A view of monitoring and tracing techniques and their application to service-based environments

被引:0
作者
Pirzadeh H. [1 ]
Hamou-Lhadj A. [1 ]
机构
[1] Department of Electrical and Computer Engineering, Concordia University, Montréal, QC
来源
Smart Innovation, Systems and Technologies | 2010年 / 2卷
关键词
Distributed systems; Monitoring and tracing techniques; Service-based applications; Software modernization and comprehension;
D O I
10.1007/978-3-642-13355-8_4
中图分类号
学科分类号
摘要
Software systems are perhaps today's most complex engineering systems due to the ever evolving technologies they employ. Understanding how these systems are built and why they are built this way calls for advanced tools and techniques that go beyond mere analysis of the source code as it is the case of most existing software comprehension and modernization approaches. In this paper, we argue that the complex behavior embedded in most distributed, multitier, and service-based software systems can benefit significantly from applying dynamic analysis approaches such as the ones based on monitoring and tracing techniques. The main advantage of these techniques is that they constitute a natural fit with the distributed paradigm that is the main mechanism of such applications. In this paper, we present several monitoring and tracing techniques, and compare them based on their advantages and disadvantages. We then discuss how these techniques can be used to understand serviced-based applications, with the ultimate objective being to uncover the key challenges that need to be addressed. © Springer-Verlag Berlin Heidelberg 2010.
引用
收藏
页码:49 / 62
页数:13
相关论文
共 43 条
  • [1] Department of Defense Trusted Computer System Evaluation Criteria, (1985)
  • [2] Technical paper, Compuware Corporation, (1999)
  • [3] Agarwala S., Schwan K., SysProf: Online Distributed Behavior Diagnosis through Finegrain System Monitoring, 26th International Conference On Distributed Computing Systems (ICDCS)
  • [4] Ball T., The Concept of Dynamic Analysis, LNCS, pp. 216-234, (1999)
  • [5] Bauer L., Ligatti J., Walker D., Composing security policies with polymer, Proceedings of the 2005 ACM SIGPLAN Conference On Programming Language Design and Implementation, pp. 305-314, (2005)
  • [6] Bocker H.D., Fischer G., Nieper H., The enhancement of understanding through visual representations, SIGCHI Bull, 17, 4, pp. 44-50, (1986)
  • [7] Calingaert P., System performance evaluation: Survey and appraisal, Communications of the ACM, 10, 1, pp. 12-18, (1967)
  • [8] Calvez J., Pasquier O., Performance Monitoring and Assessment of Embedded HW/SW Systems, Design Automation For Embedded Systems, 3, 1, pp. 5-22, (1998)
  • [9] de Pauw W., Jensen E., Mitchell N., Sevitsky G., Vlissides J., Yang J., Visualizing the Execution of Java Programs, Software Visualization, pp. 151-162, (2002)
  • [10] de Pauw W., Lorenz D., Vlissides J., Wegman M., Execution Patterns In ObjectOriented Visualization