SlideShare a Scribd company logo
SLA Violation
www.iamrahuljain.in
Why SLA Violation… ???
www.iamrahuljain.in
What is SLA violation?
• Some businesses prefer or are obliged to have a
certain Service Level Agreement in place.
• The SLA sets a definite timeframe in which tickets
have to be answered or chats and calls have to be
picked up.
• If they are not answered or picked up within the
specified timeframe, SLA Violation occurs.
www.iamrahuljain.in
Why This Condition Arise…?
• The number of processors provided by the cloud providers
is less than the requested number of processor by the jobs
or cloudlet.
www.iamrahuljain.in
So…What companies normally do?
• If too many SLA Violation occur, a company should
reconsider their SLA setups and preferences or
should empower their workforce with more agents
or with better helpdesk tools.
www.iamrahuljain.in
Functionality
Customer SLA Violation Management functionality includes:
• Notifying appropriate people or systems to remedy the violation.
• Per the SLA contract, quantifying the violation in terms of an
adjustments or actions per the contract.
• Passing this adjustment or action on to billing or appropriate systems
for remedy.
• Tracking and management of open Customer SLA issues.
www.iamrahuljain.in
An Architecture for Detecting
SLA Violations in Cloud
Computing Infrastructures
www.iamrahuljain.in
FoSII Infra Overview
www.iamrahuljain.in
www.iamrahuljain.in
Each FoSII service implements three interfaces:
(i) negotiation interface
necessary for the
establishment of SLA
agreements.
www.iamrahuljain.in
(ii) application
management interface
necessary to start the
application, upload
data, and perform
similar management
actions.
www.iamrahuljain.in
(iii) self-
management
interface necessary
to devise actions in
order to prevent
SLA violations.
www.iamrahuljain.in
Working Of FoSII Infra
• The self-management
interface is implemented
by each Cloud service
and specifies operations
for sensing changes of
the desired state and for
reacting to those
changes.
www.iamrahuljain.in
Working Of FoSII Infra
• The host monitor sensors
continuously monitor the
infrastructure resource
metrics and provide the
autonomic manager with
the current resource
status.
www.iamrahuljain.in
Working Of FoSII Infra
• The runtime monitor
sensors sense future SLA
violation threats based
on resource usage
experiences and
predefined threat
thresholds.
www.iamrahuljain.in
Finally..
• Logically, FoSII infrastructure consists of multiple
components working together to achieve a common goal.
• In this architecture we focus on the knowledge management
component and the LoM2HiS framework since they are
responsible for system monitoring and detection of SLA
violations.
www.iamrahuljain.in
Combining multi-agent systems
and MDE approach for
monitoring SLA violations in the
Cloud Computing
www.iamrahuljain.in
Multi-agent systems (MASs) in order to
monitor SLA violations in real-time.
www.iamrahuljain.in
Multi Agent Systems
• MASs are suitable tools
for self-detection of
failures and self-
monitoring of cloud
operations and services,
QoS negotiation and SLA
management.
www.iamrahuljain.in
Multi Agent Systems
•They are designed to
operate in a
dynamically changing
environment.
www.iamrahuljain.in
Multi Agent Systems
• Our main motivation is
firstly to use MDE
technology for the creation
of the SLA contract and then
to integrate MASs in order
to control the quality of
service contract and
guarantee transparency and
symmetry with respect to
the SLA contract between
prospective signatories www.iamrahuljain.in
Proposed Architecture
www.iamrahuljain.in
Multi-agent systems and
MDE approach
www.iamrahuljain.in
Take A Easy Note:
• A Service Level Agreement (SLA) is a legal contract
between parties to ensure the Quality of Service
(QoS).
• A Service Level Agreement (SLA) is a legal contract
between parties to ensure the Quality of Service
(QoS).
www.iamrahuljain.in
Is There Any Guarantee..??
•However, It becomes hard to guarantee QoS
levels and detect SLA violations. Therefore,
we propose to use MDE (Model Driven
Engineering) to express the SLA contract
requirements.
www.iamrahuljain.in
• That MDE created with a specific modelling language
(DSML), will be used harmonically with a Multi-agent
systems (MASs) in order to monitor SLA violations in
real-time
www.iamrahuljain.in
Multi-agent systems and MDE approach for
monitoring SLA violations
www.iamrahuljain.in
Autonomous SLA violation
monitoring and filtering
www.iamrahuljain.in
Autonomous SLA violation monitoring and filtering
www.iamrahuljain.in
Thank You.!
www.iamrahuljain.in

More Related Content

What's hot

Application SLA - the missing part of complete SLA management
Application SLA - the missing part of complete SLA managementApplication SLA - the missing part of complete SLA management
Application SLA - the missing part of complete SLA management
Comarch
 
Software Asset Management
Software Asset ManagementSoftware Asset Management
Software Asset Management
sleterrier
 
ACCE 2007
ACCE 2007ACCE 2007
ACCE 2007
Balaji Sundara
 
Helpdesk Service Level Agreements
Helpdesk Service Level AgreementsHelpdesk Service Level Agreements
Helpdesk Service Level Agreements
Christopher Duffy
 
081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grc081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grc
hkodali
 
Sap grc process control 10.0
Sap grc process control 10.0Sap grc process control 10.0
Sap grc process control 10.0
Latha Kamal
 
AUTOMATING A PURCHASE REQUISITION PROCESS WITH BPM SOFTWARE
AUTOMATING A PURCHASE REQUISITION PROCESS WITH BPM SOFTWAREAUTOMATING A PURCHASE REQUISITION PROCESS WITH BPM SOFTWARE
AUTOMATING A PURCHASE REQUISITION PROCESS WITH BPM SOFTWARE
skeltabpm
 
Evo brochure from Global DMS
Evo brochure from Global DMSEvo brochure from Global DMS
Evo brochure from Global DMS
Molly Dowdy
 
License Auditor - Controle y optimice sus licencias SAP
License Auditor - Controle y optimice sus licencias SAPLicense Auditor - Controle y optimice sus licencias SAP
License Auditor - Controle y optimice sus licencias SAP
Tomas Martinez
 
Oracle Billing and Revenue Management(BRM)
Oracle Billing and Revenue Management(BRM)Oracle Billing and Revenue Management(BRM)
Oracle Billing and Revenue Management(BRM)
Raghwendra Vikram
 
melssCRM Case Study - Maruthi Power Control
melssCRM Case Study - Maruthi Power ControlmelssCRM Case Study - Maruthi Power Control
melssCRM Case Study - Maruthi Power Control
melssCRM
 
How SAM can help our company
How SAM can help our companyHow SAM can help our company
How SAM can help our company
urad74
 
EZmaintain CMMS
EZmaintain CMMSEZmaintain CMMS
EZmaintain CMMS
Neha Shah
 
CyberArk
CyberArkCyberArk
CyberArk
Jimmy Sze
 
34514_Process_Control_e-book_interactive
34514_Process_Control_e-book_interactive34514_Process_Control_e-book_interactive
34514_Process_Control_e-book_interactive
ROMI Associates
 
Call Management brochure
Call Management brochureCall Management brochure
Call Management brochure
Ronald Van Vliet
 
Hippo CMMS Overview
Hippo CMMS OverviewHippo CMMS Overview
Hippo CMMS Overview
Margeaux Girardin
 
Iia los angeles sap security presentation
Iia  los angeles  sap security presentation Iia  los angeles  sap security presentation
Iia los angeles sap security presentation
hkodali
 
Software Asset Management (SAM) and License Optimization ROI Workshop
Software Asset Management (SAM) and License Optimization ROI WorkshopSoftware Asset Management (SAM) and License Optimization ROI Workshop
Software Asset Management (SAM) and License Optimization ROI Workshop
Flexera
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices 
Veritis Group, Inc
 

What's hot (20)

Application SLA - the missing part of complete SLA management
Application SLA - the missing part of complete SLA managementApplication SLA - the missing part of complete SLA management
Application SLA - the missing part of complete SLA management
 
Software Asset Management
Software Asset ManagementSoftware Asset Management
Software Asset Management
 
ACCE 2007
ACCE 2007ACCE 2007
ACCE 2007
 
Helpdesk Service Level Agreements
Helpdesk Service Level AgreementsHelpdesk Service Level Agreements
Helpdesk Service Level Agreements
 
081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grc081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grc
 
Sap grc process control 10.0
Sap grc process control 10.0Sap grc process control 10.0
Sap grc process control 10.0
 
AUTOMATING A PURCHASE REQUISITION PROCESS WITH BPM SOFTWARE
AUTOMATING A PURCHASE REQUISITION PROCESS WITH BPM SOFTWAREAUTOMATING A PURCHASE REQUISITION PROCESS WITH BPM SOFTWARE
AUTOMATING A PURCHASE REQUISITION PROCESS WITH BPM SOFTWARE
 
Evo brochure from Global DMS
Evo brochure from Global DMSEvo brochure from Global DMS
Evo brochure from Global DMS
 
License Auditor - Controle y optimice sus licencias SAP
License Auditor - Controle y optimice sus licencias SAPLicense Auditor - Controle y optimice sus licencias SAP
License Auditor - Controle y optimice sus licencias SAP
 
Oracle Billing and Revenue Management(BRM)
Oracle Billing and Revenue Management(BRM)Oracle Billing and Revenue Management(BRM)
Oracle Billing and Revenue Management(BRM)
 
melssCRM Case Study - Maruthi Power Control
melssCRM Case Study - Maruthi Power ControlmelssCRM Case Study - Maruthi Power Control
melssCRM Case Study - Maruthi Power Control
 
How SAM can help our company
How SAM can help our companyHow SAM can help our company
How SAM can help our company
 
EZmaintain CMMS
EZmaintain CMMSEZmaintain CMMS
EZmaintain CMMS
 
CyberArk
CyberArkCyberArk
CyberArk
 
34514_Process_Control_e-book_interactive
34514_Process_Control_e-book_interactive34514_Process_Control_e-book_interactive
34514_Process_Control_e-book_interactive
 
Call Management brochure
Call Management brochureCall Management brochure
Call Management brochure
 
Hippo CMMS Overview
Hippo CMMS OverviewHippo CMMS Overview
Hippo CMMS Overview
 
Iia los angeles sap security presentation
Iia  los angeles  sap security presentation Iia  los angeles  sap security presentation
Iia los angeles sap security presentation
 
Software Asset Management (SAM) and License Optimization ROI Workshop
Software Asset Management (SAM) and License Optimization ROI WorkshopSoftware Asset Management (SAM) and License Optimization ROI Workshop
Software Asset Management (SAM) and License Optimization ROI Workshop
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices 
 

Similar to Sla violation in Cloud Computing

Journey to the Cloud CRM from Enterprise CRM - TechGiG Webinar
Journey to the Cloud CRM from Enterprise CRM - TechGiG WebinarJourney to the Cloud CRM from Enterprise CRM - TechGiG Webinar
Journey to the Cloud CRM from Enterprise CRM - TechGiG Webinar
Dr.Dinesh Chandrasekar PhD(hc)
 
Cloud computing set 3
Cloud computing set 3Cloud computing set 3
Cloud computing set 3
Nicole Valerio
 
ERP Security as a Service 2017
ERP Security as a Service 2017ERP Security as a Service 2017
ERP Security as a Service 2017
Jane Jones
 
SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070
SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070
SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070
retheauditors
 
What is Contract Lifecycle Management.pdf
What is Contract Lifecycle Management.pdfWhat is Contract Lifecycle Management.pdf
What is Contract Lifecycle Management.pdf
Sirion Labs
 
Crosscode Automotive CLM Platform Datasheet
Crosscode Automotive CLM Platform DatasheetCrosscode Automotive CLM Platform Datasheet
Crosscode Automotive CLM Platform Datasheet
acuser30
 
Week 3 lecture material cc
Week 3 lecture material ccWeek 3 lecture material cc
Week 3 lecture material cc
Ankit Gupta
 
ThirdPartyOversight
ThirdPartyOversightThirdPartyOversight
ThirdPartyOversight
Molly Dowdy
 
SAM Software Asset Management
SAM Software Asset ManagementSAM Software Asset Management
SAM Software Asset Management
BearingPoint
 
Concorde Solutions ITAM Review Tools Day
Concorde Solutions ITAM Review Tools Day Concorde Solutions ITAM Review Tools Day
Concorde Solutions ITAM Review Tools Day
Martin Thompson
 
Service Integration and Management
Service Integration and Management Service Integration and Management
Service Integration and Management
Desmond Devendran
 
Cloud comuting Cheap Assignment Help
Cloud comuting Cheap Assignment HelpCloud comuting Cheap Assignment Help
Cloud comuting Cheap Assignment Help
Nicole Valerio
 
Cloud Cheap Assignment Help
Cloud Cheap Assignment HelpCloud Cheap Assignment Help
Cloud Cheap Assignment Help
Nicole Valerio
 
Dit yvol5iss13
Dit yvol5iss13Dit yvol5iss13
Dit yvol5iss13
Rick Lemieux
 
Why you really need a SIAM tooling strategy
Why you really need a SIAM tooling strategy Why you really need a SIAM tooling strategy
Why you really need a SIAM tooling strategy
Steve Morgan
 
Things IT Leaders Must Consider About Cloud Managed Services
Things IT Leaders Must Consider About Cloud Managed Services Things IT Leaders Must Consider About Cloud Managed Services
Things IT Leaders Must Consider About Cloud Managed Services
Nuvento Systems Pvt Ltd
 
EY Software Asset Management Advisory
EY Software Asset Management AdvisoryEY Software Asset Management Advisory
EY Software Asset Management Advisory
Mohit Madan
 
Vendor Management System - Introduction2
Vendor Management System - Introduction2Vendor Management System - Introduction2
Vendor Management System - Introduction2
Frank Corris
 
Building Reliability - The Realities of Observability
Building Reliability - The Realities of ObservabilityBuilding Reliability - The Realities of Observability
Building Reliability - The Realities of Observability
All Things Open
 
Oow2014 nk 2
Oow2014 nk 2Oow2014 nk 2
Oow2014 nk 2
controllayers
 

Similar to Sla violation in Cloud Computing (20)

Journey to the Cloud CRM from Enterprise CRM - TechGiG Webinar
Journey to the Cloud CRM from Enterprise CRM - TechGiG WebinarJourney to the Cloud CRM from Enterprise CRM - TechGiG Webinar
Journey to the Cloud CRM from Enterprise CRM - TechGiG Webinar
 
Cloud computing set 3
Cloud computing set 3Cloud computing set 3
Cloud computing set 3
 
ERP Security as a Service 2017
ERP Security as a Service 2017ERP Security as a Service 2017
ERP Security as a Service 2017
 
SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070
SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070
SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070
 
What is Contract Lifecycle Management.pdf
What is Contract Lifecycle Management.pdfWhat is Contract Lifecycle Management.pdf
What is Contract Lifecycle Management.pdf
 
Crosscode Automotive CLM Platform Datasheet
Crosscode Automotive CLM Platform DatasheetCrosscode Automotive CLM Platform Datasheet
Crosscode Automotive CLM Platform Datasheet
 
Week 3 lecture material cc
Week 3 lecture material ccWeek 3 lecture material cc
Week 3 lecture material cc
 
ThirdPartyOversight
ThirdPartyOversightThirdPartyOversight
ThirdPartyOversight
 
SAM Software Asset Management
SAM Software Asset ManagementSAM Software Asset Management
SAM Software Asset Management
 
Concorde Solutions ITAM Review Tools Day
Concorde Solutions ITAM Review Tools Day Concorde Solutions ITAM Review Tools Day
Concorde Solutions ITAM Review Tools Day
 
Service Integration and Management
Service Integration and Management Service Integration and Management
Service Integration and Management
 
Cloud comuting Cheap Assignment Help
Cloud comuting Cheap Assignment HelpCloud comuting Cheap Assignment Help
Cloud comuting Cheap Assignment Help
 
Cloud Cheap Assignment Help
Cloud Cheap Assignment HelpCloud Cheap Assignment Help
Cloud Cheap Assignment Help
 
Dit yvol5iss13
Dit yvol5iss13Dit yvol5iss13
Dit yvol5iss13
 
Why you really need a SIAM tooling strategy
Why you really need a SIAM tooling strategy Why you really need a SIAM tooling strategy
Why you really need a SIAM tooling strategy
 
Things IT Leaders Must Consider About Cloud Managed Services
Things IT Leaders Must Consider About Cloud Managed Services Things IT Leaders Must Consider About Cloud Managed Services
Things IT Leaders Must Consider About Cloud Managed Services
 
EY Software Asset Management Advisory
EY Software Asset Management AdvisoryEY Software Asset Management Advisory
EY Software Asset Management Advisory
 
Vendor Management System - Introduction2
Vendor Management System - Introduction2Vendor Management System - Introduction2
Vendor Management System - Introduction2
 
Building Reliability - The Realities of Observability
Building Reliability - The Realities of ObservabilityBuilding Reliability - The Realities of Observability
Building Reliability - The Realities of Observability
 
Oow2014 nk 2
Oow2014 nk 2Oow2014 nk 2
Oow2014 nk 2
 

More from Er. Rahul Jain

Interview Preparation For Wipro/TCS/Infy/IBM/Accenture
Interview Preparation For Wipro/TCS/Infy/IBM/AccentureInterview Preparation For Wipro/TCS/Infy/IBM/Accenture
Interview Preparation For Wipro/TCS/Infy/IBM/Accenture
Er. Rahul Jain
 
International Albinism Awareness Day IAAD, 13 June
International Albinism Awareness Day IAAD, 13 JuneInternational Albinism Awareness Day IAAD, 13 June
International Albinism Awareness Day IAAD, 13 June
Er. Rahul Jain
 
Latest RBI Policy Rates
Latest RBI Policy RatesLatest RBI Policy Rates
Latest RBI Policy Rates
Er. Rahul Jain
 
Competition Exam Preparation
Competition Exam Preparation Competition Exam Preparation
Competition Exam Preparation
Er. Rahul Jain
 
Bit coin, Know About Bit Coins
Bit coin, Know About Bit CoinsBit coin, Know About Bit Coins
Bit coin, Know About Bit Coins
Er. Rahul Jain
 
Goods & services tax (gst)
Goods & services tax (gst)Goods & services tax (gst)
Goods & services tax (gst)
Er. Rahul Jain
 
Isro successfully launches its heaviest ever rocket, geosynchronous satellite...
Isro successfully launches its heaviest ever rocket, geosynchronous satellite...Isro successfully launches its heaviest ever rocket, geosynchronous satellite...
Isro successfully launches its heaviest ever rocket, geosynchronous satellite...
Er. Rahul Jain
 
The big investors of 2017
The big investors of 2017The big investors of 2017
The big investors of 2017
Er. Rahul Jain
 
Apps & Schemes Launched by banks
Apps & Schemes Launched by banksApps & Schemes Launched by banks
Apps & Schemes Launched by banks
Er. Rahul Jain
 
Important abbreviations on economy GST Related
Important abbreviations on economy GST Related Important abbreviations on economy GST Related
Important abbreviations on economy GST Related
Er. Rahul Jain
 
Important abbreviations on economy GST Related
Important abbreviations on economy GST Related Important abbreviations on economy GST Related
Important abbreviations on economy GST Related
Er. Rahul Jain
 
Important English Slang words
Important English Slang wordsImportant English Slang words
Important English Slang words
Er. Rahul Jain
 
How To Choose Subject After 10th Class?
How To Choose Subject After 10th Class?How To Choose Subject After 10th Class?
How To Choose Subject After 10th Class?
Er. Rahul Jain
 
International Yoga Day 21st June, IDY
International Yoga Day 21st June, IDYInternational Yoga Day 21st June, IDY
International Yoga Day 21st June, IDY
Er. Rahul Jain
 
International Yoga Day 21st June, IDY
International Yoga Day 21st June, IDYInternational Yoga Day 21st June, IDY
International Yoga Day 21st June, IDY
Er. Rahul Jain
 
WHO : World Blood Donor Day, 14 June
WHO : World Blood Donor Day, 14 JuneWHO : World Blood Donor Day, 14 June
WHO : World Blood Donor Day, 14 June
Er. Rahul Jain
 
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Er. Rahul Jain
 
Mini Project Format
Mini Project Format Mini Project Format
Mini Project Format
Er. Rahul Jain
 
Mobile IP Presentation
Mobile IP Presentation Mobile IP Presentation
Mobile IP Presentation
Er. Rahul Jain
 
Mobile IP
Mobile IP Mobile IP
Mobile IP
Er. Rahul Jain
 

More from Er. Rahul Jain (20)

Interview Preparation For Wipro/TCS/Infy/IBM/Accenture
Interview Preparation For Wipro/TCS/Infy/IBM/AccentureInterview Preparation For Wipro/TCS/Infy/IBM/Accenture
Interview Preparation For Wipro/TCS/Infy/IBM/Accenture
 
International Albinism Awareness Day IAAD, 13 June
International Albinism Awareness Day IAAD, 13 JuneInternational Albinism Awareness Day IAAD, 13 June
International Albinism Awareness Day IAAD, 13 June
 
Latest RBI Policy Rates
Latest RBI Policy RatesLatest RBI Policy Rates
Latest RBI Policy Rates
 
Competition Exam Preparation
Competition Exam Preparation Competition Exam Preparation
Competition Exam Preparation
 
Bit coin, Know About Bit Coins
Bit coin, Know About Bit CoinsBit coin, Know About Bit Coins
Bit coin, Know About Bit Coins
 
Goods & services tax (gst)
Goods & services tax (gst)Goods & services tax (gst)
Goods & services tax (gst)
 
Isro successfully launches its heaviest ever rocket, geosynchronous satellite...
Isro successfully launches its heaviest ever rocket, geosynchronous satellite...Isro successfully launches its heaviest ever rocket, geosynchronous satellite...
Isro successfully launches its heaviest ever rocket, geosynchronous satellite...
 
The big investors of 2017
The big investors of 2017The big investors of 2017
The big investors of 2017
 
Apps & Schemes Launched by banks
Apps & Schemes Launched by banksApps & Schemes Launched by banks
Apps & Schemes Launched by banks
 
Important abbreviations on economy GST Related
Important abbreviations on economy GST Related Important abbreviations on economy GST Related
Important abbreviations on economy GST Related
 
Important abbreviations on economy GST Related
Important abbreviations on economy GST Related Important abbreviations on economy GST Related
Important abbreviations on economy GST Related
 
Important English Slang words
Important English Slang wordsImportant English Slang words
Important English Slang words
 
How To Choose Subject After 10th Class?
How To Choose Subject After 10th Class?How To Choose Subject After 10th Class?
How To Choose Subject After 10th Class?
 
International Yoga Day 21st June, IDY
International Yoga Day 21st June, IDYInternational Yoga Day 21st June, IDY
International Yoga Day 21st June, IDY
 
International Yoga Day 21st June, IDY
International Yoga Day 21st June, IDYInternational Yoga Day 21st June, IDY
International Yoga Day 21st June, IDY
 
WHO : World Blood Donor Day, 14 June
WHO : World Blood Donor Day, 14 JuneWHO : World Blood Donor Day, 14 June
WHO : World Blood Donor Day, 14 June
 
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
 
Mini Project Format
Mini Project Format Mini Project Format
Mini Project Format
 
Mobile IP Presentation
Mobile IP Presentation Mobile IP Presentation
Mobile IP Presentation
 
Mobile IP
Mobile IP Mobile IP
Mobile IP
 

Recently uploaded

Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
Sease
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Fwdays
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
Fwdays
 

Recently uploaded (20)

Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
 

Sla violation in Cloud Computing

  • 2. Why SLA Violation… ??? www.iamrahuljain.in
  • 3. What is SLA violation? • Some businesses prefer or are obliged to have a certain Service Level Agreement in place. • The SLA sets a definite timeframe in which tickets have to be answered or chats and calls have to be picked up. • If they are not answered or picked up within the specified timeframe, SLA Violation occurs. www.iamrahuljain.in
  • 4. Why This Condition Arise…? • The number of processors provided by the cloud providers is less than the requested number of processor by the jobs or cloudlet. www.iamrahuljain.in
  • 5. So…What companies normally do? • If too many SLA Violation occur, a company should reconsider their SLA setups and preferences or should empower their workforce with more agents or with better helpdesk tools. www.iamrahuljain.in
  • 6. Functionality Customer SLA Violation Management functionality includes: • Notifying appropriate people or systems to remedy the violation. • Per the SLA contract, quantifying the violation in terms of an adjustments or actions per the contract. • Passing this adjustment or action on to billing or appropriate systems for remedy. • Tracking and management of open Customer SLA issues. www.iamrahuljain.in
  • 7. An Architecture for Detecting SLA Violations in Cloud Computing Infrastructures www.iamrahuljain.in
  • 10. Each FoSII service implements three interfaces: (i) negotiation interface necessary for the establishment of SLA agreements. www.iamrahuljain.in
  • 11. (ii) application management interface necessary to start the application, upload data, and perform similar management actions. www.iamrahuljain.in
  • 12. (iii) self- management interface necessary to devise actions in order to prevent SLA violations. www.iamrahuljain.in
  • 13. Working Of FoSII Infra • The self-management interface is implemented by each Cloud service and specifies operations for sensing changes of the desired state and for reacting to those changes. www.iamrahuljain.in
  • 14. Working Of FoSII Infra • The host monitor sensors continuously monitor the infrastructure resource metrics and provide the autonomic manager with the current resource status. www.iamrahuljain.in
  • 15. Working Of FoSII Infra • The runtime monitor sensors sense future SLA violation threats based on resource usage experiences and predefined threat thresholds. www.iamrahuljain.in
  • 16. Finally.. • Logically, FoSII infrastructure consists of multiple components working together to achieve a common goal. • In this architecture we focus on the knowledge management component and the LoM2HiS framework since they are responsible for system monitoring and detection of SLA violations. www.iamrahuljain.in
  • 17. Combining multi-agent systems and MDE approach for monitoring SLA violations in the Cloud Computing www.iamrahuljain.in
  • 18. Multi-agent systems (MASs) in order to monitor SLA violations in real-time. www.iamrahuljain.in
  • 19. Multi Agent Systems • MASs are suitable tools for self-detection of failures and self- monitoring of cloud operations and services, QoS negotiation and SLA management. www.iamrahuljain.in
  • 20. Multi Agent Systems •They are designed to operate in a dynamically changing environment. www.iamrahuljain.in
  • 21. Multi Agent Systems • Our main motivation is firstly to use MDE technology for the creation of the SLA contract and then to integrate MASs in order to control the quality of service contract and guarantee transparency and symmetry with respect to the SLA contract between prospective signatories www.iamrahuljain.in
  • 23. Multi-agent systems and MDE approach www.iamrahuljain.in
  • 24. Take A Easy Note: • A Service Level Agreement (SLA) is a legal contract between parties to ensure the Quality of Service (QoS). • A Service Level Agreement (SLA) is a legal contract between parties to ensure the Quality of Service (QoS). www.iamrahuljain.in
  • 25. Is There Any Guarantee..?? •However, It becomes hard to guarantee QoS levels and detect SLA violations. Therefore, we propose to use MDE (Model Driven Engineering) to express the SLA contract requirements. www.iamrahuljain.in
  • 26. • That MDE created with a specific modelling language (DSML), will be used harmonically with a Multi-agent systems (MASs) in order to monitor SLA violations in real-time www.iamrahuljain.in
  • 27. Multi-agent systems and MDE approach for monitoring SLA violations www.iamrahuljain.in
  • 28. Autonomous SLA violation monitoring and filtering www.iamrahuljain.in
  • 29. Autonomous SLA violation monitoring and filtering www.iamrahuljain.in