Effectiveness of Coloured Petri nets for Modelling and Analysing the Contract Net Protocol

نویسندگان

  • Jonathan Billington
  • Amar Kumar Gupta
چکیده

Abstract. The Contract Net Protocol was developed to facilitate contract negotiation in MultiAgent Systems, between an auctioneer and many bidders. It is therefore important to analyse the protocol to ensure that it terminates correctly and satisfies other important properties. There have been few attempts to model and analyse this protocol in the literature. The main paper on its verification, published in 2004, suggests that Coloured Petri nets are inadequate for this task. This seems to be due to a misunderstanding of what Coloured Petri Nets are. The main aim of this paper is therefore to show how Coloured Petri nets can be used effectively to model and analyse this protocol. We present a model of the protocol implemented in CPN Tools. The level of abstraction excludes details of the messages communicated between the agents and processing that does not affect the operation of the protocol. We analyse the protocol and show that it terminates correctly (there are no deadlocks or livelocks, and the terminal states show that the auctioneer and bidders have consistent states)and that there is no dead code (all procedures are executable). We also demonstrate that the channel bounds and number of terminal states depend linearly on the number of bidder agents participating in the negotiations for up to 6 bidders and conjecture that this is true in general.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Modelling and Analysing the Contract Net Protocol - Extension Using Coloured Petri Nets

The Contract Net Protocol is a task allocation protocol that facilitates negotiation between bidders and an auctioneer in a MultiAgent System to form a contract. The extension allows the bidders to interact with more than one auctioneer concurrently, and to update their bids until a bid is granted. This introduces flexibility and ensures better selection of a bid. In this paper, we model the Co...

متن کامل

Using Coloured Petri Nets in Penetration Testing

Network penetration testing is a well-known approach used for security testing. Penetrating testing can be a laborious task which relies much on human knowledge and expertise, with various techniques employed, and an extensive amount of tools used in the process. A methodical approach to penetration testing is therefore recommended. The flaw hypothesis methodology, used in this thesis, represen...

متن کامل

Availability evaluation of Software architecture of object oriented Style using coloured Petri nets

Software architecture is one of the most fundamental products in the process of software development in the areas of behavioral or non- behavioral features like availability or transformability change. There are different ways to evaluate software architecture one of which is the creation of application model. An executable model of software architecture is an official description of architectu...

متن کامل

Security Analysis of Session Initiation Protocol - a Methodology Based on Coloured Petri Nets

In recent years Voice over Internet Protocol (VoIP) has become a popular multimedia application over the Internet. At the same time critical security issues in VoIP have started to emerge. The Session Initiation Protocol (SIP) is a predominant signalling protocol for VoIP. It is used to establish, maintain and terminate VoIP calls, playing a crucial role in VoIP. This paper is aimed at developi...

متن کامل

Analysing the WAP Class 2 Wireless Transaction Protocol Using Coloured Petri Nets

Coloured Petri nets (CPNs) are used to specify and analyse the Class 2 Wireless Transaction Protocol (WTP). The protocol provides a reliable request/response service to the Session layer in the Wireless Application Protocol (WAP) architecture. When only a single transaction is considered occurrence graph and language analysis reveals 3 inconsistencies between the protocol and service speci cati...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007