2005
DOI: 10.1007/11587552_19
|View full text |Cite
|
Sign up to set email alerts
|

I-RMI: Performance Isolation in Information Flow Applications

Abstract: Abstract. A problem with many distributed applications is their behavior in lieu of unpredictable variations in user request volumes or in available resources. This paper explores a performance isolation-based approach to creating robust distributed applications. For each application, the approach is to (1) understand the performance dependencies that pervade it and then (2) provide mechanisms for imposing constraints on the possible 'spread' of such dependencies through the application. Concrete results are a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
12
0

Year Published

2006
2006
2013
2013

Publication Types

Select...
3
2

Relationship

4
1

Authors

Journals

citations
Cited by 5 publications
(12 citation statements)
references
References 32 publications
(35 reference statements)
0
12
0
Order By: Relevance
“…For example, one of our collaborators, reported an occasional surge in the usage of resources connected to their Operational Information System (OIS) [15] that traced back to a particular uncommon message type. The resulting performance hit caused other subsystem's requests to build up, including those from the front ends used by clients, ultimately threatening operational failure (e.g., inappropriately long response times) or revenue loss (e.g., clients going to alternate sites).…”
Section: Handling Non-transient Faultsmentioning
confidence: 99%
“…For example, one of our collaborators, reported an occasional surge in the usage of resources connected to their Operational Information System (OIS) [15] that traced back to a particular uncommon message type. The resulting performance hit caused other subsystem's requests to build up, including those from the front ends used by clients, ultimately threatening operational failure (e.g., inappropriately long response times) or revenue loss (e.g., clients going to alternate sites).…”
Section: Handling Non-transient Faultsmentioning
confidence: 99%
“…Platform virtualization [1]and automated resource monitoring and management [2,3] are system-level contributions to this domain. Middleware developers have introduced new functionality like automated configuration management [4],improved operator interfaces like Tivoli's 'dashboards' [5],automated methods for performance understanding and display [6], and new methods for limiting the potential effects of failures [7,8]. Large efforts like IBM's Autonomic Computing and HP's Adaptive Enterprise initiativesare developing ways to automate complex management or configuration tasks,creating new management standards ranging from Common Base Events for representing monitoring information [3] to means for stating application-level policies or component requirements (e.g.…”
Section: Introductionmentioning
confidence: 99%
“…In earlier work, we identified and found ways to deal with a simple case observed by one of our industry partners, which concerned single requests, termed a 'poison message' that consistently caused unusual system and application responses [8]. In this paper, we tackle the more complex problem of sets or sequences of requests that cause such behaviors, and where such problems may depend on dynamic system conditions, such as which business rules are currently being run or to what current states they are being applied.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations