Docstoc

Objects

Document Sample
Objects Powered By Docstoc
					Autonomic Personal Computing


           David Bantz
        dbantz@us.ibm.com



                            January 25, 2003
   Autonomic Personal Computing

Autonomic Personal Computing is personal computing on
autonomic platforms (see www.ibm.com/autonomic).
Autonomic Personal Computing shares the goals of
personal computing – responsiveness, ease of use and
flexibility – with those of autonomic computing –
simplicity, availability and security.
There’s a paper on it, at
www.research.ibm.com/journal/sj/421/bantz.pdf
                     Why Worry about PCs?
              Worldwide I/T Spending                          Distribution of TCO Costs
     2000

                                                               Network
     1500                                                      20.0%

     1000                         People                                           Client
$B




                                                           Server &
                                  SW
     500                                                   Storage
                                  HW                        30.0%
       0
             2000   2001   2002    2003      2004   2005
                           IDC, June, 2001

            People costs in 2000 is about
            1% of the WW economy
Client computing TCO – direct costs
Average cost per desktop seat $100-180/month (org. w/ > 5000 employees)



                 Annualized Distributed Computing Cost
                             S/W Dist.
                               2.4%                 Help Desk               Help Desk
                     IMAC                             16.7%                 E -Mail
                     14.3%                                  E-Mail          Asset Mgm t
      Management                                              4.8%          On-S ite S uppor t
          6.0%                                                Asset Mgmt    Infr astr uctur e
                                                                            H/W Maint.
                                                                  4.8%
                                                                            S er ver /Lan Maint.
                                                                            Managem ent
 Server/Lan Maint.
                                                                            IMAC
      13.1%
                                                          On-Site Support   S /W Dist.
                H/W Maint.                                     17.9%
                   9.5%                  Infrastructure
                                              10.7%
Client computing TCO – indirect costs
Indirect Costs of client computing (in hours/month of end user time)
  (205.2 hr./yr @ $50/hr. = $10,260)

           Development of Personal Applications
                                 1                      Downtime
                 File & Data Management                    0.4
                              1.4
                      Formal Learning
                             0.7                                                  Peer Support
                                                                                       7.9



          Casual Learning & Self-support
                          5.7


                                                           P eer S uppor t
                                                           Casual Lear ning & S elf-suppor t
                                                           For m al Lear ning
                                                           File & Data Managem ent
                                                           Developm ent of P er sonal Applications
                                                           Downtim e
  source: Gartner Group
                The sources of data loss
    Incident rate is approx. 6% of devices per year

                                    Causes of Lost Data
                                            Hardware Destruction
                            Theft                 3.0%
                            9.0%
      Computer V iruses
          6.0%
                                                                   Hardware Failure   Ha rdware Fai lu re
                                                                       40.0%          Hu m a n Error
S oftware Corruption                                                                  So ftware Corrupti on
      13.0%                                                                           Co m p uter Vi rus e s
                                                                                      Th eft
                                                                                      Ha rdware Des truc ti on




                          Human E rror
                            29.0%




  source: "The Cost of Lost Data" by David Smith, Pepperdine Univ.
 Please raise your hand if you ever…
had trouble connecting to a wired or a wireless network at another IBM location or a hotel, etc.
(even with DHCP)?
lost a working network connection and called across the hall to ask if others had network connectivity?
have gone into the IP settings area in Windows and been confused about the correct settings?
tried pinging local servers, DNS servers, websites, etc. to isolate a connectivity problem?
had a client which starting performing improperly and had to be reset to an earlier configuration?
had a client which would no longer boot and needed major repair or re-installation of the OS?
had a client where the hard-drive crashed?
are confident that they will not face an HDD crash in the next 3 years?
could be back up and running (with all your applications and the vast majority of your data) in less
than 8 hours of work after an HDD crash or lost ThinkPad?
could completely migrate to a new PC (including all your personal applications, etc) with less than 8
hours of work?
have gone without a client for a pc for a week or two within the past year?
Potential Value of Autonomic Personal Computing
•   To the end user:
       –   Reduced conceptual load
       –   Improved capability
       –   Reduced user errors
       –   Faster technology adoption
       –   Reduced downtime and faster recovery
•   To the service provider
       –   Reduced cost
       –   Increased ability to meet Service Level Agreements
       –   Increased speed of deployment
       –   Increased customer satisfaction
•   To the enterprise
       –   Business data is better protected
       –   Increased adoption of computerized business processes
       –   Increased ease of remote access to business processes
       –   Increased employee productivity
       –   Reduced training costs
Autonomic Servers = Autonomic Clients
                  /


                                     Servers      Personal computers
                                     Hundreds     Thousands
                      Small set of applications   Open-ended set of applications
               Controlled, stable configuration   Less-controlled, dynamic configuration
          Fault tolerance through redundancy      Hardware redundancy not affordable
   Multiple OS instances through virtualization   One OS instance
                  Dedicated service processor     All management via main processor
                            Trained managers      Manager/users
                                Fixed location    Transportable or mobile
               Stable networking environment      dynamic and intermittent when mobile
Local, Peer and Global Autonomics
                 S's Remote
                                             Server S
                 Autonomic
                  Manager             S


                                                                           X


            W's Virtual
            Autonomic
             Manager

                                                             D                        E



    A's Autonomic
       Manager

                                                                       Peer group X

                                                                                 Autonomic
                                                                                  Manager

                                                                                  Virtual
     A                        B              C                                   resource

                                                                                 Physical
                                  Client B                                       computer

                                                        Peer group W            Peer group
     Hierarchy of Autonomicity
Exploit synergy between lightweight software clients and web
   Identify functions for clients and associated web services,
   e.g., location awareness, backup, ...
   Implement proactive management of client software and hardware
   using agents interacting with web-resident client management utilities
Develop clients that cost less to manage
                      Local autonomics
•   Installation, configuration and maintenance
       –   Image management – IBM ImageUltra
       –   Migration – IBM System Migration Assistant, Symantec Ghost
       –   Change management – XP Automatic Update, IBM Update Connector
       –   Break/fix – Windows Installer, support.com, IBM Rapid Restore PC
       –   Reduced downtime and faster recovery
•   Communications
       –   The IP suite
       –   ThinkPad Access Connections
•   Self-optimization
       –   Windows XP UI optimization
       –   Auto-defragmentation
•   Self-protection
       –   Backup
       –   Windows XP encrypted files
       –   IBM Embedded Security Subsystem
     Peer-assisted autonomics

•   Microsoft Windows Browse Master
       –   discovery
•   YouServ
       –   Peer knowledge publishing and access
•   JXTA peer platform
•   Grid
       –   Self-configuring
       –   Self-optimizing
    Grid with Desktop Resources
                      Discovery,
                      deployment,
          Z.. Z..     scheduling,
                      rebalancing
                                    Enterprise
                                    Computation
                      Grid




Z.. Z..
            Z.. Z..                    Z.. Z..
Using Desktop Resources To Build Enterprise
                  Grid
                                      RPC
                                     Router
                Grid Client
                 Requests
                                  Routing Table

                                Gateway                Virtual Grid
                                                       Server Pool




                               Grid Resource Manager

                                                                      App Servers

         VMMs

                                                                             Virtual
 Host                                                                       Machines
 Agent


                              Desktops
       Network-based autonomics
•   For communication
       –   Dynamic Host Configuration Protocol and Server
•   Backup services
•   Security audit services
•   Remote management services
•   Global grid services
•   Lots more!
            The Personal Configuration Engine
                                                      What do I
Co. needs                                            need it to do
                                                       for me?

             Input needs                                                         Explainer
past needs




                                                                                 Planner:
              Analysis:                                                          Choose
              characterize                                                       components,
                               Inventory
              inventory      interpretation
                                                                      Smart
                                                                                 options,
                                                                     Catalog     order

                              Autonomic
                               Readmes


                                                 PPE
                                                                               provisioners:
             hw, sw
                                              device to be                     hw ordering,
             inventory
                                              configured                       sw distribution,
             collection
                                                                               data replication
Autonomic Personal Computing Architecture
 •   Must respect strong local autonomy style of personal computing
        –   Portable/handheld computing => weak/no connectivity
 •   Must respect user’s role as platform manager
        –   Advice  guidance  visibility  automation
 •   Must provide standard ways of augmenting autonomic behavior
        –   Peer-assisted                                                         S
                                                                                         Server S



             –     Resources and knowledge                                                                         X


        –   Network-assisted                                    Virtual
                                                              Autonomic
                                                              Manager W



             –     Resources, knowledge and policy                                                       D                E

                                                        Autonomic
                                                        Manager A




 •   Our take: Web Services everywhere                   A                B              C
                                                                                                                   Peer group X




        –   Need asynchronous extensions                                      Client B
                                                                                                    Peer group W


        –   Need strong security
        –   Need options for local lightweight Web Services
        –   May need symmetrical relationships
                             Opportunities
•   The user interface to autonomic personal computing
       –   Respect user’s role as platform manager
       –   Hide autonomic actions that might cause conceptual overload
       –   Reveal (and ask for approval of) autonomic actions when necessary
•   Identifying and quantifying the value of autonomic personal computing
       –   What do you make autonomic first?
•   The appropriate role of local, peer and network-based autonomic management
       –   Respect local autonomy
       –   Cooperate but don’t snivel
       –   Push back when global management doesn’t make sense
•   Peer-based autonomics
       –   Solicit agreement
       –   Attain and act on consensus
•   The Autonomic Grid of PCs
       –   Deployment, recovery, partitioning, melding, …
•   Autonomics and security
       –   Detect danger and act autonomously
       –   Cooperative threat responses

				
DOCUMENT INFO
Shared By:
Categories:
Tags:
Stats:
views:15
posted:12/19/2011
language:
pages:19