Automated Negotiation for Provisioning Virtual Private Networks using FIPA-Compliant Agents
نویسندگان
چکیده
This paper describes the design and implementation of negotiating agents for the task of provisioning virtual private networks. The agents and their interactions comply with the FIPA specification and they are implemented using the FIPA -OS agent framework. Particular attention is focused on the design and implementation of the negotiation algorithms.
منابع مشابه
Open Source, Standards and Scaleable Agencies
Numerous agencies and agent systems are being developed or portrayed as vehicles to deliver novel types of e-commerce services to users. However service agents in one agency are probably unable to interoperate or co-operate with agents from other vendors’ agencies. Clearly, standardization in this area would help to create a more ubiquitous market for agent-based services. We analyze the releva...
متن کاملThe FIPA-OS agent platform: Open Source for Open Standards
FIPA-OS (FIPA Open Source) is an open agent platform originating from Nortel Networks. The platform supports communication between multiple agents using an agent communication language which conforms to the FIPA (Foundation for Intelligent Physical Agents) agent standards. A key focus of the platform is that it supports openness. This is naturally supported by the agent paradigm itself and by t...
متن کاملStandards for Agents and Agent Based Systems (fipa)
Architecture Agent Communication Agent Management Agent Message Transport Figure 1: FIPA Specification breakdown Current Generation of FIPA Specifications ABSTRACT ARCHITECTURE The purpose of the FIPA Abstract Architecture is to foster interoperability and reusability, this leads to the identification of architectural abstractions linked by their relationships. It makes a distinction between th...
متن کاملProvisioning Restorable Virtual Private Networks Using Barabasi and Waxman Topology Generation Model
As internet usage grows exponentially, network security issues become increasingly important. Network security measures are needed to protect data during transmission. Various security controls are used to prevent the access of hackers in networks. They are firewall, virtual private networks and encryption algorithms. Out of these, the virtual private network plays a vital role in preventing ha...
متن کاملThe RBVO Formation Protocol
The proposed protocol has been designed to support the flexible formation of Request-Based Virtual Organisations (RBVOs) with an emphasis on reflecting the conditions of real competitive environments. It supports automated or semi-automated negotiations mainly in the creation part of a Virtual Organisation (VO) life cycle and it accounts for the use of Service Level Agreements (SLAs). The proto...
متن کامل