Enterprise Mobile Service Architecture

Author(s):  
Longji Tang ◽  
Wei-Tek Tsai ◽  
Jing Dong

Today, enterprise systems are integrated across wired and wireless networks. Enterprise Mobile Service Computing (EMSC) is a recent development style in distributed computing, and Enterprise Mobile Service Architecture (EMSA) is a new enterprise architectural style for mobile system integration. This chapter introduces the concepts of EMSC, discusses the opportunities, and addresses mobile constraints and challenges in EMSC. The mobile constraints include aspects relating to mobile hardware, software, networking, and mobility. Many issues such as availability, performance, and security are encountered due to these constraints. To address these challenges in EMSC, the chapter proposes seven architectural views: Enterprise Mobile Service, Enterprise Mobile Service Consumer, Enterprise Mobile Service Data, Enterprise Mobile Service Process, Enterprise Mobile Service Infrastructure, Enterprise Mobile Service Management, and Enterprise Mobile Service Quality. Each is described with principles, design constraints, and emerging technologies. In order to illustrate a practical implementation of EMSA, the chapter presents a major shipping and delivery services enterprise as a case study to describe the integration of Service-driven mobile systems in the enterprise.

Author(s):  
Longji Tang ◽  
Jing Dong ◽  
Yajing Zhao

There is a growing trend towards enterprise system integration across organizational and enterprise boundaries on the global Internet platform. The Enterprise Service Computing (ESC) has been adopted by more and more corporations to meet the growing demand from businesses and the global economy. However the ESC as a new distributed computing paradigm poses many challenges and issues of quality of services. For example, how is ESC compliant with the quality of service (QoS)? How do service providers guarantee services which meet service consumers’ needs as well as wants? How do both service consumers and service providers agree with QoS at runtime? In this chapter, SLA-Aware enterprise service computing is first introduced as a solution to the challenges and issues of ESC. Then, SLA-Aware ESC is defined as new architectural styles which include SLA-Aware Enterprise Service-Oriented Architecture (ESOA-SLA) and SLA-Aware Enterprise Cloud Service Architecture (ECSA-SLA). In addition, the enterprise architectural styles are specified through our extended ESOA and ECSA models. The ECSA-SLA styles include SLA-Aware cloud services, SLA-Aware cloud service consumers, SLA-Aware cloud SOA infrastructure, SLA-Aware cloud SOA management, SLA-Aware cloud SOA process and SLA-Aware SOA quality attributes. The main advantages of viewing and defining SLA-Aware ESC as an architectural style are (1) abstracting the common structure, constraints and behaviors of a family of ESC systems, such as ECSA-SLA style systems and (2) defining general design principles for the family of enterprise architectures. The design principles of ECSA-SLA systems are proposed based on the model of ECSA-SLA. Finally, we discuss the challenges of SLA-Aware ESC and suggest that the autonomic service computing, automated service computing, adaptive service computing, real-time SOA, and event-driven architecture can help to address the challenges.


Energies ◽  
2020 ◽  
Vol 13 (16) ◽  
pp. 4173 ◽  
Author(s):  
Ingo Liere-Netheler ◽  
Frank Schuldt ◽  
Karsten von Maydell ◽  
Carsten Agert

Power system security is increasingly endangered due to novel power flow situations caused by the growing integration of distributed generation. Consequently, grid operators are forced to request the curtailment of distributed generators to ensure the compliance with operational limits more often. This research proposes a framework to simulate the incidental amount of renewable energy curtailment based on load flow analysis of the network. Real data from a 110 kV distribution network located in Germany are used to validate the proposed framework by implementing best practice curtailment approaches. Furthermore, novel operational concepts are investigated to improve the practical implementation of distributed generation curtailment. Specifically, smaller curtailment level increments, coordinated selection methods, and an extension of the n-1 security criterion are analyzed. Moreover, combinations of these concepts are considered to depict interdependencies between several operational aspects. The results quantify the potential of the proposed concepts to improve established grid operation practices by minimizing distributed generation curtailment and, thus, maximizing power system integration of renewable energies. In particular, the extension of the n-1 criterion offers significant potential to reduce curtailment by up to 94.8% through a more efficient utilization of grid capacities.


2011 ◽  
pp. 111-133 ◽  
Author(s):  
Minna Pura

Mobile services have evolved into an important business area and many companies in various industries are offering mobile services. However, formal classifications or user-centric categorizations of mobile services are still scarce. This chapter develops a conceptual classification for mobile services that illustrates the characteristics of mobile services and gives indications on how to describe mobile business opportunities and categorize services from a customer-centric perspective. The classification scheme, grounded in previous research, is based on the type of consumption, context, social setting, and customer relationship with the service provider. The explorative classification is illustrated with two case studies of existing mobile services in the European market. The theoretical contribution to service management research involves how to describe mobile services from a customer perspective. Managerially, the classification helps marketers, service developers and stakeholders to evaluate, differentiate, group and market mobile service offerings more effectively.


Author(s):  
Manuel Mora ◽  
Jorge Marx Gomez ◽  
Rory V. O'Connor ◽  
Mahesh Raisinghani ◽  
Ovsei Gelman

The main international IT Service Management processes frameworks (ITIL v2, ISO/IEC 20000, COBIT 4.0, CMMI-SVC, MOF 4.0, and ITUP) include the design of IT services as part of their main best practices. However, despite having a common purpose and conceptual structure, they are organized differently. Hence, ITSM academic researchers and practitioners need to integrate a broad and diverse literature in relation to these frameworks. In Part I of this research, the authors pursued the goal of a descriptive-comparative analysis of fundamental concepts and IT service architecture design models used in the seven ITSM frameworks. In this paper (Part II) we complete this systemic analysis by using the ISO/IEC 15288 systems engineering standard and focusing on the IT design processes and practices reported in the aforementioned ITSM frameworks. Specifically, CMMI-SVC and ITUP are assessed in overall as the strongest frameworks from an engineering view, MOF 4.0 and ITIL v3 as moderate, and ISO/IEC 20000, ITIL v2 and COBIT as the weakest. ITSM academicians and in particular practitioners thus will need to distinguish their utilization according to the level of required detail of the IT service design process. This paper aims to advance our comprehension and understanding on the state of the art regarding what are IT services and how they can be designed. Thus it is of broad significance to ITSM researchers and practitioners.


2014 ◽  
Vol 1036 ◽  
pp. 834-839 ◽  
Author(s):  
Damian Krenczyk ◽  
Marcin Zemczak

In the paper practical implementation of the methodology of production planning systems with discrete event simulation (DES) systems integration has been presented. The required definitions of data structures and functions transformation in the form of XSLT documents have been presented. The functional algorithm and RapidSim software made on its basis, which is practical implementation of the integration methodology was developed. Developed software and parameterising documents have been used for the integration methodology verification. RapidSim system was made in VisualBasic development environment, and by the fact that Data Transformation XSLT documents can be independently developed, the software can be used for any integrated systems. During the verification phase of the implemented methodology, the software has been used for the practical implementation of Production Order Verification System (SWZ) for multi-assortment, concurrent production planning and Enterprise Dynamics simulation system integration.


2021 ◽  
Vol 81 (1) ◽  
pp. 285-296
Author(s):  
Федір Миколайович Цивільський ◽  
Віктор Миколайович Козел ◽  
Євгенія Анатоліївна Дроздова ◽  
Олена Олександрівна Приходько

The emerging range of personal mobile devices, due to their advanced technical characteristics, has made it possible to widely use them at enterprises, offices or educational institutions almost in any place. This has led to the introduction of a new concept of BYOD (Bring Your Own Device), when a personal device (phone, tablet) is used for work or study. One of the serious problems encountered by teachers on the way of implementing BYOD into the educational process is the insufficient level of information competence and the lack of educational manuals for such classes. The aim of the research is to investigate the relevance of implementing BYOD approach in teaching Computer Engineering students and to consider the possibilities of using mobile devices for didactic purposes directly in the classroom and in distance learning. Within BYOD, the use of learning support mobile systems in the learning process gives its participants access to training materials, services and models adapted for the use in a mobile environment. The teachers effectively manage the learning process, in particular, focus the students’ attention on the sources of information that give the most correct and complete answers within the relevant disciplines. The research presents learning outcomes of two groups: control, with the traditional method of teaching and the equipment provided by the educational institution, and experimental, when students use their own mobile devices (tablets and smartphones) in the educational process, which gives a possibility to learn in any place convenient for a student and remotely send progress reports. The results showed that the students of the experimental group outperformed their groupmates from the control group in academic progress. The implementation of BYOD elements has led to the increase in students’ motivation and interest in their own learning. The main positive aspects of using BYOD technology in the learning process have been identified, such as convenience and flexibility, reducing the expenses of educational institutions, simplifying work with the network services, interactivity of learning, and applying multimedia format in the presentation of educational material during lectures, laboratory and practical classes, effectiveness of work with information and the presentation of results.


Author(s):  
Shuiguang Deng ◽  
Hongyue Wu ◽  
Jianwei Yin

Sign in / Sign up

Export Citation Format

Share Document