Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Non-intrusive end-to-end runtime path tracing for J2EE systems

Non-intrusive end-to-end runtime path tracing for J2EE systems

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IEE Proceedings - Software — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

An end-to-end runtime path-tracing approach for J2EE systems has been introduced. The approach is non-intrusive and thus does not require instrumentation of middleware or application source code. The implementation of the system has been realised in the COMPAS Java end-to-end monitoring tool that extends and integrates a number of open source projects. The first set of results shows the performance overhead associated with the tool. Further results show the portability of this approach, by applying it to a number of different application server implementations. Finally, it is also shown that runtime paths collected by the implementation can be used for reasoning about the overall system structure and design of complex enterprise applications.

References

    1. 1)
      • Mos, A.: `A framework for adaptive monitoring and performance management of component-based enterprise applications', 2004, PhD, Dublin City University, Ireland.
    2. 2)
      • http://compas.sourceforge.net/, accessed June 2006.
    3. 3)
      • http://swig.stanford.edu/pinpoint.shtml, accessed June 2006.
    4. 4)
      • Agrawal, R., Imielinski, T., Swami, A.N.: `Mining association rules between sets of items in large databases', Proc. ACM SIGMOD Int. Conf. on Management of Data, 1993, Washington, DC, USA, p. 207–216.
    5. 5)
      • A.K. Jain , M.N. Murty , P.J. Flynn . Data clustering: a review. ACM Comput. Surv. , 3 , 264 - 323
    6. 6)
      • Mos, A., Murphy, J.: `Performance management in component-oriented systems using a model driven architecture approach', Proc. 6th IEEE Int. Enterprise Distributed Object Computing Conf., September 2002, Lausanne, Switzerland.
    7. 7)
      • http://www.javaworld.com/javaworld/jw-03-2003/jw-0328-servlet.html, accessed June 2006.
    8. 8)
      • Mos, A., Murphy, J.: `COMPAS: adaptive performance monitoring of component-based systems', Proc. Workshop on Remote Analysis and Measurement of Software Systems at 26th Int. Conf. on Software Engineering, May 2004, Edinburgh, Scotland.
    9. 9)
      • D. Alur , J. Crupi , D. Malks . (2001) Core J2EE Patterns: best practices and design strategies.
    10. 10)
      • Larus, J.R.: `Whole program paths', ACM SIGPLAN Conf. on Programming Language Design and Implementation, May 1999, Atlanta, GA, USA, p. 259–269.
    11. 11)
      • Cecchet, E., Marguerite, J., Zwaenepoel, W.: `Performance and scalability of EJB applications', Proc. 17th ACM SIGPLAN Conf. on Object-Oriented Programming, Systems, Languages, and Applications, 2002, Seattle, Washington, USA, p. 246–261.
    12. 12)
      • E. Gamma , R. Helm , R. Johnson , J.M. Vlissides . (1994) Design patterns: elements of reusable object-oriented software.
    13. 13)
    14. 14)
      • Parsons, T.: `A framework for detecting performance design and deployment antipatterns in component based enterprise systems', Proc. 2nd Int. Middleware Doctoral Symp., 2005, Grenoble, France, ACM Press, art. no. 7.
    15. 15)
      • Chen, M., Kiciman, E., Fratkin, E., Fox, A., Brewer, E.: `Pinpoint: problem determination in large, dynamic, internet services', Proc. Int. Conf. on Dependable Systems and Networks (IPDS Track), June 2002, Washington, DC.
    16. 16)
      • http://www.jboss.org, accessed June 2006.
    17. 17)
      • http://java.sun.com/j2se/1.5.0/docs/guide/jvmti/jvmti.html, accessed June 2006.
    18. 18)
      • http://java.sun.com/j2ee/, accessed June 2006.
    19. 19)
      • C. Szyperski . (2003) Component software: beyond object-oriented programming.
    20. 20)
      • http://www.p6spy.com/, accessed June 2006.
    21. 21)
      • http://java.sun.com/j2se/1.4.2/docs/guide/jvmpi/jvmpi.html, accessed June 2006.
    22. 22)
      • Kamin, S., Hyatt, D.: `A special purpose language for picture drawing', Proc. Conf. of Domain Specific Languages, 1997, Santa Barbara, CA, USA.
    23. 23)
      • http://www.omg.org/technology/documents/, accessed June 2006.
    24. 24)
      • P. Kovari , D.D. Cerecedo , F.C.H. Fernandes , D. Hassan , K. Kawamura , D. Leigh , N. Lin , D. Masicand , G. Wadley , X. Peter . (2003) WebSphere application server enterprise V5 and programming model extensions WebSphere handbook series.
    25. 25)
      • M.K. Agarwal , M. Gupta , G. Kar , A. Neogi , A. Sailer . Mining activity data for dynamic dependency discovery in e-business systems. eTrans. Netw. Serv. Manag. , 2 , 49 - 58
    26. 26)
      • http://java.sun.com/j2ee/connector/, accessed June 2006.
    27. 27)
      • Barham, P., Donnelly, A., Isaacs, R., Mortier, R.: `Using Magpie for request extraction and workload modelling', Symp. on Operating Systems Design and Implementation, December 2004, San Francisco, CA, USA, p. 259–272.
    28. 28)
      • http://java.sun.com/products/servlet/, accessed June 2006.
    29. 29)
      • Buble, A., Bulej, L., Tuma, P.: `CORBA benchmarking: a course with hidden obstacles', Proc. IPDPS Workshop on Performance Modeling, Evaluation and Optimization of Parallel and Distributed Systems, 2003, Nice, France.
    30. 30)
      • M. Kunnumpurath . (2003) JBoss administration and development Third Edition (3.2.x Series).
    31. 31)
      • Gorton, I., Zhu, L.: `Tool support for just-in-time architecture reconstruction and evaluation: an experience report', Proc. 27th Int. Conf. on Software Engineering, 2005, Missouri, USA, St. Louis.
    32. 32)
      • D. Hand , H. Mannila , P. Smyth . (2001) Principles of data mining.
    33. 33)
      • Parsons, T., Murphy, J.: `A framework for automatically detecting and assessing performance antipatterns in component based systems using runtime analysis', 9thInternational Workshop on Component Oriented Programming, part of ECOOP, 2004, Oslo, Norway.
    34. 34)
      • http://www.quest.com/performasure/, accessed June 2006.
    35. 35)
      • http://java.sun.com/j2se/1.4.2/docs/guide/rmi/, acceessed June 2006.
    36. 36)
      • Chen, M., Kiciman, E., Accardi, A., Fox, A., Brewer, E.: `Using runtime paths for macro analysis', Proc. 9th Workshop on Hot Topics in Operating Systems, May 2003, Lihue, HI, USA.
    37. 37)
      • B. Tate , M. Clarke , B. Lee , P. Linskey . (2003) Bitter EJB.
    38. 38)
      • http://java.sun.com/products/jdbc/, accessed June 2006.
    39. 39)
      • http://java.sun.com/products/ejb/docs.html, accessed June 2006.
    40. 40)
      • J.E. Keogh . (2000) J2EE the complete reference.
    41. 41)
      • T. Parsons , J. Murphy . The 2nd International Middleware Doctoral Symposium: Detecting Performance Antipatterns in Component-Based Enterprise Systems. IEEE Distrib. Syst. Online , 3
    42. 42)
      • Gschwind, T., Eshghi, K., Garg, P.K., Wurster, K.: `WebMon: a performance profiler for web transactions', Proc. 4th IEEE Int. Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems, June 2002, Newport Beach, California, USA.
    43. 43)
      • http://java.sun.com/products/servlet/download.html, accessed June 2006.
http://iet.metastore.ingenta.com/content/journals/10.1049/ip-sen_20050069
Loading

Related content

content/journals/10.1049/ip-sen_20050069
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address