WELCOME. AUTONOMIC COMPUTING PRESENTED BY: NIKHIL P S7 IT ROLL NO: 33.

Slides:



Advertisements
Similar presentations
Tivoli Software from IBM Storage Resource Management Webcast
Advertisements

IBM SMB Software Group ® ibm.com/software/smb Maintain Hardware Platform Health An IT Services Management Infrastructure Solution.
Self-Managing Anycast Routing for DNS
Daniel Schall, Volker Höfner, Prof. Dr. Theo Härder TU Kaiserslautern.
KAIS T The Vision of Autonomic Computing Jeffrey O. Kephart, David M Chess IBM Watson research Center IEEE Computer, Jan 발표자 : 이승학.
Welcome to DEAS 2005 Design and Evolution of Autonomic Application Software David Garlan, CMU Marin Litoiu, IBM CAS Hausi A. Müller, UVic John Mylopoulos,
Presented by: Ehsan Kouroshfar. Outline Introduction Self-management Architectural Considerations Engineering challenges Scientific challenges Discussion.
Autonomic Systems Justin Moles, Winter 2006 Security in an Autonomic Computing Environment Paper by: D. M. Chess, C. C. Palmer S. R. White Presentation.
Fabián E. Bustamante, Winter 2006 Autonomic Computing The vision of autonomic computing, J. Kephart and D. Chess, IEEE Computer, Jan Also - A.G.
Introduction to Cyber Physical Systems Yuping Dong Sep. 21, 2009.
CLOUD COMPUTING AN OVERVIEW & QUALITY OF SERVICE Hamzeh Khazaei University of Manitoba Department of Computer Science Jan 28, 2010.
Yingping Huang and Gregory Madey University of Notre Dame A W S utonomic eb-based imulation Presented by Tariq M. King Published by the IEEE Computer Society.
A Game-theoretic Approach to the Design of Self-Protection and Self-Healing Mechanisms in Autonomic Computing Systems Birendra Mishra Anderson School of.
Objektorienteret Middleware Presentation 2: Distributed Systems – A brush up, and relations to Middleware, Heterogeneity & Transparency.
Effective Coordination of Multiple Intelligent Agents for Command and Control The Robotics Institute Carnegie Mellon University PI: Katia Sycara
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Autonomic Computing Shafay Shamail Malik Jahan Khan.
DB2 Universal Database February 27, 2003 | BTW 2003 © 2003 IBM Corporation Automatic Database Configuration for DB2 Universal Database Compressing Years.
23/03/2007 mail-to: site: A Security Framework for Smart Ubiquitous.
Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., All rights reserved. Chapter 8: Autonomic computing.
(Slides are taken from the presentations by Alan Ganek, Alfred Spector, Jeff Kephart of IBM)
1 FM Overview of Adaptation. 2 FM RAPIDware: Component-Based Design of Adaptive and Dependable Middleware Project Investigators: Philip McKinley, Kurt.
Distributed System Concepts and Architectures Summary By Srujana Gorge.
Community Manager A Dynamic Collaboration Solution on Heterogeneous Environment Hyeonsook Kim  2006 CUS. All rights reserved.
Intrusion Detection System Marmagna Desai [ 520 Presentation]
H-1 Network Management Network management is the process of controlling a complex data network to maximize its efficiency and productivity The overall.
Trends & Challenges Systems Supporting M-Commerce Nour El Kadri University of Ottawa.
The big Data security Analytics Era Is Here Reporter : Ximeng Liu Supervisor: Rongxing Lu School of EEE, NTU
Rainbow Facilitating Restorative Functionality Within Distributed Autonomic Systems Philip Miseldine, Prof. Taleb-Bendiab Liverpool John Moores University.
1 Autonomic Computing An Introduction Guenter Kickinger.
An Approach to Test Autonomic Containers Ronald Stevens (IEEE Computer Society & ACM Student Member) August 1, 2006 REU Sponsored by NSF.
Introduction and Overview Questions answered in this lecture: What is an operating system? How have operating systems evolved? Why study operating systems?
Automating service management Tiina Niklander Faculty of Science Department of Computer Science In AMICT 2008 Petrozavodsk, May 2008.
Virtualization for Storage Efficiency and Centralized Management Genevieve Sullivan Hewlett-Packard
Distributed Systems: Concepts and Design Chapter 1 Pages
SelfCon Foil no 1 Design of Self-Adaptive Systems Course introduction 2013 Rolv Bræk, ITEM.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
A Self-Manageable Infrastructure for Supporting Web-based Simulations Yingping Huang Xiaorong Xiang Gregory Madey Computer Science & Engineering University.
The Grid System Design Liu Xiangrui Beijing Institute of Technology.
Responding to the Unexpected Yigal Arens Paul Rosenbloom Information Sciences Institute University of Southern California.
Security in autonomic communication Shuping Liu Networking Lab HUT.
Middleware for Grid Computing and the relationship to Middleware at large ECE 1770 : Middleware Systems By: Sepehr (Sep) Seyedi Date: Thurs. January 23,
Introduction Infrastructure for pervasive computing has many challenges: 1)pervasive computing is a large aspect which includes hardware side (mobile phones,portable.
1 Computing Challenges for the Square Kilometre Array Mathai Joseph & Harrick Vin Tata Research Development & Design Centre Pune, India CHEP Mumbai 16.
Basic Concepts of Component- Based Software Development (CBSD) Model-Based Programming and Verification.
THE VISION OF AUTONOMIC COMPUTING. WHAT IS AUTONOMIC COMPUTING ? “ Autonomic Computing refers to computing infrastructure that adapts (automatically)
A Self-Configuring Test Harness for Web Applications Jairo Pava School of Computing and Information Sciences Florida International University Courtney.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
The Vision of Autonomic Computing Self-Management Unit 7-2 Managing the Digital Enterprise Kephart, and Chess.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Autonomic Service Architecture Presented by: Ramy Farha June 24 th 2005.
1 Architecture and Behavioral Model for Future Cognitive Heterogeneous Networks Advisor: Wei-Yeh Chen Student: Long-Chong Hung G. Chen, Y. Zhang, M. Song,
CS4315A. Berrached:CMS:UHD1 Introduction to Operating Systems Chapter 1.
Leveraging SDN for The 5G Networks: Trends, Prospects and Challenges ADVISOR: 林甫俊教授 Presenter: Jimmy DATE: 2016/3/21 1.
Enterprise Security Management Franklin Tinsley COSC 481.
AUTONOMIC COMPUTING B.Akhila Priya 06211A0504. Present-day IT environments are complex, heterogeneous in terms of software and hardware from multiple.
Database Principles: Fundamentals of Design, Implementation, and Management Chapter 1 The Database Approach.
Introduction to Machine Learning, its potential usage in network area,
Information and documentation media systems.
Detection and Analysis of Threats to the Energy Sector (DATES)
Introduction.
Transforming IT Management
Research Challenges of Autonomic Computing
ASPECT ORIENTATED PROGRAMMING RESEARCH
The Vision of Autonomic Computing
Interdisciplinary Program in Cognitive Science Lee, Jung-Woo
Jigar.B.Katariya (08291A0531) E.Mahesh (08291A0542)
Topic:- Autonomic Computing Presented By :- Neera Gupta
Capitalize on Your Business’s Technology
Presentation transcript:

WELCOME

AUTONOMIC COMPUTING PRESENTED BY: NIKHIL P S7 IT ROLL NO: 33

 Motivation  Introduction  Why Autonomic Computing  Characteristics  Architecture  Application  Challenges  Conclusion OVERVIEW

 Present day IT environments are complex, heterogeneous in terms of software & hardware from multiple vendors.  Computing systems have evolved into millions of interconnected devices whose interactions create complex web on increasingly complex architecture. MOTIVATION

Present day IT environment

Complexity of Information Technology

 It is a term coined by IBM.  Principle similar to autonomic nervous system.  Its main aim is to make computer system more self managing and elastic, removing obstacles to growth and flexiblity.  Helps to address complexity by using technology to manage technology INTRODUCTION

 “Civilization advances by extending the number of important operations which we can perform without thinking about them”- ALFRED NORTH WHITEHEAD  This quote made by the preeminent mathematician Alfred Whitehead holds both the lock and the key to the next era of computing.  The high-tech industry has spent decades creating computer systems with ever- mounting degrees of complexity to solve a wide variety of business problems. WHY AUTONOMIC COMPUTING

 Ironically, complexity itself has become part of the problem. It’s a problem that's not going away, but will grow exponentially, just as our dependence on technology has  To overcome this problem IBM suggested a solution: build computer systems that regulate themselves much in the same way as our autonomous nervous systems regulates and protects our bodies.  This new model of computing is called autonomic computing CONTD…..

“Intelligent” systems that:  Manage complexity  Know themselves  Continuously tune themselves  Adapt to unpredictable conditions  Prevent and recover from failures  Provide a safe environment The vision for Autonomic Computing

CHARACTERISTICS

Self-managing systems that deliver Increased Responsiveness Adapt to dynamically changing environments Operational Efficiency Tune resources and balance workloads to maximize use of IT resources Business Resiliency Discover, diagnose, and act to prevent disruptions Secure Information and Resources Anticipate, detect, identify, and protect against attacks

SELF-CONFIGURATION Adapt automatically to the dynamically changing environment  Internal adaptation – Add/remove new components – configures itself on the fly  External adaptation -Systems configure themselves into a global infrastructure

SELF-HEALING Discover, diagnose and react to disruptions without disrupting the service environment  Fault components should be – detected – Isolated – Fixed – reintegrated

SELF-OPTIMIZATION Monitor and tune resources automatically – Support operating in unpredictable environment – Efficiently maximization of resource utilization without human intervention Dynamic resource allocation and workload management. – Resource: Storage, databases,networks – For example, Dynamic server clustering

SELF-PROTECTION Anticipate, detect, identify and protect against attacks from anywhere – Defining and managing user access to all computing resources – Protecting against unauthorized resource access, e.g. SSL – Detecting intrusions and Reporting as they occur

 Self-aware System is aware of its internal state.  Context-aware System is aware of its execution environment.  Open System is able to operate in an heterogeneous environment.  Anticipatory System is able to anticipate the optimized resources needed. And also

LEVELS OF AUTONOMIC MATURITY

 B ASIC : IT professionals manage everything by hand.  M ANAGED : Data are collected from the system (via sensors) and selected. The time is reduced.  P REDICTIVE : Recognition of patterns and suggestion of a solution, the decision is made still by human. CONTD…

 A DAPTIVE : The system makes and applies the solutions. IT staff provides policies used for plans and monitors system’s actions.  A UTONOMIC : Integrated IT components are collectively and dynamically managed by business rules and policies. CONTD…

ARCHITECTURE  Autonomic element is the fundamental atom of the architecture  It consist of two parts Managed Element Autonomic Manager  Consist of one or more managed elements coupled with a single autonomic manager

 A Managed Element can be: Hardware resource, CPU, database, Application service, etc.  The components and functions of a single autonomic manager often referred to as the "MAPE loop" for Monitor, Analyze, Plan, and Execute, supplemented by a Knowledge base. CONTD..

Core building blocks for an open architecture Management using MAPE: – Monitoring managed elements and their external environment – Analyzing the gathered information – Planning and executing based on information

MONITOR  An autonomic manager monitors instrumentation data from multiple sensors in a system.  The sensors "sense" various aspects of the state of the monitored computing system.  This can include aspects of the hardware instrumentation, ambient information,and aspects of the software components CONTD…

ANALYZE  This component of the autonomic manager contains the intelligence required to interpret and correlate the above mentioned instrumentation data.  This component usually has the ability to consult historical data and to compare them with current state to detect significant changes. CONTD…

PLAN  Once an analysis report of the situation is completed, the planning component can define a series of control actions that should bring the system to a normal operating range. EXECUTE  This component receives the series of action steps from the planning component, and puts the plan into action.  It activates appropriate control points, or effectors, on the managed platform following the proper sequence and timing CONTD…

 K NOWLEDGE BASE This serves as a repository of knowledge, such as historical data and policies, which can be utilized by the other components in their operation. CONTD…

 E−Sourcing  Problem determination  Complex analysis  Autonomic management APPLICATIONS

 Autonomic System challenges  – Self-configuration in large-scale application  – Problem localization and automated remediation  – Decision making of coordination of optimizing process  – Self-protecting against active threats specific types of threats  −Needs for a abstraction and co-operation in relevant fields CHALLENGES

Autonomic computing is:  Solution of today’s increasing complexity in computing science.  Self-Management and dynamic adaptive behaviors “The new economics requires that systems be autonomic: autoinstalling, automanaging, autohealing, and autoprogramming.” CONCLUSION

   REFERENCES

THANK U… QUERIES…???