scholarly journals Implementation Scheme SLA and Network Availability Mechanism for Customer Service Provider

2020 ◽  
Vol 10 (2) ◽  
pp. 125-144
Author(s):  
Hillman Akhyar Damanik ◽  
Merry Anggraeni

Increasingly complex network heterogeneity and network monitoring tasks become the management concentration of a large distributed production infrastructure with various business services requiring a centralized control monitoring system, with increasing network size, heterogeneity and complexity. The network monitoring and management solutions available are not only expensive but also difficult to use, configure and maintain. Manually routing pins to the wrong device on a large complex network is very complicated and time-consuming for Service Provider (SP). Thus, it is necessary to have an automatic system that immediately reports to the network Service Provider (SP) monitoring system regarding the type of error or alert, Network Availability and Service Level Agreement (SLA). This research presents the modeling design and implementation of Network Availability and SLA network systems for Service Provider (SP) organizations, by being based on open-source programming tools (Zabbix System) and intelligently integrating to monitor network devices, especially to get Network Availability and SLA parameters and values on a customer or customer. Monitoring Customers devices in the network in the form of a module alert parameter that will be applied so that it is seen and can be said to be a universal Plug & Play technology concept (UPnP). Monitoring system developed will provide value and quality of service (qos) output parameters in the form of measuring and taking test value parameters Network Availability and SLA modeling, which will produce an accurate Service Level Agreement (SLA) value parameter test, and become a reference for an agreement between a service provider and a customer. As a guarantee or link availability for the services provided by Service Provide (SP) to customers. With the SLA value fulfilled at 99.9% with a 99.5% agreement, Network availability is met with a percentage of 98.89% and Down time with a percentage of only 1% of the agreement 2%, and the latency value of the terrestrial transmission media obtained is 2 ms, from the 8 ms agreement and the obtained VSAT transmission media is 500-600 ms from the agreement latency value is 700 ms.

Author(s):  
A.C. Leonard

End users have expectations regarding services and support, and the quality thereof, provided by the supplier. They compare their expectations to the received service to assess the service quality (Coye, 2004). In order to ensure that the service supplied by the service provider meets the expectations of end users, a successful service level agreement (SLA) is required. Quality SLA’s clearly define, amongst many other elements, the commitments and responsibilities of the IT service provider and end users within the service delivery processes (Larson, 1998). One method of measuring the success of SLA’s is by using service metrics with regard to the availability, reliability, serviceability, response, and user satisfaction of the SLA (Larson, 1998). Therefore, the success of the SLA depends on a clear, common understanding of the services and service quality between the service provider and end users. Furthermore commitment, trust, and cooperation between all parties is necessary to achieve success with SLA’s (Hiles, 1994). However, in this paper it is argued that all these soft issues can only form a basis when sound relationships are established and maintained between the IT service provider and end users (Leonard, 2002). This paper aims to determine how the establishment of a sound IT-end user relationship can add value to the SLA for both the IT service provider and the end users, and increase the success of SLA’s.


2020 ◽  
Vol 13 (2) ◽  
pp. 16-21
Author(s):  
Ints Meijers

Abstract Attribute study and analysis of fault tolerant data networks. This work is aimed at introducing SLA constrain into fault tolerance and thus increasing overall network availability. Proposed model will evaluate given constraints and select best path that fits requirements. Fault tolerance is increased by adding multiple constraints and thus reducing available paths to best fitting ones.


2020 ◽  
Vol 39 (6) ◽  
pp. 8345-8356
Author(s):  
M. Alamelu ◽  
T.S. Pradeep Kumar ◽  
V. Vijayakumar

Service Level Agreement (SLA) is an agreement between the service provider and consumer to provide the verifiable quality of services. Using the valuable metrics in SLA, a service consumer could easily evaluate the service provider. Though there are different types of SLA models are available between the consumer and provider, the proposed approach describes the Fuzzy rule base SLA agreement generation among multiple service providers. A negotiation system is designed in this work to collect the different sets of provider services. With their desired quality metrics, a common Fuzzy based SLA report is generated and compared against the existing consumer requirements. From the analysis of the common agreement report, consumers can easily evaluate the best service with the desired Impact service, cost and Quality. The main advantage of this approach is that it reduces the time consumption of a consumer. Moreover, the best service provider can be selected among multiple providers with the desired QoS parameters. At the same time, the bilateral negotiation is enhanced with the approach of multilateral negotiation to improve the searching time of consumers.


Author(s):  
G.R. Gangadharan ◽  
Lorna Uden ◽  
Paul Oude Luttighuis

Software as a Service (SaaS) has become an important pragmatic in the world of enterprise software and business services markets. SaaS supports the concept of outsourcing where business processes are offered under a service level agreement for a given price. However, sourcing SaaS may not always involve outsourcing with respect to the transfer of internal activities and resources to external service providers. Users of SaaS need to know what strategies to use when determining sourcing requirements. In this paper, the authors develop a classification for sourcing SaaS based on Kraljic's matrix and a mapping of SaaS services to the sourcing structures. Further, they evaluate the proposed sourcing models against two real world case studies.


2020 ◽  
Vol 7 (2) ◽  
pp. 194
Author(s):  
Bayu Rima Aditya ◽  
Muhammad Barja Sanjaya

The main component of the entire strategy in Service Level Management (SLM) as a service provider is shown by implementing the Service Level Agreement (SLA). The service provider has to always guarantee that SLA which is indeed determined for a customer is achieved and fulfilled. The thing causing a failure in fulfilment of SLA is the expectation of business that is categorized in high indication while SLA establishment is still in progress, so it is indicated that there is a difference of perception between business and IT paradigm. The aim of this study is to build a framework to facilitate the achievement of a balance between the expected quality for the customer as the receiver party and the service which is offered by a service provider. The methodology which is applied in this study is by using an approach of informationengineering that consists of planning the analysis of related vision, planning of the technology effect, analysis of critical success factor, analysis of problem and purpose, as well as the identification of business area. The research which is conducted has given an obvious perspective paradigm in general that an integrated information system is indeed needed into the implementation of SLM to complete the significance among the functional divisions in a company


2019 ◽  
Vol 13 (1) ◽  
pp. 20
Author(s):  
Imane Haddar ◽  
Brahim Raouyane ◽  
Mostafa Bellafkih

With the on-going trends of the telecom services, the number of service providers with similar functionalities is undergoing a rapid growth. The customers face the difficulty to decide which service provider can satisfy their needs and full their requirements. Negotiating contracts between involved parts, and hiding heterogeneity in the distributed network environment has been challenging for telecom operators and service providers. Different languages exist to describe the Service Level Agreement (SLA), which is a contract between a service provider and a customer. However, since each service provider expresses his SLA in his own way, it disrupts the customer's choice of the best service provider, and leads to a bad contract management. In this respect, we propose a novel architecture for service selection, and SLA management between different stakeholders in our network architecture. The idea is to set up a smart broker where we implemented a Multi-Criteria Decision Making (MCDM) method to maximize utility function so that the customer can choose services with required QoS performances. We also came up with the idea of settling a negotiation model for the SLA, and a context based SLA contract ontology in IP Multimedia Subsystem (IMS) network is also proposed to provide users with a clear model to express their requirements and preferences. Moreover, we used the New Generation Operations Systems and Software (NGOSS) Framework to model and analyze networks and services actions. To better understand the relationship and the projection of NGOSS Framework and IMS platform, we introduce an SLA management and monitoring architecture in IMS network.


2021 ◽  
Vol 7 ◽  
pp. e700
Author(s):  
Merrihan B.M. Mansour ◽  
Tamer Abdelkader ◽  
Mohamed Hashem ◽  
El-Sayed M. El-Horbaty

Mobile edge computing (MEC) is introduced as part of edge computing paradigm, that exploit cloud computing resources, at a nearer premises to service users. Cloud service users often search for cloud service providers to meet their computational demands. Due to the lack of previous experience between cloud service providers and users, users hold several doubts related to their data security and privacy, job completion and processing performance efficiency of service providers. This paper presents an integrated three-tier trust management framework that evaluates cloud service providers in three main domains: Tier I, which evaluates service provider compliance to the agreed upon service level agreement; Tier II, which computes the processing performance of a service provider based on its number of successful processes; and Tier III, which measures the violations committed by a service provider, per computational interval, during its processing in the MEC network. The three-tier evaluation is performed during Phase I computation. In Phase II, a service provider total trust value and status are gained through the integration of the three tiers using the developed overall trust fuzzy inference system (FIS). The simulation results of Phase I show the service provider trust value in terms of service level agreement compliance, processing performance and measurement of violations independently. This disseminates service provider’s points of failure, which enables a service provider to enhance its future performance for the evaluated domains. The Phase II results show the overall trust value and status per service provider after integrating the three tiers using overall trust FIS. The proposed model is distinguished among other models by evaluating different parameters for a service provider.


Author(s):  
Shweta Kaushik ◽  
Charu Gandhi

Cloud computing has started a new era in the field of computing, which allows the access of remote data or services at anytime and anywhere. In today's competitive environment, the service dynamism, elasticity, and choices offered by this highly scalable technology are too attractive for enterprises to ignore. The scalability feature of cloud computing allows one to expand and contract the resources. The owner's data stored at the remote location, but he is usually afraid of sharing confidential data with cloud service provider. If the service provider is not the trusted one, there may be a chance of leakage of confidential data to external third party. Security and privacy of data require high consideration, which is resolved by storing the data in encrypted form. Data owner requires that the service provider should be trustworthy to store its confidential data without any exposure. One of the outstanding solutions for maintaining trust between different communicating parties could be the service level agreement between them.


Sign in / Sign up

Export Citation Format

Share Document