The Impact of Service-Level Agreement (SLA) on a Cloudlet Deployed in a Coffee Shop Scenario

Author(s):  
Mandisa N. Nxumalo ◽  
Matthew O. Adigun ◽  
Ijeoma N. Mba
2021 ◽  
Vol 17 (2) ◽  
pp. 179-195
Author(s):  
Priyanka Bharti ◽  
Rajeev Ranjan ◽  
Bhanu Prasad

Cloud computing provisions and allocates resources, in advance or real-time, to dynamic applications planned for execution. This is a challenging task as the Cloud-Service-Providers (CSPs) may not have sufficient resources at all times to satisfy the resource requests of the Cloud-Service-Users (CSUs). Further, the CSPs and CSUs have conflicting interests and may have different utilities. Service-Level-Agreement (SLA) negotiations among CSPs and CSUs can address these limitations. User Agents (UAs) negotiate for resources on behalf of the CSUs and help reduce the overall costs for the CSUs and enhance the resource utilization for the CSPs. This research proposes a broker-based mediation framework to optimize the SLA negotiation strategies between UAs and CSPs in Cloud environment. The impact of the proposed framework on utility, negotiation time, and request satisfaction are evaluated. The empirical results show that these strategies favor cooperative negotiation and achieve significantly higher utilities, higher satisfaction, and faster negotiation speed for all the entities involved in the negotiation.


2019 ◽  
Vol 0 (0) ◽  
Author(s):  
Rizwan Aslam Butt ◽  
M. Faheem ◽  
M. Waqar Ashraf ◽  
Attaullah Khawaja ◽  
Basit Raza

AbstractNetwork security is an important component of today’s networks to combat the security attacks. The passive optical network (PON) works at the medium access layer (MAC). A distributed denial of service (DDOS) attack may be launched from the network and transport layers of an Optical Network unit (ONU). Although there are various security techniques to mitigate its impact, however, these techniques cannot mitigate the impact on the MAC Layer of the PON and can cause an ONU to continuously drain too much bandwidth. This will result in reduced bandwidth availability to other ONUs and, thus, causing an increase in US delays and delay variance. In this work we argue that the impact of a DDOS attack can be mitigated by improving the Dynamic bandwidth assignment (DBA) scheme which is used in PON to manage the US bandwidth at the optical line terminal (OLT). The present DBA schemes do not have the capability to combat a security attack. Thus, this study, uses a machine learning approach to learn the ONU traffic demand patterns and presents a security aware DBA (SA-DBA) scheme that detects a rogue (attacker) ONU from its traffic demand pattern and limits its illegitimate bandwidth demand and only allows it the bandwidth assignment to it as per the agreed service level agreement (SLA). The simulation results show that the SA-DBA scheme results in up to 53%, 55% and 90% reduced US delays and up to 84%, 76% and 95% reduced US delay variance of T2, T3 and T4 traffic classes compared to existing insecure DBA schemes.


Author(s):  
Fahreza Fahreza ◽  
Muhammad Rifqi

Network Monitoring System (NMS) is a system that is highly demanded internet service provider industry in this fast-developing information technology era. The availability of NMS is the best option to restore the service level agreement as a means to compete with other internet service providers’ competitors. The occurrence of disturbance in the network is often unnoticed by the network administrator. This may lead to a crucial problem in decreasing network quality as the impact of time-consuming in solving the problem. Through the explanation, the writer tried to anticipate by classifying problems using Pareto, and integrated Nagios with Telegram Messenger as a notification of disturbance. Nagios has many features such as reports, event handler, monitoring resource (CPU load, memory usage, status up / down, up time, data traffic, bandwidth), etc. One of notable feature owned by Nagios is blast notification of disturbance. It is a feature that will function when one of the devices is in trouble. This feature will inform the network administrator or authorized person in a certain divisions as regards the error network. In this case, the problematic device can be categorized according to the parameters made by the network administrator.


Author(s):  
Cahya Lukito ◽  
Rony Baskoro Lukito ◽  
Deddy Arifin

End to End Quality of Service is a way to provide data package service in a telecommunication network that based on Right Price, Right Service Level, and Right Quality. The goal of this research is to analyze the impact of End to End QoS use on 3G telecommunication network for voice service and data. This research uses an analysis method by doing the application on the lab. The result that is achieved in this research shows that End to End QoS is very influental to the Service Level Agreement to the users of the telecommunication service.Keywords: End to End Qos, SLA, Diffserv


Author(s):  
Fahreza Fahreza ◽  
Muhammad Rifqi

Network Monitoring System (NMS) is a system that is highly demanded internet service provider industry in this fast-developing information technology era. The availability of NMS is the best option to restore the service level agreement as a means to compete with other internet service providers’ competitors. The occurrence of disturbance in the network is often unnoticed by the network administrator. This may lead to a crucial problem in decreasing network quality as the impact of time-consuming in solving the problem. Through the explanation, the writer tried to anticipate by classifying problems using Pareto and integrated Nagios with Telegram Messenger as a notification of disturbance. Nagios has many features such as reports, event handlers, monitoring resources (CPU load, memory usage, status up / down, uptime, data traffic, bandwidth), etc. One notable feature owned by Nagios is blast notification of disturbance. It is a feature that will function when one of the devices is in trouble. This feature will inform the network administrator or authorized person in certain divisions as regards the error network. In this case, the problematic device can be categorized according to the parameters made by the network administrator.


The purpose of this research is to identify and conduct risk analysis a Analyze risk on IT Service Management Information System Tools vulnerabilities at IT Service Management project, To obtain the level of vulnerability or weakness of information and to produce a strategic recommendation to overcome the vulnerability of information in the Project, OCTAVE Allegro was used as the method. Awareness of the importance of information system security and its assets to an organization and the impact that may arise from the destruction of the information system and its assets does not seem to be getting attention for most organizations and resulting low performance on Service Management while the evaluation and analysis process is more focused on the management of critical assets owned by the Project. Conclusion of the risk assessment is recommendations on the steps to be taken protect and manage the IT Service information system critical assets at IT Service management Project and also for a better service and achieve Service Level Agreement.


Author(s):  
Gurpreet Singh ◽  
Manish Mahajan ◽  
Rajni Mohana

BACKGROUND: Cloud computing is considered as an on-demand service resource with the applications towards data center on pay per user basis. For allocating the resources appropriately for the satisfaction of user needs, an effective and reliable resource allocation method is required. Because of the enhanced user demand, the allocation of resources has now considered as a complex and challenging task when a physical machine is overloaded, Virtual Machines share its load by utilizing the physical machine resources. Previous studies lack in energy consumption and time management while keeping the Virtual Machine at the different server in turned on state. AIM AND OBJECTIVE: The main aim of this research work is to propose an effective resource allocation scheme for allocating the Virtual Machine from an ad hoc sub server with Virtual Machines. EXECUTION MODEL: The execution of the research has been carried out into two sections, initially, the location of Virtual Machines and Physical Machine with the server has been taken place and subsequently, the cross-validation of allocation is addressed. For the sorting of Virtual Machines, Modified Best Fit Decreasing algorithm is used and Multi-Machine Job Scheduling is used while the placement process of jobs to an appropriate host. Artificial Neural Network as a classifier, has allocated jobs to the hosts. Measures, viz. Service Level Agreement violation and energy consumption are considered and fruitful results have been obtained with a 37.7 of reduction in energy consumption and 15% improvement in Service Level Agreement violation.


Sign in / Sign up

Export Citation Format

Share Document