Skip to:Content
|
Bottom
Cover image for Performance modeling and engineering
Title:
Performance modeling and engineering
Publication Information:
Boston, MA : Springer, 2008
Physical Description:
xvi, 219 p. : ill. ; 24 cm.
ISBN:
9780387793603

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010193867 QA76.9.E94 P476 2008 Open Access Book Book
Searching...

On Order

Summary

Summary

With the fast development of networking and software technologies, information processing infrastructure and applications have been growing at an impressive rate in both size and complexity, to such a degree that the design and development of high performance and scalable data processing systems and networks have become an ever-challenging issue. As a result, the use of performance modeling and m- surementtechniquesas a critical step in designand developmenthas becomea c- mon practice. Research and developmenton methodologyand tools of performance modeling and performance engineering have gained further importance in order to improve the performance and scalability of these systems. Since the seminal work of A. K. Erlang almost a century ago on the mod- ing of telephone traf c, performance modeling and measurement have grown into a discipline and have been evolving both in their methodologies and in the areas in which they are applied. It is noteworthy that various mathematical techniques were brought into this eld, including in particular probability theory, stochastic processes, statistics, complex analysis, stochastic calculus, stochastic comparison, optimization, control theory, machine learning and information theory. The app- cation areas extended from telephone networks to Internet and Web applications, from computer systems to computer software, from manufacturing systems to s- ply chain, from call centers to workforce management.


Table of Contents

Alina Beygelzimer and John Langford and Bianca ZadroznyDave JewellJean WalrandJon Feldman and S. MuthukrishnanM. Kodialam and T. V. Lakshman and Sudipta SenguptaDevavrat ShahTarek Abdelzaher and Yixin Diao and Joseph L. Hellerstein and Chenyang Lu and Xiaoyun Zhu
Prefacep. v
About the Editorsp. ix
List of Contributorsp. xv
Part I Performance Design and Engineering
1 Machine Learning Techniques-Reductions Between Prediction Quality Metricsp. 3
1.1 Introductionp. 3
1.2 Basic Definitionsp. 4
1.3 Importance-Weighted Classificationp. 5
1.4 Multiclass Classificationp. 10
1.4.1 One-Against-Allp. 10
1.4.2 Error-Correcting Coding (ECOC) Approachesp. 13
1.4.3 Approaches Based on Pairwise Comparisonsp. 17
1.5 Cost-Sensitive Classificationp. 17
1.6 Predicting Conditional Quantilesp. 20
1.7 Rankingp. 25
1.8 Conclusionp. 26
Referencesp. 26
2 Performance Engineering and Management Method - A Holistic Approach to Performance Engineeringp. 29
2.1 Backgroundp. 29
2.2 What is Performance Engineering?p. 31
2.3 Overview of PEMMp. 32
2.4 PEMM Theme - Requirements and Early Designp. 33
2.4.1 Requirements and Performancep. 34
2.4.2 Early Design and Performancep. 35
2.5 PEMM Theme - Volumetricsp. 36
2.5.1 Business Volumesp. 36
2.5.2 Technical Volumesp. 37
2.6 PEMM Theme - Estimation and Modelingp. 38
2.6.1 Performance Estimating Techniquesp. 39
2.6.2 Selection of Performance Estimating Methodsp. 41
2.7 PEMM Theme - Technology Researchp. 42
2.8 PEMM Theme - Design, Development and Trackingp. 42
2.8.1 Recognizing Performance Patterns and Anti-Patternsp. 43
2.8.2 Designing for Performancep. 44
2.8.3 Performance Budgetingp. 44
2.8.4 Performance Debugging and Profilingp. 45
2.8.5 Design, Development and Tracking Guidancep. 46
2.9 PEMM Theme - Test Planning and Executionp. 46
2.10 PEMM Theme - Live Monitoring and Capacity Planningp. 47
2.10.1 Relating PEMM to Performance and Capacity Managementp. 49
2.10.2 PEMM and ITIL Capacity Managementp. 50
2.11 PEMM Theme - Performance and Risk Managementp. 51
2.11.1 Assignment of Dedicated Performance Engineering Resourcesp. 52
2.11.2 Applying PEMM to IT Project Governancep. 52
2.11.3 Applying PEMM to Complex Projectsp. 53
2.12 Summaryp. 54
Referencesp. 55
3 Economic Models of Communication Networksp. 57
3.1 Introductionp. 57
3.1.1 General Issuesp. 58
3.1.2 Paris Metro Pricingp. 60
3.2 Pricing of Servicesp. 63
3.2.1 Tragedy of the Commonsp. 64
3.2.2 Congestion Pricingp. 66
3.2.3 When to Use the Network?p. 66
3.2.4 Service Differentiationp. 69
3.2.5 Auctionsp. 73
3.3 Investment Incentivesp. 78
3.3.1 Free Ridingp. 78
3.3.2 Network Neutralityp. 81
3.3.3 Economics of Securityp. 84
3.4 Conclusionsp. 86
Referencesp. 87
4 Algorithmic Methods for Sponsored Search Advertisingp. 91
4.1 Introductionp. 91
4.2 Existing Auctionsp. 93
4.2.1 Practical Aspectsp. 95
4.3 The Advertiser's Point of View: Budget Optimizationp. 97
4.3.1 Modeling a Keyword Auctionp. 99
4.3.2 Uniform Bidding Strategiesp. 104
4.3.3 Experimental Resultsp. 105
4.3.4 Extensionsp. 105
4.4 The Search Engine's Point of View: Offline Slot Schedulingp. 106
4.4.1 Special Case: One Slotp. 108
4.4.2 Multiple Slotsp. 110
4.4.3 Extensionsp. 113
4.5 The User's Point of View: a Markov Model for Clicksp. 114
4.5.1 A Simple Markov User Click Modelp. 116
4.5.2 Properties of Optimal Assignments for Markovian Users .117
4.5.3 Computing the Optimal Assignmentp. 118
4.6 Open Issuesp. 118
4.7 Concluding Remarksp. 119
4.8 Acknowledgementsp. 120
Referencesp. 120
Part II Scheduling and Control
5 Advances in Oblivious Routing of Internet Trafficp. 125
5.1 Introductionp. 125
5.2 The Need for Traffic Oblivious Routingp. 127
5.2.1 Difficulties in Measuring Trafficp. 127
5.2.2 Difficulties in Dynamic Network Reconfigurationp. 128
5.3 Traffic Variation and Performance Modelsp. 128
5.3.1 Unconstrained Traffic Variation Modelp. 128
5.3.2 Hose Constrained Traffic Variation Modelp. 129
5.4 Oblivious Routing under Unconstrained Traffic Modelp. 130
5.5 Oblivious Routing of Hose Constrained Trafficp. 131
5.6 Two-Phase (Oblivious) Routing of Hose Constrained Trafficp. 132
5.6.1 Addressing Some Aspects of Two-Phase Routingp. 135
5.6.2 Benefits of Two-Phase Routingp. 137
5.6.3 Determining Split Ratios and Path Routingp. 138
5.6.4 Protecting Against Network Failuresp. 139
5.6.5 Generalized Traffic Split Ratiosp. 140
5.6.6 Optimality Bound for Two-Phase Routingp. 141
5.7 Summaryp. 143
Referencesp. 144
6 Network Scheduling and Message-passingp. 147
6.1 Introductionp. 147
6.2 Modelp. 150
6.2.1 Abstract formulationp. 150
6.2.2 Scheduling algorithmsp. 151
6.2.3 Input-queued switchp. 152
6.2.4 Wireless networksp. 153
6.3 Characterization of optimal algorithmp. 155
6.3.1 Throughput optimalityp. 156
6.3.2 Queue-size optimalityp. 159
6.4 Message-passing: throughput optimalityp. 165
6.4.1 Throughput optimality through randomization and message-passingp. 165
6.4.2 Performance in terms of queue-sizep. 169
6.5 Message-passing: low queue-size or delayp. 172
6.5.1 Input-queued switch: message-passing algorithmp. 172
6.5.2 Wireless scheduling: message-passing schedulingp. 178
6.6 Discussion and future directionp. 182
Referencesp. 183
7 Introduction to Control Theory And Its Application to Computing Systemsp. 185
7.1 Introductionp. 185
7.2 Control Theory Fundamentalsp. 186
7.3 Application to Self-Tuning Memory Management of A Database Systemp. 191
7.4 Application to CPU Utilization Control in Distributed Real-Time Embedded Systemsp. 197
7.5 Application to Automated Workload Management in Virtualized Data Centersp. 201
7.5.1 Introductionp. 201
7.5.2 Problem statementp. 203
7.5.3 Adaptive optimal controller designp. 203
7.5.4 Experimental evaluationp. 205
7.6 Application to Power and Performance in Data Centersp. 207
7.6.1 Design Methodology for Integrating Adaptive Policiesp. 207
7.6.2 Evaluationp. 211
7.7 Conclusions And Research Challengesp. 212
Referencesp. 214
Indexp. 217
Go to:Top of Page