Web services is a special case of a service-oriented architecture (SOA), which is, basically, a representation of web application‘s functionality. Web service is more of a generalized concept that implies whole functionality as a whole but Microservice handles only the single specific task. MSA is emerging as an excellent architecture style enabling the division of large and complex applications into micro-scale yet many services, each runs in its own process, has its own APIs, and communicates with one another using lightweight mechanisms such as HTTP. Microservices are built around business capabilities, loosely coupled and highly cohesive, horizontally scalable, independently deployable, technology-agnostic, etc. On the other side for the business dynamic requirement these microservices need to be composed for the realization of enterprise-scale, and business-critical applications. Service composition is combining various services together to provide the solution for the user dynamic queries. There are two methods for the microservice composition i.e. orchestration and choreography. In this paper,a health case study is performed for the selection mechanism of orchestration method and choreography method in various situation.
Cloud computing is a flexible, cost-effective and proven delivery platform for providing business or
consumer IT services over the Internet. Cloud resources can be rapidly deployed and easily scaled, with all
processes, applications and services provisioned “on demand,” regardless of user location or device.
Cloud computing is a flexible, cost-effective and proven delivery platform for providing business or
consumer IT services over the Internet. Cloud resources can be rapidly deployed and easily scaled, with all
processes, applications and services provisioned “on demand,” regardless of user location or device.
Addressing Security Issues and Challenges in Mobile Cloud ComputingEditor IJCATR
The emergence of cloud computing has brought tremendous impact on software organizations and software architecture design. With the development of cloud computing and mobile internet, mobile cloud computing is becoming a new mode of application. With the widespread development of mobile applications and advances in mobile cloud computing, some other forms of requirements and security issues have been emerged. Mobile cloud computing provides resources residing over cloud and services provided for mobile devices. These resources and services from cloud are available for mobile user over their mobile devices. It also provides benefits for developing specialized mobile applications for them. However, increased security and privacy risks exists due to data outsourcing and synchronization over the Internet. This research paper provides the review on mobile cloud computing, its security issues, challenges and suggests some solutions.
A traditional computing environment requires a costly
infrastructure to offer a better service to users. The introduction
of cloud computing has changed the working environment from
traditional to virtual. A larger number of IT companies are
utilizing the cloud. On the one hand, the cloud attracts more
number of consumers by offering services with minimized
capital cost and virtual infrastructure. On the other hand, there
are a risk and security challenges in cloud computing that
makes the user not to move completely towards it. The cloud
environment is more vulnerable to security breaches and data
theft. Moreover, insider attacks are more frequent in larger
enterprises. An unauthenticated user can cause more damage
to company reputation. The cloud service providers are trying
to provide a secure work environment for users. However,
there is a lack of global standards and policies to invoke
security measures in cloud computing. This study aims to
highlight and classify security challenges and trust issues in the
cloud environment.
The survey was conducted in various institutions and
governmental organizations in Saudi Arabia to study the
opinions of stakeholders on cloud computing security
challenges and risks.
Links:
http://sites.google.com/site/ijcsis/
https://google.academia.edu/JournalofComputerScience
https://www.linkedin.com/in/ijcsis-research-publications-8b916516/
http://www.researcherid.com/rid/E-1319-2016
Build New Applications into the Cloud with Microsoft Windows Azure: DatasheetMicrosoft Private Cloud
Build new applications or extend your existing applications into the cloud using familiar technology and tools in new ways to achieve web-capable scalability. Focus on building
solutions—let Windows® Azure™ manage the infrastructure.
Extending the connectivity of clouds beyond the hybrid cloud to the Intercloud promises unparalleled opportunities for global business acceleration, monetization, growth, and services scalability. In order to realize the opportunities, Cisco is leading the development of an Intercloud ecosystem in collaboration with technology providers, cloud providers, ISVs, and developers. It's the right time to be Intercloud-ready.
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
The Most great challenging in Cloud computing is Security. Here Security plays key role
in this paper proposed concept mainly deals with security at the end user access. While coming to the
end user access that are connected through the public networks. Here the end user wants to access his
application or services protected by the unauthorized persons. In this area if we want to apply
encryption or decryption methods such as RSA, 3DES, MD5, Blow fish. Etc.,
Whereas we can utilize these services at the end user access in cloud computing. Here there is
problem of encryption and decryption of the messages, services and applications. They are is lot of
time to take encrypt as well as decrypt and more number of processing capabilities are needed to use
the mechanism. For that problem we are introducing to use of cloud computing in SaaS model. i.e.,
scalable is applicable in this area so whenever it requires we can utilize the SaaS model.
In Cloud computing use of computing resources (hardware and software) that are delivered as a
service over Internet network. In advance earlier there is problem of using key size in various
algorithm like 64 bit it take some long period to encrypt the data.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Microservices – or micro-services – may simply be a term for something already being used, but by giving something a name and defining it, we sometimes give ourselves the advantage of recognizing a tool we perhaps should be including in our systems.
Microservices: A Step Towards Modernizing Healthcare ApplicationsCitiusTech
This document/White Paper talks about the importance of Microservices and the role that it plays in today's ever-changing IT heathcare landscape.
The document aims to share a perspective on areas to consider while adopting microservices architecture for modernizing healthcare applications.
What are the Advantages and Disadvantages of Microservices? Zoe Gilbert
Since microservices testing comprises QA activities to ensure each microservice functioning and performance stability.
Learn what are the advantages and disadvantages of microservices for better performance.
https://www.impactqa.com/blog/what-are-the-advantages-and-disadvantages-of-microservices/
I
Architecting for speed: how agile innovators accelerate growth through micros...3gamma
In a world where software has become the key differentiator, enterprises are forced to transform the way they build, ship and run software in order to stay in the game. Adopting a microservices architecture enables organisations to not only become more agile but also to cut costs and increase stability.
Architecting for speed: how agile innovators accelerate growth through micros...Jesper Nordström
In a world where software has become the key differentiator, enterprises are forced to transform the way they build, ship and run software in order to stay in the game. Competitive pressure requires applications to be rapidly and continuously upgraded with nonstop availability, and companies that lack the capacity to experiment, innovate and get new features out quickly, will be at disadvantage.
This is driving many IT organisations to adopt the software design model known as microservices architecture, which quickly is gaining traction as a new way to think about structuring applications, and is changing the fundamentals of enterprise application management.
Managing complex enterprise systems is a challenge and many enterprises still sit on large, monolithic applications with huge unmanageable codebases that have become increasingly difficult to maintain. Adopting a microservices architecture where applications instead are built as suites of services enables them to not only become more agile but also to cut costs and increase stability.
Basics of Java Microservices: Frameworks, Examples & Use CasesGrapesTech Solutions
Microservices are a design approach that divides huge architectures into small. Learn the basics, frameworks, examples, and use cases of Java Microservices.
Addressing Security Issues and Challenges in Mobile Cloud ComputingEditor IJCATR
The emergence of cloud computing has brought tremendous impact on software organizations and software architecture design. With the development of cloud computing and mobile internet, mobile cloud computing is becoming a new mode of application. With the widespread development of mobile applications and advances in mobile cloud computing, some other forms of requirements and security issues have been emerged. Mobile cloud computing provides resources residing over cloud and services provided for mobile devices. These resources and services from cloud are available for mobile user over their mobile devices. It also provides benefits for developing specialized mobile applications for them. However, increased security and privacy risks exists due to data outsourcing and synchronization over the Internet. This research paper provides the review on mobile cloud computing, its security issues, challenges and suggests some solutions.
A traditional computing environment requires a costly
infrastructure to offer a better service to users. The introduction
of cloud computing has changed the working environment from
traditional to virtual. A larger number of IT companies are
utilizing the cloud. On the one hand, the cloud attracts more
number of consumers by offering services with minimized
capital cost and virtual infrastructure. On the other hand, there
are a risk and security challenges in cloud computing that
makes the user not to move completely towards it. The cloud
environment is more vulnerable to security breaches and data
theft. Moreover, insider attacks are more frequent in larger
enterprises. An unauthenticated user can cause more damage
to company reputation. The cloud service providers are trying
to provide a secure work environment for users. However,
there is a lack of global standards and policies to invoke
security measures in cloud computing. This study aims to
highlight and classify security challenges and trust issues in the
cloud environment.
The survey was conducted in various institutions and
governmental organizations in Saudi Arabia to study the
opinions of stakeholders on cloud computing security
challenges and risks.
Links:
http://sites.google.com/site/ijcsis/
https://google.academia.edu/JournalofComputerScience
https://www.linkedin.com/in/ijcsis-research-publications-8b916516/
http://www.researcherid.com/rid/E-1319-2016
Build New Applications into the Cloud with Microsoft Windows Azure: DatasheetMicrosoft Private Cloud
Build new applications or extend your existing applications into the cloud using familiar technology and tools in new ways to achieve web-capable scalability. Focus on building
solutions—let Windows® Azure™ manage the infrastructure.
Extending the connectivity of clouds beyond the hybrid cloud to the Intercloud promises unparalleled opportunities for global business acceleration, monetization, growth, and services scalability. In order to realize the opportunities, Cisco is leading the development of an Intercloud ecosystem in collaboration with technology providers, cloud providers, ISVs, and developers. It's the right time to be Intercloud-ready.
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
The Most great challenging in Cloud computing is Security. Here Security plays key role
in this paper proposed concept mainly deals with security at the end user access. While coming to the
end user access that are connected through the public networks. Here the end user wants to access his
application or services protected by the unauthorized persons. In this area if we want to apply
encryption or decryption methods such as RSA, 3DES, MD5, Blow fish. Etc.,
Whereas we can utilize these services at the end user access in cloud computing. Here there is
problem of encryption and decryption of the messages, services and applications. They are is lot of
time to take encrypt as well as decrypt and more number of processing capabilities are needed to use
the mechanism. For that problem we are introducing to use of cloud computing in SaaS model. i.e.,
scalable is applicable in this area so whenever it requires we can utilize the SaaS model.
In Cloud computing use of computing resources (hardware and software) that are delivered as a
service over Internet network. In advance earlier there is problem of using key size in various
algorithm like 64 bit it take some long period to encrypt the data.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Microservices – or micro-services – may simply be a term for something already being used, but by giving something a name and defining it, we sometimes give ourselves the advantage of recognizing a tool we perhaps should be including in our systems.
Microservices: A Step Towards Modernizing Healthcare ApplicationsCitiusTech
This document/White Paper talks about the importance of Microservices and the role that it plays in today's ever-changing IT heathcare landscape.
The document aims to share a perspective on areas to consider while adopting microservices architecture for modernizing healthcare applications.
What are the Advantages and Disadvantages of Microservices? Zoe Gilbert
Since microservices testing comprises QA activities to ensure each microservice functioning and performance stability.
Learn what are the advantages and disadvantages of microservices for better performance.
https://www.impactqa.com/blog/what-are-the-advantages-and-disadvantages-of-microservices/
I
Architecting for speed: how agile innovators accelerate growth through micros...3gamma
In a world where software has become the key differentiator, enterprises are forced to transform the way they build, ship and run software in order to stay in the game. Adopting a microservices architecture enables organisations to not only become more agile but also to cut costs and increase stability.
Architecting for speed: how agile innovators accelerate growth through micros...Jesper Nordström
In a world where software has become the key differentiator, enterprises are forced to transform the way they build, ship and run software in order to stay in the game. Competitive pressure requires applications to be rapidly and continuously upgraded with nonstop availability, and companies that lack the capacity to experiment, innovate and get new features out quickly, will be at disadvantage.
This is driving many IT organisations to adopt the software design model known as microservices architecture, which quickly is gaining traction as a new way to think about structuring applications, and is changing the fundamentals of enterprise application management.
Managing complex enterprise systems is a challenge and many enterprises still sit on large, monolithic applications with huge unmanageable codebases that have become increasingly difficult to maintain. Adopting a microservices architecture where applications instead are built as suites of services enables them to not only become more agile but also to cut costs and increase stability.
Basics of Java Microservices: Frameworks, Examples & Use CasesGrapesTech Solutions
Microservices are a design approach that divides huge architectures into small. Learn the basics, frameworks, examples, and use cases of Java Microservices.
Building a High-Performance Reactive Microservices ArchitectureCognizant
For digital IT organizations, employing a microservices architecture built on reactive principles is a viabke option to ensure responsive, reliable and scalable systems or applications. The Vert.x toolkit can be a key component of reactive microservices success.
Cloud Native Architecture: Its Benefits and Key ComponentsAndrewHolland58
Learn about the benefits and key components of the cloud-native architecture that enable organizations to harness the power of the cloud and accelerate their digital transformation.
A Guide on What Are Microservices: Pros, Cons, Use Cases, and MoreSimform
IT organizations can be benefitted from a microservices approach to application development with more agile and accelerated time to market. However, there is a catch in order to break an app into fine-grained services.
Explain the Role of Microservices in Cloud-native Architecturecyberprosocial
In the ever-evolving landscape of software development, the synergy between microservices and cloud-native architecture has emerged as a transformative force, reshaping the way applications are designed, deployed, and scaled. This article explores the pivotal role that microservices play within the context of cloud-native architecture, unraveling the advantages, challenges, and profound impact on application development and scalability.
Pitfalls & Challenges Faced During a Microservices Architecture ImplementationCognizant
Microservices are the de facto design approach for building digital applications. However, issues highlighted in this paper can and do lead to implementation challenges and even failures. Here are a few strategies to avoid and overcome them.
Exploring Cloud Native Architecture: Its Benefits And Key ComponentsLucy Zeniffer
This is an article about cloud-native architecture. It discusses the benefits of cloud-native applications, such as faster development cycles, platform independence, and reduced costs. It also details the key components of cloud-native architecture, such as microservices, containers, and Kubernetes. Some of the essential points from this article are that cloud-native applications are highly scalable and resilient and that they can help businesses to achieve digital transformation.
Benefits of Containers, Microservices and Containerized MicroservicesHTS Hosting
Containers, microservices and containerized microservices have many benefits, such as enhanced performance and stability, faster development of applications etc.
Microservices design principles establish some standard practices for planning, developing, and implementing a distributed architecture for your application. Read about some of the most common characteristics of design principles, its examples, and implementations carried out by various companies worldwide.
Fundamental and Practice.
Explain about microservices characters and pattern. And also how to be good build microservices. And also additional the scale cube and CAP theory.
With the increasing usage of smartphones and other devices, digitization of banking sector is expected to catch up the increasing expectations of the customer. Banks have a significant role in our lives. Every one of us will execute at least a single financial transaction in a day. Hence, it becomes necessary for banks to enrich customer experience. Digitization becomes mandate feature for banks since it is being adopted in all industries in day to day life. Banks love mainframes because only mainframes can provide a single, unified, efficient solution to a host of different problems. Most of the banks uses Mainframe because of it robust, reliable and secured processing power. It also supports the new technologies like mobile, cloud etc., A business case is presented in this paper to explain Micro service and API framework for existing legacy system. Existing architecture is tightly coupled services with less standardization and fair performance. The aim of this paper is to provide solutions to convert the existing architecture to flexible service to support business for time-to-market, increase in performance and operational efficiency and improve customer experience.
BUSINESS SILOS INTEGRATION USING SERVICE ORIENTED ARCHITECTUREIJCSEA Journal
Agile integration satisfies the business agility and provides solutions for maintaining business changes and ensures that the enterprise survives in the current competition. Any business should be robust enough to respond to end user request. Existing traditional enterprise applications are in-capable of integrating with
different business silos lacks to improve the business agility. To address this issue, this paper is about the agile integration of different business silos using “Service Oriented Architecture” and its core technologyenables the business enterprise systems flexible, loosely coupled and improves agility. Enterprise business
systems have to adopt Service Oriented Architecture (SOA) as it promises to help them respond more rapidly to changing business requirements by composing new solutions from existing business services. Here the definition of SOA, its layers and the core technologies have been discussed.
IJWEST CFP (9).pdfCALL FOR ARTICLES...! IS INDEXING JOURNAL...! Internationa...dannyijwest
Paper Submission
Authors are invited to submit papers for this journal through Email: ijwestjournal@airccse.org / ijwest@aircconline.com or through Submission System.
mportant Dates
Submission Deadline : June 01, 2024
Notification :July 01, 2024
Final Manuscript Due : July 08, 2024
Publication Date : Determined by the Editor-in-Chief
Here's where you can reach us : ijwestjournal@yahoo.com or ijwestjournal@airccse.org or ijwest@aircconline.com
Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...dannyijwest
Although the Dark web was originally used for maintaining privacy-sensitive communication for business or intelligence services for defence, government and business organizations, fighting against censorship and blocked content, later, the advantage of technologies behind the Dark web were abused by criminals to conduct crimes which involve drug dealing to the contract of assassinations in a widespread manner. Since the communication remains secure and untraceable, criminals can easily use dark web service via The Onion Router (TOR), can hide their illegal motives and can conceal their criminal activities. This makes it very difficult to monitor and detect cybercrimes over the dark web. With the evolution of machine learning, natural language processing techniques, computational big data applications and hardware, there is a growing interest in exploiting dark web data to monitor and detect criminal activities. Due to the anonymity provided by the Dark Web, the rapid disappearance and the change of the uniform resource locators (URLs) of the resources, it is not as easy to crawl the Drak web and get the data as the usual surface web which limits the researchers and law enforcement agencies to analyse the data. Therefore, there is an urgent need to study the technology behind the Dark web, its widespread abuse, its impact on society and the existing systems, to identify the sources of drug deal or terrorism activities. In this research, we analysed the predominant darker sides of the world wide web (WWW), their volumes, their contents and their ratios. We have performed the analysis of the larger malicious or hidden activities that occupy the major portions of the Dark net; tools and techniques used to identify cybercrimes which happen inside the dark web. We applied a systematic literature review (SLR) approach on the resources where the actual dark net data have been used for research purposes in several areas. From this SLR, we identified the approaches (tools and algorithms) which have been applied to analyse the Dark net data, the key gaps as well as the key contributions of the existing works in the literature. In our study, we find the main challenges to crawl the dark web and collect forum data are: scalability of crawler, content selection trade off, and social obligation for TOR crawler and the limitations of techniques used in automatic sentiment analysis to understand criminals’ forums and thereby monitor the forums. From the comprehensive analysis of existing tools, our study summarizes the most tools. However the forum topics rapidly change as their sources changes; criminals inject noises to obfuscate the forum’s main topic and thus remain undetectable. Therefore supervised techniques fail to address the above challenges. Semi-supervised techniques would be an interesting research direction.
FFO: Forest Fire Ontology and Reasoning System for Enhanced Alert and Managem...dannyijwest
Forest fires or wildfires pose a serious threat to property, lives, and the environment. Early detection and mitigation of such emergencies, therefore, play an important role in reducing the severity of the impact caused by wildfire. Unfortunately, there is often an improper or delayed mechanism for forest fire detection which leads to destruction and losses. These anomalies in detection can be due to defects in sensors or a lack of proper information interoperability among the sensors deployed in forests. This paper presents a lightweight ontological framework to address these challenges. Interoperability issues are caused due to heterogeneity in technologies used and heterogeneous data created by different sensors. Therefore, through the proposed Forest Fire Detection and Management Ontology (FFO), we introduce a standardized model to share and reuse knowledge and data across different sensors. The proposed ontology is validated using semantic reasoning and query processing. The reasoning and querying processes are performed on real-time data gathered from experiments conducted in a forest and stored as RDF triples based on the design of the ontology. The outcomes of queries and inferences from reasoning demonstrate that FFO is feasible for the early detection of wildfire and facilitates efficient process management subsequent to detection.
Call For Papers-10th International Conference on Artificial Intelligence and ...dannyijwest
** Registration is currently open **
Call for Research Papers!!!
Free – Extended Paper will be published as free of cost.
10th International Conference on Artificial Intelligence and Applications (AI 2024)
July 20 ~ 21, 2024, Toronto, Canada
https://csty2024.org/ai/index
Submission Deadline: May 11, 2024
Contact Us
Here's where you can reach us : ai@csty2024.org or ai.conference@yahoo.com
Submission System
https://csty2024.org/submission/index.php
#artificialintelligence #softcomputing #machinelearning #technology #datascience #python #deeplearning #tech #robotics #innovation #bigdata #coding #iot #computerscience #data #dataanalytics #engineering #robot #datascientist #software #automation #analytics #ml #pythonprogramming #programmer #digitaltransformation #developer #promptengineering #generativeai #genai #chatgpt
CALL FOR ARTICLES...! IS INDEXING JOURNAL...! International Journal of Web &...dannyijwest
Paper Submission
Authors are invited to submit papers for this journal through Email: ijwest@aircconline.com or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.
Important Dates
• Submission Deadline: March 16, 2024
• Notification : April 13, 2024
• Final Manuscript Due : April 20, 2024
• Publication Date : Determined by the Editor-in-Chief
Contact Us
Here's where you can reach us
ijwestjournal@yahoo.com or ijwestjournal@airccse.org or ijwest@aircconline.com
Submission URL : https://airccse.com/submissioncs/home.html
ENHANCING WEB ACCESSIBILITY - NAVIGATING THE UPGRADE OF DESIGN SYSTEMS FROM W...dannyijwest
ENHANCING WEB ACCESSIBILITY - NAVIGATING THE UPGRADE OF DESIGN SYSTEMS FROM WCAG 2.0 TO WCAG 2.1
Hardik Shah
Department of Information Technology, Rochester Institute of Technology, USA
ABSTRACT
In this research, we explore the vital transition of Design Systems from Web Content Accessibility
Guidelines (WCAG) 2.0 to WCAG 2.1, emphasizing its role in enhancing web accessibility and inclusivity
in digital environments. The study outlines a comprehensive strategy for achieving WCAG 2.1 compliance,
encompassing assessment, strategic planning, implementation, and testing, with a focus on collaboration
and user involvement. It also addresses the challenges in using web accessibility tools, such as their
complexity and the dynamic nature of accessibility standards. The paper looks forward to the integration
of emerging technologies like AI, ML, NLP, VR, and AR in accessibility tools, advocating for universal
design and user-centered approaches. This research acts as a crucial guide for organizations aiming to
navigate the changing landscape of web accessibility, underscoring the importance of continuous learning
and adaptation to maintain and enhance accessibility in digital platforms.
KEYWORDS
Web accessibility, WCAG 2.1, Design Systems, Web accessibility tools, Artificial Intelligence
PDF LINK:https://aircconline.com/ijwest/V15N1/15124ijwest01.pdf
VOLUME LINK:https://www.airccse.org/journal/ijwest/vol15.html
OTHER INFORMATION:https://www.airccse.org/journal/ijwest/ijwest.html
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
SELECTION MECHANISM OF MICRO-SERVICES ORCHESTRATION VS. CHOREOGRAPHY
1. International Journal of Web & Semantic Technology (IJWesT) Vol.10, No.1, January 2019
DOI : 10.5121/ijwest.2019.10101 1
SELECTION MECHANISM OF MICRO-SERVICES
ORCHESTRATION VS. CHOREOGRAPHY
Neha Singhal1
, Usha Sakthivel1
, Pethuru Raj2
1
Department of Information Science and Engineering, Rajarajeswari College of
Engineering, Bangalore, INDIA
2
Reliance Jio Infocomm. Ltd (RJIL), SARGOD imperial, 23, Residency Road
Bangalore, INDIA
ABSTRACT
Web services is a special case of a service-oriented architecture (SOA), which is, basically, a
representation of web application‘s functionality. Web service is more of a generalized concept that implies
whole functionality as a whole but Microservice handles only the single specific task. MSA is emerging
as an excellent architecture style enabling the division of large and complex applications into micro-scale
yet many services, each runs in its own process, has its own APIs, and communicates with one another
using lightweight mechanisms such as HTTP. Microservices are built around business capabilities, loosely
coupled and highly cohesive, horizontally scalable, independently deployable, technology-agnostic, etc. On
the other side for the business dynamic requirement these microservices need to be composed for the
realization of enterprise-scale, and business-critical applications. Service composition is combining
various services together to provide the solution for the user dynamic queries. There are two methods for
the microservice composition i.e. orchestration and choreography. In this paper,a health case study is
performed for the selection mechanism of orchestration method and choreography method in various
situation.
KEYWORDS
MSA, Composition of services, SOA.
1. INTRODUCTION
Lately, microservices architecture is gaining a lot of mind and market shares. Monolithic and
massive applications are being continuously dismantled to be a pool of easily manageable and
composable microservices. Application development and maintenance (ADM) service providers
know the perpetual difficulties of building and sustain legacy applications, which are closed,
inflexible, and expensive. The low utilization and reuse are other drawbacks. Enabling them to
the web, mobile and cloud-ready is best with a number of practical challenges. Modernizing and
migrating legacy applications to embrace newer technologies and to run them in optimized IT
environments consume a lot of time, talent and treasure. Software development takes the agile
route to bring forth business value in the shortest possible time. Software delivery and
deployment are getting equally speeded up through the DevOps concept, which is being
facilitated through a host of powerful automation tools and techniques. Now the software solution
design also has to be accelerated in a risk-free fashion. Here comes the microservices architecture
style and pattern. Ontology’s are gaining more popularity to search based on keywords. [19] For
2. International Journal of Web & Semantic Technology (IJWesT) Vol.10, No.1, January 2019
2
the similarity purpose more various tools are available but protégé is gaining the more popularity
among all[18].
Microservices are also innately facilitating horizontal scalability. Microservices are self-defined,
autonomous and decoupled [16].The dependency-imposed constrictions are elegantly eliminated
thereby faults are tolerated and the required isolation is being achieved. Microservices
development teams can independently deliver on business requirements faster [1]. However, there
are some fresh operational challenges being associated with microservices-centric applications.
Microservices ought to be dynamically discovered. On finding the network location addresses,
the control and data flows have to be precisely routed to the correct and functioning
microservices. There has to be a controlled and secured access to microservices, which need to be
minutely monitored, measured and managed in order to fulfil the designated business targets can
be attained. All kinds of logging and operational data have to be consciously and consistently
collected, cleansed and crunched in order to extricate usable and useful operational insights in
time. Microservices are increasingly containerized and powerful DevOps tools (continuous
building, integration, testing, delivery and deployment) are being used for business-
empowerment.
The various characteristics of microservices are given below:-
Micro in size − Microservices is an implementation of MSA design pattern. It is recommended
to keep your service small as much as you can. Basically, a service should perform only one
business functionality; hence it will be smaller in size and easy to maintain the changes.
Focused to specific task − each microservice is designed to deliver only one specific business
task. While designing a microservice, the architect should be Concerned about the central task of
the service, this is its final product service. By definition, one microservice should be complete in
nature and should be concerned to deliver only one business property. A fine grained service
should focus to particular business logic.
Autonomous − each microservice should be an autonomous business module of the entire
application. Hence, the application becomes less dependable, which helps to reduce the
maintenance cost. Every microservice is independent and autonomous by nature.
Heterogeneous by nature – Microservice supports heterogeneity and technologies to
communicate with each other in one, which helps the developers to use the selected technology at
the appropriate place. By implementing a heterogeneous system, one can obtain highly secure,
improved speed and a scalable system.
Resilience:-Resilience is a property of isolating a software module. Microservice follows high
level of Resilience in building methodology; hence whenever one unit fails ,still it remains
reliable and it does not impact the entire business functionality. Resilience is another property
which implements highly scalable and less coupled system. Addition of new functionality is not
complex.
Ease of deployment − as the entire application is sub-divided into small piece of units, every
component should be full stack in nature. All of them can be deployed in any environment very
easily with less time complexity unlike other monolithic applications of the same kind.
Microservices can communicate with each other. The communication between microservices is a
stateless independent and self-contained by nature [16]. Hence, Microservices can communicate
3. International Journal of Web & Semantic Technology (IJWesT) Vol.10, No.1, January 2019
3
effortlessly. In the Microservice architecture, the Data is isolated. Each Micro service has its
separate data mart.
Fig.1. Microservices in healthcare domain
Delineating Containerization Paradigm in microservice:-
Containers emerge as the efficient runtime and resource for cloud applications (both cloud-
enabled and native). Containers are comparatively lightweight and hence hundreds of containers
can be made to run in a physical or virtual machine. There are other technical benefits such as
horizontal scalability, portability, etc. Containers almost guarantee the performance of physical
machines. Near-time scalability is seeing the reality with the faster maturity and stability of the
enigmatic containerization paradigm. The tool ecosystem of containerization movement is
growing rapidly and hence containers are being positioned as the perfect way forward to attain the
originally envisaged benefits of cloudification.
Containers are being positioned as the most appropriate resource and runtime to host and execute
scores of microservices and their instances. The container monitoring, measurement and
management requirements are being speeded up with the availability of several open source as
well as commercial-grade monitoring and data analytics solutions. The container networking and
storage aspects are seeing a lot of tractions these days. Precisely speaking, there are a number of
automated tools and viable approaches towards making containerization penetrative, participative
and pervasive.
Why Containerization is pampered? - The old way to deploy applications was to install
software applications on a bare metal server/physical machine (node/host) using the operating
system (OS) package manager. This had led to the disadvantage of entangling the applications’
executables, configuration, libraries, and other dependencies with each other and with the
underlying host OS. With the fast maturity and stabilization of virtualization, the overwhelming
practice is to build immutable virtual machine (VM) images to achieve predictable rollouts and
rollbacks. But the main challenges include that VMs are heavyweight and non-portable.
The new way is to deploy containers, which implement OS-level virtualization rather than
hardware virtualization. These containers are fully isolated from each other and also from the
underlying host. The unique differentiations are that containers come with their own file
systems and can’t see other containers’ processes. It is possible to bind the computational
resource usage of each container. Containers are easier and faster to build than VMs. As
containers are totally decoupled from the underlying infrastructure and from the host machine’s
4. International Journal of Web & Semantic Technology (IJWesT) Vol.10, No.1, January 2019
4
file system, they are extremely portable across local and remote servers. Also multiple OS
distributions do not be a barrier for the container portability.
Containers are extremely lightweight. One application/process/service can be packed and
hosted inside each container. This one-to-one application-to-container relationship brings up a
bevy of benefits (business, technical and user). That is, immutable container images can be
created at implementation time itself rather than at run time. This enables to generate different
images for the different versions/editions of the same application. Bringing in technical and
business changes into application logic can be easily accomplished and accelerated. Each
application need not be composed with the rest of the application stack. Also application is not
tied up with underlying infrastructure. Therefore, containers can run anywhere (development,
testing, staging and production servers). Containers are transparent and hence their monitoring,
measurement and management are easier to do. The key container benefits of containers are
given below:-
• Agile application creation and running – Building container images through the techniques
and tools provided by the open source Docker platform for containerization-enablement is
faster. Not only development but also packaging, shipping and running containers are
transparent, quicker and simpler.
• Continuous integration, delivery and deployment – The containerization concept has been
hugely contributing for automating the DevOps tasks (continuous integration, delivery and
deployment).
• Separation of concerns between development and deployment – As indicated above, it is
possible to create container images at the build/release time itself. The deployment is totally
decoupled from the development and hence applications can run on any system infrastructure
without any hitch or hurdle. That is, containerization fulfils the longstanding goal of software
portability.
• Observability – With the containerization paradigm, not only OS-level information and
metrics, but also application-level information such as the performance/throughput, health
condition, and other value-adding and decision-enabling details can be collected, cleansed
and crunched to extricate actionable and timely insights.
• An Optimal Runtime for Microservices – Both cloud-native as well as enabled applications
are predominantly microservices-centric. Containers are being positioned as the most optimal
runtime for microservices. The convergence of containers and microservices is to bring a
variety of benefits for cloud IT environments.
• Resource isolation – Due to the isolation brought in through containerization, application
performance can be easily predicted.
• Resource utilization – Due to the lightweight nature of containers, accommodating many
containers in a single machine is possible. Thus containerization leads to heavily dense
environments. Further on, the resource utilization goes up significantly.
Containerization, without an iota of doubt, is being prescribed as the strategically sound tool for
resolving most of the ills plaguing cloud environments.
5. International Journal of Web & Semantic Technology (IJWesT) Vol.10, No.1, January 2019
5
2. OPPORTUNISTIC SERVICE COMPOSITION
Microservice composition is the method to combine various small services together to provide the
solution of user complex business needs. Service composition means collaboration of services to
build your software product [3]. Basically, it deals with high level software architecture paradigm
where different modules of services will communicate for specific business goals.
Classification approaches in QoS-aware service composition
The service composition algorithms are classified in to three categories:
Non- heuristic:-Non heuristic algorithms are exact and accurate algorithms they provide optimal
solution. The algorithms like Dynamic approach, Greedy approach, Divide and conquer
approach, Bellman ford algorithm, Dijkastra algorithm falls under the optimal algorithm category.
Heuristic algorithms: - these algorithms are based on trial and error method. Heuristic
algorithm provides fast results but not well for optimal solutions. Hill-climbing, Best first search,
A* search algorithm, Pruning algorithm comes under this category.
Meta-heuristic algorithm: - these are broad range algorithms used for generalized solutions. Ex:
- Genetic algorithm, Swarm optimization, PSO algorithm
2.1. Methods for service Composition
Microservice composition is the way to combine Microservice units to provide the solution for
the complex requirements at a single glance. Microservice Compositions can be performed in two
ways:-
Orchestration-based composition method.
Choreography-based composition method.
2.1.1 Orchestration Based Microservices Interaction
Orchestration is the most trusted and applicable way of handling interactions between different
services in Service-Oriented Architecture (SOA). In orchestration, there is typically one central
controller that acts as the “orchestrator” of the overall service interactions. This follows a
request/response message pattern. Only the central controller is responsible for all the interactions.
The central controller the orchestrator is responsible for overall communication.
In the health care application, we have developed the microservice namely as given below:-
• Patient pre authentication [MS1].
• Eligibility and benefits process [MS2].
• Claims submission [MS3].
• Payment posting [MS4].
• Denial management [MS5].
• AR follows up [MS6].
• Reporting [MS7]
• Litigation[MS8]
6. International Journal of Web & Semantic Technology (IJWesT) Vol.10, No.1, January 2019
6
Fig.2. Microservice Composition With Orchestration Method
Fig: 3. Orchestration flow
In this approach of microservice orchestration, the orchestrator calls to one service and wait for
the service response before calling to the next service. Once the called service response will come
it will call to the other service with is required for the interaction. In this approach all the request
will be send by the orchestrator and the next service call decision will be proceed by the
orchestrator.
Benefits
Orchestration provides a effective way for coordinate the flow of the application when there is
synchronous processing. For example, if Service A needs to complete successfully before Service
B is invoked.
Trade-off
Dependency:-Coupling of the services together creating dependencies between the coupled
services. If one service A is down, other service B and C will never be called. Service
dependency is the concerned point in the centralized environment.
Single point failure: - orchestrator is a single point control and single coordinator. If it goes down,
all processing stops and application fails.
7. International Journal of Web & Semantic Technology (IJWesT) Vol.10, No.1, January 2019
7
Extra execution time:-Leverages synchronous processing that blocks requests. In this example,
the total end-to-end processing time is the sum of time it takes for Service A + Service B + Service
C to be called.
2.1.2 Choreography Based Microservice Interaction
In Microservice architecture, we want to avoid dependencies of one Microservice on other service.
Microservice meaning each service should be able to represent on its own in independent manner.
Reactive architecture patterns solve for some of the challenges of orchestration approach of
composition.
Reactive architecture is considered as an event-driven architecture pattern applied to
microservices. Instead of having a central orchestrator that controls the logic of what steps happen
when that logic is built into each service ahead of time is referred as coordination or choreography.
The services know what to react to and how, ahead of time, like a autonomous approach. Services
use an event stream for asynchronous communication of events. Multiple services can consume the
same events, do some processing, and then produce their own events back into the event stream, all
at the same time.
The asynchronous nature of a reactive architecture removes the blocking or waiting time that
happens with orchestration (request/response) type processing. Services can produce events and
keep processing. Using an event stream for this enables communication between producer and
consumers to be decoupled. The producer doesn’t need to know if the consumer is up and running
before they produce an event, or if the consumer received the event that was produced.
Fig:4.Microservice Composition with Choreography Method
Fig:5. Choregraphy for health care application
8. International Journal of Web & Semantic Technology (IJWesT) Vol.10, No.1, January 2019
8
Also, in some cases, producers may want to direct commands to a specific service and receive
acknowledgement that the consumer received it. Additionally, consumers/producers may want to
consume/produce events from/to the event stream. This is a valid pattern and often you will find
both approaches used together in a reactive architecture.
Benefits
• Choreography supports faster processing as services can be executed in a parallel fashion
without depending on central controller service.
• Easier to add and update services as they can be plugged in or out of the event stream
easily.
• Aligns well with an agile delivery model as teams can focus on particular services instead
of the entire application
• Control is distributed, so there is no longer a single central controller i.e. orchestrator
serving as a single point of success.
• Several patterns can be used with a reactive architecture to provide additional benefits. For
example, Event Sourcing is when the Event pipeline contains all the events and enables
event Re- execute. This way, if a service failure occurs while events were still being
processed, then it came back and replays those events to get recovered. This enables each
of these to be scaled independently.
Tradeoffs
• Async programming is often a significant mind shift for developers. At the particular time,
the choreography can be performed in various ways.
• Complexity is again a concern point. Instead of having the centralized flow control in the
orchestrator, the flow control is now divided and distributed across the individual
services. Each service would have its own flow logic, and this logic would identify when
and how it should react based on specific data in the pipeline event stream.
3. THE PROBLEM DESCRIPTION
Some researchers already performed analysis on how microservices choreography and
orchestration techniques used for implementing micro service architecture. Here we are going to
explain it in detail in the health care application.
To make healthcare application more effective and impressive, we need to perform micro service
composition for the dynamic need and evaluate its processes for further improvements.
Microservice process modelling opens up new challenging questions i.e. which service
mechanism is good for service collaboration.
It’s a big challenge to identify which composition approach is better among orchestration and
choreography.
The purpose of this paper is to perform analysis on various considerable parameters like time
consumption, power consumption, and memory consumption in orchestration and choreography
process. The suitability of microservice orchestration and choreography is discussed in various
scenarios of modelling.
9. International Journal of Web & Semantic Technology (IJWesT) Vol.10, No.1, January 2019
9
4. IMPLEMENTATION & EVALUATION
This paper describes the basics of creating an executable BPEL business process for healthcare
application. The application code is written in Java and deployed to the Apache Web Server.
In a healthcare scenario, the BPEL business process receives a user request. To fulfil it, the
process calls the involved user request related services from the service registry and then
responds to the requester client. The invocation is handled by the composite service. To explain
BPEL, we defined a simplified business process for a healthcare application. The client invokes
the query according to the healthcare centre and gives the suitable solution. We assume that
healthcare application provides a service through which we search doctors and appointment
booking related services. Finally, the BPEL process gives the list of requested services to the
client. We build a synchronous BPEL process. The new BPEL composite micro service uses a set
of different port through which it provides functionality like any other newly designed services.
We execute service composition in two different ways namely orchestration and choreography.
The proposed model methodology is described as below:
• Service clients/consumers send requests to avail one or more services to the UDDI
microservice repository.
• Setting up a micro service Registry like UDDI for microservices.
• Setting up a cloud Hub for stocking of the micro services participating in the service
ecosystem.
• The selection criteria such as the typical QoS attribute (scalability, availability,
performance/throughput, security, extensibility, compos ability, etc.) for selecting various
micro services.
• The involvement of the Ontology technology for automatically selecting and using right
and relevant micro services for business processes. The human intervention,
interpretation and instruction are not needed for choosing the appropriate services to be
composed.
• Orchestration or choreography for composing the chosen micro services in order to craft
composite applications/workloads/processes.
• Composing multiple micro services leads to event-driven applications.
• The performance evaluation for the composite framework.
In this paper, various comparison analyses is performed for micro service choreography and
microservice orchestration methods based on the following three parameters namely
• Time consumption
• Memory utilization.
• Power utilization
Configuration of machine:
• Windows 8.x
• Windows Server 2008 R2 SP1 (64-bit)
• RAM: 128 MB
• Disk space: 124 MB for JRE; 2 MB for Java Update
• Processor: Minimum Pentium 2 266 MHz processor
• Browsers: Internet Explorer 9 and above, Firefox
10. International Journal of Web & Semantic Technology (IJWesT) Vol.10, No.1, January 2019
• Eclipse with Spring
• Apache Tomcat 7.0
• Postgres 9.0
• MYSQL 5.17
Time performance
Microservice composition is performed using service orchestration and the service choreography
method and the time taken for execution in both the cases is observed for the v
service executions.
Fig.6.Time Based performance Evaluation
The analysis shows that the time consumption for the microservice choreography is less compare
to the orchestration method.
Memory utilization:
Monitored the memory utilization for both the approaches i.e. microservice
choreography
Fig.7.Memory consumption of different services
The analysis shows that the memory consumption for the microservice choreography is less
compare to the orchestration method.
0
10
20
30
40
50
International Journal of Web & Semantic Technology (IJWesT) Vol.10, No.1, January 2019
Microservice composition is performed using service orchestration and the service choreography
method and the time taken for execution in both the cases is observed for the v
Fig.6.Time Based performance Evaluation
analysis shows that the time consumption for the microservice choreography is less compare
Monitored the memory utilization for both the approaches i.e. microservice orchestration and
Fig.7.Memory consumption of different services
The analysis shows that the memory consumption for the microservice choreography is less
compare to the orchestration method.
Memory Consumption
choreography
orchestration
International Journal of Web & Semantic Technology (IJWesT) Vol.10, No.1, January 2019
10
Microservice composition is performed using service orchestration and the service choreography
method and the time taken for execution in both the cases is observed for the various micro
analysis shows that the time consumption for the microservice choreography is less compare
orchestration and
The analysis shows that the memory consumption for the microservice choreography is less
11. International Journal of Web & Semantic Technology (IJWesT) Vol.10, No.1, January 2019
Power utilization:
Power consumption is estimated for the service composition
The analysis shows that the power consumption for the microservice choreography is less
compare to the orchestration method.
5. CONCLUSION & FUTURE WORK
In this paper, we described our implementation of dynamic
using orchestration and choreography. This work tries to perform the analysis between both the
approaches orchestration and choreography. The analysis is performed based on time
consumption, memory consumption, power
With the analysis based on time consumption, memory
We were able to clearly identify that event choreography is much faster in performance
graphs, In comparison to orchestration.
However, event choreography becomes very complex to code and handle if there are multiple
events triggered from each micro service. It is also evident that handling multiple actions for the
triggers without a central orchestrator is tough as one developer or team working on
service may not be known to the other developer. This shows choreography based composition is
a suggested approach when there is less number of micro services participating in the distributed
business process, or the number of event triggers is not
not too complex. Orchestration is slow, but it is useful when the transaction scenarios are
complex.
If application is not more complex and handling heterogeneous services is easy and maintainable
than choreography is a suggested approach, But if application complexity is high and it’s better to
opt for orchestration as central coordinator in a single point of control and easy to maintain.
In future work, both choreography and orchestration can be considered toge
dynamism.
International Journal of Web & Semantic Technology (IJWesT) Vol.10, No.1, January 2019
ower consumption is estimated for the service composition methods.
Fig.8.Power based consumption
The analysis shows that the power consumption for the microservice choreography is less
compare to the orchestration method.
CONCLUSION & FUTURE WORK
In this paper, we described our implementation of dynamic services composition approaches i.e.
using orchestration and choreography. This work tries to perform the analysis between both the
approaches orchestration and choreography. The analysis is performed based on time
consumption, memory consumption, power consumption.
time consumption, memory consumption, power consumption,
were able to clearly identify that event choreography is much faster in performance
In comparison to orchestration.
eography becomes very complex to code and handle if there are multiple
events triggered from each micro service. It is also evident that handling multiple actions for the
triggers without a central orchestrator is tough as one developer or team working on
service may not be known to the other developer. This shows choreography based composition is
a suggested approach when there is less number of micro services participating in the distributed
business process, or the number of event triggers is not too many or when the trigger actions are
not too complex. Orchestration is slow, but it is useful when the transaction scenarios are
If application is not more complex and handling heterogeneous services is easy and maintainable
y is a suggested approach, But if application complexity is high and it’s better to
opt for orchestration as central coordinator in a single point of control and easy to maintain.
both choreography and orchestration can be considered together to perform more
International Journal of Web & Semantic Technology (IJWesT) Vol.10, No.1, January 2019
11
The analysis shows that the power consumption for the microservice choreography is less
services composition approaches i.e.
using orchestration and choreography. This work tries to perform the analysis between both the
approaches orchestration and choreography. The analysis is performed based on time
consumption, power consumption,
were able to clearly identify that event choreography is much faster in performance as per the
eography becomes very complex to code and handle if there are multiple
events triggered from each micro service. It is also evident that handling multiple actions for the
triggers without a central orchestrator is tough as one developer or team working on a micro
service may not be known to the other developer. This shows choreography based composition is
a suggested approach when there is less number of micro services participating in the distributed
too many or when the trigger actions are
not too complex. Orchestration is slow, but it is useful when the transaction scenarios are
If application is not more complex and handling heterogeneous services is easy and maintainable
y is a suggested approach, But if application complexity is high and it’s better to
opt for orchestration as central coordinator in a single point of control and easy to maintain.
ther to perform more
12. International Journal of Web & Semantic Technology (IJWesT) Vol.10, No.1, January 2019
12
REFERENCES
[1] Damian Arellanes , Kung-Kiu Lau” D-XMAN: A Platform For Total Compositionality in Service-
Oriented Architectures” 2017 IEEE 7th International Symposium on Cloud and Service Computing
DOI 10.1109/SC2.2017.55
[2] Kleanthis Thramboulidis, Danai C. Vachtsevanou, Alexandros Solanos” Cyber-Physical
Microservices An IoT-based Framework for Manufacturing Systems” 2018 IEEE .
[3] Damian Arellanes and Kung-Kiu Lau” Exogenous Connectors for Hierarchical Service Composition”
2017 IEEE 10th International Conference on Service-Oriented Computing and Applications” DOI
10.1109/SOCA.2017.25
[4] Chris peltz“web service orchistration and choreography” IEEE Computer socity,2003.
[5] Festim Halili,Eip Rufati , Ilia Ninka “Styles of Service Composition – Analysis and Comparison
Methods ” 2013 Fifth International Conference on Computational Intelligence, Communication
Systems and Networks.
[6] Tanveer Ahmed, Abhishek Srivastava “Service Choreography: Present and Future” 2014 IEEE
International Conference on Services Computing DOI 10.1109/SCC.2014.126.
[7] Sirine Rebai, Hatem Hadj Kacem, Mohamed Karˆaa , Saul E. Pomares and Ahmed Hadj Kacem1,” A
Service-Oriented Architecture (SOA) Framework for Choreography Verification” IEEE, ICIS 2015,
June 28-July 1 2015, Las Vegas, USA 978-1-4799-8679-8
[8] Junio C. Lima Ricardo C. A. Rocha , Fabio M. Costa,” An Approach for QoS-Aware Selection of
Shared Services for Multiple Service Choreographies” 2016 IEEE Symposium on Service-Oriented
System Engineering.
[9] Ján Terpák, Pavel Horovák, Matej Luká,” Mathematical models creation using orchestration and
choreography of web services” 2016 IEEE 978-1-4673-8606-7.
[10] Nacera Temgli,Abdelghani Chibani, Karim Djouani, and Mohamed Ahmed Nacer,” A Distributed
Agent-Based Approach for Optimal QoS Selection in Web of Object Choreography” IEEE
SYSTEMS JOURNAL, VOL. 12, NO. 2, JUNE 2018, 1937-9234
[11] Lei Chen* and Cristofer Englund,” Choreographing services for smart cities: smart traffic
demonstration” 2017 IEEE 978-1-5090-5932-4.
[12] UrjitaThakar, AmitTiwari, SudarshanVarma “Choreography-based vs Orchestration-based Servic
Composition in Opportunistic Networks” 2017 IEEE 13th International Conference on Wireless and
Mobile Computing, Networking and Communications (WiMob)
[13] Shang-Pin Ma*, Peng-Zhong Chen, Yang-Sheng Ma, and Jheng-ShiunJiang“CARSB Portal: A Web-
Based Software Tool to Composing Service Bricks and RESTful Services as Mobile Apps” 978-1-
5090-3438-3/16 2016 IEEE DOI 10.1109/ICS.2016.118
[14] Shang-Pin Ma, Ci-Wei Lan, Ching-Ting Ho, and Jiun-Hau Ye,” QoS-Aware Selection of Web APIs
Based on _-Pareto Genetic Algorithm” 978-1-5090-3438-3/16 2016 IEEE DOI 10.1109/ICS.2016.121
[15] Youngmee Shin, Wanki Park, Ilwoo Lee,” Design of Microgrid Web Services for Microgrid
Applications” 978-1-5090-4749-9/17IEEE ICUFN 2017
13. International Journal of Web & Semantic Technology (IJWesT) Vol.10, No.1, January 2019
13
[16] Elyas Ben HadjYahia; Laurent R_eveill_ere, Y_erom-David Bromberg, Raphael Chevalier, and Alain
Cadot,” Medley: An Event-Driven Lightweight Platform For Service Composition”
[17] Martin Garriga , CristianMateos , AndresFlores , AlejandraCechich , Alejandro Zunino “RESTful
service composition at a glance: A survey” Journal of Network and Computer Applications (2016)
[18] Bhaskar Kapoor1 and Savita Sharma2” A Comparative Study Ontology Building Tools for Semantic
Web Applications” International journal of Web & Semantic Technology (IJWesT) Vol.1, Num.3,
July 2010
[19] H. H. Kian1 and M. Zahedi2” AN EFFICIENT APPROACH FOR KEYWORD SELECTION;
IMPROVING ACCESSIBILITY OF WEB CONTENTS BY GENERAL SEARCH ENGINES”
International Journal of Web & Semantic Technology (IJWesT) Vol.2, No.4, October 2011
[20] Q. Z. Sheng, X. Qiao, A. V. Vasilakos, C. Szabo, S. Bourne, and X. Xu, “Web services composition:
A decade’s overview,” Information Sciences, vol. 280, pp. 218–238, Oct. 2014.
AUTHORS
Mrs. Neha Singhal is having 9.5 years of teaching experience, presently working
as an Assistant Professor, Dept. of Information Science and Engineering since
2010. She obtained her M.Tech from banasthali university, Rajasthan. She is
pursuing her Ph.D under VTU in the area of web services. Her teaching and
research interests are in the field of web services.
S. Usha, is working as a professor and head , CSE, RRCE. Graduated from
Manonmanium Sundaranar University, in Computer Science and Engineering
during the year 1998. She obtained her Master degree in Computer Science and
Engineering and PhD degree from sathyabama university in the area of Mobile Ad
Hoc Networks in the year 2013. She has 54 publications in International and
National conferences, 22 publication in national journal and international journals
in the area of Mobile Ad hoc Networks and wireless security. Most of the
publications are having impact factor citied in google scholar (h index and
i10index), Microsoft etc.. Received fund from AICTE under NCP scheme and
SERB(DST). Received best teacher award from Lions club in the year 2010&2012.Dveloped Centre of
Excellence lab in IoT with industry collobration.Organized many conferences ,FDPs and Technical Talks.
Associated with ISTE, CSI,IEEE,IAENG ,IDES and IACSIT.Reviewed papers in IJCs and CiiT jouranals.
Acted as a TPC member in MIRA’14 IoTBDS ’17 and IoTBDS’18 Portugal.. Chaired sessions in FCS’14,
ICISC’13 & ICCCT’15., ICCCT’17and IoTBDS’18.
Pethuru Raj Chelliah, Finished the CSIR-sponsored PhD degree at Anna
University, Chennai and continued with the UGC-sponsored postdoctoral research
in the Department of Computer Science and Automation, Indian Institute of
Science, Bangalore. Thereafter, I was granted a couple of international research
fellowships (JSPS and JST) to work as a research scientist for 3.5 years in two
leading Japanese universities. Published more than 30 research papers in peer-
reviewed journals such as IEEE, ACM, Springer-Verlag, Inderscience, etc. Have
authored 8 books thus far and focus on some of the emerging technologies such as
IoT, Cognitive Analytics, Blockchain, Digital Twin, Docker Containerization, Data
Science, Microservices Architecture, fog / edge computing, etc. Have contributed 30 book chapters thus far
for various technology books edited by highly acclaimed and accomplished professors and professionals.