowledgmentsp. 150
Appendix A Marginal Probabilitiesp. 150
Appendix B de Souza e Silva and Muntz Approximationp. 152
Referencesp. 152
Chapter 10 Quantiles of Sojourn Timesp. 155
1 Introductionp. 156
2 Time Delays in the Single Server Queuep. 158
2.1 Waiting time distribution in the M/G/1 queuep. 158
2.2 Busy periodsp. 159
2.3 Waiting times in LCFS queuesp. 160
2.4 Waiting times with Processor-Sharing disciplinep. 162
3 MM CPP/GE/c G-Queues: Semi-Numerical Laplace Transform Inversionp. 162
4 Time Delays in Networks of Queuesp. 166
4.1 Open networksp. 167
4.2 Closed networksp. 169
4.2.1 Cyclic networksp. 173
4.2.2 Paths with service rates all equalp. 174
5 Passage Times in Continuous Time Markov Chainsp. 174
5.1 First passage times in CTMCsp. 174
5.2 Uniformizationp. 175
5.3 Hypergraph partitioningp. 176
5.4 Parallel algorithm and tool implementationp. 177
5.5 Numerical examplep. 179
6 Passage Times in Continuous Time Semi-Markov Processesp. 182
6.1 First passage times in SMPsp. 183
6.2 Iterative passage time algorithmp. 185
6.3 Laplace transform inversionp. 186
6.4 Implementationp. 187
6.5 Numerical examplep. 187
7 Conclusionp. 190
Referencesp. 191
Chapter 11 Asymptotic Solutions for Two Non-Stationary Problems in Internet Reliabilityp. 195
1 Introductionp. 195
2 Poisson Approximation for the Number of Failed Routersp. 197
3 Asymptotics of Lost Bandwidthp. 200
Referencesp. 204
Chapter 12 Burst Loss Probabilities in an OBS Network with Dynamic Simultaneous Link Possessionp. 205
1 Introductionp. 205
2 Problem Descriptionp. 208
3 A Queueing Network Model for an OBS Pathp. 209
3.1 The arrival processp. 211
4 The Decomposition Algorithmp. 213
4.1 An examplep. 213
4.1.1 Analysis of sub-system 1p. 213
4.1.2 Analysis of sub-system 2p. 215
4.1.3 The iterative procedurep. 216
4.2 The decomposition algorithmp. 217
4.3 Calculation of the burst loss probabilityp. 219
5 Numerical Resultsp. 220
6 Conclusionsp. 223
Referencesp. 224
Chapter 13 Stochastic Analysis of Resource Allocation in Parallel Processing Systemsp. 227
1 Introductionp. 227
2 Model of Parallel Processing Systemsp. 230
3 Analysis of Dynamic Spacesharingp. 232
3.1 Irreducibility and stability criterionp. 235
3.2 Special case: Exponential model parametersp. 235
3.3 Performance measuresp. 237
4 Analysis of Memory Reference Behaviorp. 239
4.1 Program behavior modelsp. 240
4.2 Intra-locality memory overheadp. 244
4.3 Inter-locality memory overheadp. 245
4.3.1 Calculation of N[subscript I]p. 246
4.3.2 Calculation of C[subscript I]p. 247
4.4 Total memory overheadp. 250
5 Conclusionsp. 250
Acknowledgmentp. 251
Referencesp. 251
Chapter 14 Periodic Task Cluster Scheduling in Distributed Systemsp. 257
1 Introductionp. 257
2 Model and Methodologyp. 260
2.1 System and workload modelsp. 260
2.2 Scheduling strategiesp. 262
2.3 Performance metricsp. 263
2.4 Model implementation and input parametersp. 263
3 Simulation Results and Performance Analysisp. 264
3.1 Normal distribution casep. 264
3.2 Uniform distribution casep. 271
4 Conclusions and Future Researchp. 273
Referencesp. 273
Go to:Top of Page