A Middleware Based on Chemical Computing for Service Execution The Current Problems and Solutions

نویسنده

  • Chen WANG
چکیده

Workflow Definition module defines the abstract workflow. This definition will be sent to the Workflow Instantiation component (introduced later on) for workflow instantiation process. As introduced, a service (or a functionality) can be delivered on difha l-0 07 94 02 3, v er si on 1 25 F eb 2 01 3 2 Middleware Architecture 7 ferent levels, so this abstract business process can publish multiple offers based on different global QoS constraints. For example, Offer1 permits to deliver the “Planning Trip” functionality within 10 seconds at the cost of 2 dollars; while Offer2 promises to deliver the same functionality within 5 seconds at the cost of 5 dollars. For each offer, the abstract workflow should be instantiated at least once (in lucky case that there is no error) to get the feasible execution plan. The “Offer Management” module manages all the possible execution plans for all the published offers. Once a feasible execution plan is found, the abstract business process can publish the relative offer in the Registry. In this way, this offer becomes discoverable by the other services during their instantiation process. Once its offer is selected, it has to wait to start the calculation until it receives the relative input. The Execution Engine is in charge of executing an execution plan. In our middleware system, the workflow execution is decentralized. The execution engine firstly cuts the execution plan to several blocks, and then sends these blocks to the relative partner services. On receiving these blocks, the partner services wait for their Another important module is “Monitoring”, which monitors and evaluates all the workflow executions. Once it detects the errors or deviations during the execution (for example, one of the partner service is crashed during the execution or the output format of a step does not conform with the input of its succeeding step), it will notify the Workflow Instantiation to adapt a part of execution plan. The adaptation is done in the run-time to avoid restarting the execution. From the client point of view, he can never perceive this action. In order to start the adaptation process, the whole execution plan will be sent to the Workflow Adaptation module. This module takes charge of replacing the bindings of a part of workflow in order that the following execution of workflow will still meeting the global QoS constraints. Take the example from Figure ??, during the Execution1 (this is the identity of the workflow execution), the monitoring detects that the second partner service (Euro Hotel) is crashed, so it informs the Workflow Adaptation module to carry our the adaptation process. The whole workflow should be delivered within 10 seconds at the cost of 2 dollars, where the Euro Hotel requires 3 seconds and 0.5 dollars and Car Renting costs 2 seconds and 0.5 dollars. Since the Euro Hotel service is crashed (due to some unpredictable reason such as server crash or network congestion), Workflow Adaptation module will consult the Registry to see whether it is possible to adapt a part of workflow in order to avoid the QoS violation. Finally, the Registry finds the service Cheap Hotel and Euro Car which requires 3.5 seconds 0.3 dollars and 1 seconds and 0.7 dollars. In this way, the two newly selected partner services cost only 4.5 seconds and 1 dollar which is better than the previous solution which costs 5 seconds and 1 dollar. In this sense, the rest of the workflow does not need to be adapted. ha l-0 07 94 02 3, v er si on 1 25 F eb 2 01 3 2 Middleware Architecture 8

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions

Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...

متن کامل

An Effective Task Scheduling Framework for Cloud Computing using NSGA-II

Cloud computing is a model for convenient on-demand user’s access to changeable and configurable computing resources such as networks, servers, storage, applications, and services with minimal management of resources and service provider interaction. Task scheduling is regarded as a fundamental issue in cloud computing which aims at distributing the load on the different resources of a distribu...

متن کامل

A Clustering Approach to Scientific Workflow Scheduling on the Cloud with Deadline and Cost Constraints

One of the main features of High Throughput Computing systems is the availability of high power processing resources. Cloud Computing systems can offer these features through concepts like Pay-Per-Use and Quality of Service (QoS) over the Internet. Many applications in Cloud computing are represented by workflows. Quality of Service is one of the most important challenges in the context of sche...

متن کامل

A Model based on Cloud Computing for the implementation and management IT services in Banks

In recent years, the banking industry has made significant changes in technology and communications. The expansion of electronic communications and a large number of people around the world access to the Internet, appropriate to establish trade and economic exchanges provided but high costs, lack of flexibility and agility in existing systems because of the large volume of information, confiden...

متن کامل

A Model based on Cloud Computing for the implementation and management IT services in Banks

In recent years, the banking industry has made significant changes in technology and communications. The expansion of electronic communications and a large number of people around the world access to the Internet, appropriate to establish trade and economic exchanges provided but high costs, lack of flexibility and agility in existing systems because of the large volume of information, confiden...

متن کامل

Access control in ultra-large-scale systems using a data-centric middleware

  The primary characteristic of an Ultra-Large-Scale (ULS) system is ultra-large size on any related dimension. A ULS system is generally considered as a system-of-systems with heterogeneous nodes and autonomous domains. As the size of a system-of-systems grows, and interoperability demand between sub-systems is increased, achieving more scalable and dynamic access control system becomes an im...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013