Managing the End-to-End Lifecycle of Global Service Policies
نویسندگان
چکیده
Enterprise business services are often deployed over complex environments, managed by multiple service-management products. For instance, a business service may be configured as a three-tier environment with multiple services that run on different resource domains and span one or more tiers, and comprising service-management products such as workload managers, business resiliency managers, and resource arbiters. The objective policies of the enterprise business service, henceforth called Global Service Policies, determine the runtime policies used by the various management products. The lifecycle management of global service policies, including the deployment and enforcement stages, inherits the complexity of the enterprise IT environment. This paper proposes a novel framework for efficiently managing the deployment and enforcement lifecycle stages. The framework enables the complete automation of the dissemination and translation of global policies for all service managers, for a low-cost, correct policy deployment. Also, the framework enables the runtime customization of the resource arbitration based on the business value models of the current global service policies, for a high quality of policy enforcement. The proposed framework is prototyped and integrated with several IBM service-management products.
منابع مشابه
Managing Enterprise Service Level Agreement
The continued trend of globalization and technology improvement like the internet and transportation have spawned an increasing number of complex service chains that span across local, regional and national boundaries. Service level agreement (SLA) plays a crucial role in gluing service chains together. In that regard, this paper provides a complete guidance of end-to-end lifecycle management o...
متن کاملAn Architecture-Based Adaptation Framework for Soft Real-Time Applications
Real-time systems are increasingly used in dynamic changing environments with variable user needs hosting real-time applications ranging in number and nature over time. However, to the authors’ knowledge, no unified framework exists that is able to cope with those competing real-time concerns across multiple real-time application domains. This paper proposes an architecture-based framework for ...
متن کاملBotOnus: an online unsupervised method for Botnet detection
Botnets are recognized as one of the most dangerous threats to the Internet infrastructure. They are used for malicious activities such as launching distributed denial of service attacks, sending spam, and leaking personal information. Existing botnet detection methods produce a number of good ideas, but they are far from complete yet, since most of them cannot detect botnets in an early stage ...
متن کاملEffective Business Process Outsourcing: The Prosero Approach
The convergence between business process modeling and the service-oriented architecture has created a significant opportunity for Information Technology (IT) system integrators: they can offer effective business process outsourcing for Small Medium Enterprises (SME)s that often cannot afford the cost of designing, provisioning, and operating their own software service bus. In this paper, we pre...
متن کاملMapping Service-Level Agreements in Distributed Applications
In a previous column, I discussed how to build distributed systems from quality-of-service (QoS)-aware software components.1 I also described a design by which individual components can engage in QoS negotiation and perform admission control so that new incoming requests don’t violate committed QoS requirements.2 But what happens in a distributed application made up of several QoS-aware compone...
متن کامل