Dynamic Agent-Based Prioritized Connection Admission for Stressed Network Cory C. Beard and Victor S. Frost Information and Telecommunication Technology.

Slides:



Advertisements
Similar presentations
10 september 2002 A.Broersen Developing a Virtual Piano Playing Environment By combining distributed functionality among independent Agents.
Advertisements

Kerberos: An Authentication Service for Open Network Systems Jennifer G. Steiner, Clifford Neuman, and Jeffrey I. Schiller Massachusetts Institute of Technology.
The Challenges of CORBA Security It is important to understand that [CORBAsecurity] is only a (powerful) security toolbox and not the solution to all security.
Akshat Sharma Samarth Shah
TU e technische universiteit eindhoven / department of mathematics and computer science Specification of Adaptive Behavior Using a General- purpose Design.
1 Distributed Computer Security: Authentication and Key Distribution Vijay Jain CSc 8320, Spring 2007.
High Performance Computing Course Notes Grid Computing.
Kerberos Short presentation Protocol run Ressources By Artur Hecker, ENST Paris, 11/01/2002.
How to Succeed with Active Directory Robert Williams, PhD CEO Secure Logistix Corporation.
Implementation Advice: When Intelligent Agents Meet RDF 2004 년 1 학기 - 인간과 컴퓨터 상호작용 인공지능연구실, 부산대학교 최성자.
1 Intelligent Agents Software analog to human agents real estate agent, librarian, salesperson Perform tasks individually, or in collaboration Static and.
Distributed Network and System Management Based on Intelligent and Mobile Agents Jianguo Ding 25/03/2002 DVT-DatenVerarbeitungsTechnik FernUniversität.
A Service Platform for On-Line Games DebanJan Saha, Dambit Sahu, Anees Shaikh (IBM TJ Watson Research Center, NY) Presented by Gary Huang March 17, 2004.
Introduction to Java 2 Enterprise Edition About myself –Neutrinos, Cancer Research, IT Applications Today’s topic: J2EE –Context –Advantages –Components.
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
Ambient Computational Environments Sprint Research Symposium March 8-9, 2000 Professor Gary J. Minden The University of Kansas Electrical Engineering and.
Edward Tsai – CS 239 – Spring 2003 Strong Security for Active Networks CS 239 – Network Security Edward Tsai Tuesday, May 13, 2003.
University of Kansas ITTC Research Overview Victor S. Frost Dan F. Servey Distinguished Professor Electrical Engineering and Computer Science Executive.
Chapter 1: Introduction Business Data Communications, 4e.
University of Kansas Models for Joint University/Industry Collaborations Victor S. Frost Dan F. Servey Distinguished Professor Electrical Engineering and.
Firefox 2 Feature Proposal: Remote User Profiles TeamOne August 3, 2007 TeamOne August 3, 2007.
Fawaz Alsaadi Fahad Alsolmai.  Role Based Multi-Agent System for providing effective and secure Bank transaction services  To provide seamless access.
Efficient agent-based selection of DiffServ SLAs over MPLS networks Thanasis G. Papaioannou a,b, Stelios Sartzetakis a, and George D. Stamoulis a,b presented.
Personalized Ontologies for Web Search and Caching Susan Gauch Information and Telecommunications Technology Center Electrical Engineering and Computer.
DISTRIBUTED PROCESS IMPLEMENTAION BHAVIN KANSARA.
Web-Enabling the Warehouse Chapter 16. Benefits of Web-Enabling a Data Warehouse Better-informed decision making Lower costs of deployment and management.
Geoinfosys Technologies New Delhi 9 th February 2012 Development of ‘Geographical Information System’ (GIS) based “Decision Support System for Transport”
A centralized system.  Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture. Like other directory.
IIIAURJCUPV Task 7.1 Software architecture and computation model E. Marcos C. Acuña Task 7.2 Multiagent System Platform A. Espinosa Task.
These materials are prepared only for the students enrolled in the course Distributed Software Development (DSD) at the Department of Computer.
BOB Tech Demo 2003 G2E – Las Vegas. Agenda  Best of Breed – a layering of standards  Standards, messaging, protocols and why you care  From the bottom.
Business Data Communications, Stallings 1 Chapter 1: Introduction William Stallings Business Data Communications 6 th Edition.
Designing Active Directory for Security
SOUPA: Standard Ontology for Ubiquitous and Pervasive Applications Harry Chen, Filip Perich, Tim Finin, Anupam Joshi Department of Computer Science & Electrical.
Division of IT Convergence Engineering Towards Unified Management A Common Approach for Telecommunication and Enterprise Usage Sung-Su Kim, Jae Yoon Chung,
Software Architecture Framework for Ubiquitous Computing Divya ChanneGowda Athrey Joshi.
(Preliminary) Gap Analysis Hannes Tschofenig. Goal of this Presentation The IETF has developed a number of security technologies that are applicable to.
SAML CCOW Work Item HL7 Working Group Meeting San Antonio - January 2008 Presented by: David Staggs, JD CISSP VHA Office of Information Standards.
Copyright © Clifford Neuman and Dongho Kim - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Advanced Operating Systems Lecture.
Framework & Requirements for an Access Node Control Mechanism in Broadband Multi-Service Networks ANCP WG IETF 71 – Philadelphia draft-ietf-ancp-framework-05.txt.
© 1998 R. Gemmell IETF WG Presentation1 Robert Gemmell ROAMOPS Working Group.
The Grid System Design Liu Xiangrui Beijing Institute of Technology.
Hao Wang Computer Sciences Department University of Wisconsin-Madison Authentication and Authorization.
Open Service Gateway Initiative (OSGi) Reporter : 林學灝 侯承育 1.
1 4/23/2007 Introduction to Grid computing Sunil Avutu Graduate Student Dept.of Computer Science.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Internet Real-Time Laboratory Arezu Moghadam and Suman Srinivasan Columbia University in the city of New York 7DS System Design 7DS system is an architecture.
Introduction Infrastructure for pervasive computing has many challenges: 1)pervasive computing is a large aspect which includes hardware side (mobile phones,portable.
Security Protection on Trust Delegated Medical Data in Public Mobile Networks Dasun Weerasinghe, Muttukrishnan Rajarajan and Veselin Rakocevic Mobile Networks.
1 Integrating security in a quality aware multimedia delivery platform Paul Koster 21 november 2001.
Department of Electronic Engineering Challenges & Proposals INFSO Information Day e-Infrastructure Grid Initiatives 26/27 May.
GRID Overview Internet2 Member Meeting Spring 2003 Sandra Redman Information Technology and Systems Center and Information Technology Research Center National.
Service Level Management with Agent Technology Torsten Bissel, Manfred Bogen, Christian Bonkowski, Volker Hadamschek, Dieter Strecker GMD - German National.
OpenField Consolidates Stadium Data, Provides CRM and Analysis Functions for an Intelligent, End-to-End Solution COMPANY PROFILE : OPENFIELD Founded by.
WLAN In Disaster and Emergency Response (WIDER) MidTerm Presentation.
SOCKS By BITSnBYTES (Bhargavi, Maya, Priya, Rajini and Shruti)
Internet of Things (Ref: Slideshare)
© 2014 The MITRE Corporation. All rights Reserved. Roger Westman Principal Information Security Engineer September 29, 2014 Authorization.
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
Using Bayesian Belief Networks in Assessing Software Architectures Jilles van Gurp & Jan Bosch.
Managing Qualitative Knowledge in Software Architecture Assesment Jilles van Gurp & Jan Bosch Högskolan Karlskrona/Ronneby in Sweden Department of Software.
Integrating the Healthcare Enterprise The Integration Profiles: Basic Security Profile.
Call-Center Agents, Customers Communicate More Conveniently with SMS Chat App COMPANY PROFILE: EARLY CONNECT Early Connect is a regional SaaS ISV founded.
Jordan Population and Housing Census 2015
2010 IEEE Global Telecommunications Conference (GLOBECOM 2010)
Advanced Security Architecture for System Engineers Cisco Dumps Get Full Exam Info From: /cisco-question-answers.html.
An Overview of the ITTC Networking & Distributed Systems Laboratory
Mobile Agents.
Strong Password Authentication Protocols
Towards Unified Management
Presentation transcript:

Dynamic Agent-Based Prioritized Connection Admission for Stressed Network Cory C. Beard and Victor S. Frost Information and Telecommunication Technology center Department of Electrical Engineering & Computer Science The University of Kansas

Introduction Emergencies or natural disasters Greater importance Dynamic context Geographically distributed importance ticket servers Intelligent agent communication techniques

Importance Ticket Server Architecture Importance Ticket Servers Importance Ticket

Importance Ticket Server Information that user should provide to ITS: User identity User organization affiliation User ’ s views of the current context User work function Authentication sources to contact

Importance Ticket Server Benefits of the architecture: Quick connection admission Detailed tracking of resource usage Server context model Low overhead Regional deployment

Importance Ticket The purpose: Supersedure Necessarity The attributes Value Duration Connect identifier

Kerberos Kerberos: An Authentication Service for Open Network Systems Jennifer G. Steiner, Clifford Neuman, Jeffrey I. Schiller

Importance Decision User verification User satisfaction Viewpoint difference Misunderstood information clarification Dynamic context Credibility Authority preferential treatment

Design Intelligent agents Autonomy Communication ability Negotiation Reasoning Agent communication Negotiation protocol

Design

Intelligent Agents User agents Negotiation for tickets Server agents Ticket assignment Context model updates Explanations

Agent Communication Speech acts AC language messages: An explicit designation of a speech act The content related to the speech act KQML

Communication Model

Benefits and Complexity Compare to extended ATM Signaling approach showed in Fig.3: Greater user satisfaction Greater chance for connection admission Greater awareness of connection being treated Greater flexibility for influencing outcomes

Extended ATM Signaling approach

Implementation Issues KQML processing Immobile IA Secure tickets exchange Information verification Negotiation for tickets Frivolous communication Dynamic context updates

Conclusion Importance 921 大地震, 警廣交通網 Architecture and technologies ITS, IT, IA, AC Future work Justification of ITS Security Admission & resource allocation