Pipeline Publishing, Volume 4, Issue 3
This Month's Issue:
download article in pdf format
last page next page

Autonomic Networks - Autonomic Communication

back to cover
article page | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 |

eventually be connected to the network or be within range of a monitoring sensor that is networked (in archetype, Vint Cerf’s smart toaster.) Ubiquitous Networks refers to the interconnection of every network on the planet, such that every person is always connected at any location and any service is instantly available via trans-network communications. It is this complex future - which demands autonomic networks, for this rapidly arriving future is unmanageable by traditional approaches. The EU seems to understand this and is the largest investor into public AN research.

Today, IMS is a policy-controlled architecture, and when it becomes incorporated with grids, will form bridging steps in the direction towards autonomic networks.

Journal of Computer Science (ISSN: 1549-3636) on "Reliability and Autonomic Management". The charter of the issues captures the broad structure of current thinking on autonomic systems.

“Most computer systems become
Co-evolution of Computer and Network

While we tend to separate computers and networks as different areas of study during college, and then partition them as careers later on, the design and function of computers and networks are more similar than different. This separation of network and computer is based on the historical separation of voice and data, and perhaps even more so on ‘large and small’ in scientific inquiry – a classic approach that partitions fields of study and activity. However, both computers and networks are systems and as such are governed by many of the same principles of systems engineering, information theory, and electronics. Computers and networks have co-evolved from the start. Sun Microsystems summed it up with the classic corporate slogan: “The network is the computer.” The scientific revolution that is following on the growth of Complexity Science involves a different way of seeing the world. Instead of separating large from small, Complexity Science shows us how all layers follow similar organizational principles – that each layer reflects the same structure of behavior as the layer above and below. Today, in the study of autonomics, the boundaries of computer and network are particularly indistinct and the academic communities work in tandem. AN networks are designed so that each layer reflects those above and below.

Science Publications (www.scipub.org), New York, in 2006 planned a Special Issue for The

increasingly large and complex, thereby compounding many reliability problems. Too often computer systems fail, become compromised, or perform poorly. To improve the system reliability, one of the most interesting methods is the Autonomic Management which offers a potential solution to these challenging research problems. It is inspired by nature and biological systems (such as the autonomic nervous system) that have evolved to cope with the challenges of scale, complexity, heterogeneity and unpredictability by being decentralized, context aware, adaptive and resilient. This new era of computing is driven by the convergence of biological and digital computing systems and is characterized by being self defining, self-configuring, self-optimizing, self-protecting, self-healing, context aware and anticipatory.”

This quote could be speaking of autonomic networks instead of autonomic computing. These same self-* characteristics are considered the principal characteristics of AN. Indeed, the more we study them, there becomes very little separation between autonomic computing and AN. The service provider of the future will not be a telecom company, software company, or a computer company – but a fusion of the three.

article page | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 |
last page back to top of page next page

© 2006, All information contained herein is the sole property of Pipeline Publishing, LLC. Pipeline Publishing LLC reserves all rights and privileges regarding
the use of this information. Any unauthorized use, such as copying, modifying, or reprinting, will be prosecuted under the fullest extent under the governing law.