chapter 8 autonomic computing n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Chapter 8: Autonomic computing PowerPoint Presentation
Download Presentation
Chapter 8: Autonomic computing

Loading in 2 Seconds...

play fullscreen
1 / 11
lavey

Chapter 8: Autonomic computing - PowerPoint PPT Presentation

196 Views
Download Presentation
Chapter 8: Autonomic computing
An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Chapter 8: Autonomic computing

  2. Chapter objectives • After completing this chapter, you will be able to: • Understand autonomic computing capabilities • Understand the autonomic computing framework • Know the autonomic capabilities of large-scale commercial systems • Know the autonomic computing tool

  3. Autonomic Computing Principles The self-configuring, self-healing, self-optimizing, and self-protecting technologies of operating environments and systems. Seamless integration and distribution of resources by the operating system Instant detection, diagnosis and reaction to system disruptions Self-Configuring Self-Healing Automatically measure and tune resources to improve performance and usage Self-Optimizing Self-Protecting Anticipate, detect, identify and protect against attacks

  4. Delegate Delegate Analyze Plan Data Action Monitor Knowledge Execute Delegate Autonomic computing system Assess Impact Diagnose Symptom Plan Action Autonomic Manager Delegate Sense Symptom Take Action

  5. Autonomic computing framework

  6. z/OS Implementation of autonomic computing: Self-Healing • Repair - as in the Error Correction Code (ECC) • IBM System z Hardware has spare units on many components. This is called N+1 • Use of spare PUs • Use of spare memory chips • I/O has multipath access • Concurrent updates • System Software • Data Replication • Coupling Facility Structure • Synchronous copy • Automation engines • Virtualization • Health Checking

  7. Self-Configuring • msys for setup simplifies the management tasks for z/OS software setup. • z/OS Wizards are Web-based dialogs that assist in z/OS customization. • Capacity upgrade CPU provides instant access to additional processors or servers, memory, I/O. • Customer-initiated upgrade. • Automatic hardware detection/configuration. • Automatic communication configuration.

  8. Self-Protecting • LPAR, Certifications FIPS, I40-1 Level 4, EAL4, ZKA, ICSA Labs 1.0A • Intrusion detection IDS, PKI • Hardware cryptographic adapters • Digital certificates providing identity authentication • SSL and TLS (manages Internet transmission security), Kerberos (authenticates requests for service in a network), VPN, encryption • Tivoli Policy Director • LDAP (aids in the location of network resources)

  9. Self-Optimizing • Intelligent Resource Director (IRD) • allows dynamic resource allocation on IBM System z servers • Dynamic LPAR • WLM LPAR extensions for Linux • Parallel Sysplex Extensions • Sysplex Distributor • CP Coupling • BIND9 DNS-DNS BIND Version 9.0 on z/OS • z/OS workload manager • CPU, memory, I/O, TCP/IP QOS, Web request management, and batch initiator balancing

  10. Summary • The New Mainframe: • is autonomic computing • Self-healing, self-configuring, self-optimizing and self-protecting • Autonomlc Computing framework is needed • Touchpoints are needed in the framework • Autonomic Computing makes the IBM System z to the most reliable mainframe.

  11. Autonomic Autonomic computing control loop Autonomic computing framework Control loop ECC Effector Monitoring msys for Setup Self-configuring Self-Healing Self-Optimizing Self-Protecting Sensor SMP/E Touchpoint Key terms in this chapter