Memory leak analysis of mission-critical middleware
نویسندگان
چکیده
Memory leaks are recognized to be one of the major causes of memory exhaustion problems in complex software systems. This paper proposes a practical approach to detect aging phenomena caused by memory leaks in distributed objects Off-The-Shelf middleware, which are commonly used to develop critical applications. The approach, which is validated on a real-world case study from the Air Traffic Control domain, defines algorithms and ad-hoc support tools to perform data filtering and to find the best trade off between experimentation time and statistical accuracy of aging trend estimates. Experiments show that fixing memory leaks is not always the key to solve memory exhaustion problems.
منابع مشابه
JPAR – Isolating Java Heap to Protect Runtime of Middleware from Memory Leak
Memory leaks are among the most difficult Java application problems, which do various harm to Java middlewarebased system, including unpredictable behavior, low performance, and even crash of the whole system. The fatal crash of the whole system may have devastating impact to enterprise applications supported by the system. Traditional approaches to solving memory leak problem are to provide me...
متن کاملApplying Adaptive Real-time Middleware to Address Grand Challenges of COTS-based Mission-Critical Real-Time Systems
Commercial-off-the-shelf (COTS) middleware addresses many design forces for developing mission-critical distributed systems, including reducing development cost and cycle-time. However, meeting additional requirements for real-time quality of service (QoS) in these systems is currently beyond the state-of-the-art in available COTS middleware solutions. In this paper, we discuss key research cha...
متن کاملReconfiguration Service for Publish/Subscribe Middleware
Mission-critical, distributed systems are often designed as a set of distributed, components that interact using publish/subscribe middleware. Currently, in these systems, software components are usually statically allocated to the nodes to fulfil predictability, reliability requirements. However, a static allocation of components has major drawbacks, e.g. the need for quantification of the exp...
متن کاملIntrusion Tolerant Middleware
Increased reliance of applications on the software infrastructure to support distributed operations is creating new intrusion threats. In particular, there is a growing but largely unnoticed intrusion threat due to the emerging middleware technologies such as CORBA, WAP, XML support, enterprise application integrators, and Internet telephony middleware. The situation is grave because the emergi...
متن کاملMiddleware and Web Services for the Collaborative Information Portal of NASA's Mars Exploration Rovers Mission
We describe the design and deployment of the middleware for the Collaborative Information Portal (CIP), a mission critical J2EE application developed for NASA’s 2003 Mars Exploration Rover mission. CIP enabled mission personnel to access data and images sent back from Mars, staff and event schedules, broadcast messages and clocks displaying various Earth and Mars time zones. We developed the CI...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Journal of Systems and Software
دوره 83 شماره
صفحات -
تاریخ انتشار 2010