Autonomic Networking: Fundamentals and Applications
By Fouad Sabry
()
About this ebook
What Is Autonomic Networking
The idea behind autonomous networking is similar to that of autonomous computing, which was initially introduced by IBM in 2001 as an initiative. The long-term objective is to design networks that are capable of managing themselves, which will enable the Internet and other networks to continue expanding well beyond their current scale in order to meet the challenges posed by the Internet's continuously increasing complexity.
How You Will Benefit
(I) Insights, and validations about the following topics:
Chapter 1: Autonomic networking
Chapter 2: Autonomic computing
Chapter 3: Simple Network Management Protocol
Chapter 4: Provisioning (technology)
Chapter 5: FCAPS
Chapter 6: Policy-based management
Chapter 7: Network Access Control
Chapter 8: Attribute-based access control
Chapter 9: Software-defined protection
Chapter 10: Information security
(II) Answering the public top questions about autonomic networking.
(III) Real world examples for the usage of autonomic networking in many fields.
(IV) 17 appendices to explain, briefly, 266 emerging technologies in each industry to have 360-degree full understanding of autonomic networking' technologies.
Who This Book Is For
Professionals, undergraduate and graduate students, enthusiasts, hobbyists, and those who want to go beyond basic knowledge or information for any kind of autonomic networking.
Related to Autonomic Networking
Titles in the series (100)
Artificial Neural Networks: Fundamentals and Applications for Decoding the Mysteries of Neural Computation Rating: 0 out of 5 stars0 ratingsRecurrent Neural Networks: Fundamentals and Applications from Simple to Gated Architectures Rating: 0 out of 5 stars0 ratingsBio Inspired Computing: Fundamentals and Applications for Biological Inspiration in the Digital World Rating: 0 out of 5 stars0 ratingsRadial Basis Networks: Fundamentals and Applications for The Activation Functions of Artificial Neural Networks Rating: 0 out of 5 stars0 ratingsFeedforward Neural Networks: Fundamentals and Applications for The Architecture of Thinking Machines and Neural Webs Rating: 0 out of 5 stars0 ratingsConvolutional Neural Networks: Fundamentals and Applications for Analyzing Visual Imagery Rating: 0 out of 5 stars0 ratingsLong Short Term Memory: Fundamentals and Applications for Sequence Prediction Rating: 0 out of 5 stars0 ratingsGroup Method of Data Handling: Fundamentals and Applications for Predictive Modeling and Data Analysis Rating: 0 out of 5 stars0 ratingsK Nearest Neighbor Algorithm: Fundamentals and Applications Rating: 0 out of 5 stars0 ratingsArtificial Immune Systems: Fundamentals and Applications Rating: 0 out of 5 stars0 ratingsArtificial Intelligence Systems Integration: Fundamentals and Applications Rating: 0 out of 5 stars0 ratingsAlternating Decision Tree: Fundamentals and Applications Rating: 0 out of 5 stars0 ratingsHopfield Networks: Fundamentals and Applications of The Neural Network That Stores Memories Rating: 0 out of 5 stars0 ratingsAttractor Networks: Fundamentals and Applications in Computational Neuroscience Rating: 0 out of 5 stars0 ratingsStatistical Classification: Fundamentals and Applications Rating: 0 out of 5 stars0 ratingsCompetitive Learning: Fundamentals and Applications for Reinforcement Learning through Competition Rating: 0 out of 5 stars0 ratingsMultilayer Perceptron: Fundamentals and Applications for Decoding Neural Networks Rating: 0 out of 5 stars0 ratingsHebbian Learning: Fundamentals and Applications for Uniting Memory and Learning Rating: 0 out of 5 stars0 ratingsNouvelle Artificial Intelligence: Fundamentals and Applications for Producing Robots With Intelligence Levels Similar to Insects Rating: 0 out of 5 stars0 ratingsRestricted Boltzmann Machine: Fundamentals and Applications for Unlocking the Hidden Layers of Artificial Intelligence Rating: 0 out of 5 stars0 ratingsPerceptrons: Fundamentals and Applications for The Neural Building Block Rating: 0 out of 5 stars0 ratingsNeuroevolution: Fundamentals and Applications for Surpassing Human Intelligence with Neuroevolution Rating: 0 out of 5 stars0 ratingsSituated Artificial Intelligence: Fundamentals and Applications for Integrating Intelligence With Action Rating: 0 out of 5 stars0 ratingsNaive Bayes Classifier: Fundamentals and Applications Rating: 0 out of 5 stars0 ratingsAgent Architecture: Fundamentals and Applications Rating: 0 out of 5 stars0 ratingsCognitive Architecture: Fundamentals and Applications Rating: 0 out of 5 stars0 ratingsEmbodied Cognitive Science: Fundamentals and Applications Rating: 0 out of 5 stars0 ratingsBackpropagation: Fundamentals and Applications for Preparing Data for Training in Deep Learning Rating: 0 out of 5 stars0 ratingsMonitoring and Surveillance Agents: Fundamentals and Applications Rating: 0 out of 5 stars0 ratingsSupport Vector Machine: Fundamentals and Applications Rating: 0 out of 5 stars0 ratings
Related ebooks
Autonomic Computing: Fundamentals and Applications Rating: 0 out of 5 stars0 ratingsMulti Agent System: Fundamentals and Applications Rating: 0 out of 5 stars0 ratingsComputer Science Self Management: Fundamentals and Applications Rating: 0 out of 5 stars0 ratingsHierarchical Control System: Fundamentals and Applications Rating: 0 out of 5 stars0 ratingsRule Based System: Fundamentals and Applications Rating: 0 out of 5 stars0 ratingsMeans Ends Analysis: Fundamentals and Applications Rating: 0 out of 5 stars0 ratingseMaintenance: Essential Electronic Tools for Efficiency Rating: 0 out of 5 stars0 ratingsExpert System: Fundamentals and Applications for Teaching Computers to Think like Experts Rating: 0 out of 5 stars0 ratingsCommunications for Control in Cyber Physical Systems: Theory, Design and Applications in Smart Grids Rating: 0 out of 5 stars0 ratingsDistributed Artificial Intelligence: Fundamentals and Applications Rating: 0 out of 5 stars0 ratingsMastering Applied Observability: Empowering Your Business with Continuous Insights Rating: 0 out of 5 stars0 ratingsLearning Software Architecture Rating: 0 out of 5 stars0 ratingsEstimation and Control of Large-Scale Networked Systems Rating: 0 out of 5 stars0 ratingsFace Detection and Recognition on Mobile Devices Rating: 1 out of 5 stars1/5Transaction Processing: Concepts and Techniques Rating: 4 out of 5 stars4/5Action Election: Fundamentals and Applications Rating: 0 out of 5 stars0 ratingsHuman-Machine Interface Design for Process Control Applications Rating: 4 out of 5 stars4/5Knowledge Reasoning: Fundamentals and Applications Rating: 0 out of 5 stars0 ratingsCyber-Physical Attacks: A Growing Invisible Threat Rating: 4 out of 5 stars4/5Conceptual Dependency Theory: Fundamentals and Applications Rating: 0 out of 5 stars0 ratingsEnvironment Modeling-Based Requirements Engineering for Software Intensive Systems Rating: 0 out of 5 stars0 ratingsProcess Safety and Big Data Rating: 0 out of 5 stars0 ratings“Exploring Computer Systems: From Fundamentals to Advanced Concepts”: GoodMan, #1 Rating: 0 out of 5 stars0 ratingsAccelerated DevOps with AI, ML & RPA: Non-Programmer’s Guide to AIOPS & MLOPS Rating: 5 out of 5 stars5/5Introduction to Reliable and Secure Distributed Programming Rating: 0 out of 5 stars0 ratingsMobile Agents in Networking and Distributed Computing Rating: 0 out of 5 stars0 ratingsIan Talks Hacking A-Z Rating: 0 out of 5 stars0 ratingsArtificial Intelligence Systems Integration: Fundamentals and Applications Rating: 0 out of 5 stars0 ratingsData Analytics And Knowledge Management Rating: 0 out of 5 stars0 ratingsSystems and Software Variability Management: Concepts, Tools and Experiences Rating: 0 out of 5 stars0 ratings
Intelligence (AI) & Semantics For You
101 Midjourney Prompt Secrets Rating: 3 out of 5 stars3/5AI for Educators: AI for Educators Rating: 5 out of 5 stars5/5A Quickstart Guide To Becoming A ChatGPT Millionaire: The ChatGPT Book For Beginners (Lazy Money Series®) Rating: 4 out of 5 stars4/5Mastering ChatGPT: 21 Prompts Templates for Effortless Writing Rating: 5 out of 5 stars5/5Midjourney Mastery - The Ultimate Handbook of Prompts Rating: 5 out of 5 stars5/5Creating Online Courses with ChatGPT | A Step-by-Step Guide with Prompt Templates Rating: 4 out of 5 stars4/5ChatGPT For Fiction Writing: AI for Authors Rating: 5 out of 5 stars5/5Chat-GPT Income Ideas: Pioneering Monetization Concepts Utilizing Conversational AI for Profitable Ventures Rating: 4 out of 5 stars4/5Artificial Intelligence: A Guide for Thinking Humans Rating: 4 out of 5 stars4/5The Secrets of ChatGPT Prompt Engineering for Non-Developers Rating: 5 out of 5 stars5/5ChatGPT For Dummies Rating: 0 out of 5 stars0 ratingsMastering ChatGPT: Unlock the Power of AI for Enhanced Communication and Relationships: English Rating: 0 out of 5 stars0 ratingsDancing with Qubits: How quantum computing works and how it can change the world Rating: 5 out of 5 stars5/5What Makes Us Human: An Artificial Intelligence Answers Life's Biggest Questions Rating: 5 out of 5 stars5/5THE CHATGPT MILLIONAIRE'S HANDBOOK: UNLOCKING WEALTH THROUGH AI AUTOMATION Rating: 5 out of 5 stars5/5TensorFlow in 1 Day: Make your own Neural Network Rating: 4 out of 5 stars4/5ChatGPT for Marketing: A Practical Guide Rating: 3 out of 5 stars3/5Ways of Being: Animals, Plants, Machines: The Search for a Planetary Intelligence Rating: 4 out of 5 stars4/5ChatGPT Ultimate User Guide - How to Make Money Online Faster and More Precise Using AI Technology Rating: 0 out of 5 stars0 ratingsChatGPT Rating: 1 out of 5 stars1/52084: Artificial Intelligence and the Future of Humanity Rating: 4 out of 5 stars4/5Dark Aeon: Transhumanism and the War Against Humanity Rating: 5 out of 5 stars5/5
Reviews for Autonomic Networking
0 ratings0 reviews
Book preview
Autonomic Networking - Fouad Sabry
Chapter 1: Autonomic networking
The idea behind autonomous networking is similar to that of autonomous computing, which was initially introduced by IBM in 2001 as an initiative. Its ultimate goal is to create networks that are capable of self-management in order to combat the rapidly increasing complexity of the Internet and other networks, and to enable the expansion of these networks well beyond the size they are at present.
Some industry experts believe that the ever-increasing management complexity of the Internet, which is caused by its rapid growth, is a major problem that will limit its usability in the future.
In addition, devices such as smartphones, personal digital assistants (PDAs), audio and video equipment that is connected to the internet, and gaming consoles have to be interconnected. Not only does pervasive computing add new features, but it also loads the existing networking infrastructure with an increasing number of new tasks. Eventually, these new responsibilities will be too much for human intervention alone to handle.
The cost of manually controlling a large number of devices that are critically important in today's network infrastructures is another important factor to consider.
The portion of the nervous system in higher life forms that is not under the direct control of the conscious mind is referred to as the autonomic nervous system (ANS). It controls the activity of particular organs and the functions of the body as a whole. According to a suggestion made by IBM, the architecture of future communication systems might be modeled after that of the ANS.
Because the study of autonomics is conceptually derived from biological entities such as the autonomic nervous system of the human body, each of the subfields can be metaphorically related to the structural and functional components of a living being. The autonomic nervous system is responsible for facilitating and regulating a wide range of functions in the human body. These functions include breathing, blood pressure and circulation, and emotional response. The autonomic nervous system is the connecting fabric that supports feedback loops between internal states and various sources, which are used for monitoring both internal and external conditions.
The term autognostics
refers to a variety of self-discovery, awareness, and analysis capabilities that give the autonomic system a perspective on its overall state at a high level. This is a metaphor for the perceptual subsystems that collect, analyze, and report on internal and external states and conditions. For instance, this could be interpreted as the system's eyes, visual cortex, and other perceptual organs. The autonomic nervous system is provided with a basis for response and validation by autognostics, which can also be translated as self-knowledge.
.
A sophisticated autognostic capability might involve the use of a wide variety of perceptual senses.
For instance, the human body collects information through its traditional five senses, through the so-called sixth sense of proprioception (the sense of body position and orientation), and through emotional states that are representative of the overall health of the body. Sensory monitors are able to pick up on shifting conditions and states as they occur, which provides the foundation for related systems to adapt to new circumstances. It is possible to assign a relative value to any perceived state because such a system includes embedded models of both the internal and the external environments. For example, a perceived physical threat (such as a snake) can cause rapid shallow breathing related to the fight-or-flight response, which is a phylogenetically effective model of interaction with recognizable threats.
When autonomic networking is used, the state of the network may be determined by inputs from a variety of sources:
individual components of a network, such as switches and interfaces between networks, for example
specification and configuration
records from the past and the present situation
traffic flows
end-hosts
application performance data
logical diagrams and design specifications
The majority of these sources offer perspectives that are relatively unrefined and unprocessed and have little bearing on the topic at hand. Post-processing and numerous forms of analysis are required in order to generate meaningful measurements and evaluations, which are then used as a benchmark against which to derive the current state.
The autognostic system is designed to work in conjunction with:
management of configuration — to exercise authority over network components and interfaces
Policy management is the process of defining performance goals and limitations.
Autodefense is the process of recognizing threats and modifying one's behavior to counteract the effects of defensive measures.
The interaction with different network elements and interfaces is the responsibility of the configuration management system. It comes with an accounting capability that has a historical perspective and allows for the tracking of configurations over time, taking into account a variety of different circumstances. In terms of the biological analogy, these components represent the hands and, to a certain extent, the memory of the autonomic system.
Remediation and provisioning are carried out on a network by adjusting the configuration settings of individual devices. In addition, applications include implementations that affect access and selective performance with regard to role and relationship. This domain encompasses the vast majority of the actions
that are currently being carried out by human engineers. Interfaces are, with very few notable exceptions, either set by hand or, alternatively, by an extension of the hand using automated scripts.
The maintenance of a dynamic population of devices under management, a historical record of changes, and the directives that invoked change are all necessary parts of the configuration process, and they are both implicit in the process. Configuration management, like many other accounting functions, should be able to operate on devices and then roll back changes to recover previous configurations. This is typical of accounting functions. The subsystem should be able to qualify the consequences of changes before they are issued if there is a possibility that the changes will lead to states that are not recoverable.
The shared language for change directives needs to be abstracted from the specifics of the devices that are involved because change directives must originate from other subsystems. Either the configuration management subsystem must be able to translate unambiguously between directives and hard actions or it must be able to signal the need for further detail on a directive. Both of these capabilities are required. It's possible that an inferential capacity would be useful for supporting sufficient flexibility (i.e. configuration never takes place because there is no unique one-to-one mapping between directive and configuration settings). In situations where standards are not adequate, a capacity for learning may also be necessary in order to acquire new knowledge of devices and the configurations they use.
The configuration management system communicates and collaborates with each and every one of the other subsystems, including:
autognostics is the process by which one obtains guidance and validation regarding changes.
management of policies is responsible for putting policy models into action by mapping to underlying resources.
security — the process of applying access and authorization constraints to specific policy targets
autodefense - is given instructions for making adjustments
Policy management encompasses a wide range of activities, including policy specification and deployment, as well as reasoning about policies, policy updating and maintenance, and policy enforcement. It is necessary to use policy-based management for:
putting limits on a variety of behaviors, including those pertaining to security, privacy, resource access, and collaboration
configuration management
defining performance standards and providing a description of business processes
establishing trust and a reputation, in addition to determining roles and relationships
It offers models