3,187 research outputs found

    Towards critical event monitoring, detection and prediction for self-adaptive future Internet applications

    No full text
    The Future Internet (FI) will be composed of a multitude of diverse types of services that offer flexible, remote access to software features, content, computing resources, and middleware solutions through different cloud delivery models, such as IaaS, PaaS and SaaS. Ultimately, this means that loosely coupled Internet services will form a comprehensive base for developing value added applications in an agile way. Unlike traditional application development, which uses computing resources and software components under local administrative control, FI applications will thus strongly depend on third-party services. To maintain their quality of service, those applications therefore need to dynamically and autonomously adapt to an unprecedented level of changes that may occur during runtime. In this paper, we present our recent experiences on monitoring, detection, and prediction of critical events for both software services and multimedia applications. Based on these findings we introduce potential directions for future research on self-adaptive FI applications, bringing together those research directions

    Bipartite electronic SLA as a business framework to support cross-organization load management of real-time online applications

    No full text
    Online applications such as games and e-learning applications fall within the broader category of real-time online interactive applications (ROIA), a new class of ‘killer’ application for the Grid that is being investigated in the edutain@grid project. The two case studies in edutain@grid are an online game and an e-learning training application. We present a novel Grid-based business framework that makes use of bipartite service level agreements (SLAs) and dynamic invoice models to model complex business relationships in a massively scalable and flexible way. We support cross-organization load management at the business level, through zone migration. For evaluation we look at existing and extended value chains, the quality of service (QoS) metrics measured and the dynamic invoice models that support this work. We examine the causal links from customer quality of experience (QoE) and service provider quality of business (QoBiz) through to measured quality of service. Finally we discuss a shared reward business ecosystem and suggest how extended service level agreements and invoice models can support this

    Formulating and managing viable SLAs in cloud computing from a small to medium service provider's viewpoint: A state-of-the-art review

    Full text link
    © 2017 Elsevier Ltd In today's competitive world, service providers need to be customer-focused and proactive in their marketing strategies to create consumer awareness of their services. Cloud computing provides an open and ubiquitous computing feature in which a large random number of consumers can interact with providers and request services. In such an environment, there is a need for intelligent and efficient methods that increase confidence in the successful achievement of business requirements. One such method is the Service Level Agreement (SLA), which is comprised of service objectives, business terms, service relations, obligations and the possible action to be taken in the case of SLA violation. Most of the emphasis in the literature has, until now, been on the formation of meaningful SLAs by service consumers, through which their requirements will be met. However, in an increasingly competitive market based on the cloud environment, service providers too need a framework that will form a viable SLA, predict possible SLA violations before they occur, and generate early warning alarms that flag a potential lack of resources. This is because when a provider and a consumer commit to an SLA, the service provider is bound to reserve the agreed amount of resources for the entire period of that agreement – whether the consumer uses them or not. It is therefore very important for cloud providers to accurately predict the likely resource usage for a particular consumer and to formulate an appropriate SLA before finalizing an agreement. This problem is more important for a small to medium cloud service provider which has limited resources that must be utilized in the best possible way to generate maximum revenue. A viable SLA in cloud computing is one that intelligently helps the service provider to determine the amount of resources to offer to a requesting consumer, and there are number of studies on SLA management in the literature. The aim of this paper is two-fold. First, it presents a comprehensive overview of existing state-of-the-art SLA management approaches in cloud computing, and their features and shortcomings in creating viable SLAs from the service provider's viewpoint. From a thorough analysis, we observe that the lack of a viable SLA management framework renders a service provider unable to make wise decisions in forming an SLA, which could lead to service violations and violation penalties. To fill this gap, our second contribution is the proposal of the Optimized Personalized Viable SLA (OPV-SLA) framework which assists a service provider to form a viable SLA and start managing SLA violation before an SLA is formed and executed. The framework also assists a service provider to make an optimal decision in service formation and allocate the appropriate amount of marginal resources. We demonstrate the applicability of our framework in forming viable SLAs through experiments. From the evaluative results, we observe that our framework helps a service provider to form viable SLAs and later to manage them to effectively minimize possible service violation and penalties

    A methodology for maintaining trust in virtual environments

    Get PDF
    The increasing interest in carrying out business in virtual environments has resulted in much research and discussion of trust establishment between the entities involved. Researchers over the years have acknowledged that the success of any transaction or interaction via the virtual medium is determined by the trust level between trusting agent and trusted agent. Numerous publications have attempted to address the various challenges of assigning a trust level and building trust in an interacting party. However, the building and allocating a value of trust is neither easy nor quick. It involves high cost and effort. Hence, the ensuing research challenge is how to maintain the trust that has been established and assigned. Due to the dynamic nature of trust, the trust evolution, and the fragility of trust in virtual environments, one of the most pressing challenges facing the research community is how trust can be maintained over time. This thesis is an effort in that direction. Specifically, the objective of this thesis is to propose a methodology for trust maintenance in virtual environments which we term “Trust Maintenance Methodology” (TMM). The methodology comprises five frameworks that can be used to achieve the objective of trust maintenance.In order to achieve the aforesaid objective, this thesis proposes a: (a) Framework for third party agent selection, (b) Framework for Formalization and Negotiation of service requirements, (c) Framework for Proactive Continuous Performance Monitoring, (d) Framework for Incentive Mechanism, and (e) Framework for Trust Re-calibration.The framework for third party agent selection is used for choosing and selecting a neutral agent who will supervise the interaction between two parties. This is the first step of our methodology. The neutral agent is involved throughout the course of the interaction between two parties and takes a proactive-corrective role in continuous performance monitoring. Once both parties have chosen a neutral agent, they carry out a formalization and negotiation process of their service requirements using our proposed framework. This is in order to create an SLA which will guide the interaction between two parties. The framework for proactive continuous performance monitoring then can be used to evaluate the performance of both parties in delivering their service based on the SLA. If a performance gap occurs during the course of transaction, the third party agent will take action to help both parties close the performance gap in a timely manner. A key salient feature of our continuous performance monitoring is that it is proactive-corrective. Additionally, we design a framework for providing an incentive during the course of interaction to motivate both parties to perform as closely as possible to the terms of the mutual agreement or SLA. By the end of the interaction time space, both parties will be able to re-assess or re-calibrate their trust level using our proposed framework for trust re-calibration.Finally, in order to validate our proposed methodology, we engineered a multi-agent system to simulate the validity of the TMM. Numerous case studies are presented to elucidate the workings of our proposed methodology. Moreover, we run several experiments under various testing conditions including boundary conditions. The results of experiments show that our methodology is effective in assisting the parties to maintain their trust level in virtual environments

    Information Outlook, December 2006

    Get PDF
    Volume 10, Issue 12https://scholarworks.sjsu.edu/sla_io_2006/1011/thumbnail.jp

    Autonomous Agents for Business Process Management

    No full text
    Traditional approaches to managing business processes are often inadequate for large-scale organisation-wide, dynamic settings. However, since Internet and Intranet technologies have become widespread, an increasing number of business processes exhibit these properties. Therefore, a new approach is needed. To this end, we describe the motivation, conceptualization, design, and implementation of a novel agent-based business process management system. The key advance of our system is that responsibility for enacting various components of the business process is delegated to a number of autonomous problem solving agents. To enact their role, these agents typically interact and negotiate with other agents in order to coordinate their actions and to buy in the services they require. This approach leads to a system that is significantly more agile and robust than its traditional counterparts. To help demonstrate these benefits, a companion paper describes the application of our system to a real-world problem faced by British Telecom
    • 

    corecore