260 likes | 882 Views
Chapter 8: Autonomic computing. Chapter objectives. After completing this chapter, you will be able to: Understand autonomic computing capabilities Understand the autonomic computing framework Know the autonomic capabilities of large-scale commercial systems Know the autonomic computing tool.
E N D
Chapter objectives • After completing this chapter, you will be able to: • Understand autonomic computing capabilities • Understand the autonomic computing framework • Know the autonomic capabilities of large-scale commercial systems • Know the autonomic computing tool
Autonomic Computing Principles The self-configuring, self-healing, self-optimizing, and self-protecting technologies of operating environments and systems. Seamless integration and distribution of resources by the operating system Instant detection, diagnosis and reaction to system disruptions Self-Configuring Self-Healing Automatically measure and tune resources to improve performance and usage Self-Optimizing Self-Protecting Anticipate, detect, identify and protect against attacks
Delegate Delegate Analyze Plan Data Action Monitor Knowledge Execute Delegate Autonomic computing system Assess Impact Diagnose Symptom Plan Action Autonomic Manager Delegate Sense Symptom Take Action
z/OS Implementation of autonomic computing: Self-Healing • Repair - as in the Error Correction Code (ECC) • IBM System z Hardware has spare units on many components. This is called N+1 • Use of spare PUs • Use of spare memory chips • I/O has multipath access • Concurrent updates • System Software • Data Replication • Coupling Facility Structure • Synchronous copy • Automation engines • Virtualization • Health Checking
Self-Configuring • msys for setup simplifies the management tasks for z/OS software setup. • z/OS Wizards are Web-based dialogs that assist in z/OS customization. • Capacity upgrade CPU provides instant access to additional processors or servers, memory, I/O. • Customer-initiated upgrade. • Automatic hardware detection/configuration. • Automatic communication configuration.
Self-Protecting • LPAR, Certifications FIPS, I40-1 Level 4, EAL4, ZKA, ICSA Labs 1.0A • Intrusion detection IDS, PKI • Hardware cryptographic adapters • Digital certificates providing identity authentication • SSL and TLS (manages Internet transmission security), Kerberos (authenticates requests for service in a network), VPN, encryption • Tivoli Policy Director • LDAP (aids in the location of network resources)
Self-Optimizing • Intelligent Resource Director (IRD) • allows dynamic resource allocation on IBM System z servers • Dynamic LPAR • WLM LPAR extensions for Linux • Parallel Sysplex Extensions • Sysplex Distributor • CP Coupling • BIND9 DNS-DNS BIND Version 9.0 on z/OS • z/OS workload manager • CPU, memory, I/O, TCP/IP QOS, Web request management, and batch initiator balancing
Summary • The New Mainframe: • is autonomic computing • Self-healing, self-configuring, self-optimizing and self-protecting • Autonomlc Computing framework is needed • Touchpoints are needed in the framework • Autonomic Computing makes the IBM System z to the most reliable mainframe.
Autonomic Autonomic computing control loop Autonomic computing framework Control loop ECC Effector Monitoring msys for Setup Self-configuring Self-Healing Self-Optimizing Self-Protecting Sensor SMP/E Touchpoint Key terms in this chapter