• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Xu Jian, Zhang Kun, Liu Fengyu, Xu Manwu. An Approach to Immunity-Based Performance Monitoring and Evaluation for Computing Systems[J]. Journal of Computer Research and Development, 2007, 44(3).
Citation: Xu Jian, Zhang Kun, Liu Fengyu, Xu Manwu. An Approach to Immunity-Based Performance Monitoring and Evaluation for Computing Systems[J]. Journal of Computer Research and Development, 2007, 44(3).

An Approach to Immunity-Based Performance Monitoring and Evaluation for Computing Systems

More Information
  • Published Date: March 14, 2007
  • Simulating biological immune mechanism to implement performance monitoring and evaluation of computing systems is a new research approach for the distributed high performance computing environment. First, to simulate the biological immune mechanisms, the immune process's characteristics and computing system's rejuvenation are analyzed and compared. Second, to monitor and diagnose performance degradation, the logical and mathematical models of system rejuvenation are set up, which use an extension of the standard?proc performance interface offered by Linux systems to collect resource information form both local and remote hosts, then the principle of self-nonself discrimination inspired by immunology to diagnose system performance. On the basis of both the logical and mathematical model, an application regarding audio-video resource transaction process system as background is studied, a two-stage hyper-exponential model is proposed to evaluate system performance, and the effect imposed by a performance monitoring agent is evaluated. The results of experiments and case study indicate that this method is effective and feasible to monitor and evaluate the performance of a distributed computing system.
  • Related Articles

    [1]Fang Dongliang, Liu Puzhuo, Qin Chuan, Song Zhanwei, Sun Yuyan, Shi Zhiqiang, Sun Limin. Survey of Protocol Security of Industrial Control System[J]. Journal of Computer Research and Development, 2022, 59(5): 978-993. DOI: 10.7544/issn1000-1239.20211132
    [2]He Kewen, Zhang Jiachen, Liu Xiaoguang, Wang Gang. Fingerprint Search Optimization for Deduplication on Emerging Storage Devices[J]. Journal of Computer Research and Development, 2020, 57(2): 269-280. DOI: 10.7544/issn1000-1239.2020.20190543
    [3]Zeng Gaoxiong, Hu Shuihai, Zhang Junxue, Chen Kai. Transport Protocols for Data Center Networks: A Survey[J]. Journal of Computer Research and Development, 2020, 57(1): 74-84. DOI: 10.7544/issn1000-1239.2020.20190519
    [4]Yan Fang, Li Yuanzhang, Zhang Quanxin, Tan Yu’an. Object-Based Data De-Duplication Method for OpenXML Compound Files[J]. Journal of Computer Research and Development, 2015, 52(7): 1546-1557. DOI: 10.7544/issn1000-1239.2015.20140093
    [5]Cao Jian, Wang Xingwei, Zhang Jinhong, Huang Min. A Data Driven Cognitive Routing Protocol for Information-Centric Networking[J]. Journal of Computer Research and Development, 2015, 52(4): 798-805. DOI: 10.7544/issn1000-1239.2015.20148404
    [6]Li Chao, Wang Shupeng, Yun Xiaochun, Zhou Xiaoyang, Chen Ming. A Reading Performance Improvement Method in Deduplication Based on Pipeline[J]. Journal of Computer Research and Development, 2013, 50(1): 90-100.
    [7]Zong Ming, Wang Xiaodong, and Zhou Xingming. Cost-Optimizing Adaptive Location Service Protocol in MANET[J]. Journal of Computer Research and Development, 2012, 49(12): 2515-2528.
    [8]Fu Yinjin, Xiao Nong, and Liu Fang. Research and Development on Key Techniques of Data Deduplication[J]. Journal of Computer Research and Development, 2012, 49(1): 12-20.
    [9]Jin Hai, Luo Fei, Zhang Qin, and Zhang Hao. An Efficient Data Transfer Protocol for P2P-Based High Performance Computing[J]. Journal of Computer Research and Development, 2006, 43(9): 1543-1549.
    [10]Liu Yi, Pang Liaojun, and Wang Yumin. An Optimistic Payment Protocol Based on Mobile Agents[J]. Journal of Computer Research and Development, 2005, 42(10): 1686-1691.

Catalog

    Article views (323) PDF downloads (437) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return