scispace - formally typeset
Search or ask a question

Showing papers on "Differentiated service published in 1999"


Journal ArticleDOI
TL;DR: This paper presents a framework for the emerging Internet Quality of Service (QoS), and describes why MPLS and Constraint Based Routing have been introduced into this framework, how they differ from and relate to each other, and where they fit into the Differentiated Services architecture.
Abstract: We present a framework for the emerging Internet quality of service (QoS). All the important components of this framework-integrated services, RSVP, differentiated services, multiprotocol label switching (MPLS), and constraint-based routing-are covered. We describe what integrated services and differentiated services are, how they can be implemented, and the problems they have. We then describe why MPLS and constraint-based routing have been introduced into this framework, how they differ from and relate to each other, and where they fit into the differentiated services architecture. Two likely service architectures are presented, and the end-to-end service deliveries in these two architectures are illustrated. We also compare ATM networks to router networks with differentiated services and MPLS. Putting all these together, we give the readers a grasp of the big picture of the emerging Internet QoS.

751 citations


Proceedings ArticleDOI
01 Aug 1999
TL;DR: In this article, the authors present the architecture and implementation of a secure service discovery service (SDS), which uses the eXtensible Markup Language (XML) to encode such factors as cost, performance, location, and deviceor service-specific capabilities.
Abstract: The widespread deployment of inexpensive communications technology, computational resources in the networking infrastructure, and network-enabled end devices poses an interesting problem for end users: how to locate a particular network service or device out of hundreds of thousands of accessible services and devices. This paper presents the architecture and implementation of a secure Service Discovery Service (SDS). Service providers use the SDS to advertise complex descriptions of available or already running services, while clients use the SDS to compose complex queries for locating these services. Service descriptions and queries use the eXtensible Markup Language (XML) to encode such factors as cost, performance, location, and deviceor service-specific capabilities. The SDS provides a highlyavailable, fault-tolerant, incrementally scalable service for locating services in the wide-area. Security is a core component of the SDS and, where necessary, communications are both encrypted and authenticated. Furthermore, the SDS uses an hybrid access control list and capability system to control access to service information.

741 citations


Patent
09 Nov 1999
TL;DR: In this article, a system for a small business owner to manage a plurality of different financial accounts and services and to perform a number of different transactions wherein each of the transactions may involve multiple subtransactions which occur among different financial service providers is described.
Abstract: A system for a small business owner to manage a plurality of different financial accounts and services and to perform a number of different financial transactions wherein each of the transactions may involve multiple subtransactions which occur among different financial service providers. The system includes a network basedsystem which includes a plurality of client systems (12) connected through a network (20) such as the Internet IP network or server system (14) which can connect to financial service providers (18). Server (14) is also coupled to a database (16) that stores information representative of subscriber's accounts.

226 citations


Patent
12 Oct 1999
TL;DR: In this paper, an accounting framework is provided for a communications system having a plurality of service providers, including cellular service providers (40, 42) and/or data network service providers(36, 38).
Abstract: An accounting framework is provided for a communications system (10) having a plurality of service providers, including cellular service providers (40, 42) and/or data network service providers, e.g., Internet service providers (36, 38). Accounting units (70) containing accounting information are exchanged between service providers to allow the service providers to charge for usage of services. The accounting units (70) have a predetermined format to allow them to be exchanged between different service providers. Each accounting unit (70) includes a plurality of fields, including a service type field (71), a usage of radio interface field (72), a usage of a visited or external network field (73), a usage of mobility management field (74), a quality of service field (78), a usage of a packet data protocol field (82), and other fields. Users may be charged for services based on these fields.

212 citations


Journal ArticleDOI
TL;DR: In this article, the authors explore the meaning of the service concept in the management literature and find that there are clear dichotomies between providers' and customers' views of "service" and suggest ideas for marketing and management of services.
Abstract: Explores the richness of meaning that has grown up around the service concept in the management literature. Examines the subtleties which arise when “service” is used to denote industries, outcomes and processes, and explores more specific service concepts, such as the quality of service encounters and service experiences. Concludes that many of the concept’s ambiguities relate to the use of the word “service” and shifts of meaning which result. Indicates that there are clear dichotomies between providers’ and customers’ views of “service”. Parallel dichotomies can be found between the delivery and consumption of “core services” and the emotional/hedonic dimensions of service performance. Discusses the importance of these and suggests ideas for the marketing and management of services. In addition, develops a broad structural framework with which these ideas can be linked and identifies a number of new avenues of research.

197 citations


Book
01 Jun 1999
TL;DR: This book offers network architects, engineers, and managers of Internet and other packet networks critical insight into the continuing development of Differentiated Services.
Abstract: From the Publisher: Differentiated Services is an Internet Engineering Task Force (IETF) standards effort to create a simple scheme which provides a range of quality of service (QoS) levels. It is one of the few technologies to date that will enable networks to handle traffic in a specific manner to meet the service demands of particular applications. This book offers network architects, engineers, and managers of Internet and other packet networks critical insight into the continuing development of Differentiated Services. Differentiated Services for the Internet includes: Exploration of how Diffserv can be used to diversify Internet service offerings Detailed evaluation of the advantages and disadvantages of Differentiated Services (Diffserv) in comparison to traditional best effort network services Coverage of the IETF's Diffserv specification-the necessary basis for implementations of the technology Detailed coverage of interworking Diffserv with Integrated Services (Intserv) networks

176 citations


Patent
James Beck1, Alain Gefflaut1, Nayeem Islam1
23 Sep 1999
TL;DR: In this article, the authors propose a middleware-based service discovery method based on periodic multicasting of exported service descriptions to nearby devices over the (ad-hoc) network.
Abstract: A method, apparatus and computer product that enables one or more computing devices to discover and use services over a network, which may be ad-hoc when the computing device is mobile. Service discovery is based on periodic multicasting of exported service descriptions to nearby devices over the (ad-hoc) network. Middleware enables a device to discover, advertise and use services. This enables software clients on the same device to share a service implementation (in the case of a local service) or to share an implementation proxy (in the case of a remote service). Each device being aware of the services (and service locations) that are currently available generally reduces the response time associated with accessing available services. While service descriptors are multicast and discovered, the service software is only downloaded on the device when the service is used. This enables economical resource management that is particularly useful for mobile devices.

157 citations


Patent
Leon Lumelsky1, Nelson R. Manohar1
17 Jun 1999
TL;DR: In this paper, a system and method for configuring service-oriented resources suitable for the resource management in a media server and more particularly for resource configuration across distributed media servers is presented.
Abstract: A system and method for configuring service-oriented resources suitable for the resource management in a media server and more particularly, for resource configuration across distributed media servers. Heterogeneous media serves are configured in terms of homogeneous service-oriented resource units each used to represent a resource allocation commitment from a participating server for provisioning a particular media service on demand. A service unit associated with each different service supported by a media server represents an envelope of resource requirements as needed for provisioning a service. The method includes generating a resource envelope, and additionally compensating, at a media server, for differences between true resource utilization and resource envelope projected by a service unit. Each service unit also comprises a signature representing metadata used to control access to a service unit by defining rights, privileges, and characteristics of services that may use that particular server unit.

154 citations


Patent
21 May 1999
TL;DR: In this paper, a network policy management system and methods define service templates, which contain information on the topologies of services such as video calls, web services, order processing applications, or the like.
Abstract: A network policy management system and methods define service templates. The service templates contain information on the topologies of services such as video calls, web services, order processing applications, or the like. The service templates also contain information about the quality of service required by each of the data flows which will be generated when an instance of the service is used. The policy management system allows users to add new services by selecting a service template and specifying endpoints for the service on a map of the network. The system automatically generates updated packet forwarding rules for use at a plurality of packet processing devices in the network.

130 citations


Journal ArticleDOI
TL;DR: Three simple, server‐side, application‐level mechanisms to provide two different levels of Web service (regular and low priority) are presented and show that even with background traffic sufficient to saturate the network, foreground performance is reduced by at most 4–17%.
Abstract: The current World Wide Web service model treats all requests equivalently, both while being processed by servers and while being transmitted over the network. For some uses, such as Web prefetching or multiple priority schemes, different levels of service are desirable. This paper presents three simple, server-side, application-level mechanisms (limiting process pool size, lowering process priorities, limiting transmission rate) to provide two different levels of Web service (regular and low priority). We evaluated the performance of these mechanisms under combinations of two foreground workloads (light and heavy) and two levels of available network bandwidth (10 Mb/s and 100 Mb/s). Our experiments show that even with background traffic sufficient to saturate the network, foreground performance is reduced by at most 4–17%. Thus, our user-level mechanisms can effectively provide different service classes even in the absence of operating system and network support.

113 citations


01 Jun 1999
TL;DR: The "service:" URL scheme name is used to define URLs (called "service: URLs" in this document) that are primarily intended to be used by the Service Location Protocol in order to distribute service access information.
Abstract: The "service:" URL scheme name is used to define URLs (called "service: URLs" in this document) that are primarily intended to be used by the Service Location Protocol in order to distribute service access information. These schemes provide an extensible framework for client-based network software to obtain configuration information required to make use of network services. When registering a service: URL, the URL is accompanied by a set of well-defined attributes which define the service. These attributes convey configuration information to client software, or service characteristics meaningful to end users.

Odlyzko Andrew1
21 Jan 1999
TL;DR: In this article, an examination of patterns of use and economics of data networks suggests that providing enough bandwidth for uniformly high quality transmission may be practical, if this turns out not to be possible, only the simplest schemes that require minimal involvement by end users and network administrators are likely to be accepted.
Abstract: Can high quality be provided economically for all transmissions on the Internet? Current work assumes that it cannot, and concentrates on providing differentiated service levels. However, an examination of patterns of use and economics of data networks suggests that providing enough bandwidth for uniformly high quality transmission may be practical. If this turns out not to be possible, only the simplest schemes that require minimal involvement by end users and network administrators are likely to be accepted. On the other hand, there are substantial inefficiencies in the current data networks, inefficiencies that can be alleviated even without complicated pricing or network engineering systems.

Patent
02 Mar 1999
TL;DR: In this paper, the authors present a product hierarchy database that organizes company market performance and stock investment information by the products and services produced and offered by each competitor, where companies that produce each product/service are relationally linked to each of their products/services through records.
Abstract: A product hierarchy database organizes company market performance and stock investment information by the products and services produced and offered by each competitor. The companies that produce each product/service are relationally linked to each of their products/services through records. An investment information service includes the product/service hierarchy database and makes it accessible to investor and analyst subscribers through a query system across the Internet. Data entry personnel continually load qualitative and quantitative information about companies and their products/services through a product hierarchy generator connected to the product/service hierarchy database. Subscribers can punch-through to query individual data items, and they can find out what relationships exist between all the important aspects of the companies and the products/services being tracked. The invention also provides for the creation of an index and corresponding index value for every product or service type in the database, which consists of a composite of all companies in a product or service area and whose index value can be measured and compared against any other product or service type index value.

Proceedings ArticleDOI
07 Jun 1999
TL;DR: It is shown that a number of techniques proposed improve the likelihood of achieving the desired throughput guarantees and also improve the service differentiation in a differentiated services framework.
Abstract: This paper discusses techniques for achieving desired throughput guarantees in the Internet that supports a differentiated services framework. The diff-serv framework proposes the use of different drop precedences to achieve service guarantees over the Internet. However, it has been observed that the drop precedences by themselves cannot achieve the desired target rates because of the strong interaction of the transport protocol with packet drops in the network. This paper proposes and evaluates a number of techniques to better achieve the throughput guarantees in such networks. The proposed techniques consider: modifying the transport protocol at the sender; modifying the marking strategies at the marker; and modifying the dropping policies at the router. It is shown that these techniques improve the likelihood of achieving the desired throughput guarantees and also improve the service differentiation.

Journal ArticleDOI
TL;DR: Methodology for quantifying the tradeoff between economies of scale associated with larger systems and the benefit of having customers with shorter service times separated from other customers with longer service times, as is done in service systems with express lines is provided.
Abstract: We explore the issues of when and how to partition arriving customers into service groups that will be served separately, in a first-come first-served manner, by multiserver service systems having a provision for waiting, and how to assign an appropriate number of servers to each group. We assume that customers can be classified upon arrival, so that different service groups can have different service-time distributions. We provide methodology for quantifying the tradeoff between economies of scale associated with larger systems and the benefit of having customers with shorter service times separated from other customers with longer service times, as is done in service systems with express lines. To properly quantify this tradeoff, it is important to characterize service-time distributions beyond their means. In particular, it is important to also determine the variance of the service-time distribution of each service group. Assuming Poisson arrival processes, we then can model the congestion experienced by each server group as an M/G/s queue with unlimited waiting room. We use previously developed approximations for M/G/s performance measures to quickly evaluate alternative partitions.

Patent
27 Sep 1999
TL;DR: In this paper, a disconnected transaction system for pervasive computing devices includes a service provider server; a pervasive computing device; a communication network; and a service contract downloadable from the service providers server to the pervasive Computing device over the communication network during a connected mode, the service contract specifying rules of interaction with a service application associated with the service contracts and providing a service providers with a mechanism for validating, upon reconnection to the service provider servers, at least one transaction of the service application performed by a user of the pervasive computer during a disconnected mode.
Abstract: A disconnected transaction system for pervasive computing devices includes a service provider server; a pervasive computing device; a communication network; and a service contract downloadable from the service provider server to the pervasive computing device over the communication network during a connected mode, the service contract specifying rules of interaction with a service application associated with the service contract and providing a service provider with a mechanism for validating, upon reconnection to the service provider server, at least one transaction of the service application performed by a user of the pervasive computing device during a disconnected mode.

Proceedings ArticleDOI
01 May 1999
TL;DR: This short paper presents, focusing on queueing delays only, four different service models that offer such a class relative differentiation, and results illustrate that a predictable and controllable delay differentiation can be achieved in only one of these models.
Abstract: In the context of relative differentiated services the network traffic is grouped in N classes of service which differ in their relative forwarding quality, i.e., class i is better than class i 1 in terms of local (per-hop) forwarding measures of the queueing delays and packet losses. Users and applications, on the other hand, select adaptively the class that best meets their requirements and/or cost constraints. In this short paper we present, focusing on queueing delays only, four different service models that offer such a class relative differentiation. Simulation results illustrate that a predictable and controllable delay differentiation can be achieved in only one of these models. A more complete treatment of this subject appears in [I].

01 Jan 1999
TL;DR: This paper describes a protocol through which the user and the network (or two network domains) can negotiate network services, and refers to the protocol as a Resource Negotiation and Pricing protocol (RNAP).
Abstract: Network delivery services providing “better-than-best-effort” service over the Internet are being studied, and are particularly necessary for multimedia applications The selection and use of a specific delivery service involves negotiation between the user and the network; they agree upon specifications such as the type of service user packets will receive, the constraints the user traffic must adhere to, and the price to be charged for the service In this paper, we describe a protocol through which the user and the network (or two network domains) can negotiate network services We refer to the protocol as a Resource Negotiation and Pricing protocol (RNAP) Through RNAP, the network service provider communicates availability of services and delivers price quotations and charging information to the user, and the user requests or re-negotiates services with desired specifications for one or more flows RNAP protocol mechanisms are flexible enough to support multiple delivery service models, and allow dynamic re-negotiation of services during a session Two different network architectures are defined to support RNAP, a centralized architecture with a Network Resource Negotiator (NRN) administering each network domain, and a distributed architecture without any centralized controlling entity Mechanisms are proposed for local price and charge computation, formulation of end-to-end prices and charges across multiple domains, and communication of this information through RNAP messages Results of a prototype implementation are briefly described

Proceedings ArticleDOI
31 May 1999
TL;DR: An approach to managing and pricing service level agreements (SLA) for differentiated services that uses a simple upper bound for the effective bandwidth of the conforming traffic as a proxy for resource usage, which depends on the user's traffic profile.
Abstract: We present an approach to managing and pricing service level agreements (SLA) for differentiated services that uses a simple upper bound for the effective bandwidth of the conforming traffic as a proxy for resource usage. The bound depends on the user's traffic profile (peak rate and token bucket descriptor). Usage charges for a specific time period are proportional to this proxy, and their calculation requires only measurements of volume. We discuss and present experimental results regarding the incentives and fairness of the proxy, which is required in order to achieve economic efficiency. An important feature of our approach is the simplicity of the user's procedure for selecting optimal token bucket parameters. Our approach is quite generic and can be applied to scheduling disciplines that enable the provision of multiple service classes with different levels of performance. Finally, we present a case study for two service classes, real-time and non-real-time, with actual Internet traces.

Patent
29 Jun 1999
TL;DR: In this article, a server system provides a client system with access to a number of services, including a service name identifying the service, and at least one unique port identifying each service provider for that service so that one service name can be used in accessing the multiple service providers that provide the desired service.
Abstract: A server system provides a client system with access to a number of services. For each service, if a given service provider is overloaded (or if the client is unable to contact that provider), the client can contact any other of the service providers capable of providing the requested service. The server system provides information to the client system identifying a list of services that the server system provides. For each service in the list of services, the information includes a service name identifying the service, and at least one unique port identifying each service provider for that service so that one service name can be used in accessing the multiple service providers that provide the desired service. The request from the client includes a service name identifying the desired service provided by the server system, and includes at least one port corresponding to a service provider that provides the desired service, the port being selected from the ports provided by the server system.

Proceedings ArticleDOI
06 Jun 1999
TL;DR: This paper analyzes a framework to offer reservation of resources and QoS guarantees according to the resource reservation protocol (RSVP) paradigm in a network cloud that supports a differentiated services architecture.
Abstract: This paper analyzes a framework to offer reservation of resources and QoS guarantees according to the resource reservation protocol (RSVP) paradigm in a network cloud that supports a differentiated services architecture. The key elements are: intelligent edge devices; a flow admission and resource allocation method involving an admission control server; “simple” core routers based on the differentiated services model. The main functionality of a client/server protocol between the edge devices and the admission control server, called simple admission control protocol, is described. The proposed framework is referred to as admission control server based resource allocation. Scalability is analyzed and compared with RSVP approach.

Patent
20 May 1999
TL;DR: In this paper, a telephone system provides subscribers with access to a service provider's platform logic and data implemented in any runtime environment, and the service logic modification is achieved in a process in which the service requirements and objectives are set.
Abstract: A telephone system provides subscribers with access to a service provider's platform logic and data implemented in any runtime environment. In one embodiment, the service logic is embodied in Java applets and Java beans in a JAVA virtual machine for subscriber personalizing and modifying the service logic. The provider provides the subscriber a tool kit or access to a support server for writing service logic modifications as JAVA beans. The service logic modification is achieved in a process in which the service requirements and objectives are set. The service specifications are designed, implemented, tested, and rolled out. Initial service provisioning and support is provided a subscriber, service modification by the subscriber is made to subscriber data provisioning and subscriber service logic provisions. A modified service logic is locally tested by the subscriber, followed by remote testing of the modification on the service provider's premises. The service provider provisions and then supports the modified service logic.

Patent
Paul Weschler1
19 May 1999
TL;DR: In this article, the authors present a system and method for providing dynamic references between services in a computer system which allows a first service (e.g., an application program running on a client computer in a local environment) to gain reference to a second service without requiring knowledge of how to find the service or a particular version of the service on a distributed computer network.
Abstract: A system and method for providing dynamic references between services in a computer system which allows a first service (e.g. an application program running on a client computer in a local environment) to gain reference to a second service (e.g. a service running on a server computer in a distributed environment) without requiring knowledge of how to find the service or a particular version of the service on a distributed computer network. In a particular embodiment disclosed, when a getService method is called, a reference back to an instance of the service is returned and an implementation of a service connector interface encapsulates the logic necessary to lookup an instance of a specific service and return a reference to that service. In this regard, developers of a service may write, or program, a module that adheres to a service connector interface. Users of a service specify that the service connector provided by the service can be used to dynamically gain a reference to the service in their application. Additional methods can be added to the service connectors to support retrieval of references to specific versions or instances of a service.

Patent
05 Oct 1999
TL;DR: In this paper, a method and system for responding to a trigger condition detected during the handling of a call connection in an intelligent network (IN) is presented, where a service interaction manager (40) in a service control point (14) queries a home location register (60) for a subscriber involved in the call connection requesting subscriber subscription information.
Abstract: A method and system for responding to a trigger condition detected during the handling of a call connection in an intelligent network (IN). Upon receipt of an IN trigger, a service interaction manager (40) in a service control point (14) queries (37) a home location register (60) for a subscriber involved in the call connection requesting subscriber subscription information. The service interaction manager also queries (95) a service library (50) associated with the service control point to determine which of an implicated set of services are currently available in the service library and what the properties of those services are. Depending upon which services are available, which services are in the subscriber's subscription list, and the service priority information received from the home location register and the service library, including the properties data from the service library, the service interaction manager reduces the list of implicated services to an applicable set of services and generates a customized execution sequence for the applicable services. Thereafter, at least one of the applicable services is executed (108) in accordance with the customized execution sequence.

Patent
19 Oct 1999
TL;DR: In this paper, a resource management system for an intelligent communications network having one or more distributed service nodes, each service node for providing services relating to an event received at a network resource associated with a service node.
Abstract: A resource management system for an intelligent communications network having one or more distributed service nodes, each service node for providing services relating to an event received at a network resource associated with a service node. The system provides a look-ahead routing function enabling instantiation of service object instances at any service node in said intelligent network based on service types available at the service node in said network, an associated capability status indicating whether a requested service is available for instantiation at a service node and is currently active; and, a status of an execution environment capable of executing service object instances at each service node. Mechanisms are employed for instantiating service instances according to an implemented business strategy, e.g., load balancing.

Journal ArticleDOI
TL;DR: This work designs a hybrid closed user group service that combines address translation, security, call control, connectivity, charging, and user interaction and describes components that can be assembled to build these logics.
Abstract: The success of new service provision platforms will largely depend on their ability to blend with existing technologies. The advent of Internet telephony, although impressive, is unlikely to make telephone customers suddenly turn in favor of computers. Rather, customers display increasing interest in services that span multiple networks (especially Internet protocol-based networks and the telephone and cellular networks) and open new vistas. We refer to these services as hybrid services and propose an architecture for their provision. This architecture allows for programming the service platform elements (i.e., network nodes, gateways, control servers, and terminals) in order to include new service logics. We identify components that can be assembled to build these logics by considering a service as a composition of features such as address translation, security, call control, connectivity, charging, and user interaction. Generic service components are derived from the modeling of these features. We assure that our proposal can be implemented even in existing systems in return for slight changes. These systems are required to generate an event when a special service is encountered. The treatment of this event is handled by an object at a Java service layer. Java has been chosen for its platform-neutrality property and its embedded security mechanisms. Using our architecture, we design a hybrid closed user group service.

Proceedings ArticleDOI
01 Aug 1999
TL;DR: The principal contribution of this work is the demonstration that it is possible to use informed transcoding techniques to balance the need for good quality of multimedia content while reducing consumed network bandwidth and server CPU overhead.
Abstract: Mobile applications will increasingly depend upon multimedia information originating in the web and attempt to access this data over wireless networks that are more expensive and slower than typical wireline internet access from desktops. Transcoding is an important technique that can allow network proxy servers to offer differentiated service by customizing the delivered object size for the network bandwidth available on the “last hop” to the mobile client. We exploit technology that we had previously developed that characterized the quality versus size tradeoffs in transcoding JPEG images. This technology supplies more information for use in transcoding policy decision making. We evaluate the performance benefits of incrementally incorporating this information in a series of transcoding policies. The principal contribution of this work is the demonstration that it is possible to use informed transcoding techniques to balance the need for good quality of multimedia content while reducing consumed network bandwidth and server CPU overhead. We show that policies that aggressively transcode the larger images can produce images with Quality factor values that closely follow the un-transcoded base case while still saving as much as 150 KB. A transcoding policy that has knowledge of the characteristics of the link to the client can avoid as many as 40% of (unnecessary) transcodings.

01 Jan 1999
TL;DR: Preliminary experimental results show that this twotier architecture can allocate network level resources according to administrative policies and provide high quality of network service to specific flows effectively.
Abstract: We present here a partial prototype implementation of the Two-Tier architecture for resource allocation in Differentiated Services networks, first presented in [ROTZY98]. Specifically, we have implemented the low level forwarding path support for providing different levels of network services. The allocation of resources is managed by the Bandwidth Broker. Our Bandwidth Broker implementation contains a policy database which stores information about flows requiring increased network service, and the Bandwidth Broker configures routers forwarding parameters in the domain accordingly. This policy database can be accessed and updated through a web interface. Our preliminary experimental results show that this twotier architecture can allocate network level resources according to administrative policies and provide high quality of network service to specific flows effectively. Our implementation is part of Qbone effort under Internet2 initiative, a testbed for IP quality of service technologies.

Book
26 Apr 1999
TL;DR: This presentation explains the development and use of Service Location Protocol in the enterprise and some examples show how the protocol has changed over the years from simple to complex to efficient.
Abstract: SERVICE LOCATION BACKGROUND Finding Services on Enterprise Intranets Existing Service Location Mechanisms Service Location Protocol Version 1 SERVICE LOCATION PROTOCOL DESIGN AND USE Service Types and Templates Service Location Protocol Version 2 Security The Java API The C API DEPLOYING SLP IN THE ENTERPRISE Service Location Protocol Configuration Enterprise Deployment of Service Location Protocol Managing Service Location Protocol Service Location Protocol in Action Glossary Bibliography Index.

Proceedings ArticleDOI
24 May 1999
TL;DR: An architecture that uses contracts based on service level agreements (SLA) to share selective management information across administrative boundaries is described and the design of a prototype implementation of this architecture is described that has been used by us for automatically measuring, monitoring, and verifying servicelevel agreements for Internet services.
Abstract: Increasingly, services such as E-commerce, Web hosting, application hosting, etc., are being deployed over an infrastructure that spans multiple control domains. These end-to-end services require cooperation and internetworking between multiple organizations, systems and entities. Currently, there are no standard mechanisms to share selective management information between the various service providers or between service providers and their customers. Such mechanisms are necessary for end-to-end service management and diagnosis as well as for ensuring the service level obligations between a service provider and its customers or partners. In this paper we describe an architecture that uses contracts based on service level agreements (SLA) to share selective management information across administrative boundaries. We also describe the design of a prototype implementation of this architecture that has been used by us for automatically measuring, monitoring, and verifying service level agreements for Internet services.