SlideShare uma empresa Scribd logo
1 de 31
Baixar para ler offline
S-Cube Learning Package

            Service Level Agreements:
   Preventing SLA Violations in Service
Compositions Using Aspect-Based Fragment
               Substitution


  TU Wien (TUW), University of Stuttgart (USTUTT)


           Branimir Wetzstein, USTUTT


                  www.s-cube-network.eu
Learning Package Categorization


                         S-Cube


                 Adaptable Coordinated
                  Service Compositions


               Adaptable and QoS-aware
                 Service Compositions


    Preventing SLA Violations in Service Compositions
        Using Aspect-Based Fragment Substitution
Learning Package Overview



 Problem Description
 Aspect-based Fragment Substitution
 Discussion
 Conclusions




                                       © Philipp Leitner
Let’s Consider a Scenario (1)




 Assume you are a provider of a composite service
 Commercial customers order products via a Web service
  interface
 Your process checks an internal stock, orders some missing
  parts, and assembles the product




                                                     © Philipp Leitner
Let’s Consider a Scenario (2)

 (Of course) there are contractual obligations
   – Delivery in time
   – Availability of your service
   – Product quality


 These can be formulated using Service Level Agreements
   – Note: in this context not necessarily
     WSLA style machine processable
     SLAs – can also be just regular
     contracts




                                                  © Philipp Leitner
Let’s Consider a Scenario (3)

 As a provider, you want to receive timely notifications if these
  obligations are likely to be violated
   – Usually there are penalties to be paid if contractual obligations are
     (repeatedly) violated
   – Even if this is not the case, customer satisfaction will suffer and
     existing customers may terminate their contracts



 Based on these notifications …
                                                                     !
                                                          [ v yi g
                                                          e rt n
                                                            eh
    – … countermeasures can be taken (i.e.,
                                   Re
                                   eie
                                    cv          Sc
                                                 et
                                                 l
                                                 e
                                                          a iae
                                                            vl b]
                                                            a l
                                                                         G a e Cre
                                                                         e y n
                                                                          tPm
                                                                           Ps
                                                                           rf
                                                                            e
                                                                              t  hg
                                                                                 a
                                                                                Ct m
                                                                                uoe
                                                                                 s r


      adaptations can be triggered)Or
                                    re
                                    d           Sp r
                                                u le
                                                 pi


                                         Cc
                                         hk
                                          e
                                                          O r rm
                                                          re o
                                                           dF
                                         Sk
                                         tc
                                          o     [ ou le
                                                ns p r
                                                    pi                     S Or
                                                                           h re
                                                                            i
                                                                            p d
                                                          Sp r
                                                          u le
                                                           pi 1
                                                 a iae
                                                  vl b]
                                                   a l


                                                          O r rm
                                                          re o
                                                           dF
                                                          Sp r
                                                          u le
                                                           pi 2



                                                          Cc O r
                                                          a e re
                                                           nl d

                                                                     © Philipp Leitner
Let’s Consider a Scenario (4)
 After an SLO violation is predicted for a process instance, the goal is to adapt the
  process instance in order to prevent the violation
 Different types of adaptation actions:
     Data Manipulation, Service Rebinding (in composition)
     Environmental (adapt hosting environment)

     Structural adaptation
      (change structure of composition)


 Idea:
     The provider can pre-model a set of alternative process fragments (process
      variants) with different QoS characteristics
     The best possible alternative(s) is then selected and executed at runtime
      based on SLO prediction
Learning Package Overview



 Problem Description
 Aspect-Based Fragment Substitution
 Discussion
 Conclusions




                                       © Philipp Leitner
Approach: SLA Violation Prevention via
Fragment Substitution
1. Define Checkpoints in the service composition
2. Use Machine Learning techniques to generate predictions for service
   level objectives (SLOs) at a check point
3. Adapt service composition by substituting alternative fragments which
   likely can prevent the predicted SLO violation
Background:
Related Approaches in S-Cube

 This S-Cube approach uses the techniques presented in the
  following S-Cube Learning Package
    Runtime Prediction of SLA Violations Based on Service Event Logs

 See also:
   Leitner, Wetzstein, Rosenberg, Michlmayr, Dustdar, and Leymann. Runtime Prediction of Service Level
   Agreement Violations for Composite Services. In Proceedings of the 2009 International conference on
   Service-Oriented Computing (ICSOC/ServiceWave'09), Springer-Verlag, Berlin, Heidelberg, 176-186.


   Leitner, Michlmayr, Rosenberg, and Dustdar. Monitoring, Prediction and Prevention of SLA Violations in
   Composite Services. In Proceedings of the 2010 IEEE International Conference on Web Services (ICWS '10).
   IEEE Computer Society, Washington, DC, USA, 369-376.
Background:
Runtime Prediction of SLA Violations
 Goal: predict the value of a process metric (which is the basis of an SLO) while the process
  instance is still running
 The prediction model is created using machine learning regression techniques (artificial
  neural networks) based on historical process instances


                   Order      Product     Supplier     In             SLO
                                                              …
                    ID         Type       Delivery   Stock            Value
                                                                                                 Art. Neural
                                                                                                  Network
                     1       Bike TourX     28 h      No      …       96 h
                                                                                  Machine
 Monitoring                                                                       Learning
 Database            2        Bike RX        -       Yes      …       48 h

                     …          …            …        …       …




 At predefined checkpoints, both measured and estimated facts are used as input to the
  prediction model (which provides a predicted numerical value as output)

                                                                              Art. Neural
  Check              Order     Product    Supplier      In                                   Predicted
                                                                  …            Network
  point               ID        Type      Delivery    Stock                                    SLO

                     7101        Book       28 h        No        …                            72 h
Aspect-based Fragment Substitution (1)
Aspect-based Fragment Substitution (2)
 Aspect-Oriented Programming (AOP) terminology
   – Cross-cutting concerns are implemented using loosely-coupled program fragments
     (advices)
   – During weaving, advices are inserted directly into the program code of target
     applications at well-defined join points
   – Decision of whether to insert a given advice: pointcut

 At design time:
   – A set of fragments (= advices) is created which can be used as alternative
     implementations of parts of business logic in the target composition
   – Fragments are standalone (typically “incomplete”) compositions focusing on a certain
     part of business logic and are linked into the original composition via join points
   – A fragment definition also contains an impact model which defines how this fragment
     affects composition performance metrics

 At runtime:
    A predicted SLA violation at a check point triggers the adaptation
    A set of adaptation alternatives is identified based on impact models; the selected
     alternative is weaved into the target composition
Linking of Fragments and Weaving (1)
 Design Time: Linking of fragments into the target composition
     Defines the join points in the execution where control flow changes from the
      target composition to the fragment or vice versa
     Join Points: START, END, TRANSPARENT (virtual activities)
Linking of Fragments and Weaving (2)
 Runtime: Selection and Weaving of fragments into the target composition
    After SLO Prediction… selection of one or more fragments based on their
     impact models
    Dynamic weaving of new fragment logic into the running composition instance
Generic Fragments
 Generic Fragments:
    Fragments consisting only of virtual activities
    Instantiated via linking
    Used for recurring domain-independent adaptation actions such as removal,
     reordering, or parallelizing of activities
Selection of Fragments
  How do we determine which fragments will likely prevent the
   predicted violation?
  Main idea: impact models
    – Describe the impact that every fragment has on the metrics that are
      used to generate predictions of violations
    – Can be created using e.g., SLAs, data mining, QoS aggregation, …
    –  repeat prediction as if adaptation has taken place

    Order   Product    Supplier       In
                                                 …                 Predicted
     ID      Type      Delivery     Stock
                                                                     SLO
    7101      Book       48 h         No         …                    72 h
                                                     Artificial
                                                      Neural
                                                     Network
                                Impact Clauses
                                                                             Adaptation Impact


     Order   Product   Supplier        In
    Order   Product   Supplier       In       …                       Predicted
       ID
   Order       Type
           Product      Delivery
                     Supplier       Stock
                                   In        …                      Predicted
      ID      Type    Delivery    Stock     …                          SLO after
                                                                  Predicted
    ID      Type     Delivery    Stock                               SLO after
                                                                      adaptation
                                                                   SLO after
      7101     Book       32 h        No      …                     adaptation
    7101      Book      32 h        No       …                    adaptation
   7101     Book       32 h       No        …
                                                                          56 h
                                                                        56 h
                                                                       56 h
Architectural Overview (1)
Architectural Overview (2)

1. Define SLAs (SLA DB) and a set of alternative fragments
   (Advice DB)
2. Train a Prediction Model for each Checkpoint and use it at
   runtime for prediction at a check point (Violation Predictor)
3. Select an optimal set of fragments based on their impact
   models and the SLO prediction (Advice Selector)
4. Weave the selection into the
   composition instance and resume
   process execution (Advice Weaver)
VRESCo Open Source Implementation

 The prototype used to do these experiments has been
  developed as part of the VRESCo project
   – Can be downloaded from Sourceforge



 The Sourceforge package also includes the assembling case
  study
   – However, setup is not very user-friendly
   – Get in touch with us if interested in reproducing the case study



 Uses WEKA Machine Learning toolkit to implement the actual
  prediction algorithms

                                                                 © Philipp Leitner
Learning Package Overview



 Problem Description
 Aspect-Based Fragment Substitution
 Discussion
 Conclusions




                                       © Philipp Leitner
Overall Performance Impact on Process
Execution Time (1)
Overall Performance Impact on Process
Execution Time (1)
 Online weaved compositions exhibit very little overhead as
  compared to statically defined compositions
 Overhead consists of time necessary to…
   – select the fragments
   – implement the actual weaving (largest impact)
   – to suspend and unsuspend
     the composition
Weaving Time (1)
Weaving Time (2)

 Weaving time is relatively constant in [45 : 80] ms, even for
  large fragments (more than 80 activities)
   This should be fast enough for most applications

 As expected…
   –Concrete activities are faster
   to weave than transparent
   activities
   –Offline weaving is faster than
   online weaving
Discussion - Advantages



 Runtime Fragment Substitution based on SLA Predictions has
  a number of clear advantages …
   – Coverage of many adaptation patterns – insertion, deleting, moving,
     replacement of fragments, parallelizing of activities, etc.
   – Flexibility – the set of available alternative fragments can be altered
     (i.e., new fragments can be created or existing ones removed) after
     the process has been deployed during process runtime
   – Efficiency – even though training of the machine learning models takes
     some time, generating predictions and the adaptation are very fast
Discussion - Disadvantages



 … but of course the approach also has some disadvantages.

   – Bootstrapping problem – the approach assumes that some recorded
     historical event logs are available for training of the prediction model
   – Necessary monitoring – in order to know later which fragments have
     been executed for a process instance
   – Necessary domain knowledge – in order to define checkpoints and the
     fragments and their impact models some domain knowledge is
     necessary
Learning Package Overview



 Problem Description
 Aspect-Based Fragment Substitution
 Discussion
 Conclusions




                                       © Philipp Leitner
Summary

 Machine learning based techniques can be used to predict
  SLA Violations in service compositions at runtime
 Based on these predictions, runtime fragment substitution can
  be used for preventing the SLA violation
 Steps:
   1. Define a checkpoint in the composition and train a machine learning
      model from historical event log
   2. Whenever a composition instance passes the checkpoint, use the
      monitored data of the instance as input for the machine learning
      based prediction
   3. Based on the available fragment alternatives, select and substitute
      one or more fragments which likely can prevent the predicted
      violation
Further S-Cube Reading

Leitner, Philipp; Wetzstein, Branimir; Karastoyanova, Dimka; Hummer, Waldemar; Dustdar, Schahram;
Leymann, Frank: Preventing SLA Violations in Service Compositions Using Aspect-Based Fragment
Substitution. In: Proceedings of the 8th International Conference on Service Oriented Computing (ICSOC
2010).

Leitner, Michlmayr, Rosenberg, and Dustdar. Monitoring, Prediction and Prevention of SLA Violations in
Composite Services. In Proceedings of the 2010 IEEE International Conference on Web Services (ICWS '10).
IEEE Computer Society, Washington, DC, USA, 369-376.

Leitner, Wetzstein, Rosenberg, Michlmayr, Dustdar, and Leymann. Runtime Prediction of Service Level
Agreement Violations for Composite Services. In Proceedings of the 2009 International conference on
Service-Oriented Computing (ICSOC/ServiceWave'09), Springer-Verlag, Berlin, Heidelberg, 176-186.


Wetzstein, Leitner, Rosenberg, Brandic, Dustdar, and Leymann. Monitoring and Analyzing Influential Factors
of Business Process Performance. In Proceedings of the 13th IEEE international conference on Enterprise
Distributed Object Computing (EDOC'09). IEEE Press, Piscataway, NJ, USA, 118-127.
Acknowledgements




      The research leading to these results has
      received funding from the European
      Community’s Seventh Framework
      Programme [FP7/2007-2013] under grant
      agreement 215483 (S-Cube).




                                                  © Philipp Leitner

Mais conteúdo relacionado

Mais procurados

Mais procurados (16)

Scott findlay critical habitat and recovery
Scott findlay critical habitat and recoveryScott findlay critical habitat and recovery
Scott findlay critical habitat and recovery
 
Unit2 Gear
Unit2 GearUnit2 Gear
Unit2 Gear
 
Hit a Grand Slam with Legal Research
Hit a Grand Slam with Legal ResearchHit a Grand Slam with Legal Research
Hit a Grand Slam with Legal Research
 
Keeping the Process Alive: Data Analysis and Reinforcement for BBS
Keeping the Process Alive: Data Analysis and Reinforcement for BBSKeeping the Process Alive: Data Analysis and Reinforcement for BBS
Keeping the Process Alive: Data Analysis and Reinforcement for BBS
 
Unit6 Computer Numerical Control
Unit6 Computer Numerical ControlUnit6 Computer Numerical Control
Unit6 Computer Numerical Control
 
Unit3 Gear
Unit3 GearUnit3 Gear
Unit3 Gear
 
Unit7 Shielded Gas Arc Welding
Unit7 Shielded Gas Arc WeldingUnit7 Shielded Gas Arc Welding
Unit7 Shielded Gas Arc Welding
 
APA climate change planning presentation
APA climate change planning presentationAPA climate change planning presentation
APA climate change planning presentation
 
Storyryboa
StoryryboaStoryryboa
Storyryboa
 
Water Related Expertise In Toronto Region July09 Final
Water Related Expertise In Toronto Region   July09 FinalWater Related Expertise In Toronto Region   July09 Final
Water Related Expertise In Toronto Region July09 Final
 
Port of rotterdam
Port of rotterdamPort of rotterdam
Port of rotterdam
 
Unit1 Screw Thread
Unit1 Screw ThreadUnit1 Screw Thread
Unit1 Screw Thread
 
Drill
DrillDrill
Drill
 
Book extracts: An Enterprise Architecture Development Framework
Book extracts: An Enterprise Architecture Development FrameworkBook extracts: An Enterprise Architecture Development Framework
Book extracts: An Enterprise Architecture Development Framework
 
Developing and Assessing Teacher Effectiveness
Developing and Assessing Teacher EffectivenessDeveloping and Assessing Teacher Effectiveness
Developing and Assessing Teacher Effectiveness
 
Bohr instrument services bv total drilling information systems
Bohr instrument services bv   total drilling information systemsBohr instrument services bv   total drilling information systems
Bohr instrument services bv total drilling information systems
 

Semelhante a S-CUBE LP: Preventing SLA Violations in Service Compositions Using Aspect-Based Fragment Substitution

Tpn guideline
Tpn guidelineTpn guideline
Tpn guidelinesoftmail
 
Climate change and agriculture - what do we need to do differently?
Climate change and agriculture - what do we need to do differently?Climate change and agriculture - what do we need to do differently?
Climate change and agriculture - what do we need to do differently?elwyngj
 
Mob x con - keynote 20120402 - reduced
Mob x con - keynote 20120402 - reducedMob x con - keynote 20120402 - reduced
Mob x con - keynote 20120402 - reducedRod Farmer
 
Attributes of Magesium Stearate as a Tablet Lubricant
Attributes of Magesium Stearate as a Tablet LubricantAttributes of Magesium Stearate as a Tablet Lubricant
Attributes of Magesium Stearate as a Tablet LubricantStephenWu
 
Business Level Strategy Analysis
Business Level Strategy AnalysisBusiness Level Strategy Analysis
Business Level Strategy AnalysisSavaş Şakar
 
Corporate Social Responsibility: The Good, the Bad and the Ugly
Corporate Social Responsibility: The Good, the Bad and the UglyCorporate Social Responsibility: The Good, the Bad and the Ugly
Corporate Social Responsibility: The Good, the Bad and the UglyAdrian Moyer
 
Kelly.michael
Kelly.michaelKelly.michael
Kelly.michaelNASAPMC
 
JESS3 Portfolio
JESS3 PortfolioJESS3 Portfolio
JESS3 PortfolioJESS3
 
Usmp 8100 p-0
Usmp 8100 p-0Usmp 8100 p-0
Usmp 8100 p-0zia_7575
 
EU Rural Development Regulation No 1698/2005 and its forestry relevant measu...
EU Rural Development Regulation No 1698/2005 and its forestry relevant measu...EU Rural Development Regulation No 1698/2005 and its forestry relevant measu...
EU Rural Development Regulation No 1698/2005 and its forestry relevant measu...euraf
 

Semelhante a S-CUBE LP: Preventing SLA Violations in Service Compositions Using Aspect-Based Fragment Substitution (20)

Tpn guideline
Tpn guidelineTpn guideline
Tpn guideline
 
Developing an FTTx Ecosystem
Developing an FTTx EcosystemDeveloping an FTTx Ecosystem
Developing an FTTx Ecosystem
 
KøBenhavn
KøBenhavnKøBenhavn
KøBenhavn
 
Wii Wednesdays: King Pin
Wii Wednesdays:  King PinWii Wednesdays:  King Pin
Wii Wednesdays: King Pin
 
Climate change and agriculture - what do we need to do differently?
Climate change and agriculture - what do we need to do differently?Climate change and agriculture - what do we need to do differently?
Climate change and agriculture - what do we need to do differently?
 
Mob x con - keynote 20120402 - reduced
Mob x con - keynote 20120402 - reducedMob x con - keynote 20120402 - reduced
Mob x con - keynote 20120402 - reduced
 
Attributes of Magesium Stearate as a Tablet Lubricant
Attributes of Magesium Stearate as a Tablet LubricantAttributes of Magesium Stearate as a Tablet Lubricant
Attributes of Magesium Stearate as a Tablet Lubricant
 
Business Level Strategy Analysis
Business Level Strategy AnalysisBusiness Level Strategy Analysis
Business Level Strategy Analysis
 
Corporate Social Responsibility: The Good, the Bad and the Ugly
Corporate Social Responsibility: The Good, the Bad and the UglyCorporate Social Responsibility: The Good, the Bad and the Ugly
Corporate Social Responsibility: The Good, the Bad and the Ugly
 
Cummins b20 1000hr durability
Cummins b20 1000hr durabilityCummins b20 1000hr durability
Cummins b20 1000hr durability
 
Cummins b20 1000hr durability
Cummins b20 1000hr durabilityCummins b20 1000hr durability
Cummins b20 1000hr durability
 
Kelly.michael
Kelly.michaelKelly.michael
Kelly.michael
 
Matt Petersen, Global Green USA
Matt Petersen, Global Green USAMatt Petersen, Global Green USA
Matt Petersen, Global Green USA
 
Raw
RawRaw
Raw
 
JESS3 Deck Jan10
JESS3 Deck Jan10JESS3 Deck Jan10
JESS3 Deck Jan10
 
JESS3 Portfolio
JESS3 PortfolioJESS3 Portfolio
JESS3 Portfolio
 
Usmp 8100 p-0
Usmp 8100 p-0Usmp 8100 p-0
Usmp 8100 p-0
 
GlassFish ESB and OpenESB
GlassFish ESB and OpenESBGlassFish ESB and OpenESB
GlassFish ESB and OpenESB
 
Home design
Home designHome design
Home design
 
EU Rural Development Regulation No 1698/2005 and its forestry relevant measu...
EU Rural Development Regulation No 1698/2005 and its forestry relevant measu...EU Rural Development Regulation No 1698/2005 and its forestry relevant measu...
EU Rural Development Regulation No 1698/2005 and its forestry relevant measu...
 

Mais de virtual-campus

S-CUBE LP: Analysis Operations on SLAs: Detecting and Explaining Conflicting ...
S-CUBE LP: Analysis Operations on SLAs: Detecting and Explaining Conflicting ...S-CUBE LP: Analysis Operations on SLAs: Detecting and Explaining Conflicting ...
S-CUBE LP: Analysis Operations on SLAs: Detecting and Explaining Conflicting ...virtual-campus
 
S-CUBE LP: Chemical Modeling: Workflow Enactment based on the Chemical Metaphor
S-CUBE LP: Chemical Modeling: Workflow Enactment based on the Chemical MetaphorS-CUBE LP: Chemical Modeling: Workflow Enactment based on the Chemical Metaphor
S-CUBE LP: Chemical Modeling: Workflow Enactment based on the Chemical Metaphorvirtual-campus
 
S-CUBE LP: Quality of Service-Aware Service Composition: QoS optimization in ...
S-CUBE LP: Quality of Service-Aware Service Composition: QoS optimization in ...S-CUBE LP: Quality of Service-Aware Service Composition: QoS optimization in ...
S-CUBE LP: Quality of Service-Aware Service Composition: QoS optimization in ...virtual-campus
 
S-CUBE LP: The Chemical Computing model and HOCL Programming
S-CUBE LP: The Chemical Computing model and HOCL ProgrammingS-CUBE LP: The Chemical Computing model and HOCL Programming
S-CUBE LP: The Chemical Computing model and HOCL Programmingvirtual-campus
 
S-CUBE LP: Executing the HOCL: Concept of a Chemical Interpreter
S-CUBE LP: Executing the HOCL: Concept of a Chemical InterpreterS-CUBE LP: Executing the HOCL: Concept of a Chemical Interpreter
S-CUBE LP: Executing the HOCL: Concept of a Chemical Interpretervirtual-campus
 
S-CUBE LP: SLA-based Service Virtualization in distributed, heterogenious env...
S-CUBE LP: SLA-based Service Virtualization in distributed, heterogenious env...S-CUBE LP: SLA-based Service Virtualization in distributed, heterogenious env...
S-CUBE LP: SLA-based Service Virtualization in distributed, heterogenious env...virtual-campus
 
S-CUBE LP: Service Discovery and Task Models
S-CUBE LP: Service Discovery and Task ModelsS-CUBE LP: Service Discovery and Task Models
S-CUBE LP: Service Discovery and Task Modelsvirtual-campus
 
S-CUBE LP: Impact of SBA design on Global Software Development
S-CUBE LP: Impact of SBA design on Global Software DevelopmentS-CUBE LP: Impact of SBA design on Global Software Development
S-CUBE LP: Impact of SBA design on Global Software Developmentvirtual-campus
 
S-CUBE LP: Techniques for design for adaptation
S-CUBE LP: Techniques for design for adaptationS-CUBE LP: Techniques for design for adaptation
S-CUBE LP: Techniques for design for adaptationvirtual-campus
 
S-CUBE LP: Self-healing in Mixed Service-oriented Systems
S-CUBE LP: Self-healing in Mixed Service-oriented SystemsS-CUBE LP: Self-healing in Mixed Service-oriented Systems
S-CUBE LP: Self-healing in Mixed Service-oriented Systemsvirtual-campus
 
S-CUBE LP: Analyzing and Adapting Business Processes based on Ecologically-aw...
S-CUBE LP: Analyzing and Adapting Business Processes based on Ecologically-aw...S-CUBE LP: Analyzing and Adapting Business Processes based on Ecologically-aw...
S-CUBE LP: Analyzing and Adapting Business Processes based on Ecologically-aw...virtual-campus
 
S-CUBE LP: Analyzing Business Process Performance Using KPI Dependency Analysis
S-CUBE LP: Analyzing Business Process Performance Using KPI Dependency AnalysisS-CUBE LP: Analyzing Business Process Performance Using KPI Dependency Analysis
S-CUBE LP: Analyzing Business Process Performance Using KPI Dependency Analysisvirtual-campus
 
S-CUBE LP: Process Performance Monitoring in Service Compositions
S-CUBE LP: Process Performance Monitoring in Service CompositionsS-CUBE LP: Process Performance Monitoring in Service Compositions
S-CUBE LP: Process Performance Monitoring in Service Compositionsvirtual-campus
 
S-CUBE LP: Service Level Agreement based Service infrastructures in the conte...
S-CUBE LP: Service Level Agreement based Service infrastructures in the conte...S-CUBE LP: Service Level Agreement based Service infrastructures in the conte...
S-CUBE LP: Service Level Agreement based Service infrastructures in the conte...virtual-campus
 
S-CUBE LP: Runtime Prediction of SLA Violations Based on Service Event Logs
S-CUBE LP: Runtime Prediction of SLA Violations Based on Service Event LogsS-CUBE LP: Runtime Prediction of SLA Violations Based on Service Event Logs
S-CUBE LP: Runtime Prediction of SLA Violations Based on Service Event Logsvirtual-campus
 
S-CUBE LP: Proactive SLA Negotiation
S-CUBE LP: Proactive SLA NegotiationS-CUBE LP: Proactive SLA Negotiation
S-CUBE LP: Proactive SLA Negotiationvirtual-campus
 
S-CUBE LP: A Soft-Constraint Based Approach to QoS-Aware Service Selection
S-CUBE LP: A Soft-Constraint Based Approach to QoS-Aware Service SelectionS-CUBE LP: A Soft-Constraint Based Approach to QoS-Aware Service Selection
S-CUBE LP: A Soft-Constraint Based Approach to QoS-Aware Service Selectionvirtual-campus
 
S-CUBE LP: Variability Modeling and QoS Analysis of Web Services Orchestrations
S-CUBE LP: Variability Modeling and QoS Analysis of Web Services OrchestrationsS-CUBE LP: Variability Modeling and QoS Analysis of Web Services Orchestrations
S-CUBE LP: Variability Modeling and QoS Analysis of Web Services Orchestrationsvirtual-campus
 
S-CUBE LP: Run-time Verification for Preventive Adaptation
S-CUBE LP: Run-time Verification for Preventive AdaptationS-CUBE LP: Run-time Verification for Preventive Adaptation
S-CUBE LP: Run-time Verification for Preventive Adaptationvirtual-campus
 
S-CUBE LP: Online Testing for Proactive Adaptation
S-CUBE LP: Online Testing for Proactive AdaptationS-CUBE LP: Online Testing for Proactive Adaptation
S-CUBE LP: Online Testing for Proactive Adaptationvirtual-campus
 

Mais de virtual-campus (20)

S-CUBE LP: Analysis Operations on SLAs: Detecting and Explaining Conflicting ...
S-CUBE LP: Analysis Operations on SLAs: Detecting and Explaining Conflicting ...S-CUBE LP: Analysis Operations on SLAs: Detecting and Explaining Conflicting ...
S-CUBE LP: Analysis Operations on SLAs: Detecting and Explaining Conflicting ...
 
S-CUBE LP: Chemical Modeling: Workflow Enactment based on the Chemical Metaphor
S-CUBE LP: Chemical Modeling: Workflow Enactment based on the Chemical MetaphorS-CUBE LP: Chemical Modeling: Workflow Enactment based on the Chemical Metaphor
S-CUBE LP: Chemical Modeling: Workflow Enactment based on the Chemical Metaphor
 
S-CUBE LP: Quality of Service-Aware Service Composition: QoS optimization in ...
S-CUBE LP: Quality of Service-Aware Service Composition: QoS optimization in ...S-CUBE LP: Quality of Service-Aware Service Composition: QoS optimization in ...
S-CUBE LP: Quality of Service-Aware Service Composition: QoS optimization in ...
 
S-CUBE LP: The Chemical Computing model and HOCL Programming
S-CUBE LP: The Chemical Computing model and HOCL ProgrammingS-CUBE LP: The Chemical Computing model and HOCL Programming
S-CUBE LP: The Chemical Computing model and HOCL Programming
 
S-CUBE LP: Executing the HOCL: Concept of a Chemical Interpreter
S-CUBE LP: Executing the HOCL: Concept of a Chemical InterpreterS-CUBE LP: Executing the HOCL: Concept of a Chemical Interpreter
S-CUBE LP: Executing the HOCL: Concept of a Chemical Interpreter
 
S-CUBE LP: SLA-based Service Virtualization in distributed, heterogenious env...
S-CUBE LP: SLA-based Service Virtualization in distributed, heterogenious env...S-CUBE LP: SLA-based Service Virtualization in distributed, heterogenious env...
S-CUBE LP: SLA-based Service Virtualization in distributed, heterogenious env...
 
S-CUBE LP: Service Discovery and Task Models
S-CUBE LP: Service Discovery and Task ModelsS-CUBE LP: Service Discovery and Task Models
S-CUBE LP: Service Discovery and Task Models
 
S-CUBE LP: Impact of SBA design on Global Software Development
S-CUBE LP: Impact of SBA design on Global Software DevelopmentS-CUBE LP: Impact of SBA design on Global Software Development
S-CUBE LP: Impact of SBA design on Global Software Development
 
S-CUBE LP: Techniques for design for adaptation
S-CUBE LP: Techniques for design for adaptationS-CUBE LP: Techniques for design for adaptation
S-CUBE LP: Techniques for design for adaptation
 
S-CUBE LP: Self-healing in Mixed Service-oriented Systems
S-CUBE LP: Self-healing in Mixed Service-oriented SystemsS-CUBE LP: Self-healing in Mixed Service-oriented Systems
S-CUBE LP: Self-healing in Mixed Service-oriented Systems
 
S-CUBE LP: Analyzing and Adapting Business Processes based on Ecologically-aw...
S-CUBE LP: Analyzing and Adapting Business Processes based on Ecologically-aw...S-CUBE LP: Analyzing and Adapting Business Processes based on Ecologically-aw...
S-CUBE LP: Analyzing and Adapting Business Processes based on Ecologically-aw...
 
S-CUBE LP: Analyzing Business Process Performance Using KPI Dependency Analysis
S-CUBE LP: Analyzing Business Process Performance Using KPI Dependency AnalysisS-CUBE LP: Analyzing Business Process Performance Using KPI Dependency Analysis
S-CUBE LP: Analyzing Business Process Performance Using KPI Dependency Analysis
 
S-CUBE LP: Process Performance Monitoring in Service Compositions
S-CUBE LP: Process Performance Monitoring in Service CompositionsS-CUBE LP: Process Performance Monitoring in Service Compositions
S-CUBE LP: Process Performance Monitoring in Service Compositions
 
S-CUBE LP: Service Level Agreement based Service infrastructures in the conte...
S-CUBE LP: Service Level Agreement based Service infrastructures in the conte...S-CUBE LP: Service Level Agreement based Service infrastructures in the conte...
S-CUBE LP: Service Level Agreement based Service infrastructures in the conte...
 
S-CUBE LP: Runtime Prediction of SLA Violations Based on Service Event Logs
S-CUBE LP: Runtime Prediction of SLA Violations Based on Service Event LogsS-CUBE LP: Runtime Prediction of SLA Violations Based on Service Event Logs
S-CUBE LP: Runtime Prediction of SLA Violations Based on Service Event Logs
 
S-CUBE LP: Proactive SLA Negotiation
S-CUBE LP: Proactive SLA NegotiationS-CUBE LP: Proactive SLA Negotiation
S-CUBE LP: Proactive SLA Negotiation
 
S-CUBE LP: A Soft-Constraint Based Approach to QoS-Aware Service Selection
S-CUBE LP: A Soft-Constraint Based Approach to QoS-Aware Service SelectionS-CUBE LP: A Soft-Constraint Based Approach to QoS-Aware Service Selection
S-CUBE LP: A Soft-Constraint Based Approach to QoS-Aware Service Selection
 
S-CUBE LP: Variability Modeling and QoS Analysis of Web Services Orchestrations
S-CUBE LP: Variability Modeling and QoS Analysis of Web Services OrchestrationsS-CUBE LP: Variability Modeling and QoS Analysis of Web Services Orchestrations
S-CUBE LP: Variability Modeling and QoS Analysis of Web Services Orchestrations
 
S-CUBE LP: Run-time Verification for Preventive Adaptation
S-CUBE LP: Run-time Verification for Preventive AdaptationS-CUBE LP: Run-time Verification for Preventive Adaptation
S-CUBE LP: Run-time Verification for Preventive Adaptation
 
S-CUBE LP: Online Testing for Proactive Adaptation
S-CUBE LP: Online Testing for Proactive AdaptationS-CUBE LP: Online Testing for Proactive Adaptation
S-CUBE LP: Online Testing for Proactive Adaptation
 

Último

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Último (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

S-CUBE LP: Preventing SLA Violations in Service Compositions Using Aspect-Based Fragment Substitution

  • 1. S-Cube Learning Package Service Level Agreements: Preventing SLA Violations in Service Compositions Using Aspect-Based Fragment Substitution TU Wien (TUW), University of Stuttgart (USTUTT) Branimir Wetzstein, USTUTT www.s-cube-network.eu
  • 2. Learning Package Categorization S-Cube Adaptable Coordinated Service Compositions Adaptable and QoS-aware Service Compositions Preventing SLA Violations in Service Compositions Using Aspect-Based Fragment Substitution
  • 3. Learning Package Overview  Problem Description  Aspect-based Fragment Substitution  Discussion  Conclusions © Philipp Leitner
  • 4. Let’s Consider a Scenario (1)  Assume you are a provider of a composite service  Commercial customers order products via a Web service interface  Your process checks an internal stock, orders some missing parts, and assembles the product © Philipp Leitner
  • 5. Let’s Consider a Scenario (2)  (Of course) there are contractual obligations – Delivery in time – Availability of your service – Product quality  These can be formulated using Service Level Agreements – Note: in this context not necessarily WSLA style machine processable SLAs – can also be just regular contracts © Philipp Leitner
  • 6. Let’s Consider a Scenario (3)  As a provider, you want to receive timely notifications if these obligations are likely to be violated – Usually there are penalties to be paid if contractual obligations are (repeatedly) violated – Even if this is not the case, customer satisfaction will suffer and existing customers may terminate their contracts  Based on these notifications … ! [ v yi g e rt n eh – … countermeasures can be taken (i.e., Re eie cv Sc et l e a iae vl b] a l G a e Cre e y n tPm Ps rf e t hg a Ct m uoe s r adaptations can be triggered)Or re d Sp r u le pi Cc hk e O r rm re o dF Sk tc o [ ou le ns p r pi S Or h re i p d Sp r u le pi 1 a iae vl b] a l O r rm re o dF Sp r u le pi 2 Cc O r a e re nl d © Philipp Leitner
  • 7. Let’s Consider a Scenario (4)  After an SLO violation is predicted for a process instance, the goal is to adapt the process instance in order to prevent the violation  Different types of adaptation actions:  Data Manipulation, Service Rebinding (in composition)  Environmental (adapt hosting environment)  Structural adaptation (change structure of composition)  Idea:  The provider can pre-model a set of alternative process fragments (process variants) with different QoS characteristics  The best possible alternative(s) is then selected and executed at runtime based on SLO prediction
  • 8. Learning Package Overview  Problem Description  Aspect-Based Fragment Substitution  Discussion  Conclusions © Philipp Leitner
  • 9. Approach: SLA Violation Prevention via Fragment Substitution 1. Define Checkpoints in the service composition 2. Use Machine Learning techniques to generate predictions for service level objectives (SLOs) at a check point 3. Adapt service composition by substituting alternative fragments which likely can prevent the predicted SLO violation
  • 10. Background: Related Approaches in S-Cube  This S-Cube approach uses the techniques presented in the following S-Cube Learning Package  Runtime Prediction of SLA Violations Based on Service Event Logs  See also: Leitner, Wetzstein, Rosenberg, Michlmayr, Dustdar, and Leymann. Runtime Prediction of Service Level Agreement Violations for Composite Services. In Proceedings of the 2009 International conference on Service-Oriented Computing (ICSOC/ServiceWave'09), Springer-Verlag, Berlin, Heidelberg, 176-186. Leitner, Michlmayr, Rosenberg, and Dustdar. Monitoring, Prediction and Prevention of SLA Violations in Composite Services. In Proceedings of the 2010 IEEE International Conference on Web Services (ICWS '10). IEEE Computer Society, Washington, DC, USA, 369-376.
  • 11. Background: Runtime Prediction of SLA Violations  Goal: predict the value of a process metric (which is the basis of an SLO) while the process instance is still running  The prediction model is created using machine learning regression techniques (artificial neural networks) based on historical process instances Order Product Supplier In SLO … ID Type Delivery Stock Value Art. Neural Network 1 Bike TourX 28 h No … 96 h Machine Monitoring Learning Database 2 Bike RX - Yes … 48 h … … … … …  At predefined checkpoints, both measured and estimated facts are used as input to the prediction model (which provides a predicted numerical value as output) Art. Neural Check Order Product Supplier In Predicted … Network point ID Type Delivery Stock SLO 7101 Book 28 h No … 72 h
  • 13. Aspect-based Fragment Substitution (2)  Aspect-Oriented Programming (AOP) terminology – Cross-cutting concerns are implemented using loosely-coupled program fragments (advices) – During weaving, advices are inserted directly into the program code of target applications at well-defined join points – Decision of whether to insert a given advice: pointcut  At design time: – A set of fragments (= advices) is created which can be used as alternative implementations of parts of business logic in the target composition – Fragments are standalone (typically “incomplete”) compositions focusing on a certain part of business logic and are linked into the original composition via join points – A fragment definition also contains an impact model which defines how this fragment affects composition performance metrics  At runtime:  A predicted SLA violation at a check point triggers the adaptation  A set of adaptation alternatives is identified based on impact models; the selected alternative is weaved into the target composition
  • 14. Linking of Fragments and Weaving (1)  Design Time: Linking of fragments into the target composition  Defines the join points in the execution where control flow changes from the target composition to the fragment or vice versa  Join Points: START, END, TRANSPARENT (virtual activities)
  • 15. Linking of Fragments and Weaving (2)  Runtime: Selection and Weaving of fragments into the target composition  After SLO Prediction… selection of one or more fragments based on their impact models  Dynamic weaving of new fragment logic into the running composition instance
  • 16. Generic Fragments  Generic Fragments:  Fragments consisting only of virtual activities  Instantiated via linking  Used for recurring domain-independent adaptation actions such as removal, reordering, or parallelizing of activities
  • 17. Selection of Fragments  How do we determine which fragments will likely prevent the predicted violation?  Main idea: impact models – Describe the impact that every fragment has on the metrics that are used to generate predictions of violations – Can be created using e.g., SLAs, data mining, QoS aggregation, … –  repeat prediction as if adaptation has taken place Order Product Supplier In … Predicted ID Type Delivery Stock SLO 7101 Book 48 h No … 72 h Artificial Neural Network Impact Clauses Adaptation Impact Order Product Supplier In Order Product Supplier In … Predicted ID Order Type Product Delivery Supplier Stock In … Predicted ID Type Delivery Stock … SLO after Predicted ID Type Delivery Stock SLO after adaptation SLO after 7101 Book 32 h No … adaptation 7101 Book 32 h No … adaptation 7101 Book 32 h No … 56 h 56 h 56 h
  • 19. Architectural Overview (2) 1. Define SLAs (SLA DB) and a set of alternative fragments (Advice DB) 2. Train a Prediction Model for each Checkpoint and use it at runtime for prediction at a check point (Violation Predictor) 3. Select an optimal set of fragments based on their impact models and the SLO prediction (Advice Selector) 4. Weave the selection into the composition instance and resume process execution (Advice Weaver)
  • 20. VRESCo Open Source Implementation  The prototype used to do these experiments has been developed as part of the VRESCo project – Can be downloaded from Sourceforge  The Sourceforge package also includes the assembling case study – However, setup is not very user-friendly – Get in touch with us if interested in reproducing the case study  Uses WEKA Machine Learning toolkit to implement the actual prediction algorithms © Philipp Leitner
  • 21. Learning Package Overview  Problem Description  Aspect-Based Fragment Substitution  Discussion  Conclusions © Philipp Leitner
  • 22. Overall Performance Impact on Process Execution Time (1)
  • 23. Overall Performance Impact on Process Execution Time (1)  Online weaved compositions exhibit very little overhead as compared to statically defined compositions  Overhead consists of time necessary to… – select the fragments – implement the actual weaving (largest impact) – to suspend and unsuspend the composition
  • 25. Weaving Time (2)  Weaving time is relatively constant in [45 : 80] ms, even for large fragments (more than 80 activities) This should be fast enough for most applications  As expected… –Concrete activities are faster to weave than transparent activities –Offline weaving is faster than online weaving
  • 26. Discussion - Advantages  Runtime Fragment Substitution based on SLA Predictions has a number of clear advantages … – Coverage of many adaptation patterns – insertion, deleting, moving, replacement of fragments, parallelizing of activities, etc. – Flexibility – the set of available alternative fragments can be altered (i.e., new fragments can be created or existing ones removed) after the process has been deployed during process runtime – Efficiency – even though training of the machine learning models takes some time, generating predictions and the adaptation are very fast
  • 27. Discussion - Disadvantages  … but of course the approach also has some disadvantages. – Bootstrapping problem – the approach assumes that some recorded historical event logs are available for training of the prediction model – Necessary monitoring – in order to know later which fragments have been executed for a process instance – Necessary domain knowledge – in order to define checkpoints and the fragments and their impact models some domain knowledge is necessary
  • 28. Learning Package Overview  Problem Description  Aspect-Based Fragment Substitution  Discussion  Conclusions © Philipp Leitner
  • 29. Summary  Machine learning based techniques can be used to predict SLA Violations in service compositions at runtime  Based on these predictions, runtime fragment substitution can be used for preventing the SLA violation  Steps: 1. Define a checkpoint in the composition and train a machine learning model from historical event log 2. Whenever a composition instance passes the checkpoint, use the monitored data of the instance as input for the machine learning based prediction 3. Based on the available fragment alternatives, select and substitute one or more fragments which likely can prevent the predicted violation
  • 30. Further S-Cube Reading Leitner, Philipp; Wetzstein, Branimir; Karastoyanova, Dimka; Hummer, Waldemar; Dustdar, Schahram; Leymann, Frank: Preventing SLA Violations in Service Compositions Using Aspect-Based Fragment Substitution. In: Proceedings of the 8th International Conference on Service Oriented Computing (ICSOC 2010). Leitner, Michlmayr, Rosenberg, and Dustdar. Monitoring, Prediction and Prevention of SLA Violations in Composite Services. In Proceedings of the 2010 IEEE International Conference on Web Services (ICWS '10). IEEE Computer Society, Washington, DC, USA, 369-376. Leitner, Wetzstein, Rosenberg, Michlmayr, Dustdar, and Leymann. Runtime Prediction of Service Level Agreement Violations for Composite Services. In Proceedings of the 2009 International conference on Service-Oriented Computing (ICSOC/ServiceWave'09), Springer-Verlag, Berlin, Heidelberg, 176-186. Wetzstein, Leitner, Rosenberg, Brandic, Dustdar, and Leymann. Monitoring and Analyzing Influential Factors of Business Process Performance. In Proceedings of the 13th IEEE international conference on Enterprise Distributed Object Computing (EDOC'09). IEEE Press, Piscataway, NJ, USA, 118-127.
  • 31. Acknowledgements The research leading to these results has received funding from the European Community’s Seventh Framework Programme [FP7/2007-2013] under grant agreement 215483 (S-Cube). © Philipp Leitner