Autonomic Computing
Autonomic Computing
Autonomic Computing is an initiative started by IBM in 2001.Autonomic computing refers to the self-
managing characteristics of distributed computing resources, adapting to unpredictable changes whilst
hiding intrinsic complexity to operators and users. An autonomic system makes decisions on its own,
using high-level policies; it will constantly check and optimize its status and automatically adapt itself to
changing conditions.An autonomic computing framework might be seen composed by Autonomic
Components (AC) interacting with each other.
The general properties of an autonomic (self-managing) system can be summarised as four objectives: self-
configuring, self-healing, self-optimising and self-protecting; and four attributes: self-awareness, environment-
awareness, selfmonitoring and self-adjusting (Fig. 1). Essentially, the objectives represent broad system
requirements while the attributes identify basic implementation mechanisms. Since the 2001 launch ofAC, the self-*
list of properties has grown substantially [9] (refer to Sect. 6. Defining terms, terminology and glossary); yet this
initial set still represents the general goal.
In achieving such self-managing objectives a system must be aware of its internal state (self-aware) and current
external operating conditions (environment-aware). Changing circumstances are detected through self-monitoring
and adaptations are made accordingly (self-adjusting) . As such, a system must have knowledge of its available
resources, its components, their desired performance characteristics,their current status, and the status of
nterconnections with other systems, along with rules and policies of how these may be adjusted. Such ability to
operate in a heterogeneous environment will require the use of open standards to enable global understanding and
communication with othersystems .These mechanisms are not independent entities; for instance, if an attack is
successful, this will include self-healing actions and a mix of self-configuration and self-optimisation;in the first
instance, to ensure dependability and continued operation of the system and, later, to increase the self-protection
against similar future attacks. Finally, these self-mechanisms should ensure there is minimal disruption to users,
avoiding significant delays in processing.