Transaction Dependency Graph Construction using Signal Injection
نویسندگان
چکیده
Understanding the runtime behavior and dependencies between components in complex transaction-based enterprise systems enables the system administrators to identify performance bottlenecks, allocate resources, and detect failures. This paper introduces a novel method for extracting dependency information between system components at runtime by using delay injection on individual links and Fast Fourier Transforms. Our proposed method introduces minimal disturbance in the system and its execution time is independent of the system workload. Thus, it can be used at runtime in production systems. Furthermore, it avoids false positives introduced by other methods. We present preliminary experimental results that demonstrate that our approach is able to identify dependencies, avoid false positives, while ensuring low perturbation to the target system.
منابع مشابه
Framework for Replaying Transactions Using Dependency Graph
There has been a lot of work recently on the topic of “Deterministic Transaction Processing” that assumes that the read and write sets of transactions are known in advance before the execution of the transaction. The knowledge of the read and write sets of transactions enables scheduling the transactions in some global order efficiently while being able to guarantee serializability while achiev...
متن کاملA Framework for Enforceable Specification of Extended Transaction Models and Transactional Workflows
A variety of extensions to the traditional (ACID) transaction model have resulted in a plethora of extended transaction models (ETMs). Many of these ETMs are application-specific, i.e., they are designed to provide correctness guarantees adequate for a particular application, but not others. Similarly, an application-specific ETM may impose restrictions that are unacceptable in one application,...
متن کاملA Framework for Enforceable Specification of Extended Transaction Models and Transaction Workflows
A variety of extensions to the traditional (ACID) transaction model have resulted in a plethora of extended transaction models (ETMs). Many of these ETMs are application-specific, i.e., they are designed to provide correctness guarantees adequate for a particular application, but not others. Similarly, an application-specific ETM may impose restrictions that are unacceptable in one application,...
متن کاملConstruction of a Knowledge Base by Using Korean Text
There are some difficulties in using natural languages as knowledge representation languages for computer systems. However, natural languages are the most frequently used knowledge representation languages for humanbeings. A way of automatic construction of knowledge-base by using Korean text is described in this paper. Dependency grammar has been used for parsing and the meaning of each senten...
متن کاملAspect-Oriented Programming Beyond Dependency Injection
Dependency injection is a hot topic among industrial developers using component frameworks. This paper first mentions that dependency injection and aspect-oriented programming share the same goal, which is to reduce dependency among components for better reusability. However, existing aspect-oriented programming languages/ frameworks, in particular, AspectJ, are not perfectly suitable for expre...
متن کامل