Preview

Overview of Autonomic Computing

Powerful Essays
Open Document
Open Document
2853 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Overview of Autonomic Computing
Overview of Autonomic Computing
The concept of autonomic system is introduced in 2001by Dr. Paul Horn (Cybenko). This concept is a way to address the unsustainable growth in administration costs for model software, computing and networking system. There are some paradigm that this concept is introduces such as self-aware, self-repairing and self-optimizing application software, operating system and network infrastructure. Autonomic computing system has a sense of self-awareness which prevent IT administrator and manager to spend a lot of time to fixing configuration errors, tracking down hardware and software faults, restoring servers and application program because the sense of self-awareness of the autonomic computing system can track down a root cause for recovery, repair and diagnosis matter to take an appropriate action in order to return the system to the proper operating mode. for example the system can reboot or restart an application program or download the necessary updates to critical system code. Autonomic computing systems are capable of adapting their behavior and resources thousands of times a second to automatically decide the best way to accomplish a given goal de- spite changing environmental conditions and demands. Autonomic systems manage themselves without human intervention, and their development involves a variety of exciting challenges. The “decide”, or equivalently the “analyze and plan”, phase is responsible for providing and enforcing the desired properties of the self- managing system. Thus, the design of the decision phase is essential for obtaining the desired self-configuring, self- healing, self-optimizing and self-protecting autonomic system. An autonomic computing system may be built with different goals, but its essence is self-management. Four main aspects of self-management emerge as follows: Self-configuration: A self-configuring system is able to configure itself according to high-level policies and objectives, thereby



References: Bindelli, S. (n.d.). Building Autonomic Components: the SelfLets Approach. Chess, D. M. (n.d.). Security in an autonomic computing evironment . Cybenko, G. (n.d.). Practical Autonomic Computing. Ionescu, D. (n.d.). A Robust Autonomic Computing Architecture for Server Virtualization. Jeffrey O, D. M. (n.d.). the vision of autonomic computing . Khalid, A. (2009). Survey of Frameworks, Architectures and Techniques in Autonomic Computing.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    ISSC340 Week1Assignment

    • 286 Words
    • 1 Page

    2. Describe the function and characteristics of a network operating system (NOS). (Minimum word count: 100)…

    • 286 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    There are two kinds of systems that people can utilize when setting up a network. They can use a distributed system or the other kind of system called a centralized system. In this paper we will find out what can happen as far as the failures in these systems and what if anything can be done to fix these systems when they fail.…

    • 726 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    ISSC 340

    • 275 Words
    • 2 Pages

    The functions and characteristics of a network operating system or (NOS) for short are explained by the following;…

    • 275 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    LYT2 Task2

    • 4061 Words
    • 12 Pages

    This book provides generic approach architecture for the implementation of the wireless sensor networks. It proposes for a move into the routing protocols and improvement of networks through routing optimization, medium access and control of power while at the same time fulfilling the daily goals. It emphasizes on the importance to node information in the many wireless sensor network applications as well as the communication protocol. This solution can be applicable in the case of NHS since the use of wireless sensor networks can greatly help in transferring large data files, including the imaging files to…

    • 4061 Words
    • 12 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Page 5 FCAPS Concepts Fault management Security management Performance management IS3120 Network Communications Infrastructure Configuration management Accounting management © ITT Educational Services, Inc. All rights reserved. Page 6 Fault Management Detection…

    • 599 Words
    • 9 Pages
    Satisfactory Essays
  • Powerful Essays

    ch02 c

    • 2468 Words
    • 11 Pages

    7. The “blueprints” that guide and govern software add-ons, upgrades, hardware, systems, networks, cloud services and other IT are known as IT architectures.…

    • 2468 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Half Moon Bay State Beach is a 4-mile stretch of protected beaches in the state park system of California, USA, on Half Moon Bay. From north to south it comprises Roosevelt, Dunes, Venice, and Francis Beaches. The 181-acre park was established in 1956.…

    • 374 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    2. A self-management tool that provides an overview of upcoming commitments, appointments, and assignments by dates is a……

    • 708 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Failures Paper

    • 1001 Words
    • 5 Pages

    It is important to understand that no distributed system is ever safe from any failures. No matter how fault tolerant a system is prepared, there is no such thing as a complete failure-proof system. A constant stream of problems will always arise and taking the necessary precautions and having strong problem solving skills are essential to the success of improving a distributed system from any type of failure. We will discuss four types of failures that may occur within a distributed system and discuss the proper way of addressing them. Without the proper precaution, knowledge, and understanding of these distributed systems and its failures, business continuity is put at risk and can be disrupted.…

    • 1001 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    References: 1. Abramson, D., Venugopal, S., & Buyya, R. (2005). The Grid Economy. Proceedings of the IEEE, 93 (3), 1-6. 2. Amazon. (2010, January). Amazon Elastic Compute Cloud (Amazon,EC2).Retrieved from http://aws.amazon.com/ec2/. 3. Armbrust, M., Fox, A., Griffith, R., Joseph, A., Katz, R., Konwinski, A., et al. (2009). Above the Clouds: A Berkeley View of Cloud Computing. UC Berkeley Reliable Adaptive Distributed Systems Laboratory, 2-20. 4. Baarda, D., & de Goede, M. (2001). Basisboek Methoden en Technieken (Vol. 3). Groningen: WoltersNoordhoff bv. 5. Bennett, K., Budgen, D., Brereton, P., Macaulay, L., Munro, M., Burdon, A., et al. (2000). Service-Based Software: The future for Flexible Software. Proceedings of the Seventh Asia-Pacific Software Engineering Conference, (pp. 1-8). 6. Bennett, S., Bhuller, M., & Covington, R. (2009). Architectural Strategies for Cloud Computing. An Oracle White Paper in Enterprise Architecture 13-15. 7.Beulen, E., & Ribbers, P. (2002). Managing Complex IT Outsourcing - Partnerships. Proceedings of the 35th Hawaii International Conference on System Sciences (pp. 3-10). Hawaii: IEEE. 8.Brandic, I., Music, D., & Dustdar, S. (2009). Service Mediation and Negotiation Bootstrapping as First Achievements towards Self-adaptable Grid and Cloud Services. Institute of Information Systems (1), 2-7. 9.Kraemer, K. L., & Pinsonneault, A. (1993). Survey research methodology in management information systems: an assessment. Journal of Management Information Systems, 10 (2), 8-105. 10. Lacity, M., & Hirschheim, R. (1993). Information Systems Outsourcing: Myths, Metaphors and Realities. John Wiley & Sons, Inc. , 112-143. 11. Lacity, M., Khan, S., & Willcocks, L. (2009). A review of the IT outsourcing literature: Insights for practice. Journal of Strategic Information Systems, 18, 5-14. 12.Lenk, A., Klems, M., Nimis, J., & Tai, S. (2009). What 's Inside the Cloud? An Architectural Map of the Cloud Landscape. CLOUD '09 (pp. 23-27). Vancouver: IEEE. 13.Linthicum, D. (2010, April 14). InfoWorld. Retrieved July 29, 2010, from Cloud Computing: http://www.infoworld.com/d/cloud-computing/the-cloudjust-starting-impact-small-business-509?page=0,1…

    • 3095 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    The system is driven by change and constantly recalculates material requirements based on actual or forecasted orders. It makes adjustments to deal with possible problems prior to their occurrence, unlike traditional control systems, which looked more at historical demand and reacted to existing problems.…

    • 1776 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Arrakis OS

    • 719 Words
    • 3 Pages

    Peter, Simon. “Arrakis: The Operating System is The Control Plane.” washington.edu, 14 October 2013. Web. 6 May 2014. http://faculty.washington.edu/simpeter/arrakis-tr.pdf…

    • 719 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Distributed Systems

    • 1629 Words
    • 7 Pages

    UNIT – I LESSON 1: DISTRIBUTED SYSTEMS CONTENTS 1.0 Aim and Objectives 1.1. Introduction 1.2. Organization 1.3. Goals and Advantages 1.4. Disadvantages 1.5. Architecture 1.6. Concurrency 1.7. Languages 1.8. Let us Sum UP 1.9. Lesson-End Activities 1.10. Points for Discussion 1.11. References…

    • 1629 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Three Automation Types

    • 1011 Words
    • 5 Pages

    A system in which the sequence of processing (or assembly) operations is fixed by the equipment configuration. The operations in the sequence are usually simple. lt is the integration and coordination of many such operations into one piece of equipment that makes the system complex.…

    • 1011 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Internet Vocabulary

    • 1414 Words
    • 6 Pages

    Plug-N-Play: ability of a computer to detect and configure a new piece of hardware automatically…

    • 1414 Words
    • 6 Pages
    Powerful Essays