1 Introduction
A computer system has multiple components, possibly a mix of both hardware and software. It may be a processor architecture on a chip, or a software suite that supports some application in the cloud. In our context, analytical modeling essentially refers to the formulation of equations to describe the performance of the system.
System performance can be measured by some metric , say throughput, latency, availabilty, etc. This depends on the workload on the system, such as the number of concurrent threads running on a chip, or the number of users for an application. It also depends on the system configuration, like the number of cores in a processor, or the number of virtual machines processing user requests. Collectively, we refer to the numerical workload and configuration variables as input parameters .
Abstractly speaking, a computer system determines a function that maps input parameters to the perfomance metric , i.e. . The complexity and nondeterminism in a real system makes it impossible to know this exactly. The purpose of an analytical model is then to derive a function that approximates the ground truth , i.e. .
There are various ways of constructing . Using a statistical approach, one might start with a sample of values, fix a class of functions for , and determine the
that best fits the sample according to some optimization criterion (mean square error, say). Alternatively, a machine learning approach might use the sample to train an artificial neural network that computes
. In both cases, is determined from the sample , so no knowledge of the system is used. It follows that we may not be able to use to analyze the behavior of the system, to understand why one particular hardware architecture is better than another, or what combination of parameters can cause performance to deteriorate, etc. Such an is thus a blackbox model of .Sometimes, very little is known about the system itself: the processor architecture may be proprietary, or the server cluster may be virtualized. It such cases, it is entirely appropriate that we resort to a blackbox model of the system.
In many cases, the performance analyst may actually have a sufficiently detailed understanding of the system to mathematically describe the relationships among the speeds and delays within it. One can then use equations to construct . Such an is then a whitebox
model: it is based on a mathematical analysis of the system, can be analyzed by standard mathematical techniques (calculus, probability, etc.), and the analysis can be interpreted in terms of details in the system. Therein lies the power of an analytical model.
Our review begins in Sec. 2 by describing a common motivation in constructing an analytical model, namely to engineer a computer system: to predict the throughput for a workload, to determine how failures affect response time, to evaluate the performance implication for different design choices, etc.
The derivations in an analytical model are often based on strong assumptions; this is often considered a weakness of the approach. Sec. 3 presents examples to show that these models are often accurate even when the assumptions are violated. In addition to the assumptions, the derivations may make approximations that are hard to justify theoretically (Sec. 4). However, the final arbiter for whether the assumptions and approximations are acceptable lies not in theory, but in the experimental validation of the model.
One broadly applicable technique in modeling is bottleneck analysis (Sec. 5). It is powerful in that it requires very little information about the details in a system, but it is also weak in that it offers only performance bounds. Nonetheless, these may suffice for some purposes, like comparing scalability limits, say.
A crucial advantage that analytical models have over simulation models lies in the global view of the parameter space that they offer. One can often use the equations to identify important (and unimportant) regions of the space, reduce the number of parameters, etc. (Sec. 6).
A computer system can have many components that interact in complicated ways, but Sec. 7 shows how this complex interaction can be decomposed into separate smaller models. Such a decomposition then provides a way to study the separate impact of hardware and software on a workload, the interaction between resource and data contention, etc.
Since an analytical model is an approximation of the real system, we must verify not just the accuracy of its numerical predictions, but also check that crucial properties revealed by the model (are not just artefacts of the model, but) are in fact properties of the real system. Sec. 8 discusses this concept of analytic validation.
In contrast to the engineering motivation for an analytical model, Sec. 9 points out the role that such models can play in developing a science for the behavior of these engineered systems.
Throughout, we will draw examples from recent literature on hardware, networking and datacenters, etc. to show the use of analytical models in designing, controlling and studying systems, large and small. The range of examples is wide, as wide as the broad perspective that we want our students to have.
Inevitably, we will need to use notation (e.g. ) and terminology (e.g. availability), and mention techniques (e.g. MVA) and results (e.g. Little’s Law) from performance analysis. However, the reader can look these up easily with a web search, and no indepth technical or theoretical knowledge is required for understanding the review.
Sec. 10 concludes with a summary of the review.
2 Why an analytical model?
But first, why model a system? To give an example, cloud providers offer their customers an attractive proposition that the resources provided can be elastically scaled according to demand. However, a tenant may need a tool to help determine how much resources (compute power, memory, etc.) to acquire, but is hampered by having very little knowledge of the cloud architecture. [ElasticScaling] considers this problem in the context of a NoSQL data grid, where the number of grid nodes can be increased or decreased to match the workload (see Figure 1). The authors present a tool (TAS) that uses equations to analytically model how transaction throughput varies nonlinearly (and nonmonotonically, sometimes) as the number of nodes increase.
Energy and latency are major issues for data centers. [DatacenterAMP] uses a simple queueing model to study how asymmetric multicore processors (AMP) can facilitate a tradeoff between energy use and latency bounds. The idea is to dynamically marshal the resources of multiple cores to give a larger processor that can speed up a sequential computation or, when possible, scale it back down to reduce energy consumption (see Figure 2).
[GPU]
also uses a model for architectural exploration. A GPU runs multiple threads simultaneously. This speeds up the execution, but also causes delays from competition for MSHRs (Miss Status Handling Registers) and the DRAM bus. The paper uses a model to analyze how changing the number of MSHRs, cache line size, miss latency, DRAM bandwidth, etc. affects the tradeoff. There is no practical way of doing such an exploration with real hardware. Part of the analysis is based on using the model to generate the CPI (cycles per instruction) stack that classifies the stall cycles into MSHR queueing delay, DRAM access latency, L1 cache hits, etc.
The model in [SoftErrors] is similarly used to determine how various microarchitectural structures (reorder buffer, issue queue, etc.) contribute to the soft error rate that is induced by cosmic radiation. Again, tweaking hardware structures is infeasible, and simulating soft errors is intractable, so an analysis with a mathematical model is essential.
One equation from the [SoftErrors] model explains why an intuition — that a workload with a low CPI should have a low vulnerability to soft errors — can be contradicted. Similarly, the CPI stack breakdown by the [GPU] model explains how workload that spends many cycles queueing for DRAM bandwidth can, counterintuitively, have negligible stall cycles from L2 cache misses.
To design a complicated system, an engineer needs help from intuition that is distilled from experience. However, experience with real systems is limited by availability and configuration history. Although one can get around that via simulation, the overwhelming size of the parameter space usually requires a limited exploration; this exploration is, in turn, guided by intuition. One way of breaking this circularity is to construct an analytical model that abstracts away the technical details and zooms in on the factors affecting the central issues. We can then check our intuition with an analysis of the model.
Intuition is improved through contradictions: they point out limits on the old intuition, and new intuition is gained to replace the contradictions. Again, such contradictions can be hard to find in a large simulation space, but may be plain to see with the equations in a mathematical model.
The above examples illustrate the role that analytical models can play in engineering complex computer systems.
3 Assumptions
Analytical models are often dismissed because they are based on unrealistic assumptions. For example, the latency model in [DatacenterAMP] uses a simple
queue that assumes job interarrival and service times are exponentially distributed; and the power model is a modification of Amdahl’s Law
[HM]. The exponential distribution has a strong “memoryless” property and Amdahl’s Law is an idealized program behavior. Therefore, one expects the engineering complexity and overheads of dynamically resizing a multicore processor will render any model (simulators included) inaccurate. However, the contribution of an analytical model often does not necessarily lie in numerical accuracy, but possibly in providing insight into system behavior. In the case of [DatacenterAMP], its simple model suffices to reveal an instructive interplay among chip area, latency bound and power consumption.Anyway, many models adopt equations from theory while breaking the assumptions that were used to derive those equations. In [GPU], the model puts a bound on the delay computed with the PollaczekKhinchin formula for an queue. One might consider this as a violation of the assumptions for the formula, but another way to see it is that the bound merely modifies an approximation. After all, the queue is itself an approximate model of DRAM bandwidth contention delay.
A major result in queueing theory is Mean Value Analysis (MVA), which derives an algorithm for calculating the performance of a separable queueing network. [DatabaseScalability] shows how, by first profiling the performance of a standalone database, the MVA algorithm can be used to predict the performance of a replicated database and, in addition, compare two alternative designs (multimaster and singlemaster). However, the probability of aborting a transaction increases with the replication and the number of clients, thus changing the demand for resources (at the CPU, disks, etc.) and thus breaking the MVA assumptions. Yet, experiments show good agreement between model predictions and simulation experiments.
[MapReduce] is another example where the model uses the MVA algorithm for a system that violates MVA assumptions. Jobs in a system suffer delays for various reasons. In this example, a job consists of map, shuffle and reduce tasks that are delayed not only by queueing for resources, but also by precedence constraints among the tasks (see Figure 3). The key equation in the model is
(1) 
where and are average queue lengths, and is a quantity determined by the precedence constraint; this equation is then used in the MVA algorithm to iterate from job population to , and thus solve the model. Strictly speaking, however, precedence constraints violate MVA’s separability assumptions, and there is no in Mean Value Analysis.
This practice of using equations even when their underlying assumptions are violated recalls the proverbial reminder to keep the baby (e.g. the PollazcekKhinchin formula, the MVA algorithm) while throwing out the bath water (i.e. the assumptions). This seems like a mathematical sin, but only if one confuses the sufficiency and necessity of the equations’ assumptions: the equations may in fact be robust with respect to violations in their assumptions.
4 Average Value Approximation (AVA)
The assumptions in an analytical model are often there to help justify an equation. [TCP] is a wellcited mathematical analysis of the protocol. The first step in its derivation for calculating expected throughput was
where is the number of packets sent in a period between tripleduplicate packet loss indications. This equation can be justified by assuming the TCP window size is a Markov regenerative process, but why should this assumption hold?
TCP has many states (slow start, exponential backoff, etc.) and correlated variables (window size, timeout threshold, etc.). These make it increasingly difficult in the analysis for one to even identify the assumptions needed to go from one equation to another. Eventually, the authors simply adopt the approximation
without stating the assumptions. Here, is the probability that a packet loss in a window of size is caused by a timeout,
is a random variable, and the approximation estimates the average
by , i.e. replacing the variable with its average . This technique, which I call Average Value Approximation (AVA) [T], is widely used in performance modeling.For example, [SoftErrors] estimate the time an instruction stays in a reorder buffer as , where is the average latency per instruction, and is the average critical path length. Strictly speaking, this time is , where is latency for instruction , is the critical path length, and . It is mathematically wrong to say , since is a random variable. If we use AVA and replace by , will not make sense if is not an integer; if it is, then indeed .
A similar approximation appears in [5G], which is a performance analysis of 5G cellular networks. The system in such a network consists of overlapping wireless cells, with bit rates that differ from cell to cell, and from zone to zone within a cell. How long would it take to download a file (e.g. movie) as a user moves across the cells? The final equation in the analysis estimates the average time as
(2) 
where is the average number of cells visited during the download, is the average time the user spends in a cell, is the average number of handovers between cells, and is the handover delay. Notice the expression is again an approximation for , where is the time spent in the ith visited cell.
One could state some assumptions to rigorously justify and , but how does one justify those assumptions? In analytical modeling of a complicated system, one is focused on making progress with the derivation (often liberally replacing random variables by their averages, like ) without worrying about the assumptions. Whether the approximations have gone overboard will eventually be decided by experimental validation.
5 Bottleneck Analysis
There is a common misunderstanding that analytical modeling requires queueing theory. This is certainly untrue for the influential [Roofline] model for analyzing multicore architectures. It is a very simple model that has a roofline with two straight segments, one representing the peak memory bandwidth between processor caches and DRAM, and the other representing peak floatingpoint processor performance (see Figure 4). No queueing theory is involved.
Despite its simplicity, the roofline model suffices for answering some questions: (i) Given an architecture and a floatingpoint kernel, is performance constrained by processor speed or memory bandwidth? The answer lies in comparing the kernel’s operational intensity (i.e. operations per byte of DRAM traffic) to the two roofline segments. For example, Figure 4 shows that the kernel stencil is limited by memory bandwidth, not processor speed. (ii) Given a particular kernel, which architecture will provide the best performance? One can answer this by comparing the rooflines of alternative architectures. (iii) Given a particular architecture, how can the kernels be optimized to push the performance? The optimization can be evaluated by examining how it shifts the roofline and changes the operational intensity.
[Roofline] makes very few assumptions and treats the processor as a blackbox. Details like multithreading, how threads are distributed over the cores, the cache hierarchy, etc. are not explicitly modeled. Rather, it focuses on the possible bottlenecks (memory bandwidth and processor speed) in the blackbox.
Processor architecture aside, every blackbox has its bottlenecks. This is true of datacenterscale architectures as well. For example, different cloud providers may have different architectures for running transaction workloads. [CloudTransactions] consider three of these (see Figure 5). What determines their scalability limits?
Once again, a cloud architecture is essentially a blackbox, with very little information on how the virtualized system is physically deployed. Nonetheless, one can do a bottleneck analysis [T] to get the limits on transaction throughput:
where classic, partition and dist.control denote the three architectures in Figure 5, and are the number of web/application servers with and without (respectively) colocated database servers; and are the number of storage servers with and without (respectively) colocated database servers; , and are the service demands (seconds on a commodity machine ) per transaction at a web/application, database and storage server (respectively), and is the ratio of database server speed in classic architecture to ’s speed.
By scrutinizing the expressions in Equation (LABEL:eq:CloudTransactions), one can compare the scalability limits of two architectures, and determine how one can push that limit for a particular architecture. We thus see from Equation (LABEL:eq:CloudTransactions) how an analytical model can bring clarity to the complex engineering choices that support cloud computing.
6 Parameter Space
The experimental results in [CloudTransactions] appear to show throughput increasing almost linearly for dist.control as the number of emulated browsers increases. However, no system can scale its throughput linearly forever. A closer examination of Equation (LABEL:eq:CloudTransactions) shows that, for the parameter values in the experiments, saturation should set in at around , but that is beyond the range of the experiments (). An analytical model can thus point out some important behavior that is beyond the region of parameter space that is explored with experiments.
This advantage of an analytical model over experimental measurements is wellillustrated by [P2PVoD], which analyzes peertopeer (P2P) videoondemand. The viral success of P2P protocols inspired many ideas from academia for improving such systems. Each proposal can be viewed as a point in the design space, whereas [P2PVoD] uses an analytical model to represent the entire space spanned by throughput (number of bytes downloaded per second), sequentiality (whether video chunks arrive in playback order) and robustness (with respect to peer arrival/departure/failure, bandwidth heterogeneity, etc.). This global view of the parameter space leads to a counterintuitive observation, that a reduction in sequentiality can increase (sequential) throughput, thus demonstrating the point in Section 2 that an analytical model can help improve intuition.
Furthermore, this model yields a Tradeoff Theorem that says a P2P videoondemand system cannot simultaneously maximize throughput, sequentiality and robustness. This theorem is an example of how an analytical model can discover the science that underlies an engineered system.
While an analytical model can give us a global view of the parameter space, not all of this space is of practical interest. Rather than delimit this space with some “magic constant” (e.g. in [CloudTransactions]), [TransactionalMemory] illustrates how the restriction can be done through an aggregated parameter.
Singleprocessor techniques for coordinating access to shared memory (e.g. semaphores) do not scale well as the number of cores increases, and [TransactionalMemory] examines an alternative. For the software transactional memory in this study, locks are used to control access to shared objects, and locks in a piece of code are grouped into transactions; each transaction is, in effect, executed atomically. The parameter space in the experiments is restricted to , where is the number of locks per transaction, is the number of concurrent transactions, and is the number of objects that can be locked (so, intuitively, the system is overloaded if ).
In fact, one can show that the performance (throughput, abort rate, etc.) is determined by and , where [TGS], thus reducing the parameter space from 3dimensional () to 2dimensional (). The use of such aggregated parameters ( and ) significantly reduces the space that the experiments must cover.
Parameter aggregation can go much further. One key issue in analyzing transaction performance is modeling the access pattern. Most studies assume access is uniform, i.e. the probability of requesting any one of objects is . In reality, some objects are more frequently requested than others, but how many parameters would it take to model a realistic access distribution? One solution to this difficulty was discovered by [ElasticScaling]. This paper defines an Application Contention Factor , where is the probability of a lock conflict, is the rate of lock requests and is the average lock holding time. Experiments show that the of a given workload is constant with respect to the number of nodes in the data grid, and the same whether it is run in a private or public cloud (see Figure 6).
Now, let , so
(4) 
By Little’s Law, is the expected number of objects that are locked, so Equation (4) says the probability of conflict is as if access is uniformly distributed over objects. This is because the access pattern, being a property of the transactions, should be constant with respect to the number of grid nodes, and the same whether the cloud is private or public.
This observation simplifies tremendously the analysis of transaction behavior. It says the large literature that rests on the assumption of uniform access remains valid once the number of objects is reinterpreted via ; going forward, we can continue to adopt uniform access in modeling transaction performance. This is another example where analytical modeling is helping to discover the science in engineering computer systems.
7 Decomposition and Decoupling
Analyzing a computer system is not any easier if it is as small as a chip, as is the case with [SoftErrors] (see Section 2). The probability that a radiationinduced fault in a microarchitecture structure (e.g. reorder buffer or issue queue) causes a program output error depends on both the hardware (microarchitecture) and the software (program). Recall from Section 4 that the model estimates the time an instruction stays in a reorder buffer as , where is the average instruction latency, and is the average critical path length. It thus decouples the hardware and software: one can analyze separately the impact of changing the hardware (which determines ) and changing the workload (which determines ). For example, we can evaluate how changing issue width affects performance, without having to reprofile the workload. Such decoupling is a powerful technique in the scientific analysis of a complicated system.
One can view such a decoupling as decomposing into two submodels: one for hardware, the other for software. [MapReduce] has a similar decomposition. In Equation (1), is a factor determined by the precedence constraint, while and are queue lengths in the queueing network. The precedence constraint is a model for the job execution, while the queueing network is a model for the resource contention. These two submodels are not completely decoupled, as evaluating , and requires an iteration between the graph and queueing models.
There is also model decomposition in [ElasticScaling]. Figure 1 shows the performance predictor consists of two submodels: (i) A statistical model for the resource contention; since the resources are virtualized and the hardware configuration is unknown, this model uses machine learning to model how the cloud performance responds to changes in the workload. (ii) An analytical model for the data contention, i.e. how the number of locks, transactions and objects affect the probability that a transaction encounters a lock conflict, or has to abort. We see here that the blackbox/whitebox difference mentioned in Section 1 does not mean we must choose just one of them. The [ElasticScaling] has both: the machine learning model is a blackbox, while the analytical model is a whitebox; the two are developed independently but, again, the performance prediction requires an iteration between the two.
8 Analytic Validation
Although analytical models are often touted as an alternative to simulators, many of them are actually used as simulators. To give an example, [5G] presents an interesting plot showing that, as user speed increases, throughput at first increases, then decreases (see Figure 7). This plot was not generated by a simulator, but by numerical solution of the [5G] analytical model; and the nonmonotonic throughput behavior is observed from the plot, not proved with the model. In this sense, the model is used as a simulator; I call this analytic simulation [T].
If we draw conclusions from plotting numerical solutions of an analytical model, how do we know if these conclusions are about the model, rather than the system? This is a possibility because the model is only an approximation of the system (this is an issue for simulators as well).
To give an example, classical MVA solutions of a queueing network model has throughput that increases monotonically as the number of jobs increases. If such a model were used for [ElasticScaling], it will fail to capture a critical behavior (throughput nonmonotonicity) in the system (see Section 2). Indeed, one can find examples in the literature of such a qualitative divergence in properties between model and system.
We should therefore verify that an interesting property observed in a model is, in fact, a property of the system. I call this analytic validation [T].
For example, the [ElasticScaling] model claims that Application Contention Factor is a constant that is a property of the transactions (independent of the number of grid nodes and whether the transactions run in a private or public cloud), and Figure 6 presents an experiment to validate this claim. Note that nothing in this plot is generated by the model — the properties we observe in the data are properties of the system itself. In contrast, in a numeric validation of an analytical model, there is always a comparison of experimental measurements to numerical solutions from the model.
We can see another example of analytic validation in [RouterBuffer]. Internet routers drop packets when their buffers are full. To avoid this, and to accommodate the large number of flows, router buffers have become very large. [RouterBuffer] uses an analytical model to study whether flow multiplexing can make this buffer bloat unnecessary. Among the results is an expression that says buffer occupancy depends on the link rate only through utilization . This is a strong claim from the model, so it requires experimental verification.
Figure 8 shows that, for fixed , simulation measurements of are indeed similar for different link rates. Furthermore, a numerical solution of the model shows that has a sawtooth behavior as the TCP flow length increases; Figure 8 shows that the simulated has this behavior too. The numerical difference between model and simulation in the plot is beside the point; rather, the experiment shows that an unusual behavior predicted by the model is not an artifact of the assumptions and approximations, but is in fact a property of the system itself.
For another illustration, consider the IEEE 802.11 protocol for WiFi: it specifies what a base station and the mobile devices in its wireless cell should do in sending and receiving packets. Simultaneous transmissions from different mobile devices can cause packet collisions and induce retransmission and backoff, so maximum throughput in the cell can be lower than channel bandwidth. The model in [802.11] examines how this saturation throughput depends on the protocol parameters, and analyzes the tradeoff between collision and backoff.
One of the claims from the [802.11] model says that the probability of a collision depends on the protocol’s minimum window size and the number of mobile devices only through the gap . Figure 9 shows that from simulations with different configurations do in fact lie on the same curve. As a corollary, this reduces the 3parameter space — where maximum window size is — to just a single parameter (recall Section 6).
The model also claims that bandwidth wasted by packet collisions exceeds idle bandwidth caused by backoffs if and only if , where is the transmission rate and is the transmission time (including packet headers); this was also analytically validated by the experiments. Here, we see how an analytical model can discover the science that governs wireless packet transmissions over a shared channel.
9 Analysis with an Analytical Model
In answering the question “Why an Analytical Model?” (Section 2), we give examples where the model is used for architectural exploration ([GPU] and [SoftErrors]) and resource provisioning ([ElasticScaling]); other examples include [DatacenterAMP], [CloudTransactions] and [Roofline] (design exploration) and [MapReduce] (capacity planning). For these examples, the analytical models were used to generate numerical predictions.
This analytic simulation can sometimes reveal interesting behavior in a system (e.g. [5G] in Section 8) but such revelations could arguably be obtained by a more realistic, albeit slower, simulation model. The power in an analytical model lies not in its role as a fast substitute for a simulator, but in the analysis that one can bring to bear on its equations. Such an analysis can yield insights that cannot be obtained by eyeballing any number of plots — without knowing what you are looking for — and provide conclusions that no simulator can offer.
We see illustrations of this power in [ElasticScaling], which discovers that nonuniform access is equivalent to uniform access via the Application Contention Factor; in [TransactionalMemory], which shows two dimensions of the parameter space ( and ) can be reduced to one (); in [P2PVoD], where the Tradeoff Theorem says throughput, sequentiality and robustness cannot be simultaneously maximized for P2P videoondemand; in [802.11], which characterizes the optimal balance between bandwidth loss through packet collisions and time loss to transmission backoff. There are two other examples in [RouterBuffer] and [TCP].
[RouterBuffer] shows that (i) for long TCP flows, buffer size should be inversely proportional to and (ii) for short flows, the probability of a buffer overflow does not depend on , roundtrip time, nor link capacity. These are insights obtained from the analytical model — one cannot get them from any finite number of simulation experiments.
The key equation in [TCP] expresses throughput in terms of packet loss probability and roundtrip time . Clearly, for any nontrivial Internet path, and cn only be measured, not predicted, so what is the point of having that equation? Its significance lies not in predicting throughput, but in characterizing its relationship with and . Such a characterization led to the concept of TCPfriendliness and the design of equationbased protocols.
[RouterBuffer] and [TCP] thus advance the science of network communication.
For a final, topical example, consider the spread of fake news and memes, etc. over the Web, driven by user interest, modulated by daily and weekly cycles, and dampened over time. To adequately capture this behavior, [InformationDiffusion] modifies the classical epidemic model. However, there is no way of integrating the resulting differential equation, so it is solved numerically. The parameters of the model can then be calibrated by fitting measured data points. Since measurements are needed for calibration, the model has limited predictive power. Nonetheless, the parametric values serve to succinctly characterize the diffusion, and provide some insight into its spread. This example illustrates the point that, although the pieces of a system are designed, engineered and artificial, they can exhibit a hardtounderstand, organic behavior when put together. An analytical model is thus a tool for developing the science of such organisms.
(Incidentally, given the recent, tremendous success of artificial neural networks, it is fashionable now to speculate that artificial intelligence may one day become so smart that some AI system will control humans. I believe that, if that day comes, the system will behave biologically, with biological vulnerabilities that are open to attack.)
10 Conclusion
This review has discussed some issues (Sec. 3 and Sec. 8) and introduces some key ideas and techniques (Sec. 4, Sec. 5, Sec. 6 and Sec. 7) in analytical performance modeling. Although the models are often conceived as an engineering tool to generate numerical predictions for the design and control of computer systems (Sec. 2), Sec. 9 points to a less obvious role in discovering the science that underlies these systems, much like the role that mathematical models play in discovering physics in nature. This is a role that spans all computer systems (processor, memory, bandwidth, database and multimedia systems, etc.), that helps develop a Computer Science that withstands changes in technology.
11 References
 [5G

] B. Baynat and N. Narcisse, Performance model for 4G/5G networks taking into account intra and intercell mobility of users. Proc. LCN 2016, 212–215.
 [802.11

] Y. C. Tay and K. C. Chua. A capacity analysis for the IEEE 802.11 MAC protocol. Wireless Networks, 7(2):159–171 (2001).
 [CloudTransactions

] D. Kossman, T. Kraska and S. Loesing. An evaluation of alternative architectures for transaction processing in the cloud. Proc. SIGMOD 2010, 579–590.
 [DatacenterAMP

] V. Gupta and R. Nathuji. Analyzing performance asymmetric multicore processors for latency sensitive datacenter applications. Proc. HotPower 2010, 1–8.
 [DatabaseScalability

] S. Elnikety, S. Dropsho, E. Cecchet and W. Zwaenepoel. Predicting replicated database scalability from standalone database profiling. Proc. EuroSys 2009, 303–316.
 [ElasticScaling

] D. Didona, P. Romano, S. Peluso and F. Quaglia. Transactional Auto Scaler: Elastic scaling of inmemory transactional data grids. Proc. ICAC 2012, 125–134.
 [GPU

] J.C. Huang, J.H. Lee, H. Kim and H.H. S. Lee. GPUMech: GPU performance modeling technique based on interval analysis. Proc. MICRO 2014, 268–279.
 [HM

] M.D. Hill and M.R. Marty. Amdahl’s Law in the Multicore Era. IEEE Computer, 41(7):33–38 (2008).
 [InformationDiffusion

] Y. Matsubara, Y. Sakurai, B.A. Prakash, L. Li and C. Faloutsos. Rise and fall patterns of information diffusion: model and implications. Proc. KDD 2012, 6–14.
 [MapReduce

] E. Vianna, G. Comarela, T. Pontes, J. Almeida, V. Almeida, K. Wilkinson, H. Kuno and U. Dayal. Analytical performance models for MapReduce workloads. Int. J. Parallel Programming 41(4):495–525, August 2013.
 [P2PVoD

] B. Ran, D. G. Andersen, M. Kaminsky and K. Papagiannaki. Balancing throughput, robustness, and inorder delivery in P2P VoD. Proc. CoNEXT 2010, 10:1–10:12.
 [PipelineParallelism

] A. Navarro, R. Asenjo, Si. Tabik and C. Cascaval. Analytical modeling of pipeline parallelism. Proc. PACT 2009, 281–290.
 [Roofline

] S. Williams, A. Waterman and D. Patterson. Roofline: an insightful visual performance model for multicore architectures. CACM, 65–76, April 2009.
 [RouterBuffer

] G. Appenzeller, I. Keslassy and N. McKeown. Sizing router buffers. Proc. SIGCOMM 2004, 281–292.
 [SoftErrors

] A.A. Nair, S. Eyerman, L. Eeckhout and L.K. John. A firstorder mechanistic model for architectural vulnerability factor. Proc. ISCA 2012, 273–284.
 [T

] Y.C. Tay, Analytical Performance Modeling for Computer Systems (3rd Edition), Morgan & Claypool Publishers, 2018.
 [TCP

] J. Padhye, V. Firoiu, D. Towsley, and J. Kurose. Modeling TCP throughput: a simple model and its empirical validation. Proc. SIGCOMM 1998, 303–314.
 [TGS

] Y.C. Tay, N. Goodman and R. Suri. Locking performance in centralized databases. ACM Transactions on Database Systems 10, 4(Dec. 1985), 415–462.
 [TransactionalMemory

] A. Heindl, G. Pokam, and A.R. AdlTabatabai. An analytic model of optimistic software transactional memory. Proc. ISPASS 2009, 153–162.