SLA Monitoring of Presence-Enabled Services: A New Approach Using Data Envelopment Analysis (DEA)

SLA Monitoring of Presence-Enabled Services: A New Approach Using Data Envelopment Analysis (DEA)

Tapati Bandopadhyay (ICFAI Business School, India) and Pradeep Kumar (ICFAI Business School, India)
Copyright: © 2007 |Pages: 16
DOI: 10.4018/978-1-59904-183-4.ch011
OnDemand PDF Download:


The concept of presence was initially associated with an instant messaging service, allowing an end user to recognize the presence of a peer online to send or receive messages. Now the technology has grown up to include various services like monitoring performance of any type of end user device, and services are accessible from anywhere, any time. The need for enhanced value remains the driving force behind these services, for example, Voice over Internet Protocol (VoIP) services, which is drawing tremendous research interest in services performance evaluation, measurement, benchmarking, and monitoring. Monitoring service level parameters happens to be one of the most interesting application-oriented research issues because various service consumers at the customer companies/end users’ level are finding it very difficult to design and monitor an effective SLA (Service Level Agreement) with the presence-enabled service providers. This chapter focuses on to these specific issues and presents a new approach of SLA monitoring through Data Envelopment Analysis (DEA). This extreme point approach actually can work much better in the context of SLA monitoring than general central-tendency-based statistical tools, a fact which has been corroborated by similar application examples of DEA presented in this chapter and has therefore it acts as the primary motivation to propose this new approach. Towards this end, this chapter first builds up the context of presence-enabled services (Day, Rosenburg, & Sugano, 2000), its SLA and SLA parameters, and the monitoring requirements. Then it explains the basics of DEA and its application in various other engineering and services context. Ultimately, a DEA application framework for monitoring an SLA of presence-enabled services is proposed which can serve as a clear guideline for the customers of presence-enabled services, not only for SLA monitoring but also at various other stages of implementing presence-enabled services frameworks. This approach exploits the definitive suitability of the application of DEA methods to presence-enabled service monitoring problems, and can be easily implemented by the industry practitioners.

Complete Chapter List

Search this Book:
Table of Contents
Moh’d A. Radaideh
Moh’d A. Radaideh, Hayder Al-Ameed
Chapter 1
Moh’d A. Radaideh, Hayder Al-Ameed
With the advancement of computer technologies and the World Wide Web, there has been an explosion in the amount of available e-services, most of... Sample PDF
Database High Availability: An Extended Survey
Chapter 2
R.Todd Stephens
This chapter examines the critical task of governing the Web application environment with enterprise metadata methodologies. As organizations move... Sample PDF
Enterprise Metadata for Reliable Web Applications
Chapter 3
Oliver Braun, Günter Schmidt
We present a reliable application architecture and a corresponding system architecture of a system for personal financial planning. The application... Sample PDF
Architecture of an Information System for Personal Financial Planning
Chapter 4
Brian Goodman, Maheshwar Inampudi, James Doran
In this chapter, we introduce five practices to help build scalable, resilient Web applications. In 2004, IBM launched its expertise location... Sample PDF
Approaches to Building High Performance Web Applications: A Practical Look at Availability, Reliability, and Performance
Chapter 5
Arthur Tatnall, Alex Pliaskin
This chapter describes the development and ultimate demise of the Bizewest portal in the Western Region of Melbourne, Australia. We argue that no... Sample PDF
The Demise of a Business-to-Business Portal
Chapter 6
Yih-Jiun Lee
This chapter introduces a Web services-based virtual organization solution, which is designed to enhance the security performance of WSGrid. WSGrid... Sample PDF
A Security Solution for Web-Services Based Grid Application
Chapter 7
Thomas Biskup, Nils Heyer, Jorge Marx Gómez
This chapter introduces Hyperservices as a unified application model for Semantic Web frameworks, and proposes Conceptual Model-Driven Software... Sample PDF
Conceptual Model Driven Software Development (CMDSD) as a Catalyst Methodology for Building Sound Semantic Web Frameworks
Chapter 8
Pablo Galdámez
This chapter proposes a software architecture to enhance the availability of Web-based applications at a reasonable cost. The architecture is... Sample PDF
Automatic Replication for Web Applications
Chapter 9
M. Adel Serhani, Elarbi Badidi, Mohamed Vall O. Mohamed-Salem
As Web services are growing rapidly and as their adoption by a large number of business organizations is increasing, scalability and performance... Sample PDF
A Scalable QoS-Aware Web Services Management Architecture (QoSMA)
Chapter 10
Abou Bakar Nauman, Romana Aziz, A. F.M Ishaq
This chapter examines the causes of failure in a Web-based information system development project and finds out how complexity can lead a project... Sample PDF
Information System Development Failure and Complexity: A Case Study
Chapter 11
Tapati Bandopadhyay, Pradeep Kumar
The concept of presence was initially associated with an instant messaging service, allowing an end user to recognize the presence of a peer online... Sample PDF
SLA Monitoring of Presence-Enabled Services: A New Approach Using Data Envelopment Analysis (DEA)
Chapter 12
Abid Abdelouahab, Fouad Mohammed Abbou, Ewe Hong Tat, Toufik Taibi
To exploit the unprecedented opportunities offered by the E-Service Applications, businesses and users alike would need a highly-available... Sample PDF
All-Optical Internet: Next-Generation Network Infrastructure for E-Service Applications
About the Authors