Selection of Web Services for Composition Using Location of Provider Hosts Criterion
|
|
|
- Brenda Cox
- 10 years ago
- Views:
Transcription
1 Selection of Web Services for Composition Using Location of Provider Hosts Criterion Zakaria Maamar 1, Quan Z. Sheng 2, and Boualem Benatallah 2 1 College of Information Systems Zayed University, Dubai, U.A.E [email protected] 2 School of Computer Science & Engineering The University of New South Wales, Sydney, Australia {qsheng,boualem}@cse.unsw.edu.au Abstract. We present a Web service composition approach that relies on three selection criteria: execution cost, execution time, and location of provider hosts. A Web service is an accessible application that can be automatically discovered and invoked by other applications and humans. Web services can be composed into high level business-processes that users trigger in order to satisfy their needs. Because providers can have Web services in common, criteria are needed to select which Web services will be considered for composition. Location of provider hosts is among these criteria and aims for example at reducing the number of remote interactions between provider hosts. 1 Introduction Nowadays, several businesses are adopting for their operation Web-based solutions, aiming for more process automation and more worldwide visibility. Thanks to the Web technology, users from over the world can satisfy their needs by browsing and triggering the services of these businesses. Such services are usually known as Web services [1]. The advantages of Web services have already been demonstrated in various projects [1] and highlight their capacity to be composed into high-level business processes. For example, a summer vacation business process calls for the collaboration of at least four Web services: flight reservation, accommodation booking, attraction searching, and user notification. These Web services have to be connected according to a certain flow of control (first flight reservation and then accommodation booking and attraction searching). Multiple technologies are associated with the success of Web services including WSDL, UDDI, and SOAP [4]. These technologies aim at supporting the definition of Web services, their advertisement, and their binding for triggering purposes. With the progress of the telecommunication technologies, new Web services are devised for the benefit of persons who are most of the time on the move (e.g., sales representatives). These persons heavily rely on mobile devices (e.g. PDAs) to conduct their daily operations. M-services (M for Mobile) denote these new Web services [6] and are meant to be either 1) executed remotely from mobile devices or 2) transferred through a wireless channel from their host to mobile devices on which their execution is performed.
2 In general, composing multiple services 1 rather than accessing a single service is essential and provides benefits to users. Discovering the component services, inserting the services into a composite service, triggering the composite service and its component services for execution, and monitoring the execution of the composite service are among the operations that users will have to be in charge. Most of these operations are complex, although repetitive with a large segment suitable to computer aid and automation. Therefore, Software Agents (SAs) are deemed appropriate to assist users in their operations [7]. SAs are autonomous entities that act on behalf of users, make decisions, interact with other agents, and migrate to provider hosts if needed. The identification of the component services to constitute a composite service is basically a process that relies on the use of selection criteria. Execution cost, execution time, reliability, and reputation, just to cite a few are among the selection criteria that have commonly been used in various projects. In this paper, we consider location of provider hosts as another criterion that is worthwhile to integrate in the selection process of services. Provider hosts are associated with computing resources on top of which services are executed. By gathering the maximum number of services for execution in the same provider host 2, the following advantages can be obtained: 1) remote interactions between provider hosts can be reduced, 2) migrations of agents to provider hosts can be avoided, and 3) remote exchange of data between provider hosts can be reduced, too. In this paper, we aim at presenting a service composition approach that uses the location of provider host as a major selection criterion. Section 2 overviews Web services. The agentification of an environment of Web services is presented in Section 3. Section 4 discusses the preparation of services for composition. Section 5 presents our ongoing work. Finally, Section 6 overviews related work and draws our conclusions. It is made clear at that level that the mechanisms for discovering the component services of a composite service, while important, do not fall within the scope of this paper. 2 Web services A Web service is an accessible application that can be automatically discovered and invoked by other applications (and humans as well). An application is a Web service if it is [2]: 1) independent as much as possible from specific platforms and computing paradigms; 2) developed mainly for inter-organizational situations rather than for intra-organizational situations; and 3) easily composable (i.e., its composition with other Web services does not require the development of complex adapters). Maamar et al. introduce M-services as a specific type of Web services [5]. Two definitions are associated with an M-service. The weak definition is to remotely trigger a Web service from a mobile device for execution. In that case, the Web 1 In the rest of this paper, Web service and service are interchangeably used. 2 It is assumed that this host has the capabilities to meet the execution requirements of the services.
3 service is an M-service. The strong definition is to transfer a Web service through a wireless channel from its hosting site to a mobile device where its execution takes place. In that case, the Web service is an M-service that is: 1) transportable through wireless networks; 2) composable with other M-services; 3) adaptable according to the computing features of mobile devices; and 4) runnable on mobile devices. In this paper, we only consider the M-services that comply with the weak definition. The M-services that comply with the strong definition have been considered elsewhere [5]. In the rest of this paper, The term composite service (C-service) denotes the list of component services, whether composite services or primitive services (P-services), that are involved in a composition. A C-service is deployed in two different versions: composite Web service for users of fixed devices and composite M-service for users of mobile devices. A P-service always refers to a Web service. A P-service can be invoked for execution either remotely or locally. 3 Agentification of an environment of Web services For the agentification needs of an environment of services, we decided to deploy a multi-domain architecture (Fig. 1). Compared to hosting sites, domains are spread across the network and administrators manage them. Two types of domain exist: user-domain and provider-domain. We assume the existence of one user-domain (independently of the issues of bottleneck or single point of failure) and several provider-domains. A domain is a computing platform on top of which portal of services are deployed and also agents undertake their operations. Basically, two types of software agents have been considered during the agentification process. User-agents act on behalf of users. And, provider-agents act on behalf of providers announcing their services to users. Users browse the portal of C-services from different devices: fixed devices such as desktops and mobile devices such as PDAs. The deployment of a C-service is not affected by the type of the device from which it is launched. The only difference occurs at the communication protocol that connects users to the portal of C-services. For users of fixed devices, HTTP is the protocol. For users of mobile devices, WAP is the protocol. In Fig. 1, the user-domain has two zones: service-zone and working-zone. The service-zone has a dedicated portal from which C-services are managed in terms of specification, development, and deployment. The service-zone of the userdomain has also a pool from which user-agents are created. For their installation, user-agents are located in the working-zone of the user-domain. User-agents are mobile and thus, have the ability to migrate from one domain to another based on the strategy that will be adopted for invoking services (Section 4). For each C-service that a user selects, a user-agent is associated with that C-service for performance purposes.
4 A provider-domain consists of a working-zone and several portals of P-services. Each portal is related to a category of P-services such as education and travel. The working-zones receive user-agents arriving from the user-domain or from other provider-domains. Within these working-zones, installation and control procedures of user-agents are executed. Portals of provider-domains are associated with provider-agents that handle the invocation requests that user-agents submit to the P-services. A user-agent submits a local request to a provider-agent in case both agents reside in the same provider-domain. This means that the useragent has migrated to that provider-domain; the user-agent arrives either from the user-domain or from a different provider-domain. In case the user-agent and provider-agent are in separate domains, the user-agent submits a remote request to the provider-agent so, a P-service can be executed. Users HTTP WAP Portal of C-services User-domain Administrator Service-zone Working-zone User-agents Bank of user-agents Remote interaction Migration Provider-domain 1 Working-zone Local interaction Portal 11 of P-services Portal 12 of P-services Administrator Migration Remote interaction Provider-domain 2 Working-zone Portal 21 of P-services Administrator Provider-domain 3 Provider-domain 4 Provider-agent User-agent Network P: Primitive C: Composite Fig. 1. Agent-based multi-domain architecture 4 Composition of Web services For any C-service, the preparation of its component P-services for composition is based on three selection criteria: execution time, execution cost, and location of provider hosts (provider hosts correspond to provider-agents associated with their provider-domain). The first two selection criteria are intimately related to a P-service. The third selection criterion aims at gathering in the same providerdomain the maximum number of P-services for execution, reducing 1) the number of remote interactions between domains, 2) the number of migrations of user-agents to domains, and 3) the number of data transfer between domains. The ranking of domains is conducted as follows. First, the domain of where a
5 service is being executed is considered. By selecting this domain, remote data exchanges between services are avoided. Next, the domain of where the useragent resides now is considered. By selecting this domain, local invocations of services as well as local data exchanges between services are enabled. Finally, in case none of the aforementioned cases happens, any other domain is considered. 4.1 Definitions A C-service is an ordered set of component P-services i = 1,, n. Each P-service i is offered by several provider-agents j = 1,, m. In the preparation process, the user-agent aims at reaching two goals: associate a P-service p.s i with a provideragent pro.agt j, and define the strategy of invoking the P-service p.s i (remotely or locally). Let us assume a C-service CS of p P-services, CS = {p.s 1, p.s 2,, p.s p }. A deployment of the C-service CS aims at defining the set {< p.s 1, pro.agt 1, type >, < p.s 2, pro.agt 2, type >,, < p.s p, pro.agt p, type >} where p i=1 p.s i = CS and for each < p.s i, pro.agt i, type > (i [1,p]) the P-service p.s i is provided by the provider-agent pro.agt i and invoked according to remote or local type. It should be noted that the number of provider-agents that contribute to the deployment of a C-service CS is not necessarily equal to the number of P-services that are involved. Certain provider-agents may contribute to a C-service with more that one P-service (e.g., < p.s 1, pro.agt 1, type > and < p.s 2, pro.agt 1, type >). Given a P-service p.s i, its execution cost is decomposed into two parts: Remote.Cost(p.s i ) includes 1) the cost of establishing a communication link between the domain of the user-agent and the domain of the provider-agent of the P-service p.s i, plus 2) the cost of performing the P-service p.s i, plus 3) the cost of returning the results from the domain of the provider-agent to the domain of the user-agent. Local.Cost(p.s i ) includes 1) the cost of transferring the user-agent from the domain in which it is currently located to the domain of the provider-agent of the P-service p.s i, plus 2) the cost of performing the P-service p.s i. Therefore, the execution cost Cost(CS) of a C-service CS is the sum of the costs of all the P-services, Cost(CS) = p i=1 (Remote.Cost(p.s i) Local.Cost(p.s i )). The execution cost of a P-service p.s i is either a remote cost or a local cost. Given a P-service p.s i, the execution time T ime(p.s i ) does not depend on the invocation strategy (i.e., local or remote). Therefore, the execution time T ime(cs) of a C-service CS is the sum of The execution times of all the P-services ( p i=1 T ime(p.s i)); Plus, the estimated communication time of triggering the first P-service (T ime(cs, p.s 1 )) after the C-service CS has been initiated; Plus, the estimated communication time of triggering the next P-service p.s i+1 after the execution of the current P-service p.s i is completed
6 ( p 1 i=1 (Remote.T ime(p.s i, p.s i+1 ) Local.T ime(p.s i, p.s i+1 ))). The communication time handles the case of whether the next P-service p.s i+1 will be locally or remotely triggered. It is expected that the time of locally triggering a next P-service to be neglected because of the small duration (Local.T ime(p.s i, p.s i+1 ) 0). 4.2 Preparation process The preparation process to deploy a C-service CS is decomposed into two phases. Phase 1 consists of searching for the provider-agents that have the P-services. Because provider-agents can have P-services in common, Phase 2 consists of selecting a specific provider-agent based on the criteria of execution time, execution cost, and location of provider hosts. Phase 1: Search for provider-agents As stated in Section 1, through appropriate discovering mechanisms the provider-agents that offer the P-service p.s i are known to the user-agent that handles the execution of a C-service. For each P-service p.s i, a set of potential provider-agents exists. This is similar to < p.s i, P RO.AGT i, type > where P RO.AGT i = {pro.agt 1,, pro.agt n } is the list of provider-agents that have the P-service p.s i in common. In the example of CS = {p.s 1, p.s 2,, p.s p }, the following situations can occur < p.s 1, P RO.AGT 1, type >: P RO.AGT 1 = {pro.agt 1, pro.agt 2, pro.agt 3 }. < p.s 2, P RO.AGT 2, type >: P RO.AGT 2 = {pro.agt 2, pro.agt 4 }. Phase 2: Definition of < p.s i, pro.agt i, type > Because several provider-agents can have P-services in common (P RO.AGT 1 = {pro.agt 1, pro.agt 2, pro.agt 3 }), the association of a P-service with a specific provider-agent has to be completed. In addition, because of the location criterion the P-services are treated in a serial way (i.e., one at a time). The definition of < p.s i, pro.agt i, type > is divided into two sub-phases. Phase Initially, the work starts with the P-service p.s i (i=1) of the C- service CS. At this level, only execution cost and execution time criteria are considered. Each criterion has a weight factor (w [0, 1]) that a user defines. From each provider-agent that offers the P-service p.s i (i=1), the user-agent receives the following details about that P-service: execution cost for remote and local types, and execution time (Equation 1). Because the execution time is evaluated in seconds, a function converts that time into a monetary cost. pro.aget 1 : (Remote.Cost(p.s 1 i ), Local.Cost(p.s1 i )), F ct.cost(t ime(p.s 1 i )) User agent : p.s i (i=1). pro.aget n : (Remote.Cost(p.s n i ), Local.Cost(p.sn i )), F ct.cost(t ime(p.s n i )) (1)
7 For each offer, the user-agent selects the minimum cost between the invocation types and adds that minimum to the cost of the execution time. Furthermore, each selection criterion has a weight factor w time (F ct.cost(t ime(p.s 1 )))+ w cost (min(remote.cost(p.s 1 ), Local.Cost(p.s 1 ))). Finally, the user-agent selects for the P-service p.s i (i=1) the minimum offer among all the offers of the provideragents. For example, User agent : p.s i (i=1) pro.agt 2 : Remote.Cost(p.s 2 i ), F ct.cost(t ime(p.s 2 i )) (2) Based on Equation (2), < p.s 1, pro.agt 2, remote > is set. The user-agent has first decided to select pro.agt 2 to provide p.s 1 and second to remotely invoke p.s 1. This means that the user-agent and pro.agt 2 will be in two different domains during the invocation process. Phase After the preparation of the P-service p.s i (i=1) is finished, the useragent starts working on the remaining P-services i = 2,, p. This time the three selection criteria are simultaneously considered. We recall that the location criterion is privileged to the other two criteria because of the previously-cited reasons. According to the location criterion, the provider-agent that will be associated with the P-service p.s i (i [2,p]) depends on the provider-agent that has been selected to offer the predecessor P-service p.s i 1. The user-agent proceeds according to the algorithm of Table 1 (it is assumed that < p.s i 1, pro.agt i 1, type > is established). When the user-agent finishes working on the P-service p.s i, the provider-agent and invocation strategy of that P-service are known. 5 Current work - Reliability of execution The reliability of a Web service is the probability that a request submitted to a Web service is correctly responded within the maximum expended time frame [9]. This time frame is mostly published as part of the Web service description. Reliability is a technical measure that depends on hardware and/or software configuration of Web services and on network connections between requestors and service providers. The reliability value can be computed from historical data about past invocations using for example the number of times that a Web service has been successfully delivered within the maximum expected time frame, with regard to the total number of invocations. Because reliability deals with service execution failures, backup approaches are deemed appropriate. A Web service cannot be executed for multiple reasons: network connection problems, service disconnected for maintenance, service overloaded, just to cite a few. In the following, we present the way reliability is integrated into the operating of the multi-domain architecture of Fig. 1. Because we aim at interleaving Web services composition and execution, two types of agents will be required: user-agent and delegate-agent. Initially, the delegate-agent associates a Web service with a provider-agent and submits that information to the user-agent that must be running either in the user-domain or in one of the multiple provider-domains. The selected provider-agent is part
8 Table 1. Algorithm of provider-hosts selection i, i = 2,, p for each < p.s i, P RO.AGT i, type > if ((pro.agt i 1 P RO.AGT i) = true) // does pro.agt i 1 offer p.s i? then begin establish < p.s i, pro.agt i 1, type > // type p.s i depends on type p.s i 1 end else begin A φ // set of provider-agents that are in the same domain as pro.agt i 1 B φ // set of provider-agents that are in the same domain as user-agent C φ // set of provider-agents that are in other domains for (j = 0; j < P RO.AGT i ; j + +) // pro.agt i P RO.AGT i begin if domain(pro.agt j) = domain(pro.agt i 1) then A A pro.agt j else if domain(pro.agt j) = domain(user agent) then B B pro.agt j else C C pro.agt j end // A B C = P RO.AGT i if p.s i 1 executed remotely // < p.s i 1, pro.agt i 1, remote > then begin if A φ then contact provider-agents of A - Go to Phase 2.1 else if B φ then contact provider-agents of B - Go to Phase 2.1 else contact provider-agents of C - Go to Phase 2.1 end else begin // A = B and < p.s i 1, pro.agt i 1, local > if A φ then contact provider-agents of A - Go to Phase 2.1 else contact provider-agents of C - Go to Phase 2.1 end end
9 of a pool of potential provider-agents (P RO.AGT i ) that have a Web service in common (Equation 2). Before the delegate-agent starts working on the next component services, it stores the information about the pool of provider-agents (e.g., the x best ranked provider-agents from sets A, B, and C of P RO.AGT i, x <= ( P RO.AGT i 1)) for a later use. If the user-agent faces any difficulties in the execution of a service, it immediately contacts the delegate-agent which is always located in the user-domain. Because the delegate-agent is now working on the preparation of the remaining component services, it stops its preparation work and browses the stored pool of provider-agents for the service in trouble. The objective is to identify a new provider-agent, inform the user-agent about this provider-agent, and finally store the newly updated pool of potential provider-agents. Information on a pool of potential provider-agents are not deleted until the delegate-agent receives a notification message from the user-agent that the execution of a service has been successfully completed. During that confirmation exchange, the delegate-agent submits to the user-agent the details on the next service to execute. When a delegate-agent receives a message from a user-agent in case of problems, it interrupts its operations and starts new operations as described in the above paragraph. When the delegate-agent resumes its work, it has two options. The first option consists of pursuing the suspended operations. The second option consists of dropping all the suspended operations. This is due to the location criterion that may suggest a new set of potential provider-agents to consider. We recall that the identification of a provider-agent for a service depends on the current position of the provider-agent of the direct predecessor service. 6 Related work and conclusion In [3], Chakraborty et al. have introduced a reactive service composition architecture for pervasive computing environments. The architecture consists of five layers: network, service discovery, service composition, service execution, and application. While reviewing Chakraborty et al. s work, we were interested in the service execution layer. During the execution of services, this layer might want to optimize the bandwidth required to transfer data over the wireless links between services and hence, execute the services in an order that minimizes the bandwidth utilization. This optimization approach is similar to the location of provider hosts criterion that we have introduced. With the location criterion, we aimed at reducing the number of remote interactions between domains, the number of migrations of the user-agent to domains, and the number of data transfer between domains. Another relevant work to the location criterion is presented in [8]. Because it will be challenging to create services that can execute well on the large variety of devices (problems of diversity and resource constraints), Messer et al. suggest to transparently offload portions of a service code from resource-constrained devices to nearby servers [8]. Code offloading requires partitioning strategies. If two components interact frequently (e.g., because of many method invocations), then a partitioning strategy should suggest placing these components together on one machine; splitting them across the network could
10 severely affect performance. The aforementioned partitioning strategy has similarities with the location of computing hosts criterion. This criterion promotes the use of local interactions between services as well as between agents. In [8], the selection of the same host may cause an overloading for that host. In our research, this situation can be avoided for two main reasons. First, the work is done at the level of domains of computing hosts and not at the level of computing hosts. Second, the location criterion helps in finding and ranking domains (sets A, B, and C in the algorithm). When a domain is considered, traditional selection criterion (such as execution cost and execution time) are applied to identify the best computing hosts, and thus the best providers of services. We presented our work on composing services. Our long-term objective is to allow users to satisfy their needs regardless of the resources (fixed or mobile) that are involved in the execution of the services. We suggested two types of agents (user-agent and provider-agent) in order to undertake the agentification of the components of a Web service environment. We also suggested an approach for service composition that is deployed by these agents. The approach uses different selection criteria for the identification of the best component services of a composite service. Location of provider hosts is among these criteria and aims at gathering the maximum number of component services to be executed in the same computing host (i.e., using the same resource). References 1. B. Benatallah and F. Casati (Guest Editors). Special Issue on Web Services. Distributed and Parallel Databases, Kluwer Academic Publishers, 12(2-3), September B. Benatallah, Q. Z. Sheng, and M. Dumas. The Self-Serv Environment for Web Services Composition. IEEE Internet Computing, 7(1), January/February D. Chakraborty, F. Perich, A. Joshi, T. Finin, and Y. Yesha. A Reactive Service Composition Architecture for Pervasive Computing Environments. In Proceedings of the 7th Personal Wireless Communications Conference (PCW 2002), Singapore, F. Curbera, M. Duftler, R. Khalaf, W. Nagy, N. Mukhi, and S. Weerawarana. Unraveling the Web Services Web: An Introduction to SOAP, WSDL, and UDDI. IEEE Internet Computing, 6(2), March/April Z. Maamar and W. Mansoor. Design and Development of a Software Agent-based and Mobile Service-oriented Environment. e-service Journal, Indiana University Press, 2003 (forthcoming). 6. Z. Maamar, W. Mansoor, and Q. H. Mahmoud. Software Agents to Support Mobile Services. In Proceedings of the First International Joint Conference on Autonomous Agents & Multi-Agent Systems (AAMAS 2002), Bologna, Italy, P. Maes. Agents that Reduce Work and Information Overload. Communication of the ACM, 37(7), July A. Messer, I. Greenberg, P. Bernadat, D. Milojicic, D. Chen, T. J. Giuli, and X. Gu. Towards a Distributed Platform for Resource-Constrained Devices. In Proceedings of the IEEE 22nd International Conference on Distributed Computing Systems (ICDCS 2002), Vienna, Austria, L. Zeng, B. Benatallah, M. Dumas, J. Kalagnanam, and Q. Z. Sheng. Quality Driven Web Service Composition. In Proceedings of The Twelfth International World Wide Web Conference (WWW 2003), Budapest, Hungary, 2003.
Six Strategies for Building High Performance SOA Applications
Six Strategies for Building High Performance SOA Applications Uwe Breitenbücher, Oliver Kopp, Frank Leymann, Michael Reiter, Dieter Roller, and Tobias Unger University of Stuttgart, Institute of Architecture
Web Services Software Architecture
Web Services Software Architecture Syahrul Fahmy School of Informatics, The University of Manchester, PO Box 88, Manchester M60 1QD, United Kingdom [email protected] Abstract. Web
QAME Support for Policy-Based Management of Country-wide Networks
QAME Support for Policy-Based Management of Country-wide Networks Clarissa C. Marquezan, Lisandro Z. Granville, Ricardo L. Vianna, Rodrigo S. Alves Institute of Informatics Computer Networks Group Federal
Ontological Identification of Patterns for Choreographing Business Workflow
University of Aizu, Graduation Thesis. March, 2010 s1140042 1 Ontological Identification of Patterns for Choreographing Business Workflow Seiji Ota s1140042 Supervised by Incheon Paik Abstract Business
Introduction to Service Oriented Architectures (SOA)
Introduction to Service Oriented Architectures (SOA) Responsible Institutions: ETHZ (Concept) ETHZ (Overall) ETHZ (Revision) http://www.eu-orchestra.org - Version from: 26.10.2007 1 Content 1. Introduction
Service Computing: Basics Monica Scannapieco
Service Computing: Basics Monica Scannapieco Generalities: Defining a Service Services are self-describing, open components that support rapid, low-cost composition of distributed applications. Since services
Towards Management of SLA-Aware Business Processes Based on Key Performance Indicators
Towards Management of SLA-Aware Business Processes Based on Key Performance Indicators Branimir Wetzstein, Dimka Karastoyanova, Frank Leymann Institute of Architecture of Application Systems, University
Collaborative & Integrated Network & Systems Management: Management Using Grid Technologies
2011 International Conference on Computer Communication and Management Proc.of CSIT vol.5 (2011) (2011) IACSIT Press, Singapore Collaborative & Integrated Network & Systems Management: Management Using
SODDA A SERVICE-ORIENTED DISTRIBUTED DATABASE ARCHITECTURE
SODDA A SERVICE-ORIENTED DISTRIBUTED DATABASE ARCHITECTURE Breno Mansur Rabelo Centro EData Universidade do Estado de Minas Gerais, Belo Horizonte, MG, Brazil [email protected] Clodoveu Augusto Davis
DC Proposal: Automation of Service Lifecycle on the Cloud by Using Semantic Technologies
DC Proposal: Automation of Service Lifecycle on the Cloud by Using Semantic Technologies Karuna P. Joshi* Computer Science and Electrical Engineering University of Maryland, Baltimore County, Baltimore,
Achieving High Availability of Web Services Based on A Particle Filtering Approach
A Achieving High Availability of Web Services Based on A Particle Filtering Approach Lina Yao, School of Computer Science, the University of Adelaide, Australia Quan Z. Sheng, School of Computer Science,
Service-Oriented Architectures
Architectures Computing & 2009-11-06 Architectures Computing & SERVICE-ORIENTED COMPUTING (SOC) A new computing paradigm revolving around the concept of software as a service Assumes that entire systems
The Workflow Management Coalition Specification Workflow Management Coalition Terminology & Glossary
The Workflow Management Coalition Specification Workflow Management Coalition Terminology & Glossary Workflow The automation of a business process, in whole or part, during which documents, information
Dynamic Composition of Web Service Based on Cloud Computing
, pp.389-398 http://dx.doi.org/10.14257/ijhit.2013.6.6.35 Dynamic Composition of Web Service Based on Cloud Computing WU Nai-zhong Information Center, Changzhou Institute of Engineering Technology, Changzhou
SLA Business Management Based on Key Performance Indicators
, July 4-6, 2012, London, U.K. SLA Business Management Based on Key Performance Indicators S. Al Aloussi Abstract-It is increasingly important that Service Level Agreements (SLAs) are taken into account
White Paper. Requirements of Network Virtualization
White Paper on Requirements of Network Virtualization INDEX 1. Introduction 2. Architecture of Network Virtualization 3. Requirements for Network virtualization 3.1. Isolation 3.2. Network abstraction
Multi-agent System based Service Oriented Architecture for Supply Chain Management System (MAS-SOA-SCM)
Volume 27 No.5, August 2011 Multi-agent System based Service Oriented Architecture for Supply Chain Management System (MAS-SOA-SCM) Dr. S. Srinivasan Professor PDM Engineering College Bhadurgarh 1245 Haryana,
A Study on Service Oriented Network Virtualization convergence of Cloud Computing
A Study on Service Oriented Network Virtualization convergence of Cloud Computing 1 Kajjam Vinay Kumar, 2 SANTHOSH BODDUPALLI 1 Scholar(M.Tech),Department of Computer Science Engineering, Brilliant Institute
Research on the Model of Enterprise Application Integration with Web Services
Research on the Model of Enterprise Integration with Web Services XIN JIN School of Information, Central University of Finance& Economics, Beijing, 100081 China Abstract: - In order to improve business
A Generic Database Web Service
A Generic Database Web Service Erdogan Dogdu TOBB Economics and Technology University Computer Engineering Department Ankara, Turkey [email protected] Yanchao Wang and Swetha Desetty Georgia State University
Oracle Service Bus Examples and Tutorials
March 2011 Contents 1 Oracle Service Bus Examples... 2 2 Introduction to the Oracle Service Bus Tutorials... 5 3 Getting Started with the Oracle Service Bus Tutorials... 12 4 Tutorial 1. Routing a Loan
Unlocking the Power of SOA with Business Process Modeling
White Paper Unlocking the Power of SOA with Business Process Modeling Business solutions through information technology TM Entire contents 2006 by CGI Group Inc. All rights reserved. Reproduction of this
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise
Cloud Computing: Computing as a Service. Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad
Cloud Computing: Computing as a Service Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad Abstract: Computing as a utility. is a dream that dates from the beginning from the computer
Service Oriented Architecture: A driving force for paperless healthcare system
2012 International Conference on Computer Technology and Science (ICCTS 2012) IPCSIT vol. 47 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V47.16 Service Oriented Architecture: A driving
A Middleware-Based Approach to Mobile Web Services
Abstract A Middleware-Based Approach to Mobile Web Services Pampa Sadhukhan, Pradip K Das, Rijurekha Sen, Niladrish Chatterjee and Arijit Das Centre for Mobile Computing and Communication (CMCC), Jadavpur
Chapter 6 Essentials of Design and the Design Activities
Systems Analysis and Design in a Changing World, sixth edition 6-1 Chapter 6 Essentials of Design and the Design Activities Chapter Overview There are two major themes in this chapter. The first major
A Study on the Application of Existing Load Balancing Algorithms for Large, Dynamic, Heterogeneous Distributed Systems
A Study on the Application of Existing Load Balancing Algorithms for Large, Dynamic, Heterogeneous Distributed Systems RUPAM MUKHOPADHYAY, DIBYAJYOTI GHOSH AND NANDINI MUKHERJEE Department of Computer
Deploying QoS sensitive services in OSGi enabled home networks based on UPnP
Deploying QoS sensitive services in OSGi enabled home networks based on UPnP Nico Goeminne, Kristof Cauwel, Filip De Turck, Bart Dhoedt Ghent University - IBBT - IMEC Department of Information Technology
Distributed systems. Distributed Systems Architectures
Distributed systems Distributed Systems Architectures Virtually all large computer-based systems are now distributed systems. Information processing is distributed over several computers rather than confined
PARALLELS SERVER BARE METAL 5.0 README
PARALLELS SERVER BARE METAL 5.0 README 1999-2011 Parallels Holdings, Ltd. and its affiliates. All rights reserved. This document provides the first-priority information on the Parallels Server Bare Metal
Creating Web Services in NetBeans
Creating Web Services in NetBeans Fulvio Frati [email protected] Sesar Lab http://ra.crema.unimi.it 1 Outline Web Services Overview Creation of a Web Services Server Creation of different Web Services
A Multi-Agent Approach to a Distributed Schedule Management System
UDC 001.81: 681.3 A Multi-Agent Approach to a Distributed Schedule Management System VYuji Wada VMasatoshi Shiouchi VYuji Takada (Manuscript received June 11,1997) More and more people are engaging in
ALTIRIS Software Delivery Solution for Windows 6.1 SP3 Product Guide
ALTIRIS Software Delivery Solution for Windows 6.1 SP3 Product Guide Notice Altiris Software Delivery Solution for Windows 6.1 SP3 Product Guide 2007 Altiris, Inc. All rights reserved. Document Date: February
SOA and Cloud in practice - An Example Case Study
SOA and Cloud in practice - An Example Case Study 2 nd RECOCAPE Event "Emerging Software Technologies: Trends & Challenges Nov. 14 th 2012 ITIDA, Smart Village, Giza, Egypt Agenda What is SOA? What is
A QoS-Aware Web Service Selection Based on Clustering
International Journal of Scientific and Research Publications, Volume 4, Issue 2, February 2014 1 A QoS-Aware Web Service Selection Based on Clustering R.Karthiban PG scholar, Computer Science and Engineering,
A Unified Messaging-Based Architectural Pattern for Building Scalable Enterprise Service Bus
A Unified Messaging-Based Architectural Pattern for Building Scalable Enterprise Service Bus Karim M. Mahmoud 1,2 1 IBM, Egypt Branch Pyramids Heights Office Park, Giza, Egypt [email protected] 2 Computer
Service Oriented Architecture
Service Oriented Architecture Charlie Abela Department of Artificial Intelligence [email protected] Last Lecture Web Ontology Language Problems? CSA 3210 Service Oriented Architecture 2 Lecture Outline
Web services for Groupware in Distributed and Mobile Collaboration
Web services for Groupware in Distributed and Mobile Collaboration Schahram Dustdar, Harald Gall, and Roman Schmidt Distributed Systems Group, Vienna University of Technology Argentinierstrasse 8/184-1,
CHAPTER 7 SUMMARY AND CONCLUSION
179 CHAPTER 7 SUMMARY AND CONCLUSION This chapter summarizes our research achievements and conclude this thesis with discussions and interesting avenues for future exploration. The thesis describes a novel
SECURE AUTOMATED RELIABLE
SECURE AUTOMATED RELIABLE ONLINE BACKUP SOLUTION FOR YOUR BUSINESS LIFELINE DATA Secure - Data is encrypted using AES 256 bit before transmission. - Connection with DataBank servers is encrypted using
The allocation algorithm for data centers in cloud computing architecture from security perspective
The allocation algorithm for data centers in cloud computing architecture from security perspective *Chuan-Gang Liu 1,Hsin-Yi Lin, Kun-Ta Hsien Deparament of Information Technology, Chia Nan University
Use of Agent-Based Service Discovery for Resource Management in Metacomputing Environment
In Proceedings of 7 th International Euro-Par Conference, Manchester, UK, Lecture Notes in Computer Science 2150, Springer Verlag, August 2001, pp. 882-886. Use of Agent-Based Service Discovery for Resource
CounselorMax and ORS Managed Hosting RFP 15-NW-0016
CounselorMax and ORS Managed Hosting RFP 15-NW-0016 Posting Date 4/22/2015 Proposal submission deadline 5/15/2015, 5:00 PM ET Purpose of the RFP NeighborWorks America has a requirement for managed hosting
System Administration Training Guide. S100 Installation and Site Management
System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5
Inter-Tel 5000 Network Communications Solutions
Inter-Tel 5000 Network Communications Solutions 2006 Today s IP-Centric Communications Platform In today s competitive business environment, you understand the need to optimize the performance of your
Call Center Customer Care System
Call Center Customer Care System (a case study) Note: this is a simplified and generalized description of a real system Introduction The Call Center Customer Care System has been developed by Andersen
This paper defines as "Classical"
Principles of Transactional Approach in the Classical Web-based Systems and the Cloud Computing Systems - Comparative Analysis Vanya Lazarova * Summary: This article presents a comparative analysis of
SOA Myth or Reality??
IBM TRAINING S04 SOA Myth or Reality Jaqui Lynch IBM Corporation 2007 SOA Myth or Reality?? Jaqui Lynch Mainline Information Systems Email [email protected] Session S04 http://www.circle4.com/papers/s04soa.pdf
Automating Service Negotiation Process for Service Architecture on the cloud by using Semantic Methodology
Automating Process for Architecture on the cloud by using Semantic Methodology Bhavana Jayant.Adgaonkar Department of Information Technology Amarutvahini College of Engineering Sangamner, India [email protected]
A Study of Application Recovery in Mobile Environment Using Log Management Scheme
A Study of Application Recovery in Mobile Environment Using Log Management Scheme A.Ashok, Harikrishnan.N, Thangavelu.V, [email protected], [email protected],[email protected], Bit Campus,
Chapter 2: Cloud Basics Chapter 3: Cloud Architecture
Chapter 2: Cloud Basics Chapter 3: Cloud Architecture Service provider s job is supplying abstraction layer Users and developers are isolated from complexity of IT technology: Virtualization Service-oriented
Cloud deployment model and cost analysis in Multicloud
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) ISSN: 2278-2834, ISBN: 2278-8735. Volume 4, Issue 3 (Nov-Dec. 2012), PP 25-31 Cloud deployment model and cost analysis in Multicloud
WhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
Symantec Virtual Machine Management 7.1 User Guide
Symantec Virtual Machine Management 7.1 User Guide Symantec Virtual Machine Management 7.1 User Guide The software described in this book is furnished under a license agreement and may be used only in
Architectural Overview
Architectural Overview Version 7 Part Number 817-2167-10 March 2003 A Sun ONE Application Server 7 deployment consists of a number of application server instances, an administrative server and, optionally,
How To Manage A Virtualization Server
Brain of the Virtualized Data Center Contents 1 Challenges of Server Virtualization... 3 1.1 The virtual network breaks traditional network boundaries... 3 1.2 The live migration function of VMs requires
MIGRATING DESKTOP AND ROAMING ACCESS. Migrating Desktop and Roaming Access Whitepaper
Migrating Desktop and Roaming Access Whitepaper Poznan Supercomputing and Networking Center Noskowskiego 12/14 61-704 Poznan, POLAND 2004, April white-paper-md-ras.doc 1/11 1 Product overview In this whitepaper
Outgoing VDI Gateways:
` Outgoing VDI Gateways: Creating a Unified Outgoing Virtual Desktop Infrastructure with Windows Server 2008 R2 and ObserveIT Daniel Petri January 2010 Copyright 2010 ObserveIT Ltd. 2 Table of Contents
Efficient Scheduling Of On-line Services in Cloud Computing Based on Task Migration
Efficient Scheduling Of On-line Services in Cloud Computing Based on Task Migration 1 Harish H G, 2 Dr. R Girisha 1 PG Student, 2 Professor, Department of CSE, PESCE Mandya (An Autonomous Institution under
LinuxWorld Conference & Expo Server Farms and XML Web Services
LinuxWorld Conference & Expo Server Farms and XML Web Services Jorgen Thelin, CapeConnect Chief Architect PJ Murray, Product Manager Cape Clear Software Objectives What aspects must a developer be aware
Optimos Enterprise Helpdesk Automation Solution Case Study
Optimos Enterprise Helpdesk Automation Solution Case Study IT Help Central National Science Foundation Optimos Incorporated 4455 Brookfield Corporate Drive Chantilly, VA 20151 Telephone: (703) 488-6900
Service Oriented Architecture (SOA) An Introduction
Oriented Architecture (SOA) An Introduction Application Evolution Time Oriented Applications Monolithic Applications Mainframe Client / Server Distributed Applications DCE/RPC CORBA DCOM EJB s Messages
Service Provisioning and Management in Virtual Private Active Networks
Service Provisioning and Management in Virtual Private Active Networks Fábio Luciano Verdi and Edmundo R. M. Madeira Institute of Computing, University of Campinas (UNICAMP) 13083-970, Campinas-SP, Brazil
PERFORMANCE COMPARISON OF COMMON OBJECT REQUEST BROKER ARCHITECTURE(CORBA) VS JAVA MESSAGING SERVICE(JMS) BY TEAM SCALABLE
PERFORMANCE COMPARISON OF COMMON OBJECT REQUEST BROKER ARCHITECTURE(CORBA) VS JAVA MESSAGING SERVICE(JMS) BY TEAM SCALABLE TIGRAN HAKOBYAN SUJAL PATEL VANDANA MURALI INTRODUCTION Common Object Request
Rotorcraft Health Management System (RHMS)
AIAC-11 Eleventh Australian International Aerospace Congress Rotorcraft Health Management System (RHMS) Robab Safa-Bakhsh 1, Dmitry Cherkassky 2 1 The Boeing Company, Phantom Works Philadelphia Center
Eylean server deployment guide
Eylean server deployment guide Contents 1 Minimum software and hardware requirements... 2 2 Setting up the server using Eylean.Server.Setup.exe wizard... 2 3 Manual setup with Windows authentication -
ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS
ANNALS OF THE FACULTY OF ENGINEERING HUNEDOARA 2006, Tome IV, Fascicole 1, (ISSN 1584 2665) FACULTY OF ENGINEERING HUNEDOARA, 5, REVOLUTIEI, 331128, HUNEDOARA ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS
EMC Data Protection Advisor 6.0
White Paper EMC Data Protection Advisor 6.0 Abstract EMC Data Protection Advisor provides a comprehensive set of features to reduce the complexity of managing data protection environments, improve compliance
