Abstract
We propose a framework for managing resources via convergent operators. Operators represent their need for a resource to a designated resource closure operator that manages the resource. We evaluate a specific design for a resource closure operator by simulation and demonstrate that the operator achieves a near-optimal balance between cost and value without using any model of the relationship between resources and behavior. Instead, the resource operator relies upon its control of the resource to perform experiments and react to their results. These experiments allow the operator to be highly adaptive to change and unexpected contingencies.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Burgess, M.: Configurable immunity for evolving human-computer systems. Science of Computer Programming 51, 197 (2004)
Burgess, M.: Computer immunology. In: Proceedings of the Twelth Systems Administration Conference (LISA XII), USENIX Association: Berkeley, CA, p. 283 (1998)
Burgess, M.: On the theory of system administration. Science of Computer Programming 49, 1 (2003)
Burgess, M.: Cfengine as a component of computer immune-systems. In: Proceedings of the Norwegian Conference on Informatics (1998)
Burgess, M.: A site configuration engine. Computing Systems 8(2), 309–337 (1995)
Burgess, M., Ralston, R.: Distributed resource administration using cfengine. Softw., Pract. Exper. 27(9), 1083–1101 (1997)
Burgess, M., Couch, A.: Autonomic computing approximated by fixed-point promises. In: Proceedings of the First IEEE International Workshop on Modeling Autonomic Communication Environments (MACE), pp. 197–222. Multicon Verlag (2006)
Couch, A.L., Chiarini, M.: Dynamic consistency analysis for convergent operators. In: Hausheer, D., Schönwälder, J. (eds.) AIMS 2008. LNCS, vol. 5127, pp. 148–161. Springer, Heidelberg (2008)
Couch, A.L., Chiarini, M.: A theory of closure operators. In: Hausheer, D., Schönwälder, J. (eds.) AIMS 2008. LNCS, vol. 5127, pp. 162–174. Springer, Heidelberg (2008)
Couch, A., Hart, J., Idhaw, E.G., Kallas, D.: Seeking closure in an open world: A behavioral agent approach to configuration management. In: LISA 2003: Proceedings of the 17th USENIX Conference on System Administration, Berkeley, CA, USA, pp. 125–148. USENIX (2003)
Schwartzberg, S., Couch, A.: Experience implementing a web service closure. In: LISA 2004: Proceedings of the 18th USENIX Conference on System Administration, Berkeley, CA, USA, pp. 213–230. USENIX (2004)
Wu, N., Couch, A.: Experience implementing an ip address closure. In: LISA 2006: Proceedings of the 20th USENIX Conference on System Administration, Berkeley, CA, USA, pp. 119–130. USENIX (2006)
Couch, A.: Summary of the third workshop on hot topics in autonomic computing (HotAC III). Login: Magazine 33(5), 112–113 (2008)
Hellerstein, J.L., Diao, Y., Parekh, S., Tilbury, D.M.: Feedback Control of Computing Systems. John Wiley & Sons, Chichester (2004)
Sauve, J., Moura, A., Sampaio, M., Jornada, J., Radziuk, E.: An introductory overview and survey of Business-Driven IT management. In: The First IEEE/IFIP International Workshop on Business-Driven IT Management (BDIM), pp. 1–10 (2006)
Moura, A., Sauve, J., Bartolini, C.: Research challenges of Business-Driven IT management. In: The Second IEEE/IFIP International Workshop on Business-Driven IT Management (BDIM), pp. 19–28 (2007)
R Development Core Team: R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria (2008) ISBN 3-900051-07-0
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 IFIP International Federation for Information Processing
About this paper
Cite this paper
Couch, A.L., Chiarini, M. (2009). Dynamics of Resource Closure Operators. In: Sadre, R., Pras, A. (eds) Scalability of Networks and Services. AIMS 2009. Lecture Notes in Computer Science, vol 5637. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02627-0_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-02627-0_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-02626-3
Online ISBN: 978-3-642-02627-0
eBook Packages: Computer ScienceComputer Science (R0)