Design and Implementation of a Broker for Cloud Additive Manufacturing Services

Author(s):  
Venkata P. Modekurthy ◽  
Xiaoqing F. Liu ◽  
Kenneth K. Fletcher ◽  
Ming C. Leu

With increasing number of cloud additive manufacturing (AM) service providers, cloud AM services are becoming decentralized and it is difficult for consumers to discover cloud AM services according to their personal preferences and tradeoffs. Existing frameworks of cloud manufacturing either do not have brokers between cloud manufacturing service providers and consumers or do not support personalized preference and tradeoff based brokerage. In this paper, we present a cloud-based service broker system for cloud AM to provide consumers with a single point of access to a large number of cloud AM services from many cloud AM service providers over the Internet based on a service oriented architecture using web services. This broker system uses an innovative cloud AM service selection method which considers consumers' preferences and tradeoffs on service attributes like price, material, and accuracy in the ranking process. It is also based on a new integrated representation for both exact and varied matches in cloud AM service selection. We present an application case study to show how the cloud AM service broker system is used to select cloud AM services based on personal preferences and tradeoffs. It demonstrates feasibility of brokerage in cloud AM and effectiveness of the cloud AM service ranking method based on personalized preferences and tradeoffs.

Author(s):  
W. T. Tsai ◽  
Xinyu Zhou ◽  
Yinong Chen ◽  
Bingnan Xiao ◽  
Raymond A. Paul ◽  
...  

Author(s):  
Masahide Nakamur ◽  
Hiroshi Igaki ◽  
Takahiro Kimura ◽  
Kenichi Matsumoto

In order to support legacy migration to the service-oriented architecture (SOA), this paper presents a pragmatic method that derives candidates of services from procedural programs. In the SOA, every service is supposed to be a process (procedure) with (1) open interface, (2) self-containedness, and (3) coarse granularity for business. Such services are identified from the source code and its data flow diagram (DFD), by analyzing data and control dependencies among processes. Specifically, first the DFD must be obtained with reverse-engineering techniques. For each layer of the DFD, every data flow is classified into three categories. Using the data category and control among procedures, four types of dependency are categorized. Finally, six rules are applied that aggregate mutually dependent processes and extract them as a service. A case study with a liquor shop inventory control system extracts service candidates with various granularities.


Author(s):  
Tony Clark ◽  
Balbir S. Barn ◽  
Vinay Kulkarni

Component-based approaches generalize basic object-oriented implementations by allowing large collections of objects to be grouped together and externalized in terms of public interfaces. A typical component-based system will include a large number of interacting components. Service-Oriented Architecture (SOA) organizes a system in terms of components that communicate via services. Components publish services that they implement as business processes. Consequently, a change to a single component can have a ripple effect on the service-driven system. Component reconfiguration is motivated by the need to evolve the component architecture and can take a number of forms. The authors define a dynamic architecture as one that supports changing the behavior and topology of existing components without stopping, updating, and redeploying the system. This chapter addresses the problem of dynamic reconfiguration of component-based architectures. It proposes a reification approach that represents key features of a language in data, so that a system can reason and dynamically modify aspects of it. The approach is described in terms of a new language called µLEAP and validated by implementing a simple case study.


Author(s):  
Hany F. EL Yamany ◽  
David S. Allison ◽  
Miriam A.M. Capretz

Security is one of the largest challenges facing the development of a Service-Oriented Architecture (SOA). This is due to the fact that SOA security is the responsibility of both the service consumer and service provider. In recent years, many solutions have been implemented, such as the Web Services Security Standards, including WS-Security and WS-SecurityPolicy. However, those standards are insufficient for the promising new generations of Web 2.0 applications. In this research, we describe an Intelligent SOA Security (ISOAS) framework and introduce four of its services: Authentication and Security Service (NSS), the Authorization Service (AS), the Privacy Service (PS) and the Service of Quality of Security Service (SQoSS). Furthermore, a case study is presented to examine the behavior of the described security services inside a market SOA environment.


Author(s):  
Elarbi Badidi ◽  
Mohamed El Koutbi

The services landscape is changing with the growing adoption by businesses of the Service Oriented Architecture (SOA), the migration of business solutions to the cloud, and the proliferation of smartphones and Internet-enabled handheld devices to consume services. To meet their business goals, organizations increasingly demand services, which can satisfy their functional and non-functional requirements. Service Level Agreements (SLAs) are seen as the means to guarantee the continuity in service provisioning and required levels of service. In this paper, we propose a framework for service provisioning, which aims at providing support for automated SLA negotiation and management. The Service Broker component carries out SLA negotiation with selected service-providers on behalf of service-consumers. Multi-rounds of negotiations are very often required to reach an agreement. In each round, the negotiating parties bargain on multiple SLA parameters by trying to maximize their global utility functions. The monitoring infrastructure is in charge of observing SLA compliance monitoring using measurements obtained from independent third party monitoring services.


2014 ◽  
Vol 11 (2) ◽  
pp. 67-84 ◽  
Author(s):  
Tanveer Ahmed ◽  
Abhishek Srivastava

Service oriented architecture has revolutionized the way a traditional business process is executed. The success of this architecture is Indue to the composition of multiple heterogeneous services at runtime. Web service composition is a mechanism where several web services are combined at runtime to build a complex application for a user. It is one of the most sought after processes in the context of semantic web. But, composition of web services at runtime is a difficult task owing to the availability of multiple service providers offering the same functionality. The process if exasperated by due conflicting preferences of a service consumer. In this paper, the authors address the issue of selecting a service based on Quality of Service (QoS) attributes. They utilize concepts customized from physics to create an environment that facilitates the selection of a best service from the set of similar services. The technique not only facilitates the selection of the service with the best QoS attributes, but distributes the load among expeditiously. Here in this paper, the authors concentrate on minimizing and equitably balancing the waiting time for a user. They conduct in silico experiments on multiple workflows to demonstrate the efficacy of the proposed technique to balance load efficiently among similar service offerings.


Author(s):  
Luís Ferreira Pires ◽  
Arjen van Oostrum ◽  
Fons Wijnhoven

A service registry is a Service-Oriented Architecture (SOA) component that keeps a ‘catalogue’ of available services. It stores service specifications so that these specifications can be found by potential users. Discussions on the design of service registries currently focus on technical issues, while service registries should take into consideration information needs of business domain users. In this regard, the authors consider service registries as information services and develop a comprehensive framework for designing service registries. This framework introduces aspects that determine a design space for service registries. In this design space, the authors identify views, requirements, processes, and means in the design of a service registry that supports the lifecycle information of a service. A vital part of these requirements is further implemented and demonstrated in a prototype built as a ‘proof-of-concept’ for the framework. This paper also discusses a case study used to evaluate the prototype. In this case study, a registry prototype has been populated with realistic services of a large insurance company, and 21 experienced IT and business professionals from a consultancy organization evaluated the prototype for its user satisfaction.


2010 ◽  
Vol 2 (2) ◽  
pp. 38-50
Author(s):  
Tony Polgar

Web Services for Remote Portlets (WSRP) provide solutions for implementation of lightweight Service Oriented Architecture (SOA). UDDI extension for WSRP enables the discovery and access to user facing web services provided by business partners while eliminating the need to design local user facing portlets. Most importantly, the remote portlets can be updated by web service providers from their own servers. Remote portlet consumers are not required to make any changes in their portals to accommodate updated remote portlets. This approach results in easier team development, upgrades, administration, low cost development and usage of shared resources. Furthermore, with the growing interest in SOA, WSRP should cooperate with service bus (ESB).In this paper, the author examines the technical underpinning of the UDDI extensions for WSRP (user facing remote web services) and their role in service sharing among business partners. The author also briefly outlines the architectural view of using WSRP in enterprise integration tasks and the role Enterprise Service Bus (ESB).


Author(s):  
Wail M. Omar

Web 2.0 is expected to be the next technology in the interaction between the enterprise applications and end users. Such interaction will be utilized in producing self-governance applications that are able to readjacent and reconfigure the operation framework based on users’ feedback. To achieve this, huge numbers of underneath resources (infrastructures and services) are required. Therefore, this work proposes the merge of Web 2.0 technology and grid computing overlay to support Web 2.0 framework. Such merge between technologies is expected to offer mutual benefits for both communities. Through this work, a model for managing the interaction between the two technologies is developed based on the adapting of service oriented architecture (SOA) model, this model is known as SOAW2G. This model manages the interaction between the users at the top level and resources at the bottom layer. As a case study, managing health information based on users’ (doctors, medicine companies, and others) experiences is explored through this chapter.


Sign in / Sign up

Export Citation Format

Share Document