Escolar Documentos
Profissional Documentos
Cultura Documentos
Thijs Metsch
Nextworks
Via Livornese 1027,
56122 Pisa, Italy
g.landi@nextworks.it
Intel GmbH
Dornacher Strasse 1
85622 Feldkirchen/Muenchen, Deutschland
thijs.metsch@intel.com
Julius Mueller
Senior Researcher
Chair Next Generation Networks
Technical University Berlin
julius.mueller@tu-berlin.de
Andy Edmonds
Italtel Spa,
Via Reiss Romoli,
20019 Settimo Milanese (MI) - Italy
paolosecondo.crosta@italtel.com
I.
INTRODUCTION
customer and provider for the MCN services. Each SLA entry
includes information about the Service Level Objectives
(SLOs) defined for the given service and reports the occurred
SLA violations or service performance degradations.
The SLA enforcement is initially applied during the
provisioning of each service instance and is continuously
guaranteed during the service execution. In this phase,
proactive procedures verify the service performances for in
advance prediction of potential SLA violations in order to
trigger an automated service scaling. This aspect is strictly
related to the SLA verification, which evaluates the service
performance to verify the consistency with the specific SLOs.
This verification is based on monitoring measurements
retrieved from the MCN monitoring service (see section IIIC), elaborated to detect any SLA breach occurred during the
service runtime. SLA violations are stored in the SLA
repository and immediately reported to the Rating, Charging
and Billing (RCB) service.
SLA enforcement during the on-demand service
provisioning is based on a top-down SLA propagation model,
where the overall metrics are decomposed and translated on
the technical characteristics of each component. On the other
hand, SLA verification (i.e. monitoring and re-enforcement
through continuous validation and close-loop feedbacks) are
managed through a distributed approach, with lightweight
SLA agents interacting with the monitoring service for each
service component.
A. SLA Management System Architecture
Fig. 4 provides the FMC (Fundamental Modeling Concept)
representation of the internal architecture of the SLA
Management System (dark grey boxes). The picture shows
also the interaction with the external components of the MCN
architecture (see section II) and other support services, like
Monitoring and Rating, Charging and Billing.
SM
instance
SO
instance
SLA Repository
Collector
Aggregator
SLA Rules
Engine
Feedback
Manager
CC
instance
MCN Service
Per-atomic-service
distributed SLA Agents
Monitoring
Service
Instance
RCB Service
Instace
[2]
Fig. 9. Customers Using Service Level Assured *aaS.
[3]
[4]
[5]
[6]
[7]
[8]
[9]
D. Kyriazis - Cloud Computing Service Level Agreements Exploitation of Research Results, European Commission Directorate
General Communications Networks, Content and Technology Unit E2 Software And Services, Cloud, June 2013
F. Blumel, T. Metsch, A. Papaspyrou, A Restful Approach to Service
Level Agreements for Cloud Environments, 9th IEEE International
Conference Dependable, Autonomic and Secure Computing (DASC),
December 2011