CN104536894A - Global optimization method based on maintenance charge and for two-tier software aging phenomenon - Google Patents

Global optimization method based on maintenance charge and for two-tier software aging phenomenon Download PDF

Info

Publication number
CN104536894A
CN104536894A CN201510009756.7A CN201510009756A CN104536894A CN 104536894 A CN104536894 A CN 104536894A CN 201510009756 A CN201510009756 A CN 201510009756A CN 104536894 A CN104536894 A CN 104536894A
Authority
CN
China
Prior art keywords
centerdot
red
tau
total
delta
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510009756.7A
Other languages
Chinese (zh)
Other versions
CN104536894B (en
Inventor
赵靖
王延斌
刘耀莉
宁高容
蔡开元
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Harbin Engineering University
Original Assignee
Harbin Engineering University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Harbin Engineering University filed Critical Harbin Engineering University
Priority to CN201510009756.7A priority Critical patent/CN104536894B/en
Publication of CN104536894A publication Critical patent/CN104536894A/en
Application granted granted Critical
Publication of CN104536894B publication Critical patent/CN104536894B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a global optimization method based on the maintenance charge and for a two-tier software aging phenomenon. The method includes the following steps that the consumed memory Xi of an application tier within the time interval and the consumed memory Yi of an operation system tier within the time interval are monitored by a monitor; a two-tier software aging analysis model is built based on the updating process; the optimum value of an alarm threshold value of the operation system tier, the optimum value of the fatigue threshold value of the operation system tier and the optimum value of the alarm threshold value of the application tier are obtained according to the two-tier software aging analysis model; and the available maximum value of a two-tier software system is obtained. By means of the method, the overall availability can be improved effectively for a regeneration strategy method of the two-tier software.

Description

For the global optimization method based on maintenance cost of two layers of software catabiosis
Technical field
The invention belongs to field of software performance test, particularly relating to can minimum maintenance expense, for the global optimization method based on maintenance cost of two layers of software catabiosis.
Background technology
When software aging phenomenon is software long-play, cause the phenomenon that software performance declines gradually due to the consumption of computer resource.The consequence that this phenomenon may cause is serious, it not only affects the operation of common server software, and may to the key area requiring high reliability, software as used in business, finance, science and technology and the field such as military impacts, in the software environment that security requirement is high, the software aging phenomenon personnel that even may cause injure even fame loss.For this phenomenon, scholar proposes the method that one is called " software regeneration (Software Rejuvenation) ", namely by restarting server software or whole computer system termly, reinitialize the internal state of server, release may cause aging occupied system resource, the state of software and performance are restored, thus avoid or reduce the even loss that causes of the software systems machine of delaying of the aging serious hydraulic performance decline caused.In the middle of the application of software regeneration method, the determination of regeneration intervals is a very important problem, if regeneration intervals is selected long, then may not avoid the harm that software aging phenomenon causes, if regeneration intervals is selected too short, then this expense brought as software systems of initiative regeneration behavior is excessive with regard to possibility, causes the reduction of software efficiency of actual.Usually, the value that the software regeneration time interval can select to be suitably shorter than the software expects life-span, therefore, to the prediction of software lifetime with estimate it is a focus in the correlative study of software aging field always.In order to the probability distribution in Estimation Software life-span, can carry out abstract fully to actual software system, utilize the mathematical models such as Markov model, Semi-Markov Process, stochastic reward net, stochastic Petri net to carry out modeling to system, thus take out the feature of software lifetime; Also real software systems can be studied, utilize the detection means contrived experiment of various performance parameter, from real experiment, the various delta datas of acquisition system performance parameter, then utilize statistical method or intelligent algorithm etc., describe and the life-span of forecasting software.But, carry out the large obstacle of test existence one to real software system, server software is all designed to run uninterruptedly under normal circumstances provides service, even if there is catabiosis, the life-span of software is also very long, is also just difficult to the sample obtaining the software failure time by experiment.For this phenomenon, scholar proposes one and is called " accelerated deterioration test (ADT) " and " accelerating lifetime testing (ALT) " technology, namely utilize accelerating lifetime testing theoretical, obtained the lifetime data of software in acceleration situation by shorter accelerating lifetime testing consuming time, calculate the true lifetime of software in non-acceleration situation.
Along with the complicacy of system software and running environment thereof improves constantly, system software aging is not only caused by application layer or operating system layer merely, the aging collapse that whole service all can be caused to serve of any one deck, and traditional method of testing is all only limited to one deck.The present invention builds two layers of software aging analysis model, computing system aging threshold level, utilize the accelerating lifetime testing of widespread use in traditional industry field theoretical, dispose and implement to test for the accelerating lifetime testing of two layers of software catabiosis, the time interval of adjustment monitor monitors internal memory change, calculate true lifetime and other parameters of non-acceleration software under each monitor monitors time interval, obtain the probability distribution of system software availability under normal circumstances.
Many experts and scholars are studied software aging, catabiosis for example in people [2008] the research web server such as Yun-Fei Jia, they have built an experiment porch with an Apache Server and multiple client, run and organize experiment more, be collected in the relevant information of system resource use amount on server in often group experiment, they observe software aging process is nonlinear and chaotic; The people such as Cotroneo [2010] have studied linux kernel code, analyze workload parameters, by highlighted display and the related subsystem of aging tendency, for the potential source of software aging provides proof.But they seldom study for the aging of two layers of software, but the availability of whole system not only only relates to the availability of application layer (operating system layer), it and above-mentionedly both have close relationship, the inefficacy of any one deck software all can cause system to be disabled.
Summary of the invention
The object of this invention is to provide a kind of can minimum maintenance expense, for the global optimization method based on maintenance cost of two layers of software catabiosis.
The present invention is achieved by the following technical solutions:
For the global optimization method based on maintenance cost of two layers of software catabiosis, it is characterized in that, comprise following step:
Step one: record application layer can utilize internal memory A when initial health totalinternal memory O can be utilized when initial health with operating system layer total, monitor monitors application layer the time interval (τ (i-1), τ i] the internal memory X of internal consumption iwith operating system layer the time interval (τ (i-1), τ i] the internal memory Y of internal consumption i, wherein τ is monitoring time interval, and i is monitoring total degree;
Step 2: build two layers of software aging analysis model based on renewal process:
A ( k · τ ) = A total - Σ i = 1 k X i
O ( k · τ ) = O total - Σ i = 1 k Y i
Wherein, internal memory available in application layer when A (k τ) is the secondary monitoring of monitor kth, internal memory available in operating system layer when O (k τ) is the secondary monitoring of monitor kth;
Step 3: according to two layers of software aging analysis model, obtains the alarm threshold O of operating system layer redoptimum value, operating system layer fatigue threshold O blueoptimum value, and the alarm threshold A of application layer redoptimum value;
The alarm threshold O of operating system layer redoptimum value be:
O red * = { O red : P [ Y K + 1 > O red | O ( K · τ ) = O red ] = c Op · τ ( O total - O red E ( Y ) · τ + E ( Δ ) ) ( ( O total - O red E ( Y ) + 1 ) · τ + E ( Δ ) ) c Or ( ( O total - O red E ( Y ) + 1 ) · τ + E ( Δ ′ ) ) - c Op ( ( O total - O red E ( Y ) + 1 ) · τ + E ( Δ ) ) }
Wherein, for the alarm threshold O of operating system layer redoptimum value, before time (K+1) τ operating system collapse probability α be:
α = P [ Y K + 1 > O red | O ( K · τ ) = O red ] = c Op · τ ( K · τ + Δ ) ( ( K + 1 ) · τ + Δ ) c Or ( K + 1 ) · τ + Δ ′ - c Op ( K + 1 ) · τ + Δ ,
The fatigue threshold O of operating system layer blueoptimum value be:
O blue * = O blue : c Ap O blue - O red * E ( Y ) + E ( δ ) τ + c Op O total - O red * E ( Y ) + E ( Δ ) τ = ( E ( N ) - 1 ) · c Ap E ( N ) · ( A total - A red * ) E ( X ) + E ( N ) · E ( δ ) τ + c Op O total - O blue E ( Y ) + E ( Δ ) τ
Wherein, for the fatigue threshold O of operating system layer blueoptimum value,
The alarm threshold A of application layer redoptimum value be:
A red * = { A red : P [ X K + 1 > A red | A ( K · τ ) = A red ] = c Ap · τ ( A total - A red E ( X ) · τ + E ( δ ) ) ( ( A total - A red E ( X ) + 1 ) · τ + E ( δ ) ) c Ar ( ( A total - A red E ( X ) + 1 ) · τ + E ( δ ′ ) ) - c Ap ( ( A total - A red E ( X ) + 1 ) · τ + E ( δ ) ) }
Wherein, for the alarm threshold A of application layer redoptimum value, before time (K+1) τ application layer collapse probability be:
β = P [ Y K + 1 > A red | A ( K · τ ) = A red ] = c Ap · τ ( K · τ + δ ) ( ( K + 1 ) · τ + δ ) c Ar ( K + 1 ) · τ + δ ′ - c Ap ( K + 1 ) · τ + δ ,
Wherein, E (X) is X iexpectation value, E (Y) is Y iexpectation value, c opand c orthat operating system regenerates and passive expense of restarting each time respectively, Δ and Δ ' be respectively operating system regeneration and passive time of restarting, E (Δ) and E (Δ ') be respectively Δ and Δ ' expectation value, c apand c arbe that application layer regenerates and passive expense of restarting each time respectively, δ and δ ' is respectively application layer regeneration and passive time of restarting, and E (δ) and E (δ ') is the expectation value of δ and δ ' respectively.
Step 4: according to the alarm threshold O of operating system layer redoptimum value, operating system layer fatigue threshold O blueoptimum value, and the alarm threshold A of application layer redoptimum value, obtain two layers of software system availability maximal value.
The present invention is directed to the global optimization method based on maintenance cost of two layers of software catabiosis, also comprise:
Obtain the method for two layers of software system availability maximal value, comprise following step,
1) state of application layer and operating system layer is divided, work as A red< A (t)≤A totaltime, application layer is in a safe condition; As 0 < A (t)≤A redtime, application layer is on the alert; When A (t)=0, application layer is in spent condition; Work as O blue< O (t)≤O totaltime, operating system layer is in a safe condition; Work as O red< O (t)≤O bluetime, operating system layer is in fatigue state; As 0 < O (t)≤O redtime, operating system layer is on the alert; When O (t)=0, operating system layer is in spent condition;
2) try to achieve when application layer is on the alert or spent condition, and operating system layer is in the Probability p of fatigue state o1, and the availability A of now two layers of software system 1for:
P O 1 = O * blue - O * red E ( Y ) &tau; &CenterDot; A total - A * red E ( X ) &tau; = ( O * blue - O * red ) &CenterDot; E ( X ) ( A total - A * red ) &CenterDot; E ( Y )
A 1 = ( O total - O * blue ) &CenterDot; &tau; E ( Y ) - [ ( O total - O * blue ) &CenterDot; &tau; E ( Y ) ( A total - A * red ) &CenterDot; &tau; E ( X ) + t AM - 1 ] &CenterDot; t AM ( O total - O * blue ) &CenterDot; &tau; E ( Y ) + E ( &Delta; )
When the Probability p that operating system layer is on the alert o2, and the availability A of now two layers of software system 2for:
p O2=(1-p O1)(1-α)
A 2 = ( O total - O * red ) &CenterDot; &tau; E ( Y ) - [ ( O total - O * red ) &CenterDot; &tau; E ( Y ) ( A total - A * red ) &CenterDot; &tau; E ( X ) + t AM - 1 ] &CenterDot; t AM ( O total - O * red ) &CenterDot; &tau; E ( Y ) + E ( &Delta; ) ,
When operating system layer arrives the Probability p of spent condition o3, and the availability A of now two layers of software system 3for:
p O3=(1-p O1
A 3 = O total &CenterDot; &tau; E ( Y ) - [ O total &CenterDot; &tau; E ( Y ) ( A total - A * red ) &CenterDot; &tau; E ( X ) + t AM - 1 ] &CenterDot; t AM O total &CenterDot; &tau; E ( Y ) + E ( &Delta; &prime; ) ,
Wherein, t aM=: β δ '+(1-β) δ is the averaging time of a maintenance application layer,
3) the availability maximal value asking for two layers of software system is:
Availability=p O1·A 1+p O2·A 2+p O3·A 3
Beneficial effect:
The present invention from the memory refreshing Procedure Acquisition of two layers of software to some internal memory delta datas after just can construct the aging analysis model of two layers of software, definition in conjunction with the aging analysis model built and optimal threshold level can calculate the threshold level of the aging and regeneration of the best of two layers of software on the basis of minimum maintenance expense, within very short time, so just effectively can calculate the optimal availability size of whole system.Range of application of the present invention can expand the system regions of any one two layers of software to.
Accompanying drawing explanation
Fig. 1 is execution schematic flow sheet of the present invention.
Fig. 2 is the renewal process model of two layers of software regeneration.
Fig. 3 is the application state based on A (t), O (t) and alarm threshold.
Embodiment
Below in conjunction with accompanying drawing, the present invention is described in further details.
The invention reside in the analytical model and accelerated test theory that utilize system software update process, the lifetime data of test two layers of software in acceleration situation, derive the two-layer aging probability of availability distribution under normal level being subject to software aging phenomena impair, thus draw the availability size of system on the basis of minimum maintenance expense.This object can realize according to following steps, as shown in Figure 1:
The first step: build two layers of software aging analysis model based on renewal process.Software upgrading process refers to and reinitializes software inhouse state, discharges occupied memory source.
Second step: the threshold level of define system state.
3rd step: analytic system availability.System availability refers to the ratio of time shared by the whole system time that system software normally runs.
The present invention carries out system availability research to the web server software (application layer) of an e-commerce website and the operating system under it.Below in conjunction with other accompanying drawings, the process maximizing system availability is described further.
1, build experiment porch, obtain output parameter
1.1, experiment porch is built: in application layer, introduce a module with memory overflow bug, this module when server normal process HTTP request by random call, by controlling the probability calling this module, make it that memory overflow speed occur to differ, in operating system layer, load a character device module, do not discharged to operating system application memory block by write method in this character device module, cause the memory overflow of operating system.When the module introduced extra in application layer is called, character device module is also called.
1.2, record application layer and can utilize memory size A when initial health totalmemory size O can be utilized when initial health with operating system layer total
1.3, running experiment, use simultaneously monitor monitors application layer the time interval (τ (i-1), τ i] the memory size X of internal consumption iwith monitor operating system layer the time interval (τ (i-1), τ i] the memory size Y of internal consumption i, be then saved in respectively in file tomcatMem.log and sysMeminfo.log, wherein τ is the monitor monitors time interval, and i is the total degree of monitor monitors.The working time of whole experiment is one hour.
1.4, X is calculated iand Y iexpectation value E (X), E (Y).
2, the A will obtained in the 1st step total, O total, X iand Y ibe updated to
A ( k &CenterDot; &tau; ) = A total - &Sigma; i = 1 k X i With O ( k &CenterDot; &tau; ) = O total - &Sigma; i = 1 k Y i
In, obtain building two layers of software aging analysis model based on renewal process, see Fig. 2.Wherein, k is the number of times of monitor monitors, time when k τ is monitor kth time monitoring, memory size available in application layer when A (k τ) is time monitoring of monitor kth, memory size available in operating system layer when O (k τ) is time monitoring of monitor kth.
3, the optimal threshold level of computing system state.Definition A redfor the alarm threshold of application layer, O bluefor the fatigue threshold of operating system layer, O redfor the alarm threshold of operating system layer.By the E (X) that obtains in the 1st step and E (Y) and the aging empirical value c obtained of previous scholars research op, c or, Δ, Δ ', c ap, c ar, the following equation of δ and δ ' calculates O respectively red, A redand O blueoptimum value, wherein c opand c orthat operating system regenerates and passive expense of restarting each time respectively, Δ and Δ ' be respectively operating system regeneration and passive time of restarting, E (Δ) and E (Δ ') be respectively Δ and Δ ' expectation value, c apand c arbe that application layer regenerates and passive expense of restarting each time respectively, δ and δ ' is respectively application layer regeneration and passive time of restarting, and E (δ) and E (δ ') is the expectation value of δ and δ ' respectively.
3.1, O redthe determination of optimum value
O red * = { O red : P [ Y K + 1 > O red | O ( K &CenterDot; &tau; ) = O red ] = c Op &CenterDot; &tau; ( O total - O red E ( Y ) &CenterDot; &tau; + E ( &Delta; ) ) ( ( O total - O red E ( Y ) + 1 ) &CenterDot; &tau; + E ( &Delta; ) ) c Or ( ( O total - O red E ( Y ) + 1 ) &CenterDot; &tau; + E ( &Delta; &prime; ) ) - c Op ( ( O total - O red E ( Y ) + 1 ) &CenterDot; &tau; + E ( &Delta; ) ) }
Wherein &alpha; = P [ Y K + 1 > O red | O ( K &CenterDot; &tau; ) = O red ] = c Op &CenterDot; &tau; ( K &CenterDot; &tau; + &Delta; ) ( ( K + 1 ) &CenterDot; &tau; + &Delta; ) c Or ( K + 1 ) &CenterDot; &tau; + &Delta; &prime; - c Op ( K + 1 ) &CenterDot; &tau; + &Delta; It is the probability of operating system collapse before time (K+1) τ.
3.2, A redthe determination of optimum value
A red * = { A red : P [ X K + 1 > A red | A ( K &CenterDot; &tau; ) = A red ] = c Ap &CenterDot; &tau; ( A total - A red E ( X ) &CenterDot; &tau; + E ( &delta; ) ) ( ( A total - A red E ( X ) + 1 ) &CenterDot; &tau; + E ( &delta; ) ) c Ar ( ( A total - A red E ( X ) + 1 ) &CenterDot; &tau; + E ( &delta; &prime; ) ) - c Ap ( ( A total - A red E ( X ) + 1 ) &CenterDot; &tau; + E ( &delta; ) ) }
Wherein, &beta; = P [ Y K + 1 > A red | A ( K &CenterDot; &tau; ) = A red ] = c Ap &CenterDot; &tau; ( K &CenterDot; &tau; + &delta; ) ( ( K + 1 ) &CenterDot; &tau; + &delta; ) c Ar ( K + 1 ) &CenterDot; &tau; + &delta; &prime; - c Ap ( K + 1 ) &CenterDot; &tau; + &delta; It is the probability of application layer collapse before time (K+1) τ.
3.3, O bluethe determination of optimum value
O blue * = O blue : c Ap O blue - O red * E ( Y ) + E ( &delta; ) &tau; + c Op O total - O red * E ( Y ) + E ( &Delta; ) &tau; = ( E ( N ) - 1 ) &CenterDot; c Ap E ( N ) &CenterDot; ( A total - A red * ) E ( X ) + E ( N ) &CenterDot; E ( &delta; ) &tau; + c Op O total - O blue E ( Y ) + E ( &Delta; ) &tau;
Wherein, E (N) meets following expression formula:
E ( N ) = O total - O red * E ( Y ) A total - A red * E ( Y ) + E ( &delta; ) &tau;
4, system availability size is determined
4.1, α, β, O is obtained red, A redand O blueoptimum value after, definition work as A red< A (t)≤A totaltime application layer in a safe condition; As 0 < A (t)≤A redtime application layer be on the alert; When A (t)=0, application layer is in spent condition, works as O blue< O (t)≤O totaltime operating system layer in a safe condition; Work as O red< O (t)≤O bluetime operating system layer be in fatigue state; As 0 < O (t)≤O redtime operating system layer be on the alert; When O (t)=0, operating system layer is in spent condition.As shown in Figure 3.
4.2, computing application layer or operating system layer are in the availability size of each shape probability of state and system.
4.2.1, when application layer warning or spent condition is in, and Probability p when operating system is in fatigue state o1and the availability size A of system 1be respectively
P O 1 = O * blue - O * red E ( Y ) &tau; &CenterDot; A total - A * red E ( X ) &tau; = ( O * blue - O * red ) &CenterDot; E ( X ) ( A total - A * red ) &CenterDot; E ( Y )
A 1 = ( O total - O * blue ) &CenterDot; &tau; E ( Y ) - [ ( O total - O * blue ) &CenterDot; &tau; E ( Y ) ( A total - A * red ) &CenterDot; &tau; E ( X ) + t AM - 1 ] &CenterDot; t AM ( O total - O * blue ) &CenterDot; &tau; E ( Y ) + E ( &Delta; )
4.2.2 the Probability p, when operating system is on the alert o2and the availability size A of system 2be respectively
p O2=(1-p O1)(1-α)
A 2 = ( O total - O * red ) &CenterDot; &tau; E ( Y ) - [ ( O total - O * red ) &CenterDot; &tau; E ( Y ) ( A total - A * red ) &CenterDot; &tau; E ( X ) + t AM - 1 ] &CenterDot; t AM ( O total - O * red ) &CenterDot; &tau; E ( Y ) + E ( &Delta; )
4.3.3 the Probability p, when operating system arrives spent condition o3and the availability size A of system 3be respectively
p O3=(1-p O1
A 3 = O total &CenterDot; &tau; E ( Y ) - [ O total &CenterDot; &tau; E ( Y ) ( A total - A * red ) &CenterDot; &tau; E ( X ) + t AM - 1 ] &CenterDot; t AM O total &CenterDot; &tau; E ( Y ) + E ( &Delta; &prime; )
Wherein, t aM=: β δ '+(1-β) δ is the averaging time of a maintenance application layer.
4.4, p is obtained o1, A 1, p o2, A 2, p o3, A 3after, be updated in following formula, obtained the availability maximal value of system.
Availability=p O1·A 1+p O2·A 2+p O3·A 3

Claims (2)

1. for the global optimization method based on maintenance cost of two layers of software catabiosis, it is characterized in that, comprise following step:
Step one: record application layer can utilize internal memory A when initial health totalinternal memory O can be utilized when initial health with operating system layer total, monitor monitors application layer the time interval (τ (i-1), τ i] the internal memory X of internal consumption iwith operating system layer the time interval (τ (i-1), τ i] the internal memory Y of internal consumption i, wherein τ is monitoring time interval, and i is monitoring total degree;
Step 2: build two layers of software aging analysis model based on renewal process:
A ( k &CenterDot; &tau; ) = A total - &Sigma; i = 1 k X i
O ( k &CenterDot; &tau; ) = O total - &Sigma; i = 1 k Y i
Wherein, internal memory available in application layer when A (k τ) is the secondary monitoring of monitor kth, internal memory available in operating system layer when O (k τ) is the secondary monitoring of monitor kth;
Step 3: according to two layers of software aging analysis model, obtains the alarm threshold O of operating system layer redoptimum value, operating system layer fatigue threshold O blueoptimum value, and the alarm threshold A of application layer redoptimum value;
The alarm threshold O of operating system layer redoptimum value be:
O red * = { O red : P [ Y K + 1 > O red | O ( K &CenterDot; &tau; ) = O red ] = c Op &CenterDot; &tau; ( O total - O red E ( Y ) &CenterDot; &tau; + E ( &Delta; ) ) ( ( O total - O red E ( Y ) + 1 ) &CenterDot; &tau; + E ( &Delta; ) ) c Or ( ( O total - O red E ( Y ) + 1 ) &CenterDot; &tau; + E ( &Delta; &prime; ) ) - c Op ( ( O total - O red E ( Y ) + 1 ) &CenterDot; &tau; + E ( &Delta; ) ) }
Wherein, for the alarm threshold O of operating system layer redoptimum value, before time (K+1) τ operating system collapse probability α be:
&alpha; = P [ Y K + 1 > O red | O ( K &CenterDot; &tau; ) = O red ] = c Op &CenterDot; &tau; ( K &CenterDot; &tau; + &Delta; ) ( ( K + 1 ) &CenterDot; &tau; + &Delta; ) c Or ( K + 1 ) &CenterDot; &tau; + &Delta; &prime; - c Op ( K + 1 ) &CenterDot; &tau; + &Delta; ,
The fatigue threshold O of operating system layer blueoptimum value be:
O blue * = O blue : c Ap O blue - O red * E ( Y ) + E ( &delta; ) &tau; + c Op O total - O red * E ( Y ) + E ( &Delta; ) &tau; = ( E ( N ) - 1 ) &CenterDot; c Ap E ( N ) &CenterDot; ( A total - A red * ) E ( X ) + E ( N ) &CenterDot; E ( &delta; ) &tau; + c Op O total - O blue E ( Y ) + E ( &Delta; ) &tau;
Wherein, for the fatigue threshold O of operating system layer blueoptimum value,
The alarm threshold A of application layer redoptimum value be:
A red * = { A red : P [ X K + 1 > A red | A ( K &CenterDot; &tau; ) = A red ] = c Ap &CenterDot; &tau; ( A total - A red E ( X ) &CenterDot; &tau; + E ( &delta; ) ) ( ( A total - A red E ( X ) + 1 ) &CenterDot; &tau; + E ( &delta; ) ) c Ar ( ( A total - A red E ( X ) + 1 ) &CenterDot; &tau; + E ( &delta; &prime; ) ) - c Ap ( ( A total - A red E ( X ) + 1 ) &CenterDot; &tau; + E ( &delta; ) ) } Wherein, for the alarm threshold A of application layer redoptimum value, before time (K+1) τ application layer collapse probability be:
&beta; = P [ X K + 1 > A red | A ( K &CenterDot; &tau; ) = A red ] = c Ap &CenterDot; &tau; ( K &CenterDot; &tau; + &delta; ) ( ( K + 1 ) &CenterDot; &tau; + &delta; ) c Ar ( K + 1 ) &CenterDot; &tau; + &delta; &prime; - c Ap ( K + 1 ) &CenterDot; &tau; + &delta; ,
Wherein, E (X) is X iexpectation value, E (Y) is Y iexpectation value, c opand c orthat operating system regenerates and passive expense of restarting each time respectively, Δ and Δ ' be respectively operating system regeneration and passive time of restarting, E (Δ) and E (Δ ') be respectively Δ and Δ ' expectation value, c apand c arbe that application layer regenerates and passive expense of restarting each time respectively, δ and δ ' is respectively application layer regeneration and passive time of restarting, and E (δ) and E (δ ') is the expectation value of δ and δ ' respectively.
Step 4: according to the alarm threshold O of operating system layer redoptimum value, operating system layer fatigue threshold O blueoptimum value, and the alarm threshold A of application layer redoptimum value, obtain two layers of software system availability maximal value.
2. the global optimization method based on maintenance cost for two layers of software catabiosis according to claim 1, is characterized in that: the described method obtaining two layers of software system availability maximal value, comprises following step,
1) state of application layer and operating system layer is divided, work as A red< A (t)≤A totaltime, application layer is in a safe condition; As 0 < A (t)≤A redtime, application layer is on the alert; When A (t)=0, application layer is in spent condition; Work as O blue< O (t)≤O totaltime, operating system layer is in a safe condition; Work as O red< O (t)≤O bluetime, operating system layer is in fatigue state; As 0 < O (t)≤O redtime, operating system layer is on the alert; When O (t)=0, operating system layer is in spent condition;
2) try to achieve when application layer is on the alert or spent condition, and operating system layer is in the Probability p of fatigue state o1, and the availability A of now two layers of software system 1for:
p O 1 = O * blue - O * red E ( Y ) &tau; &CenterDot; A total - A * red E ( X ) &tau; = ( O * blue - O * red ) &CenterDot; E ( X ) ( A total - A * red ) &CenterDot; E ( Y )
A 1 = ( O total - O * blue ) &CenterDot; &tau; E ( Y ) - [ ( O total - O * blue ) &CenterDot; &tau; E ( Y ) ( A total - A * red ) &CenterDot; &tau; E ( X ) + t AM - 1 ] &CenterDot; t AM ( O total - O * blue ) &CenterDot; &tau; E ( Y ) + E ( &Delta; )
When the Probability p that operating system layer is on the alert o2, and the availability A of now two layers of software system 2for:
p O2=(1-p O1)(1-α)
A 2 = ( O total - O * red ) &CenterDot; &tau; E ( Y ) - [ ( O total - O * red ) &CenterDot; &tau; E ( Y ) ( A total - A * red ) &CenterDot; &tau; E ( X ) + t AM - 1 ] &CenterDot; t AM ( O total - O * red ) &CenterDot; &tau; E ( Y ) + E ( &Delta; ) ,
When operating system layer arrives the Probability p of spent condition o3, and the availability A of now two layers of software system 3for:
p O3=(1-p O1
A 3 = O total &CenterDot; &tau; E ( Y ) - [ O total &CenterDot; &tau; E ( Y ) ( A total - A * red ) &CenterDot; &tau; E ( X ) + t AM - 1 ] &CenterDot; t AM O total &CenterDot; &tau; E ( Y ) + E ( &Delta; &prime; ) ,
Wherein, t aM=: β δ '+(1-β) δ is the averaging time of a maintenance application layer,
3) the availability maximal value asking for two layers of software system is:
Availability=p O1·A 1+p O2·A 2+p O3·A 3
CN201510009756.7A 2015-01-09 2015-01-09 For the global optimization method based on maintenance cost of two layers of software aging phenomenon Expired - Fee Related CN104536894B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510009756.7A CN104536894B (en) 2015-01-09 2015-01-09 For the global optimization method based on maintenance cost of two layers of software aging phenomenon

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510009756.7A CN104536894B (en) 2015-01-09 2015-01-09 For the global optimization method based on maintenance cost of two layers of software aging phenomenon

Publications (2)

Publication Number Publication Date
CN104536894A true CN104536894A (en) 2015-04-22
CN104536894B CN104536894B (en) 2017-08-04

Family

ID=52852424

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510009756.7A Expired - Fee Related CN104536894B (en) 2015-01-09 2015-01-09 For the global optimization method based on maintenance cost of two layers of software aging phenomenon

Country Status (1)

Country Link
CN (1) CN104536894B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108595323A (en) * 2018-03-30 2018-09-28 华为技术有限公司 A kind of system detection method and relevant apparatus
CN111400199A (en) * 2020-06-05 2020-07-10 鹏城实验室 Software aging detection method and device and computer readable storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060130044A1 (en) * 2004-12-01 2006-06-15 Alberto Avritzer System and method for triggering software rejuvenation using a customer affecting performance metric
CN102385550A (en) * 2010-08-30 2012-03-21 北京理工大学 Detection method for software vulnerability
CN103383659A (en) * 2013-07-11 2013-11-06 哈尔滨工程大学 Software accelerating life test method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060130044A1 (en) * 2004-12-01 2006-06-15 Alberto Avritzer System and method for triggering software rejuvenation using a customer affecting performance metric
CN102385550A (en) * 2010-08-30 2012-03-21 北京理工大学 Detection method for software vulnerability
CN103383659A (en) * 2013-07-11 2013-11-06 哈尔滨工程大学 Software accelerating life test method

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
赵天海等: "基于软件老化累积损伤模型的应用服务器再生策略研究", 《系统仿真学报》 *
闫雪梅等: "软件老化过程建模、预测及软件再生策略研究", 《北京理工大学学报》 *
靳瑜亮: "软件老化的加速寿命测试研究", 《中国优秀硕士学位论文全文数据库信息科技辑》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108595323A (en) * 2018-03-30 2018-09-28 华为技术有限公司 A kind of system detection method and relevant apparatus
CN108595323B (en) * 2018-03-30 2021-08-03 华为技术有限公司 System testing method and related device
CN111400199A (en) * 2020-06-05 2020-07-10 鹏城实验室 Software aging detection method and device and computer readable storage medium
CN111400199B (en) * 2020-06-05 2020-11-03 鹏城实验室 Software aging detection method and device and computer readable storage medium

Also Published As

Publication number Publication date
CN104536894B (en) 2017-08-04

Similar Documents

Publication Publication Date Title
Kalidass et al. A queue with working breakdowns
Rainieri et al. Near real-time tracking of dynamic properties for standalone structural health monitoring systems
US11481495B2 (en) Anomalous behavior detection in processor based systems
EP2911060B1 (en) Method and device for determining resource leakage and for predicting resource usage state
US20180257663A1 (en) Method and apparatus for monitoring an on-vehicle controller
CN110675959A (en) Intelligent data analysis method and device, computer equipment and storage medium
US11115295B2 (en) Methods and systems for online monitoring using a variable data
US20180268264A1 (en) Detecting anomalous sensor data
CN101883017A (en) System and method for evaluating network safe state
US20200184373A1 (en) Recurrent Gaussian Mixture Model For Sensor State Estimation In Condition Monitoring
Zhu et al. Dynamic alarm prediction for critical alarms using a probabilistic model
CN104536894A (en) Global optimization method based on maintenance charge and for two-tier software aging phenomenon
Weng et al. A rejuvenation strategy in Android
CN103957229A (en) Active updating method, device and server for physical machines in IaaS cloud system
Liu et al. A divide and conquer approach to anomaly detection, localization and diagnosis
CN112463321B (en) Process concurrency number prediction method and device and process concurrency number control method and device
Zharikova et al. The plausible wildfire model in geoinformation decision support system for wildfire response
Jia et al. Using neural networks to forecast available system resources: an approach and empirical investigation
CN113742169A (en) Service monitoring and alarming method, device, equipment and storage medium
CN112132357A (en) Behavior prediction method, behavior prediction device, behavior prediction equipment and storage medium based on big data
Amo-Salas et al. Experimental designs for autoregressive models applied to industrial maintenance
Valipoori et al. Based technique for univariate alarm systems and its application to mixture distributions
Meng et al. A rejuvenation model for software system under normal attack
CN111586060B (en) State transition model-based mimicry defense architecture security quantification method and system
Zhao et al. Software maintenance optimization based on Stackelberg game methods

Legal Events

Date Code Title Description
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170804

CF01 Termination of patent right due to non-payment of annual fee