FOUNDATION FOR INTELLIGENT PHYSICAL AGENTS
FIPA Abstract Architecture Specification
Document title |
FIPA Abstract Architecture Specification |
||
Document number |
PC00001H |
Document source |
FIPA TC Architecture |
Document status |
Preliminary |
Date of this status |
2000/11/10 |
Supersedes |
None |
||
Contact |
fab@fipa.org |
||
Change history |
|||
2000/02/15 |
While this is the first version of this document published under the new document control system, it is an update from earlier drafts of this document. The changes are Agent-directory-entry becomes directory-entry, Agent-name becomes FIPA-Entity-name, added transform-service for gateway support, new entity FIPA-Entity-Attributes and made Agent-platform a FIPA-Service; Remove references to future work. These will be published as soon as the FAB assigns a number for that document. |
||
2000/04/04 |
Removed all agent-platform constructs; Cleaned up various hanging references; Added service-references. |
||
2000/07/31 |
This revision restores the definitions of the actions supported by the directory and communication services. The transform-service material is withdrawn, since it seems premature (and possibly wrong) to assume that gateways are explicitly addressable entities. |
||
2000/08/03 |
Editorial changes for consistency with FIPA 2000 specifications |
||
2000/09/26 |
Exchanged position of Sections 4 and 5 to improve document flow. Made several minor revisions including completion of some description sections. |
||
2000/10/08 |
Removed all sections and references to FIPA-entity and FIPA-service. FIPA-Message changed to message. Update of some references and inclusion of some new ones. |
||
2000/10/18 |
Removal of explanatory/actual and single/functional element attributes. Inclusion of Themes section. Revision of some references. |
||
2000/11/08 |
Revision of UML diagrams, changes to Themes section and movement of 'Evolution' text to a subsection of section 2. |
||
2000/11/10 |
Addition of encoding-transform-service. |
© 2000 Foundation for Intelligent Physical Agents - http://www.fipa.org/
Geneva, Switzerland
Notice |
Use of the technologies described in this specification may infringe
patents, copyrights or other intellectual property rights of FIPA Members and
non-members. Nothing in this specification should be construed as granting
permission to use any of the technologies described. Anyone planning to make
use of technology covered by the intellectual property rights of others
should first obtain permission from the holder(s) of the rights. FIPA
strongly encourages anyone implementing any part of this specification to
determine first whether part(s) sought to be implemented are covered by the
intellectual property of others, and, if so, to obtain appropriate licenses
or other permission from the holder(s) of such intellectual property prior to
implementation. This specification is subject to change without notice.
Neither FIPA nor any of its Members accept any responsibility whatsoever for
damages or liability, direct or consequential, which may result from the use
of this specification. |
Foreword
The Foundation for Intelligent Physical Agents
(FIPA) is an international organization that is dedicated to promoting the
industry of intelligent agents by openly developing specifications supporting
interoperability among agents and agent-based applications. This occurs through
open collaboration among its member organizations, which are companies and
universities that are active in the field of agents. FIPA makes the results of
its activities available to all interested parties and intends to contribute
its results to the appropriate formal standards bodies.
The members of FIPA are individually and
collectively committed to open competition in the development of agent-based
applications, services and equipment. Membership in FIPA is open to any
corporation and individual firm, partnership, governmental body or
international organization without restriction. In particular, members are not
bound to implement or use specific agent-based standards, recommendations and
FIPA specifications by virtue of their participation in FIPA.
The FIPA specifications are developed through
direct involvement of the FIPA membership. The status of a specification can be
Preliminary, Experimental, Standard, Deprecated or Obsolete. More detail about the process of
specification may be found in the FIPA Procedures for Technical Work. A
complete overview of the FIPA specifications and their current status may be
found in the FIPA List of Specifications. A list of terms and abbreviations
used in the FIPA specifications may be found in the FIPA Glossary.
FIPA is a non-profit association registered in
Geneva, Switzerland. As of January 2000, the 56 members of FIPA represented 17 countries worldwide. Further
information about FIPA as an organization, membership information, FIPA
specifications and upcoming meetings may be found at http://www.fipa.org/.
Contents
2.2 Why an Abstract
Architecture?
2.3 Scope of the
Abstract Architecture
2.3.1 Areas that are not
Sufficiently Abstract
2.3.2 Areas for Future
Consideration
2.4 Going From
Abstract to Concrete Specifications
2.6 Status of the
Abstract Architecture
2.7 Evolution of the
Abstract Architecture
3 Themes of the Abstract Architecture
3.1 Focus on Agent
Interoperability
4.4 Agents Send
Messages to Other Agents
4.5 Providing Message
Validity and Encryption
4.6 Providing
Interoperability
5.1.1 Classification of
Elements
5.1.4 Format of Element
Description
5.2.2 Relationships to
Other Elements
5.3.2 Relationships to
Other Elements
5.4 Agent
Communication Language
5.4.2 Relationships to
Other Elements
5.5.2 Relationships to
Other Elements
5.6.2 Relationships to
Other Elements
5.7.2 Relationships to
Other Elements
5.8.2 Relationships to
Other Elements
5.9.2 Relationships to
Other Elements
5.10.2 Relationships to
Other Elements
5.11 Encoding
Transform Service
5.11.2 Relationships to
Other Elements
5.12.2 Relationship to
Other Elements
5.13.2 Relationship to
Other Elements
5.14.2 Relationships to
Other Elements
5.15.2 Relationships to
other elements
5.16 Message Transport
Service
5.16.2 Relationships to
Other Elements
5.17.2 Relationships to
Other Elements
5.18.2 Relationships to
Other Elements
5.19.2 Relationships to
Other Elements
5.20.2 Relationships to
Other Elements
5.21.2 Relationships to
Other Elements
5.22.2 Relationships to
Other Elements
5.23 Transport
Specific Properties
5.23.2 Relationships to
Other Elements
5.24.2 Relationships to
Other Elements
6 Agent and Agent Information Model
6.2 Transport Message
Relationships
6.3 Directory Entry
Relationships
6.5 Message Transport
Elements
7 Informative Annex A Goals of Message Transport Abstractions
7.3 Support for
Alternative Transports Within a Single System
7.4 Desirability of
Transport Agnosticism
7.5 Desirability of
Selective Specificity
7.6 Connection-Based,
Connectionless and Store-and-Forward Transports
7.7 Conversation
Policies and Interaction Protocols
7.8 Point-to-Point and
Multiparty Interactions
7.13 Interoperability
and Gateways
7.14 Reasoning about
Agent Communications
7.15 Testing,
Debugging and Management
9 Informative Annex B Goals of Directory Service Abstractions
9.2 Variety of
Directory Services
9.3 Desirability of
Directory Agnosticism
9.4 Desirability of
Selective Specificity
9.5 Interoperability
and Gateways
9.6 Reasoning about
Agent Directory
9.7 Testing, Debugging
and Management
10 Informative Annex C Goals for Abstract Agent Communication Language
10.1 Goals of This
Abstract Communication Language
10.3.1 Variety of Content
Languages
10.3.2 Content Languages
for FIPA
10.3.3 Small Content
Languages
10.3.4 Variety of Language
Expressions
11 Informative Annex D Goals for Security and Identity Abstractions
11.3.1 Content Validity and
Privacy During Message Transport
11.3.3 Agent Principal
Validation
11.3.4 Code Signing
Validation
11.4.2 Code or Data
Alteration
11.4.6 Misinformation
Campaigns
11.4.8 Spoofing and
Masquerading
11.5 Glossary of
Security Terms
This document, and the specifications that are derived from it, defines the FIPA Abstract Architecture. The parts of the FIPA abstract architecture include:
· A specification that defines architectural elements and their relationships (this document).
· Guidelines for the specification of agent systems in terms of particular software and communications technologies (Guidelines for Instantiation).
· Specifications governing the interoperability and conformance of agents and agent systems (Interoperability Guidelines).
See Section 2, Scope and Methodology for a fuller introduction to this document.
This document is organized into the following sections and a series of annexes.
· This Introduction.
· The Scope and methodology section explains the background of this work, its purpose, and the methodology that has been followed. It describes the role of this work in the overall FIPA work program and discusses both the current status of the work and way in which the document is expected to evolve.
· The Themes of the Abstract Architecture section that explains the style and the themes of the Abstract Architecture specification.
· The Architectural overview presents an overview of the architecture with some examples. It is intended to provide the appropriate context for understanding the subsequent sections.
· The Architectural Elements section comprises the FIPA architecture components.
· The Agent and Agent Information Model defines UML pattern relationships between Architectural Elements.
The annexes include:
·
Goals for message transport, directory
services, agent communication
language and security.
· Goals for directory service abstractions.
·
Goals of the Abstract ACL.
·
Goals for security and identity abstractions.
The primary audience for this document is developers of concrete specifications for agent systems specifications grounded in particularly technologies, representations, and programming models. It may also be read by the users of thee concrete specifications, including implementers of agent platforms, agent systems, and gateways between agent systems.
This document describes an abstract architecture for creating intentional multi-agent systems. It assumes that the reader has a good understanding about the basic principles of multi-agent systems. It does not provide the background material to help the reader assess whether multi-agent systems are an appropriate model for their system design, nor does it provide background material on topics such as Agent Communication Languages, BDI systems, or distributed computing platforms.
The abstract architecture described in this document will guide the creation of concrete specifications of different elements of the FIPA agent systems. The developers of the concrete specifications must ensure that their work conform to the abstract architecture in order to provide specifications with appropriate levels of interoperability. Similarly, those specifying applications that will run on FIPA compliant agent systems will need to understand what services and features that they can use in the creation of their applications.
This document was developed by members of FIPA TC A, the Technical Committee of FIPA charged with this work. Other FIPA Technical Committees also made substantial contributions to this effort, and we thank them for their effort and assistance.
This section provides a context for the Abstract Architecture, the scope of the work and methodology employed.
FIPAs goal in creating agent standards is to promote inter-operable agent applications and agent systems. In 1997 and 1998, FIPA issued a series of agent system specifications that had as their goal inter-operable agent systems. This work included specifications for agent infrastructure and agent applications. The infrastructure specifications included an agent communication language, agent services, and supporting management ontologies. There were also a number of application domains specified, such as personal travel assistance and network management and provisioning.
At the heart FIPAs model for agent systems is agent communication, where agents can pass semantically meaningful messages to one another in order to accomplish the tasks required by the application. In 1998 and 1999 it became clear that it would be useful to support variations in those messages:
· How those messages are transferred (that is, the transport).
· How those messages are represented (as strings, as objects, as XML).
· Optional attributes of those messages, such as how to authenticate or encrypt them.
It also became clear that to create agent systems, which could be deployed in commercial settings, it was important to understand and to use existing software environments. These environments included elements such as:
· Distributed computing platforms or programming languages,
· Messaging platforms,
· Security services,
· Directory services, and,
· Intermittent connectivity technologies.
FIPA was faced with two choices: to incrementally revise specifications to add various features, such as intermittent connectivity, or to take a more holistic approach. The holistic approach, which FIPA adopted in January of 1999, was to create an architecture that could accommodate a wide range of commonly used mechanisms, such as various message transports, directory services and other commonly, commercially available development platforms. For detailed discussions of the goals of the architecture, see:
·
Section
7, Informative
Annex A Goals of Message Transport
Abstractions.
· Section 9, Informative Annex B Goals of Directory Service Abstractions.
·
Section
10, Informative
Annex C Goals for Abstract Agent
Communication Language.
·
Section
11,
Informative Annex D Goals for Security and
Identity Abstractions.
These describe in greater detail the design considerations that were considered when creating this abstract architecture. In addition, FIPA needed to consider the relationship between the existing FIPA 97, FIPA 98 and FIPA 2000 work and the abstract architecture. While more validation is required, the FIPA 2000 work is in part a concrete realization of this abstract architecture. While one of the goals in creating this architecture was to maintain full compatibility with the FIPA 97 and 98 specifications, this was not entirely feasible, especially when trying to support multiple implementations.
Agent systems built according to FIPA 97 and 98 specifications will be able to inter-operate with agent systems built according to the abstract architecture through transport gateways with some limitations. The FIPA 2000 architecture is a closer match to the abstract architecture, and will be able to fully inter-operate via gateways. The overall goal in this architectural approach is to permit the creation of systems that seamlessly integrate within their specific computing environment while interoperating with agent systems residing in separate environments.
The first purpose of this work is to foster interoperability and reusability. To achieve this, it is necessary to identify the elements of the architecture that must be codified. Specifically, if two or more systems use different technologies to achieve some functional purpose, it is necessary to identify the common characteristics of the various approaches. This leads to the identification of architectural abstractions: abstract designs that can be formally related to every valid implementation.
By describing systems abstractly, one can explore the relationships between fundamental elements of these agent systems. By describing the relationships between these elements, it becomes clearer how agent systems can be created so that they are interoperable. From this set of architectural elements and relations one can derive a broad set of possible concrete architectures, which will interoperate because they share a common abstract design.
Because the abstract architecture permits the creation of multiple concrete realizations, it must provide mechanisms to permit them to interoperate. This includes providing transformations for both transport and encodings, as well as integrating these elements with the basic elements of the environment.
For example, one agent system may transmit ACL messages using the OMG IIOP protocol. A second may use IBMs MQ-series enterprise messaging system. An analysis of these two systems how senders and receivers are identified, and how messages are encoded and transferred allows us to arrive at a series of architectural abstractions involving messages, encodings, and addresses.
The primary focus of this abstract architecture is create semantically meaningful message exchange between agents which may be using different messaging transports, different Agent Communication Languages, or different content languages. This requires numerous points of potential interoperability. The scope of this architecture includes:
· Message transport interoperability.
· Supporting various forms of ACL representations.
· Supporting various forms of content language.
· Supporting multiple directory services representations.
It must be possible to create implementations that vary in some of these attributes, but which can still interoperate.
Some aspects of potential standardization are
outside of the scope of this architecture. There are three different reasons
why things are out of scope:
·
The area cannot
be described abstractly.
·
The area is not yet ready for standardization, or there
was not yet sufficient agreement about how to standardize it.
·
The area is
sufficiently specialized that it does not currently need standardization.
Some of the key areas that are not included in this architecture are:
·
Agent lifecycle
and management.
·
Agent mobility.
·
Domains.
·
Conversational
policy.
·
Agent Identity.
The next sections describe the rationale for
this in more detail. However, it extremely important to understand that the
abstract architecture does not prohibit additional features it merely
addresses how interoperable features should be implemented. It is anticipated
that over time some of these areas will be part of the interoperability of
agent systems.
An abstraction may not appear in the abstract architecture because is there is no clean abstraction for different models of implementation. Two examples of this are agent lifecycle management and security related issues.
For example, in examining agent lifecycle, it seems clear there are a minimum set of features that are required: Starting an agent, stopping an agent, "freezing" or "suspending" an agent, and "unfreezing" or "restarting" an agent. In practice, when one examines how various software systems work, very little consistency is detected inside the mechanisms, or in how to address and use those mechanisms. Although it is clear that concrete specifications will have to address these issues, it is not clear how to provide a unifying abstraction for these features. Therefore there are some architectural elements that can only appear at the concrete level, because the details of different environments are so diverse.
Security has similar issues, especially when trying to provide security in the transport layer, or when trying to provide security for attacks that can occur because a particular software environment has characteristics that permits that sort of attack. Agent mobility is another implementation specific model that cannot easily be modelled abstractly.
Both of these topics will be addressed in the Instantiation Guidelines, because they are an important part of how agent systems are created. However, they cannot be modelled abstractly, and are therefore not included at the abstract level of the architecture.
FIPA may address a number of areas of agent
standardization in the future. These include ontologies, domains, conversational
policies and mechanisms that are used to control systems (resource allocation
and access control lists), and agent identity. These all represent ideas
requiring further development.
This architecture does not address application interoperability. The current model for application interoperability is that agents that communicate using a shared set of semantics (such as represented by an ontology) can potentially interoperate. This architecture does not extend this model any further.
This document describes an abstract architecture. Such an architecture cannot be directly implemented, but instead the forms the basis for the development of concrete architectural specifications. Such specifications describe in precise detail how to construct an agent system, including the agents and the services that they rely upon, in terms of concrete software artefacts, such as programming languages, applications programming interfaces, network protocols, operating system services, and so forth.
In order for a concrete architectural specification to be FIPA compliant, it must have certain properties. First, the concrete architecture must include mechanisms for agent registration and agent discovery and inter-agent message transfer. These services must be explicitly described in terms of the corresponding elements of the FIPA abstract architecture. The definition of an abstract architectural element in terms of the concrete architecture is termed a realization of that element; more generally, a concrete architecture will be said to realize all or part of an abstraction.
The designer of the concrete architecture has considerable latitude in how he or she chooses to realize the abstract elements. If the concrete architecture provides only one encoding for messages, or only one transport protocol, the realization may simplify the programmatic view of the system. Conversely, a realization may include additional options or features that require the developer to handle both abstract and platform-specific elements. That is to say that the existence of an abstract architecture does not prohibit the introduction of elements useful to make a good agent system, it merely sets out the minimum required elements.
Figure 1: Abstract Architecture Mapped to Various Concrete Realizations
The abstract architecture also describes optional elements. Although an element is optional at the abstract level, it may be mandatory in a particular realization. That is, a realization may require the existence of an entity that is optional at the abstract level (such as a message-transport-service), and further specify the features and interfaces that the element must have in that realization.
It is also important to note that a realization can be of the entire architecture, or just one element. For example, a series of concrete specifications could be created that describe how to represent the architecture in terms of particular programming language, coupled to a sockets based message transport. Messages are handled as objects with that language, and so on.
On the other hand, there may be a single element that can be defined concretely, and then used in a number of different systems. For example, if a concrete specification were created for the directory-service element that describes the schemas to use when implemented in LDAP, that particular element might appear in a number of different agent systems.
Figure 2: Concrete Realizations Using a Shared Element Realization
In this example, the concrete realization of directory is to implement the directory services in LDAP. Several realizations have chosen to use this directory service model.
This abstract architecture was created by the use of UML modelling, combined with the notions of design patterns as described in [Gamma95]. Analysis was performed to consider a variety ways of structuring software and communications components in order to implement the features of an intelligent multi-agent system. This ideal agent system was to be capable of exhibiting execution autonomy and semantic interoperability based on an intentional stance. The analysis drew upon many sources:
· The abstract notions of agency and the design features that flow from this.
· Commercial software engineering principles, especially object-oriented techniques, design methodologies, development tools and distributed computing models.
· Requirements drawn from a variety of applications domains.
· Existing FIPA specifications and implementations.
· Agent systems and services, including FIPA and non-FIPA designs.
· Commercially important software systems and services, such as Java, CORBA, DCOM, LDAP, X.500 and MQ Series.
The primary purpose of this work is to foster interoperability and reusability. To achieve this, it is necessary to identify the elements of the architecture that must be codified. Specifically, if two or more systems use different technologies to achieve some functional purpose, it is necessary to identify the common characteristics of the various approaches. This leads to the identification of architectural elements: abstract designs that can be formally related to every valid implementation.
For example, one agent system may transmit ACL messages using the OMG IIOP protocol. A second may use IBMs MQ-series enterprise messaging system. An analysis of these two systems how senders and receivers are identified, and how messages are encoded and transferred allows us to arrive at a series of architectural abstractions involving messages, encodings, and addresses.
In some areas, the identification of common abstractions is essential for successful interoperation. This is particularly true for agent-to-agent message transfer. The end-to-end support of a common agent communication language is at the core of FIPA's work. These essential elements, that correspond to mandatory implementation specifications are here described as mandatory architectural elements. Other areas are less straightforward. Different software systems, particularly different types of commercial middleware systems, have specialized frameworks for software deployment, configuration, and management, and it is hard to find common principles. For example, security and identity remain tend to be highly dependent on implementation platforms. Such areas will eventually be the subjects of architectural specification, but not all systems will support them. These architectural elements are optional.
This document models the elements and their relationships. In Section 3, Themes of the Abstract Architecture there is an holistic overview of the architecture. In Section 4, Architectural Overview there is a structural overview of the architecture. In Section 5, Architectural Elements, each of the architectural elements is described. In Section 6, Agent and Agent Information Model there are diagrams in UML notation to describe the relationships between the elements.
There are several steps in creating the abstract architecture:
1. Modelling of the abstract elements and their relationships.
2. Representing the other requirements on the architecture that cannot be modelled abstractly.
3. Describing interoperability points.
This document represents the first item in the list. It is nearing completion, and ready for review.
The second step is satisfied by guidelines for instantiation. This document will not be written until at least one implementation based on the abstract architecture has been created, as it is desirable to base such a document on actual implementation experience.
Interoperability points and conformance are defined by specific interoperability profiles. These profiles will be created as required during the creation of concrete specifications.
It is important that a document such as this be able to change to reflect new technologies and software engineering practices, and to correct errors, mistakes or poor choices. However extreme care must be taken when proposing any change, since an ill-considered change could, in principle, invalidate all concrete architectural specifications which are based upon this document.
For this reason it is recommended that new architectural elements be introduced only after they have been the subjects of substantial practical experience. When in doubt, new elements should be proposed as optional elements, and restricted to mutually consenting platform implementations. New properties and relationships for existing architectural elements must be introduced in a backward-compatible fashion; specifically, the change must support (and require) that all concrete implementations can incorporate the change in a backward compatible manner.
Much of our understanding about how to extend the FIPA architecture will depend on the use of experimental systems. It is useful to be able to deploy and test such systems without breaking "production" systems based on FIPA standard specifications. FIPA may elect to define specific ontologies or extend existing architectural elements in order to support experimental features in a well-behaved fashion. (A parallel may be drawn with the use of RFC-822 email systems, in which experimental elements may be introduced provided that they use names that begin "X-".)
One of the challenges involved in creating the current set of abstractions is drawing the line between elements that belong in the abstract architecture and those which belong in concrete instantiations of the architecture. As FIPA creates several concrete specifications, and explores the mechanisms required to properly manage interoperation of these implementations, some features of the concrete architectures may be abstracted and incorporated in the FIPA abstract architecture. Likewise, certain abstract architectural elements may eventually be dropped from the abstract architecture, but may continue to exist in the form of concrete realizations.
The current placement of various elements as mandatory or optional is somewhat tentative. It is possible that some elements that are currently optional will, upon further experience in the development of the architecture become mandatory.
The overall approach of the abstract architecture is deeply rooted in object-oriented design, including the use of design patterns and UML modelling. As such, the natural way to envision the elements of the architecture is as a set of abstract object classes that can act as the input to the high level design of specific implementations.
Although the architecture explicitly avoids any specific model of composing its elements, its natural expression is a set of object classes comprising an agent platform that supports agents and services.
The following diagram depicts the hierarchical relationships between the abstraction defined by this document and the elements of a specific instantiation:
Figure 3: Relationship between Abstract and Concrete Architecture Elements
Several themes pervade the architecture; these capture the interaction between elements and their intended use.
The first theme is of opaque typed elements, which can be understood by specific implementations of a service. For example, the details of each transport description are opaque to other layers of the system. The transport descriptor provides a transport type, such as fipa-tcpip-raw-socket which acts to select the specific transport service that can interpret the transport-specific-address. Thus, a given address element, opaque to other portions of the system, might be foo.bar.baz.com:1234 which would be readily understood by the above transport service. Opaque typed elements are used in both message encoding and directory services.
This theme leads to an elegant solution for extensibility. Additional implementations of a service may be dynamically added to an environment by defining a new opaque typed element and associating it with the new service. For example, it may be required that a transport mechanism such as the Simple Object Access Protocol (SOAP) be supported within the environment. The transport type ontology would be extended to include a new term, fipa-soap-v1. Note that this resembles a polymorphic type scheme.
A second repeated theme is the creation of an association (in the form of a contract) between an agent and a service, such that the agent may then use the service through a returned handle. Note that this theme is intentionally well suited for implementation through the factory design patterns.
For those familiar with the "design pattern" approach to describing system structure, these themes may be naturally implemented using the factory pattern.
The Abstract Architecture focuses on core interoperability between agents. These include:
·
Managing
multiple message transport schemes,
·
Managing
message encoding schemes, and,
·
Locating
agents and services via directory services.
The Abstract Architecture explicitly avoids issues internal to the structure of an agent. It also largely defers details of agent services to more concrete architecture documents.
After reading through the abstract architecture, many readers may feel that it lacks a number of elements they would have expected to be included. Examples include the notion of an "agent-platform," "gateways" between agent systems, bootstrapping of agent systems and agent configuration and coordination.
These elements are not included in the abstract architecture because they are inherently coupled with specific implementations of the architecture, rather than across all possible implementations. The forthcoming document "Concrete Architectural Elements" will describe many of these elements in terms of specific environments. Beyond this, some elements will exist only in specific instantiations.
In order to further illuminate the intended use of the architectural elements, let us consider an agent platform, implemented in an object oriented environment. The system uses the components of the abstract architecture to implement two separate object factories; a transport factory and an encoding factory. A directory service is also provided, with access through a static object.
Agents in the environment are constructed as objects, each running on a permanent thread. Each has access to the two agent factories, as well as the directory service.
When an agent wants to send a message to another agent, it uses the directory service to obtain a set of transport-descriptors for the agent. It then passes these transport-descriptors to the transport factory, which returns a transport-handle. It should be noted that the transport factory and handle are not parts of the abstract architecture, but rather artefacts of the specific implementation. The agent then uses an encoder provided by the encoding factory, to transform the message into the desired encoding. Finally it transfers this encoded message to the recipient via the selected transport.
The FIPA architecture defines at an abstract level how two agents can locate and communicate with each other by registering themselves and exchanging messages. To do this, a set of architectural elements and their relationships are described. In this section the basic relationships between the elements of the FIPA agent system are described. In Section 5, Architectural Elements and Section 6, Agent and Agent Information Model, there are descriptions of each element (including mandatory or optional status) and UML Models for the architecture, respectively.
This section gives a relatively high level description of the notions of the architecture. It does not explain all of the aspects of the architecture. Use this material as an introduction, which can be combined with later sections to reach a fuller understanding of the abstract architecture.
Agents communicate by exchanging messages which represent speech acts, and which are encoded in an agent-communication-language.
Services provide support services for agents. This version of the Abstract Architecture defines two support services: directory-services and message-transport-services.
Services may be implemented either as agents or as software that is accessed via method invocation, using programming interfaces such as those provided in Java, C++, or IDL. An agent providing a service is more constrained in its behaviour than a general-purpose agent. In particular, these agents are required to preserve the semantics of the service. This implies that these agents do not have the degree of autonomy normally attributed to agents. They may not arbitrarily refuse to provide the service.
It should be noted that if services are implemented as agents there are potential problems that may arise with discovering and communicating with these services. The resolution of these issues is beyond the scope of this document.
The basic role of the directory-service function is to provide a location where agents register directory-entries. Other agents can search the directory-entries to find agents with which they wish to interact.
The directory-entry is a key-value-tuple consisting of at least the following two key-value-pairs:
Agent-name |
A
globally unique name for the agent |
Locator |
One or more transport-descriptors that describe the transport-type and the transport-specific-address to use to communicate with that agent |
In addition the directory-entry may contain other descriptive attributes, such as the services offered by the agent, cost associated with using the agent, restrictions on using the agent, etc.
Note that the keys agent-name and locator are short-form for the fully qualified names in the FIPA controlled namespace. See Section 5.1.2, Key-Value Tuples for further details.
Agent A wishes to advertise itself as a provider of some service. It first binds itself to one or more transports. In some implementations it will delegate this task to the message-transport-service; in others it will handle the details of, for example, contacting an ORB, or registering with an RMI registry, or establishing itself as a listener on a message queue. As a result of these actions, the agent is addressable via one or more transports.
Having established bindings to one or more transport mechanisms, the agent must advertise its presence. The agent realizes this by constructing a directory-entry and registering it with the directory-service. The directory-entry includes the agents name, its transport addressing information, and optional attributes that describe the service. For example, a stock service might advertise itself in abstract terms as {agent-service, "com.dowjones.stockticker"} and {ontology, org.fipa.ontology.stockquote}[1].
Figure 4: An Agent Registers with a Directory Service
Agents can use the directory-service to locate other agents with which to communicate. With reference to Figure 5, if agent B is seeking stock quotes, it may search for an agent that advertises use of the stockquote ontology. Technically, this would involve searching for a directory-entry that includes the key-value-pair {ontology, {com, dowjones, ontology, stockquote}}. If it succeeds it will retrieve the directory-entry for agent A. It might also retrieve other directory-entries for agents that support that ontology.
Figure 5: Directory Query
Agent B can then examine the returned directory-entries to determine which agent best suits its needs. The directory-entries include the agent-name, the locator, which contains information related to how to communicate with the agent, and other optional attributes.
In FIPA agent systems agents communicate with one another, by sending messages. Two fundamental aspects of message communication between agents are the message structure and the message transport.
The structure of a message is a key-value-tuple (see Section 5.1.2, Key-Value Tuples) and is written in an agent-communication-language, such as FIPA ACL. The content of the message is expressed in a content-language, such as KIF or SL. The content-language may reference an ontology, which grounds the concepts being discussed in the content. The messages also contain the sender and receiver names, expressed as agent-names. Agent-names are globally unique name identifiers for an agent.
Messages can recursively contain other messages.
When a message is sent it is transformed into a payload, and included in a transport-message. The payload is encoded using the encoding-representation appropriate for the transport. For example, if the message is going to be sent over a low bandwidth transport (such a wireless connection) a bit efficient representation may used instead of a string representation to allow more efficient transmission.
The transport-message itself is the payload plus the envelope. The envelope includes the sender and receiver transport-descriptions. The transport-descriptions contain the information about how to send the message (via what transport, to what address, with details about how to utilize the transport). The envelope can also contain additional information, such as the encoding-representation, data related security, and other realization specific data that needs be visible to the transport or recipient.
Figure 7: A Message Becomes a Transport-message
In the above diagram, a message is transformed into a payload suitable for transport over the selected message-transport. An appropriate envelope is created that has sender and receiver information that uses the transport-description data appropriate to the transport selected. There may be additional envelope data also included. The combination of the payload and envelope is termed as a transport-message.
In FIPA agent systems agents are intended to communicate with one another. Hence, here are some of the basic notions about agents and their communications:
Each agent
has an agent-name. This agent-name is unique and unchangeable.
Each agent also has one or more transport-descriptions, which are used
by other agents to send a transport-message.
Each transport-description
correlates to a particular form of message transport,
such as IIOP, SMTP, or HTTP. A transport
is a mechanism for transferring messages. A
transport-message is a message that sent from one agent to another in a
format (or encoding) that is appropriate to the transport being used. A set of transport-descriptions
can be held in a locator.
For example, there may be an agent with the agent-name "ABC". This agent is addressable through two different transports, HTTP, and an SMTP e-mail address. Therefore, the agent has two transport-descriptions, which are held in the locator. The transport descriptions are as follows:
Directory
entry for ABC
Agent-name: ABC
Locator:
Transport-type
|
Transport-specific-address |
Transport-specific-property |
HTTP |
http://www.whiz.net/abc |
(none) |
SMTP |
Abc@lowcal.whiz.net |
(none) |
Agent-attributes: Attrib-1: yes
Attrib-2: yellow
Language: French, German, English
Preferred negotiation: contract-net
Note: in this example, the agent-name is used as part of the transport-descriptions. This is just to make these examples easier to read. There is no requirement to do this.
Another agent can communicate with agent "ABC" using either transport-description, and thereby know which agent it is communicating with. In fact, the second agent can even change transports and can continue its communication. Because the second agent knows the agent-name, it can retain any reasoning it may be doing about the other agent, without loss of continuity.
Figure 8: Communicating Using Any Transport
In the above diagram, Agent 1234 can communicate with Agent ABC using either an SMTP transport or an HTTP transport. In either case, if Agent 1234 is doing any reasoning about agents that it communicates with, it can use the agent-name "ABC" to record which agent it is communicating with, rather than the transport description. Thus, if it changes transports, it would still have continuity of reasoning.
Heres what the messages on the two different transports might look like:
Figure 9: Two Transport-Messages to the Same Agent
In the diagram above, the transport-description is different, depending on the transport that is going to be used. Similarly, the message-encoding of the payload may also be different. However, the agent-names remain consistent across the two message representations.
There are many aspects of security that can
be provided in agent systems. See Section
11,
Informative Annex D Goals for Security and Identity Abstractions for a discussion of
possible security features. In this abstract architecture, there is a simple
form of security: message validity and message encryption. In message validity,
messages can be sent in such a way that any modification during transmission is
identifiable. In message encryption, a message is sent in encrypted form such
that non-authorized entities cannot comprehend the message content.
In the abstract architecture these features are accommodated through encoding-representations and the use of additional attributes in the envelope. For example, as the payload is transformed, one of the transformations could be to a digitally encrypted set of data, using a public key and preferred encryption algorithm. Additional parameters are added to the envelope to indicate these characteristics.
Figure 10: Encrypting a Message Payload
In the above diagram, the payload is encrypted, and additional attributes added to the envelope to support the encryption. These attributes must remain unencrypted in order that the receiving party be able to use them.
There are two ways in which the abstract architecture makes provision for interoperability. The first is transport interoperability. The second is message representation interoperability.
To provide interoperability, there are certain elements that must be included throughout the architecture to permit multiple implementations. For example, earlier it was noted that an agent has both an agent-name and a locator. The locator contains transport-descriptions, each of which contains information necessary for a particular transport to send a message to the corresponding agent. The semantics of agent communication require that an agents name be preserved throughout its lifetime, regardless of what transports may be used to communicate with it.
The elements of the abstract architecture are defined here. For each element, the semantics are described informally followed by the relationships between the element and others.
The word element is used here to indicate an item or entity that is part of the architecture, and participates in relationships with other elements of the architecture.
The architectural elements are classified as mandatory or optional. Mandatory elements must appear in all instantiations of the FIPA abstract architecture. They describe the fundamental services, such as agent registration and communications. These elements are the core aspects of the architecture. Optional elements are not mandatory; they represent architecturally useful features that may be shared by some, but not all, concrete instantiations. The abstract architecture only defines those optional elements that are highly likely to occur in multiple instantiations of the architecture.
These descriptors and classifications are summarised in Table 1.
Word |
Definition |
Can, May |
In relationship descriptions, the word can or may is used to indicate this is an optional relationship. For example, a service may provide an API invocation, but it is not required to do so. |
Element, or architectural element |
A member of this abstract architecture. The word element is used here to indicate an item or entity that is part of the architecture, and participates in relationships with other elements of the architecture. |
Mandatory |
Description of an element or relationship. Required in all fully functional implementations of the FIPA Abstract Architecture. |
Must |
In relationship descriptions, the word must is used to indicate this is a mandatory relationship. For example, an agent must have an agent-name means that an agent is required to have an agent-name. |
Optional |
Description of an element or relationship. May appear in any implementation of the FIPA Abstract Architecture, but is not required. Functionality that is common enough that it was included in model. |
Realize, realization |
To create a concrete specification or instantiation from the abstract architecture. For example, there may be a design to implement the abstract notion of directory-services in LDAP. This could also be said that there is a realization of directory-services. |
Relationship |
A connection between two elements in the architecture. The relationship between two elements is named (for example "is an instance of", "sends message to") and may have other attributes, such as whether it is required, optional, one-to-one, or one-to-many. The term as used in this document, is very much the way the term is used in UML or other system modelling techniques. |
Table
1: Terminology
Many of the elements of the abstract architecture are defined to be key-value-tuples, or KVTs. For example, an ACL message, its envelope, and agent descriptions are all KVTs. The concept of a KVT is central to the notion of architectural extensibility, and so it is discussed in some length here.
A KVT consists of an unordered set of key-value-pairs. Each key-value-pair has two elements, as the term implies. The first element, the key, is a pair-element drawn from an administered name space. All keys defined by the Abstract Architecture are drawn from a name space managed by FIPA. This makes it possible for concrete architectures, or individual implementations, to add new architectural elements in a manner which is guaranteed not to conflict with the Abstract Architecture. The second element of the key-value-pair is the value. The type of value depends on the key. In many cases, the value is another pair-element, an identifier drawn from a name-space. In other cases, the value is a constant or expression of some specific type.
The rest of this section describes the rules governing the names for keys and values.
Traditionally, pair-elements
have been treated as simple text strings. It is more useful to adopt a more
abstract model in which abstract identifiers and keywords may be encoded in a
variety of different ways.
It is also important that the FIPA elements represented as key-value-tuples should be extensible.
There are three types of extension that can be envisaged:
·
Official
FIPA sanctioned standard extensions,
·
Durable
vendor-specific extensions, and,
·
Temporary,
probably private, extensions.
The last of these has traditionally been addressed by using a
particular prefix string ("X-").
Every pair-element is an ordered tuple of tokens. This tuple denotes a name within a hierarchical namespace,
in which the first token in the
tuple is at the highest level in the hierarchy and the rightmost is the leaf.
Examples of tuples are:
{org, fipa, standard, ontology, foo}
{com, sun, java, agent, performative, brainwash}
{x, cc}
{protocol}
A pair-element
containing more than one token is a qualified-element. In a qualified-element, the left-most token must correspond to one of the
top-level ICANN domain names, or to an anonymous-token.
The latter is used to introduce temporary, experimental qualified-elements.
If a pair-element
contains only one token, it is an unqualified-element. An unqualified-element is interpreted as
though its token were appended to a
tuple of tokens defining a FIPA standard name space, as follows:
·
An
unqualified-element, x, which is a key in a transport-message
is equivalent to the name {org, fipa, standard,
message, x}.
· An unqualified-element, x, which is a key in an agent-description is equivalent to the name {org, fipa, standard, agent-description, x}.
·
An unqualified-element, x, which is a value in a key-value-pair in which the key is drawn from a namespace rooted at
{org, fipa, standard} is equivalent to the tuple formed by appending x
to the (fully-qualified) key.
For example, the pair-element
{ {ontology}, {foo} }
is equivalent to,
{ {org, fipa, standard, message, ontology}, {org, fipa, standard,
message, ontology, foo} }
The natural encoding of a pair-element
is as a sequence of text strings separated by dots. Thus the pair-element
{ {org, fipa,
standard, message, ontology}, {org, fipa, standard, message, ontology, foo} },
will naturally be encoded as
org.fipa.standard.message.ontology
org.fipa.standard.message.ontology.foo
A service is defined in terms of a set of actions that it supports. Each action defines an interaction between the service and the agent using the service. The semantics of these actions are described informally, to minimize assumptions about how they might be reified in a concrete specification.
The architectural elements are described below. The format of the description is:
· Summary. A summary of the element.
· Relationship to other elements. A complete description of the relationship of this element to the other architectural elements.
·
Actions. In the case of mandatory services,
the actions that may be exerted by that service are described.
· Description. Additional description and context for the element, along with explanatory notes and examples.
Element |
Description |
Presence |
Action-status |
A status indication delivered by a service showing the success or failure of an action. |
Mandatory |
Agent |
A computational process that implements the autonomous, communicating functionality of an application. |
Mandatory |
Agent-attributes |
A set of properties associated with an agent by inclusion in its directory-entry. |
Optional |
Agent-name |
An opaque, non-forgeable token that uniquely identifies an agent. |
Mandatory |
Agent-communication-language |
A language with a precisely defined syntax
semantics and pragmatics, which is the basis of communication between
independently designed and developed agents. |
Mandatory |
Content |
Content is that part of a communicative act that represents the domain dependent component of the communication. |
Mandatory |
Content-language |
A language used to express the content of a communication between agents. |
Mandatory |
Directory-entry |
A composite entity containing the name, locator, and agent-attributes of a agent |
Mandatory |
Directory-service |
A service providing a shared information repository in which directory-entries may be stored and queried |
Mandatory |
Encoding-representation |
A way of representing an abstract syntax in a particular concrete syntax. Examples of possible representations are XML, FIPA Strings, and serialized Java objects. |
Mandatory |
Envelope |
That part of a transport-message containing information about how to send the message to the intended recipient(s). May also include additional information about the message encoding, encryption, etc. |
Mandatory |
Explanation |
An encoding of the reason for a particular action-status. |
Optional |
Locator |
A locator consists of the set of transport-descriptions used to communicate with an agent. |
Mandatory |
Message |
A unit of communication between two agents. A message is expressed in an agent-communication-language, and encoded in an encoding-representation. |
Mandatory |
Encoding-transform-service |
A service that transforms a message or payload from one encoding-representation to another. |
Mandatory |
Message-transport-service |
A service that supports the sending and receiving of transport-messages between agents. |
Mandatory |
Ontology |
A set of symbols together with an associated interpretation that may be shared by a community of agents or software. An ontology includes a vocabulary of symbols referring to objects in the subject domain, as well as symbols referring to relationships that may be evident in the domain. |
Optional |
Payload |
A message encoded in a manner suitable for inclusion in a transport-message. |
Mandatory |
Service |
A service provided for agents and other services. |
Optional |
Transport |
A transport
is a particular data delivery service supported by a given message-transport-service. |
Mandatory |
Transport-description |
A transport-description is a self describing structure containing a transport-type, a transport-specific-address and zero or more transport-specific-properties. |
Mandatory |
Transport-message |
The object conveyed from agent to agent. It contains the transport-description for the sender and receiver or receivers, together with a payload containing the message. |
Mandatory |
Transport-specific-property |
A transport-specific-property is a property associated with a transport-type. |
Optional |
Transport-type |
A transport-type describes the type of transport associated with a transport-specific-address. |
Mandatory |
Table 2: Abstract Elements
An agent is a computational process that implements the autonomous, communicating functionality of an application. Typically, agents communicate using an Agent Communication Language. A concrete instantiation of agent is a mandatory element of every concrete instantiation of the abstract architecture.
Agent is an instance of agent
Agent has an agent-name
Agent may have agent-attributes
Agent has a locator, which lists the transport-descriptions for that agent
Agent may be sent messages via a transport-description, using the transport corresponding to the transport-description
Agent may send a transport-message
to one or more agents
Agent
may register with one or more directory-services
Agent
may have a
directory-entry, which is registered with a directory-service
Agent may modify its directory-entry as registered by a directory-service
Agent may delete its directory-entry from a directory-service.
Agent may query for a directory-entry
registered within a directory-service
Agent is addressable by the mechanisms
described in its transport-descriptions in
its directory-entry.
In a concrete instantiation of the abstract architecture, an agent may be realized in a variety of ways, for example as a Java component, a COM object, a self-contained Lisp program, or a TCL script. It may execute as a native process on some physical computer under an operating system, or be supported by an interpreter such as a Java Virtual Machine or a TCL system. The relationship between the agent and its computational context is specified by the agent lifecycle. The abstract architecture does not address the lifecycle of agents as it is often handled differently in discrete computational environments. Realizations of the abstract architecture must address these issues.
The agent-attributes are optional attributes that are part of the directory-entry for an agent. They are represented as key-value-pairs within the key-value-tuple that makes up the directory-entry. The purpose of the attributes is to allow searching for directory-entries that match agents of interest. A concrete instantiation of agent-attributes is an optional element of concrete instantiations of the abstract architecture.
A directory-entry may have zero or more agent-attributes
Agent-attributes describe aspects of an agent
When an agent registers a directory-entry, the directory-entry may optionally contain key-value-pairs that offer additional description of the agent. The values might include information about costs of using the agent or service, features available, ontologies understood, names that the service is commonly known by, or any other data that agents deem useful. This information can then be used to enhance search criteria exerted by agents on the directory-service.
In practice, when defining realizations of this abstract architecture, domain specific specifications should exist describing the agent-attributes to be used. This eases requirements for interoperation.
An agent-communication-language (ACL) is a language in which communicative acts can be expressed. The FIPA architecture is defined in terms of an Abstract ACL (see Section 10). An abstract syntax is a syntax in which the underlying operators and objects of a language are exposed, together with a set of precise semantics for those entities.
The primary role of an abstract syntax is to highlight the semantic meaning of constructs in the language at the possible expense of legibility and convenience of expression.
A concrete instantiation of agent-communication-language is a mandatory element of every concrete instantiation of the abstract architecture.
Message is written in an agent-communication-language
The FIPA 2000 ACL is described in detail in [FIPA00061] and [FIPA00037].
An agent-name is a means to identify an agent to other agents and services. It is expressed as a key-value-pair, is unchanging (that is, it is immutable), and unique under normal circumstances of operation. A concrete instantiation of agent-name is a mandatory element of every concrete instantiation of the abstract architecture.
Agent has one agent-name
Message must contain the agent-names of the sending and receiving agents
Directory-entry must contain the agent-name of the agent to which it refers
An agent-name is an identifier (a GUID, globally unique identifier) that is associated with the agent at creation time or initial registration. Name issuing should occur in a way that tends to ensure global uniqueness. This may be achieved, for example, through employing an algorithm that generates the name with a sufficient degree of stochastic complexity such as to induce a vanishingly small chance of a name collision.
The agent-name will typically be issued by another entity or service. Once issued, the unique identifier should not be dependent upon the continued existence of the third party that issued it. Ideally through, there will be some mechanism available that is capable of verifying name authenticity.
Beyond this durable relationship with the agent it denotes, the agent-name should have no semantics. It should not encode any actual properties of the agent itself, nor should it disclose related information such as agent transport-description or location. It should also not be used as a form of authentication of the agent. Authentication services must rely on the combination of a unique identifier plus additional information (for example, a certificate that makes the name tamper-proof and verifies its authenticity through a trusted third party).
A useful role of an agent-name is to support the use of BDI (belief/desire/intention) models within a multi-agent system. The agent-name can be used to correlate propositional attitudes with the particular agents that are believed to hold those attitudes.
Agents may also have "well-known" or "common" or "social" names, or "nicknames", or aliases by which they are popularly known. These names are often used to commonly identify an agent. For example, within an agent system, there may be a broker service for finding "air-fare" agents. The convention within this system is that this agent is nicknamed "Air-fare broker". In practice, this is implemented as an agent-attribute. The attribute could have the key "Nickname" with the value "Air-fare broker". However, the actual name of the agent providing the function is unique, to maintain the ability to distinguish between an agent providing that function in one cluster of agents, and another agent providing the same function in a different cluster of agents.
Content is that part of a communicative act that represents the component of the communication that refers to a domain or topic area. Note that, "the content of a message" does not refer to "everything within the message, including the delimiters", as it does in some languages, but rather specifically to the domain specific component. In the ACL semantic model, a content expression may be composed from propositions, actions or terms. A concrete instantiation of content is a mandatory element of every concrete instantiation of the abstract architecture.
Content is expressed in a content-language
Content may reference one or more ontologies
Content is part of a message
A content-language is a language used to express the content of a communication between agents. FIPA allows considerable flexibility in the choice, form and encoding of a content language. However, content languages are required to be able to represent propositions, actions and terms (names of individual entities) if they are to make full use of the standard FIPA performatives. A concrete instantiation of content-language is a mandatory element of every concrete instantiation of the abstract architecture.
Content is expressed in a content-language
FIPA-SL is an example of a content-language
FIPA-RDF is an example of a content-language
FIPA-KIF is an example of a content-language
FIPA-CCL is an example of a content-language
The FIPA 2000 content language library is described in detail in [FIPA00007].
A directory-entry is a key-value tuple consisting of the agent-name, a locator, and zero or more agent-attributes. A directory-entry refers to an agent; in some implementations this agent will provide a service. A concrete instantiation of directory-entry is a mandatory element of every concrete instantiation of the abstract architecture.
Directory-entry contains the agent-name of the agent to which it refers
Directory-entry contains one locator of the agent to which it refers. The locator contains one or more transport-descriptions
Directory-entry is managed by and available from a directory-service
Directory-entry may contain agent-attributes
Different realizations that use a common directory-service, are strongly encouraged to adopt a common schema for storing directory-entries. (This in turn implies the use of a common representation for locators, transport-descriptions, agent-names, and so forth.)
Agents are not required to publish a directory-entry. It is possible for agents to communicate with agents that have provided a transport-description through a private mechanism. For example, an agent involved in a negotiation may receive a transport-description directly from the party with which it is negotiating. This falls outside the scope of the using the directory-services mechanisms.
A directory-service is a shared information repository in which agents may publish their directory-entries and in which they may search for directory-entries of interest. A concrete instantiation of directory-service is a mandatory element of every concrete instantiation of the abstract architecture.
Agent may register its directory-entry with a directory-service
Agent may modify its directory-entry as registered by a directory-service
Agent may delete its directory-entry from a directory-service
Agent may search for a directory-entry registered within a directory-service
A directory-service must accept valid, authorized requests to register, de-register, delete, modify and identify agent descriptions
A directory-service must accept valid, authorized requests for searching
A directory-service supports the following actions.
An agent may register a directory-entry with a directory-service. The semantics of this action are as follows:
The agent provides a directory-entry that is to be registered. In initiating the action, the agent may control the scope of the action. Different reifications may handle this in different ways. The action may be addressed to a particular instance of a directory-service, or the action may be qualified with some kind of scope parameter.
If the action is successful, the directory-service will return an action-status indicating success. Following a successful register, the directory-service will support legal modify, delete, and query actions with respect to the registered directory-entry.
If the action is unsuccessful, the directory-service will return an action-status indicating failure, together with an explanation. The range of possible explanations is, in general, specific to a particular reification. However a conforming reification must, where appropriate, distinguish between the following explanations:
· Duplicate. The new entry "clashed" with some existing directory-entry. Normally this would only occur if an existing directory-entry had the same agent-name, but specific reifications may enforce additional requirements.
· Access. The agent making the request is not authorized to perform the specified action.
· Invalid. The directory-entry is invalid in some way.
An agent may modify a directory-entry that has been registered with a directory-service. The semantics of this action are as follows:
The agent provides a directory-entry which contains the same agent-name as the entry to be modified. In initiating the action, the agent may control the scope of the action. Different reifications may handle this in different ways. The action may be addressed to a particular instance of a directory-service, or the action may be qualified with some kind of scope parameter.
The directory-service verifies that the argument is a valid directory-entry. It then searches for a registered directory-entry with the same agent-name. If it does not find one, the action fails and an explanation provided. Otherwise it modifies the existing directory-entry by examining each key-value pair in new directory-entry. If the value is non-null, the pair is added to the new entry, replacing any existing pair with the same key. If the value is null, any existing pair with the same key is removed from the entry.
If the action is successful, the directory-service will return an action-status indicating success, together with a directory-entry corresponding to the new contents of the registered entry. Following a successful register, the directory-service will support legal modify, delete, and query actions with respect to the modified directory-entry.
If the action is unsuccessful, the directory-service will return an action-status indicating failure, together with an explanation. The range of possible explanations is, in general, specific to a particular reification. However a conforming reification must, where appropriate, distinguish between the following explanations:
· Not-found. The new entry did not match any existing directory-entry. This would only occur if no existing directory-entry had the same agent-name.
· Access. The agent making the request is not authorized to perform the specified action.
· Invalid. The new directory-entry is invalid in some way.
An agent may delete a directory-entry from a directory-service. The semantics of this action are as follows:
The agent provides a directory-entry which has the same agent-name as that which is to be deleted. (The rest of the directory-entry is not significant.) In initiating the action, the agent may control the scope of the action. Different reifications may handle this in different ways. The action may be addressed to a particular instance of a directory-service, or the action may be qualified with some kind of scope parameter.
If the action is successful, the directory-service will return an action-status indicating success. Following a successful delete, the directory-service will no longer support modify, delete, and query actions with respect to the registered directory-entry.
If the action is unsuccessful, the directory-service will return an action-status indicating failure, together with an explanation. The range of possible explanations is, in general, specific to a particular reification. However a conforming reification must, where appropriate, distinguish between the following explanations:
· Not-found. The new entry did not match any existing directory-entry. This would only occur if no existing directory-entry had the same agent-name.
· Access. The agent making the request is not authorized to perform the specified action.
· Invalid. The directory-entry is invalid in some way.
An agent may query a directory-service to locate directory-entries of interest. The semantics of this action are as follows:
The agent provides a directory-entry that is to be treated as a search pattern. In initiating the action, the agent may control the scope of the action. Different reifications may handle this in different ways. The action may be addressed to a particular instance of a directory-service, or the action may be qualified with some kind of scope parameter.
The directory service verifies that the argument is a valid directory-entry. It then searches for registered directory-entries that satisfy the search criteria. A registered entry satisfies the search criteria if there is a match between each key-value pair in the submitted entry. The semantics of "matching" are likely to be reification-dependent; at a minimum, there should be support for matching on the same value and on any value.
If the action is successful, the directory-service will return an action-status indicating success, together with a set of directory-entries that satisfy the search pattern. The mechanism by which multiple entries are returned, and whether or not an agent may limit or terminate the delivery of results, is not defined in the abstract architecture and is therefore reification dependent.
If the action is unsuccessful, the directory-service will return an action-status indicating failure, together with an explanation. The range of possible explanations is, in general, specific to a particular reification. However a conforming reification must, where appropriate, distinguish between the following explanations:
· Not-found. The search pattern did not match any existing directory-entry.
· Access. The agent making the request is not authorized to perform the specified action.
·
Invalid.
The directory-entry is invalid in
some way.
A directory-service may be implemented in a variety of ways, using a general-purpose scheme such as X.500 or some private agent-specific mechanism. Typically a directory-service uses some hierarchical or federated scheme to support scalability. A concrete implementation may support such mechanisms automatically, or may require each agent to manage its own directory usage.
Different realizations that are based on the same underlying mechanism are strongly encouraged to adopt a common schema for storing directory-entries. This in turn implies the use of a common representation for names, locations, and so forth. For example, considering multiple implementations of directory services in LDAP, it would be useful for all of the implementations to interoperate because they are using the same schemas. Similarly, if there were multiple implementations in NIS, they would need the same NIS data representation to interoperate.
An encoding-representation is a way of representing an abstract syntax in a particular concrete syntax. Examples of possible representations are XML, FIPA Strings, and serialized Java objects.
In principle, nested elements of the architecture may use different encodings, for example, a message may be encoded in XML and the resulting string used as the payload of a transport-message encoded as a CORBA object.
A concrete instantiation of encoding-representation is a mandatory element of every concrete instantiation of the abstract architecture.
Payload is encoded according to an encoding-representation.
Message is encoded according to an encoding-representation
Transport-message is encoded according to an encoding-representation
Content is encoded according to an encoding-representation
The way in which a message is encoded depends on the concrete architecture. If a particular architecture supports only one form of encoding, no additional information is required. If multiple forms of encoding are supported, messages may be made self-describing using techniques such as format tags, object introspection, and XML DTD references.
An encoding-transform-service is a service. It provides the facility to transform a transport-message, payload, message or content from one encoding-representation to another. A concrete instantiation of encoding-transform-service is a mandatory element of every concrete instantiation of the abstract architecture.
Encoding-transform-service converts one encoding-representation to another encoding-representation
Encoding-transform-service can
transform the encoding-representation of a transport-message
Encoding-transform-service can transform the encoding-representation of a payload
Encoding-transform-service can
transform the encoding-representation of a message
Encoding-transform-service can transform the encoding-representation of message content
Encoding-transform-service
is a service
An encoding-transform-service supports the following actions.
An agent may form a contract with the encoding-transform-service to convert one or more transport-messages or component thereof (i.e. payload, message or content), into a particular encoding-representation. It does this by invoking the transform-encoding action of the encoding-transform-service. The semantics of this action are as follows:
The agent provides the message component to be encoded to the encoding-transform-service, along with the type of encoding to be used. The encodings offered by the service may be queried using the query-available-encodings action described below. Encoding is context sensitive to ensure that appropriate encoding-representations are applied to specific message components. I.e. a message may be encoded in XML representation, but the payload that contains that message must be encoded for the transport to be used.
If the action is successful, the encoding-transform-service will return an action-status indicating success, together with the encoded message component.
If the action is unsuccessful, the encoding-transform-service will return an action-status indicating failure, together with an explanation. The range of possible explanations is, in general, specific to a particular reification. However a conforming reification must, where appropriate, distinguish between the following explanations:
· Access. The agent making the request is not authorized to perform the specified action.
· Invalid Message. The message component to be encoded is invalid in some way.
· Invalid Encoding. The encoding-representation selected is unavailable.
An agent may query the encoding-transform-service to resolve the encoding-representation with which the supplied message component has been encoded. It does this by invoking the query-encoding-representation action of the encoding-transform-service.
If the action is successful, the encoding-transform-service will return an action-status indicating success. Additionally, the encoding-representation identity is returned.
If the action is unsuccessful, the encoding-transform-service will return an action-status indicating failure, together with an explanation. The range of possible explanations is, in general, specific to a particular reification. However a conforming reification must, where appropriate, distinguish between the following explanations:
· Access. The agent making the request is not authorized to perform the specified action.
· Invalid. The encoded message component is invalid in some way.
· Unidentifiable. The encoding-representation is unidentifiable by the encoding-transform-service.
An agent may query the encoding-transform-service to provide a list of all encoding-representations known by the service. It does this by invoking the query-available-encodings action of the encoding-transform-service.
If the action is successful, the encoding-transform-service will return an action-status indicating success. Additionally, the available encoding-representations are supplied.
If the action is unsuccessful, the encoding-transform-service will return an action-status indicating failure, together with an explanation. The range of possible explanations is, in general, specific to a particular reification. However a conforming reification must, where appropriate, distinguish between the following explanations:
· Access. The agent making the request is not authorized to perform the specified action.
A concrete specification must realize a reification of the encoding-transform-service in order that agents can apply and decipher encoding-representations. The encoding-transform-service may be viewed as a 'factory' service that creates concrete instantiation of the transformation mechanism specific to a bi-directional translation between two encoding-representations. The transformation will be of one of two forms, depending on the encoding-representations employed. The first is the straightforward String-to-String encoding such as that required for many encryption and decryption schemes. The second is the more complex translation of String-to-ParseTree (and vice-versa) encoding required for such encoding-representations as XML.
An envelope is a key-value tuple that contains message delivery and encoding information. It is included in the transport-message, and includes elements such as the sender and receiver(s) transport-descriptions. It also contains the encoding-representation for the message and optionally, other message information such as validation and security data, or additional routing data. A concrete instantiation of envelope is a mandatory element of every concrete instantiation of the abstract architecture.
Envelope contains transport-descriptions
Envelope optionally contains validity data (such as security keys for message validation)
Envelope optionally contains security data (such as security keys for message encryption or decryption)
Envelope optionally contains routing data
Envelope contains an encoding-representation for the payload being transported
Envelope is contained in transport-message
In the realization of the envelope data, the realization can specify envelope elements that are useful in the particular realization. These can include specialized routing data, security related data, or other data that can assist in the proper handling of the encoded message.
An encoding of the reason for a particular action-status. When an action exerted by a service leads to a failure response, the explanation is an optional descriptor giving the reason why the particular action failed.
Explanation qualifies an action-status.
In terms of the two explicit services described by the abstract architecture, the directory-service and message-transport-service, the relevant action explanations are listed in the appropriate element subsections.
A locator consists of the set of transport-descriptions, which can be used to communicate with an agent. A locator may be used by a message-transport-service to select a transport for communicating with the agent, such as an agent or a service. Locators can also contain references to software interfaces. This can be used when a service can be accessed programmatically, rather than via a messaging model. A concrete instantiation of locator is a mandatory element of every concrete instantiation of the abstract architecture.
Locator is a member of directory-entry,
which is registered with a directory-service
A locator contains one or
more transport-descriptions
A locator is used by message-transport-service to select a transport
The locator serves as a basic building block for managing address and transport resolution. A locator includes all of the transport-descriptions that may be used to contact the related agent or service.
A message is an individual unit of communication between two or more agents. A message logically arises from and programmatically corresponds to a communicative act, in the sense that a message encodes the communicative act. Communicative acts can be recursively composed, so while the outermost act is directly encoded by the message, taken as a whole a given message may represent multiple individual communicative acts. Messages are encoded using an encoding-representation and transmitted between agents over a transport. A concrete instantiation of message is a mandatory element of every concrete instantiation of the abstract architecture.
A message includes an indication of the type of communicative act (for example, INFORM, REQUEST), the agent-names of the sender and receiver agents, the ontology to be used in interpreting the content, and the content of the message itself.
A message does not include any transport or addressing information. It is transmitted from sender to receiver by being encoded as the payload of a transport-message, which includes this information.
Message is written in an agent-communication-language
Message has content
Message has an ontology
Message includes an agent-name corresponding to the sender of the message
Message includes one or more agent-name corresponding to the receiver or receivers of the message
Message is sent by an agent
Message is received by one or more agents
Message is transmitted as the payload
of a transport-message
Message is encoded according to an encoding-representation
Message is encoded by an encoding-transform-service
The FIPA 2000 communicative acts library is described in detail in [FIPA00037].
A message-transport-service is a service. It supports the sending and receiving of transport-messages between agents. A concrete instantiation of message-transport-service is a mandatory element of every concrete instantiation of the abstract architecture.
Message-transport-service may be invoked
to send a transport-message to an agent
Message-transport-service selects a transport based on the recipient's transport-description
Message-transport-service is a service
A message-transport-service supports the following actions.
An agent may form a contract with the message-transport-service to send and receive messages using a particular transport. It does this by invoking the bind-transport action of the message-transport-service. The semantics of this action are as follows:
The agent provides a transport-description corresponding to the transport to be used. (In initiating the action, the agent may control the scope of the action. Different reifications may handle this in different ways. The action may be addressed to a particular instance of a directory-service, or the action may be qualified with some kind of scope parameter.) Some or all of the elements of the transport-description may be missing, in which case the transport-service may supply appropriate values. The transport-service attempts to create a usable transport-end-point for the chosen transport-type, and constructs a transport-specific-address corresponding to this end-point.
If the action is successful, the message-transport-service will return an action-status indicating such, together with a transport-description that has been completely filled in and is usable for message transport. The agent may use this transport-description as part of its agent-description, and in constructing a transport-message.
Following a successful bind-transport, the message-transport-service will attempt to deliver any messages received over the transport end-point to the agent.
If the action is unsuccessful, the message-transport-service will return an action-status indicating failure, together with an explanation. The range of possible explanations is, in general, specific to a particular reification. However a conforming reification must, where appropriate, distinguish between the following explanations:
· Access. The agent making the request is not authorized to perform the specified action.
· Invalid. The transport-description is invalid in some way.
An agent may terminate a contract with the message-transport-service to send and receive messages using a particular transport. It does this by invoking the unbind-transport action of the message-transport-service. The semantics of this action are as follows:
The agent provides a transport-description returned by a previous bind-transport action. (In initiating the action, the agent may control the scope of the action. Different reifications may handle this in different ways. The action may be addressed to a particular instance of a directory-service, or the action may be qualified with some kind of scope parameter.) The transport-service identifies the corresponding transport-end-point and releases all transport related resources.
If the action is successful, the message-transport-service will return an action-status indicating success. Additionally, the message-transport-service will no longer attempt to deliver any messages to the agents associated with the defunct transport binding.
If the action is unsuccessful, the message-transport-service will return an action-status indicating failure, together with an explanation. The range of possible explanations is, in general, specific to a particular reification. However a conforming reification must, where appropriate, distinguish between the following explanations:
· Not-found. The transport-description does not correspond to a bound transport.
· Access. The agent making the request is not authorized to perform the specified action.
· Invalid. The transport-description is invalid in some way.
An agent may send a transport-message to another agent by invoking the send-message action of a message-transport-service. The semantics of this action are as follows:
The agent provides a transport-message to be sent. The message-transport-service examines the envelope of the message to determine how it should be handled.
If the action is successful, the message-transport-service will return an action-status indicating success. Following a successful send-message, the message-transport-service will make attempt to deliver the message to the recipient. However the successful completion of the send-message action should not be interpreted as indicating that delivery has been achieved.
If the action is unsuccessful, the message-transport-service will return an action-status indicating failure, together with an explanation. The range of possible explanations is, in general, specific to a particular reification. However a conforming reification must, where appropriate, distinguish between the following explanations:
· Access. The agent making the request is not authorized to perform the specified action.
· Invalid. The transport-message is invalid in some way.
A message-transport-service may deliver a transport-message to an agent by invoking the deliver-message action of the agent. The semantics of this action are identical to those given for the bind-transport action.
A concrete specification need not realize the notion of message-transport-service so long as the basic service provisions are satisfied. In the case of a concrete specification based on a single transport, the agent may use native operating system services or other mechanisms to achieve this service.
Ontologies provide a vocabulary for representing and communicating knowledge about some topic and a set of relationships and properties that hold for the entities denoted by that vocabulary.
A concrete instantiation of ontology is an optional element of concrete instantiations of the abstract architecture.
Message has an ontology
Content
has one or more
ontologies
An ontology is a set of symbols together with an associated interpretation that may be shared by a community of agents or services. An ontology includes a vocabulary of symbols referring to objects and relationships in the subject domain. An ontology also typically includes a set of logical statements expressing the constraints existing in the domain and restricting the interpretation of the vocabulary.
Ontologies must be nameable, findable and manageable.
A payload is a message encoded in a manner suitable for inclusion in a transport-message. A concrete instantiation of payload is a mandatory element of every concrete instantiation of the abstract architecture.
Payload is an encoded message
Transport-message contains a payload
Payload is encoded according to an encoding-representation
See Section 5.22, Relationships to Other Elements which describes the transport-message.
A service is a functional coherent set of mechanisms that support the operation of agents, and other services. These are services used in the provisioning of agent environments and may be used as the basis for interoperation. A concrete instantiation of service is a mandatory element of every concrete instantiation of the abstract architecture.
Service has a public set of behaviours and actions
Service has a service description
Service can be accessed by agents
Directory-service is an instance of service, and is mandatory
Message-transport-service is an instance of service, and is mandatory
FIPA will administer the name space of services according to the description given in Section 5.1.2. This is part of the concrete realization process. Having a clear naming scheme for the services will allow for optimised implementation and management of services.
A transport is a particular data delivery service, such as a message transfer system, a datagram service, a byte stream, or a shared scratchboard. Abstractly, a transport is a delivery system selected by virtue of the transport-description used to deliver messages to an agent. A concrete instantiation of transport is a mandatory element of every concrete instantiation of the abstract architecture.
Transport-description can be mapped onto a transport
Message-transport-service may use one or more transports to effect message delivery
A transport
may support one or more transport-encodings
The mapping from transport-description to transport must be consistent across all realizations. FIPA will administer ontology of transport names. Concrete specifications should define a concrete encoding for this ontology.
A transport-description is a key-value tuple containing a transport-type, a transport-specific-address and zero or more transport-specific-properties. A concrete instantiation of transport-description is a mandatory element of every concrete instantiation of the abstract architecture.
Transport-description has a transport-type
Transport-description has a set of transport-specific-properties
Transport-description has a transport-specific-address
Directory-entries include one or more transport-descriptions
Envelopes contain one or more
transport-descriptions
Transport-descriptions are used in three places within the abstract architecture. They are included in the directory-service, describing where a registered agent may be contacted. They can be included in the envelope for a transport-message, to describe how to deliver the message. In addition, if a message-transport-service is implemented, transport-descriptions are used as input to the message-transport-service to specify characteristics for additional delivery requirements for the delivery of messages to an agent.
A transport-message is the object conveyed from agent to agent. It contains the transport-description for the sender and receiver together with a payload containing the message. A concrete instantiation of transport-message is a mandatory element of every concrete instantiation of the abstract architecture.
Transport-message contains one or more transport-descriptions for the receiving agents
Transport-message contains a payload
Transport-message contains an envelope
Transport-message is encoded according to an encoding-representation
A concrete implementation may limit the number of receiving transport-descriptions for a transport-message. It may also establish particular relationships between the agent-name or agent-names for the receiver in the payload. For example, it may ensure that there is a one-to-one correspondence between agent-names.
The important thing to convey from agent to agent is the payload, together with sufficient transport-message context to send a reply. A gateway service or other transformation mechanism may unpack and reformat a transport-message as part of its processing.
A transport-specific-property is property associated with a transport-type. These properties are used by the transport-service to help it in constructing transport connections, based on the properties specified. A concrete instantiation of transport-specific-property is a mandatory element of every concrete instantiation of the abstract architecture.
Transport-description includes zero or more transport-specific-properties
The transport-specific-properties are not required for a particular transport. They may vary between transports.
A transport-type describes the type of transport associated with a transport-specific-address. A concrete instantiation of transport-type is a mandatory element of every concrete instantiation of the abstract architecture.
Transport-description
includes a transport-type
FIPA will administer an ontology of transport-types. FIPA managed types will be flagged with the prefix of "FIPA-". Specific realizations can provide experimental types, which will be prefixed "X-"
This section of the abstract architecture provides a series of UML class diagrams for key elements of the abstract architecture. In Section 5, Architectural Elements you can get a textual description of these elements and other aspects of the relationships between them.
Comment on notation: In UML, the notion of a 1 to many or 0 to many relationship is often noted as "1 *" or "0 *". However, the tool that was used to generate these diagrams used the convention "1 n" and "0 n" to express the concept of many.
Figure 11 outlines the basic relationships between an agent and other key elements of the FIPA abstract architecture. In other diagrams in this section are provided details on the locator, and the transport-message.
Figure 11: UML - Basic Agent Relationships
Transport-message is the object conveyed from agent to agent. It contains the transport-description for the sender and receiver or receivers, together with a payload containing the message (see Figure 12).
Figure 12: UML - Transport-Message Relationships
The directory-entry contains the agent-name, locator and agent-attributes. The locator provides ways to address messages to an agent. It is also used in modifying transport requests (see Figure 13).
Figure 13: UML - Directory-entry and Locator Relationships
Figure 14 shows the elements in a Message. A Message is contained in a transport-message when messages are sent.
Figure 14: UML - Message Elements
The message-transport-service is an option service that can send transport-messages between agents. These elements may participate in other relationships as well (see Figure 15).
Figure 15: UML - Message-Transport Elements
In order to create abstractions for the various architectural elements, it is necessary to examine the kinds of systems and infrastructures that are likely targets of real implementations of the abstract architecture. In this section, we examine some of the ways in which concrete messaging and messaging transports may differ. Authors of concrete architectural specifications must take these issues into account when considering what end-to-end assumptions they can safely make. The goals describe below give the reader an understanding of the objectives the authors of the abstract architecture had in mind when creating this architecture.
There are a wide variety of transport services that may be used to convey a message from one agent to another. The abstract architecture is neutral with respect to this variety. For any instantiation of the architecture, one must specify the set of transports that are supported, how new transports are added, and how interoperability is to be achieved. It is permissible for a particular concrete architecture to require that implementations of that architecture must support particular transports.
Different transports use a variety of different address representations. Instantiations of the message transport architecture may support mechanisms for validating addresses, and for selecting appropriate transport services based upon the form of address used. It is extremely undesirable for an agent to be required to parse, decode, or otherwise rely upon the format of an address.
The following are examples of transport services that may be used to instantiate this abstract architecture:
· Enterprise message systems such as those from IBM and Tibco.
· A Java Messaging System (JMS) service provider, such as Fiorano.
· CORBA IIOP used as a simple byte stream.
· Remote method invocation, using Java RMI or a CORBA-based interface.
· SMTP email using MIME encoding.
· XML over HTTP.
· Wireless Access Protocol.
· Microsoft Named Pipes.
Many application programming environments offer developers a variety of network protocols and higher-level constructs from which to implement inter-process communications, and it is becoming increasingly common for services to be made available over several different communications frameworks. It is expected that some instantiations of the FIPA architecture will allow the developer or deployer of agent systems to advertise the availability of their services over more than one message transport.
For this reason, the notion of transport address is here generalized to that of destination. A destination is an object containing one or more transport addresses. Each address is represented in a format that describes (explicitly or implicitly) the set of transports for which it is usable. (The precise mapping from address to transport is left to the concrete specification, although in practice the mapping is likely to be one-to-one.)
In its simplest form, a destination may be a single address that unambiguously defines the transport for which it can be used.
The abstract architecture is consistent with concrete architectures which provide "transport agnostic" services. Such architectures will provide a programming model in which agents may be more or less aware of the details of transports, addressing, and many other communications-related mechanisms. For example, one agent may be able to address another in terms of some "social name", or in terms of service attributes advertised through the agent directory service without being aware of addressing format, transport mechanism, required level of privacy, audit logging, and so forth.
Transport agnosticism may apply to both senders and recipients of messages. A concrete architecture may provide mechanisms whereby an agent may delegate some or all of the tasks of assigning transport addresses, binding addresses to transport end-points, and registering addresses in white-pages or yellow-pages directories to the agent platform.
While transport agnosticism simplifies the development of agents, there are times when explicit control of specific aspects of the message transport mechanism is required. A concrete architecture may provide programmatic access to various elements in the message transport subsystem.
The abstract architecture is compatible with connection-based, connectionless, and store-and-forward transports. For connection-based transports, an instantiation may support the automatic reestablishment of broken connections. It is desirable than instantiations that implement several of these modes of operation should support transport-agnostic agents.
The abstract architecture specifies a set of abstract objects that allows for the explicit representation of "a conversation", i.e. a related set of messages between interlocutors that are logically related by some interaction pattern. It is desirable that this property be achieved by the minimum of overhead at the infrastructure or message level; in particular, it is important that interoperability remain un-compromised. For example, an implementation may deliver messages to conversation-specific queues based on an interpretation of the message envelope. To achieve interoperability with an agent that does not support explicit conversations (i.e. which does not allow individual messages to be automatically associated with a particular higher-level interaction pattern), it is necessary to specify the way in which the message envelope must be processed in order to preserve conversational semantics.
Note: in the practice, we were not able to fully meet this goal. It remains a topic of future work.
The abstract architecture supports both point-to-point and multiparty message transport. For point-to-point interactions, an agent sends a message to an address that identifies a single receiving agent. (An instantiation may support implicit addressing, in which the destination is derived from the name of the intended recipient agent without the explicit involvement of the sender.) For multiparty message transport, the address must identify a group of recipients. The most common model for such message transport is termed "publish and subscribe", in which the address is a "topic" to which recipients may subscribe. Other models, for example, "address lists", are possible.
Not all transport mechanisms support multiparty communications, and concrete architectures are not required to provide multiparty messaging services. Concrete architectures that do provide such services may support proxy mechanisms, so that agents and agent systems that only use point-to-point communications may be included in multiparty interactions.
Some commercial messaging systems support the notion of durable messages, which are stored by the messaging infrastructure and may be delivered at some later point in time. It is desirable that a message transport architecture should take advantage of such services.
The term quality of service refers to a collection of service attributes that control the way in which message transport is provided. These attributes fall into a number of categories:
· Performance,
· Security,
· Delivery semantics,
· Resource consumption,
· Data integrity,
· Logging and auditing, and,
· Alternate delivery.
Some of these attributes apply to a single message; others may apply to conversations or to particular types of message transport. Architecturally it is important to be able to determine what elements of quality of service are supported, to express (or negotiate) the desired quality of service, to manage the service features which are controlled via the quality of service, to relate the specified quality of service to a service performance guarantee, and to relate quality of service to interoperability specifications.
The abstract transport architecture supports the notion of anonymous interaction. Multiparty message transport may support access by anonymous recipients. An agent may be able to associate a transient address with a conversation, such that the address is not publicly registered with any agent management system or directory service; this may extend to guarantees by the message transport service to withhold certain information about the principal associated with an address. If anonymous interaction is supported, an agent should be able to determine whether or not its interlocutor is anonymous.
It is anticipated that FIPA will define multiple message encodings together with rules governing the translation of messages from one encoding to another. The message transport architecture allows for the development of instantiations that use one or more message encodings.
The abstract agent transport architecture supports the development of instantiations that use transports, encodings, and infrastructure elements appropriate to the application domain. To ensure that heterogeneity does not preclude interoperability, the developers of a concrete architecture must consider the modes of interoperability that are feasible with other instantiations. Where direct end-to-end interoperability is impossible, impractical or undesirable, it is important that consideration be given to the specification of gateways that can provide full or limited interoperability. Such gateways may relay messages between incompatible transports, may translate messages from one encoding to another, and may provide quality-of-service features supported by one party but not another.
The agent transport architecture supports the notion of agents communicating and reasoning about the message transport process itself. It does not, however, define the ontology or conversation patterns necessary to do this, nor are concrete architectures required to provide or accept information in a form convenient for such reasoning.
In general, issues of testing, debugging, and management are implementation-specific and will not be addressed in an abstract architecture. Individual instantiations may include specific interfaces, actions, and ontologies that relate to these issues, and may specify that these features are optional or normative for implementations of the instantiation.
[FIPA00007] FIPA Content Language Library
Specification. Foundation for Intelligent Physical Agents, 2000. http://www.fipa.org/specs/fipa00007/
[FIPA00023] FIPA Agent Management Specification. Foundation for Intelligent Physical Agents, 2000.
http://www.fipa.org/specs/fipa00023/
[FIPA00037] FIPA Communicative Act Library
Specification. Foundation for Intelligent Physical Agents, 2000. http://www.fipa.org/specs/fipa00037/
[FIPA00061] FIPA ACL Message Structure Specification.
Foundation for Intelligent Physical Agents, 2000. http://www.fipa.org/specs/fipa00061/
[Gamma95] Gamma, Helm,
Johnson & Vlissides, Design Patterns. Addison-Wesley, 1995.
[Searle69] Searle, J. L., Speech Acts. Cambridge University Press, 1969.
This section describes the requirements and architectural elements of the abstract Directory Service. The directory service is that part of the FIPA architecture which allows agents to register information about themselves in one or more repositories, for those same agents to modify and delete this information, and for agents to search the repositories for information of interest to them. The information that is stored is referred to a directory-entry, and the repository is an agent directory.
The purpose of the abstract architecture is to identify the key abstractions that will form the basis of all concrete architectures. As such, it is necessarily both limited and non-specific. In this section, we examine some of the ways in which concrete directory services may differ.
There are several directory services that may be used to store agent descriptions. The abstract architecture is neutral with respect to this variety. For any instantiation of the architecture, one must specify the set of directory services that are supported, how new directory services are added, and how interoperability is to be achieved. It is permissible for a particular concrete architecture to require that implementations of that architecture must support particular directory services.
Different directory services use a variety of different representations for schemas and contents. Instantiations of the agent directory architecture may support mechanisms for hiding these differences behind a common API and encoding, such as the Java JNDI model or hyper-directory schemes. It is extremely undesirable for an agent to be required to parse, decode, or otherwise rely upon different information encodings and schemas.
The following are examples of directory systems that may be used to instantiate the abstract directory service:
· LDAP,
· NIS or NIS+,
· COS Naming,
· Novell NDS,
· Microsoft Active Directory,
· The Jini lookup service, and,
· A name service federation layer, such as JNDI.
The abstract architecture is consistent with concrete architectures which provide "directory agnostic" services. Such a model will support agents that are more or less completely unaware of the details of directory services. A concrete architecture may provide mechanisms whereby an agent may delegate some or all of the tasks of assigning transport addresses, binding addresses to transport end-points, and registering addresses in all available directories to the agent platform.
While directory agnosticism simplifies the development of agents, there are times when explicit control of specific aspects of the directory mechanism is required. A concrete architecture may provide programmatic access to various elements in the directory subsystem.
The abstract directory architecture supports the development of instantiations that use directory services appropriate to the application domain. To ensure that heterogeneity does not preclude interoperability, the developers of a concrete architecture must consider the modes of interoperability that are feasible with other instantiations. Where direct end-to-end interoperability is impossible, impractical or undesirable, it is important that consideration be given to the specification of gateways that can provide full or limited interoperability. Such gateways may extract agent descriptions from one directory service, transform the information if necessary, and publish it through another directory service.
The abstract directory architecture supports the notion of agents communicating and reasoning about the directory service itself. It does not, however, define the ontology or conversation patterns necessary to do this, nor are concrete architectures required to provide or accept information in a form convenient for such reasoning.
In general, issues of testing, debugging, and management are implementation-specific and will not be addressed in an abstract architecture. Individual instantiations may include specific interfaces, actions, and ontologies that relate to these issues, and may specify that these features are optional or normative for implementations of the instantiation.
The prime motivation for the FIPA ACL is the enabling of communication between agents in a way that allows them to derive semantically useful information without requiring an a-priori agreement as to the language used in the communication.
This is achieved by means of a combination of three aspects:
1. A range of message types, which are based on Searle's speech act theory [Searle69] and which are grounded in a sound logical framework.
2. A series of notations in which logical propositions, actions and objects can be expressed.
3. The use of explicitly referenced ontologies that allow agents to interpret the identifiers in a communication relative to one or more shared interpretations of those identifiers.
The scope of this discussion is the concepts, structures and semantics required to support the three aspects identified above, taking into account the context of other elements of FIPA specifications, in particular the FIPA abstract architecture.
There is considerable scope for variation in the particular content languages; some content languages may be highly specialized to particular domains and some may be extremely general and powerful. In the case where the content language is highly specialized, explicit ontologies may be less relevant since the ontology may be effectively frozen in to the content language. In the case where content languages are extremely general and powerful, the content language can express shared conditional plans or other propositions, in which case ontologies become quite important.
There is also scope for the use of content languages within FIPA itself; for example in the specification of agent management, or in the application scenarios, or in specific areas such as agent-human interactions. The demand for content languages in specifications produced by FIPA is likely to grow in the future.
Any content language(s) chosen by FIPA need to strike a balance between expressive power and simplicity. FIPA uses various subsets of predicate logic as a semantic base for FIPA's own content languages because that approach maximizes the links with the semantic framework of ACL itself.
Not every application domain requires the expressive power of full first order logic. There are many (if not most) situations where a much simpler language is sufficient. In the spirit of this, we do not require that all content languages (that is, all concrete ACLs) be capable of representing all of the elements of the AACL.
The minimal requirements of a concrete content language are set by the kinds of messages (in particular the performatives that may be used in those message) that may be used in the application domain. For example, if an application domain does not require the denotation of actions, then the corresponding concrete content language does not need to have a method of representing actions - except for the specific actions denoted by the specific speech actions needed. Furthermore, it is not necessarily required that speech acts may be embedded within content language expressions. Therefore, it is required that any FIPA AACL be easily partitioned into semantically coherent subsets.
Any particular description of a content language should, moreover, show clearly which elements of the AACL are representable in the content language.
On a large scale, software systems can often be viewed as being composed of islands of relatively tightly integrated components bridged together by specialized gateways. It is often the case that communication between the residents of an island can be richer than communication across islands - by virtue of the fact that there may be greater commonality and shared assumptions between components within a single island.
Independent of the particular content language in use, different platforms will tend to support very different program structures. For example, a Java-native community of agents may wish to communicate about Java objects in a natural way; and therefore, a Java-natural representation of a content expression would most naturally take the form of a parse tree-like structure consisting of Java objects. On the other hand, a LISP-native community of agents would prefer content language expressions as LISP S-expressions. This applies both internally to an agent and externally between agents.
Therefore, an important objective of the AACL is to enable relatively homogenous groups of agents to maximize the benefit of that homogeneity. This can be done by permitting the communication of values in a natural way while at the same time supporting a minimal range of data values that can be supported reasonably by all modern environments.
For example, in a community of Java agents, they should be able to incorporate Java objects directly in messages - this may be useful even if it is not possible or meaningful to send Java objects in messages to non-Java agents.
In addition to supporting native data values efficiently, the representation of messages themselves may be different in different environments. Again, a Java agent would be more efficient manipulating (and therefore understanding) an ACL message as a tree of Java objects representing the parse tree than as a string; whereas a PERL agent would tend to prefer a string representation given PERL's very powerful string handling features.
Therefore, an additional goal of the AACL is to allow multiple representations of content expressions, whilst at the same time constraining them to be semantically coherent across platforms.
Logic - in particular predicate calculus - has been shown to be a very powerful formalism for expressing both mathematics and simpler concepts. The formalism itself is separate from the written notation, allowing many languages to have a semantic basis in logic. The prime benefit of a logical foundation is predictability: given a logical semantics it is possible to accurately predict the meaning of expressions (within the limitations of the interpretation of the particular symbols in the language which may be `outside' the logic).
As noted above, the potential range of content languages is quite large, with a correspondingly large variety of semantic frameworks. However, the semantics of ACL itself is necessarily and firmly based in predicate calculus. Therefore it is required that there be some connection between the semantics of content languages and the semantics of ACL itself.
The full realization of this is strictly impossible since there are many systems of reasoning that cannot be formalized as logic. However, for many practical purposes, it is possible to express the semantics of most programming languages and most communications languages in logic. Furthermore, most applications involving the FIPA ACL are likely to be simple in nature and easily modelled in logic.
In order to create abstractions for the various architectural elements, it is necessary to examine the kinds of systems and infrastructures that are likely targets of real implementations of the abstract architecture. In this section, we examine some of the ways in which security related issues may differ. Authors of concrete architectural specifications must take these issues into account when considering what end-to-end assumptions they can safely make. The goals describe below give the reader an understanding of the objectives the authors of the abstract architecture had in mind when creating this architecture.
In practice, only a very minor part of the security issues can be addressed in the abstract architecture, as most security issues are tightly coupled to their implementation.
In general, the amount of security required is highly dependent on the target deployment environment.
A glossary of security terms is located at the end of this section.
There are several aspects to security, which must permeate the FIPA architecture. They are:
· Identity. The ability to determine the identity of the various entities in the system. By identifying an entity, another entity interacting with it can determine what policies are relevant to interactions with that entity. Identity is based on credentials, which are verified by a Credential Authority.
· Access Permissions. Based on the identity of an entity, determine what policies apply to the entity. These policies might govern resource consumption, types of file access allowed, types of queries that can be performed, or other controlling policies.
· Content Validity. The ability to determine whether a piece of software, a message, or other data has been modified since being dispatched by its originating source. Digitally signing data and then having the recipient verify the contents are unchanged often accomplish this. Other mechanisms such as hash algorithms can also be applied.
·
Content Privacy. The ability to ensure that only designated identities can examine
software, a message or other data. To all others the information is obscured.
This is often accomplished by encrypting the data, but can also be accomplished
by transporting the data over channels that are encrypted.
Identity, or the use of credentials, is needed to supply the ability to control access, to provide content validity, and create content privacy. Each of these is discussed below.
This section describes the areas in which security can be applied within agent systems. In each case, the security related risks that are being guarded against are described. The assumption is that any agent or other entity in the system may have credentials that can be used to perform various forms of validation.
There are two basic potential security risks when sending a message from one agent to another.
The primary risk is that a message is intercepted, and modified in some way. For example, the interceptor software inserts several extra numbers into a payment amount, and modifies the name of the check payee. After modification, it is sent on to the original recipient. The other agent acts on the incorrect data. In a case like this, the content validity of the message is broken.
The secondary risk is that the message is read by another entity, and the data in it is used by that entity. The message does reach its original destination intact. If this occurs, the privacy of the message is violated.
Digital signing and encryption can address these risks, respectively. These two techniques can be abstractly presented at two different layers of the architecture. The messages themselves (or probably just the payload part) can be signed or encrypted. There are a number of techniques for this, PGP signing and encryption, Public Key signing and encryption, one time transmission keys, and other cryptographic techniques. This approach is most effective when the nature of underlying message transport is unknown or unreliable from a security perspective.
The message transport itself can also provide the digital signing or encryption. There are a number of transports that can provide such features: SKIP, IPSEC and CORBA Common Secure Interoperability Services. It seems prudent to include both models within the architecture, since different applications and software environments will have very different capabilities.
There is another aspect of message transport privacy that comes from agents that misrepresent themselves. In this scenario, an agent can register with directory services indicating that is a provider of some service, but in fact uses the data it receives for some other purpose. To put it differently, how do you know who you are talking to? This topic is covered under agent identity below.
If agents and agent services have a digital identity, then agents can validate that:
· Agents they are exchanging messages with can be accurately identified, and,
· Services they are using are from a known, safe source.
Similarly, services can determine whether the agent:
· Use identity to determine code access or access control decisions, or,
· Use agent identity for non-repudiation of transactions.
The Agent can contain a principal (for example a user), on whose behalf this code is running. The principal has one or more credentials, and the credentials may have one or more roles that represent the principal.
If an agent has a
principal, the other agents can:
· Determine whether they want to interoperate with that agent,
· Determine what policy and access control to permit to that user, and,
· Use the identity to perform transactions.
Services could perform similar actions.
An agent can be code signed. This involves digitally signing the code with one or more credentials. If an agent is code signed, the platform could:
· Validate the credential(s) used to sign the agent software. Credentials are validated with a credential authority,
· If the credentials are valid, use policy to determine what access this code will have, or,
· If the credentials are valid, verify that the code is not modified.
In addition,
the Agent Platform can use the lack of digital signature to determine whether
to allow the code to run, and policy to determine what access the code will
have. In other words, some platforms may have the policy that will not permit
code to run, or will restrict Access Permissions unless it is digitally signed.
There are a number of other possible security risks that are not addressed, because they are general software issues, rather than unique or special to agents. However, designers of agent systems should keep these issues in mind when designing their agent systems.
An entity can probe the running agent and extract useful information.
The unauthorized modification or corruption of an agent, its state, or data. This is somewhat addressed by the code signing, which does not cover all cases.
When a group of agents conspire to reach a set of goals that are not desired by other entities. These are particularly hard to guard against, because several agents may co-operate to create a denial of service attack in a feint to allow another agent to undertake the undesirable action.
An attempt to copy an agent or a message and clone or retransmit it. For example, a malicious platform creates an illegal copy, or a clone, of an agent, or a message from an agent is illegally copied and retransmitted.
In a denial-of-service the attackers try to deny resources to the platform or an agent. For example, an agent floods another agent with requests and the receiving agent is unable to provide its services to other agents.
The agent, platform, or service misrepresents information. This includes lying during negotiation, deliberately representing another agent, service or platform as being untrustworthy, costly, or undesirable.
An agent or agent platform denies that it has received/sent a message or taken a specific action. For example, a commitment between two agents as the result of a contract negotiation is later ignored by one of the agents, denying the negotiation has ever taken place and refusing to honour its part of the commitment.
An unauthorized agent or service claims the identity of another agent or piece of software. For example, an agent registers as a Directory Service and therefore receives information from other registering agents.
Access permission Based on a credential model, the ability to allow or disallow software from taking an action. For example, software with certain credentials may be allowed read a particular file, a group with different credentials may be allowed to write to the file.
Examples: OS file system permissions, Java Security Profiles (check name), Database access controls.
Authentication Using some credential model, ability to verify that the entity offering the credentials is who/what it says it is.
Credential An item offered to prove that a user, a group, a software entity, a company, or other entities is who or what it claims to be.
Examples: X.509 certificate, a user login and password pair, a PGP key, a response/challenge key, a fingerprint, a retinal scan, a photo id. (Obviously, some of these are better suited to software than others!)
Credential Authority An entity that determines whether the credential offered is valid, and that the credential accurately identifies the individual offering it.
Examples: An X.509 certificate can be validated by a certificate authority. At a bar, the bartender is the credential authority who determines whether your photo id represents you (he may then determine your access permissions to available beverages!).
Credential model The particular mechanism(s) being used to provide and authenticate credentials.
Code signing A particular case of digital signature (see below), where code is signed by the credentials of some entity. The purpose of code signing is to identify the source of the code, and to verify that the code has not been changed by another entity.
Examples: Java code signing, DCOM object signing, checksum verification.
Digital signature Using a credential model to indicate the source of some data, and to ensure that the data is unchanged since it was signed. Note: the word data is used very broadly here it could a string, software, voice stream, etc.
Examples: S/MIME mail, PGP digital signing, IPSEC (authentication modes)
Encryption The ability to transform data into a format that can only be restored by the holder of a particular credential. Used to prevent data from being observed by others.
Examples: SSL, S/MIME mail, PGP digital signing, IPSEC (encryption modes)
Identity A person, server, group, company, software program that can be uniquely identified. Identities can have credentials that identify them.
Lease An interval of time that some element, such as an identity or a credential is good for. Leases are very useful when you want to restrict the length of commitment. For example, you may issue a temporary credential to an agent that gives it 20 minutes in a given system, at which time the credential expires.
Policy Some set of actions that should be performed when a set of conditions is met. In the context of security, allow access permissions based on a valid credential that establishes an identity.
Examples: If a credential for a particular user is presented, allow him to access a file. If a credential for a particular role is presented, allow the agent to run with a low priority.
Role An identity that has an "group" quality. That is, the role does not uniquely identify an individual, or machine, or an agent, but instead identifies the identity in a particular context: as a system manager, as a member of the entry order group, as a high-performance calculation server, etc.
Examples: In various operating system groups, as applied to file system access. In Lotus Notes, the "role" concept. X.509 certificate role attributes.
Principal In the agent domain, the identity on whose behalf the agent is running. This may be a user, a group, a role or another software entity.
Examples: A shopping agents principal is the user who launched it.
An commodity trader agents principal is a financial company. A network
management agents principal is the role of system admin, or super-user. In a
small "worker bee" agent, the principal may be the delegated
authority of the parent agent.
[1] Note that the quoted string in the first example is a quoted value whereas the other elements are abstract names represented as tuples that may be encoded in a variety of different ways.