Beruflich Dokumente
Kultur Dokumente
N.Sasikaladevi Dr.L.Arockiam
Lecturer, Associate Professor,
Department of Computer Applications, Department of Computer Science,
Bishop Heber College, St,Joseph’s College,
sasikalade@yahoo.com larockiam@yahoo.co.in
A Web Service is a software interface that A software agent in the Web services
describes a collection of operations that can be architecture can act in one or multiple roles, acting as
accessed over the network through standardized requester or provider only, both requester and
XML messaging. It uses protocols based on the XML provider, or as requester, provider, and discovery
language to describe an operation to execute or data agency. A service is invoked after the description is
to exchange with another Web service. The basic found, since the service description is required to
Web services architecture defines an interaction establish a binding. Service requestor and service
between software agents as an exchange of messages provider interact, based on the service's description
between service requesters and service providers. information published by the provider and
Requesters are software agents that request the discovered by the requester through some form of
execution of a service. Providers are software agents discovery agency.
that provide a service. Agents can be both service A web service is characterized by its flexibility
requesters and providers. Providers are responsible to encapsulate discrete business functionalities and
for publishing a description of the service(s) they its interoperability to support universal application
provide. Requesters must be able to find the integration. Composition of computational resources
description(s) of the services. The basic Web service and web-based services into integrated solutions is a
architecture models the interactions between three key activity to enhance offerings and allow for a
roles: the service provider, service discovery agency, smooth process from the point of view of customers.
and service requestor. The interactions involve the Such integration process has been greatly simplified
publish , find, and bind operations. These roles and with the advent of web services technology.
operations act upon the web service artifacts: the web
SLA plays a vital role in today’s e-business provider and service user. Behavior security is the
environment. SLA is an agreement between the trustworthiness of the result obtained by the web
service provider and service consumer. A service service and trustworthiness of the resource sites
level agreement is an agreement regarding the which are involved in the specific web service.
guarantees of a web service. It defines mutual Performance includes response time and throughput.
understandings and expectations of a service between Response time is the time for a service request to be
the service provider and service consumers. The satisfied. Throughput is the servicing rate of the
service guarantees are about what transactions need service provider. At last, Availability is the
to be executed and how well they should be percentage of the time that a service provider can
executed. An SLA may have the following offer services.
components:
§ Purpose - describing the reasons behind the Availability is an important metric in QoS. A
creation of the SLA service becomes unavailable to the service consumer
§ Parties - describes the parties involved in due to various reasons such as network failure,
the SLA and their respective roles (provider hardware failure, software failure or operational
and consumer). failure. Web services are implemented in distributed
§ Validity period - defines the period of time environment. Service request and service response
that the SLA will cover. This is delimited by should have traverse various intermediate sites which
start time and end time of the term. are connected through network. If any one of the
§ Scope - defines the services covered in the network link fails, then the service becomes
agreement. unavailable to the service user. Service request
§ Restrictions - defines the necessary steps to involves the use of various hardware resources in
be taken in order for the requested service servicing site. The failure of hardware makes service
levels to be provided. unavailable to the consumer. The service designed by
§ Service-level objectives - the levels of the service provider may fail because of software
service that both the users and the service bugs. Service may be unavailable due to server
providers agree on, and usually include a set failure.
of service level indicators, like availability, In this paper, we considered the availabilityof
performance and reliability. Each aspect of the server to evaluate the availability of the service.
the service level, such as availability, will Further more, numerous similar services are available
have a target level to achieve. for same task. If any one the service is unavailable,
§ Penalties - spells out what happens in case we can choose the proxy service which does the same
the service provider under-performs and is thing. In this paper, we considered the proxy service
unable to meet the objectives in the SLA. If also, to achieve the better availability result. A new
the agreement is with an external service framework model is designed for optimizing the
provider, the option of terminating the availability of the composite web service.
contract in light of unacceptable service
levels should be built in.
§ Optional services - provides for any services 2. Related Work
that are not normally required by the user,
but might be required as an exception. Subil Abraham et all described a method to
§ Exclusions - specifies what is not covered in enhance web service availability. They proposed
the SLA. architecture for highly available web services for
§ Administration - describes the processes mission critical applications. The central idea is the
created in the SLA to meet and measure its enhancement of web services by the introduction of a
objectives and defines organizational central hub to increase the availability of web
responsibility for overseeing each of those services.[1]
processes. Cotroneo et all have given a model to improve the
availability of the web service. They presented the
Qualities of Services are defined in the service
overall architecture and the evaluation of a
level objectives part of SLA. SLA guarantee a level
middleware infrastructure which provides quality-of-
of service delivered to a customer for a given price.
service differentiation among classes of
Service providers define all the aspects of the service
communication-bound processes. By
being provided. Generally QoS for web services are
communication-bound processes are the processes
security, performance and availability. Security can
whose activity is typically dominated by network
be implemented by identity security and behavior
communication, e.g. a video server. The proposed
security. Identity security is a combination of
architecture supports different classes of service,
authentication and authorization between the service
each with different quality attributes concerning the
network data delivery performance. In particular, the N i = {S i , Bij }(i ∈ [1..n ], j ∈ [0..q ]
architecture is able to provide a class of service,
namely guaranteed service class, which is suitable for S i is the primary service in the composite web
increasing the service availability for a group of service. Each node could only contain one primary
premium users, especially in overloaded servers (in service. When composite service process to a
absence of external faults).[2] particular node, it will always call the primary
QoS issues are listed out by Menasce[3]. The service first. If the primary service fails, backup
issues are, services substitute the primary service. Bij is the
• Availability is the percentage of time that a
service is operating. back up service for S ; and q is the number of
• Security properties include the existence backup service.
and type of authentication mechanisms the If q = 0 then no backup service available. If
service offers, confidentiality and data
integrity of messages exchanged, non
q ≥ 1 then back up services are available.
repudiation of requests or messages, and Structuring the composite web service is a crucial
resilience to denial-of service attacks. task. To implement the operation relationship of a
• Response time is the time a service takes to business task, we used Jorge Cardoso’s stochastic
respond to various types of requests. workflow reduction (SWR) algorithm [6]. Figure 1
Response time is a function of load illustrates four relationships; they are sequential,
intensity, which can be measured in terms of parallel, conditional, simple loop and dual loop. Each
arrival rates (such as requests per second) or node is a data assignment, exchanging an event,
number of concurrent requests. QoS takes doing an action, or executing a sub-process, applying
into account not only the average response those relationship we can compute total availability
time, but also the percentile (95th of a composite web service.
percentile, for example) of the response Composite service availability could be defined
time. as,
• Throughput is the rate at which a service {
Ac = AN i , Os }
can process requests. QoS measures can
Ac denotes the aggregate availability,
include the maximum throughput or a
function that describes how throughput AN i denotes the availability of each node and Os is
varies with load intensity [3]. the operation relationship of sub set of node set.
Availability evaluation based on the Cardoso
Magnos Martinello_and all has given the operational relationships are given below,
impacts of error recovery in web service availability.
In their work, a composite performance and
• Sequential:
availability modeling approach is considered where
various causes of service unavailability and two A = A(ti ) A(t j )
different recovery strategies are taken into account. • Parallel:
For illustration purposes, sensitivity analysis results A = A(t a ) A(tb )∏ A(ti )
are presented to show the impact on the web service i
availability of various assumptions concerning the
• Conditional:
architecture, the servers load, as well as the failure
and recovery processes [4]. A = A(t a ) A(tb )∑ pi A(ti )
i
aj
Where, η j= is the server unavailability rate
a j + bj
and p 0 j is given by,
−1
Nj
ηi j
p j = Nj!∑
0
i =0 i!( Nj − i )!
The probability that no more than N j − n j servers at
site j are down is:
Nj − nj
Nj!
Pj (n j , Nj ) = p 0 j ∑ i!( Nj − i)!η
i =0
i
j --1