The Vision of Autonomic Computing Self-Management Unit 7-2 Managing the Digital Enterprise Kephart, and Chess.

Slides:



Advertisements
Similar presentations
High level QA strategy for SQL Server enforcer
Advertisements

Database Planning, Design, and Administration
KAIS T The Vision of Autonomic Computing Jeffrey O. Kephart, David M Chess IBM Watson research Center IEEE Computer, Jan 발표자 : 이승학.
Towards Self-Testing in Autonomic Computing Systems Tariq M. King, Djuradj Babich, Jonatan Alava, and Peter J. Clarke Software Testing Research Group Florida.
Welcome to DEAS 2005 Design and Evolution of Autonomic Application Software David Garlan, CMU Marin Litoiu, IBM CAS Hausi A. Müller, UVic John Mylopoulos,
Presented by: Ehsan Kouroshfar. Outline Introduction Self-management Architectural Considerations Engineering challenges Scientific challenges Discussion.
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
Autonomic Systems Justin Moles, Winter 2006 Security in an Autonomic Computing Environment Paper by: D. M. Chess, C. C. Palmer S. R. White Presentation.
Introduction to DBA.
Fabián E. Bustamante, Winter 2006 Autonomic Computing The vision of autonomic computing, J. Kephart and D. Chess, IEEE Computer, Jan Also - A.G.
Chapter 5: Common Support Problems
An Introduction to System Administration Chapter 1.
SysMA S OFTWARE E NGINEERING FOR S ERVICE - O RIENTED AND A UTONOMIC S YSTEMS - I NTRODUCTION TO A UTONOMIC S YSTEMS - Lucca (Italy) – October, 2014 Francesco.
Yingping Huang and Gregory Madey University of Notre Dame A W S utonomic eb-based imulation Presented by Tariq M. King Published by the IEEE Computer Society.
Autonomic Computing Shafay Shamail Malik Jahan Khan.
DB2 Universal Database February 27, 2003 | BTW 2003 © 2003 IBM Corporation Automatic Database Configuration for DB2 Universal Database Compressing Years.
Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., All rights reserved. Chapter 8: Autonomic computing.
(Slides are taken from the presentations by Alan Ganek, Alfred Spector, Jeff Kephart of IBM)
Computer Security: Principles and Practice
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Maintaining and Updating Windows Server 2008
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 14: Troubleshooting Windows Server 2003 Networks.
Issues on Software Testing for Safety-Critical Real-Time Automation Systems Shahdat Hossain Troy Mockenhaupt.
Department Of Computer Engineering
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Mrs. Maninder Kaur 1 Mrs. Maninder Kaur
Background History Note 1 Refer to Soltis: Appendix.
A Concise Introduction to Autonomic Computing
Hands-On Microsoft Windows Server 2008
1 Autonomic Computing An Introduction Guenter Kickinger.
Smart Grid Technologies Damon Dougherty – Industry Manager.
Using Windows Firewall and Windows Defender
Module CC3002 Post Implementation Issues Lecture for Week 6 AY 2013 Spring.
Autonomic Computing Presented By: Renuka Kandimalla( )
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Dr. Arun Sharma M.Tech., PhD (Thapar University)
Microsoft ® Official Course Module 10 Optimizing and Maintaining Windows ® 8 Client Computers.
WELCOME. AUTONOMIC COMPUTING PRESENTED BY: NIKHIL P S7 IT ROLL NO: 33.
By Anthony W. Hill & Course Technology1 Common End User Problems.
Automating service management Tiina Niklander Faculty of Science Department of Computer Science In AMICT 2008 Petrozavodsk, May 2008.
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
SelfCon Foil no 1 Design of Self-Adaptive Systems Course introduction 2013 Rolv Bræk, ITEM.
A Self-Manageable Infrastructure for Supporting Web-based Simulations Yingping Huang Xiaorong Xiang Gregory Madey Computer Science & Engineering University.
Supporting Self-Adaptation in Multi- Agent Systems.
THE VISION OF AUTONOMIC COMPUTING. WHAT IS AUTONOMIC COMPUTING ? “ Autonomic Computing refers to computing infrastructure that adapts (automatically)
A Self-Configuring Test Harness for Web Applications Jairo Pava School of Computing and Information Sciences Florida International University Courtney.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Project Design Alain Esteva-Ramirez School of Computing and Information Sciences Florida International University Bárbara Morales-Quiñones Department of.
SQL Server 2008 R2 Manageability. Challenges facing database administrators today: Scaling management to multiple data centers Proactively monitoring.
Maintaining and Updating Windows Server 2008 Lesson 8.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Chapter 9 Database Planning, Design, and Administration Transparencies © Pearson Education Limited 1995, 2005.
AUTONOMIC COMPUTING B.Akhila Priya 06211A0504. Present-day IT environments are complex, heterogeneous in terms of software and hardware from multiple.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Self-Managing Computer Systems An Introduction. Giving credit where it is due: Most slides are from Mark Jelasity, University of Bologna, Italy I have.
Some Great Open Source Intrusion Detection Systems (IDSs)
Securing Network Servers
Douglas Potter IBI Minneapolis User Group November 2008
The Development Process of Web Applications
Firewalls.
Introduction.
Research Challenges of Autonomic Computing
The Vision of Autonomic Computing
Jigar.B.Katariya (08291A0531) E.Mahesh (08291A0542)
Bethesda Cybersecurity Club
PLANNING A SECURE BASELINE INSTALLATION
Self-Managed Systems: an Architectural Challenge
An Introduction to System Administration
Presentation transcript:

The Vision of Autonomic Computing Self-Management Unit 7-2 Managing the Digital Enterprise Kephart, and Chess

Autonomic Computing Systems The essence of autonomic computing systems is self- management –The intent of which is to free system administrators from the details of system operation and maintenance and to provide users with a machine that runs at peak performance 24/7 Autonomic systems will maintain and adjust their operation in the face of changing components, workloads, demands, and external conditions and in the face of hardware or software failures, both innocent and malicious The autonomic system might continually monitor its own use, and check for component upgrades IBM frequently cites four aspects of self-management

Self-configuration Autonomic systems will configure themselves automatically in accordance with high-level policies— representing business-level objectives, that specify what is desired, not how it is to be accomplished. When a component is introduced, it will incorporate itself seamlessly, and the rest of the system will adapt to its presence—much like a new cell in the body or a new person in a population When a new component is introduced into an autonomic accounting system, it will automatically learn about and take into account the composition and configuration of the system It will register itself and its capabilities so that other components can either use it or modify their own behavior appropriately

Self-optimization Complex middleware or database systems may have hundreds of tunable parameters that must be set correctly for the system to perform optimally, yet few people know how to tune them –Such systems are often integrated with other, equally complex systems Consequently, performance-tuning one large subsystem can have unanticipated effects on the entire system Autonomic systems will continually seek ways to improve their operation, identifying and seizing opportunities to make themselves more efficient in performance or cost Just as muscles become stronger through exercise, and the brain modifies its circuitry during learning, autonomic systems will monitor, experiment with, and tune their own parameters and will learn to make appropriate choices about keeping functions or outsourcing them They will proactively seek to upgrade their function by finding, verifying, and applying the latest updates

Self-healing Autonomic computing systems will detect, diagnose, and repair localized problems resulting from bugs or failures in software and hardware, perhaps through a regression tester Using knowledge about the system configuration, a problem-diagnosis component would analyze information from log files, possibly supplemented with data from additional monitors that it has requested The system would then match the diagnosis against known software patches (or alert a human programmer if there are none), install the appropriate patch, and retest

Self-protection Despite the existence of firewalls and intrusion detection tools, humans must at present decide how to protect systems from malicious attacks and inadvertent cascading failures Autonomic systems will be self-protecting in two senses –They will defend the system as a whole against large- scale, correlated problems arising from malicious attacks or cascading failures that remain uncorrected by self-healing measures –They also will anticipate problems based on early reports from sensors and take steps to avoid or mitigate them