Skip to main content
Log in

Retrofitting Autonomic Capabilities onto Legacy Systems

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

sec:abstractnak Autonomic computing—self-configuring, self-healing, self-managing applications, systems and networks—is a promising solution to ever-increasing system complexity and the spiraling costs of human management as systems scale to global proportions. Most results to date, however, suggest ways to architect new software designed from the ground up as autonomic systems, whereas in the real world organizations continue to use stovepipe legacy systems and/or build “systems of systems” that draw from a gamut of disparate technologies from numerous vendors. Our goal is to retrofit autonomic computing onto such systems, externally, without any need to understand, modify or even recompile the target system's code. We present an autonomic infrastructure that operates similarly to active middleware, to explicitly add autonomic services to pre-existing systems via continual monitoring and a feedback loop that performs reconfiguration and/or repair as needed. Our lightweight design and separation of concerns enables easy adoption of individual components for use with a variety of target systems, independent of the rest of the full infrastructure. This work has been validated by several case studies spanning multiple real-world application domains.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. IBM Research. Autonomic computing. http://www.research.ibm.com/autonomic..

  2. D.J. Smith, D. Schuff and St.R. Louis, Managing your total IT cost of ownership, Communications of the ACM, 45(1) (January 2002) 101–106.

    Google Scholar 

  3. A. Gonsalves, IBM releases blueprint for automated computing, TechWeb News, (April 4, 2003).

  4. IEEE. Autonomic computing workshop: Fifth annual international workshop on active middleware services, (June 2003).

  5. B.J. Feder, On the trailing edge of the arms industry, by Choice. The New York Times, (March 30, 2003).

  6. I. DeBare, Programmers in the driver's seat: Companies clamor for Year 2000 programmers. Dr. Dobb's Journal, (Spring 1998).

  7. V. Raijlich, N. Wilde, M. Buckellew and H. Page, Software cultures and evolution. IEEE Computer, Vol. 34(9) (Sep. 2001) 24–28.

    Google Scholar 

  8. G. Valetto, Orchestrating the dynamic adaptation of distributed software with process technology. PhD Thesis, Columbia University, (April 2004).

  9. S. Bekker, Microsoft error reporting drives bug efforts, ENT News, (October 3, 2002).

  10. SANS, what is host-based intrusion detection? Intrusion Detection FAQ, http://www.sans.org/resources/idfaq/host_based.php..

  11. LANDesk Software, LANDesk Management Software, http://www.landesksoftware.com/..

  12. J.L. Hellerstein, Y. Diao, S. Parekh and D. Tilbury, Feedback control of computing systems Wiley, (2004).

  13. G. Kaiser, P. Gross, G. Kc, J. Parekh and G. Valetto, An approach to autonomizing legacy systems. Workshop on self-healing, adaptive and self-managed systems, (June 2002).

  14. G. Valetto, and G. Kaiser, Using process technology to control and coordinate software adaptation. International Conference on Software Engineering, May 2003.

  15. G. Kaiser, J. Parekh, P. Gross and G. Valetto, Kinesthetics eXtreme: An external infrastructure for monitoring distributed legacy systems. Fifth Annual International Active Middleware Workshop, (June 2003).

  16. J. Salasin, DARPA DASADA Program, http://www.rl.af.mil/tech/programs/dasada/program-overview.html..

  17. D. Luckham, The power of events: An introduction to complex event processing in distributed enterprise systems. Addison-Wesley, (2002).

  18. G. Valetto, Orchestrating the dynamic adaptation of distributed software with process technology. PhD Thesis, Columbia University, (April 2004).

  19. C. Hagen and G. Alonso, Exception handling in workflow management systems. IEEE Transactions on Software Engineering, 26(10) (October 2000) 943–958.

    Google Scholar 

  20. A. Keromytis, J. Parekh, P.N. Gross, G. Kaiser, V. Misra, J. Nieh, D. Rubenstein and S. Stolfo, A holistic approach to service survivability. First ACM Workshop on Survivable and Self-Regenerative Systems, (October 2003) 11–22.

  21. G. Garlan, S.W. Cheng and B. Schmerl, Increasing system dependability through architecture-based self-repair. In de Lemos, R., Gacek, C. and Romanovsky (eds.), Architecting Dependable Systems, Springer-Verlag, (2003).

  22. D.L. Wells and P. Pazandak, Taming cyber incognito: Tools for surveying Dynamic/Reconfigurable software landscapes. Working conference on complex and dynamic systems architectures, (December 2001).

  23. P.N. Gross, S. Gupta, G.E. Kaiser, G.S. Kc and J.P. Parekh, An active events model for systems monitoring. Working conference on complex and dynamic systems architecture, (December 2001).

  24. B. Balzer, Probe technology adaptor design. (February 2001). http://schafercorp-ballston.com/dasada/2001WinterPI/ProbeTechnologyAdaptorDesign.ppt..

  25. B. Schmerl, A proposal for a DASADA gauge infrastructure. June 2001. http://www-2.cs.cmu.edu/afs/cs.cmu.edu/project/able/www/presentations/gauge.html..

  26. D.S. Rosenblum and A. L. Wolf, Survey: Internet scale event notification.” Workshop on internet scale event notication, (July 1998). http://www.isr.uci.edu/events/twist/wisen98/presentations/Rosenblum/Rosenblum.PPT..

  27. A. Carzaniga, D.S. Rosenblum and A.L. Wolf, Design and evaluation of a Wide-Area event notification service. ACM Transactions on Computer Systems, 19(3) (Aug. 2001) 332– 383.

    Article  Google Scholar 

  28. B. Segall, D. Arnold, J. Boot, M. Henderson and T. Phelps, Content-based routing with Elvin4. Australian UNIX and Open Systems User Group Winter Conference (AUUG2K), (June 2000).

  29. P. Gross, J. Parekh and G. Kaiser, Secure selecticast for collaborative intrusion detection systems. International Workshop on Distributed Event-Based Systems, (May 2004).

  30. G. Valetto, G.E. Kaiser and G. Kc, A mobile agent approach to process-based dynamic adaptation of complex software systems. Eighth European Workshop on Software Process Technology, LNCS 2077, (June 2001).

  31. G. Kaiser, A. Stone and S. Dossick, A mobile agent approach to lightweight process workflow. International Process Technology Workshop, (September 1999).

  32. Sun. Java management extensions (JMX). http://java.sun.com/products/JavaManagement/

  33. G. Heineman, P. Calnan, B. Kurtz, et. al. Active interface development environment (AIDE). http://www.cs.wpi.edu/∼heineman/dasada/..

  34. P. Pazandak and D. Wells, ProbeMeister: Distributed runtime software instrumentation. First international workshop on unanticipated software evolution, (June 2002).

  35. R.M. Balzer and N.M. Goldman, Mediating connectors: A non-bypassable process wrapping technology. DARPA Information Survivability Conference & Exposition, Vol. 2, (January 2000).

  36. S. Robertson, E.V. Siegel, M. Miller and S.J. Stolfo, Surveillance detection in high bandwidth environments. DARPA DISCEX III Conference, (April, 2003).

  37. D.L. Mills, Network time protocol. RFC 958. 1985. http://www.faqs.org/rfcs/rfc958.html..

  38. S. Wise, A.G. Cass, B.S. Lerner, E.K. McCall and L.J. Osterweil, Jr. S.M. Sutton, Using Little-JIL to coordinate agents in software engineering. Automated Software Engineering Conference, (September 2000).

  39. The workflow management coalition. http://www.wfmc.org/..

  40. Cougaar: An open source agent architecture for large-scale, Distributed multi-agent systems. http://www.cougaar.org/..

  41. D. Phung, G. Valetto, G. Kaiser, and S. Gupta, Optimizing quality for collaborative video viewing. Columbia University Department of Computer Science, CUCS-009-04, (April 2003). http://www.cs.columbia.edu/∼library/TR-repository/reports/reports-2004/cucs-009-04.pdf..

  42. J.R. Erenkrantz, Handling hierarchical events in an internet-scale event service, March 2001. http://www.ucf.ics.uci.edu/∼jerenk/siena-xml/SienaPaper.html..

  43. P.W. Gill, Probing for a continual validation prototype. MS Thesis, Worcester Polytechnic Institute, May 2001. http://www.wpi.edu/Pubs/ETD/Available/etd-0826101-235008/..

  44. W3C. SOAP Version 1.2 Part 1: Messaging Framework: W3C Recommendation 24 June 2003. http://www.w3.org/TR/2003/REC-soap12-part1-20030624/..

  45. Carnegie mellon university ABLE Group. DASADA gauge infrastructure. http://www-2.cs.cmu.edu/∼able/rainbow/gaugeinf.html

  46. ISI. GeoWorlds GIS system. http://www.isi.edu/geoworlds/..

  47. Sun. Jini technology. http://www.sun.com/software/jini/..

  48. Carnegie mellon university ABLE group. Acme architectural description language. http://www-2.cs.cmu.edu/∼acme/

  49. Carnegie mellon university ABLE Group. AcmeStudio development environment. http://www-2.cs.cmu.edu/∼acme/AcmeStudio/AcmeStudio.html..

  50. Sendmail Inc. Sendmail mail server, http://www.sendmail.org/..

  51. Sendmail Inc., Sendmail mail filter API, http://www.sendmail.com/partner/resources/development/milter_api/..

  52. SpamAssasin. Spam filter. http://www.spamassassin.org..

  53. B. Spitznagel and D. Garlan, A compositional formalization of connector wrappers. International Conference on Software Engineering, (May 2003).

  54. C. Geib, S. Vestal and P. Binns, Webpage for HTC's DASADA project. http://www.htc.honeywell.com/projects/DASADA/..

  55. N. Combs and J. Vagle, Adaptive mirroring of system of systems architectures. Workshop on Self-Healing Systems, (November 2002).

  56. J. Cobleigh, L. Osterweil, A. Wise and B. Lerner, Containment Units: A hierarchically composable architecture for adaptive systems. Tenth International Symposium on the Foundations of Software Engineering, (November 2002).

  57. A. Wolf, D. Heimbigner, J.C. Knight, P.T. Devanbu, M. Gertz, A. Carzaniga, Bend, Don't Break: Using Reconfiguration to Achieve Survivability. Third Information Survivability Workshop—ISW-2000, (October 2000).

  58. P. Oreizy, M. Gorlick, R.N. Taylor, D. Heimbigner, G. Johnson, N. Medvidovic, A. Quilici, D. Rosenblum and A. Wolf, An architecture-based approach to self-adaptive software. IEEE Intelligent Systems, 14(2):54-62, May/(June 1999).

    Google Scholar 

  59. R.N. Taylor, N. Medvidovic, K.M. Anderson, Jr. E.J. Whitehead, J.E. Robbins, K.A. Nies, P. Oreizy, and D.L. Dubrow, A component- and message-based architectural style for GUI software. IEEE Transactions on Software Engineering, 22(6) (June 1996) 390–406.

    Article  Google Scholar 

  60. R.van Renesse, K. Birman and W. Vogels, Astrolabe: A robust and scalable technology for distributed system monitoring, management, and data mining. ACM Transactions on Computer Systems, 21(2) (May 2003) 164–206.

    Article  Google Scholar 

  61. K. Birman, R.van Renesse and W. Vogels, Navigating in the storm: Using astrolabe for distributed self-configuration, monitoring and adaptation. Autonomic Computing Workshop, Fifth Annual International Workshop on Active Middleware Services, (June 2003).

  62. G. Candea and E. Kiciman, et. al. JAGR: An autonomous self-recovering application server. Autonomic Computing Workshop, Fifth Annual International Workshop on Active Middleware Services, (June 2003).

  63. OC Systems. Aprobe: A new approach for testing web applications. http://www.ocsystems.com/aprobe_web_testing.html

  64. OC Systems. Improving availability of enterprise applications with rootcause. http://www.ocsystems.com/rootcause_white_paper.html..

  65. System Management ARTS. http://www.smarts.com..

  66. A.V. Konstantinou, Y. Yemini and D. Florissi, Towards self-configuring networks. DARPA Active Networks Conference and Exposition (DANCE), (May 2002).

  67. A. Konstantinou, and Y. Yemini, Programming systems for autonomy. Autonomic Computing Workshop, Fifth Annual International Workshop on Active Middleware Services, (June 2003).

  68. R. Sterritt, C.M. Shapcott, K. Adamson and E.P. Curran, High speed network first-stage alarm correlator. International Conference on Intelligent Systems and Control, (2000).

  69. M. Steinder and A.S. Sethi, Probabilistic event-driven fault diagnosis through incremental hypothesis updating. IFIP/IEEE Symposium on Integrated Network Management, (2003).

  70. Internet Security Systems. RealSecure network protection. http://www.iss.net/products_services/enterprise_protection/rsnetwork/..

  71. Cisco. Cisco intrusion detection system. http://www.cisco.com/univercd/cc/td/doc/pcat/nerg.htm..

  72. W. Lee, S.J. Stolfo and P.K. Chan, Learning patterns from unix process execution traces for intrusion detection. AAAI-97 Workshop on AI Methods in Fraud and Risk Management, (1997).

  73. S.A. Yemini, S. Kliger, E. Mozes, Y. Yemini and D. Ohsie, High speed and robust event correlation. IEEE Communications Magazine, 34(5) (May 1996) 82–90.

    Article  Google Scholar 

  74. D.C. Luckham, and J. Vera, An event-based architecture definition language. IEEE Transactions on Software Engineering, 21(9) (September 1995) 717–734.

    Article  Google Scholar 

  75. Y. Zhao and R. Strom, Exploiting event stream interpretation in publish-subscribe systems. Principles of Distributed Computing, (2001).

  76. M. Rose, ed. RFC 1052: A convention for defining traps for use with the SNMP, (1991). http://www.ietf.org/rfc/rfc1215.txt..

  77. H. Kishimoto, A. Savva, and D. Snelling, OGSA fundamental services: Requirements for commercial GRID systems. Global Grid Forum Draft, (October 3, 2002).

  78. G. Deen, T. Lehman and J. Kaufman, The Almaden OptimalGrid Project. Autonomic Computing Workshop, Fifth Annual International Workshop on Active Middleware Services, June 2003.

  79. M. Agarwal, V. Bhat, et. al. automate: Enabling autonomic applications on the grid. Autonomic Computing Workshop, Fifth Annual International Workshop on Active Middleware Services, (June 2003).

  80. J. Magee, J. Kramer and M. Sloman, Constructing distributed systems in conic. IEEE Transactions on Software Engineering, 15(6) (June 1989) 663–675.

    Article  Google Scholar 

  81. C.R Hofmeister and J.M. Purtilo, Dynamic reconfiguration in distributed systems: Adapting software modules for replacement. Thirteenth International Conference on Distributed Computing Systems, (May 1993).

  82. F. Kon, R. Campbell, M.D. Mickunas, K. Nahrstedt and F.J. Ballesteros, 2K, A distributed operating system for dynamic heterogeneous environments. Ninth IEEE International Symposium on High Performance Distributed Computing, (August 2000).

  83. C. Poellabauer, K. Schwan, et. al. Service Morphing: Integrated system- and application-level service adaptation in autonomic systems. Autonomic Computing Workshop, Fifth Annual International Workshop on Active Middleware Services, (June 2003).

  84. N.H. Minsky, On conditions for self-healing in distributed software systems. Autonomic Computing Workshop, Fifth Annual International Workshop on Active Middleware Services, (June 2003).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Janak Parekh.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Parekh, J., Kaiser, G., Gross, P. et al. Retrofitting Autonomic Capabilities onto Legacy Systems. Cluster Comput 9, 141–159 (2006). https://doi.org/10.1007/s10586-006-7560-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-006-7560-6

Keywords

Navigation