SlideShare a Scribd company logo
1 of 30
SLA Violation
www.iamrahuljain.in
Why SLA Violation… ???
www.iamrahuljain.in
What is SLA violation?
• Some businesses prefer or are obliged to have a
certain Service Level Agreement in place.
• The SLA sets a definite timeframe in which tickets
have to be answered or chats and calls have to be
picked up.
• If they are not answered or picked up within the
specified timeframe, SLA Violation occurs.
www.iamrahuljain.in
Why This Condition Arise…?
• The number of processors provided by the cloud providers
is less than the requested number of processor by the jobs
or cloudlet.
www.iamrahuljain.in
So…What companies normally do?
• If too many SLA Violation occur, a company should
reconsider their SLA setups and preferences or
should empower their workforce with more agents
or with better helpdesk tools.
www.iamrahuljain.in
Functionality
Customer SLA Violation Management functionality includes:
• Notifying appropriate people or systems to remedy the violation.
• Per the SLA contract, quantifying the violation in terms of an
adjustments or actions per the contract.
• Passing this adjustment or action on to billing or appropriate systems
for remedy.
• Tracking and management of open Customer SLA issues.
www.iamrahuljain.in
An Architecture for Detecting
SLA Violations in Cloud
Computing Infrastructures
www.iamrahuljain.in
FoSII Infra Overview
www.iamrahuljain.in
www.iamrahuljain.in
Each FoSII service implements three interfaces:
(i) negotiation interface
necessary for the
establishment of SLA
agreements.
www.iamrahuljain.in
(ii) application
management interface
necessary to start the
application, upload
data, and perform
similar management
actions.
www.iamrahuljain.in
(iii) self-
management
interface necessary
to devise actions in
order to prevent
SLA violations.
www.iamrahuljain.in
Working Of FoSII Infra
• The self-management
interface is implemented
by each Cloud service
and specifies operations
for sensing changes of
the desired state and for
reacting to those
changes.
www.iamrahuljain.in
Working Of FoSII Infra
• The host monitor sensors
continuously monitor the
infrastructure resource
metrics and provide the
autonomic manager with
the current resource
status.
www.iamrahuljain.in
Working Of FoSII Infra
• The runtime monitor
sensors sense future SLA
violation threats based
on resource usage
experiences and
predefined threat
thresholds.
www.iamrahuljain.in
Finally..
• Logically, FoSII infrastructure consists of multiple
components working together to achieve a common goal.
• In this architecture we focus on the knowledge management
component and the LoM2HiS framework since they are
responsible for system monitoring and detection of SLA
violations.
www.iamrahuljain.in
Combining multi-agent systems
and MDE approach for
monitoring SLA violations in the
Cloud Computing
www.iamrahuljain.in
Multi-agent systems (MASs) in order to
monitor SLA violations in real-time.
www.iamrahuljain.in
Multi Agent Systems
• MASs are suitable tools
for self-detection of
failures and self-
monitoring of cloud
operations and services,
QoS negotiation and SLA
management.
www.iamrahuljain.in
Multi Agent Systems
•They are designed to
operate in a
dynamically changing
environment.
www.iamrahuljain.in
Multi Agent Systems
• Our main motivation is
firstly to use MDE
technology for the creation
of the SLA contract and then
to integrate MASs in order
to control the quality of
service contract and
guarantee transparency and
symmetry with respect to
the SLA contract between
prospective signatories www.iamrahuljain.in
Proposed Architecture
www.iamrahuljain.in
Multi-agent systems and
MDE approach
www.iamrahuljain.in
Take A Easy Note:
• A Service Level Agreement (SLA) is a legal contract
between parties to ensure the Quality of Service
(QoS).
• A Service Level Agreement (SLA) is a legal contract
between parties to ensure the Quality of Service
(QoS).
www.iamrahuljain.in
Is There Any Guarantee..??
•However, It becomes hard to guarantee QoS
levels and detect SLA violations. Therefore,
we propose to use MDE (Model Driven
Engineering) to express the SLA contract
requirements.
www.iamrahuljain.in
• That MDE created with a specific modelling language
(DSML), will be used harmonically with a Multi-agent
systems (MASs) in order to monitor SLA violations in
real-time
www.iamrahuljain.in
Multi-agent systems and MDE approach for
monitoring SLA violations
www.iamrahuljain.in
Autonomous SLA violation
monitoring and filtering
www.iamrahuljain.in
Autonomous SLA violation monitoring and filtering
www.iamrahuljain.in
Thank You.!
www.iamrahuljain.in

More Related Content

What's hot

Application SLA - the missing part of complete SLA management
Application SLA - the missing part of complete SLA managementApplication SLA - the missing part of complete SLA management
Application SLA - the missing part of complete SLA managementComarch
 
Software Asset Management
Software Asset ManagementSoftware Asset Management
Software Asset Managementsleterrier
 
Helpdesk Service Level Agreements
Helpdesk Service Level AgreementsHelpdesk Service Level Agreements
Helpdesk Service Level AgreementsChristopher Duffy
 
081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grc081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grchkodali
 
Sap grc process control 10.0
Sap grc process control 10.0Sap grc process control 10.0
Sap grc process control 10.0Latha Kamal
 
AUTOMATING A PURCHASE REQUISITION PROCESS WITH BPM SOFTWARE
AUTOMATING A PURCHASE REQUISITION PROCESS WITH BPM SOFTWAREAUTOMATING A PURCHASE REQUISITION PROCESS WITH BPM SOFTWARE
AUTOMATING A PURCHASE REQUISITION PROCESS WITH BPM SOFTWAREskeltabpm
 
Evo brochure from Global DMS
Evo brochure from Global DMSEvo brochure from Global DMS
Evo brochure from Global DMSMolly Dowdy
 
License Auditor - Controle y optimice sus licencias SAP
License Auditor - Controle y optimice sus licencias SAPLicense Auditor - Controle y optimice sus licencias SAP
License Auditor - Controle y optimice sus licencias SAPTomas Martinez
 
Oracle Billing and Revenue Management(BRM)
Oracle Billing and Revenue Management(BRM)Oracle Billing and Revenue Management(BRM)
Oracle Billing and Revenue Management(BRM)Raghwendra Vikram
 
melssCRM Case Study - Maruthi Power Control
melssCRM Case Study - Maruthi Power ControlmelssCRM Case Study - Maruthi Power Control
melssCRM Case Study - Maruthi Power ControlmelssCRM
 
How SAM can help our company
How SAM can help our companyHow SAM can help our company
How SAM can help our companyurad74
 
EZmaintain CMMS
EZmaintain CMMSEZmaintain CMMS
EZmaintain CMMSNeha Shah
 
34514_Process_Control_e-book_interactive
34514_Process_Control_e-book_interactive34514_Process_Control_e-book_interactive
34514_Process_Control_e-book_interactiveROMI Associates
 
Iia los angeles sap security presentation
Iia  los angeles  sap security presentation Iia  los angeles  sap security presentation
Iia los angeles sap security presentation hkodali
 
Software Asset Management (SAM) and License Optimization ROI Workshop
Software Asset Management (SAM) and License Optimization ROI WorkshopSoftware Asset Management (SAM) and License Optimization ROI Workshop
Software Asset Management (SAM) and License Optimization ROI WorkshopFlexera
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Veritis Group, Inc
 

What's hot (20)

Application SLA - the missing part of complete SLA management
Application SLA - the missing part of complete SLA managementApplication SLA - the missing part of complete SLA management
Application SLA - the missing part of complete SLA management
 
Software Asset Management
Software Asset ManagementSoftware Asset Management
Software Asset Management
 
ACCE 2007
ACCE 2007ACCE 2007
ACCE 2007
 
Helpdesk Service Level Agreements
Helpdesk Service Level AgreementsHelpdesk Service Level Agreements
Helpdesk Service Level Agreements
 
081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grc081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grc
 
Sap grc process control 10.0
Sap grc process control 10.0Sap grc process control 10.0
Sap grc process control 10.0
 
AUTOMATING A PURCHASE REQUISITION PROCESS WITH BPM SOFTWARE
AUTOMATING A PURCHASE REQUISITION PROCESS WITH BPM SOFTWAREAUTOMATING A PURCHASE REQUISITION PROCESS WITH BPM SOFTWARE
AUTOMATING A PURCHASE REQUISITION PROCESS WITH BPM SOFTWARE
 
Evo brochure from Global DMS
Evo brochure from Global DMSEvo brochure from Global DMS
Evo brochure from Global DMS
 
License Auditor - Controle y optimice sus licencias SAP
License Auditor - Controle y optimice sus licencias SAPLicense Auditor - Controle y optimice sus licencias SAP
License Auditor - Controle y optimice sus licencias SAP
 
Oracle Billing and Revenue Management(BRM)
Oracle Billing and Revenue Management(BRM)Oracle Billing and Revenue Management(BRM)
Oracle Billing and Revenue Management(BRM)
 
melssCRM Case Study - Maruthi Power Control
melssCRM Case Study - Maruthi Power ControlmelssCRM Case Study - Maruthi Power Control
melssCRM Case Study - Maruthi Power Control
 
How SAM can help our company
How SAM can help our companyHow SAM can help our company
How SAM can help our company
 
EZmaintain CMMS
EZmaintain CMMSEZmaintain CMMS
EZmaintain CMMS
 
CyberArk
CyberArkCyberArk
CyberArk
 
34514_Process_Control_e-book_interactive
34514_Process_Control_e-book_interactive34514_Process_Control_e-book_interactive
34514_Process_Control_e-book_interactive
 
Call Management brochure
Call Management brochureCall Management brochure
Call Management brochure
 
Hippo CMMS Overview
Hippo CMMS OverviewHippo CMMS Overview
Hippo CMMS Overview
 
Iia los angeles sap security presentation
Iia  los angeles  sap security presentation Iia  los angeles  sap security presentation
Iia los angeles sap security presentation
 
Software Asset Management (SAM) and License Optimization ROI Workshop
Software Asset Management (SAM) and License Optimization ROI WorkshopSoftware Asset Management (SAM) and License Optimization ROI Workshop
Software Asset Management (SAM) and License Optimization ROI Workshop
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices 
 

Similar to Sla violation in Cloud Computing

Journey to the Cloud CRM from Enterprise CRM - TechGiG Webinar
Journey to the Cloud CRM from Enterprise CRM - TechGiG WebinarJourney to the Cloud CRM from Enterprise CRM - TechGiG Webinar
Journey to the Cloud CRM from Enterprise CRM - TechGiG WebinarDr.Dinesh Chandrasekar PhD(hc)
 
ERP Security as a Service 2017
ERP Security as a Service 2017ERP Security as a Service 2017
ERP Security as a Service 2017Jane Jones
 
SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070
SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070
SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070retheauditors
 
What is Contract Lifecycle Management.pdf
What is Contract Lifecycle Management.pdfWhat is Contract Lifecycle Management.pdf
What is Contract Lifecycle Management.pdfSirion Labs
 
Crosscode Automotive CLM Platform Datasheet
Crosscode Automotive CLM Platform DatasheetCrosscode Automotive CLM Platform Datasheet
Crosscode Automotive CLM Platform Datasheetacuser30
 
Week 3 lecture material cc
Week 3 lecture material ccWeek 3 lecture material cc
Week 3 lecture material ccAnkit Gupta
 
ThirdPartyOversight
ThirdPartyOversightThirdPartyOversight
ThirdPartyOversightMolly Dowdy
 
SAM Software Asset Management
SAM Software Asset ManagementSAM Software Asset Management
SAM Software Asset ManagementBearingPoint
 
Concorde Solutions ITAM Review Tools Day
Concorde Solutions ITAM Review Tools Day Concorde Solutions ITAM Review Tools Day
Concorde Solutions ITAM Review Tools Day Martin Thompson
 
Service Integration and Management
Service Integration and Management Service Integration and Management
Service Integration and Management Desmond Devendran
 
Cloud Cheap Assignment Help
Cloud Cheap Assignment HelpCloud Cheap Assignment Help
Cloud Cheap Assignment HelpNicole Valerio
 
Cloud comuting Cheap Assignment Help
Cloud comuting Cheap Assignment HelpCloud comuting Cheap Assignment Help
Cloud comuting Cheap Assignment HelpNicole Valerio
 
Why you really need a SIAM tooling strategy
Why you really need a SIAM tooling strategy Why you really need a SIAM tooling strategy
Why you really need a SIAM tooling strategy Steve Morgan
 
Things IT Leaders Must Consider About Cloud Managed Services
Things IT Leaders Must Consider About Cloud Managed Services Things IT Leaders Must Consider About Cloud Managed Services
Things IT Leaders Must Consider About Cloud Managed Services Nuvento Systems Pvt Ltd
 
EY Software Asset Management Advisory
EY Software Asset Management AdvisoryEY Software Asset Management Advisory
EY Software Asset Management AdvisoryMohit Madan
 
Vendor Management System - Introduction2
Vendor Management System - Introduction2Vendor Management System - Introduction2
Vendor Management System - Introduction2Frank Corris
 
Building Reliability - The Realities of Observability
Building Reliability - The Realities of ObservabilityBuilding Reliability - The Realities of Observability
Building Reliability - The Realities of ObservabilityAll Things Open
 

Similar to Sla violation in Cloud Computing (20)

Journey to the Cloud CRM from Enterprise CRM - TechGiG Webinar
Journey to the Cloud CRM from Enterprise CRM - TechGiG WebinarJourney to the Cloud CRM from Enterprise CRM - TechGiG Webinar
Journey to the Cloud CRM from Enterprise CRM - TechGiG Webinar
 
Cloud computing set 3
Cloud computing set 3Cloud computing set 3
Cloud computing set 3
 
ERP Security as a Service 2017
ERP Security as a Service 2017ERP Security as a Service 2017
ERP Security as a Service 2017
 
SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070
SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070
SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070
 
What is Contract Lifecycle Management.pdf
What is Contract Lifecycle Management.pdfWhat is Contract Lifecycle Management.pdf
What is Contract Lifecycle Management.pdf
 
Crosscode Automotive CLM Platform Datasheet
Crosscode Automotive CLM Platform DatasheetCrosscode Automotive CLM Platform Datasheet
Crosscode Automotive CLM Platform Datasheet
 
Week 3 lecture material cc
Week 3 lecture material ccWeek 3 lecture material cc
Week 3 lecture material cc
 
ThirdPartyOversight
ThirdPartyOversightThirdPartyOversight
ThirdPartyOversight
 
SAM Software Asset Management
SAM Software Asset ManagementSAM Software Asset Management
SAM Software Asset Management
 
Concorde Solutions ITAM Review Tools Day
Concorde Solutions ITAM Review Tools Day Concorde Solutions ITAM Review Tools Day
Concorde Solutions ITAM Review Tools Day
 
Service Integration and Management
Service Integration and Management Service Integration and Management
Service Integration and Management
 
Cloud Cheap Assignment Help
Cloud Cheap Assignment HelpCloud Cheap Assignment Help
Cloud Cheap Assignment Help
 
Cloud comuting Cheap Assignment Help
Cloud comuting Cheap Assignment HelpCloud comuting Cheap Assignment Help
Cloud comuting Cheap Assignment Help
 
Dit yvol5iss13
Dit yvol5iss13Dit yvol5iss13
Dit yvol5iss13
 
Why you really need a SIAM tooling strategy
Why you really need a SIAM tooling strategy Why you really need a SIAM tooling strategy
Why you really need a SIAM tooling strategy
 
Things IT Leaders Must Consider About Cloud Managed Services
Things IT Leaders Must Consider About Cloud Managed Services Things IT Leaders Must Consider About Cloud Managed Services
Things IT Leaders Must Consider About Cloud Managed Services
 
EY Software Asset Management Advisory
EY Software Asset Management AdvisoryEY Software Asset Management Advisory
EY Software Asset Management Advisory
 
Vendor Management System - Introduction2
Vendor Management System - Introduction2Vendor Management System - Introduction2
Vendor Management System - Introduction2
 
Building Reliability - The Realities of Observability
Building Reliability - The Realities of ObservabilityBuilding Reliability - The Realities of Observability
Building Reliability - The Realities of Observability
 
Oow2014 nk 2
Oow2014 nk 2Oow2014 nk 2
Oow2014 nk 2
 

More from Er. Rahul Jain

Interview Preparation For Wipro/TCS/Infy/IBM/Accenture
Interview Preparation For Wipro/TCS/Infy/IBM/AccentureInterview Preparation For Wipro/TCS/Infy/IBM/Accenture
Interview Preparation For Wipro/TCS/Infy/IBM/AccentureEr. Rahul Jain
 
International Albinism Awareness Day IAAD, 13 June
International Albinism Awareness Day IAAD, 13 JuneInternational Albinism Awareness Day IAAD, 13 June
International Albinism Awareness Day IAAD, 13 JuneEr. Rahul Jain
 
Latest RBI Policy Rates
Latest RBI Policy RatesLatest RBI Policy Rates
Latest RBI Policy RatesEr. Rahul Jain
 
Competition Exam Preparation
Competition Exam Preparation Competition Exam Preparation
Competition Exam Preparation Er. Rahul Jain
 
Bit coin, Know About Bit Coins
Bit coin, Know About Bit CoinsBit coin, Know About Bit Coins
Bit coin, Know About Bit CoinsEr. Rahul Jain
 
Goods & services tax (gst)
Goods & services tax (gst)Goods & services tax (gst)
Goods & services tax (gst)Er. Rahul Jain
 
Isro successfully launches its heaviest ever rocket, geosynchronous satellite...
Isro successfully launches its heaviest ever rocket, geosynchronous satellite...Isro successfully launches its heaviest ever rocket, geosynchronous satellite...
Isro successfully launches its heaviest ever rocket, geosynchronous satellite...Er. Rahul Jain
 
The big investors of 2017
The big investors of 2017The big investors of 2017
The big investors of 2017Er. Rahul Jain
 
Apps & Schemes Launched by banks
Apps & Schemes Launched by banksApps & Schemes Launched by banks
Apps & Schemes Launched by banksEr. Rahul Jain
 
Important abbreviations on economy GST Related
Important abbreviations on economy GST Related Important abbreviations on economy GST Related
Important abbreviations on economy GST Related Er. Rahul Jain
 
Important abbreviations on economy GST Related
Important abbreviations on economy GST Related Important abbreviations on economy GST Related
Important abbreviations on economy GST Related Er. Rahul Jain
 
Important English Slang words
Important English Slang wordsImportant English Slang words
Important English Slang wordsEr. Rahul Jain
 
How To Choose Subject After 10th Class?
How To Choose Subject After 10th Class?How To Choose Subject After 10th Class?
How To Choose Subject After 10th Class?Er. Rahul Jain
 
International Yoga Day 21st June, IDY
International Yoga Day 21st June, IDYInternational Yoga Day 21st June, IDY
International Yoga Day 21st June, IDYEr. Rahul Jain
 
International Yoga Day 21st June, IDY
International Yoga Day 21st June, IDYInternational Yoga Day 21st June, IDY
International Yoga Day 21st June, IDYEr. Rahul Jain
 
WHO : World Blood Donor Day, 14 June
WHO : World Blood Donor Day, 14 JuneWHO : World Blood Donor Day, 14 June
WHO : World Blood Donor Day, 14 JuneEr. Rahul Jain
 
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Er. Rahul Jain
 
Mobile IP Presentation
Mobile IP Presentation Mobile IP Presentation
Mobile IP Presentation Er. Rahul Jain
 

More from Er. Rahul Jain (20)

Interview Preparation For Wipro/TCS/Infy/IBM/Accenture
Interview Preparation For Wipro/TCS/Infy/IBM/AccentureInterview Preparation For Wipro/TCS/Infy/IBM/Accenture
Interview Preparation For Wipro/TCS/Infy/IBM/Accenture
 
International Albinism Awareness Day IAAD, 13 June
International Albinism Awareness Day IAAD, 13 JuneInternational Albinism Awareness Day IAAD, 13 June
International Albinism Awareness Day IAAD, 13 June
 
Latest RBI Policy Rates
Latest RBI Policy RatesLatest RBI Policy Rates
Latest RBI Policy Rates
 
Competition Exam Preparation
Competition Exam Preparation Competition Exam Preparation
Competition Exam Preparation
 
Bit coin, Know About Bit Coins
Bit coin, Know About Bit CoinsBit coin, Know About Bit Coins
Bit coin, Know About Bit Coins
 
Goods & services tax (gst)
Goods & services tax (gst)Goods & services tax (gst)
Goods & services tax (gst)
 
Isro successfully launches its heaviest ever rocket, geosynchronous satellite...
Isro successfully launches its heaviest ever rocket, geosynchronous satellite...Isro successfully launches its heaviest ever rocket, geosynchronous satellite...
Isro successfully launches its heaviest ever rocket, geosynchronous satellite...
 
The big investors of 2017
The big investors of 2017The big investors of 2017
The big investors of 2017
 
Apps & Schemes Launched by banks
Apps & Schemes Launched by banksApps & Schemes Launched by banks
Apps & Schemes Launched by banks
 
Important abbreviations on economy GST Related
Important abbreviations on economy GST Related Important abbreviations on economy GST Related
Important abbreviations on economy GST Related
 
Important abbreviations on economy GST Related
Important abbreviations on economy GST Related Important abbreviations on economy GST Related
Important abbreviations on economy GST Related
 
Important English Slang words
Important English Slang wordsImportant English Slang words
Important English Slang words
 
How To Choose Subject After 10th Class?
How To Choose Subject After 10th Class?How To Choose Subject After 10th Class?
How To Choose Subject After 10th Class?
 
International Yoga Day 21st June, IDY
International Yoga Day 21st June, IDYInternational Yoga Day 21st June, IDY
International Yoga Day 21st June, IDY
 
International Yoga Day 21st June, IDY
International Yoga Day 21st June, IDYInternational Yoga Day 21st June, IDY
International Yoga Day 21st June, IDY
 
WHO : World Blood Donor Day, 14 June
WHO : World Blood Donor Day, 14 JuneWHO : World Blood Donor Day, 14 June
WHO : World Blood Donor Day, 14 June
 
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
 
Mini Project Format
Mini Project Format Mini Project Format
Mini Project Format
 
Mobile IP Presentation
Mobile IP Presentation Mobile IP Presentation
Mobile IP Presentation
 
Mobile IP
Mobile IP Mobile IP
Mobile IP
 

Recently uploaded

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 

Recently uploaded (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 

Sla violation in Cloud Computing

  • 2. Why SLA Violation… ??? www.iamrahuljain.in
  • 3. What is SLA violation? • Some businesses prefer or are obliged to have a certain Service Level Agreement in place. • The SLA sets a definite timeframe in which tickets have to be answered or chats and calls have to be picked up. • If they are not answered or picked up within the specified timeframe, SLA Violation occurs. www.iamrahuljain.in
  • 4. Why This Condition Arise…? • The number of processors provided by the cloud providers is less than the requested number of processor by the jobs or cloudlet. www.iamrahuljain.in
  • 5. So…What companies normally do? • If too many SLA Violation occur, a company should reconsider their SLA setups and preferences or should empower their workforce with more agents or with better helpdesk tools. www.iamrahuljain.in
  • 6. Functionality Customer SLA Violation Management functionality includes: • Notifying appropriate people or systems to remedy the violation. • Per the SLA contract, quantifying the violation in terms of an adjustments or actions per the contract. • Passing this adjustment or action on to billing or appropriate systems for remedy. • Tracking and management of open Customer SLA issues. www.iamrahuljain.in
  • 7. An Architecture for Detecting SLA Violations in Cloud Computing Infrastructures www.iamrahuljain.in
  • 10. Each FoSII service implements three interfaces: (i) negotiation interface necessary for the establishment of SLA agreements. www.iamrahuljain.in
  • 11. (ii) application management interface necessary to start the application, upload data, and perform similar management actions. www.iamrahuljain.in
  • 12. (iii) self- management interface necessary to devise actions in order to prevent SLA violations. www.iamrahuljain.in
  • 13. Working Of FoSII Infra • The self-management interface is implemented by each Cloud service and specifies operations for sensing changes of the desired state and for reacting to those changes. www.iamrahuljain.in
  • 14. Working Of FoSII Infra • The host monitor sensors continuously monitor the infrastructure resource metrics and provide the autonomic manager with the current resource status. www.iamrahuljain.in
  • 15. Working Of FoSII Infra • The runtime monitor sensors sense future SLA violation threats based on resource usage experiences and predefined threat thresholds. www.iamrahuljain.in
  • 16. Finally.. • Logically, FoSII infrastructure consists of multiple components working together to achieve a common goal. • In this architecture we focus on the knowledge management component and the LoM2HiS framework since they are responsible for system monitoring and detection of SLA violations. www.iamrahuljain.in
  • 17. Combining multi-agent systems and MDE approach for monitoring SLA violations in the Cloud Computing www.iamrahuljain.in
  • 18. Multi-agent systems (MASs) in order to monitor SLA violations in real-time. www.iamrahuljain.in
  • 19. Multi Agent Systems • MASs are suitable tools for self-detection of failures and self- monitoring of cloud operations and services, QoS negotiation and SLA management. www.iamrahuljain.in
  • 20. Multi Agent Systems •They are designed to operate in a dynamically changing environment. www.iamrahuljain.in
  • 21. Multi Agent Systems • Our main motivation is firstly to use MDE technology for the creation of the SLA contract and then to integrate MASs in order to control the quality of service contract and guarantee transparency and symmetry with respect to the SLA contract between prospective signatories www.iamrahuljain.in
  • 23. Multi-agent systems and MDE approach www.iamrahuljain.in
  • 24. Take A Easy Note: • A Service Level Agreement (SLA) is a legal contract between parties to ensure the Quality of Service (QoS). • A Service Level Agreement (SLA) is a legal contract between parties to ensure the Quality of Service (QoS). www.iamrahuljain.in
  • 25. Is There Any Guarantee..?? •However, It becomes hard to guarantee QoS levels and detect SLA violations. Therefore, we propose to use MDE (Model Driven Engineering) to express the SLA contract requirements. www.iamrahuljain.in
  • 26. • That MDE created with a specific modelling language (DSML), will be used harmonically with a Multi-agent systems (MASs) in order to monitor SLA violations in real-time www.iamrahuljain.in
  • 27. Multi-agent systems and MDE approach for monitoring SLA violations www.iamrahuljain.in
  • 28. Autonomous SLA violation monitoring and filtering www.iamrahuljain.in
  • 29. Autonomous SLA violation monitoring and filtering www.iamrahuljain.in