Recently, Peer-to-Peer (P2P), Autonomous Agents and Service Orientation are three paradigms that have been influenced heavily on the development of distributed systems especially the Internet. P2P is a class of applications that takes advantage of resources e.g. storage, cycles, content, human presence, available at the edges of the Internet. In addition, the P2P and Autonomous Agents technologies enable peers to modify the way to achieve their objectives. These technologies address the needs for autonomous agents to support self-organization of highly autonomous peers, load balancing, routing, service discovery, etc. Moreover, Service-Oriented Architectures (SOA) support of loose coupling of software components and consequently provide a high degree of interoperability and reuse. Web Service (WS) is an example of SOA that includes three main entities: Consumers, Providers, and Registers of services. These entities work in concert to provide a loosely coupled computing paradigm. WSs are self-contained, loosely coupled application modules with well described functionality that can be published, located and invoked across the Web. The growing number of WS lunched in the Web raises new challenges, such as discovery of WS. P2P and Autonomous Agents technologies are alternatives to tackle these challenges. The main objective of this book is to address the challenges to develop an understanding of Autonomous P2P Web Service models and developments. Moreover, it will extend the growing literature on the emerging technologies for Autonomous Agents, P2P Computing and Web Services.
This book is intended for anyone who wants to cover a comprehensive range of topics in the field of Web Service developments, Multi-Agent Systems, Autonomous Agents and P2P computing. It is both for an academic audience (teachers, researchers and students, mainly of post-graduate studies) and professional audience (managers, software developers and IT specialists). Readers of this book are presumed familiar with the concepts and paradigms of P2P, Web Services, Multi-Agent Systems and Autonomous Agents.
This book is expected to act as a guide for technology solution developers from academia, research institutions and industry, providing them with a broader perspective of P2P and Autonomous Agent and Web Services.
This book contains 11 excellent chapters authored by a group of internationally experienced professionals and researchers in the field of computer science and information technology. Contributors also include younger authors, creating a value-added constellation of dynamic authors. Concerning the environments from which the contributions are presented, the chapters came from academia, research institutions and industry.
Organization of the book
This book is designed to cover a wide range of topics in the field of Web services through P2P computing and Autonomous Agents. It includes four sections that cover various frameworks for developing P2P and Web service applications, development technologies for implementing Multi-Agent systems, Web service applications, context searching and Web discovering technologies. Each chapter is designed to be as a stand-alone as possible; the reader can focus on the interested topics only. The chapters are described briefly as follows.
Section I: Multi-Agent Systems Development
Chapter 1 presents a survey of the current state of the art about Web services integration in open Multi-Agent Systems (MAS). The chapter identifies a set of requirements needed to achieve full integration and presents a communication infrastructure, which satisfies these requirements.
Chapter 2 shows how JADE, one of the most known and used software framework for the development of multi-agent systems, has been extended to become the main means to support legacy systems interoperability and to make the realization of scalable distributed peer-to-peer and service-oriented systems easy.
Chapter 3 presents ensemble multi-agent-based intrusion detection model that combines anomaly, misuse and host-based detection analysis. The agents in the presented model use rules to check for intrusions, and adopt machine-learning algorithms to recognize unknown actions, and to update rules or create new ones automatically. Each agent in the presented model encapsulates a specific classification technique and gives its belief about any packet event in the network. These agents collaborate to determine the decision about any event, have the ability to generalize, and to detect novel attacks.
Chapter 4 addresses two challenges in developing a framework that simplifies the workflow creation process within the ARGUGRID project. This chapter focused on the use of agents in enabling automatic service compositions in ARGUGRID. Moreover, it provided the design and implementation of a run-time interaction architecture that comprise of a workflow system, registry and brokering system.
Section II: Context Searching
Chapter 5 introduces context-aware computing as a one key technology to enable services and applications in the communication environment to adapt their behaviour based on the knowledge of environmental (contextual) information, thereby enhancing the system's ability to become ever more responsive to the needs of the end-user or application domain. The chapter focus on the question: How can highly distributed context information be located and retrieved regarding small-scale as well as large-scale networks, addressing the topics of inter-domain management and scalability of context architectures.
Chapter 6 justifies the need of distributed cross media content adaptation and the potential of utilizing Web Services as the adaptation providers. It introduces request-driven context to complement constraint-driven and utility-driven approaches. The chapter describes the request context mapping and propose a novel paths determination scheme for determining the optimal service proxies to facilitate the adaptation tasks.
Chapter 7 presents a Collaborative Autonomous Interface Agent (CAIA) that collaborates with the Internet Meta search engines to support the user in finding exactly the Web services consistent with his/her needs.
Section III: Framework Design
Chapter 8 investigates the interaction, architecture and design characteristics of Mobile Web Services (MobWS) for P2P computing. The chapter presents two MobWS interaction strategies followed by the architectural discussion, enfolding server and client side components, of a resource-oriented MobWS framework. It also discussed REST design principles to propose an efficient way of architecting P2P MobWS systems, as an alternative to SOAP, enabling significant payload reduction and performance optimization in mobile servers. The detailed performance evaluation is also presented and compared to SOAP based on real-time measurements.
Chapter 9 presents a clustered Peer-to-Peer system as a resource organization structure for Web-service hosting platforms where service quality such as response time and service availability are provided with assurance.
Chapter 10 describes JaDiMa (Java Distributed Machine), a collaborative framework to construct Java applications on grid platforms. JaDiMa services are implemented as Web Services following the SOA approach; library repositories are modeled as a JXTA P2P network; and semantic annotations of libraries assist developers on the tasks of discovering libraries. The chapter describes an implementation of JaDiMa as part of SUMA/G, a Globus-based grid environment.
Chapter 11 presents a self-organized structured P2P overlay network for efficient video streaming. This overlay network is organized into clusters. Each cluster contains peers where their play points located between lower and upper play point limits. Thus it enables peers in the cluster to enjoy the flexibility of watching same media file with low overhead of seek operations.
Section IV: Web Service Applications
Chapter 12 presents Parlay X as a set of Web Service interfaces that are designed to provide open access to telecommunication network functions and thus to hide from application developers underlying network technology and its control protocol complexity. It presents an analysis of the interfaces and particularly the discussion about their applicability to Policy and Charging Control architecture in IMS. The usage of Web Services is exemplified with an application for charging control based on the provided QoS.