Optimization of two-granularity software rejuvenation policy based on the markov regenerative process

Loading...

Date

2016-12-01

Journal Title

Journal ISSN

Volume Title

Repository Usage Stats

113
views
281
downloads

Citation Stats

Abstract

© 1963-2012 IEEE. Software rejuvenation is a proactive software control technique that is used to improve a computing system performance when it suffers from software aging. In this paper, a two-granularity inspection-based software rejuvenation policy, which works as a closed-loop control technique, is proposed. This policy mitigates the negative impact of two-level software aging. The two levels considered are the user-level applications and the operating system. A Markov regenerative process model is constructed based on the system condition. We obtain the degradation rate of the application software and operating system from fault injection experiments. The diagnostic accuracy of the adopted monitor and analysis system, which is applied to inspect the application software and operating system, is considered as we provide the optimal rejuvenation strategies. Finally, the availability and the overall loss probability with their corresponding optimal inspection time intervals are obtained numerically based on the parameter values estimated from the experiments. Experimental results show that two-granularity software rejuvenation is much more effective than traditional single-level software rejuvenation. In our experi-mental study, when two-granularity software rejuvenation is used, the unavailability and the overall loss probability of the system were reduced by 17.9% and 2.65%, respectively, in comparison with the single-level rejuvenation.

Department

Description

Provenance

Subjects

Citation

Published Version (Please cite this version)

10.1109/TR.2016.2570539

Publication Info

Ning, G, J Zhao, Y Lou, J Alonso, R Matias, KS Trivedi, BB Yin, KY Cai, et al. (2016). Optimization of two-granularity software rejuvenation policy based on the markov regenerative process. IEEE Transactions on Reliability, 65(4). pp. 1630–1646. 10.1109/TR.2016.2570539 Retrieved from https://hdl.handle.net/10161/15574.

This is constructed from limited available data and may be imprecise. To cite this article, please review & use the official citation provided by the journal.


Unless otherwise indicated, scholarly articles published by Duke faculty members are made available here with a CC-BY-NC (Creative Commons Attribution Non-Commercial) license, as enabled by the Duke Open Access Policy. If you wish to use the materials in ways not already permitted under CC-BY-NC, please consult the copyright owner. Other materials are made available here through the author’s grant of a non-exclusive license to make their work openly accessible.