scholarly journals REST API Composition for Effective Testing the Cloud

2021 ◽  
Vol 19 (6) ◽  
pp. 676-693
Author(s):  
Behailu Getachew Wolde ◽  
Abiot Sinamo Boltana

Cloud offers many ready-made REST services for the end users. This offer realizes the service composition through implementation somewhere on internet based on Service Level Agreement (SLA). For ensuring this SLA, a software testing is a useful means for attesting a non-functional requirement that guarantees quality assurance from end user's perspective. However, test engineer experiences only what goes in and out through an interface that contains a high level behaviors separated from its underlying details. Testing with these behaviors become an issue for classical testing procedures. So, REST API through composition is an alternative new promising approach for modeling behaviors with parameters against the cloud. This new approach helps to devise test effectiveness in terms of REST based behavior-driven implementation. It aims to understand functional behaviors through API methods based on input domain modeling (IDM) on the standard keyboard pattern. By making an effective REST design the test engineer sends complete test inputs to its API directly on application, and gets test responses from the infrastructure. We consider NEMo mobility API specification to design an IDM, which represents pattern match of mobility search URL API path scope. With this scope, sample mobility REST API service compositions are used. Then, the test assertions are implemented to validate each path resource to test the components and the end-to-end integration on the specified service.

Author(s):  
Tapati Bandopadhyay ◽  
Pradeep Kumar

The concept of presence was initially associated with an instant messaging service, allowing an end user to recognize the presence of a peer online to send or receive messages. Now the technology has grown up to include various services like monitoring performance of any type of end user device, and services are accessible from anywhere, any time. The need for enhanced value remains the driving force behind these services, for example, Voice over Internet Protocol (VoIP) services, which is drawing tremendous research interest in services performance evaluation, measurement, benchmarking, and monitoring. Monitoring service level parameters happens to be one of the most interesting application-oriented research issues because various service consumers at the customer companies/end users’ level are finding it very difficult to design and monitor an effective SLA (Service Level Agreement) with the presence-enabled service providers. This chapter focuses on to these specific issues and presents a new approach of SLA monitoring through Data Envelopment Analysis (DEA). This extreme point approach actually can work much better in the context of SLA monitoring than general central-tendency-based statistical tools, a fact which has been corroborated by similar application examples of DEA presented in this chapter and has therefore it acts as the primary motivation to propose this new approach. Towards this end, this chapter first builds up the context of presence-enabled services (Day, Rosenburg, & Sugano, 2000), its SLA and SLA parameters, and the monitoring requirements. Then it explains the basics of DEA and its application in various other engineering and services context. Ultimately, a DEA application framework for monitoring an SLA of presence-enabled services is proposed which can serve as a clear guideline for the customers of presence-enabled services, not only for SLA monitoring but also at various other stages of implementing presence-enabled services frameworks. This approach exploits the definitive suitability of the application of DEA methods to presence-enabled service monitoring problems, and can be easily implemented by the industry practitioners.


2020 ◽  
Vol 74 ◽  
pp. 02007
Author(s):  
Aleš Hes

Currently, there is an unprecedented development of modern communication technologies in B2B markets. In the context of Industry 4.0, globalization influences are increasingly reflected in the new information technologies that are becoming the domain of communication in B2B markets. The manufacturing environment is shaped by the ability to work with Big Data Analysis, use computer simulation tools and augmented reality and today’s phenomenon is evolving in the processing and business environment - linking the Internet of Things, Services and People to Potential production environment. An important role in this global interconnection of both manufacturing and processing - business environments is played by the communication conditions determined by sufficient capacity computing power. One of the real preconditions for B2B markets is to make full use of the cloud-based platform based on the establishment of dedicated data centres with the possibility of using high level of Service Level Agreement for B2B business partners. The paper deals with the evaluation and analysis of the possibilities of digitalization development in the company space, to examine the new global communication environment by using cloud computing and its impact on the quality of information service for customers. The influence of intercultural communication on the behaviour of business partners is examined.


Author(s):  
Oshin Sharma ◽  
Hemraj Saini

Cloud computing has revolutionized the working models of IT industry and increasing the demand of cloud resources which further leads to increase in energy consumption of data centers. Virtual machines (VMs) are consolidated dynamically to reduce the number of host machines inside data centers by satisfying the customer's requirements and quality of services (QoS). Moreover, for using the services of cloud environment every cloud user has a service level agreement (SLA) that deals with energy and performance trade-offs. As, the excess of consolidation and migration may degrade the performance of system, therefore, this paper focuses the overall performance of the system instead of energy consumption during the consolidation process to maintain a trust level between cloud's users and providers. In addition, the paper proposed three different heuristics for virtual machine (VM) placement based on current and previous usage of resources. The proposed heuristics ensure a high level of service level agreements (SLA) and better performance of ESM metric in comparison to previous research.


2010 ◽  
pp. 705-717
Author(s):  
Tapati Bandopadhyay ◽  
Pradeep Kumar

The concept of presence was initially associated with an instant messaging service, allowing an end user to recognize the presence of a peer online to send or receive messages. Now the technology has grown up to include various services like monitoring performance of any type of end user device, and services are accessible from anywhere, any time. The need for enhanced value remains the driving force behind these services, for example, Voice over Internet Protocol (VoIP) services, which is drawing tremendous research interest in services performance evaluation, measurement, benchmarking, and monitoring. Monitoring service level parameters happens to be one of the most interesting application-oriented research issues because various service consumers at the customer companies/end users’ level are finding it very difficult to design and monitor an effective SLA (Service Level Agreement) with the presence-enabled service providers. This chapter focuses on to these specific issues and presents a new approach of SLA monitoring through Data Envelopment Analysis (DEA). This extreme point approach actually can work much better in the context of SLA monitoring than general central-tendency-based statistical tools, a fact which has been corroborated by similar application examples of DEA presented in this chapter and has therefore it acts as the primary motivation to propose this new approach. Towards this end, this chapter first builds up the context of presence-enabled services (Day, Rosenburg, & Sugano, 2000), its SLA and SLA parameters, and the monitoring requirements. Then it explains the basics of DEA and its application in various other engineering and services context. Ultimately, a DEA application framework for monitoring an SLA of presence-enabled services is proposed which can serve as a clear guideline for the customers of presence-enabled services, not only for SLA monitoring but also at various other stages of implementing presence-enabled services frameworks. This approach exploits the definitive suitability of the application of DEA methods to presence-enabled service monitoring problems, and can be easily implemented by the industry practitioners.


Computers ◽  
2018 ◽  
Vol 7 (4) ◽  
pp. 64 ◽  
Author(s):  
Ahmad Khalil ◽  
Nader Mbarek ◽  
Olivier Togni

Providing Internet of Things (IoT) environments with service level guarantee is a challenging task for improving IoT application usage experience. We specify in this paper an IoT architecture enabling an IoT Service Level Agreement (iSLA) achievement between an IoT Service Provider (IoT-SP) and an IoT Client (IoT-C). In order to guarantee the IoT applications’ requirements, Quality of Service (QoS) mechanisms should be implemented within all the layers of the IoT architecture. Thus, we propose a specific mechanism for the lowest layer of our service level based IoT architecture (i.e., sensing layer). It is an adaptation of the IEEE 802.15.4 slotted CSMA/CA mechanism enabling to take into consideration the requirements of real-time IoT services. Our access method called QBAIoT (QoS based Access for IoT) extends IEEE 802.15.4 systems by creating a new contention access period for each specified traffic class in the iSLA. Furthermore, due to the huge number of IoT connected devices, self-configuring capability provisioning is necessary for limiting human intervention and total cost of ownership (TCO). Thus, we integrate a self-configuring capability to the QBAIoT access method by implementing the MAPE-K closed control loop within the IoT High Level Gateway (HL-Gw) of our proposed QoS based IoT architecture.


Author(s):  
Gurpreet Singh ◽  
Manish Mahajan ◽  
Rajni Mohana

BACKGROUND: Cloud computing is considered as an on-demand service resource with the applications towards data center on pay per user basis. For allocating the resources appropriately for the satisfaction of user needs, an effective and reliable resource allocation method is required. Because of the enhanced user demand, the allocation of resources has now considered as a complex and challenging task when a physical machine is overloaded, Virtual Machines share its load by utilizing the physical machine resources. Previous studies lack in energy consumption and time management while keeping the Virtual Machine at the different server in turned on state. AIM AND OBJECTIVE: The main aim of this research work is to propose an effective resource allocation scheme for allocating the Virtual Machine from an ad hoc sub server with Virtual Machines. EXECUTION MODEL: The execution of the research has been carried out into two sections, initially, the location of Virtual Machines and Physical Machine with the server has been taken place and subsequently, the cross-validation of allocation is addressed. For the sorting of Virtual Machines, Modified Best Fit Decreasing algorithm is used and Multi-Machine Job Scheduling is used while the placement process of jobs to an appropriate host. Artificial Neural Network as a classifier, has allocated jobs to the hosts. Measures, viz. Service Level Agreement violation and energy consumption are considered and fruitful results have been obtained with a 37.7 of reduction in energy consumption and 15% improvement in Service Level Agreement violation.


Author(s):  
Leonardo J. Gutierrez ◽  
Kashif Rabbani ◽  
Oluwashina Joseph Ajayi ◽  
Samson Kahsay Gebresilassie ◽  
Joseph Rafferty ◽  
...  

The increase of mental illness cases around the world can be described as an urgent and serious global health threat. Around 500 million people suffer from mental disorders, among which depression, schizophrenia, and dementia are the most prevalent. Revolutionary technological paradigms such as the Internet of Things (IoT) provide us with new capabilities to detect, assess, and care for patients early. This paper comprehensively survey works done at the intersection between IoT and mental health disorders. We evaluate multiple computational platforms, methods and devices, as well as study results and potential open issues for the effective use of IoT systems in mental health. We particularly elaborate on relevant open challenges in the use of existing IoT solutions for mental health care, which can be relevant given the potential impairments in some mental health patients such as data acquisition issues, lack of self-organization of devices and service level agreement, and security, privacy and consent issues, among others. We aim at opening the conversation for future research in this rather emerging area by outlining possible new paths based on the results and conclusions of this work.


Sign in / Sign up

Export Citation Format

Share Document