The Impact of Service-Level Agreement (SLA) on a Cloudlet Deployed in a Coffee Shop Scenario

  • Mandisa N. NxumaloEmail author
  • Matthew O. Adigun
  • Ijeoma N. Mba
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1041)


The usage of service-level agreement (SLA) to ensure smooth negotiations, easy management, and provision of resources make it a reliable tool to ensure service guarantees in a network. Low-latency Internet connectivity services provided by edge servers such as a Cloudlet deployed in small–medium enterprises (SMEs) can benefit from SLA. This is due to that SMEs are exposed to financial issues and through the use of SLA, SMEs such as a coffee shop can be able to attract consumers plus minimize Cloudlet operational cost. The operational cost is minimized through using the SLA to manage and provide effective resources which eliminate SLA violations in the network. The decrease in SLA violation occurrence has a positive effect on the operational cost SMEs must spend to lease resources and Internet packages from providers. The objective of this study was to demonstrate the effectiveness of SLA in minimizing Cloudlet operational costs using a coffee shop scenario. This was achieved through the use of a CloudSim Plus tool to simulate the SLA in a network. The results show that the management of resources in the network and the monitoring of the agreed SLA eliminate SLA violations and further minimizing operational cost.


Service-level agreement Cloudlet Small–medium enterprises CloudSim plus tool 



The authors would like to extend their acknowledgement to the Council of Scientific and Industrial Research (CSIR) for funding and the Department of Computer Science at the University of Zululand for support.


  1. 1.
    K. Bilal, O. Khalid, A. Erbad, S.U. Khan, Potentials, trends, and prospects in edge technologies: fog, cloudlet, mobile edge, and micro data centers. Comput. Netw. 130, 94–120 (2018)CrossRefGoogle Scholar
  2. 2.
    Z. Pang, L. Sun, Z. Wang, E. Tian, S. Yang, A survey of cloudlet based mobile computing, in 2015 International Conference on Cloud Computing and Big Data (CCBD) (IEEE, 2015), pp. 268–275Google Scholar
  3. 3.
    Y. Gao, W. Hu, K. Ha, B. Amos, P. Pillai, M. Satyanarayanan, Are cloudlets necessary? School of Computing Science, Carnegie Mellon University, Pittsburgh, PA, USA, Technical report. CMU-CS-15–139 (2015)Google Scholar
  4. 4.
    S. Durst, I. Edvardsson, Knowledge management in SMEs: a literature review. J. Knowl. Manag. 16(6), 879–903 (2012)CrossRefGoogle Scholar
  5. 5.
    M.N. Nxumalo, M.O. Adigun, I. Mba, An envisaged SLA-based cloudlet business model for ensuring service guarantees, in 2018 International Conference on Advances in Big Data, Computing and Data Communication Systems (icABCD) (IEEE, 2018), pp. 1–4Google Scholar
  6. 6.
    S.E. Middleton, M. Surridge, B.I. Nasser, X. Yang, Bipartite electronic SLA as a business framework to support cross-organization load management of real-time online applications, in European Conference on Parallel Processing (Springer, 2009), pp. 245–254Google Scholar
  7. 7.
    K.S. Suneel, H.S. Guruprasad, A novel approach for SLA compliance monitoring in cloud computing. Int. J. Innov. Res. Adv. Eng. 2(2), 154–159 (2015)Google Scholar
  8. 8.
    M.C. Silva Filho, R.L. Oliveira, C.C. Monteiro, P.R. Inácio, M.M. Freire, CloudSim plus: a cloud computing simulation framework pursuing software engineering principles for improved modularity, extensibility and correctness, in 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) (IEEE, 2017), pp. 400–406Google Scholar
  9. 9.
    C. Sonmez, A. Ozgovde, C. Ersoy, EdgeCloudSim: an environment for performance evaluation of edge computing systems, in 2017 Second International Conference on Fog and Mobile Edge Computing (FMEC) (IEEE, 2017), pp. 39–44Google Scholar
  10. 10.
    A.B. Khattak, A. Jalal, Performance based service level agreement in cloud computing. Int. J. Res. Publ. 4(4), 20–30 (2015)Google Scholar
  11. 11.
    S.M. Musa, A. Yousif, M.B. Bashi, Sla violation detection mechanism for cloud computing. Int. J. Comput. Appl. 133(6), 8–11 (2016)Google Scholar
  12. 12.
    Q. Xia, W. Liang, W. Xu, Throughput maximization for online request admissions in mobile cloudlets, in 2013 IEEE 38th Conference on Local Computer Networks (LCN) (IEEE, 2013), pp. 589–596Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Mandisa N. Nxumalo
    • 1
    Email author
  • Matthew O. Adigun
    • 1
  • Ijeoma N. Mba
    • 1
  1. 1.Department of Computer ScienceUniversity of ZululandRichards BaySouth Africa

Personalised recommendations