Table of Contents of the Book
Scaling for E-Business: technologies, metrics, performance, capacity planning
Daniel A. Menasce and Virgilio A. F. Almeida


Chapters
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15

Foreword by Jim Gray
Preface

PART I: Modeling for E-Business
1. Models for E-Business
    1.1 Introduction
        1.1.1 Quantitative Approach
        1.1.2 Electronic Business Challenges
    1.2 Electronic Markets
        1.2.1 Business-to-Business Transactions and Models
    1.3 Reference Models for Electronic Business
        1.3.1 Business and Functional Models
        1.3.2 Customer and Resource Models
    1.4 Quality of Service Requirements
    1.5 Overview of the Quantitative Approach
    1.6 Summary
    Bibliography

2. Customer Behavior Models
    2.1 Introduction
    2.2 Why Model Customer Behavior?
    2.3 A Customer Behavior Model of an Online Bookstore
    2.4 The Customer Behavior Model Graph (CBMG)
    2.5 Building a CBMG
    2.6 Aggregate Metrics for Web and E-Business Sites
    2.7 Metrics Derived from the CBMG
    2.8 The Customer Visit Model (CVM)
    2.9 Session Identification
    2.10 Concluding Remarks
    Bibliography

3. The Anatomy of E-Business Functions
    3.1 Introduction
    3.2 Requests and Services
    3.3 E-Business Servers
    3.4 The Anatomy of Client/Server Interactions
        3.4.1 C/S Interaction Diagrams (CSIDs)
        3.4.2 Expanded CSID Notation
        3.4.3 Answering Quantitative Questions with CSIDs
    3.5 From CBMGs to CSIDs
    3.6 Summary
    Bibliography

PART II: Evaluating E-Business Infrastructure and Services
4 Infrastructure for Electronic Business
    4.1 Introduction
    4.2 Infrastructure
        4.2.1 Overview
        4.2.2 Focus
            4.2.2.1 Performance
            4.2.2.2 Availability and Maintainability
            4.2.2.3 Scalability
        4.2.3 Understanding the E-Business Infrastructure
    4.3 Reference Architecture
        4.3.1 Components
            4.3.1.1 Web Server
            4.3.1.2 Application Server
            4.3.1.3 Transaction and Database Servers
            4.3.1.4 Mainframe and Legacy Systems
            4.3.1.5 Proxies and Caches
            4.3.1.6 Internet Service Provider (ISP)
        4.3.2 Multi-Tier Architecture
    4.4 Dynamic Load Balancing
    4.5 Third Party Services
    4.6 Infrastructure Cost
    4.7 Summary
    Bibliography

5. A Quantitative Analysis of Authentication Services
    5.1 Introduction
    5.2 Security 101
        5.2.1 Security Categories
        5.2.2 Cryptography
    5.3 Digital Signatures
    5.4 Authentication Protocols
        5.4.1 Authentication with Certificates
        5.4.2 Description of TLS
    5.5 Summary
    Bibliography

6 A Quantitative Analysis of Payment Services
    6.1 Introduction
    6.2 Payment Methods
    6.3 SET - Secure Electronic Transactions
        6.3.1 Use of Cryptography in SET
            6.3.1.1 Digital Envelopes
            6.3.1.2 Double Signatures
            6.3.1.3 Simple Encapsulation with Signature and Baggage
        6.3.2 SET Message Flow
    6.4 SET Performance
    6.5 Other Payment Services on the Internet
    6.6 Concluding Remarks
    Bibliography

Part III: Capacity Planning for E-Business
7 A Capacity Planning Methodology for E-Business
    7.1 Introduction
    7.2 Capacity Planning and Adequate Capacity
    7.3 A Capacity Planning Situation
    7.4 The Methodology
    7.5 Business Level
        7.5.1 Business Characterization
            7.5.1.1 Type of Business
            7.5.1.2 Type of Delivery
            7.5.1.3 Use of Third-Party Services
            7.5.1.4 Business Quantitative Descriptors
            7.5.1.5 Market Composition
            7.5.1.6 Hours of Operation
        7.5.2 Functional Analysis
        7.5.3 Business Evolution Analysis
        7.5.4 Function Evolution Analysis
    7.6 Customer Behavior Level
        7.6.1 Customer Behavior Characterization
        7.6.2 Customer Behavior Evolution Analysis
    7.7 Resource Level
        7.7.1 Characterizing the IT Environment
        7.7.2 Workload Characterization
            7.7.2.1 Breaking Down the Global Workload
            7.7.2.2 Data Collection Issues
            7.7.3 Workload Forecasting
        7.7.4 Performance Modeling
        7.7.5 Calibration and Validation
        7.7.6 Cost Modeling
        7.7.7 What-If Analysis
    7.8 Concluding Remarks
    Bibliography

8 Performance Modeling Concepts
    8.1 Introduction
    8.2 Performance of a Simple E-Business Server
    8.3 What Is a Performance Model?
        8.3.1 Why Do We Need Models?
        8.3.2 A Modeling Paradigm
        8.3.3 Revisiting the Simple Problem
    8.4 Service Time and Service Demand
        8.4.1 Service Times at a Server
        8.4.2 Service Times in Communication Networks
        8.4.3 Revisiting the Simple Problem
    8.5 Queues, Waiting Time, and Response Time
    8.6 Performance Laws
        8.6.1 Utilization Law
        8.6.2 Forced Flow Law
        8.6.3 Service Demand Law
        8.6.4 Little's Law
        8.6.5 Revisiting the Simple Problem
    8.7 Bottlenecks and Scalability Analysis
        8.7.1 Asymptotic Bounds
        8.7.1.1 Open Models
        8.7.1.2 Closed Models
    8.8 Summary
    Bibliography

9 Solving Performance Models of E-Business Sites
    9.1 Introduction
    9.2 A Simple Example
    9.3 First Cut: the Single Queue Approach
        9.3.1 Model Solution
        9.3.2 Revisiting the Simple Example
    9.4 A More Realistic Approach: A Queuing Network
        9.4.1 Queuing Network Models
        9.4.2 Single-Class Open Models
        9.4.3 Single-Class Closed Models
        9.4.4 Revisiting the Simple Example
    9.5 Refining the Approach: Multiple Classes
        9.5.1 Revisiting the Simple Example
    9.6 Summary
    Bibliography

10 Modeling Contention for Software Servers
    10.1 Introduction
    10.2 A Simple Example
    10.3 Contention for Software in E-Business Sites
    10.4 Modeling Software Contention
        10.4.1 Simultaneous Resource Possession
        10.4.2 Method of Layers
        10.4.3 Simulation
    10.5 Concluding Remarks
    Bibliography

11 Characterizing E-Business Workloads
    11.1 Introduction
    11.2 Workload Characterization of Web Traffic
    11.3 Characterizing Customer Behavior
    11.4 From HTTP Logs to CBMGs
        11.4.1 GetSessions Algorithm
        11.4.2 GetCBMGs Algorithm
        11.4.3 How Many Clusters to Choose?
    11.5 From HTTP Logs to CVMs
    11.6 Characterizing the Workload at the Resource Level
    11.7 E-Business Benchmarks: TPC-W
        11.7.1 TPC-W's Business Model
        11.7.2 TPC-W's Customer Behavior Model
        11.7.3 TPC-W Performance Metrics 351
    Concluding Remarks
    Bibliography

12 Preparing E-Business for Waves of Demand
    12.1 Introduction
    12.2 Customer Demand and Workload
    12.3 Traffic Bursts
        12.3.1 High Variability
    12.4 Traffic Patterns in E-Business
        12.4.1 Visual Inspection
    12.5 Forecasting Strategies
    12.6 Forecasting Techniques
        12.6.1 Regression Methods
        12.6.2 Moving Averages
        12.6.3 Exponential Smoothing
        12.6.4 Applying Forecasting Techniques
    12.7 Concluding Remarks
    Bibliography

PART IV: Models of Specific E-Business Segments
13 Business-to-Consumer Case Studies
    13.1 Introduction
    13.2 The Online Computer Store Problem
        13.2.1 Planning Situations
    13.3 General Guidelines
    13.4 A Model-Based Solution Approach
    13.5 Assessing the Impact of Business Goals
        13.5.1 From Business Goals to Performance Metrics
        13.5.2 Predicting the Site Performance
    13.6 Introducing Digital Downloadable Products
        13.6.1 Sizing the Net Music Store: First Cut
        13.6.2 Evaluating the Impact of the Cable System
    13.7 Concluding Remarks
    Bibliography

14 Business-to-Business Case Studies
    14.1 Introduction
    14.2 From B2C to B2B
        14.2.1 Planning Situations
    14.3 Characterizing the New Workload
        14.3.1 Configurator Workload
        14.3.2 Supply-Chain Integration Workload
    14.4 Predicting the Performance
    14.5 Concluding Remarks
    Bibliography

PART V: Summary, Challenges, and Perspectives
15 Wrapping Up
    15.1 Introduction
    15.2 Summary
    15.3 Perspectives
    15.4 Challenges
    Bibliography

Glossary of Terms
SUBJECT INDEX

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15