SlideShare a Scribd company logo
1 of 10
NADAR SARASWATHI COLLEGE
OF ARTS AND SCIENCE
AUTONOMIC SECURITY
Submitted by:
M.Vidhya
II M.Sc CS
INTRODUCTION
Autonomic Computing is a type of visionary
computing that has been started by IBM. This is
made to make adaptive decisions that use high-
level policies. It has a feature of constant up-
gradation using optimization and adaptation.
Need Of Autonomic Computing
With the increase in the demand for computers,
computer-related problems are also increasing. They are
becoming more and more complex. The complexity has
become so much that there is a spike in demand for
skilled workers. This has fostered the need for autonomic
computers that would do computing operations without
the need for manual intervention.
Areas Of Autonomic Computing
There are four areas of Autonomic Computing as defined by IBM.
These are as follows:
Self-Configuration: The system must be able to configure itself
automatically according to the changes in its environment.
Self-Healing: IBM mentions that an autonomic system must
have property by which it must be able to repair itself from errors
and also route the functions away from trouble whenever they
are encountered.
Self-Optimization: According to IBM an autonomic
system must be able to perform in an optimized
manner and ensure that it follows an efficient
algorithm for all computing operations.
Self-Protection: the IBM States that an autonomic
system must be able to perform detection,
identification, and protection from the security and
system attacks so that systems’ security and integrity
remain intact.
Characteristics
1.The Autonomic system knows itself. This means that it knows its
components, specifications capacity, and the real-time status. It also
has knowledge about its own, borrowed, and shared resources.
2.It can configure itself again and again and run its setup
automatically as and when required.
3.It has the capability of optimizing itself by fine-tuning workflows.
4.It can heal itself. This is a way of mentioning that it can recover
from failures.
Autonumic Computing Architecture
Control loops: A resource provider provides control loops. It is
embedded in the runtime environment.
It is configured using a manageability interface that is provided for
every resource e.g. hard drive.
Managed Elements: The managed element is a component of
the controlled system. It can be hardware as well as a software
resource. Sensors and effectors are used to control the managed
element.
Sensors: This contains information about the state and any
changes in the state of elements of the autonomic system.
Effectors: These are commands or application programming
interfaces (API) that are used to change the states of an element.
Autonomic Manager: This is used to make sure that the control
loops are implemented. This divides the loop into 4 parts for its
functioning. These parts are monitor, analyze, plan, and execute.
The Autonomic Computing must involve the following 3
properties :
Automatic: It must be able to execute its operations without
human intervention.
Adaptive: Autonomic computers must be able to make changes
according to their environment and other unforeseen conditions
such as security attacks and system breakdowns.
Aware: it must also have awareness of the processes and internal
states that would allow the previous two features to be executed.
THANK YOU

More Related Content

Similar to cloud computing ppt

A Runtime Evaluation Methodology and Framework for Autonomic Systems
A Runtime Evaluation Methodology and Framework for Autonomic SystemsA Runtime Evaluation Methodology and Framework for Autonomic Systems
A Runtime Evaluation Methodology and Framework for Autonomic SystemsIDES Editor
 
Autonomic Computing by- Sandeep Jadhav
Autonomic Computing by- Sandeep JadhavAutonomic Computing by- Sandeep Jadhav
Autonomic Computing by- Sandeep JadhavSandep Jadhav
 
B4usolution_AI for automation
B4usolution_AI for automationB4usolution_AI for automation
B4usolution_AI for automationb4usolution .
 
Machine Vision Systems.pptx
Machine Vision Systems.pptxMachine Vision Systems.pptx
Machine Vision Systems.pptxMUST
 
IBM ECM System monitor Whitepaper
IBM ECM System monitor WhitepaperIBM ECM System monitor Whitepaper
IBM ECM System monitor WhitepaperRoland Merkt
 
Cad cam unit i [pls vis it our blog sres11meches]
Cad cam unit  i [pls vis it our blog sres11meches]Cad cam unit  i [pls vis it our blog sres11meches]
Cad cam unit i [pls vis it our blog sres11meches]Sres IImeches
 
Introduction to Embedded System Architecture and Design.docx.pdf
Introduction to Embedded System Architecture and Design.docx.pdfIntroduction to Embedded System Architecture and Design.docx.pdf
Introduction to Embedded System Architecture and Design.docx.pdfArshak28
 
A Study Of Real-Time Embedded Software Systems And Real-Time Operating Systems
A Study Of Real-Time Embedded Software Systems And Real-Time Operating SystemsA Study Of Real-Time Embedded Software Systems And Real-Time Operating Systems
A Study Of Real-Time Embedded Software Systems And Real-Time Operating SystemsRick Vogel
 
Autonomic computing seminar documentation
Autonomic computing seminar documentationAutonomic computing seminar documentation
Autonomic computing seminar documentationGeorgekutty Francis
 
IRJET- An Efficient Automation Framework for Testing ITS Solution using Selenium
IRJET- An Efficient Automation Framework for Testing ITS Solution using SeleniumIRJET- An Efficient Automation Framework for Testing ITS Solution using Selenium
IRJET- An Efficient Automation Framework for Testing ITS Solution using SeleniumIRJET Journal
 
operating system notes by madhavi.pdf
operating system notes by madhavi.pdfoperating system notes by madhavi.pdf
operating system notes by madhavi.pdfMadhaviAvhankar1
 
High dependability of the automated systems
High dependability of the automated systemsHigh dependability of the automated systems
High dependability of the automated systemsAlan Tatourian
 
Introduction to Embedded Systems.pptx
Introduction to Embedded Systems.pptxIntroduction to Embedded Systems.pptx
Introduction to Embedded Systems.pptxKIRAN CHIPPALA
 
Embedded systems unit 5
Embedded systems unit 5Embedded systems unit 5
Embedded systems unit 5baskaransece
 
An Algorithm Based Simulation Modeling For Control of Production Systems
An Algorithm Based Simulation Modeling For Control of Production SystemsAn Algorithm Based Simulation Modeling For Control of Production Systems
An Algorithm Based Simulation Modeling For Control of Production SystemsIJMER
 
Autonomic Computing (Basics) Presentation
Autonomic Computing (Basics) PresentationAutonomic Computing (Basics) Presentation
Autonomic Computing (Basics) PresentationJaspreet Singh
 
Monitoring system performance and health of i CEC 2012
Monitoring system performance and health of i CEC 2012Monitoring system performance and health of i CEC 2012
Monitoring system performance and health of i CEC 2012COMMON Europe
 
3330701_unit-1_operating-system-concepts.pdf
3330701_unit-1_operating-system-concepts.pdf3330701_unit-1_operating-system-concepts.pdf
3330701_unit-1_operating-system-concepts.pdfrohitbaweja26
 
TS Automative Embedded Systems.pdf
TS Automative Embedded Systems.pdfTS Automative Embedded Systems.pdf
TS Automative Embedded Systems.pdfTechnoscriptsPunesNo
 

Similar to cloud computing ppt (20)

10.1.1.97.5586
10.1.1.97.558610.1.1.97.5586
10.1.1.97.5586
 
A Runtime Evaluation Methodology and Framework for Autonomic Systems
A Runtime Evaluation Methodology and Framework for Autonomic SystemsA Runtime Evaluation Methodology and Framework for Autonomic Systems
A Runtime Evaluation Methodology and Framework for Autonomic Systems
 
Autonomic Computing by- Sandeep Jadhav
Autonomic Computing by- Sandeep JadhavAutonomic Computing by- Sandeep Jadhav
Autonomic Computing by- Sandeep Jadhav
 
B4usolution_AI for automation
B4usolution_AI for automationB4usolution_AI for automation
B4usolution_AI for automation
 
Machine Vision Systems.pptx
Machine Vision Systems.pptxMachine Vision Systems.pptx
Machine Vision Systems.pptx
 
IBM ECM System monitor Whitepaper
IBM ECM System monitor WhitepaperIBM ECM System monitor Whitepaper
IBM ECM System monitor Whitepaper
 
Cad cam unit i [pls vis it our blog sres11meches]
Cad cam unit  i [pls vis it our blog sres11meches]Cad cam unit  i [pls vis it our blog sres11meches]
Cad cam unit i [pls vis it our blog sres11meches]
 
Introduction to Embedded System Architecture and Design.docx.pdf
Introduction to Embedded System Architecture and Design.docx.pdfIntroduction to Embedded System Architecture and Design.docx.pdf
Introduction to Embedded System Architecture and Design.docx.pdf
 
A Study Of Real-Time Embedded Software Systems And Real-Time Operating Systems
A Study Of Real-Time Embedded Software Systems And Real-Time Operating SystemsA Study Of Real-Time Embedded Software Systems And Real-Time Operating Systems
A Study Of Real-Time Embedded Software Systems And Real-Time Operating Systems
 
Autonomic computing seminar documentation
Autonomic computing seminar documentationAutonomic computing seminar documentation
Autonomic computing seminar documentation
 
IRJET- An Efficient Automation Framework for Testing ITS Solution using Selenium
IRJET- An Efficient Automation Framework for Testing ITS Solution using SeleniumIRJET- An Efficient Automation Framework for Testing ITS Solution using Selenium
IRJET- An Efficient Automation Framework for Testing ITS Solution using Selenium
 
operating system notes by madhavi.pdf
operating system notes by madhavi.pdfoperating system notes by madhavi.pdf
operating system notes by madhavi.pdf
 
High dependability of the automated systems
High dependability of the automated systemsHigh dependability of the automated systems
High dependability of the automated systems
 
Introduction to Embedded Systems.pptx
Introduction to Embedded Systems.pptxIntroduction to Embedded Systems.pptx
Introduction to Embedded Systems.pptx
 
Embedded systems unit 5
Embedded systems unit 5Embedded systems unit 5
Embedded systems unit 5
 
An Algorithm Based Simulation Modeling For Control of Production Systems
An Algorithm Based Simulation Modeling For Control of Production SystemsAn Algorithm Based Simulation Modeling For Control of Production Systems
An Algorithm Based Simulation Modeling For Control of Production Systems
 
Autonomic Computing (Basics) Presentation
Autonomic Computing (Basics) PresentationAutonomic Computing (Basics) Presentation
Autonomic Computing (Basics) Presentation
 
Monitoring system performance and health of i CEC 2012
Monitoring system performance and health of i CEC 2012Monitoring system performance and health of i CEC 2012
Monitoring system performance and health of i CEC 2012
 
3330701_unit-1_operating-system-concepts.pdf
3330701_unit-1_operating-system-concepts.pdf3330701_unit-1_operating-system-concepts.pdf
3330701_unit-1_operating-system-concepts.pdf
 
TS Automative Embedded Systems.pdf
TS Automative Embedded Systems.pdfTS Automative Embedded Systems.pdf
TS Automative Embedded Systems.pdf
 

More from Mvidhya9

womenempowerment.ppt
womenempowerment.pptwomenempowerment.ppt
womenempowerment.pptMvidhya9
 
Color image processing ppt
Color image processing pptColor image processing ppt
Color image processing pptMvidhya9
 
artifical intelligence ppt.
artifical intelligence ppt.artifical intelligence ppt.
artifical intelligence ppt.Mvidhya9
 
cryptography.pptx
cryptography.pptxcryptography.pptx
cryptography.pptxMvidhya9
 
nosql.PPT.pptx
nosql.PPT.pptxnosql.PPT.pptx
nosql.PPT.pptxMvidhya9
 
python.pptx
python.pptxpython.pptx
python.pptxMvidhya9
 
Peephole optimization
Peephole optimization Peephole optimization
Peephole optimization Mvidhya9
 

More from Mvidhya9 (9)

womenempowerment.ppt
womenempowerment.pptwomenempowerment.ppt
womenempowerment.ppt
 
IOT.ppt
IOT.pptIOT.ppt
IOT.ppt
 
Color image processing ppt
Color image processing pptColor image processing ppt
Color image processing ppt
 
artifical intelligence ppt.
artifical intelligence ppt.artifical intelligence ppt.
artifical intelligence ppt.
 
cryptography.pptx
cryptography.pptxcryptography.pptx
cryptography.pptx
 
nosql.PPT.pptx
nosql.PPT.pptxnosql.PPT.pptx
nosql.PPT.pptx
 
DOS.pptx
DOS.pptxDOS.pptx
DOS.pptx
 
python.pptx
python.pptxpython.pptx
python.pptx
 
Peephole optimization
Peephole optimization Peephole optimization
Peephole optimization
 

Recently uploaded

CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceanilsa9823
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 

Recently uploaded (20)

CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 

cloud computing ppt

  • 1. NADAR SARASWATHI COLLEGE OF ARTS AND SCIENCE AUTONOMIC SECURITY Submitted by: M.Vidhya II M.Sc CS
  • 2. INTRODUCTION Autonomic Computing is a type of visionary computing that has been started by IBM. This is made to make adaptive decisions that use high- level policies. It has a feature of constant up- gradation using optimization and adaptation.
  • 3. Need Of Autonomic Computing With the increase in the demand for computers, computer-related problems are also increasing. They are becoming more and more complex. The complexity has become so much that there is a spike in demand for skilled workers. This has fostered the need for autonomic computers that would do computing operations without the need for manual intervention.
  • 4. Areas Of Autonomic Computing There are four areas of Autonomic Computing as defined by IBM. These are as follows: Self-Configuration: The system must be able to configure itself automatically according to the changes in its environment. Self-Healing: IBM mentions that an autonomic system must have property by which it must be able to repair itself from errors and also route the functions away from trouble whenever they are encountered.
  • 5. Self-Optimization: According to IBM an autonomic system must be able to perform in an optimized manner and ensure that it follows an efficient algorithm for all computing operations. Self-Protection: the IBM States that an autonomic system must be able to perform detection, identification, and protection from the security and system attacks so that systems’ security and integrity remain intact.
  • 6. Characteristics 1.The Autonomic system knows itself. This means that it knows its components, specifications capacity, and the real-time status. It also has knowledge about its own, borrowed, and shared resources. 2.It can configure itself again and again and run its setup automatically as and when required. 3.It has the capability of optimizing itself by fine-tuning workflows. 4.It can heal itself. This is a way of mentioning that it can recover from failures.
  • 7. Autonumic Computing Architecture Control loops: A resource provider provides control loops. It is embedded in the runtime environment. It is configured using a manageability interface that is provided for every resource e.g. hard drive. Managed Elements: The managed element is a component of the controlled system. It can be hardware as well as a software resource. Sensors and effectors are used to control the managed element.
  • 8. Sensors: This contains information about the state and any changes in the state of elements of the autonomic system. Effectors: These are commands or application programming interfaces (API) that are used to change the states of an element. Autonomic Manager: This is used to make sure that the control loops are implemented. This divides the loop into 4 parts for its functioning. These parts are monitor, analyze, plan, and execute.
  • 9. The Autonomic Computing must involve the following 3 properties : Automatic: It must be able to execute its operations without human intervention. Adaptive: Autonomic computers must be able to make changes according to their environment and other unforeseen conditions such as security attacks and system breakdowns. Aware: it must also have awareness of the processes and internal states that would allow the previous two features to be executed.