Service level agreement specification for end‐to‐end IoT application ecosystems

2019 ◽  
Vol 49 (12) ◽  
pp. 1689-1711 ◽  
Author(s):  
Awatif Alqahtani ◽  
Ellis Solaiman ◽  
Pankesh Patel ◽  
Schahram Dustdar ◽  
Rajiv Ranjan
Author(s):  
Cahya Lukito ◽  
Rony Baskoro Lukito ◽  
Deddy Arifin

End to End Quality of Service is a way to provide data package service in a telecommunication network that based on Right Price, Right Service Level, and Right Quality. The goal of this research is to analyze the impact of End to End QoS use on 3G telecommunication network for voice service and data. This research uses an analysis method by doing the application on the lab. The result that is achieved in this research shows that End to End QoS is very influental to the Service Level Agreement to the users of the telecommunication service.Keywords: End to End Qos, SLA, Diffserv


Author(s):  
Manjur Kolhar ◽  
Mosleh M Abualhaj ◽  
Faiza Rizwan

Compliance with the Service Level Agreement (SLA) metric is a major challenge in a Multiprotocol Label Switching Virtual Private Network (MPLS VPN) because mandatory models must be maintained on both sides of the MPLS VPN in order to achieve end-to-end service levels. The end-to-end service of an MPLS VPN can be degraded owing to various issues such as distributed denial of service (DDoS), and Random Early Detection (RED) that prevents congestion and differentiates between legitimate and illegitimate user traffic. In this study, we propose a centralized solution that uses a SLA Violation Detector (SLAVD) and intrusion detection to prevent SLA violation.


Author(s):  
Manjur Kolhar ◽  
Mosleh M Abualhaj ◽  
Faiza Rizwan

Compliance with the Service Level Agreement (SLA) metric is a major challenge in a Multiprotocol Label Switching Virtual Private Network (MPLS VPN) because mandatory models must be maintained on both sides of the MPLS VPN in order to achieve end-to-end service levels. The end-to-end service of an MPLS VPN can be degraded owing to various issues such as distributed denial of service (DDoS), and Random Early Detection (RED) that prevents congestion and differentiates between legitimate and illegitimate user traffic. In this study, we propose a centralized solution that uses a SLA Violation Detector (SLAVD) and intrusion detection to prevent SLA violation.


Author(s):  
Yang Li

The continued trend of globalization and technology improvement like the internet and transportation have spawned an increasing number of complex service chains that span across local, regional and national boundaries. Service level agreement (SLA) plays a crucial role in gluing service chains together. In that regard, this paper provides a complete guidance of end-to-end lifecycle management of SLA, including SLA-aware service modelling and terms optimization, contract drafting and compliance tracking. Among these, the author introduces his work in the area of enterprise SLA optimization to address existing deficiencies in this area including a roadmap for industry-strength SLA optimization capability and an initial version of SLA modeling and optimization toolset—code-named SLA-OASIS. Some out-of-box toolsets for SLA contract drafting and compliance tracking are also introduced.


2010 ◽  
Vol 1 (3) ◽  
pp. 18-43 ◽  
Author(s):  
Yang Li

The continued trend of globalization and technology improvement like the internet and transportation have spawned an increasing number of complex service chains that span across local, regional and national boundaries. Service level agreement (SLA) plays a crucial role in gluing service chains together. In that regard, this paper provides a complete guidance of end-to-end lifecycle management of SLA, including SLA-aware service modelling and terms optimization, contract drafting and compliance tracking. Among these, the author introduces his work in the area of enterprise SLA optimization to address existing deficiencies in this area including a roadmap for industry-strength SLA optimization capability and an initial version of SLA modeling and optimization toolset—code-named SLA-OASIS. Some out-of-box toolsets for SLA contract drafting and compliance tracking are also introduced.


Digital Twin ◽  
2021 ◽  
Vol 1 ◽  
pp. 5
Author(s):  
Xiaowen Sun ◽  
Cheng Zhou ◽  
Xiaodong Duan ◽  
Tao Sun

With the gradual development of the 5G industry network and applications, each industry application has various network performance requirements, while customers hope to upgrade their industrial structures by leveraging 5G technologies. The guarantee of service level agreement (SLA) requirements is becoming more and more important, especially SLA performance indicators, such as delay, jitter, bandwidth, etc. For network operators to fulfill customer’s requirements, emerging network technologies such as time-sensitive networking (TSN), edge computing (EC) and network slicing are introduced into the mobile network to improve network performance, which increase the complexity of the network operation and maintenance (O&M), as well as the network cost. As a result, operators urgently need new solutions to achieve low-cost and high-efficiency network SLA management. In this paper, a digital twin network (DTN) solution is innovatively proposed to achieve the mapping and full lifecycle management of the end-to-end physical network. All the network operation policies such as configuration and modification can be generated and verified inside the digital twin network first to make sure that the SLA requirements can be fulfilled without affecting the related network environment and the performance of the other network services, making network operation and maintenance more effective and accurate.


Sign in / Sign up

Export Citation Format

Share Document