Abstract
In recent years, thousands of commodity servers have been deployed in Internet data centers to run large scale Internet applications or cloud computing services. How to continuously monitor the availability, performance and security of data centers in real-time operational environments becomes a daunting task. In this chapter, a comprehensive solution for software monitoring is discussed in Internet data centers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Boulon J, Konwinski A, Qi R, et al. Chukwa: a large-scale monitoring system//Proceedings of IEEE International Conference on Control Applications, 2008, 8.
Cheng S, Pan Y, Analysis of cloud service reliability model based on node failure recovery. Journal of Software Guide, 2012, 11 (5): 90–92.
Sahoo R K, Squillante M S, Sivasubramaniam A, et al., Failure data analysis of a large-scale heterogeneous server environment//IEEE International Conference on Dependable Systems and Networks, 2004: 772–781.
Heath T, Martin R P, Nguyen T D, Improving cluster availability using workstation validation. ACM SIGMETRICS Performance Evaluation Review, 2002, 30(1): 217–227.
Shang Y, Li D, Xu M, Energy-aware routing in data center network//Proceedings of the first ACM SIGCOMM Workshop on Green Networking, 2010: 1–8.
Srikantaiah S, Kansal A, Zhao F., Energy aware consolidation for cloud computing//Proceedings of the Conference on Power Aware Computing and Systems. USENIX Association, 2008, 10.
HOOPER A. Green computing. Communications of the ACM, 2008, 51(10): 1–13.
Avizienis A, Laprie J C, Randell B, et al., Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 2004, 1(1): 11–33.
Dawson D, Desmarais R, Kienle H M, et al., Monitoring in adaptive systems using reflection//Proceedings of the International Workshop on Software Engineering for Adaptive and Self-managing Systems, 2008: 81–88.
Zhang Y, Li, Zhang J, et al., Reviewed on middleware technology. Computer Engineering and Applications, 2002, 15(1): 80–82.
Lin Z, Lai Y, Lin C, et al., The research on cloud database. Journal of Software, 2012, 23(5):1148–1166.
Chang F, Dean J, Ghemawat S, et al., Bigtable: A distributed storage system for structured data. ACM Transactions on Computer Systems (TOCS), 2008, 26(2): 4–11.
Web Services Architecture [S],W3C Working Draft, 2002. http://www.w3.org/TR/ws-arch.
Bai X, Liu Y, Wang L, et al., Model-based monitoring and policy enforcement of services. Simulation Modelling Practice and Theory, 2009, 17(8): 1399–1412.
Delgado N, Gates A Q, Roach S. A taxonomy and catalog of runtime software-fault monitoring tools. IEEE Transactions on Software Engineering, 2004, 30(12): 859–872.
Da Cruz S M S, Campos M L M, Pires P F, et al., Monitoring e-business Web services usage through a log based architecture//Proceeding of IEEE International Conference on Web Services, 2004: 61–69.
Sahai A, Graupner S, Machiraju V, et al. Specifying and monitoring guarantees in commercial grids through SLA//Proceedings of 3rd IEEE International Symposium on Cluster Computing and the Grid, 2003: 292–299.
Devine S W, Bugnion E, Rosenblum M. Virtualization system including a virtual machine monitor for a computer with a segmented architecture: U.S. Patent 6,397, 242, 2002-5-28.
Barham P, Dragovic B, Fraser K, et al., Xen and the art of virtualization. ACM SIGOPS Operating Systems Review, 2003, 37(5): 164–177.
Kivity A, Kamay Y, Laor D, et al., KVM: the Linux virtual machine monitor//Proceedings of the Linux Symposium, 2007(1): 225–230.
Agichtein E, Brill E, Dumais S., Improving web search ranking by incorporating user behavior information//Proceedings of the 29th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 2006: 19–26.
Shin J, Narayanan S S, Gerber L, et al. Analysis of user behavior under error conditions in spoken dialogs//INTERSPEECH. 2002.
Granka L A, Joachims T, Gay G., Eye-tracking analysis of user behavior in WWW search//Proceedings of the 27th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval. 2004: 478–479.
Bellare M, Miner S K. A forward-secure digital signature scheme//Advances in Cryptology—CRYPTO’99. Springer Berlin Heidelberg, 1999: 431–448.
Günther C G. An identity-based key-exchange protocol//Advances in Cryptology—Eurocryp ’89. Springer Berlin Heidelberg, 1990: 29–37.
Padala P, Hou K Y, Shin K G, et al. Automated control of multiple virtualized resources//Proceedings of the 4th ACM European Conference on Computer Systems, 2009: 13–26.
Lowe S. Mastering VMware vSphere 4. Indianapolis: Wiley Publishing, 2009.
Matthews J N, Dow E M, Deshane T, et al., Running Xen: a hands-on guide to the art of virtualization. Prentice Hall PTR, 2008.
Williams D E. Virtualization with Xen (tm): Including XenEnterprise, XenServer, and XenExpress: Including XenEnterprise, XenServer, and XenExpress.Syngress, 2007.
SzymańskaKwiecień A, Kwiatkowski J, Pawlik M, et al., Performance prediction methods//Proceedings of the International Multiconference. 2006, 1896: 7094.
Kwiatkowski J. Evaluation of parallel programs by measurement of its granularity//Parallel Processing and Applied Mathematics. Springer Berlin Heidelberg, 2006: 145–153.
Jin’an Hu. The data centers in the cloud computing resources monitoring system research and design. Journal of University of Electronic Science and Technology. 2012.5.
ZHAO Fang, LI Lan-ying. Study of web application monitoring system based on business process. Journal of Beijing Forestry University. 2013.6.
Wikipedia, the resource monitor[OL]. http://en.wikipedia.org/wiki/Resource_Monitor.
Han F, Peng J, Zhang W, et al. Virtual resource monitoring in cloud computing. Journal of Shanghai University (English Edition), 2011, 15: 381–385.
Fastest VPN for Asia. How to use the resource monitor in vista. http://www.vistax64.com/tutorials/111020-resource-monitor.html
Manage Engine-IT Enterprise Management. CPU, Memory and Disk Monitoring [OL]. http://www.manageengine.com/network-monitoring/cpu-memory-disk.html
Zhuohao Wang, Zhuofeng Zhao. A Model-Driven Approach for Business-Oriented Monitoring of Service Operation//Proceeding of IEEE International Conference on Service Sciences (ICSS). 2010, 5:13–14.
Thomas M, Redmond R, Yoon V, et al. A semantic approach to monitor business process. Communications of the ACM, 2005, 48(12): 55–59.
Ince D C, Andrews D. The Software Life Cycle. Butterworth-Heinemann, 1990.
Kleinrock L. A vision for the Internet. ST Journal of Research, 2005, 2(1): 4–5.
Buyya R, Beloglazov A, Abawajy J., Energy-efficient man-agement of data center resources for cloud computing:a vision, architectural elements, and open challenges//Proceeding of the 2010 International Conference on Parallel and Distributed Processing Techniques and Applications,2010:1–12.
Weiss A. Computing in the clouds. Networker, 2007, 11(4):16–25.
Barham P, Dragovic B, Fraser K, et al. Xen and the art of virtualization. ACM SIGOPS Operating Systems Review, 2003, 37(5): 164–177.
Padala P, Shin K G, Zhu X, et al. Adaptive control of virtualized resources in utility computing environments. ACM SIGOPS Operating Systems Review, 2007, 41(3): 289–302.
Marston S, Li Z, Bandyopadhyay S, et al. Cloud Computing—The business perspective. Decision Support Systems, 2011, 51(1): 176–189.
Xiong K, Perros H. Service performance and analysis in cloud computing//Proceeding of IEEE 2009 World Conference on Services-I, 2009: 693–700.
http://www.brighthub.com/computing/smb-security/articles/11337.aspx.
http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=39064
Eick S G, Graves T L, Karr A F, et al. Does code decay? assessing the evidence from change management data. IEEE Transactions on Software Engineering, 2001, 27(1): 1–12.
FormalOn-SiteMonitoringApril7, 2006. http://www.research.ucsf.edu/chr/Forms/chrOnsiteMonit.asp
Contact Hole Roughness (CHR). http://www.research.ucsf.edu/chr/Forms/chrOnsiteMonit.asp
Vaculín R, Sycara K. Semantic web services monitoring: An OWL-S based approach//Proceedings of the 41st Annualon IEEE Hawaii International Conference on System Sciences, 2008: 313–313.
Dan A, Davis D, Kearney R, et al. Web services on demand: WSLA-driven automated management. IBM Systems Journal, 2004, 43(1): 136–158.
Lundy L, Pradeep R. On the migration from enterprise management to integrated service level management. IEEE on Network, 2002, 16(1): 8–14.
Avery, Robert B., Off-Site Surveillance Systems. History of the Eighties: Lessons for the Futur,1997,2:25–29.
Snodgrass R. A relational approach to monitoring complex systems. ACM Transactions on Computer Systems (TOCS), 1988, 6(2): 157–195.
De Chaves S A Uriarte R B Westphall C B. Toward an Architecture for Monitoring Private Clouds. IEEE on Communication Magazine, 2011, 49(12): 130–137.
Saaty T L. What is the analytic hierarchy process? [M]. Springer Berlin Heidelberg, 1988.
Sun Z, Xu Z, Da Q. A Model Based on Alternative Similarity Scale for Uncertain Multi-Attribute Decision-Making. Journal of Management Science, 2001, 9(6): 58–62.
Wu D, Cheng H, Xi X, et al. Annual Peak Power Load Forecasting Based on Fuzzy AHP//Proceedings of the Chinese Society of Universities for Electric Power System and Automation, 2007, 1: 009.
Keufmann A, Gupta M M. Introduction to Fuzzy Arithmetic:Theory and Application. NY: Van Nostrand Reinhold, 1991.
Liu H, Kong F. A new MADM algorithm based on fuzzy subjective and objective integrated weights. International Journal of Information System and Sciences, 2005, 1(3–4): 420–427.
Kukavica I, Robinson J C. Distinguishing smooth functions by a finite number of point values, and a version of the Takens Embedding Theorem. Physica D: Nonlinear Phenomena, 2004, 196(1): 45–66.
Kember G, Fowler A C. A Correlation Function for Choosing Time Delays in Phase Portrait Reconstructions. Physics Letters A, 1993, 179(2): 72–80.
Rosenstein M T, Collins J J, De Luca C J. A Practical Method for Calculating Largest Lyapunov Exponents From Small Data Sets. Physica D: Nonlinear Phenomena, 1993, 65(1): 117–134.
Chambers J M. Graphical Methods for Data Analysis.Spring Science, 1983.
Gao J, Pattabhiraman P, Bai X, et al. SaaS Performance and Scalability Evaluation in Clouds//Proceeding of IEEE the 6th International Symposium on Service Oriented System Engineering (SOSE), 2011: 61–71.
Guo J, Huang H, Wang B, et al. Research on the prediction of web application system aging trend oriented to user access intention.Instrumentation, Measurement, Circuits and Systems. Springer Berlin Heidelberg, 2012: 983–991.
HP LoadRunner—Free download and Software Reviews—CNET Download.com. http://download.cnet.com/HP-LoadRunner/3000-2383_4-10306263.html#ixzz2a39AvT61.
Load Runner Load Testing Tools Resources. http://www.load-testing-tools.com/loadrunner.html.
Brown A, Johnston S K, Larsen G, et al. SOA Development Using the IBM Rational Software Development Platform: APractical Guide.Rational Software, 2005.
Apache JMeter, ApacheCon North America Portland, Oregon 26th–28th February 2013, http://jmeter.apache.org
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer Science+Business Media New York
About this chapter
Cite this chapter
Wu, C., Guo, J. (2015). Software Monitoring in Data Centers. In: Khan, S., Zomaya, A. (eds) Handbook on Data Centers. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-2092-1_42
Download citation
DOI: https://doi.org/10.1007/978-1-4939-2092-1_42
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4939-2091-4
Online ISBN: 978-1-4939-2092-1
eBook Packages: Computer ScienceComputer Science (R0)