Monitoring Enabled Distributed Software Construction Method
Author:
Affiliation:

  • Article
  • | |
  • Metrics
  • |
  • Reference [17]
  • |
  • Related
  • |
  • Cited by
  • | |
  • Comments
    Abstract:

    Debugging, performance tuning, and trustworthy evolution are big challenges for the ultra large distributed software system. Aiming at these challenges, a monitoring enabled distributed software construction method is proposed, by which a user can understand the software system better. Based on publish/subscribe model, a runtime architecture is given, which separates the business logic and monitoring logic. Based on AOP, monitoring enabled software construction tools are designed which can reduce the production cost of the monitoring software and enhance the maintainability of the code. Based on the runtime framework, a dynamic customizable deployment method on monitoring system is proposed. Monitoring enabled distributed software construction method can reduce the tanglement of function logic and non-function logic at system development, which reduces the cost of code maintenance; It can ensure loose coupling between monitoring system and monitored object at deployment; Besides, It collects runtime information from multi-part of the system and gather them together on demand, which makes programmer and system operator able to understand system behavior as comprehensively as possible, and affect the business running as little as possible.

    Reference
    [1] Aguilera MK, Mogul JC, Wiener JL, Reynolds R. Muthitacharoen A. Performance debugging for distributed systems of black boxes. In: Proc. of the 19th ACM Symp. on Operating Systems Principles. New York: ACM Press, 2003. 74-89. [doi: 10.1145/1165389.945454]
    [2] Gao J, Jiang GF, Chen HF, Han JW. Modeling probabilistic measurement correlations for problem determination in large-scale distributed systems. In: Proc. of the 29th IEEE Int’l Conf. on Distributed Computing Systems. Washington: IEEE Computer Society, 2009. 623-630. [doi: 10.1109/ICDCS.2009.56]
    [3] Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M. A view of cloud computing. Communications of the ACM, 2010,53(4):50-58. [doi: 10.1145/1721654.1721672]
    [4] Reynolds P, Killian C, Wiener JL, Mogul JC, Shah MA, Vahdat A. Pip: Detecting the unexpected in distributed systems. In: Proc. of the 3rd Symp. on Networked Systems Design and Implementation. California: USENIX, 2006. 115-128.
    [5] Barroso LA, H?lzle U. The datacenter as a computer: An introduction to the design of warehouse-scale machines. In: Proc. of the Synthesis Lectures on Computer Architecture. Morgan & Claypool, 2009. 1-108. [doi: 10.2200/S00193ED1V01Y200905CAC006]
    [6] Roberts CA. Flight recorders and aircraft safety. In: Proc. of the Annual Conf. Houston: United States, 1976. 265-269. [doi: 10.1145/800191.805594]
    [7] Elrad T, Filman RE, Bader A. Aspect-Oriented programming: Introduction. Communications of the ACM, 2001,44(10):29-32.
    [8] Chen MY, Kiciman E, Fratkin E, Fox A, Brewer E. Pinpoint: Problem determination in large, dynamic Internet services. In: Proc. of the DSN. 2002. 595-604. [doi: 10.1109/DSN.2002.1029005]
    [9] Meyer B. Applying “Design by Contract”. IEEE Computer, 1992,25(10):40-51. [doi: 10.1109/2.161279]
    [10] Kiczales G, Hilsdale E, Hugunin J, Kersten M, Palm J, Griswold WG. An overview of AspectJ. In: Proc. of the European Conf. on Object-Oriented Programming (ECOOP 2001). LNCS 2072, Berlin: Springer-Verlag, 2001.
    [11] Spinczyk O, Gal A, Schroder-Preikschat W. AspectC++: An aspect-oriented extension to the C++ programming language. In: Proc. of the 40th Int’l Conf. on Tools Pacific Objects for Internet, Mobile, and Embedded Applications, Vol.10. 2002. 53-60.
    [12] Kim M, Viswanathan M, Kannan S, Lee I, Sokolsky O. Java-MaC: A run-time assurance approach for Java programs. Formal Methods in System Design, 2004,24(2):129-155. [doi: 10.1023/B:FORM.0000017719.43755.7c]
    [13] Sammapun U, Lee I, Sokolsky O. RT-MaC: Runtime monitoring and checking of quantitative and probabilistic properties. In: Proc. of the 11th IEEE Int’l Conf. on Embedded and Real-Time Computing Systems and Applications (RTCSA 2005). Hong Kong, 2005. 147–153. [doi: 10.1109/RTCSA.2005.84]
    [14] Chen F, Ro?u G. Towards monitoring-oriented programming: A paradigm combining specification and implementation. In: Proc. of the 3rd Int’l Workshop on Runtime Verification (RV 2003). Vol. 89 of ENTCS, Colorado: Elsevier Science, 2003. 106-125. [doi: 10.1016/S1571-0661(04)81045-4]
    [15] Chen F, Ro?u G. MOP: An efficient and generic runtime verification framework. In: Proc. of the Object-Oriented Programming, Systems, Languages and Applications (OOPSLA). 2007. 569-588. [doi: 10.1145/1297105.1297069]
    [16] Cheon Y, Leavens G, Sitaraman M, Edwards S. Model variables: Cleanly supporting abstraction in design by contract. Software: Practice and Experience, 2005,35(6):583-599. [doi: 10.1002/spe.v35:6]
    [17] Fonseca R, Porter G, Katz RH, Shenker S, Stoica I. X-Trace: A pervasive network tracing framework. In: Proc. of 4th USENIX Symp. on Networked Systems Design & Implementation. 2007. 271-284.
    Related
    Cited by
Get Citation

刘东红,郭长国,王怀民,王涛.监控使能的分布式软件系统构造方法.软件学报,2011,22(11):2610-2624

Copy
Share
Article Metrics
  • Abstract:4841
  • PDF: 6808
  • HTML: 0
  • Cited by: 0
History
  • Received:August 13,2010
  • Revised:November 16,2010
You are the first2033263Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063