scispace - formally typeset
Search or ask a question

Showing papers on "Differentiated service published in 2017"


Journal ArticleDOI
TL;DR: In this article, the authors develop a typology and positioning map for service strategy, in the context of rapid technological change, and outline the process for firms to position or reposition their service strategies.
Abstract: Advancements in technology are radically transforming service, and increasingly providing the underlying basis for service strategy. In this paper, we develop a typology and positioning map for service strategy, in the context of rapid technological change, and outline the process for firms to position or reposition their service strategies. Which strategy to choose is based on the degree to which customer demand is heterogeneous, and the degree to which potential customer lifetime value varies across customers. This results in four strategies: the McService strategy that is standardized and transactional, the Relational Service strategy that is standardized and relational, the Customized Transaction strategy that is personalized and transactional, and the Adaptive Personalization strategy that is personalized and relational. We provide firms a roadmap for identifying a “sweet spot” strategy in relation to a segment’s realized or potential customer lifetime value, combined with the firm’s technological capabilities. Because technological capabilities inevitably advance, firms will tend to move from standardized to personalized and from transactional to relational over time, implying that firms should be alert to technological opportunities to personalize their relationships with customers. Our strategic framework also produces a useful bridge from marketing practice to the conceptual evolution of the service literature, showing how the historical trends toward continuing customer relationships and co-productive personalization should drive strategic thinking in service.

139 citations


Journal ArticleDOI
TL;DR: A novel dynamic hybrid metaheuristic algorithm is developed for the formulated profit maximization problem, based on simulated annealing and particle swarm optimization that can guarantee that differentiated service qualities can be provided with higher overall performance and lower energy cost.
Abstract: A key factor of win–win cloud economy is how to trade off between the application performance from customers and the profit of cloud providers. Current researches on cloud resource allocation do not sufficiently address the issues of minimizing energy cost and maximizing revenue for various applications running in virtualized cloud data centers (VCDCs). This paper presents a new approach to optimize the profit of VCDC based on the service-level agreements (SLAs) between service providers and customers. A precise model of the external and internal request arrival rates is proposed for virtual machines at different service classes. An analytic probabilistic model is then developed for non-steady VCDC states. In addition, a smart controller is developed for fine-grained resource provisioning and sharing among multiple applications. Furthermore, a novel dynamic hybrid metaheuristic algorithm is developed for the formulated profit maximization problem, based on simulated annealing and particle swarm optimization. The proposed algorithm can guarantee that differentiated service qualities can be provided with higher overall performance and lower energy cost. The advantage of the proposed approach is validated with trace-driven simulations.

114 citations


Journal ArticleDOI
TL;DR: In this article, the authors examined knowledge-based service composition and adaptive resource planning in a cloud manufacturing environment, and proposed a feasible service composition method that facilitates easy mapping between service requests and manufacturing resources based on restrictive rule sets in the cloud and availability information about a resource.

113 citations


Journal ArticleDOI
TL;DR: This work proposes an approach to data consistency checking for the dynamic replacement of service process and provides fundamental theory guidance to enhance the credibility ofservice process in the modern service industry.
Abstract: The technology of service-oriented architecture (SOA) and Web service provides a promising method to rapidly develop the distributed interoperable system for E-commerce applications at low cost. Due to the cross-organizational feature, the dynamic replacement of service process is an important way to guarantee the correctness of service software evolution, supporting the capacity of handling unexpected service failures. However, considering the new services used in the reconfigured process may be incompatible, data consistency should be checked to ensure that the original business logics can be accurately simulated. In response to this problem, we propose an approach to data consistency checking for the dynamic replacement of service process. First, the behavioral model and data model for formalizing service process are introduced, and then the data consistency problem of dynamic replacement is discussed. Second, the data replacement patterns are presented to specify different kinds of replacement behaviors. Third, the single-service replacement method is used to check the data consistency of an individual service dynamic replacement, which aims to compute the similarity degree between interface data. The multi-services replacement method is employed to check the data consistency of a set of services dynamic replacements, which explores critical paths to substitute a part of service processes. Finally, a case study and experiments demonstrate the effectiveness and efficiency of the proposed methods in the data consistency of dynamic replacement. Our approach provides fundamental theory guidance to enhance the credibility of service process in the modern service industry.

54 citations


Proceedings ArticleDOI
01 Oct 2017
TL;DR: This paper first proposes a well-founded service contract ontology, and then extends the ArchiMate language to reflect the elements of the service contractOntology, to address the representation of service contract elements with a systematic approach.
Abstract: Service contracts bind parties legally, regulating their behavior in the scope of a (business) service relationship. Given that there are legal consequences attached to service contracts, understanding the elements of a contract is key to managing services in an enterprise. After all, provisions in a service contract establish obligations and rights for service providers and customers that must be respected in service delivery. The importance of service contracts to service provisioning in an enterprise has motivated us to investigate their representation in enterprise models. We have observed that approaches fall into two extremes of a spectrum. Some approaches, such as ArchiMate, offer an opaque "contract" construct, not revealing the rights and obligations in the scope of the governed service relationship. Other approaches, under the umbrella term "contract languages", are devoted exactly to the formal representation of the contents of contracts. Despite the applications of contract languages, they operate at a level of detail that does not match that of enterprise architecture models. In this paper, we explore the gap between these two extremes. We address the representation of service contract elements with a systematic approach: we first propose a well-founded service contract ontology, and then extend the ArchiMate language to reflect the elements of the service contract ontology. The applicability of the proposed extension is assessed in the representation of a real-world cloud service contract.

38 citations


Journal ArticleDOI
TL;DR: A Physical Service Model (PSM) is proposed as a common conceptual model to describe heterogeneous IoT physical services and a Physical Service Selection (PSS) method is proposed that takes a user preference and an absolute dominance relationship among physical services into account.
Abstract: Information Systems (ISs) have become one of the crucial tools for various organizations in managing and coordinating business processes. Now we are entering the era of the Internet of Things (IoT). IoT is a paradigm in which real-world physical things can be connected to the Internet and provide services through the computing devices attached. The IoT infrastructure is starting to be integrated with ISs thereby diminishing the boundaries between the physical world and the business IT systems. With the development of IoT technologies, the number of connected things and their available physical services are increasing rapidly. Thus, selecting an appropriate service that satisfies a user’s requirements from such services becomes a time-consuming challenge. To address this issue, we propose a Physical Service Model (PSM) as a common conceptual model to describe heterogeneous IoT physical services. PSM contains three core concepts (device, resource, and service) and specifies their relationships. Based on the proposed PSM, we define three types of Quality of Service (QoS) attributes and rate candidate services according to user requirements. To dynamically rate QoS values and select an appropriate physical service, we propose a Physical Service Selection (PSS) method that takes a user preference and an absolute dominance relationship among physical services into account. Finally, experiments are conducted to evaluate the performance of the proposed method.

34 citations


Journal ArticleDOI
TL;DR: In this paper, the authors derived necessary and sufficient conditions to relate the fill rate requirement of each customer to the resources needed in the system and provided a new approach to study the value of resource pooling in a system with differentiated service requirements.
Abstract: Resource pooling strategies have been widely used in industry to match supply with demand. However, effective implementation of these strategies can be challenging. Firms need to integrate the heterogeneous service level requirements of different customers into the pooling model and allocate the resources (inventory or capacity) appropriately in the most effective manner. The traditional analysis of inventory pooling, for instance, considers the performance metric in a centralized system and does not address the associated issue of inventory allocation. Using Blackwell’s Approachability Theorem, we derive a set of necessary and sufficient conditions to relate the fill rate requirement of each customer to the resources needed in the system. This provides a new approach to studying the value of resource pooling in a system with differentiated service requirements. Furthermore, we show that with “allocation flexibility,” the amount of safety stock needed in a system with independent and identically distribut...

30 citations


Proceedings ArticleDOI
Wei Gao1, Jian Wu1
25 Jun 2017
TL;DR: This paper proposes a novel recommendation framework consisting of two stages: Service Set Generation Stage and Service Set Ranking Stage, which argues that services should be recommended not individually, but collectively.
Abstract: With an overwhelming number of web services online, recommending services for automatic mashup creation greatly facilitates the composition process of developers. Various approaches have been proposed for the task. However, these approaches concentrate on improving the recommending accuracy of an individual service, which give rise to two problems: (1) Top-ranked services may be highly redundant with the same functionality, and (2) The cooperation relations among services are ignored. Therefore, we argue that services should be recommended not individually, but collectively. In this paper, we focus on the problem of recommending service sets instead of services. A service set contains a list of functionally distinct services that collectively match different aspects of functional requirements and are more inclined to compose together following mashup composition patterns. To this end, we propose a novel recommendation framework consisting of two stages: Service Set Generation Stage and Service Set Ranking Stage. We also perform an experimental evaluation on ProgrammableWeb dataset to demonstrate the effectiveness of our framework.

27 citations


Journal ArticleDOI
TL;DR: A detailed and empirical survey for Enterprise Service Bus (ESB) in Service-Oriented Architecture (SOA) paradigm presents core functionality of ESB like message routing, message handling and service stack.

27 citations


Journal ArticleDOI
TL;DR: The proposed SADQ is the first scheme in optical networks to employ exhaustive differentiation at the levels of routing, spectrum allocation, and survivability in a single algorithm and is compared with two existing benchmark routing and spectrum allocation schemes designed under EONs.

27 citations


Journal ArticleDOI
TL;DR: 5G network management architectures are described and virtualization components that enable over-the-top service-provider- oriented network service are proposed, and a distributed prioritization network service chain management scheme for over- the-top application flows is introduced, based on matching theory.
Abstract: The fifth generation wireless networks are expected to offer high capacity and accommodate numerous over-the-top applications, relying on users' Internet connectivity, thus involving different stakeholders, that is, network service providers and over-the-top service providers. For the efficient management of over-the-top application flows, the implementation of service functions and their interconnection in service chains, namely network service chaining, should consider the over-the-top service providers' performance goals and user management strategies. However, in current wireless network deployments, the network service providers have full control of network service chaining. Considering that user satisfaction from the offered services is a common interest for both types of stakeholders, the over-the-top service providers need to participate in network service chaining, and apply QoS and user prioritization policies to network service chain resource management, which involves users connected at different network points, in a distributed manner. In this article, we describe 5G network management architectures and propose virtualization components that enable over-the-top service-provider- oriented network service. We also outline the arising issues for over-the-top service providers in network service chaining and introduce a distributed prioritization network service chain management scheme for over-the-top application flows, based on matching theory. The evaluation results indicate the performance gains in overthe- top service providers' service levels that stem from the proposed scheme, demonstrating the benefits of introducing prioritization in network service chain deployment.

Journal ArticleDOI
01 Mar 2017
TL;DR: Simulation results indicate that the proposed approach maintains satisfactory performance and scalability as the number ofSPNs in an IoT network increase and efficient load balancing of the requested services among the SPNs in comparison with other approaches.
Abstract: The Internet of Things (IoT) vision involves a future Internet integrated with real-world objects that can commonly offer their functionality trough services. In such pervasive environments of IoT networks, locating and invoking suitable services is quite challenging and traditional service discovery and selection approaches have been proven inadequate. In this paper, taking inspiration from natural metaphors, a decentralized service discovery and selection model is proposed. The model is based on artificial potential fields (APFs) which are formed upon each user service request and become active at points where services can be provided. Such points are termed as service provision nodes (SPNs). The strength of each APF depends on the percentage of requested services that can be provided by the respective SPN, as well as on SPN service load and availability with the aim to balance service load among SPNs. Service discovery and selection is then driven by artificial forces applied among user service requests and SPNs. Simulation results indicate that the proposed approach maintains satisfactory performance and scalability as the number of SPNs in an IoT network increase and efficient load balancing of the requested services among the SPNs in comparison with other approaches.

Journal ArticleDOI
TL;DR: This paper proposes the FI middleware named MIFIM (MIddleware for Future Internet Models) incorporated with Aspect Oriented Module (AOM) for addressing the challenges in particular related to the unknown topology and missing data estimation present in IoT service discovery and optimal service selection routine named Composite Service Selection Module (CSSM).

Journal ArticleDOI
TL;DR: Bridging service logic studies and evaluation studies in the field of social sciences, this paper identifies temporal aspects of service evaluation, and possible evaluation objects and objectives that are meaningful for theservice provider in value-facilitation activities and for the service user invalue-creation activities.
Abstract: Starting from the evolution of the service-dominant logic and critiques emerging from this, the purpose of this paper is to explore the link between value creation and service evaluation in order t ...

Journal ArticleDOI
TL;DR: It is demonstrated that NC delay analysis can provide deterministic quality of service (QoS)-guaranteed service chaining for any specified delay requirements, whereas theoretical queueingdelay analysis can only provide statistical QoS guarantee.
Abstract: In this paper, we present a systemic approach to provide deterministic delay guarantee for dynamic service chaining in software defined networking (SDN) The delay performance of service chaining in SDN is affected by signaling message exchange in control plane and packet transmissions in data plane, respectively First, we develop an analytical method to characterize the delay performance of control plane when handling traffic with different priorities according to network calculus (NC) and queuing theory Second, taking into account the estimated delay in control plane, we propose a novel service traversal mechanism to calculate the optimal traversal path for the service chain We demonstrate that NC delay analysis can provide deterministic quality of service (QoS)-guaranteed service chaining for any specified delay requirements, whereas theoretical queueing delay analysis can only provide statistical QoS guarantee In summary, the proposed NC delay analysis can help to understand the network design for a future delay sensitive Internet in which deterministic latency must be guaranteed

Proceedings ArticleDOI
03 Apr 2017
TL;DR: This paper proposes a middleware that has a higher degree of integration with the underlying hardware platform; it uses the mechanisms of the operating system to control the use of the processing cores, reserving them as needed for supporting differentiated service to higher priority invoking nodes or clients.
Abstract: One of the major advantages of communication middleware is its independence from the underlying hardware platform This improves portability and interoperability, whereas following the mainstream trend of favoring abstraction over performance or execution optimization However, for time sensitive applications, this lack of integration with the hardware may fall short as performance is lowered and attention to priority requests is not sufficiently differentiated In this paper, we propose a middleware that has a higher degree of integration with the underlying hardware platform; it uses the mechanisms of the operating system to control the use of the processing cores, reserving them as needed for supporting differentiated service to higher priority invoking nodes or clients Results show that our middleware improves the service time of high priority clients and it offers stable communication times

Proceedings ArticleDOI
01 Jan 2017
TL;DR: This paper proposes an approach to dynamic service provisioning based on user preferences and situation in a WoO enabled IoT system that contributes Real World Knowledge (RWK) model incorporatinguser preferences and situational information.
Abstract: One of the reasons behind failure or not being successful of an IoT service is due to the fact that, such a service do not cater to the end user needs precisely. An important ingredient in successful IoT service provisioning is to intelligently select service using the preferences and situation of requesting users. This not only provides effective service delivery but also reduces the time of service processing. Preferences of service user can be modeled by detecting regularities in their behavior and produce a hypothesis about their preferences. To enable service provisioning real world objects are virtualized using semantic ontology in Web of Objects (WoO) platform, to be interoperable and interconnected with each other. This paper proposes an approach to dynamic service provisioning based on user preferences and situation in a WoO enabled IoT system. It also contributes Real World Knowledge (RWK) model incorporating user preferences and situational information.

Proceedings ArticleDOI
01 Jun 2017
TL;DR: The proposed FCA-based approach aims at identifying the hidden relationships among service operations in order to improve the interface modularity and usability and can significantly improve Web service interface design quality compared to state-of-the-art approaches.
Abstract: In the service-oriented paradigm, Web service interfaces are considered contracts between Web service subscribers and providers. The structure of service interfaces has an extremely important role to discover, understand, and reuse Web services. However, it has been shown that service developers tend to pay little care to the design of their interfaces. A common design issue that often appears in real-world Web services is that their interfaces lack cohesion, i.e., they expose several operations that are often semantically unrelated. Such a bad design practice may significantly complicate the comprehension and reuse of the services functionalities and lead to several maintenance and evolution problems. In this paper, we propose a new approach for Web service interface decomposition using a Formal Concept Analysis (FCA) framework. The proposed FCA-based approach aims at identifying the hidden relationships among service operations in order to improve the interface modularity and usability. The relationships between operations are based on cohesion measures including semantic, sequential and communicational cohesion. The identified groups of semantically related operations having common properties are used to define new cohesive and loosely coupled service interfaces. We conducted a quantitative and qualitative empirical study to evaluate our approach on a benchmark of 26 real world Web services provided by Amazon and Yahoo. The obtained results show that our approach can significantly improve Web service interface design quality compared to state-of-the-art approaches.

Proceedings ArticleDOI
12 Jun 2017
TL;DR: The challenges in developing an IoT platform for registering, discovering and composing heterogeneous services from multiple provider types, viz., Wireless Sensor Networks (WSNs), Web Service Providers (WSPs), and Autonomous service providers (ASPs), without human intervention are discussed.
Abstract: This paper discusses the challenges in developing an IoT platform for registering, discovering and composing heterogeneous services from multiple provider types, viz., Wireless Sensor Networks (WSNs), Web Service Providers (WSPs), and Autonomous Service Providers (ASPs), without human intervention. The platform executes a service composition in a decentralised fashion, with a mechanism to detect service provider failure and fallback to previously discovered services to complete a service composition flow. We comment on technical and scientific challenges involved in managing these heterogeneous, autonomous, and resilient IoT services.

Journal ArticleDOI
TL;DR: This paper analyzes the use of a constant critical level policy for fast-moving items, where rationing is used to provide differentiated service levels to two demand classes (high priority and low priority), and formulates a service level problem as an non-linear problem with chance constraints for which the solution approach provides good-quality solutions.
Abstract: This paper analyzes the use of a constant critical level policy for fast-moving items, where rationing is used to provide differentiated service levels to two demand classes (high priority and low priority). The previous work on critical level models, with either a continuous or periodic review policy, has only considered slow-moving items with Poisson demand. In this work, we consider a continuous review (Q, r, C) policy with two demand classes that are modeled through continuous distributions, and the service levels are measured by the probability of satisfying the entire demand of each class during the lead time. We formulate a service level problem as an non-linear problem with chance constraints for which we optimally solve a relaxation obtaining a closed-form solution that can be computed easily. For instances, we tested, computational results show that our solution approach provides good-quality solutions that are on average $$0.3~\%$$0.3% from the optimal solution.

Journal ArticleDOI
TL;DR: This work describes how a service network and its VSNs are designed and enacted to achieve the SIMT objectives, and shows the feasibility of SDSN, demonstrate the utilization benefits it achieves, and quantify the runtime overhead it incurs.
Abstract: A composite cloud application can achieve economies of scale by sharing partner services between tenants at runtime, following the Single-Instance Multi-Tenancy (SIMT) model. However, supporting runtime sharing with tenant-specific functional and performance variations in an SIMT application is challenging. We address this challenge by proposing the Software-Defined Service Networking (SDSN) approach. SDSN realizes an SIMT composite cloud application with a managed service network and a set of managed virtual service networks (VSNs) that share the service network. The service network is formed by connecting a set of partner services according to their capabilities and interoperability. To achieve the functional and performance requirements of a particular tenant, a VSN composes a subset of the services under a specific configuration design over the service network, and regulates the interactions between the services concerned according to a specific regulation design. We describe how a service network and its VSNs are designed and enacted to achieve the SIMT objectives. We show the feasibility of SDSN, demonstrate the utilization benefits it achieves, and quantify the runtime overhead it incurs.

Proceedings ArticleDOI
01 Jun 2017
TL;DR: A constraint-based composite service model is defined that not only considers service constraints, but also adapts composite plans according to new constraints that might add new restriction to the composite service at run time.
Abstract: Service constraints are usage restrictions on service features that are imposed by service providers. Such constraints need to be verified prior to the execution of a service in order to ensure correct service execution. In the case of composite services, the set of applicable constraints is derived from the service constraints defined over the individual service components that are part of the service plan. During the execution of a composite service, a constraint-aware composite service execution model can be used to manage and eventually operationally verify the service constraints prior to the corresponding service's execution. In addition to service constraints, other constraints might be imposed to put externally-defined restrictions on composite services. Such externally-defined restrictions are likely to be defined and become or cease to be applicable after the composite service has been assemble and deployed. Such a situation requires adaptation of the plan to a set of externally-defined constraints. Current web service composition adaptation approaches only focus on adaptation to failure in functional capabilities or Quality of Service (QoS) properties which can be dealt with re-construction of the composite service. However, we argue that adaptation to external constraints does not necessarily require changes in the plan of a composite service. In this paper, we define a constraint-based composite service model that not only considers service constraints, but also adapts composite plans according to new constraints that might add new restriction to the composite service at run time. A publicly available test set generator is used to compare the proposed solution with other existing service adaptation solutions.

Proceedings ArticleDOI
07 Mar 2017
TL;DR: The state of the art in service discovery is presented with reflections on the specific needs of MSA and in particular in the context of telecom applications, and open source frameworks are investigated and compared.
Abstract: In order to communicate with another service, a service needs to know the address of other services. This knowledge can be acquired by a process called service discovery (SD). In a microservice architecture (MSA), unlike SOA, a service discovery framework has not been provided out of the box. In a telecom environment additional requirements may arise, besides the basic one of discoverability. In this paper we shortly present the state of the art in service discovery with reflections on the specific needs of MSA and in particular in the context of telecom applications. In this context open source frameworks are investigated and compared.

Journal ArticleDOI
01 Dec 2017-AIDS
TL;DR: Both community-based and facility-based DARTS can reduce the burdens associated with frequent and lengthy clinic visits for both patients and health providers and aim to enhance retention, ART adherence, viral suppression, and quality of life.
Abstract: Achieving the ambitious global HIV treatment goals will require a marked expansion of antiretroviral therapy (ART) coverage and close attention to HIV service quality [1]. In response, a growing body of evidence supports the use of differentiated ART services (DARTS) for subgroups of HIV-positive individuals [2–14]. Although differentiated services can support diverse patient groups, most current DARTS initiatives target stable adult patients, that is, those demonstrating ART adherence and viral suppression or viral suppression alone [15]. Both community-based and facility-based DARTS can reduce the burdens associated with frequent and lengthy clinic visits for both patients and health providers. Ultimately, these models aim to enhance retention, ART adherence, viral suppression, and quality of life [16].

Proceedings ArticleDOI
01 Jul 2017
TL;DR: A MCDM method called MAUT (Multi-criteria value functions or multi-attribute utility theory), which enables the user to choose from among a number of available choices, is proposed, based on utility functions representing the user satisfaction degree.
Abstract: Knowing the crucial importance of a service selection, and given the competition between service providers, considerable opportunities are offered for customers to find the best telco service with best pricing. However it took time for customers to manage and analyze the different service data to make the right decision because of the expansion of service providers' infrastructures towards networks providing 3G/4G services and soon 5G services. Several approaches have been proposed to solve the service selection problem, including Multi-Criteria Decision Making (MCDM) methods. We propose in this paper, a MCDM method called MAUT (Multi-criteria value functions or multi-attribute utility theory), which enables the user to choose from among a number of available choices. Our approach is about setting up a Service Broker to look for the best service in order to satisfy and ensure customer loyalty in all-IP next generation networks. An effort is made to manage the different concerns. Service Level Agreement (SLA) ontology process is also proposed to provide users with a clear model when proposals and alternative proposals are sent between stakeholders. Based on MAUT, we present an algorithm to select the best service offered by a service provider. This method is based on utility functions representing the user satisfaction degree.

Proceedings ArticleDOI
25 Sep 2017
TL;DR: The intuition for this approach is provided and it is illustrated by means of a Hotel reservation service product line to define an algorithm to synthesise an orchestration of services that satisfies all feature constraints of theservice product line and the maximal number of service requests for which an agreement can be reached.
Abstract: In Service-Oriented Computing, contracts provide a way to characterise the behavioural conformance of a composition of services, and to guarantee that the results do not lead to spurious compositions. Adding variability leads to a product line of services capable of adapting to customer requirements and to changes in the context in which they operate. To this aim, we extended a previously introduced formal model of service contracts. In particular, we included: (i) feature-based constraints and (ii) four classes of service requests to characterise different variants of service agreement. We then exploited Supervisory Control Theory to define an algorithm to synthesise an orchestration of services that satisfies: (i) all feature constraints of the service product line, and (ii) the maximal number of service requests for which an agreement can be reached. Moreover, such an orchestration of a service product line, whose number of products is potentially exponential in the number of features, can be synthesised from only a subset of its products. A prototypical tool supports the developed theory. In this short paper, we provide the intuition for our approach and illustrate it by means of a Hotel reservation service product line.

Journal ArticleDOI
01 Jan 2017
TL;DR: The authors present here the novel prototype architecture, testing procedures, HTTP transactional status and reliability analysis of the system under massive stress of consumers.
Abstract: The web services have emerged as a web based matured and popular technology paradigm. Due to increasing popularity, the reliability assurance and prediction have acquired more attentions to the developers, researchers and service providers. In this paper, the authors propose to design, develop and implement a service oriented prototype research electronic automated teller machine service using Windows Communication Foundation technology to study and predict some reliability aspects of web services. One master service is designed to authenticate a particular user to access services that is acting as a service broker and redirects the query to content service executing agents, acting as a service provider. The system has been implemented using C# programming language, Visual Studio.NET framework, Internet Information Service web server and Microsoft Structured Query Language database server. The authors present here the novel prototype architecture, testing procedures, HTTP transactional status and reliability analysis of the system under massive stress of consumers.

Proceedings ArticleDOI
01 Feb 2017
TL;DR: A model which will help in clustering the service repository based on service functionality and will reduce the response time of the services and will also helpful in identifying the correct services within the specified time is proposed.
Abstract: Service Oriented Architecture facilitates more feature as compared to legacy architecture which makes this architecture widely accepted by the industry. Service oriented architecture provides feature like reusability, composability, distributed deployment. Service of SOA is governed by SOA governance board in which they provide approval to create the services and also provide space to expose the particular services. Sometime many services are kept in a repository which creates service identification issue. Service identification is one of the most critical aspects in service oriented architecture. The services must be defined or identified keeping reuse and usage in different business contexts in mind. Rigorous review of Identified service should be done prior to development of the services. Identification of the authenticated service is challenging to development teams due to several reasons such as lack of business process documentation, lack of expert analyst, and lack of business executive involvement, lack of reuse of services, lack of right decision to choose the appropriate service. In some of the cases we have replica of same service exist, which creates difficulties in service identification. Existing design approaches of SOA doesn't take full advantage whereas proposed model is compatible more advantageous and increase the performance of the services. This paper proposes a model which will help in clustering the service repository based on service functionality. Service identification will be easy if we follow distributed repository based on functionality for our services. Generally in case of web services where service response time should be minimal, searching in whole repository delays response time. The proposed model will reduce the response time of the services and will also helpful in identifying the correct services within the specified time.

Journal ArticleDOI
TL;DR: In the world of large‐scale applications, software as a service (SaaS) in general and use of microservices, in particular, is bringing service‐oriented architectures to a new level and providing secure and reliable service compositions is increasingly needed to ensure the success of SaaS solutions.
Abstract: In the world of large-scale applications, software-as-a-service (SaaS) in general and use of micro-services, in particular, is bringing service-oriented architectures (SOA) to a new level: systems in general and systems that interact with human users (eg, socio-technical systems) in particular are built by composing micro-services that are developed independently and operated by different parties At the same time, SaaS applications are used more and more widely by enterprises as well as public services for providing critical services, including those processing security or privacy of relevant data Therefore providing secure and reliable service compositions is increasingly needed to ensure the success of SaaS solutions Building such service compositions securely, is still an unsolved problem In this paper, we present a framework for modelling, validating, and ranking secure service compositions that integrate both automated services as well as services that interact with humans As a unique feature, our approach for ranking services integrates validated properties (e g, based on the result of formally analysing the source code of a service implementation) as well as contractual properties that are part of the service- level-agreement and, thus, not necessarily ensured on a technical level

Journal ArticleDOI
TL;DR: Simulation results indicate that the routes selected using the proposed routing metric can effectively reduce the average end-to-end delay when transmitting urgent data and reduce the utilization rate of mesh clients while simultaneously guaranteeing the capability of the network when transmitting non-urgent data.
Abstract: Mesh clients in hybrid wireless mesh networks can perform the routing functionality, as well as provide end-user applications that are more suitable for tunnels, to improve the connectivity of backbone networks. In this article, based on the diversity of data and limited power supply of mesh clients in hybrid wireless mesh networks in underground mines, we propose a multi-criteria routing metric to support data-differentiated service. This routing metric divides data into two types: urgent and non-urgent. End-to-end delay is calculated when transmitting urgent data, and hop count and link load are measured when transmitting non-urgent data. In order to optimize the utilization of mesh clients and to prolong the network lifetime, mesh clients and mesh routers are given different weights in the calculation of hop count. Based on the QualNet7.1 simulation platform, the performance of the proposed routing metric in transmitting urgent and non-urgent data is evaluated through numerous simulations. Simulation r...