Automated Negotiation for Provisioning Virtual Private Networks using FIPA-Compliant Agents

نویسندگان

  • P. Faratin
  • N. R. Jennings
  • P. Buckle
چکیده

This paper describes the design and implementation of negotiating agents for the task of provisioning virtual private networks. The agents and their interactions comply with the FIPA specification and they are implemented using the FIPA -OS agent framework. Particular attention is focused on the design and implementation of the negotiation algorithms.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Open Source, Standards and Scaleable Agencies

Numerous agencies and agent systems are being developed or portrayed as vehicles to deliver novel types of e-commerce services to users. However service agents in one agency are probably unable to interoperate or co-operate with agents from other vendors’ agencies. Clearly, standardization in this area would help to create a more ubiquitous market for agent-based services. We analyze the releva...

متن کامل

The FIPA-OS agent platform: Open Source for Open Standards

FIPA-OS (FIPA Open Source) is an open agent platform originating from Nortel Networks. The platform supports communication between multiple agents using an agent communication language which conforms to the FIPA (Foundation for Intelligent Physical Agents) agent standards. A key focus of the platform is that it supports openness. This is naturally supported by the agent paradigm itself and by t...

متن کامل

Standards for Agents and Agent Based Systems (fipa)

Architecture Agent Communication Agent Management Agent Message Transport Figure 1: FIPA Specification breakdown Current Generation of FIPA Specifications ABSTRACT ARCHITECTURE The purpose of the FIPA Abstract Architecture is to foster interoperability and reusability, this leads to the identification of architectural abstractions linked by their relationships. It makes a distinction between th...

متن کامل

Provisioning Restorable Virtual Private Networks Using Barabasi and Waxman Topology Generation Model

As internet usage grows exponentially, network security issues become increasingly important. Network security measures are needed to protect data during transmission. Various security controls are used to prevent the access of hackers in networks. They are firewall, virtual private networks and encryption algorithms. Out of these, the virtual private network plays a vital role in preventing ha...

متن کامل

The RBVO Formation Protocol

The proposed protocol has been designed to support the flexible formation of Request-Based Virtual Organisations (RBVOs) with an emphasis on reflecting the conditions of real competitive environments. It supports automated or semi-automated negotiations mainly in the creation part of a Virtual Organisation (VO) life cycle and it accounts for the use of Service Level Agreements (SLAs). The proto...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000