Foreword by Jim Gray
Preface
PART I: Modeling for E-Business
1. Models for E-Business
1.1 Introduction
1.1.1 Quantitative Approach
1.1.2 Electronic Business
Challenges
1.2 Electronic Markets
1.2.1 Business-to-Business
Transactions and Models
1.3 Reference Models for Electronic Business
1.3.1 Business and Functional
Models
1.3.2 Customer and Resource
Models
1.4 Quality of Service Requirements
1.5 Overview of the Quantitative Approach
1.6 Summary
Bibliography
2. Customer Behavior Models
2.1 Introduction
2.2 Why Model Customer Behavior?
2.3 A Customer Behavior Model of an Online Bookstore
2.4 The Customer Behavior Model Graph (CBMG)
2.5 Building a CBMG
2.6 Aggregate Metrics for Web and E-Business Sites
2.7 Metrics Derived from the CBMG
2.8 The Customer Visit Model (CVM)
2.9 Session Identification
2.10 Concluding Remarks
Bibliography
3. The Anatomy
of E-Business Functions
3.1 Introduction
3.2 Requests and Services
3.3 E-Business Servers
3.4 The Anatomy of Client/Server Interactions
3.4.1 C/S Interaction Diagrams
(CSIDs)
3.4.2 Expanded CSID Notation
3.4.3 Answering Quantitative
Questions with CSIDs
3.5 From CBMGs to CSIDs
3.6 Summary
Bibliography
PART II: Evaluating E-Business Infrastructure and Services
4 Infrastructure
for Electronic Business
4.1 Introduction
4.2 Infrastructure
4.2.1 Overview
4.2.2 Focus
4.2.2.1 Performance
4.2.2.2 Availability and Maintainability
4.2.2.3 Scalability
4.2.3 Understanding the
E-Business Infrastructure
4.3 Reference Architecture
4.3.1 Components
4.3.1.1 Web Server
4.3.1.2 Application Server
4.3.1.3 Transaction and Database Servers
4.3.1.4 Mainframe and Legacy Systems
4.3.1.5 Proxies and Caches
4.3.1.6 Internet Service Provider (ISP)
4.3.2 Multi-Tier Architecture
4.4 Dynamic Load Balancing
4.5 Third Party Services
4.6 Infrastructure Cost
4.7 Summary
Bibliography
5.
A Quantitative Analysis of Authentication Services
5.1 Introduction
5.2 Security 101
5.2.1 Security Categories
5.2.2 Cryptography
5.3 Digital Signatures
5.4 Authentication Protocols
5.4.1 Authentication with
Certificates
5.4.2 Description of TLS
5.5 Summary
Bibliography
6 A Quantitative
Analysis of Payment Services
6.1 Introduction
6.2 Payment Methods
6.3 SET - Secure Electronic Transactions
6.3.1 Use of Cryptography
in SET
6.3.1.1 Digital Envelopes
6.3.1.2 Double Signatures
6.3.1.3 Simple Encapsulation with Signature and Baggage
6.3.2 SET Message Flow
6.4 SET Performance
6.5 Other Payment Services on the Internet
6.6 Concluding Remarks
Bibliography
Part III: Capacity Planning for E-Business
7 A
Capacity Planning Methodology for E-Business
7.1 Introduction
7.2 Capacity Planning and Adequate Capacity
7.3 A Capacity Planning Situation
7.4 The Methodology
7.5 Business Level
7.5.1 Business Characterization
7.5.1.1 Type of Business
7.5.1.2 Type of Delivery
7.5.1.3 Use of Third-Party Services
7.5.1.4 Business Quantitative Descriptors
7.5.1.5 Market Composition
7.5.1.6 Hours of Operation
7.5.2 Functional Analysis
7.5.3 Business Evolution
Analysis
7.5.4 Function Evolution
Analysis
7.6 Customer Behavior Level
7.6.1 Customer Behavior
Characterization
7.6.2 Customer Behavior
Evolution Analysis
7.7 Resource Level
7.7.1 Characterizing the
IT Environment
7.7.2 Workload Characterization
7.7.2.1 Breaking Down the Global Workload
7.7.2.2 Data Collection Issues
7.7.3 Workload Forecasting
7.7.4 Performance Modeling
7.7.5 Calibration and Validation
7.7.6 Cost Modeling
7.7.7 What-If Analysis
7.8 Concluding Remarks
Bibliography
8 Performance Modeling
Concepts
8.1 Introduction
8.2 Performance of a Simple E-Business Server
8.3 What Is a Performance Model?
8.3.1 Why Do We Need Models?
8.3.2 A Modeling Paradigm
8.3.3 Revisiting the Simple
Problem
8.4 Service Time and Service Demand
8.4.1 Service Times at a
Server
8.4.2 Service Times in Communication
Networks
8.4.3 Revisiting the Simple
Problem
8.5 Queues, Waiting Time, and Response Time
8.6 Performance Laws
8.6.1 Utilization Law
8.6.2 Forced Flow Law
8.6.3 Service Demand Law
8.6.4 Little's Law
8.6.5 Revisiting the Simple
Problem
8.7 Bottlenecks and Scalability Analysis
8.7.1 Asymptotic Bounds
8.7.1.1 Open Models
8.7.1.2 Closed Models
8.8 Summary
Bibliography
9 Solving
Performance Models of E-Business Sites
9.1 Introduction
9.2 A Simple Example
9.3 First Cut: the Single Queue Approach
9.3.1 Model Solution
9.3.2 Revisiting the Simple
Example
9.4 A More Realistic Approach: A Queuing Network
9.4.1 Queuing Network Models
9.4.2 Single-Class Open
Models
9.4.3 Single-Class Closed
Models
9.4.4 Revisiting the Simple
Example
9.5 Refining the Approach: Multiple Classes
9.5.1 Revisiting the Simple
Example
9.6 Summary
Bibliography
10 Modeling
Contention for Software Servers
10.1 Introduction
10.2 A Simple Example
10.3 Contention for Software in E-Business Sites
10.4 Modeling Software Contention
10.4.1 Simultaneous Resource
Possession
10.4.2 Method of Layers
10.4.3 Simulation
10.5 Concluding Remarks
Bibliography
11 Characterizing E-Business Workloads
11.1 Introduction
11.2 Workload Characterization of Web Traffic
11.3 Characterizing Customer Behavior
11.4 From HTTP Logs to CBMGs
11.4.1 GetSessions Algorithm
11.4.2 GetCBMGs Algorithm
11.4.3 How Many Clusters
to Choose?
11.5 From HTTP Logs to CVMs
11.6 Characterizing the Workload at the Resource
Level
11.7 E-Business Benchmarks: TPC-W
11.7.1 TPC-W's Business
Model
11.7.2 TPC-W's Customer
Behavior Model
11.7.3 TPC-W Performance
Metrics 351
Concluding Remarks
Bibliography
12 Preparing
E-Business for Waves of Demand
12.1 Introduction
12.2 Customer Demand and Workload
12.3 Traffic Bursts
12.3.1 High Variability
12.4 Traffic Patterns in E-Business
12.4.1 Visual Inspection
12.5 Forecasting Strategies
12.6 Forecasting Techniques
12.6.1 Regression Methods
12.6.2 Moving Averages
12.6.3 Exponential Smoothing
12.6.4 Applying Forecasting
Techniques
12.7 Concluding Remarks
Bibliography
PART IV: Models of Specific E-Business Segments
13 Business-to-Consumer
Case Studies
13.1 Introduction
13.2 The Online Computer Store Problem
13.2.1 Planning Situations
13.3 General Guidelines
13.4 A Model-Based Solution Approach
13.5 Assessing the Impact of Business Goals
13.5.1 From Business Goals
to Performance Metrics
13.5.2 Predicting the Site
Performance
13.6 Introducing Digital Downloadable Products
13.6.1 Sizing the Net Music
Store: First Cut
13.6.2 Evaluating the Impact
of the Cable System
13.7 Concluding Remarks
Bibliography
14 Business-to-Business
Case Studies
14.1 Introduction
14.2 From B2C to B2B
14.2.1 Planning Situations
14.3 Characterizing the New Workload
14.3.1 Configurator Workload
14.3.2 Supply-Chain Integration
Workload
14.4 Predicting the Performance
14.5 Concluding Remarks
Bibliography
PART V: Summary, Challenges, and Perspectives
15 Wrapping Up
15.1 Introduction
15.2 Summary
15.3 Perspectives
15.4 Challenges
Bibliography
Glossary of Terms
SUBJECT INDEX
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15