|Table of Contents|

[1] Zhao Guosheng, Wang Huiqiang, Wang Jian, et al. Emergency algorithm for enhanced survivability of key service [J]. Journal of Southeast University (English Edition), 2007, 23 (3): 443-446. [doi:10.3969/j.issn.1003-7985.2007.03.029]
Copy

Emergency algorithm for enhanced survivability of key service()
一种增强关键服务可生存性的应急算法
Share:

Journal of Southeast University (English Edition)[ISSN:1003-7985/CN:32-1325/N]

Volumn:
23
Issue:
2007 3
Page:
443-446
Research Field:
Computer Science and Engineering
Publishing date:
2007-09-30

Info

Title:
Emergency algorithm for enhanced survivability of key service
一种增强关键服务可生存性的应急算法
Author(s):
Zhao Guosheng1 2 Wang Huiqiang1 Wang Jian1
1College of Computer Science and Technology, Harbin Engineering University, Harbin 150001, China
2Center of Network and Information, Harbin Normal University, Harbin 150001, China
赵国生1 2 王慧强1 王健1
1哈尔滨工程大学计算机科学与技术学院, 哈尔滨 150001; 2哈尔滨师范大学网络中心, 哈尔滨 150001
Keywords:
emergency response survivability key service confidence interval
应急响应 生存性 关键服务 置信区间
PACS:
TP393.08
DOI:
10.3969/j.issn.1003-7985.2007.03.029
Abstract:
To work out a solution for answering the question when it is suitable for emergency response strategies to be executed, an emergency algorithm for enhanced survivability of a key service is presented.First, based on the central limit theorem and the hypothesis testing theory, the confidence interval of each key service’s history average service response time in the host server and the spare server can be figured out, respectively. This can also be updated dynamically by a proposed method using the method of time slide window.Then, according to the five kinds of distributed situations of the current service response time’s confidence interval in the host server and the spare server, the proposed algorithm can dynamically choose the appropriate emergency policies such as resource reconfiguration, service degradation or service drifting, etc.in right time. Thus, the key service request can be finished within its expected deadline by users as far as possible.Furthermore, the whole process of dynamic configuration is transparent to users.Finally, simulation tests are performed to prove the feasibility.
为了解决“何时对应急服务进行响应是合适的?”这一问题, 提出了一种增强关键服务可生存性的应急算法.首先, 基于中心极限定理和假设检验理论, 分别计算求得各关键服务在主、备服务器上的历史平均服务响应时间的置信区间, 并且提出了一种基于时间滑动窗口的置信区间动态更新的方法;然后, 根据主、备服务器上服务响应时间置信区间的5种分布情况, 提出的算法可以为应急服务在不同的时间响应区选择合适的应急策略, 如资源重配、服务降级或者服务迁移等, 以此保证关键服务请求能够在用户期望的服务截止期内完成, 且整个配置过程对用户透明.最后, 仿真试验表明了该算法的可行性.

References:

[1] Westmark V R.A definition for information system survivability [C]//Proc of the 37th International Conference on System Sciences.Washington, DC:IEEE Computer Society Press, 2004:2086-2096.
[2] Ellison R J, Fisher D A, Linger R C, et al.Survivable network systems:an emerging discipline[R].Software Engineering Institute of Carnegie Mellon University, 1997.
[3] Linger R C, Mead N R, Lipson H F.Requirements definition for survivable network systems [C]//Proc of the Third International Conference on Requirements Engineering.Los Alamitos, CA, USA, 1998:14-23.
[4] Richard C L, Howard F L, John M, et al.Life-cycle models for survivable systems, CMU/SEI-2002-ESC-TR-026[R].Boston:Carnegie Mellon University, 2002.
[5] Zinky J A, Bakken D E, Schantz R.Architectural support for quality of service for CORBA objects [J].Theory and Practice of Object Systems, 1997, 3(1):55-73.
[6] Liu Peng.Architectures for intrusion tolerant database systems [C]//Proc of the Foundations of Intrusion Tolerant Systems (OASIS’03).Las Vegas, Nevada, 2003:3-13.
[7] Wang F, Gong F, Jou F, et al.SITAR:a scalable intrusion tolerance architecture for distributed services[C]//Proc of the 2001 IEEE Workshop on Information Assurance and Security.New York:IEEE Press, 2001:38-45.
[8] Knight J C, Heimbigner D, Wolf A, et al.The willow architecture:comprehensive survivability for large-scale distributed applications [C]//Proc of the International Conference on Dependable Systems and Networks.New York:IEEE Press, 2002:54-74.
[9] Tally G, Whitmore B, Sames D.Intrusion tolerant distributed object systems:project summary[C]//Proc of the DARPA Information Survivability Conference and Exposition.Washington, DC:IEEE Computer Society Press, 2003:149-151.

Memo

Memo:
Biographies: Zhao Guosheng(1977—), male, graduate;Wang Huiqiang(corresponding author), male, doctor, professor, wanghuiqiang@hrbeu.edu.cn.
Last Update: 2007-09-20