Web-Based Configuration of Virtual Private Networks with Multiple Suppliers
نویسندگان
چکیده
An Internet-based Virtual Private Network (IP-VPN) uses the open, distributed infrastructure of the Internet to transmit data between corporate sites. The configuration (network design) for a specific customer network typically requires the selection of network access lines and backbone sections that are provisioned by different organizations in a supply chain. Moreover, when configuring such a network, the given customer requirements (e.g., minimal bandwidth) have to be observed. Within this paper, we show how the (sales-)configuration process for these networks is supported within the CAWICOMS1 framework for distributed configuration. Beside the implementation of an adequate distributed problem solving mechanism based on Constraint Satisfaction with commercial tools, we address the problem of supplier selection and knowledge integration in a Web-based environment for eCommerce: Based on common ontological commitments on representation concepts for the configuration domain, the suppliers can advertise their products and services, whereby the distributed problem solving process involves locating and executing the supplier’s configuration service using an open XML-based protocol. We present the architecture of the implemented prototype framework and show the relation of our work to emerging approaches in the fields of Distributed Problem Solving and Semantic Web Services. 1 CAWICOMS is the acronym for Customer-adaptive Web interface for the configuration of products and services with multiple suppliers. This work was partly funded by the EU through the IST Programme under contract IST-1999-10688. (www.cawicoms.org) 2 A. FELFERNIG, G. FRIEDRICH, D. JANNACH, AND M. ZANKER
منابع مشابه
A Framework for the Development of Personalized, Distributed Web-Based Configuration Systems
THE CONFIGURATION OF PRODUCTS AND SERVICES WITH MULTIPLE SUPPLIERS (CAWICOMS) aims at the next generation of web-based configuration applications that cope with two challenges of today’s open, networked economy: (1) the support for heterogeneous user groups in an open-market environment and (2) the integration of configurable subproducts provided by specialized suppliers. This article describes...
متن کاملPersonalised Customer Interaction for the Configuration of Products and Services in a Supply Chain
Within CAWICOMS a configuration workbench for customisable products and services will be developed which will have the following advantages versus current commercially available configuration technology: It will automate over the Web the skills of salespersons by developing adaptation and personalisation technology for inclusion in Web based configurators. The interaction with the user will be ...
متن کاملA Framework for Rapid Development of Advanced Web-based Configurator Applications
For the last two decades product configurators relying on Artificial Intelligence techniques have been successfully applied in industrial environments. These systems support the configuration of complex products and services in shorter time with fewer errors and therefore reduce costs of a mass-customization business model. The EU-funded CAWICOMS project aims at the next generation of Webbased ...
متن کاملVirtual Private Infrastructure (VPI) initiative - an industry consortium for unified and secure Web control with embedded devices
− Remote maintenance and control is already widely used in industrial automation and building automation and gains acceptance for many other applications, e.g. smart home appliances, consumer electronics, networking devices. Internetand web-based connectivity is playing a major part in unifying network infrastructure and company information flow. However, a number of different implementations h...
متن کاملShared Protection of Virtual Private Networks with Heuristic Methods
In our paper we analysed algorithms that seek the optimal routing configuration in backbone networks with capacity constraints. We investigated a special case when multiple full mesh demand sets (forming Virtual Private Networks (VPNs)) have to be built. We examined the pro-active path based shared protection scheme and investigated heuristic algorithms to calculate the paths. We analysed two d...
متن کامل