In writing this book, I have in mind the student, engineer, or researcher who:
(a) is interested in the performance of some particular computer system, and
(b) wants to analytically model that behavior, but
(c) does not intend to become an expert in performance analysis.
For network systems, the literature has numerous examples of analytical performance models;
evidently, this research community has found such models useful. This book will have served its
purpose if it can help the researchers in other communities (hardware architecture,operating systems,
programming languages, database management, etc.) add a modeling chapter to a thesis or a similar
section in a paper.
There is a common perception that performance modeling requires a lot of queueing theory.
This is not so. Queueing systems are used in this book only as an expository device for a coherent
presentation.The concepts (e.g.,open/closed in Chapter1,residual lifeinChapter 3,ﬂowequivalence
in Chapter 6, stability in Chapter 8), techniques (e.g., Markov chains in Chapter 4, Average Value
Approximation and ﬂuid approximation in Chapter 7, equilibrium decomposition in Chapter 8),
and results (Little’s Law in Chapter 1, effect of variance on response time in Chapter 2, PASTA in
Chapter 5, bottleneck analysis in Chapter 6) are applicable to more than just queueing systems.
This fact is borne out by the 20 papers discussed in the book. They are:
J. Kang, J. F. Naughton, and S. Viglas. Evaluating window joins over unbounded
streams. In Proc. Int. Conf. on Data Engineering (ICDE), 341–352, March 2003.
Q. Zhu, Z. Chen, L. Tan, Y. Zhou, K. Keeton, and J. Wilkes. Hibernator: helping disk arrays
sleep through the winter. In Proc. ACM Symp. Operating Systems Principles (SOSP), 39(5):177–
190, October 2005. DOI: 10.1145/1095810.1095828
G. Nogueira, B. Baynat, and P. Eisenmann. An analytical model for the dimensioning of a
GPRS/EDGE network with a capacity constraint on a group of cells. In Proc. MOBICOM,
215–227, August 2005. DOI: 10.1145/1080829.1080852
B. Urgaonkar, G. Paciﬁci, P. Shenoy, M. Spreitzer, and A.Tantawi. Analytic modeling of mul-
titier Internet applications. ACM Trans. Web, 1(1):2, 2007. DOI: 10.1145/1232722.1232724
B. Schroeder, A. Wierman, and M. Harchol-Balter. Open versus closed: a cautionary tale. In
Proc. Symp. Networked Systems Design and Implementation (NSDI), May 2006. http://www.
J. Padhye, V. Firoiu, D. Towsley, and J. Kurose. Modeling TCP throughput: a sim-
ple model and its empirical validation. In Proc. SIGCOMM, 303–314, September 1998.
D. Qiu and R. Srikant. Modeling and performance analysis of BitTorrent-like peer-to-peer
networks. In Proc. SIGCOMM, 367–378, 2004. DOI: 10.1145/1015467.1015508
C. C. Zou, W. Gong, and D. Towsley. Code red worm propagation modeling and analysis.
In Proc. ACM Conf. Computer and Communications Security (CCS), 138–147, November 2002.
P. Gupta and P.R. Kumar. The capacity of wireless networks. IEEE Trans. on Information
Theory, 46(2):388–404, 2000. DOI: 10.1109/18.825799
Y. C. Tay and K. C. Chua. A capacity analysis for the IEEE 802.11 MAC protocol. Wireless
Networks, 7(2):159–171, 2001. DOI: 10.1023/A:1016637622896
Y.-C. Tu, J. Sun, and S. Prabhakar. Performance analysis of a hybrid media streaming system.
In Proc. ACM/SPIE Conf.on Multimedia Computing and Networking (MMCN),69–82, January
2004. DOI: 10.1117/12.538806
E. Gabber, J. Fellin, M. Flaster, F. Gu, B. Hillyer, W. T. Ng, B. Özden, and E. A. M. Shriver.
Starﬁsh: highly-available block storage. In Proc. USENIX Annual Tech. Conf., 151–163, June
A. Heindl, G. Pokam, and A.-R. Adl-Tabatabai. An analytic model of optimistic software
transactional memory. In Proc. IEEE Int. Symp. on Performance Analysis of Systems and Software
(ISPASS), 153–162, April 2009. DOI: 10.1109/ISPASS.2009.4919647
R. C. Shah,S.Roy,S.Jain, and W.Brunette. Data mules:Modeling a three-tier architecture for