Skip to main content

Combining Learned and Highly-Reactive Management

  • Conference paper
Modelling Autonomic Communications Environments (MACE 2009)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 5844))

  • 272 Accesses

Abstract

Learned models of behavior have the disadvantage that they must be retrained after any change in system configuration. Autonomic management methods based upon learned models lose effectiveness during the retraining period. We propose a hybrid approach to autonomic resource management that combines management based upon learned models with “highly-reactive” management that does not depend upon learning, history, or complete information. Whenever re-training is necessary, a highly-reactive algorithm serves as a fallback management strategy. This approach mitigates the risks involved in using learned models in the presence of unpredictable effects, including unplanned configuration changes and hidden influences upon performance not considered in the learned model. We use simulation to demonstrate the utility of the hybrid approach in mitigating pitfalls of both learning-based and highly-reactive approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Hellerstein, J.L., Diao, Y., Parekh, S., Tilbury, D.M.: Feedback Control of Computing Systems. John Wiley & Sons, Chichester (2004)

    Book  Google Scholar 

  2. Horn, P.: Autonomic computing: Ibm’s perspective on the state of information technology (October 2001), http://researchweb.watson.ibm.com/autonomic/manifesto/autonomic_computing.pdf (cited April 16, 2009)

  3. IBM: An architectural blueprint for autonomic computing (June 2006), http://www-01.ibm.com/software/tivoli/autonomic/pdfs/AC_Blueprint_White_Paper_4th.pdf (cited April 16, 2009)

  4. Burgess, M.: Computer immunology. In: Proceedings of the Twelth Systems Administration Conference (LISA XII), p. 283. USENIX Association, Berkeley (1998)

    Google Scholar 

  5. Burgess, M.: Configurable immunity for evolving human-computer systems. Science of Computer Programming 51, 197 (2004)

    Article  MATH  MathSciNet  Google Scholar 

  6. Burgess, M.: A site configuration engine. Computing Systems 8(2), 309–337 (1995)

    Google Scholar 

  7. Burgess, M.: On the theory of system administration. Science of Computer Programming 49, 1 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  8. Burgess, M.: Thermal, non-equilibrium phase space for networked computers. Physical Review E 62, 1738 (2000)

    Article  Google Scholar 

  9. Burgess, M.: Keynote: The promise of self-adapting equilibrium. In: Proceedings of the Fifth IEEE International Conference on Autonomic Computing (ICAC) (June 2008)

    Google Scholar 

  10. Holland, J.H.: Emergence: From Chaos to Order. Oxford Univ. Pr. (Sd), Oxford (2000)

    Google Scholar 

  11. Johnson, S.: Emergence: The Connected Lives of Ants, Brains, Cities, and Software. Scribner (September 2002)

    Google Scholar 

  12. Burgess, M., Couch, A.: Autonomic computing approximated by fixed-point promises. In: Proceedings of the First IEEE International Workshop on Modeling Autonomic Communication Environments (MACE), pp. 197–222. Multicon Verlag (2006)

    Google Scholar 

  13. Burgess, M.: An approach to understanding policy based on autonomy and voluntary cooperation. In: Schönwälder, J., Serrat, J. (eds.) DSOM 2005. LNCS, vol. 3775, pp. 97–108. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  14. Bergstra, J., Burgess, M.: A static theory of promises. Technical report, arXiv:0810.3294v1 (2008)

    Google Scholar 

  15. Couch, A.L., Chiarini, M.: Dynamics of resource closure operators. In: Sadre, R., Pras, A. (eds.) AIMS 2009. LNCS, vol. 5637, pp. 28–41. Springer, Heidelberg (2009)

    Google Scholar 

  16. Couch, A., Hart, J., Idhaw, E.G., Kallas, D.: Seeking closure in an open world: A behavioral agent approach to configuration management. In: LISA 2003: Proceedings of the 17th USENIX conference on System administration, pp. 125–148. USENIX, Berkeley (2003)

    Google Scholar 

  17. Schwartzberg, S., Couch, A.: Experience implementing a web service closure. In: LISA 2004: Proceedings of the 18th USENIX conference on System administration, pp. 213–230. USENIX, Berkeley (2004)

    Google Scholar 

  18. Wu, N., Couch, A.: Experience implementing an ip address closure. In: LISA 2006: Proceedings of the 20th USENIX conference on System administration, pp. 119–130. USENIX, Berkeley (2006)

    Google Scholar 

  19. Couch, A.L., Chiarini, M.: A theory of closure operators. In: Hausheer, D., Schönwälder, J. (eds.) AIMS 2008. LNCS, vol. 5127, pp. 162–174. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  20. Couch, A.L., Burgess, M., Chiarini, M.: Management without (detailed) models. In: González Nieto, J., et al. (eds.) ATC 2009. LNCS, vol. 5586, pp. 75–89. Springer, Heidelberg (2009)

    Google Scholar 

  21. R Development Core Team: R: A Language and Environment for Statistical Computing. In: R Foundation for Statistical Computing, Vienna, Austria (2008) ISBN 3-900051-07-0

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Couch, A.L., Chiarini, M. (2009). Combining Learned and Highly-Reactive Management. In: Strassner, J.C., Ghamri-Doudane, Y.M. (eds) Modelling Autonomic Communications Environments. MACE 2009. Lecture Notes in Computer Science, vol 5844. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-05006-0_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-05006-0_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-05005-3

  • Online ISBN: 978-3-642-05006-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics