June 13-15, 2007Policy 2007 Infrastructure-aware Autonomic Manager for Change Management H. Abdel SalamK. Maly R. MukkamalaM. Zubair Department of Computer.

Slides:



Advertisements
Similar presentations
OPTIRAIL WORKSHOP · OCTOBER 23, 2014 · BRUSSELS WP5: “Integration and Usability validation of models”
Advertisements

1 Chapter 2 Database Environment Transparencies © Pearson Education Limited 1995, 2005.
Tools and Services for the Long Term Preservation and Access of Digital Archives Joseph JaJa, Mike Smorul, and Sangchul Song Institute for Advanced Computer.
7.2 System Development Life Cycle (SDLC)
Chapter 2 Database Environment Pearson Education © 2014.
Chapter 9: Moving to Design
8 Systems Analysis and Design in a Changing World, Fifth Edition.
Distributed Collaborations Using Network Mobile Agents Anand Tripathi, Tanvir Ahmed, Vineet Kakani and Shremattie Jaman Department of computer science.
1 A Student Guide to Object- Orientated Development Chapter 9 Design.
Lecture Two Database Environment Based on Chapter Two of this book:
Introduction to Systems Analysis and Design
Architectural Design Establishing the overall structure of a software system Objectives To introduce architectural design and to discuss its importance.
Business process management (BPM) Petra Popovičová.
TIBCO Designer TIBCO BusinessWorks is a scalable, extensible, and easy to use integration platform that allows you to develop, deploy, and run integration.
Introduction to Databases Transparencies 1. ©Pearson Education 2009 Objectives Common uses of database systems. Meaning of the term database. Meaning.
Architectural Design.
This chapter is extracted from Sommerville’s slides. Text book chapter
Database Environment 1.  Purpose of three-level database architecture.  Contents of external, conceptual, and internal levels.  Purpose of external/conceptual.
● Problem statement ● Proposed solution ● Proposed product ● Product Features ● Web Service ● Delegation ● Revocation ● Report Generation ● XACML 3.0.
OpenFlow-Based Server Load Balancing GoneWild Author : Richard Wang, Dana Butnariu, Jennifer Rexford Publisher : Hot-ICE'11 Proceedings of the 11th USENIX.
Methodology and Tools for End-to-End SOA Configurations By: Fumiko satoh, Yuichi nakamura, Nirmal K. Mukhi, Michiaki Tatsubori, Kouichi ono.
1 A Flexible and Secure Deployment Framework for Distributed Applications Alan Dearle, Graham Kirby, Andrew McCarthy and Juan Carlos Diaz y Carballo School.
 Cloud computing  Workflow  Workflow lifecycle  Workflow design  Workflow tools : xcp, eucalyptus, open nebula.
1 Dr. Markus Hillenbrand, ICSY Lab, University of Kaiserslautern, Germany A Generic Database Web Service for the Venice Service Grid Michael Koch, Markus.
Enabling Workflow in UPnP Networks Andreas BobekUniversity of Rostock Faculty of Computer Science and Electrical Engineering Andreas Bobek, Hendrik Bohn,
Computing on the Cloud Jason Detchevery March 4 th 2009.
Project Title : CyberGIS Project Members : M.S.R Perera D.S Kulasuriya W.M.D Jeewantha Project Title : CyberGIS Project Members : M.S.R Perera D.S Kulasuriya.
Active Monitoring in GRID environments using Mobile Agent technology Orazio Tomarchio Andrea Calvagna Dipartimento di Ingegneria Informatica e delle Telecomunicazioni.
 To explain the importance of software configuration management (CM)  To describe key CM activities namely CM planning, change management, version management.
Cluster Reliability Project ISIS Vanderbilt University.
Configuration Management (CM)
Object Management Group (OMG) Specifies open standards for every aspect of distributed computing Multiplatform Model Driven Architecture (MDA)
Sep 15-19, 2008EDOC 2008 Scheduling-capable Autonomic Manager for Policy-based IT Change Management System H. AbdelSalamK. Maly R. MukkamalaM. Zubair Department.
21/05/2010 AU DEPARTMENT OF COMPUTER SCIENCE FACULTY OF SCIENCE AARHUS UNIVERSITY TATIONpRESEN The homeport system Jeppe Brønsted, Post Doc, Phd Aarhus.
1 Advanced Software Architecture Muhammad Bilal Bashir PhD Scholar (Computer Science) Mohammad Ali Jinnah University.
Software Engineering Prof. Ing. Ivo Vondrak, CSc. Dept. of Computer Science Technical University of Ostrava
Access Control and Markup Languages Pages 183 – 187 in the CISSP 1.
Introduction Infrastructure for pervasive computing has many challenges: 1)pervasive computing is a large aspect which includes hardware side (mobile phones,portable.
Freelib: A Self-sustainable Digital Library for Education Community Ashraf Amrou, Kurt Maly, Mohammad Zubair Computer Science Dept., Old Dominion University.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
Bayu Adhi Tama, M.T.I 1 © Pearson Education Limited 1995, 2005.
I Copyright © 2007, Oracle. All rights reserved. Module i: Siebel 8.0 Essentials Training Siebel 8.0 Essentials.
Microsoft Management Seminar Series SMS 2003 Change Management.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 1 Automate your way to.
Slide 1 Service-centric Software Engineering. Slide 2 Objectives To explain the notion of a reusable service, based on web service standards, that provides.
1 Chapter 12 Configuration management This chapter is extracted from Sommerville’s slides. Text book chapter 29 1.
Chapter 2 Database Environment.
From Use Cases to Implementation 1. Structural and Behavioral Aspects of Collaborations  Two aspects of Collaborations Structural – specifies the static.
May 7-8, 2007ICVCI 2007 RTP Autonomic Approach to IT Infrastructure Management in a Virtual Computing Lab Environment H. Abdel SalamK. Maly R. MukkamalaM.
Comparison of The Workflow Management Systems Bizagi, ProcessMaker, and Joget Mohamed Zeinelabdeen Abdelgader [1], Omer Salih Dawood [2], Mohamed Elhafiz.
From Use Cases to Implementation 1. Mapping Requirements Directly to Design and Code  For many, if not most, of our requirements it is relatively easy.
Systems Analysis and Design in a Changing World, Fifth Edition
REV 00 Chapter 2 Database Environment DDC DATABASE SYSTEM.
Business process management (BPM)
Chapter 8 Environments, Alternatives, and Decisions.
Data and database administration
Software Defined Storage
Business process management (BPM)
Joseph JaJa, Mike Smorul, and Sangchul Song
Systems Analysis – ITEC 3155 Evaluating Alternatives for Requirements, Environment, and Implementation.
EIN 6133 Enterprise Engineering
Chapter 18 MobileApp Design
Database Management Systems
Chapter 2 Database Environment Pearson Education © 2009.
Service-centric Software Engineering
Windows Server 2016 Software Defined Storage
Rafael Almeida, Inês Percheiro, César Pardo, Miguel Mira da Silva
Database Environment Transparencies
From Use Cases to Implementation
Presentation transcript:

June 13-15, 2007Policy 2007 Infrastructure-aware Autonomic Manager for Change Management H. Abdel SalamK. Maly R. MukkamalaM. Zubair Department of Computer Science, Old Dominion University

June 13-15, 2007Policy 2007 IT Management Complexity Managing IT infrastructure for a large organization consisting of tens of networks that connect hundreds of servers is a challenging task. Using ad-hoc and human-based methodologies to manage large size organizations can be costly, error prone and crisis oriented rather than targeted and predictable. Different standards and best practices such as ITIL (IT Infrastructure Library) and COBIT (Control Objectives for Information and related Technology) have been proposed to describe the procedures that should be followed while managing IT environments. In this paper, we focus on the Change Management component of IT management. ITIL defines Change Management as the standard procedures that ensure that changes to configuration items in a controlled IT infrastructure are carried out in a planned and authorized manner.

June 13-15, 2007Policy 2007 Change Management Workflow

June 13-15, 2007Policy 2007 Traditional Policy Engine Architecture Underlying Infrastructure Policy Deployer Policy Engine Policy1.xml Policy Evaluator If (Condition-1) Then Decision-1 If (Condition-2) Then Decision-2. If (Condition-k) Then Action-1 If (Condition-k+1) Then Action-2. Properties (Sensors): Property-1(Read-Only) Property-2(Read-Write). Getter-Setter Methods: Property-1.Get() Property-2.Set(value). Action Methods: Action-Handler-1() Action-Handler-2(). Policy2.xml Solicit Decision or Action Decision Action Conditions can contain Infrastructure independent operators & vocabularies only. Client (Managed Resource) Infrastructure information is limited to what the client offers to the engine through its properties or methods.

June 13-15, 2007Policy 2007 Infrastructure Aware Policy Based System Infrastructure-aware Policy Engine Policy language constructs to represent dependencies among applications, hardware and software XML representation of Infrastructure

June 13-15, 2007Policy 2007 Infrastructure Aware Policy Engine The policy language is able to support infrastructure dependent operators (e.g., IsAvailable, IsConnected)

June 13-15, 2007Policy 2007 Policy examples The Blackboard application (for example) may be inaccessible only during Saturday evening from 10 PM to 12 PM; however urgent security patches may be installed as long as the application is accessible from at least 2 labs during work hours. No server may be taken down on three consecutive weekends

June 13-15, 2007Policy 2007 Infrastructure Aware Operators for Complex Dependencies Dependency between applications and hardware in a large IT infrastructure can be complex. OR Dependencies: Using of Database replicas to improve service availability. Access Type Dependencies: Many Applications offer different features based on the user privileges; these features have different dependency requirements

June 13-15, 2007Policy 2007 To represent this dependencies, we introduced the “AccessType” element. Access Type Dependencies Server S1 runs the “Blackboard” application which for “Faculty” members requires access to the database DB1 and the Apache web server. However, when accessed by “Students”, Blackboard requires only the Apache web server.

June 13-15, 2007Policy 2007 Sample Policy

June 13-15, 2007Policy 2007 Sample IT Management Policy

June 13-15, 2007Policy 2007 Sample Infrastructure Representation

June 13-15, 2007Policy 2007 Conclusion Current policy languages do not enable managers to express policies that involve the connectivity and dependencies within the infrastructure managed by an IT organization. We have implemented a language and a policy engine that will allow Infrastructure-Aware rules. We have demonstrated the feasibility of the engine and have tested the engine with an infrastructure that is being discovered by an automated tool. Future Work –Need to integrate the engine with a workflow system that represents change management. –Test the scalability of the engine with regard to number of servers, switches, PCs in the infrastructure as the algorithms to implement connectivity predicates are polynomial in nature.