On the Analysis of Software Rejuvenation Policies

نویسندگان

  • Sachin Garg
  • Miklos Telek
  • Kishor Trivedi
چکیده

Software rejuvenation is a technique for software fault tolerance which involves occasionally stopping the executing software, \cleaning" the \internal state" and restarting. This cleanup is done at desirable times during execution on a preventive basis so that unplanned failures, which result in higher costs compared to planned stopping, are avoided. Since during rejuvenation, the software is typically unavailable or in a degraded mode of operation, the operation involves a cost. The necessity to use this technique not only in general purpose computers but also in safety-critical and high availability systems clearly indicates the need of analysis in order to determine the optimal times to rejuvenate. In this paper, we present an analytical model of a software system which services transactions. Due to \aging", not only the service rate of the software decreases with time but the software itself experiences occasional crash/hang failures. We propose and compare two rejuvenation policies. First policy is purely time dependent while the second also takes into account the number of transactions currently queued for service. The policies are evaluated for the resulting steady state availability as well the probability that a transaction is denied service. We also numerically illustrate the use of our model to compute the optimal rejuvenation interval which manimizes (maximizes) the loss probability (steady state availability).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Transient Analysis of Software Rejuvenation Policies in Virtualized System: Phase-Type Expansion Approach

Abstract: This paper presents a transient analysis of software rejuvenation with virtualization. In particular, we apply the phase-type expansion to analyze the pointwise availability of virtual-machine (VM) based software rejuvenation with two policies; cold-VM and warm-VM rejuvenation policies. The performance measures can be derived from the stochastic models described by labeled Markov rege...

متن کامل

Availability Models for Virtualized Systems with Rejuvenation

As one of core technologies of software rejuvenation, analytical models provide a decision-making basis for implementing rejuvenation. This paper builds analytic models using stochastic reward nets with three different rejuvenation policies: non-rejuvenation, time-based rejuvenation, and time and load-based delay rejuvenation, and presents how system transits from one state into another. The re...

متن کامل

Modeling and Analysis of Load and Time Dependent Software Rejuvenation Policies

Due to repeated and potentially faulty usage of continuously running client-server type software systems by many clients, such software \ages" with time and eventually fails. Huang et. al. proposed a technique called \software rejuvenation" [3] in which the software is periodically stopped and then restarted in a \robust" state after proper maintenance. This \renewal" of software prevents, or a...

متن کامل

Software Aging Prediction based on Extreme Learning Machine

In the research on software aging and rejuvenation, one of the most important questions is when to trigger the rejuvenation action. And it is useful to predict the system resource utilization state efficiently for determining the rejuvenation time. In this paper, we propose software aging prediction model based on extreme learning machine (ELM) for a real VOD system. First, the data on the para...

متن کامل

Comprehensive evaluation of aperiodic checkpointing and rejuvenation schemes in operational software system

This paper examines comprehensive evaluation of aperiodic time-based checkpointing and rejuvenation schemes maximizing the steady-state system availability in an operational software system. We consider two kinds of maintenance policies: checkpointing prior to rejuvenating (CPTR) and rejuvenating prior to checkpointing (RPTC). These schemes are complementary from each other to schedule checkpoi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997