Synopsis: Entrepreneurship:


The antecedents of SME innovativeness in an emerging transition economy.pdf

Technovation29 (2009) 438 450 The antecedentsofsmeinnovativenessinanemerging transition economy Sonja Radas, Ljiljanaboz ic'The Instituteofeconomics, Trgj.

Becauseoftheimportanceofthesmesectorincreating economic growth, bothdevelopedanddevelopingcoun-tries areveryinterestedinfindingwaystostimulatesmes in realizinginnovations. Butinwhichwayscansmesbe helped toinnovate? Whatisthebestwayforpolicymakers to encourageinnovation? Manyeffortshavebeenmadein ARTICLEINPRESS www. elsevier. com/locate/technovation 0166-4972/$-seefrontmatter r 2008 Elsevierltd.

Yetpolicymakersin developingcountries, facedwiththetaskofcrafting regulationstosupportsmeinnovation, oftendrawupon the stockofknowledgefrominvestigationofsmesin developed economies. Soanimportantissueforpolicy makers wouldbetofindouttowhichextenttheycanrely on thesefindings. Inthispaper, weshedsomelightonthis questionbyinvestigatingfactorsthatsignificantlyimpact innovationinsmesincroatia, asmalldeveloping economy.

Ininvestigatingthesefactors, webuildupon the existingfieldofresearchaboutinnovationdeterminants in SMES. Ourdatacomefromthecommunityinno-vationstudyperformedin2004andcoversperiodfrom 2001 to2003. Following Keizeretal. 2002), wedefinealistof variablesandthenproceedtoexaminetheirsignificancefor innovationincroatiansmes.

External factors Factor definition Innovationsubsidiesfromamunicipality 1 ifthefirmreceivedinnovationsubsidiesfromamunicipality, 0otherwise Innovationsubsidiesfromthegovernment 1 ifthefirmreceivedinnovationsubsidiesfromthegovernment, 0otherwise Collaborationwithotherfirmsororganizations 1 ifthefirmhadanycooperationagreementoninnovationactivitieswithother enterprises, 0otherwise Links withuniversitiesorresearchinstitutes 1

Internalobstacleshavetodowith difficultiesthatarerelatedtoresourceswithinthefirmor human capital. Inthisstudy, welookatthemixtureof internalandexternalobstacles, seekingtoidentifythemost importantones (Table5. Inparticular, weconsider demand forfirm'sproducts, financingissues, statesupport, businessenvironment, organizationalissues, andavailabil-ity ofinformationaboutmarketsandtechnology.

Weask firms (1) iftheyencounteredobstaclesintheirinnovation activities, andthen (2) weaskthemtorateeachobstacle. In this paper, weseektoexamineifobstacleshaveanybearing on whetherfirmsinnovate. Inhisstudyofsmesincyprus, Hadjimanolis (1999) found thatobstaclesarenotcorre-lated toinnovation.

However, thisabsenceofimpactoninnovationmaybe caused bythefactthatsubsidiesincroatiaarenot sufficientlylargetoenableafirmtomakesignificant investment ininnovationactivities. Subsidies, firmageandproportionoffull-timeequiva-lent employeesengagedinintramuralr&dareomitted from furtheranalysis. Theremainingfactorsareusedas independentvariablesinalogitmodelwithinnovation variablesasdependent.

Anotherpolicymeasure (inparticularinsmall economies) shouldbeencouragingsmestobecome exporters. Firststepwouldbetodeterminewhat possible obstaclestoexportingthereareandthen address thosewithasetoftargetedmeasures. Incentives that wouldhelpfirmstoaccesswidermarketscouldalso encourage innovation.

Apart fromdesigningeffectiveincentives, policymakers need tothinkaboutmakingtheapplicationprocesseasy and enterprise-friendly. Inaddition, wehaveshownthat radical andincrementalinnovationhavedifferentante-cedents, sopolicymakerscandevisedifferentincentive schemes dependingonwhichtypeofinnovationtheywish to encourage.

Customerpower, strategic investment, andthefailureofleadingfirms. Strategicmanagement Journal 17 (3), 197 218. Cooke, PH.,Wills, D.,1999.

Paperforsymposiumon Technology Economics, 31march1988, Thehague. Forrest, J. E.,1990. Strategicalliancesandthesmalltechnology-based firm. Journalofsmallbusinessmanagement28 (3), 37 45.

acasestudyinsmallandmedium enterprises (SMES) ofthemetal-mechanicsectorfromsa o Paulo, Brazil. Technovation28 (1 2), 29 36. Kaufmann, A.,Todtling, F.,2000.

entrepreneurship and innovationinsmall-firmnetworks. Journalofbusiness Venturing March 2), 125 140. Massa, S.,Testa, S.,2008. Innovationandsmes:


THE CULTURE OF INNOVATION AND THE BUILDING OF KNOWLEDGE SOCIETIES.pdf

governance changes underway in various countries aimed at ensuring systemic and reinforced competitiveness in a global economic environment.

and innovation are fundamental to long-term economic growth and prosperity. Some of these arguments can be traced back to economists like Joseph A Schumpeter (1883-1950) and Karl Marx (1818-1883.

Countries like India, South africa, and Brazil have joined in, increasingly recognising that the establishment of a innovative environment is a prerequisite of development.

The aims of such innovation policies are: to create jobs, to reduce public expenses, to improve efficiency and operational methods,

Our environment-including our belief and value systems-shapes the way we view the world around us

policy makers have placed too much emphasis on short-term gains in the name of global competition. A Culture of Innovation, with the features of a knowledge society, can only be created based on a clear and concise strategic perspective.

Knowledge creation and A Culture of Innovation are keys to development Research has shown that increased investment in human capital can determine competitive advantage and indeed success in the development of Least Developed Countries (LDCS.

With the increasing importance of Information and Communication Technologies,(ICTS), the digital divide has grown at a rapid pace.

and opportunities for, their implementation. Indeed, one of the crosscutting themes in UNESCO's Medium Term Strategy (31 c/4) for the years 2002 to 2007 is centered around the contribution of ICTS to development and the construction of knowledge societies.


The future internet.pdf

SL 5 Computer Communication Networks and Telecommunications The Editor (s)( if applicable) and the Author (s) 2011.

and services beyond the capabilities offered by current technologies. Future Internet research is therefore a must.

services and cloud computing, networked media and Internet of things. In total they represent an investment in research of almost 870 million euro,

of which the European commission funds 570 million euro. This large-scale research undertaking involves around 690 different organizations from all over Europe, with a well-balanced blend of 50%private industries (SMES and big companies with equal share

Protesters in Egypt used social media to support communication and the associated Facebook page had over 80,000 followers at its peak.

At the time of writing the US House of representatives voted to block a proposal from the Federal Communications Commission to partially enforce net neutrality9.

Volume and nature of data the sheer volume of Internet traffic and the change from simple text characters to audio and video and also the demand for very immediate responses.

Online video and highdefinition TV services are expected to dominate this growth. Cisco state that the average monthly traffic in 2014 will be equivalent to 32 million people continuously streaming the 2009 Avatar film in 3d12.

which is a radically different environment from the initial Internet based on physical links. Data traffic for mobile broadband will double every year until 2014, increasing 39 times between 2009 and 201413.

Commercial services as mentioned above the Internet is now a conduit for a wide variety of commercial services.

These business services rely on platforms which can support a wide variety of business transactions and business processes.

Societal expectations in moving from an obscure technology to a fundamental part of human communication societal expectations have grown.

The network of the future Cloud computing, Internet of services and advanced software engineering Internet-connected objects Trustworthy ICT Networked media

Foundations-Architectural Issues-Socioeconomic Issues-Security and Trust-Experiments and Experimental Design Future Internet Areas-Networks-Services-Content Applications FIA Budapest will be the seventh FIA

which continues to collaborate across specific topic areas with the common goal of investigating the issues related to the creation of a new global communications platform within a European context.

and Sasu Tarkoma Engineering Secure Future Internet Services...177 Wouter Joosen, Javier Lopez, Fabio Martinelli,

and Fabio Massacci Towards Formal Validation of Trust and Security in the Internet of Services...

235 A Use-Case on Testing Adaptive Admission Control and Resource Allocation Algorithms on the Federated Environment of Panlab...

and Carsten Schmoll Table of contents XV Testing End-to-end Self management in a Wireless Future Internet Environment 259 Apostolos Kousaridas George Katsikas, Nancy Alonistioti, Esa Piri, Marko Palola,

Services Introduction to Part VI...323 SLAS Empowering Services in the future Internet...327 Joe Butler, Juan Lambea, Michael Nolan, Wolfgang Theilmann, Francesco Torelli, Ramin Yahyapour, Annamaria Chiasera,

and Marco Pistore Meeting Services and Networks in the future Internet...339 Eduardo Santos, Fabiola Pereira, Jo ao Henrique Pereira, Luiz Cl'audio Theodoro, Pedro Rosa,

and Sergio Takeo Kofuji Fostering a Relationship between Linked Data and the Internet of Services...

351 John Domingue, Carlos Pedrinaci, Maria Maleshkova, Barry Norton, and Reto Krummenacher Part VII: Future Internet Areas:

403 Future Internet Enterprise Systems: A Flexible Architectural Approach for Innovation...407 Daniela Angelucci, Michele Missikoff,

and Francesco Taglino Renewable Energy Provisioning for ICT Services in a Future Internet...419 Kim Khoa Nguyen, Mohamed Cheriet, Mathieu Lemay, Bill St. Arnaud, Victor Reijs, Andrew Mackarel, Pau Minoves, Alin Pastrama,

enjoying multimedia communications, taking advantage of advanced software services, buying and selling, keeping in touch with family and friends,

The success of the Internet has created even higher hopes and expectations for new applications and services,

the increased reliability, availability and interoperability requirements of the new networked services, and on the other hand the extremely high volumes of multimedia content challenge the today's Internet.

The current Internet capability limit will be stressed further by the expected growth, in the next years, in order of magnitude of more Internet services

the likely increase in the interconnection of smart objects and items (Internet of things) and its integration with enterprise applications.

as a ubiquitous and universal means for communication and computation, has been extraordinarily successful, there are still many unsolved problems and challenges some

The very success of the Internet is now creating obstacles to the future innovation of both the networking technology that lies at the Internet's core and the services that use it.

and societal challenges and opportunities of Digital Society are needed. Incremental changes to existing architectures, which are enhancing the existing Internet,

Unification and higher degree of integration of the communication, storage, content and computation as the means of enabling change from capacity concerns towards increased and flexible capability with operation control.

applications, services, networks, storage, content, resources and smart objects. Fusion of diverse design requirements, which include openness, economic viability, fairness, scalability, manageability, evolvability and programmability, autonomicity, mobility, ubiquitous access, usage,

security including trust and privacy. The content of this area includes eight chapters covering some of the above architectural research in Future Internet.

The Towards In-Network Clouds in Future Internet chapter explores the architectural co-existence of new and legacy services and networks, via virtualisation of connectivity and computation resources and self management capabilities,

which have the aim to create a flexible environment for autonomic deployment and management of virtual networks and services as experimented with

and validated on large-scale testbeds. The Flat Architectures: Towards Scalable Future Internet Mobility chapter provides a comprehensive overview

and review of the scalability problems of mobile Internet nowadays and to show how the concept of flat and ultra flat architectures emerges due to its suitability and applicability for the future Internet.

and the main paradigms behind the different flat networking approaches trying to cope with the continuously growing traffic demands.

and power creating a novel Internet architecture for future mobile communications. The Review and Designs of Federated Management in Future Internet Architectures chapter analyses issues about federated management targeting information sharing capabilities for heterogeneous infrastructure.

or deploy services they can be used in other tasks or services. As an implementation challenge for controlling and harmonising these entire resource management requirements, the federation paradigm emerges as a tentative approach and potentially optimal solution.

As reference architectures require agreement among all stakeholders, they are developed usually through an incremental process.

On one hand, it aims at achieving a full interoperation among the different entities constituting the ICT environment, by means of the introduction of Semantic Virtualization Enablers.

Preliminary test studies, realized in a home environment, confirm the potentialities of the proposed solution. 6 Part I:

and Technology Hellas/ITI, Greece daras@iti. gr 6. Athens University of Economics and Business,

Greece gstamoul@aueb. gr 7 Digital Enterprise Research Institute, Ireland manfred. hauswirth@deri. org Abstract.

communication channel among scientists to the most important medium for information exchange and the dominant communication environment for business relations and social interactions.

enjoying multimedia communications, taking advantage of advanced software services, buying and selling, keeping in touch with family and friends,

The success of the Internet has created even higher hopes and expectations for new applications and services

and interoperability required by new networked services, and this trend will escalate in the future. Therefore, the requirement of increased robustness, survivability,

3d videos, interactive environments, network gaming, virtual worlds, etc. compared to the quantity and type of data currently exchanged over the Internet.

All these applications create new demands and requirements, which to a certain extent can be addressed by means of over-dimensioning combined with the enhancement of certain Internet capabilities over time.

4 that increasing the bandwidth on the backbone network will not suffice due to new qualitative requirements concerning, for example, highly critical services such as ehealth applications, clouds of services and clouds of sensors, new social network

applications like collaborative 3d immersive environments, new commercial and transactional applications, new location-based services and so on.

The Future Internet as a global and common communication and distributed information system may be considered from various interrelated perspectives:

the networks and shared infrastructure perspective, the services and application perspective as well as the media and content perspective.

In Towards a Future Internet Architecture 9 Europe, a significant part of the Information and Communication Technology (ICT) of the Framework Program 7 is devoted to the Future Internet 14.

etc. and the term service to refer to any action performed on data or other services and the related Application programming interface (API).

http://ec. europa. eu/information society/activities/foi/research/fiarch/index en. htm 2 The definition of service does not include the services offered by humans using the Internet 10 T. Zahariadis et al.

The term control is used here to refer to control functionality but also management functionality, e g. systems, networks, services, etc.

as an‘economic object',traverses the communication infrastructure multiple times, limiting its scaling, while lack of content‘property rights'(not only author-but also usage-rights) leads to the absence of a fair charging model. iii.

trustworthy processing and handling of network and systems infrastructure and essential services in many critical environments, such as healthcare, transportation, compliance with legal regulations, etc.

This information may be available at the communication end-points (applications) but not when data are in transit.

There is no inherited method for on-path caching along the communication path and mirroring of content compared to offpath caching that is currently widely used (involving e g. connection redirection).

Devices in environments such as sensor networks or even nano-networks/smart dust as well as in machine to machine-machine (M2m) environments operate with such limited processing,

Communications privacy does not only mean protecting/encrypting the exchanged data but also not disclosing that communication took place.

It is not sufficient to just protect/encrypt the data (including encryption of protocols/information/content,

tamper-proof applications etc) but also protect the communication itself, including the relation/interaction between (business

In the current Internet model, design of IP (and more generally communication) control components have so far being driven exclusively by

The latter results in such a complexity that leaves no possibility for individual systems to adapt their control decisions and tune their execution at running time by taking into account their internal state, its activity/behavior as well as the environment

since it is shared a communication infrastructure. Hence, substantial benefit could be expected by further assistance from the network,

The current inter-domain routing system is reaching fundamental limits in terms of routing table scalability but also adaptation to topology and policy dynamics (perform efficiently under dynamic network conditions) that in turn impact its convergence,

iii) to support multiple types of services, iv) to accommodate a variety of physical networks,

underlines that the Internet architecture needs to be able to scale to 109 IP networks recognizing the need to add scalability as a design objective.

Accessibility (open and by means of various/heterogeneous wireless/radio and wired interfaces) to the communication network but also to heterogeneous data, applications,

and services, nomadicity, and mobility (while providing means to maintain continuity of application communication exchanges when needed).

Accessibility and nomadicity are addressed currently by current Internet architecture. On the other hand, mobility is realized still in most cases by means of dedicated/separated architectural components instead of Mobile IP. see Subsection 3. 5. Point 6 Accountability of resource usage and security without impeding

Scalability, including routing and addressing system in terms of number of hosts/terminals, number of shared infrastructure nodes, etc. and management system:

what it is expected to deliver to the end-user/hosts while coping with a growing number of users with increasing heterogeneity in applicative communication needs.

Networked Enterprise & Radio frequency identification (RFID) and F5: Trust and Security. The authors would like to acknowledge

Proceedings of IEEE International Conference on Communications (ICC) 2002, New-york City (New jersey), USA (April/May 2002) 6 RFC 1958:

ACM Computer Communications 33 (17), 2105 2115 (2010) 19 Freedman, M.:Experiences with Coralcdn: A Five-Year Operational View.

A survey of autonomic communications. ACM Transactions on Autonomous and Adaptive Systems (TAAS) 1 (2), 223 259 (2006) 21 Gelenbe, E.:

ACM Communications 52 (7), 66 75 (2009) 22 Evolving the Internet, Presentation to the OECD (March 2006), http://www. cs. ucl. ac. uk/staff

ACM SIGCOMM Computer Communication Review 39 (5)( 2009) 26 Eggert, L.:Quality-of-Service: An End System Perspective.

MIT Communications Futures Program Workshop on Internet Congestion Management, Qos, and Interconnection, Cambridge, MA, USA, October 21-22 (2008) 27 Ratnasamy, S.,Shenker, S.,Mccanne, S.:

ACM SIGCOMM Computer Communication Review (Oct. 2010), http://www2. research. att. com/bala/papers/ccr10-priv. pdf 33 W3c Workshop

This paper aims to explore the architectural co-existence of new and legacy services and networks, via virtualisation of connectivity and computation resources and self management capabilities,

which have the aim to create a flexible environment for autonomic deployment and management of virtual networks and services as experimented with

and validated on large-scale testbeds. Keywords: In-Network Clouds, Virtualisation of Resources, Self management, Service plane, Orchestration plane and Knowledge plane. 1 Introduction The current Internet has been founded on a basic architectural premise, that is:

Internet use is expected to grow massively over the next few years with an order of magnitude more Internet services

and the integration of increasingly demanding enterprise and societal applications. The Future Internet research and development trends are covering the main focus of the current Internet,

. and design of all levels of interfaces for Services and for networks'and services'resources.

As such, the Future Internet covers the complete management and full lifecycle of applications, services, networks and infrastructures that are constructed primarily by recombining existing elements in new and creative ways.

This paper aims to explore the architectural co-existence of new and legacy services and networks, via virtualisation of resources and self management capabilities,

which have the aim to create a flexible environment for autonomic deployment and management of virtual networks and services as experimented with

and validated on large-scale testbeds 3. 2 Designs for In-Network Clouds Due to the existence of multiple stakeholders with conflicting goals and policies,

modifications to the existing Internet are limited now to simple incremental updates and deployment of new technology is next to impossible and very costly.

and sharing a common physical substrate of communication nodes and servers managed by multiple infrastructure providers.

used to make the Future Internet of Services more intelligent, with embedded management functionality. At a logical level, the VMKSO planes gather observations, constraints and assertions,

management services, protocols, as well as resource-facing and end-user facing services. It includes the enablers that allow code to be executed on the network entities.

The safe and controlled deployment of new code enables new services to be activated on-demand.

This approach has the following advantages: Service deployment takes place automatically and allows a significant number of new services to be offered on demand;

It offers new, flexible ways to configure network entities that are not based on strict configuration sets;

Services that are used not can be disabled automatically. These services can be enabled again on-demand, in case they are needed;

It eases the deployment of network-wide protocol stacks and management services; It enables secure but controlled execution environments;

It allows an infrastructure that is aware of the impact on the existing services of a new deployment;

It allows optimal resource utilization for the new services and the system. 22 A. Galis et al. 2. 2 Orchestration Plane Overview The purpose of the Orchestration Plane is to coordinate the actions of multiple autonomic management systems

in order to ensure their convergence to fulfil applicable business goals and policies. It supervises and it integrates all other planes'behaviour ensuring integrity of the Future Internet management operations.

The Orchestration Plane can be thought of as a control framework into which any number of components can be plugged into,

and services that it is managing, and makes appropriate decisions for the resources and services that it governs,

either by itself (if its governance mode is individual) or in collaboration with other AMS (if its governance mode is distributed or collaborative),

Virtual resources and services are used. Service Lifecycle management is introduced. The traditional management plane is augmented with a narrow knowledge plane,

and other key framework services are packaged in a distributed component that simplifies and directs the application of those framework services to the system.

The Distributed Orchestration Component (DOC) provides a set of framework network services. Framework services provide a common infrastructure that enables all components in the system under the scope of the Orchestration Plane to have plug and play and unplug and play behaviour.

Applications compliant with these framework services share common security metadata, administration, and management services. The DOC enables the following functions across the orchestration plane:

federation, negotiation, distribution and governance. The federation functionality of the OP is represented by the composition/decomposition of networks & services under different domains.

Since each domain may have different SLAS, security and Towards In-Network Clouds in Future Internet 23 administrative policies,

a federation function would trigger a negotiation between domains and the redeployment of service components in the case that the new policies and high level goals of the domain are not compatible with some of the deployed services.

The negotiation functionality of the OP enables separate domains to reach composition/decomposition agreements and to form SLAS for deployable services.

The distribution functionality of the OP provides communication and control services that enable management tasks to be split into parts that run on multiple AMSS within the same domain.

The distribution function controls the deployment of AMSS and their components. The governance functionality of the OP monitors the consistency of the AMSS'actions, it enforces the high level policies

and SLAS defined by the DOCS and it triggers for federation, negotiation and distribution tasks upon noncompliance.

The OP is also supervising the optimisation and the distribution of knowledge within the Knowledge Plane to ensure that the required knowledge is available in the proper place at the proper time.

This paper uses system virtualisation to provide virtual services and resources. System virtualisation separates an operating system from its underlying hardware resources;

and to construct virtual services and networks that meet stated business goals having specified service requirements.

Composite virtual services can thus be constructed using all or part of the virtual resources provided by each physical resource.

The KP provides information and context services as follows: information-life cycle management, which includes storage, aggregation, transformations, updates, distribution of information;

therefore essential in guaranteeing both a degree of self management and adaptation as well as supporting context-aware communications that efficiently exploit the available network resources.

Furthermore, context-aware networking enables new types of applications and services in the future Internet. Context Information Services.

The Context Information Service Platform (CISP), within the KP, has the role of managing the context information

Context clients are context-aware services, either user-facing services or network management services, which make use of

or/and adapt themselves to context information. Network services are described as the services provided by a number of functional entities (FES),

and one of the objectives of 26 A. Galis et al. this description is to investigate how the different FES can be made context-aware,

We note that these context statistics should be optimised in terms of memory usage for scalability purposes.

In general, the CE module is responsible for the communication of the CISP with the other management Towards In-Network Clouds in Future Internet 27 applications/components and the CP module for the optimisation of the context information.

As such the Management Plane components will run on execution environments supported by the virtual networks and systems,

It adds new functions without disturbing the rest of the system (Plug-and-play/Unplug and play/Dynamic programmability of management functions & services.

and services, to be combined. In order to support this, each AMS uses the models and ontologies to provide a standard set of capabilities that can be advertised

and management services that it governs, either by itself (if its governance mode is individual)

which aims to create a highly open and flexible environment for In-Network Clouds in Future Internet.

ANPI (Autonomic Network programming Interface) is the SP's main component that enables large-scale autonomic services deployment on virtual networks.

also part of the KP, provides functionality to add powerful and flexible monitoring facilities to system clouds (virtualisation of networks and services.

4 Conclusion This work has presented the design of an open software networked infrastructure (In-Network Cloud) that enables the composition of fast and guaranteed services in an efficient manner,

and the execution of these services in an adaptive way taking into 32 A. Galis et al. account better shared network

and service resources provided by an virtualisation environment. We have described also the management architectural and system model for our Future Internet,

this interface can then form the basis for new types of applications and services in the future Internet.

Software Architecture Definition for On-demand Cloud Provisioning. ACM HPDC, 21-25, Chicago hpdc2010. eecs. northwestern. edu (June 2010) 6. Rochwerger, B.,et al.:

and Protocols For Computer Communications (Karlsruhe, Germany, SIGCOMM'03, Karlsruhe, Germany, August 25 29,2003, pp. 3 10.

IEEE Communications Magazine 45 (10), 112 121 (2007) 13. Deliverable D6. 3 Final Results Autoi Approach http://ist-autoi. eu/14.

and Sándor Imre Budapest University of Technology and Economics department of Telecommunications Mobile Communication and Computing Laboratory Mobile Innovation Centre Magyar Tudosok krt. 2, H-1117

This chapter is committed to give a comprehensive overview of the scalability problems of mobile Internet nowadays

and the main paradigms behind the different flat networking approaches trying to cope with the continuously growing traffic demands.

and power creating a novel Internet architecture for future mobile communications. Keywords: mobile traffic evolution, network scalability, flat architectures, mobile Internet, IP mobility, distributed and dynamic mobility management 1 Introduction Mobile Internet has started recently to become a reality

for both users and operators thanks to the success of novel, extremely practical smartphones, portable computers with easy-to-use 3g USB modems and attractive business models.

Based on the current trends in telecommunications, vendors prognosticate that mobile networks will suffer an immense traffic explosion in the packet switched domain up to year 2020 1 4

. In order to accommodate the future Internet to the anticipated traffic demands, technologies applied in the radio access

Since today's mobile Internet architectures have been designed originally for voice services and later extended to support packet switched services only in a very centralized manner,

the management of this ever growing traffic demand is quite hard task to deal with.

if we consider fixed/mobile convergent architectures managing mobile customers by balancing user traffic between a large variety of access networks.

Scalability of traffic, network and mobility management functions has become one of the most important questions of the future Internet.

and the development of new and innovative IP-based applications require network architectures able to deliver all kind of traffic demands seamlessly assuring high end-to-end quality of service.

or by the collaboration of 3gpp) prevents cost effective system scaling for the novel traffic demands.

Aiming to solve the burning problems of scalability from an architectural point of view flat and fully distributed mobile architectures are gaining more and more attention today.

The goal of this chapter is to provide a detailed introduction to the nowadays emerging scalability problems of the mobile Internet

which can be considered as the most essential building block of flat mobile communications. As a conclusion we summarize the benefits

and Scalability Problems of the Mobile Internet 2. 1 Traffic Evolution Characteristics of the Mobile Internet One of the most important reasons of the traffic volume increase in mobile telecommunications is demographical.

Over 60%of the global population now we are talking about five billion people are subscribers of some mobile communication service 1 6. Additionally,

or open to pay for the Wireless internet services meaning that voice communication will remain the dominant mobile application also in the future.

Despite this and the assumption of 5 implying that the increase in the number of people potentially using mobile Internet services will likely saturate after 2015 in industrialized countries

The most prominent effect of services and application evolution is the increase of video traffic:

it is foreseen that due to the development of data-hungry entertainment services like television/radio broadcasting and Vod,

Since video and related entertainment services seems to become dominant in terms of bandwidth usage special optimization mechanisms focusing on content delivery will also appear in the near future.

As devices, networks and modes of communications evolve, users will choose from a growing scale of services to communicate (e g.,

, e-mail, Instant Messaging, blogging, micro-blogging, Voip and video transmissions, etc..In the future, social networking might evolve even further,

like to cover broader areas of personal communication in a more integrated way, or to put online gaming on the next level deeply impregnated with social networking and virtual reality.

there is another emerging form of communications called M2m (Machine to machine-Machine) which has the potential to become the leading traffic contributor in the future.

growth of the mobile subscriptions, evolution of mobile networks, devices, applications and services, and significant device increase potential resulted by the tremendous number of novel subscriptions for Machine to machine-Machine communications. 2. 2 Scalability Problems of the Mobile Internet Existing wireless telecommunication

infrastructures are prepared not to handle this traffic increase, current mobile Internet was designed not with such requirements in mind:

On one hand user plane scalability issues are foreseen for anchor-based mobile Internet architectures, where mechanisms of IP ADDRESS allocation and tunnel establishment for end devices are managed by high level network elements,

On the other hand, scalability issues are also foreseen on the control plane. The well established approach of separating service layer

, towards IP Multimedia Subsystem for delivering IP multimedia services), the interoperability between the service and the access layer can easily cause scalability

and Qos issues even in the control plane. Flat Architectures: Towards Scalable Future Internet Mobility 39 As a consequence, architectural changes are required for dealing with the ongoing traffic evolution:

and to ensure mobile networks sustainability. 3 Evolution of Flat Architectures 3. 1 Evolution of the Architecture of 3gpp Mobile networks Fixed networks were firstly subject to similar scalability problems.

Internet communication. Due to the collateral effects of this change a convergence procedure started to introduce IP-based transport technology in the core and backhaul network:

Release 5 (2003) introduced the IP Multimedia Subsystem (IMS) core network functions for provision of IP services over the PS domain,

In Release 10 (2010) Selective IP Traffic Offload (SIPTO) and Local IP Access (LIPA) services have been published 15.

Towards Scalable Future Internet Mobility 41 entities in the same residential/enterprise IP network without the user plane traversing the core network entities.

In the PS domain, IP multimedia services require a two-level session establishment procedure. First, the MN and the correspondent node (CN) negotiate the session parameters using SIP on the service level

but also demand certain, distinctive mobility management schemes sufficiently adapted to the distributed architecture. In fact the distributed mobility management mechanisms and the relating decision methods, information,

command and event services form the key routines of the future mobile Internet designs. The importance of this research area is emphasized also by the creation of a new IETF nonworking group called Distributed Mobility Management (DMM) in August 2010,

and handover control mechanisms together with direct logical interfaces for inter-enodeb communications. Here, traffic forwarding between neighboring enodebs is allowed temporarily during handover events providing intra-domain mobility.

Furthermore, the BSR can be considered a special wireless edge router that bridges between mobile/wireless and IP communication.

therefore providing a host-to-host communication method. End-to-end mobility management protocols working in higher layers of the TCP IP stack such as Host Identity Protocol (HIP) 39,

standard MIP mechanisms will be used only for the ongoing communications while the mobile node is in motion between different IP sub-networks.

Distributed Hash Table or anycast/broadcast/multicast communication can be used for the above purposes. In such schemes, usually all routing

, by using Hi3 50 for core-level distribution of HIP signaling plane) are also feasible. 5 Conclusion Flat architectures infer high scalability

Towards Scalable Future Internet Mobility 47 BS nodes also minimizes the feedback time of intermodule communication, i e.,

In flat architectures the radio access network components could be compared much cheaper to HSPA and LTE devices today because of the economy of scale.

The higher competition of network management tools due to the apparition of tools developed formerly for the Internet era may reduce the operational expenditures as well.

but it comes with the benefits of scalability, fault tolerance and flexibility. Optimization of handover performance is another key challenge for flat networks.

An Emerging Communication Paradigm, Tutorial. In: Globecom'10.dec 2010) 4. Schulze, H.,Mochalski, K.:Ipoque, Internet Study 2008/2009, Ipoque (Jan. 2011) 5. UMTS Forum, REPORT NO 37, Magic Mobile Future 2010-2020 (April 2005) 6

Ultra Flat Architecture for high bitrate services in mobile networks. In: Proc. of PIMRC'08, Cannes, France, pp. 1 6 (2008) 17.

IEEE Communications Magazine 39 (12), 34 41 (2001) 31. Melia, T.,de la Oliva, A.,Vidal, A.,Soto,

Journal of Computer Communications 31 (10), 2457 2467 (2008) J. Domingue et al. Eds.):) Future Internet Assembly, LNCS 6656, pp. 51 66,2011.

or deploy services they can be used in other tasks or services. As implementation challenge for controlling and harmonising these entire resource management requirements

Federation, Management, Reference Model, Future Internet, Architectures and Systems, Autonomics, Service Management, Semantic Modelling and Management, Knowledge Engineering, Networking Data and Ontologies, Future Communications

and Internet. 1 Introduction In recent years convergence on Internet technologies for communication's, computation's and storage's networks and services has been a clear trend in the Information and Communications technology (ICT) domain.

Although widely discussed and 52 M. Serrano et al. researched, this trend has not fully run its course in terms of implementation,

In the future Internet, services and networks follow a common goal: to provide solutions in a form of implemented interoperable mechanisms.

Telecommunications networks have undergone a radical shift from a traditional circuit-switched environment with heavy/complex signalling focused on applications-oriented perspective,

and increase systems flexibility to react to user demands, by replacing a plethora of proprietary hardware and software platforms with generic solutions supporting standardised development and deployment stacks.

Challenges in the future communications systems mainly demand, in terms of end user requirements, personalized provisioning, service-oriented performance, and service-awareness networking.

Additionally to those technology requirements, necessities to support information interoperability as result of more service-oriented demands exist.

Reliable services and network performance act as technology requirements for more secure and reliable communication systems supporting end user and network requirements.

Demands on data models integration are requirements to be considered during the design and implementation phases of any ICT system.

which networking issues are addressed in a manner that focuses on the supporting role various protocols play in delivering communications services that meet the rapidly changing needs of the communities of users for

or deploy services they can be used in other tasks or services. As implementation challenge for controlling

what information enterprise application management systems can provide to allow the latter to more robustly and efficiently allocate network services.

This paper is organized as follows: Section II presents a brief review of the challenges about Future Internet architectures in terms of cross-domain interoperability.

Section IV presents a Federated Management Reference Model and its implications for networks and services.

we also investigate what information enterprise application management systems can provide to federated management systems allowing network and services allocation.

collectively, constitute a reference model that can guide the realisation of future communications environments in the future Internet 4 11 12 13.

The Future Internet architecture must provide societal services and, in doing so, support and sustain interactions between various communities of users in straight relation with communication infrastructure mechanisms.

Service-awareness 4 has many aspects to consider as challenges including: delivery of content and service logic with consumers'involvement and control;

composition and decomposition on demand of control and network domains; interrelation and unification of the communication, storage, content and computation substrata.

Networking-awareness 4 challenges imply the consumer-facing and the resourcefacing services are aware of the properties, the requirements,

and the state of the net 54 M. Serrano et al. work environment, which enable services to self-adapt according the changes in the network context and environment.

It also means that services are executed both and managed within network execution environments and that both the services and the network resources can be managed uniformly in an integrated way.

Uniform management allows services and networks to harmonize their decisions and actions 14. The design of both networks and services is moving forward to include higher levels of automation

and autonomicity, which includes self management. The optimization of resources 15 16 17 using federation in the future Internet relies on classify

and identify properly what resources need to be used, thus dynamically the service composition and service deployed can be executed by result of well known analysis on network

and services. 3 Rationale for Federation in the future Internet Federation is relatively a new paradigm in communications,

currently studied as the alternative to solve interoperability problems promoting scalability issues and exploring towards solving complexity

when multiple applications/systems need to interact with a common goal. In this paper federation is handled as the mechanism used by communications management systems providing autonomic control loops.

In this section the rationale for federated, autonomic management of communications services is addressed from the perspective of end-to-end applications and services in the future Internet.

Federation in the future Internet envisions management systems (networks and services) made up of possibly heterogeneous components, each

of which has some degree of local autonomy to realize business goals. Such business goals provide services that transcend legal and organizational boundaries in dynamic networks of consumers and providers.

All the management systems with their own autonomy level contribute to satisfy more complex business goals,

a single entity would not be able to achieve. A visionary perspective for what federation can offer in communications systems

and how federation contributes enabling information exchange has been described in previous works 18 19. The intention in this paper is not to define what the Federation in future communications is,

or which advantages it can offer either basics definition (s) in communications, but rather to provide a realistic approach in form of functional architecture,

research results and implementation advances as well to show in kind how federation acts as feasible alternative towards solving interoperability problems in service and application management systems.

Future Internet environments consist of heterogeneous administrative domains, each providing a set of different services. In such complex environment, there is no single central authority;

rather, each provider has at least one (and usually multiple) separate resources and/or services that must be shared

and/or negotiated. The term Federation in communications was discussed in a previous work 20 and currently many definitions have been proposed.

We particularly follow a federated management definition as A federation is a set of domains that are governed by either a single central authority

and services. These principles can be validated via direct industrial investment, and roll out real integrated test beds to trial new network and service infrastructures.

In future Internet end user service, application and network requirements act as guidelines to identify study and clarify part of complex requirements.

Next generation networks and services 3 4 24 can not be conceived without systems acting and reacting in a dynamic form to the changes in its surrounding (context-awareness, data link and information interoperability),

considering end-user requirements and acting in autonomous forms offering added value services (Autonomics) 6 7 25 where traditional definitions describing self management emerged.

Autonomic reflects the ability of such systems to be aware of both themselves and their environment

and network domains must interact to exchange relevant information facilitating services and network operations. These cross-domain interactions demand certain level of abstraction to deal with mapping requirements from different information and data domains.

This higher level of abstraction enables business and service foundations to be met by the network,

and emphasizes offering federated services in a portable manner that is independent of the utilized networks.

and manage end-to-end communications services over an interconnected, but heterogeneous infrastructure and establishes communication foundations.

Fig. 1. Federated Autonomic Management Reference Representation A greater degree of coordination and cooperation is required between communication resources,

the software that manages them, and the actors who direct such management. In federation management end-to-end communication services involve configuring service

and network resources in accordance to the policies of the actors involved in the management process.

what federation offers in communications either what federation to the next generation networks and in the future internet design with service systems using heterogeneous network technologies imply.

in today's Internet it is observed the growing trend for services to be provided both and consumed by loosely coupled value networks of consumers, providers and combined consumer and providers.

and Designs of Federated Management in Future Internet Architectures 57 to offer common and agreed services even with many technological restrictions

and configuration of large-scale and highly distributed and dynamic enterprise and networks applications 26 is everyday increasingly in complexity.

In the current Internet typical large enterprise systems contain thousands of physically distributed software components that communicate across different networks 27 to satisfy end-to-end services client requests.

and the diversity on service demand and network operating conditions, it is very difficult avoid conflicts 14 20 28 between different monitoring

and contractual agreements between different enterprises (1. Definition) establish the process for monitoring (2. Observation)

processed, aggregated and correlated (4. Mapping) to provide knowledge that will support management operations of large enterprise applications (5. Federated Agreements)

and the network services they require (6. Federated Regulations). We support the idea that monitoring data at the network

and application level can be used to generate knowledge that can be used to support enterprise application management in a form of control loops in the information;

We also consider appropriate ways on how information from enterprise applications and from management systems can be provided to federate management systems allowing to more robustly

Foundations) thus allocate new federated network services (11. Enforcement. In a federated system the interaction between domains and the operations in between represent a form of high-level control to perform the negotiations

toolkit (s) and components that can guide the realisation of federated communications environments to effectively provide complex services (interoperable boundaries) and,

and configurations for managing services and networks are used to ensure transference of results to other systems as result of sensitivity analysis.

When using semantics the interaction between systems named interactive entities is to reduce the reliance on technological dependencies for services support

the vision of federated autonomic management for end-to-end communications services orchestrate federated service management where management systems should semantically interoperate to support evolving value chains and the end-to-end delivery of services.

In the federated architecture proposed the management control deal with federated agreements necessaries to satisfy in one hand the enterprise requirements and in the other hand the management system requirement as result of events coming from the heterogeneous infrastructure.

which have origins in mapping events between the diverse enterprise processes and the heterogeneous infrastructure.

we also provide research results about what information enterprise application management systems can provide to federate management systems to allow the latter to more robustly

and efficiently allocate network services. Brief scenario descriptions illustrate the possible challenges are necessaries to tackle around the term federation

and particularly on federated systems and federated management applications. 6. 1 Federation of Wireless Networks Scenario generates more demand on management systems to be implemented satisfying diversity, capacity and service demand.

apartment buildings, offices) generates more demand in deploying wireless 802.11-based mesh networks this expansion will be a patchwork of mesh networks;

challenges arise relating to how services can be delivered efficiently over these overlapping infrastructures. Challenges in wireless mesh networks relate to both resource management within the network infrastructure itself

and the way in which management systems of individual network domains can federate dynamically to support endtoend delivery of services to end-users.

Furthermore, there are challenges relating to securing the delivery of services across (possible multiple) wireless mesh infrastructure domains.

62 M. Serrano et al. 6. 2 Federation of Network and Enterprise Management Systems Typical large enterprise systems contain thousands of physically distributed software components that communicate across different networks

Management and configuration is increasingly complex at both the network and enterprise application levels. The complex nature of user requests can result in numerous traffic flows within the networks that can not be correlated with each other,

Challenges in this scenario relies on how monitoring at the network level can provide knowledge that will enable enterprise application management systems to reconfigure software components to better adapt applications to prevailing network conditions.

Conversely, the information enterprise application management systems can provide to network management systems allowing a more efficient

and analyse information and trends in both network management systems and enterprise application management systems,

in a manner such that a coherent view of the communication needs and profile of different transaction types can be built.

Enterprise application management systems must be specified to provide relevant application descriptions and behaviours (e g.,, traffic profiles and Qos levels) to network management system allowing shared knowledge to be used optimally (federation) in network traffic management processes. 6. 3 Federation of Customer Value Networks Scenario Network

the knowledge sector of modern economies is focussed increasingly on value networks rather than on value chains.

however, there is little visibility of the root responsible source of interaction breakdowns between the various communication services providers, application service hosts,

Value networks of customers can only properly be served by federated service providers, henceforth termed Service Provider Federation (SPF).

6. 4 Federation of Home Area Networks Services and Applications An emerging trend in communications networks is the growing complexity and heterogeneity of the outer edge domain the point of attachment of Home

This scenario discloses on aspects about federation and integrated management of outer edge network environments;

and Outlook In the future Internet new designs ideas of Federated Management in Future Internet Architectures must consider high demands of information interoperability to satisfy service composition requirements being controlled by diverse,

The federated autonomic reference model approach introduced in this paper as a design practice for Future Internet architectures emerges as an alternative to address this complex problem in the future Internet of networks and services.

experiments composing services in some of the scenarios described in this paper. 64 M. Serrano et al. 7. 1 Research Outputs as Rationale for Federation Techniques

Algorithms and processes to allow federation in enterprise application systems to visualize software components, functionality and performance.

Techniques for analysis, filtering, detection and comprehension of monitoring data in federated enterprise and networks.

Guidelines and exemplars for the exchange of relevant knowledge between network and enterprise application management systems.

and provide research results about what information enterprise application management systems can provide to federate management systems by using an interoperability of information as final objective.

The work introduced in this paper is a contribution to SFI FAME-SRC (Federated, Autonomic Management of End-to-end Communications Services-Scientific research Cluster.

Activities are funded partially by Science Foundation Ireland (SFI) via grant 08/SRC/I1403 FAME-SRC (Federated, Autonomic Management of End-to-end Communications Services-Scientific research Cluster) and by the Univerself

IEEE 2009 Fourth International Conference on Communications and Networking in China (Chinacom09) 26-28 august, Xi'an, China (2009) 5. Clark, D.,et al.:

Prototype Implementation of the Policy Continuum. In: Proc. of 1st IEEE International Workshop on Broadband Convergence Networks (Bcn 2006), in conjunction with NOMS 2006, Canada, April 7, 2006, pp. 163 172.

Advanced Autonomic Networking and Communication, Birkhäuser, Basel (2008) 8. Raymer, D.,van der Meer, S.,Strassner, J.:

Computer Communications (July 2010), 63 pp. http://www1. cse. wustl. edu/jain/papers/ftp/i3survey. pdf 12.

Challenges and Research Directions in Autonomic Communications. International Journal of Internet Protocol Technology (IJIPT) 2 (1)( 2006) 13.

Multi-Domain IT Architectures for Next Generation Communications Service Providers. IEEE Communications Magazine 48,110 117 (2010) 66 M. Serrano et al. 20.

Serrano, J. M.,van der Meer, S.,Holum, V.,Murphy, J.,Strassner, J.:Federation, A Matter of Autonomic Management in the future internet.

A Perspective for Future Internet Services Based on Autonomic Principles. In: 2007 IEEE Management Week Manweek 2007 2nd IEEE MACE 2007 Workshop, San José, CA, USA, 29.oct 2 Nov (2007) 22.

ACM SIGCOM Computer Communication Review 37 (3)( 2007) 25. Strassner, J.,Agoulmine, N.,Lehtihet, E.:

As reference architectures require agreement among all stakeholders, they are developed usually in an incremental process.

To deal with this heterogeneity, services in the form of standard Web Services and DPWS1,

As services play a pivotal role in the future Internet Architecture, the use of services for integrating the RWI also fits well into the overall architectural picture.

One has to keep in mind though that RWI services have some different properties from common

enterprise-level services: They are of lower granularity, e g.,, just providing simple sensor readings and, more importantly,

they are inherently unreliable; such RWI services may suddenly fail and the data they deliver has to be associated with some quality of information parameters before further processing. 1 Device Profile for Web Services An Architectural Blueprint for a Real-world Internet 69 3 Reference Architecture In this section we present an initial model on

which several of the current RWI architecture approaches are based. While not as comprehensive as a reference architecture, it already identifies the major underlying system assumptions and architectural artifacts of the current RWI approaches.

The model has been developed through a careful analysis of the existing RWI architectures according to the following dimensions:

1. Underlying system assumptions, 2. functional coverage of the services provided by the architectures, 3. underlying information models in the architectures,

and a digital world as depicted in Fig. 1. The real world consists of the physical environment that is instrumented with machine readable identification tags, sensors,

Providing the services and corresponding underlying information models to bridge the physical and the digital world by allowing users/applications to interact with the Resources

so that the services offered by the RWI architectures can find the required resources for the entity-level requests.

or architectural services. 3. 1 Functional Coverage of RWI Architectures This section explores the different functional features provided by the service functions of the existing architectures to support the interactions between resources and resource users and the corresponding

Resource discovery is one of the basic services RWI architectures provide for resource-level access. It allows resource users to lookup

, processing services) on resource hosts in order to satisfy context information requests and actuation requests. Session management functionality is provided to support longer lasting interactions between resources and resource users

or provided information and actuation services. Accountability and traceability can be achieved by recording transactions and interactions taking place at the respective system entities. 3. 2 Smart Object model At its core,

and communication stress on the underlying infrastructure but also the flexibility, extensibility, dependability, determinism, etc. of the implemented system.

However, the interfaces to these choices at the implementation architecture level should be uniform as this allows the exchange of one communication infrastructure by another without requiring major recoding efforts of an application

Also, the interaction patterns manifest themselves in communication flows of different characteristics. In order to effectively support these flows

different types of communication services may be required from the underlying communication service layer. Table 1 shows a simple way to assess

The resource hosts are abstracted through the RFID readers due to the passive communication of the tags.

represents a combination of the service-oriented provision of AAL services and event-driven communication between them,

in order to enable a proactive reaction on some emergent situations in the living environment of elderly people.

It provides generic platform An Architectural Blueprint for a Real-world Internet 75 services like context management for collecting

and abstracting data about the environment, workflow based specifications of system behaviour and semanticallyenabled service discovery.

Framework and platform services are coupled loosely by operating and communicating on shared vocabulary (most important ontologies:

The PECES middleware architecture enables dynamic group-based communication between PECES applications (Resources) by utilizing contextual information based on a flexible context ontology.

, services are described through attributes, modeled as contextual information, and a range of services (resources). Any service (resource) matching that description may be returned by the registry.

Although no session context is required, a pre-requirement exists that interacting PECES applications, whether they are entities or resources,

n, as PECES primarily targets group-based communication scenarios. 76 A. Gluhak et al. 4. 4 Semsorgrid4env The Semsorgrid4env architecture SSG4ENV provides support for the discovery and use of sensor-based,

These resources are made available through a number of data-focused services (acting as resource endpoints),

These services include those focused on data registration and discovery (where a spatiotemporal extension of SPARQL stsparql-,is used to discover data sources from the Semsorgrid4env registry),

services and resources. 4. 5 SENSEI The SENSEI architecture SENSEI aims at integrating geographically dispersed and internet interconnected heterogeneous WSAN (Wireless Sensor and Actuator Networks) systems into a homogeneous

It includes various useful services for both providers and users of real world resources to form a global market space for real world information and interaction.

These uniform descriptions provide the basis for a variety of different supporting services that operate upon.

One of the key support services is a rendezvous mechanism that allows resource users to discover

actuator and processing services can be identified and dynamically combined in order to provide request context information or realize more complex actuation loops.

Furthermore AAA services perform accounting and auditing for authorized use of real world resources. 4. 6 Other Architectures A number of projects focus on aspects beyond the architectural blueprint presented in this chapter,

where Web representations of real-world entities offer services to access and modify their physical state

and to mash up these real-world services with traditional services and data available in the Web.

SPITFIRE extends the architectural model of this chapter by its focus on services supporting heterogeneous and resourceconstrained devices, its extensive use of existing Web standards such as RESTFUL interfaces and Linked Open Data,

and installation independent workflows which react to situations of interest Composer analyses services which are available in a certain installation

and selects and combines those services to achieve the (abstract) service goals Semsorgrid4env Using an RDF-based registry of data sources,

and corresponding stsparql queries In-network query processing capabilities (SNEE) with mote-based sensor networks Data services are generated dynamically according to WS-DAI (Web Services Data Access and Integration) indirect

It supports integration of sensors and AAL services Context Ontology: low-and top-level. It supports context reasoning from a low-level sensor-based model to a high-level service-oriented model Semsorgrid4env Limited management, through WS-DAI indirect access mode N/A n

References ASPIRE Advanced Sensors and lightweight Programmable middleware for Innovative RFID Enterprise applications, FP7, http://www. fp7-aspire. eu/CONET Cooperating Objects Noe,

Web of Data/Linked Data, Semantic web, REST architecture, Internet of Services, SOA and Web Services and Internet of things approaches.

the service-centric perspective is influenced currently in enterprise IT environment and in the Web2. 0 mashup culture, showing the importance of flexibly reusing service components to build efficient applications.

The Content-Centric perspective leverages on the importance of creating, pub 82 M. C. Pettenati et al. lishing and interlinking content on the Web and providing content-specific infrastructural services for (rich media

Services and User perspectives, a rough schema in Table 1 can provide highlights the main, original, driving forces of such approaches.

/Linked Data REST Internet of Services WS-*SOA Web 2. 0, Web 3. 0, Semantic web Internet of things The three views can be interpreted as emphasizing different aspect rather than expressing opposing statements.

and Services are built as a result of a set of functions applied to the content, to pieces of information or services.

and handled by the network architecture so as to Managing a Global Distributed Interlinked Data-Content-Information Space 83 provide basic Services at an infrastructural level

which different actors collaborate 3. the infrastructural support to collaboration on documents and their composing information fragments 4. the Web-wide scalability of the approach.

to support enhanced content/information-centric services for Applications, as highlighted in Figure 1. Fig. 1. Interdatanet architecture situated with respect to the Future Internet architecture envisaged in 7. 84 M. C. Pettenati et al.

(i e. non application-dependent) support to collaboration on above documents and their composing information fragments-the uniform REST interaction with the resources-the Web-wide scalability of the approach.

interface to distributed heterogeneous data management (REST approach) 4. IDN provides-at an infrastructural level-collaboration-oriented basic services, namely:

This will alleviate application-levels of sharing arbitrary pieces of information in ad hoc manner while providing compliancy with current network architectures and approaches such as Linked Data, RESTFUL Web Services, Internet of Service,

and relies on the services offered by IDN naming system. IDN-Nodes are the information that the layers exchange in their communications.

In each layer a different type of IDN-Node is used: SI-Node, RM-Node, IH-Node and VR-Node.

Storage Interface (SI) provides the services related to the physical storage of information and an interface towards legacy systems.

The communications between IDN-SA layers follows the REST 8 paradigm through the exchange of common HTTP messages containing a generic IDN-Node in the message body and IDN-Node identifier in the message header.

It is worth highlighting that the IDN-Service Architecture is designed to allow inherent scalability also in the deployment of its functions.

and deploy specific functionalities of the architecture Fig. 5. Interdatanet Service Architecture scalability features Managing a Global Distributed Interlinked Data-Content-Information Space 89 without the need to achieve the complete

c) the adoption of a RESTFUL Web Services, also known as ROA Resource Oriented Architecture to leverage on REST simplicity (use of well-known standards i e.

HTTP, XML, URI, MIME), pervasive infrastructure and scalability. The current state of Interdatanet implementation and deployment, is evolving along two directions:

IDN-Service Architecture prototypes. Open Access. This article is distributed under the terms of the Creative Commons Attribution Noncommercial License

RESTFUL Web Services; O'reilly Media, Inc.:Sebastopol, CA, USA (2007) 9. Carroll, J. J.,Bizer, C.,Hayes, P.,Stickler, P.:

it aims at achieving a full interoperation among the different entities constituting the ICT environment, by means of the introduction of Semantic Virtualization Enablers,

realized in a home environment, confirm the potentialities of the proposed solution. Keywords: Future Internet architecture, Cognitive networks, Virtualization, Interoperation. 1 Introduction Already in 2005, there was the feeling that the architecture

when the exponential growth of small and/or mobile devices and sensors, of services and of security requirements began to show that current Internet is becoming itself a bottleneck.

but, probably, the growth in Internet-aware devices and the always more demanding requirements of new services and applications will require radical architecture enhancements very soon.

GENI 6 (Global Environment for Network Innovations) is a virtual laboratory for at scale experimentation of network science, based on a 40 Gbps real infrastructure.

which support services and applications by utilizing the current Internet infrastructure. For instance, G-Lab 8 (Design and experiment the network of the future, Germany), is the German national platform for Future Internet studies,

but is also open to innovative technologies and services. The main idea is to collect and elaborate all the information coming from the whole environment (i e.,

, users, contents, services, network resources, computing resources, device characteristics) via virtualization and data mining functionalities; the metadata produced in this way are then input of intelligent cognitive modules

which provide the applications/services with the required functionalities in order to maximize the user Quality of Experience with the available resources.

The Chapter is organized as follows: Section 2 is devoted to the description of the concepts underlying the proposed architecture;

example of Resources include services, contents, terminals, devices, middleware functionalities, storage, computational, connectivity and networking capabilities, etc.;

since the telecommunication network behaviours, due to the large variety of supported services and the rapid evolution of the service characteristics, are becoming more and more unpredictable.

compose atomic services to provide a specific application, maximize the energy efficiency, guarantee a reliable connection, satisfy the user perceived quality of experience and so on.

Z Resources Services Networks Contents Devices Cloud storage Terminals Computational Fig. 1. Proposed Cognitive Future Internet Framework conceptual architecture A Cognitive Future

Furthermore, in each specific environment, the Cognitive Framework functionalities have to be distributed properly in the various network entities (e g.

and of Resource related information (Sensing functionalities embedded in the Resource Interface this monitoring has to take place according to transparent techniques,(ii) the formal description of the above-mentioned heterogeneous parameters/data/services/contents in homogeneous

(ii) providing enriched data/services/contents to the Actors. In addition, these enablers control the sensing, metadata handling, actuation and API functionalities (these control actions,

(ii) provisioning to the appropriate Actors the enriched data/contents/services produced by the Cognitive Enablers (Provisioning functionalities embedded in the Actor Interface;

the most appropriate network entities for hosting the Cognitive Managers have to be selected environment by environment.

as well as the relevant Elaboration functionalities have to be selected carefully environment-byenvironment, trading-off the advantages achieved in terms of efficiency with the entailed additional SW/HW/computation complexity.

So, provided that an appropriate tailoring to the considered environment is performed, the proposed architecture can actually scale from environments characterized by few network entities provided with high processing capabilities,

to ones with plenty of network entities provided with low processing (e g. Internet of things. 8) The above-mentioned flexibility issues favours a smooth migration towards the proposed approach.

Of course, careful, environment-byenvironment selection of the Cognitive Manager functionalities and of the network entities in which such functionalities have to be embedded,

is essential in order to allow scalability and to achieve efficiency advantages which are worthwhile with respect to the increased SW/HW/computing complexity.

which are expected to tailor the presented approach to different environments aiming at assessing, in a quantitative way, the actual achieved advantages in terms of flexibilty (scalability) and efficiency;

nevertheless, in the authors'vision such advantages are already evident, in a qualitative way, in the concepts and discussions presented in this section. 4 Experimental Results The proposed framework has been tested in a home scenario for a preliminary proofof-concept,

Ethernet, PLC) communication technologies. For 100 M. Castrucci et al. testing purposes only a simplified version of the Cognitive Manager has been implemented in each node of the network,

Entity, Future Internet, Ontology, Title Model Introduction The Internet of today has difficulties to support the increasing demand for resources

Souza Pereira et al. 1 Future Internet Works A Future Internet full of services requirements demands networks where the necessary resources to service delivery are orchestrated

and with the context of the consumers taking into account their communication needs at each context,

The Entity Title Model concepts can be used at the communications layer to the real world architecture envisaged by SENSEI 33 project, besides that,

For communication between network elements, ontology is used usually in the application layer, without extending to the middle and lower layers of computer networks.

and network layers protocols to establish communication among the network elements. For example, the applications can select the protocol UDP or TCP, according to delivery guarantee,

It is possible to change the paradigm of client-server communication and the structure of the intermediate layers of the TCP/IP,

so that the communication networks have expansion possibilities to support the needs of the upper layer.

and translating these needs in the communication with and between the lower layers. A possibility proposed by the Entity Title Model. 2. 1 Entity Title Model Concepts

Element whose communication needs can be understood semantically and supported by the service layer and subsequent lower Link and Physical layers.

as the entity here is a communication element and not one resource in a network.

For example, one user, that demands resources, is one communication entity in the Title Model. Also, applications that do not offer resources,

which in turn is an communication element that have its communication needs understood and supported by computer networks.

specified in the ISO-9545/X. 207 recommendation, be extended to the other communication entities of the computer networks.

which are used to identify with no ambiguity the ASO in an OSI environment, consists of AP-title (Application Process title) which, by nature, addresses the applications horizontally 16.

and facilitate communication among the entities and with the other layers 24. Not to use a separate classification for user title,

It is the sole designation to ensure the unambiguous identification of a communication element whose needs may be understood semantically

whose communication needs are understood semantically and supported by the service layer (intermediate layer) that has the physical

It is the realization of the semantics of the need of a communication element, based on service concept presented by Vissers,

They are functionality or desirable technological requirements, essential or indispensable for the communication elements whose needs 108 J. H. de Souza Pereira et al. can be understood semantically

The changing needs of the entities may vary depending on the context of the entities in communication,

and also the context of communication itself. The contexts can be influenced by space time, specific characteristics of entities, among other forms of influence.

where associations between elements of communication may vary according to their desired needs and their variation in time.

Regardless of the time, the nature of communication can also influence the desired values for the facets.

or content of email/instant message, it is necessary to have delivery guarantee in communication.

On the other hand, for an audio or video communication in real time, it will not necessarily be important the delivery guarantee,

This is the layer that has the responsibility on the part of the problem corresponding to the elements of communication,

and record instances of entities and their properties and needs, facilitating communication services among them.

and hierarchical scalability formed by elements of local communication, masters and slaves, similar to DNS (Domain name System).

The DTS does the orchestration of the entities communication, as showed in Fig. 2. 2. 2 Cross Layer Ontology for Future Internet Networks For intermediate semantic layer,

NE3 Destination Service Content User Network Elements (NE) Fig. 2. Entities Communication Orchestrated by the DTS. 4 28.

The Horizontal Addressing by Entity Title has related limitations with the communications needs formalization and standardization,

because the solution for horizontal addressing and communication needs was represented and supported using the Lesniewski Logic 18 29.

In addition, it permits semantic communication cross layers to contribute with, for example, the autonomic management, as the Autoi works.

Ontology for management and governance of services 5. However, these studies does not use the ontology to the formalization of concepts for replacement of the intermediate layers of the TCP IP (including its major protocols such as IP, UDP and TCP.

In the Entity Title Model, entities, regardless of their categories, are supported by a layer of services.

the layers also expose services to other layers. In its concept, the service layer is able to understand

The relationship between Entity, Services and Data link layers are made by the use of concepts directly represented in OWL.

For the communication between the layers running in a Distributed Operating system, without the traditional sockets used in TCP IP,

is used the Raw Socket to enable the communication 19. The following OWL sample code shows one use case example for distributed programming,

Communication with Slave-USP-A; Payload Size Control equal to 84 Bytes; and; Delivery Guarantee request.

Thing>By this semantic information, the Service and Data link layers can support the distributed programming communication using different approaches,

one user may need the Content directly from Services or from other Users (thoughts). In this perspective, the Entity Title Model and its ontology can contribute to converge some Future Internet projects,

that includes different categories of communication entities, and its needs. One basic sample of the taxonomy for this Entity concept is showed in the Fig. 4,

which translates this communication in functionality Fig. 4. Entity Taxonomy in the Title Model. 112 J. H. de Souza Pereira et al. through the Physical and Link layers.

Also, the interoperability, scalability and stability test cases for this model. It is suggested also the continuity of studies and discussions on the use of semantic representation languages in place of protocols in the lower and middle layers of computer networks

thereby defining the communication architecture whose study go over the definitions in the area of protocols architecture.

Global Environment for Network Innovation Program. National Science Foundation, http://www. geni. net (2011) 15 Gruber, T.:

IEEE International Conference on Networking and Services p. 7 (2010) 27 Prud encio, A.,Willrich, R.,Diaz, M.,Tazi, S.:

Socioeconomic Issues 117 Introduction Information and Communication Technologies (ICT) provide in recent years solutions to the sustainability challenge by, e g.,

, measuring impacts and benefits of economic activity via integrated environmental monitoring and modeling, by managing consequences,

and by enabling novel low-impact economic activities, such as virtual industries or digital assets. In turn, ICT enables novel systems in terms of technologies

1) The study of the relationship between any sort of economic activity (here networking in the areas of Internet-based and telecommunications-based communications for a variety of lower-level network/telecommunication as well as application-based services) and the social life of user (here,

mainly addressing private customers of such services and providers offering such services);(2) Markets of Internet service providers (ISP) and Telecommunication Providers;(

3) ISPS peering agreements and/or transit contracts;(4) Customer usage behavior and selections of content;(

6) The investigation of (European) regulation for e-services markets and security regulations;(7) The investigation of the physical environment of e-services in terms of availability, worldwide vs. highly focused (cities),

and dependability for commercial services; and (8) The determination (if possible) of the growth of the Gross domestic product (GDP), providers'revenue maximization,

and customers'benefits. While this collection cannot be considered complete, it clearly outlines that a combination of social and economic viewpoints on pure Internet-based networking is essential.

Thus, the full understanding and modeling of these socioeconomic impacts on Internet communications particularly and the Internet architecture generally challenges networking research and development today.

Economic effects of technical mechanisms in a given setup and topology needs to be investigated and benefits obtained by optimizing

since detailed and specific security demands, electronic identities, or Quality-of-Experience (Qoe) will outline societal requirements to be met by technological support means,

while being at the same time in contrast to simplicity and easeof-operations of a variety of Internet-based services.

To ensure a mutually beneficial situation for all stakeholders in a Future Internet scenario, the Triplewin investigations determine the key goal of Economic Traffic Management (ETM) mechanisms developed.

Based on the assumption that the Internet has evolved into a worldwide social and economic platform with a variety of stakeholders involved,

classify, and develop an analysis framework for such tussles in the socioeconomic domain of Internet stakeholders.

and Burkhard Stiller5 1 Athens University of Economics and Business, Athens, Greece 2 AGH University of Science and Technology, Krakow, Poland 3julius-Maximilian Universität Würzburg

in order to deal with the overlay traffic in a way that is mutually beneficial for all stakeholders of the Future Internet.

and scalability properties. Here, the focus is laid on the first two categories; note that mechanisms

while in Section 5 presents concluding remarks. 2 Methodology of Assessment The detailed studies undertaken to assess ETMS deployment evaluate how all three stakeholders (end users, service providers,

savings resulting from inter-domain traffic reduction and the structure of interconnection tariffs, business models, marketing factors.

or assessed by a metric called Missed Local Opportunities (MLO). It is a measure of a degree of traffic localization.

namely a swarm with higher capacity demand. Performance is improved always since no policy is employed; in each case, higher improvement is observed for the peers of the swarm that the Iop joins.

The effectiveness of this module depends on the number of local leechers and their bandwidth demand,

or even days and was evaluated in a peer-assisted video-on-demand scenario as described in 12.

Implementation-wise for an operational prototype, the Admin component of the Smoothit Information Service (SIS) has been designed as a Web-based tool for the ISP to administrate

19th IEEE International Conference on Computer Communications and Networks (ICCCN 2010), Zürich, Switzerland (August 2010) 11.

and Scalability Investigations of ETM Mechanisms (August 2010) 16. Papafili, I.,Stamoulis, G. D.,Lehrieder, F.,Kleine, B.,Oechsner, S.:

and Henna Warma3 1 BT Innovate & Design, UK philip. eardley@bt. com 2 Athens University of Economics and Business, Greece {kanakakis, alexkosto}@ aueb. gr

deployment and adoption Protocol design Initial scenario (s) Deployment Adoption Benefits to Stakeholders Incremental Implement Wider scenario Deployment Adoption Implement Network effect

new opportunities through forms etc. As another example, a NAT (Network Address Translator) allows an operator to support more users with a limited supply of addresses,

So commercial, not technical, considerations should determine what the right step size is it adds sufficient functionality to meet a specific business opportunity.

Then each step may involve different stakeholders, for example Bittorrent was adopted initially by application developers (and their end-users) to transfer large files,

because different stakeholders are involved equipment vendors implement, whilst network operators deploy; their motivations are not the same.

and TCP restricts communications to a single path per transport connection. But hosts are connected often by multiple paths,

as only one stakeholder is involved viz the data centre operator. Fig. 2. Potential MPTCP deployment scenario, in a data centre.

Both the devices and servers are under the control of one stakeholder, so the end user‘unconsciously'adopts MPTCP.

Several stakeholders may now be involved. For instance, it is necessary to think about the benefits and costs for OS vendors, end users, applications and ISPS (Internet service providers.

is problematic as it requires several stakeholders to coordinate their deployment 9 . Since this is likely to be difficult,

for instance telepresence offerings now wrap together several services that separately had less market traction. 6 Conclusions The main message of this Chapter is that implementation,

Journal of Political Economics 94,822 841 (1986) 6. Joseph, D.,Shetty, N.,Chuang, J.,Stoica, I.:

ACM SIGCOMM Computer Communications Review 40 (2)( 2010) 8. Kostopoulos, A.,Warma, H.,Leva, T.,Heinrich, B.,Ford, A.,Eggert, L.:

IEEE International Conference on Communications, ICC (2006) 18. Hasegawa, Y.,Yamaguchi, I.,Hama, T.,Shimonishi, H.,Murase, T.:

Improved data distribution for multipath TCP communication. In: IEEE GLOBECOM (2005) 19. Kelly, F.,Voice, T.:

Computer Communication Review 35,2 (2005) 20. Key, P.,Massoulie, P.,Towsley, D.:Combined Multipath Routing and Congestion Control:

and Burkhard Stiller4 1 Athens University of Economics and Business, Greece ckalog@aueb. gr, courcou@aueb. gr, gstamoul@aueb. gr 2 University of Southampton

With the evolution of the Internet from a controlled research network to a worldwide social and economic platform, the initial assumptions regarding stakeholder cooperative behavior are no longer valid.

, services, and content. Accordingly, different stakeholders in the Internet space have developed a wide range of on-line business models to enable sustainable electronic business.

Furthermore, the Internet is increasingly pervading society 3. Widespread access to the Internet via mobile devices, an ever-growing number of broadband users worldwide,

and trends like the Internet-of-Things or the success of Cloud services, all provide indicators of the high significance of the Internet today.

a thorough investigation into socioeconomic tussle analysis becomes highly critical 9. The term tussle was introduced by Clark et al. 5 as a process reflecting the competitive behavior of different stakeholders involved in building

which each stakeholder has particular self-interests, but which are in conflict with the self-interests of other stakeholders.

Following these interests results in actions and inter-actions between and among stakeholders. When stakeholder interests conflict,

inter-actions usually lead to contention. Reasons for tussles to arise are manifold. Overlay traffic management and routing decisions between autonomous systems 11

and mobile network convergence 10 constitute only two representative examples for typical tussle spaces. The main argument for focusing on tussles in relation to socioeconomic impact of the future Internet is in the number of observed stakeholders in the current Internet and their interests.

Clark et al. speak of tussles on the Internet as of today. They argue 5 that t here are,

tussle analysis becomes an important approach to assess the impact of stakeholder behavior. This paper proposes a generic methodology for identifying

subject to restrictions imposed by the environment and the actions of others 6. Similarly, game-theoretic models that aim at finding

In Section 3 we provide a classification of tussles according to stakeholders'interests into social and economic ones,

and can be executed recursively, allowing for more stakeholders, tussles, etc. to be included in the analysis. It is out of the article's scope to suggest where the borderline for the analysis should be drawn,

economists and social scientists, would allow for suggesting candidate techniques and incorporating useful insights from different domains at each step of the methodology.

1. Identify all primary stakeholders and their properties for the functionality under investigation. 2. Identify tussles among identified stakeholders and their relationship. 148 C. Kalogiros et al. 3. For each tussle:

a. Assess the impact to each stakeholder; b. Identify potential ways to circumvent and resulting spill overs.

For each new circumventing technique, apply the methodology again. The first step of the methodology suggests identifying

and studying the properties of all important stakeholders affected by a functionality related to a protocol, a service,

The outcome of this step is a set of stakeholders and attributes such as their population, social context (age, entity type, etc.

as well as the relative influence across stakeholders, change over time. The next step aims at identifying conflicts among the set of stakeholders and their relationship.

In performing the first part of this step the analyst could find particularly useful to check

The third step of the methodology proposes to estimate the impact of each tussle from the perspective of each stakeholder.

In the ideal scenario a tussle outcome will affect all stakeholders in a nonnegative way

Usually this is a result of balanced control across stakeholders, which means that the protocols implementing this functionality follow the Design for Choice design principle 5. Such protocols allow for conflict resolution at run-time,

or all stakeholders are satisfied not by the tussle outcome and have the incentive to take advantage of the functionality provided,

which one can draw inferences about stakeholders and tussles. For all steps of this methodology except for 3a,

However, in complex systems with multiple stakeholders, multiple quantitative and qualitative sources of evidence may be required to better understand the actual and potential tussles.

as well as providing benchmarks like the price of anarchy ratio. Ideally a single metric should be used

a) contention among HUS and IUS for bandwidth on congested links and (b) contention among ISPS and HUS since the aggressive behavior of the latter has a negative effect on IUS and provision of other services.

since high congestion can have an impact on ISP's plans to offer other real-time services.

In this case, the set of stakeholders is extended to include ASPS as well. The new tussle involves ISPS and ASPS (e g.

In the third iteration it will be assumed that the policy-maker (a new stakeholder) decides to intervene

The regulator's decision will redistribute control across stakeholders in a balanced way or, in more complex cases,

On the right part of Figure 1 we see that agents acting selfishly can lead to new tussles (spill over) that may involve new stakeholders as well.

For example, the Tussle I among Actor A and Actor B may trigger the Tussle II involving the same stakeholders,

Economic tussles refer to conflicts between stakeholders, motivated from an expected reward gained (or cost avoided)

while social tussles refer to conflicts between stakeholders that do not share the same social interests,

because a set of stakeholders follow economic objectives and their actions affect the social interests of other stakeholders. 3. 1 Tussle Patterns We have identified an initial set of four tussle patterns that include contention, repurposing, responsibility and control.

Figure 2 shows the actors involved in each tussle An Approach to Investigating Socioeconomic Tussles 151 pattern,

Dotted arrows represent a conflict among two stakeholders while a dotted rectangle shows the selected set of resources

when at least one stakeholder has the ability to influence the outcome. Based on the context, a reverse tussle pattern may also be present.

and an individual stakeholder can be a resource consumer in one tussle, but a provider of a resource in another.

The tussle exists either between consumer interests due to the scarcity of resource, or among a consumer and the provider due to the impact on a provider's ability to exploit the resource.

or even a provider that receives services at the wholesale level (we refer to this case as the reverse contention tussle).

Instances of this tussle pattern have their roots in economics and thus are resolved typically through the process of economic equilibrium

and throttling so that quality of other services is acceptable). 3. 2 Economic Tussles Economic tussles refer to conflicts between stakeholders,

motivated from an expected reward gained (or cost avoided) when acting rationally. These tussles are realized by taking advantage of imbalanced access to necessary information,

Economic tussles are mostly related to the scarcity of certain resources that need to be shared. Furthermore, such tussles can occur between collaborating stakeholders due to different policies or, in economic terms, different valuations of the outcome.

Tussles can also appear when a stakeholder is being bypassed. Contention tussles are caused usually by the existence of scarce resources

and can be seen as evidence of misalignment between demand and supply in the provisioning of services.

A popular example is bandwidth of bottleneck links and radio frequencies shared between users and wireless devices.

which economists identify as a tragedy of the commons. Similar contention tussles can take place for other cloud resources as well

and must protect its investments. Examples include the deployment of Deep Packet Inspection techniques by ISPS

in order to control how bandwidth is allocated across users and services. The remaining tussle patterns are seen mostly in bilateral

a situation known as information asymmetry in the economic theory literature. This imbalance of power can sometimes lead to market failures,

this lower price would lead some sellers of higher quality services to stop selling (since they do not cover their costs anymore) and thus, in the long term,

only low quality services will be available. Similarly, if a service provider were informed the less party, then setting-for example-a low price would increase his risk of being selected by the least profitable customers.

This would increase his costs and trigger a rise in prices, making this service less attractive to a number of profitable customers.

Eventually this adverse selection spiral might, in theory, lead to the collapse of the market. The repurposing tussle pattern described above can be associated with the adverse selection issue.

and performed traffic shaping then it may have negative impact on the services, and thus, on the viability of new ASPS, who however cannot safely attribute these effects to the ISP.

Repurposing tussles occur in regards to the privacy of user communication data between users, ISPS, service providers and regulators.

generally speaking, that networks are trustworthy and private 2. The privacy of communications is based on democratic ideals,

they must be given access to network communication data. Furthermore, ISPS and other companies such as Google and Amazon have increasingly been able to monetize their user transaction data and personal data.

trying to make a profit. ISPS, however, are placed often in the uncomfortable position of trying to negoti An Approach to Investigating Socioeconomic Tussles 155 ate a balance between their users'expectations of privacy (which,

the potential profits to be made from monitoring and monetizing the communication of their users, and the demands of government bodies to be able to monitor the networks for illegal or unwanted activities.

Control tussles in a social context relate, for instance, to digital citizenship and understanding the balance between individual and corporate rights and responsibilities

and how such a balance can be achieved through accountability and enforceable consequences (e g. loss of privileges.

and those wishing to maintain confidential communication. For instance, is Wikileaks right or wrong to distribute leaked documents containing the details of government and corporate communications?

Until Wikileaks started releasing real documents of widespread interest, few people were interested in debating the societal risks

and what role ISPS and service providers such as Paypal have in supplying services to controversial online bodies come to the forefront.

The Trilogy project 16 studied extensively the contention tussle among users as well as among an ISP and its customers, due to the aggressive behavior of popular file sharing applications.

The ETICS project (Economics and Technologies for Inter-Carrier Services) 8 studies a repurposing tussle arising

when an ISP (the provider) requests a share of an ASP's revenues (the consumer) due to its higher investment risks and operational costs.

Since it is based on a lean architecture to operate new services in the future Internet, the discovery of capabilities and the adaptation of many management operations to current working An Approach to Investigating Socioeconomic Tussles 157 conditions of a network are major elements in the new approach.

The MOBITHIN project 13 is related to a responsibility tussle between users of wireless services, mobile operators and regulators that has arisen from the social interest to reducing carbon footprint of the ICT sector

and the Future Internet research community by offering selected services to FP7 projects in Challenge 1. SESERV provides access to socioeconomic experts investigating the relationship between FI technology, society,

and the economy through white papers, workshops, FIA sessions, and research consultancy. In this paper SESERV proposes a methodology for identifying

we believe it can capture the evolving relationships among stakeholders, and thus tussles, across time.

Pricing Communication Networks: Economics, Technology and Modeling. Wiley, Chichester (2003) 7. CRAMM: http://www. cramm. com (accessed December 1, 2010) 8. ETICS:

https://www. ict-etics. eu (accessed December 1, 2010) 9. Ford, A.,Eardley, P.,van Schewick, B.:

IEEE International Conference on Communications Workshops, June 2009, pp. 1 5 (2009) 10. Herzhoff, J. D.,Elaluf-Calderwood, S m.,Sørensen, C.:

D2. 5 Business models, Public Deliverable, http://www. mobithin. eu (accessed December 1, 2010) 14. SENDORA project:

Cloud computing, for instance, is built on shared resources and computing environments, offering virtualized environments to individual tenants

or groups of tenants, while executing them on shared physical storage and computation resources. The concept of Platform-as-a-service provides joint development and execution environments for software and services,

with common framework features and easy integration of functionality offered by third parties. The Internet of Services allows the forming of value networks through on-demand service coalitions

built upon service offerings of different provenance and ownership. And, finally, the principle of sharing and collaboration reaches to the applications and business models, ranging from the exchange of data of physical objects for the optimization of business scenarios in, e g.,

, retail, supply chain management or manufacturing, the Internet of things to social networks. While it is evident that sharing

as well as providing assurance about security properties of exposed services and information. 164 Part III: Future Internet Foundations:

First, Future Internet principles are supported by revised communication paradigms, which address potential security issues from the beginning,

replacing point-to-point communication by a publish/subscribe approach. This allows the recipient to control the traffic received and

The second group of chapters investigates the provision of assurance of the security properties of services and infrastructures in the future Internet.

Without trustworthy components, the opportunities of sharing and collaboration cannot be leveraged. The chapter Engineering Secure Future Internet Services by W. Joosen et al. makes a point for establishing an engineering discipline for secure services,

taking the characteristics of the Future Internet into account. Such a discipline is required to particularly emphasize multilateral security requirements, the composability of secure services,

the provision of assurance through formal evidence and the consideration of risk and cost arguments in the Secure Development Life cycle (SDLC).

The authors propose security support in programming and execution environments for services, and suggest using rigorous models through all phases of the SDLC, from requirements engineering to model-based penetration testing.

One of the major ingredients of this program, the provision of security assurance through formal validation of security properties of services, is investigated in detail in the chapter‘Towards Formal Validation of Trust and Security in the Internet of Services by R

They introduce a language to specify the security aspects of services and a validation platform based on model-checking.

A number of distinguished features ensure the feasibility of the approach to Future Internet scenarios and the scalability to its complexity:

and the automated technology is integrated in industrial-scale process modeling and execution environments. The two chapters demonstrate the way towards rigorous security

and users to fully exploit the Future Internet opportunities today. While engineering and validation approaches provide a framework for the secure design of Future Internet artifacts adapted to its characteristics, the third group of Part III:

as if they were working within a single cloud environment. This advanced level of distribution offers increased economic benefits,

but also in most other Future Internet scenarios like the Internet of Services, the need for data exchange leads to sensitive data, e g.,

removing a major hurdle for using its exciting opportunities in sensitive scenarios of both the business and societal worlds.

they must be able to operate in a hostile environment, where a large number of users are assumed to collude against the network and other users.

and examine the minimal trust assumptions between the stakeholders in the system to guarantee the security properties advertised.

network security 1 Introduction Data-centric pub/sub as a communication abstraction 2, 3, 4 reverses the control between the sender and the receiver.

Availability, which means that the attackers cannot prevent communication between a legitimate publisher and a subscriber inside a trusted scope.

In addition to aforementioned goals, the solution is restricted by the requirements of scalability and efficiency. For example, it must be assumed that the core routers forward packets at line-speeds of tens of Gigabits per second

In the inter-domain setting, we have to take into account the various stakeholders such as ISPS, end-users,

but keep the architecture flexible and let the balance of power between stakeholders to decide the stable configuration.

and minimal in complexity and trust assumptions between stakeholders. 2 Basic Concepts Data-or content-centric networking can be seen as the inversion of control between the sender

3. We use the term information-centric for this communication pattern to emphasize that the data items can link to other named data

and Qos for the publication and may support transport abstraction specific policies such as replication and persistence for data-centric communication.

it can be used to set up communication using any kind of transport abstraction on the data plane fast path,

that is used for the payload communication. The data-centric paradigm is a natural match with the communication of topology information that needs to be distributed typically to multiple parties

and the ubiquitous caching considerably reduces the initial latency for the payload communication as popular operations can be completed locally based on cached data.

Below the control plane t he network is composed of domains, that encapsulate resources such as links,

We have developed our own language called advanced network description language (ANDL) for the communication of network topology information in control plane publications

Each transport protocol implements a specific communication abstraction and every actualized instance of interaction or communication event consuming the resources of the network has associated an transport, topic, a graphlet and a set of roles.

For example, when IP is seen as a transport protocol in our network architecture, the roles for the endpoints are a source and a destination or for data-centric transport:

For example, for data-centric communication, the topic identifies the requested publication. A graphlet defines the network resources used for the payload communication

and it can be anything from the path of an IP packet to private virtual circuits.

Some protocols may require an additional phase for the reservation of a graphlet before the payload communication.

but the policies can be divided into aspects of communication handled modularly by different scopes implemented by different entities.

Because it is not feasible to use traditional cryptographic solutions like RSA on a per-segment basis in the payload communication,

An FPGA based hardware accelerator has been developed for PLA 24 accelerating cryptographic operations. Security Design for an Inter-Domain Publish/Subscribe Architecture 171 Fig. 1. Publications can refer to other publications persistently using long-term Aids.

which can, for example, limit the access to the scope only to the customers of the company.

e g. the link between the two publications, is orthogonal to the scoping of the data that determines the communication aspects for each publication. 2. 2 Interdomain Structure Each node has an access to a set of network resources In the current Internet,

which the communication takes place. The scope joins the upgraphs and produces an endtoend path between the service container e g. a data source)

and the client (e g. a subscriber) and returns the information to the client that can then use this information to join a graphlet (e g. a delivery tree) that can then be used for the fast-path payload communication.

but the internetwork can freely evolve based on trust between neighbouring domains. 4 Phases of Communication Each node wishing to communicate first requests the description of end-to-end fastpath resources used for the graphlet from the scope by subscribing to a publication labeled<Topic rid>,<UN,

which minimizes the amount of communication as only relevant information needs to be transfered. Multiple scopes can be used together by performing the rendezvous independently for each of the scopes

which would hide the destination of the communication from the transit domains and thus guarantee some level of network neutrality.

Doctoral dissertation, Department of computer science and Engineering, Aalto University, School of Science and Technology (2010) Engineering Secure Future Internet Services Wouter Joosen1, Javier Lopez2, Fabio Martinelli3,

and the opportunity for establishing a discipline for engineering secure Future Internet Services, typically based on research in the areas of software engineering,

Generic solutions that ignore the characteristics of Future Internet services will fail, yet it seems obvious to build on best practices

Such a life cycle support must deliver assurance to the stakeholders and enable risk and cost management for the business stakeholders in particular.

The paper should be considered a call for contribution to any researcher in the related sub domains

in order to jointly enable the security and trustworthiness of Future Internet services. 1 Introduction 1. 1 Future Internet Services The concept named Future Internet (FI) aggregates many facets

Besides such a network-level evolution, the Future Internet will manifest itself to the broad mass of end users through a new generation of services (e g. a hybrid aggregation of content and functionality

, personal and enterprise mash-ups), and service warehouses (e g.,, platform as a service. One specific service instance may

and used by a virtual consortium of business stakeholders. While the creative space of services composition is unlimited in principle,

so is the fragmentation of ownership of both services and content, as well as the complexity of implicit and explicit relations among participants in each business value chain that is generated.

In addition, the user community of such FI services evolves and widens rapidly, including masses of typical end users in the role of prosumers (producing and consuming services).

This phenomenon increases the scale, the heterogeneity and the performance challenges that come with FI service systems.

This evolution obviously puts the focus on the trustworthiness of services. Multiparty service systems are not entirely new,

yet the Future Internet stretches the present know how on building secure software services and systems:

more stakeholders with different trust levels are involved in a typical service composition and a variety of potentially harmful content sources are leveraged to provide value to the end user.

This is attractive in terms of degrees of freedom in the creation of service offerings and businesses. Yet this also creates more vulnerabilities

and services are shared and composed. This adds an extra level of complexity, as both risks and assumptions are hard to anticipate.

and reassessed continuously. 1. 2 The Need for Engineering Secure Software Services The need to organize,

integrate and optimize the research on engineering secure software services to deal effectively with this increased challenge is pertinent and well recognized by the research community and by the industrial one.

This obviously harms the economic impact of Future Internet services and causes significant monetary losses in recovering from those attacks.

In addition, this induces users at several levels to lose confidence in the adoption of ICT-services.

Infrastructure as a service (Iaas), Platform as a service (Paas) and Software as a service (Saas). These models have the potential to better adhere to an economy of scale

New Internet services will have to be Engineering Secure Future Internet Services 179 provided in the near future,

and security breaches in these services may lead to large financial loss and damaged reputation. 1. 3 Research Focus on Developing Secure FI Services Our focus is on the creation and correct execution of a set of methodologies, processes and tools for secure software development.

This typically covers requirements engineering, architecture creation, design and implementation techniques. However this is not enough!

This would allow the uptake of new ICT-services according to the latest Future Internet paradigms,

where services are composed by simpler services (provided by separate administrative domains) integrated using third parties infrastructures and platforms.

in order to improve their return of investments (ROI). Thus, embedding risk/cost analysis in the SDLC is currently one of the key research directions

Our research addresses the early phases of the development process of services, bearing in mind that the discovery and remediation of vulnerabilities during the early development stages saves resources.

1) security requirements for FI services,(2) creating secure service architectures and secure service design,

(3) supporting programming environments for secure and compose-able services,(4) enabling security assurance, integrating the former results in (5) a risk-aware and cost-aware software development life-cycle (SDLC),

and (6) the delivery of case studies of future internet application scenarios. The first three activities represent major and traditional stages of (secure) software development:

and techniques that we consider useful for engineering secure Future internet services. 2 Security Requirements Engineering The main focus of this research strand is to enable the modeling of high-level requirements that can be expressed in terms of

These can be mapped subsequently into more specific requirements that refer to devices and to specific services.

A key challenge is to support dealing with an unprecedented multitude of autonomous stakeholders and devices probably one of the most distinguishing characteristics of the FI.

The need for assurance in the future Internet demands a set of novel engineering methodologies to guarantee secure system behavior and provide credible evidence that the identified security requirements have been met from the point of view of all stakeholders.

but they will also involve multiple autonomous stakeholders, and may involve an array of physical devices such as smart cards, phones,

Service-orientation and the fragmentation of services (both key characteristics of FI applications) imply that a multitude of stakeholders will be involved in a service composition

and modeling all the stakeholders'security requirements become a major challenge 5. Multilateral Security Requirements Analysis techniques have been advocated in the state of the art 14

In this respect, agent-oriented and goal-oriented approaches such as Secure Tropos 12 and KAOS 8 are recognized currently well as means to explicitly take the stakeholders'perspective into account.

Engineering Secure Future Internet Services 181 This picture is complicated further by the vast number and the geographical spread of smart devices stakeholders would deploy to meet their requirements.

Sensor networks, RFID tags, smart appliances that communicate not only with the user but with their manufacturers, are examples of such devices.

The definition of techniques for the identification of all stakeholders (including attackers), the elicitation of high-level security goals for all stakeholders,

and the identification and resolution of conflicts among different stakeholder security goals; The refinement of security goals into more detailed security requirements for specific services and devices;

The identification and resolution of conflicts between security requirements and other requirements (functional and other quality requirements;

and results will be applied to a versatile set of services, devices and stakeholder concerns. 3 Secure Service Architecture and Design FI applications entail scenarios in

which there exist a huge amount of heterogeneous users and a high level of composition and adaptation is required.

The research topics one must focus on in this subarea relate to model-driven architecture and security, the compositionality of design models and the study of design patterns for FI services and applications.

The three share the common ambition to maximize reuse and automation while designing secure FI services and systems.

and GRID services and although some work has already been made in the area 23, further research is necessary to find out what kind of security architecture is required in the context

each model representing different functional and nonfunctional concerns that different stakeholder may have about it. However

Engineering Secure Future Internet Services 183 in order to grasp a comprehensive understanding of the application as a whole,

Finally, adaptation of composite services is a key area of interest. FI scenarios are very dynamic,

so threats in the environment may change along the time and some reconfiguration may be required to adapt to that changes.

both from a general perspective and from a security perspective for security-critical software systems. 4 Security Support in Programming Environments Security Support in Programming Environments is not new;

still it remains a grand challenge, especially in the context of Future Internet (FI) Services.

The context of the future internet services sets the scene in the sense that (1) specific service architectures will be used,

that (2) new types of environments will be exploited, ranging from small embedded devices (things) to service infrastructures and platform in the cloud,

The search for security support in programming environments has to take this context in account.

and composing services from preexisting building blocks (services and more traditional components), as well as programming new services from scratch using a state-of-the-art programming language.

The service creation context will typically aim for techniques and technologies that support compile and build-time feedback.

Dependent on the needs and the state-of-the-art this may lead to interception and enforcement techniques that simply ensure that the application logic consistently interacts with underpinning security mechanisms such as authentication or audit services.

and services (e g. supporting mutual non repudiation, attribute based authorization in a cloud platform etc.)will be required as well for many of the typical FI service environments.

Next we further elaborate on the needs and the objectives of community wide research activities. 4. 1 Secure Service Composition Future Internet services

and applications will be composed of several services (created and hosted by various organizations and providers), each with its own security characteristics.

The business compositions are very dynamic in nature, and span multiple trust domains, resulting in a fragmentation of ownership of both services and content,

and a complexity of implicit and explicit relations among the participants. Service Composition Languages. One of the challenges for the secure service composition is need the for new formalisms to specify service requests (properties of service compositions) and service capabilities

and tools to generate code for service compositions that are able to fulfil these requirements based on the available services.

composition languages must support means to preserve at least the security policy of those services being composed. The research community needs to consider the cases where only partial

or inadequate information on the services is available, so that the composition will have to find compliant candidates

with a special emphasis on Engineering Secure Future Internet Services 185 enabling deployment, access, discovery and composition of pervasive services offered by resource-constrained nodes. 4. 2

The research community must further investigate advances over state-of-the-art in fine-grained concurrency to enable highly concurrent services of the Future Internet

In effect, the security enforcement techniques that are triggered by built-in security services and by realistic in the FI setting,

Supporting Security Assurance for FI Services. Assurance will play a central role in the development of software based services to provide confidence about the desired security level.

Assurance must be treated in a holistic manner as an integral constituent of the development process

Obviously the security support in programming environments that must be delivered will be essential to incept a transverse methodology that enables to manage assurance throughout the software and service development life cycle (SDLC.

The next section clarifies these issues. 5 Embedding Security Assurance and Risk management during SDLC Engineering secure Future Internet services demands for at least two traversal issues,

security assurance and risk and cost management during SDLC. 5. 1 Security Assurance The main objective is to enable assurance in the development of software based services to ensure confidence about their trustworthiness.

by developing refinement strategies, from policies down to mechanisms, for more complex Engineering Secure Future Internet Services 187 secure protocols, services, and systems.

There is an increasing demand of models and techniques to allow the formal analysis of secure services.

The objective is to develop methodologies based on formal mappings from the constraint languages, to other formalisms for which theorem proving

In that case, it is possible to develop test data generation that specifically targets the integration of services

but have to be implemented in complex distributed and adaptable systems of FI services. We need comprehensive assurance techniques

Service-oriented architectures demand for assurance indicators that can explicitly indicate the quality of protection of a service,

and Cost Aware SDLC There is the need of the creation of a methodology that delivers a risk and cost aware SDLC for secure FI services.

Such a life cycle model aims to ensure the stakeholders'return of investment when implementing security measures during various stages of the SDLC.

In order to support the propagation of analysis results through the phases of the SDLC Engineering Secure Future Internet Services 189 one needs to develop methods and techniques for the refinement of risk analysis documentation.

as well as effectively handling the heterogeneous and compositional nature of Future Internet services, one needs to focus on a modular approach to the analysis of risks and costs.

or component substitution, evolving environments, evolving security requirements, etc.,both during system development and operation.

and the opportunity for firmly establishing a discipline for engineering secure Future Internet Services, typically based on research in the areas of software engineering, security engineering and of service engineering.

We have clarified why generic solutions that ignore the characteristics of Future Internet services will fail:

the peculiarities of FI services must be reflected upon and be addressed in the proposed and validated solution.

Work partially supported by EU FP7-ICT project NESSOS (Network of Excellence on Engineering Secure Future Internet Software Services and Systems) under the grant agreement n. 256980.

Springer, Heidelberg (2008) Engineering Secure Future Internet Services 191 8. Dardenne, A.,van Lamsweerde, A.,Fickas, S.:

Proceedings of the 11th IEEE International Enterprise Distributed Object Computing Conference, WASHINGTON DC, USA, p. 253.

Multilateral security requirements analysis for preserving privacy in ubiquitous environments. In: Proc. of the Workshop on Ubiquitous Knowledge discovery for Users at ECML/PKDD, pp. 51 64 (2006) 15.

Security services architecture for secure mobile grid systems. Journal of Systems Architecture. In Press (2010) 24.

IEEE Journal on Selected Areas in Communications 21 (1), 2003 (2003) 25. Whittle, J.,Moreira, A.,Ara'ujo, J.,Jayaraman, P.,Elkhodary, A m.,Rabbi, R.:

Progress in Informatics 5, 35 47 (2008) Towards Formal Validation of Trust and Security in the Internet of Services Roberto Carbone1, Marius Minea2, Sebastian Alexander M odersheim3

The formal verification of trust and security of the Internet of Services will significantly boost its development

and public acceptance. 1 Introduction The vision of the Internet of Services (Ios) entails a major paradigm shift in the way ICT systems

but are built by composing services that are distributed over the network and aggregated and consumed at run-time in a demand-driven, flexible way.

In the Ios, services are business functionalities that are designed and implemented by producers, deployed by providers,

aggregated by intermediaries and used by consumers. However, the new opportunities opened by the Ios will only materialize if concepts,

techniques and tools are provided to ensure security. Deploying services in future network infrastructures entails a wide range of trust and security issues

but solving them is extremely hard since making the service components trustworthy is not sufficient:

composing services leads to new, subtle and dangerous, vulnerabilities due to interference between component services and policies, the shared communication layer,

so as to prevent the production and consumption of already flawed services. Fortunately, a new generation of analyzers for automated security validation at design time has been recently put forth;

some of the main features of specification languages and automated validation techniques that have been developed for the verification of trust and security of services.

their components are built using different technology and run in different environments, yet interact and may interfere with each other. 8 Such as model checking with constraints, approaches based on SAT (i e.,

Towards Formal Validation of Trust and Security in the Internet of Services 195 Second, SOAS are also distributed systems,

services may be composed at runtime, agents may join or leave, and client credentials are affected by dynamic changes in security policies (e g.,

and processed by services. The security properties of SOAS are, moreover, very diverse. The classical data security requirements include confidentiality

if the intruder cannot block the communication indefinitely. This diversity of goals cannot be formulated with a fixed repertoire of generic properties (like authentication;

One needs a language fully dedicated to specifying trust and security aspects of services, their composition,

changing with the workflow context) with services that can be added and composed dynamically themselves. As a concrete solution, in the AVANTSSAR project, we have defined a language, the AVANTSSAR Specification Language ASLAN, that is both expressive enough that many high-level languages,

with immediate consequences for their access rights. 9 The AVANTSSAR Platform allows users also to input their services by specifying them using the high-level formal specification language ASLAN,

++which we have defined to be close to specification languages for security protocols/services and to procedural and object-oriented programming languages.

we may require a separation of duty property, namely that for privacy Towards Formal Validation of Trust and Security in the Internet of Services 197 purposes,

the inherent complexity (heterogeneity, distribution and dynamicity) of the Internet of Services, the challenge of validating services and service-oriented applications cannot be addressed simply by scaling up the current generation of formal analysis approaches and tools.

Rather, novel and different validation techniques are required to automatically reason about services, their composition, their required security properties and associated policies.

In particular, one has to consider the various ways in which component services can be coordinated

one of the basic principles and design-objectives of SOAS, expresses the need for providing simple scenarios where already available services can be reused to derive new added-value services.

This motivates the introduction of automated solutions to scalable services composition. Two key approaches for composing web services have been considered,

which differ by their architecture: orchestration is centralized and all traffic is routed through a mediator, whereas choreography is distributed

and all web services can communicate directly. 198 R. Carbone et al. Several orchestration notions have been advocated (see, e g.,

whether a given model representing the execution of the service under scrutiny in a hostile environment enjoys the security properties specified by a given formula.

and/or on its execution environment that prevent their applicability in some important cases. For instance, most techniques assume that communication between honest principals is controlled by a Dolev-Yao intruder 17,

i e. a malicious agent capable to overhear, divert, and fake messages. Yet we might be interested in establishing the security of a service that relies on a less insecure channel.

In fact, services often rely on transport protocols enjoying some given security properties (e g. TLS is used often as a unilateral or a bilateral communication authentic and/or confidential channel

and it is thus important to develop model-checking techniques that support reasoning about communication channels enjoying security-relevant properties, such as authenticity, confidentiality, and resilience.

In particular, the AVANTSSAR Platform integrates a bounded model-checking technique for SOAS 1 that allows one to express complex security goals that services are expected to meet as well as assumptions on the security offered by the communication channels. 3. 3 Channels

we may have a layer that provides a secure communication infrastructure between participants, e g. a virtual private network or a TLS 26 channel,

It is, Towards Formal Validation of Trust and Security in the Internet of Services 199 of course,

independently using several protocols over the same communication medium. Moreover, there are first results for the layered compositional reasoning needed for SOAS,

if its communication is routed over a secure channel, and (iii) both satisfy certain sufficient conditions (their message formats do not interfere.

For instance, Tulafale 6, a tool by Microsoft Research based on Proverif 7, exploits abstract interpretation for verification of web services that use SOAP messaging, using logical predicates to relate the concrete

and security requirements of a goal service and a description of the available services (including a specification of their security-relevant behavior,

in order to build an orchestration of the available services that meets the security requirements stated in the policy.

, a composition, of the available services in a way that is expected (but not yet guaranteed) to satisfy the input policy.

It takes as input an ASLAN file with a specification of the available services and either a specification of the client or a partial specification of the goal,

and it produces as output an ASLAN file with the specification of the available services, a full specification of the goal,

Towards Formal Validation of Trust and Security in the Internet of Services 201 Vulnerability: Policy:

Service insecure P Policy Composed service/policy CP CS Secured service/policy TS Wrapper CS CP secure Services feedback BPMN

+Annotations CONN BPEL+Annotations CONN CONNANB CONNECTOR ASLAN++orchestration/composition validation problem TS ORCHESTRATOR TS VALIDATOR Specification of the available services (new) Service specified

ASLAN ASLAN TS Wrapper The AVANTSSAR Validation Platform Fig. 1. The AVANTSSAR Validation Platform and its usage towards Enterprise SOA. 202 R. Carbone et al.

In this way, we have been able to detect a considerable number of attacks in the considered services

and Industry Migration The landscape of services that require validation of their security is very broad.

and assess in such environments. To ease the analysis, it is necessary to factor out the access control policies and meta-policies from the possible workflow,

services from a wide variety of application areas have been modeled: banking (loan origination), electronic commerce (anonymous shopping), e-Government (citizen and service portals, public bidding, digital contract signing),

it is hard to establish which message fields are mandatory in a given Towards Formal Validation of Trust and Security in the Internet of Services 203 profile and

granting unauthorized access to private data and services (email, docs, etc.).The vulnerability was detected by the SATMC backend of the AVANTSSAR Platform

and Google's customers updated their applications accordingly. The severity of the vulnerability has been rated High in a note issued by the National Institute of Standard and Technology (NIST.

Formal validation of trust and security will become a reality in the Internet of Services

A concrete example is the industry migration of the AVANTSSAR Platform to the SAP environment.

and identity provider services fulfill the expected security desiderata in the considered SAP relevant scenarios.

The results have been collected in tables that can be used by SAP in setting-up the NW-NGSSO services on customer production systems.

and Security in the Internet of Services 205 there and helped SAP Research to better understand the vulnerability itself

It also proposes to control the access over automated tasks through the restriction on the invocation and consumption of remote services.

A scalability study has also been conducted on a loan origination process case study with a few security goals

and security of the Ios. The research innovation put forth by AVANTSSAR aims at ensuring global security of dynamically composed services

A security tool for web services. In: de Boer, F. S.,Bonsangue, M m.,, Graf, S.,de Roever, W.-P. eds.

Automatic Composition of Services with Security policies. In: Proceedings ofweb Service Composition and Adaptation Workshop (held in conjunction with SCC/SERVICES-2008), pp. 529 537.

IEEE Computer Society Press, Los Alamitos (2008) 12. Ciob aca, S.,Cortier, V.:Protocol composition for arbitrary primitives.

Proceedings of the 19th MFPS, ENTCS 83, Elsevier, Amsterdam (2004) Towards Formal Validation of Trust and Security in the Internet of Services 207 17.

Synthesis and Composition ofweb Services. In: Bernardo, M.,Padovani, L.,Zavattaro, G. eds. SFM 2009.

Abstraction by Set-Membership Verifying Security Protocols and Web Services with Databases. In: Proceedings of 17th ACM conference on Computer and Communications security (CCS 2010), pp. 351 360.

Web Services Business Process Execution Language vers. 2. 0 (2007), http://docs. oasis-open. org/wsbpel/2. 0/OS/wsbpel

Cloud computing is a new service delivery paradigm that aims to provide standardized services with self-service,

and seemingly unlimited scalability. This paradigm can be implemented on multiple service levels (infrastructures run-time platform, or actual Software as a service.

This article introduces upcoming security challenges for cloud services such as multi-tenancy, transparency and establishing trust into correct operation,

and service-oriented access to virtualized computing, data storage and network resources as well as higher level services.

resources and services provided by multiple similar providers are accessed seamlessly. Cloud computing goes beyond technological infrastructure that derives from the convergence of computer server power, storage and network bandwidth.

This goes along with increased collaboration on open cloud standards under developments by groups such as the DMTF Open Clouds Standards Incubator

and Security Limitations of Global Cloud Infrastructures 2. 1 Cloud Security Offerings Today According to the analyst enterprise Forrester research and their study Security and the Cloud 17 the cloud security market is expected to grow to 1

1. securing commercial clouds to meet the requirements of specific market segments 2. bespoke highly secure private clouds 3. a new range of providers offering cloud security services to add external security to public clouds

Trustworthy Clouds Underpinning the Future Internet 211 An example for the first category is the Google gov. app cloud launched in September 2009 that offers a completely segregated cloud targeted exclusively at US government customers.

Following its software-plus-services strategy announced in 2007 Microsoft has developed in the past years several Saas cloud services such as the Business Productivity Online Suite (BPOS.

While all of them may be delivered from a multi-tenant public cloud for the entry level user, Microsoft offers dedicated private cloud hosting

This allows tailor made solutions to specific security concerns-in particular in view of the needs of larger customers.

In the same way, the base security of Microsoft public cloud services is adapted to the targeted market.

cloud services for more sensitive markets (such as Microsoft Health Vault) use SSL encryption by Default on the other hand commodity public cloud services such as the Amazon EC2 are still growing

Here a prime target is the small to mid-size enterprise market. Examples for supplementary services are threat surveillance (e g.

Alertlogic), access-and identity management (e g.,, Novell, IBM), virtual private networking (e g.,, Amazon Virtual Private cloud), encryption (e g.,

, Amazon managed encryption services) and web traffic filtering services (e g.,, Zscaler, Scansafe. 2. 2 Today's Datacenters as the Benchmark for the Cloud Using technology always constitutes a certain risk.

If the IT of any given business failed, the consequences for most of today's enterprises would be severe.

Even if multiple lines of defense are used (e g.,, firewalls, intrusion defense, and protection of each host), all systems usually contain errors that can be exploited found

and. While off-line systems are harder to attack, exchanging media such as USB STICKS allows transfer into systems that are connected not to the Internet 5. Cloudsourcing 15 follows more or less the same economic rationale as traditional IT-outsourcing

inter alia with regard to upgrades and patches, quick procurement services, avoidance of vendor lock ins, and legacy modernization 18.

Many cloudsourcers offer bundles of consulting services, application development, migration, and management 14. A problem that remains with this new stage of IT-outsourcing strategies is that the client still has to find trustworthy service providers.

therefore it is not very likely that the emergence of new business opportunities and business models will fail on this 212 R. Glott et al. point.

Rather than that cloud computing might be hindered significantly by the legal problems that remain to be solved.

For the security objectives when adopting clouds for hosting critical systems we believe that today's datacenters are the benchmark for new cloud deployments.

For instance, a low but contractually guaranteed availability (such as 98%availability) will allow enterprises to pick workloads that do not require higher guarantees.

Today, uncertainty about the actual availability does not allow enterprises to make such risk management decisions

For security this argument leads to two requirements for cloud adoption by enterprises: The first is that with respect to security and trust,

and benchmarked against existing solutions such as enterprise or outsourced datacenters. The second is that in order to allow migration of critical workloads to the cloud,

cloud providers must enable enterprises to integrate cloud infrastructures into their overall risk management. We will use these requirements in our subsequent arguments. 3 New Security

Security Risks 12) Trustworthy Clouds Underpinning the Future Internet 213 3. 1 Isolation Breach between Multiple Customers Cloud environments aim at efficiencies of scale by increased

sharing resources between multiple customers. As a consequence, data leakage and service disruptions gain importance and may propagate through such shared resources.

An important requirement is that data cannot leak between customers and that malfunction or misbehavior by one customer must not lead to violations of the service-level agreement of other customers.

Fig. 2. Multi-tenancy at Multiple Levels 25. Traditional enterprise outsourcing ensures the so-called multi-tenant isolation through dedicated infrastructure for each individual customer

and data wiping before reuse. Sharing of resources and multi-tenant isolation can be implemented on different levels of abstraction (see Figure 2). Coarse-grained mechanisms such as shared datacenters, hosts,

and that these instances cannot be accessed by other customers. Note that in practice, these mechanisms are mixed often:

While an enterprise customer may own a virtual machine (Machine-level isolation), this machine may use a database server (Middleware isolation)

and provide services to multiple individual departments (Application isolation). In order to mitigate this risk in a cloud computing environment,

multi-tenant isolation ensures customer isolation. A principle to structure isolation management is One way to implement such isolation is labeling

and ensure that no unauthorized data flow occurs between customers. To limit flow control, mechanisms such as access control that ensures that machines

or resources from other customers can be used. Actual systems then need to implement this principle for all shared resources 4 (see, e g.,

or data owned by different customers. This so-called privileged identity management system is starting to be implemented today

Clouds gain efficiency by industrializing the production of IT services through complete end-to-end automation. This means that once errors occur in such complex and automated systems,

Another source of failure stems from the fact that large-scale computing clouds are built often using low-cost commodity hardware that fails (relatively) often.

problemdetermination, and (self-)repair mechanisms will be needed commonly in the cloud environment or recover from software and hardware failures.

An important requirement in a cloud setting is to move away from today's black-box approach to cloud computing where customers cannot obtain insight on or evidence of correct cloud operations.

A related challenge is how to best foster trust of customers into correct operation of the cloud infrastructure.

This is common for free services today. An improvement to this approach is third-party audits. This approach is common to today's outsourcing:(

Customers can then be sure that the organization followed these standards at the time of certification.

This will allow customers to automatically identify incidents and to analyze and react to such incidents.

A more practical solution is to use Trusted Computing to verify correct policy enforcement 6. Trusted computing instantiation as proposed by the Trusted Computing Group (TCG) uses secure hardware to allow a stakeholder

Cloud services commonly rely on each other, since their structures may be based consecutively upon each other. Hence, a computing cloud may use the services of a storage cloud.

Unlike local data centers residing in a single country such cloud infrastructures often extend over multiple legislation and countries.

Therefore, the question of applicable law and safeguarding the user's responsibilities regarding data privacy in cross-border cloud scenarios is a matter of consequences for the use of these cloud services.

in order to enable hosting of enterprise-class and critical systems on a cloud. Customer Isolation and Information Flow.

A single notion of customers needs to be implemented across different systems. Furthermore, data generated by systems need to be assigned to one

or more customers to enable access to critical data such as logs and monitoring data. A particularly hard challenge will be to reduce the amount of covert and side channels.

The third challenge is to allow customers to continue operating a secure environment. This means that security infrastructure and systems within the cloud such as intrusion detection

and access control need to be integrated into an overall security landscape for each individual customers. Depending on the type of systems,

In order to allow customers to'see'intrusions on the network within the cloud and correlate these intrusions with patterns in the corporate network,

services will be obtained from and load balanced over multiple clouds. If this is done properly, services will no longer depend on the availability of any individual cloud.

From a security perspective, this will raise new challenges. Customers need to provide a consistent security state over multiple clouds

and provide means to securely fail-over across multiple clouds. Similarly, services will be composed from underlying services from other clouds.

Without an accepted way to compose services securely, such compositions would require validation of each individual service based on fixed sub-services.

Trustworthy Clouds Underpinning the Future Internet 219 5 Outlook The Path Ahead Cloud computing is not new it constitutes a new outsourcing delivery model that aims to be closer to the vision of true utility computing.

As such, it can rely on security and privacy mechanisms that were developed for service-oriented architectures and outsourcing.

Unlike outsourcing, clouds are deployed on a global scale where many customers share one cloud and multiple clouds are networked

Today, demand for cloud security has increased but the offered security is limited still. We expect this to change

to integrate with security management systems of the customers, and to limit the risks imposed by misbehaving cloud providers and their employees.

Top threats to cloud computing, version 1. 0. March 2010), http://www. cloudsecurityalliance. org/topthreats/csathreats. v1. 0. pdf 8. Computer and Communication

Toward risk assessment as a service in cloud environments. In: Proceedings of the 2nd USENIX conference on Hot topics in cloud computing. pp. 13 13.

Why not cloudsourcing for enterprise app user adoption/training?(2009), http://velocitymg. com/explorations/why-not-cloudsourcingfor-enterprise-app-user-adoptiontraining/16.

Organization for Economic Co-Operation and Development (OECD: Guidelines on the protection of privacy and transborder flows of personal data.

Looking at the opportunity beyond the obstacle. Forrester research (October 2010) 18. Rajan, S. S.:Cloudsourcing vs outsourcing (2010), http://cloudcomputing. sys-con. com/node/1611752 19.

Privacy, Usage control, Privacy Policy 1 Introduction The vision of the Future Internet heralds a new environment where users,

services and devices transparently and seamlessly exchange and combine information, giving rise to new capabilities.

this vision needs a mix of adaptation of existing technologies and business models, such as flexible infrastructures and service compositions, distributed ownerships,

servers, services, applications) provided by the cloud that are provisioned rapidly with a minimal management effort

ignoring borders, across multiple services, all in total transparency for the user. However, this ideal cloud world raises concerns about privacy for individuals, organizations,

A second problem relates to the scalability of the sticky policy approach. Clearly, the policy processing adds a relevant computational overhead.

A last issue relates to the privacy business model. The main question is: What should motivate the data collectors/processors to implement such technology?

Actually, in many cases, their business model relies on the as-less-restricted-aspossible use of private data.

balancing the value of his personal data with the services obtained. As a matter of fact, users have difficulties to monetize the value of their personal information,

which mediate the communication and the handling of private data in the cloud platform. The schedule of the events,

or more services/applications provided by external parties that deal with personal data (e g.,, a human resource management application, a remote storage service.

Say, these services handle personal data using a PPL framework (as described in Sect. 2) . In order to guarantee enforcement of the privacy policies and corresponding obligations by the service,

enabling the seamless combination of services across platforms, geographies, businesses and transparently from the user point of view.

In particular, when personal data are consumed by multiple services, possibly owned by different entities in different locations, the conditions of the data usage,

Enterprise privacy authorization language (EPAL 1. 1). IBM Research Report (2003) Data Usage Control in the future Internet Cloud 231 3. Bonneau, J

Economics of Information security and Privacy, pp. 121 167. Springer, New york (2010) 4. Bussard, L.,Neven, G.,Preiss, F. S.:

Platform for enterprise privacy practices: Privacy-enabled management of customer data. In: Dingledine, R.,Syverson, P. F. eds.

Economics of Information security, Advances in Information security, vol. 12, pp. 129 142. Springer, New york (2004) 10.

Experiments and Experimental Design 235 Introduction Research into new paradigms and the comprehensive test facilities upon which the ideas are experimented upon together build a key resource for driving European research into future networks and services.

This environment enables both incremental and disruptive approaches, supports multi-disciplinary research that goes beyond network layers, scholastic dogmas and public-private discussions.

The heterogeneous and modular field of Future Internet Research and Experimentation with its national and international stakeholder groups requires community and cohesion building

and common efforts in order to offer customers the best possible service and ensure their sustainability beyond project lifetimes.

and Resource Allocation Algorithms on the Federated Environment of Panlab reports on experiments needing to directly interact with the environment during runtime,

and solutions for a significant upgrade of the federated testbed environment that was used. The chapter by Zseby et al. entitled Multipath Routing Experiments in Federated Testbeds demonstrates the practical usefulness of federation and virtualisation in heterogeneous testbeds.

and they would be not have been possible without the ability to create environments across multiple administrative domains using the concepts of federation, in particular their advanced measurement technologies.

Finally the chapter Kousaridas et al. entitled Testing End-to-end Self management in a Wireless Future Internet Environment reports on the network management protocol test that exploited the availability of different administrative domains in federated testbeds

The Author (s). This article is published with open access at Springerlink. com. A Use-Case on Testing Adaptive Admission Control and Resource Allocation Algorithms on the Federated Environment of Panlab Christos

and architectural components that enable testing applications near production environments over a heterogeneous pool of resources.

and services for broad testing and experimentation purposes. In this context, Panlab defines a provisioning framework

The Panlab infrastructure manages interconnections of different geographically distributed testbeds to provide services to customers for various kinds of testing scenarios which in Panlab terminology are called Virtual Customer Testbeds or simply VCTS.

These VCTS represent customer needs such as i) evaluation and testing specifications of new technologies, products, services, ii) execution of network 238 C. Tranoris, P. Giacomin,

A Web portal is available where customers and providers can access services, a visual Creation Environment

which is called Virtual Customer Testbed (VCT) tool where a customer can define requested services, a repository which keeps all persistent information like resources, partners, defined VCTS, etc.

Experimenters can browse through the resource registry content and can select, configure, deploy and access reserved resources.

Finally, an Orchestration Engine is responsible for orchestrating the provisioning of the requested services. The above components interact with each other

i) to run the experiment by moving a designed algorithm from a simulating environment to near production besteffort environment

it is necessary to set up an appropriate testbed of a distributed web application like RUBIS benchmark 3,

an auction site prototype modeled after ebay. com. It provides a virtualized distributed application that consists of three components, a web server, an application server, a database and a workload generator,

Furthermore it can be deployed in a virtualized environment using Xen server technology, which allows regulating system resources such as CPU usage and memory,

and stop the work load generators on demand. 3 Technical Environment, Testbed Implementation and Deployment From the requirements of the use case,

It is an SDK for developing applications that access VCT requested resources through the Panlab office services during operation of testing.

in order to manage and configure various environment parameters or to get status of the resources. Fig. 5. Designing the algorithm to operate resources during execution In our testing scenario there is a need to configure resources

()is able to give back the CPU usage of the database resource. 5 Conclusions The results of running an experiment in Panlab are encouraging in terms of moving the designed algorithms from simulating environments to near production environments.

What is really attractive is that such algorithms can be tested in a best-effort environment with real connectivity issues that cannot be performed easily in simulation environments.

although not comparable currently with similar approaches are really encouraging in terms of moving the designed algorithms from simulating environments to near production environments.

What is really attractive is that such algorithms can be tested in a best-effort environment with real connectivity issues that cannot be performed easily in simulation environments.

of resources that are capable of hosting the RUBIS environment. We expect to make more resources available as demand increases.

Acknowledgments. The work presented in this paper has been performed during PII a Seventh Framework Program (FP7) project funded by EU. Open Access.

Professur Future Communication (endowed by Telekom Austria), Austria kurt. tutschku albert. rafetseder@univie. ac. at 4 Tel aviv University, School of Electrical engineering, Tel aviv, Israel shavitt

The number of stakeholders who participate in provisioning of network and services is growing. More demanding applications (like egovernment

ehealth, critical and emergency infrastructures) are on the rise. Therefore we assume that these two basic characteristics,

a) multiple authorities and b) applications with very diverse demands, are likely to stay or even increase in the Internet of the future.

In such an environment federation and virtualization of resources are key features that should be supported in a future Internet.

We also assume that the growing demands will push towards a much better measurement instrumentation of the future Internet.

Besides the establishment of routing slices and the instrumentation of federated environments with measurement functions,

Making these values explicitly known to the stakeholders can help to provide incentives for cooperation.

Tests in labs suffer from scalability limits since physical distances and the number of resources are limited.

in order to supplement theoretical analysis and validate theoretical results by experiments in large-scale highly distributed environments and under real network conditions.

A federation of them provides the required scalability features (e g. large distances between entities) and allows the use of special equipment

and outlook to the enhancements of federated facilities. 2 Experiment Objectives and Requirements for a Concurrent Multipath Transport Alternative multipath transport services in future federated networks might employ concurrent or consecutive

and can generate a much better controllable environment. We can install and use arbitrary software on the G-Lab nodes.

Free T-Rex offers such valuable resources like access to the Mome 12 trace and tool database and measurement services, the employed packet tracking service 18, Tophat 9,

GENI-Global Environment for Network Innovations (2006), Information available at http://www. geni. net/11.

The active process interaction with its environment. Computer networks 36 (1), 21 34 (2001) 12. Mome.

IEEE Communications Surveys 2 (1)( 1999), http://www. comsoc. org/pubs/surveys/1q99issue/psounis. html 17.

ACM SIGCOMM Computer Communication Review 35 (5), 71 74 (2005) 20. Phuoc Tran-Gia. G-Lab:

The Author (s). This article is published with open access at Springerlink. com. Testing End-to-end Self management in a Wireless Future Internet Environment Apostolos Kousaridas1, George Katsikas1, Nancy Alonistioti1

in order to experiment on the improvement of Qos features by using the Self-NET software for self management over a Wimax network environment.

, telecom world, the Internet and cellular communications. The current challenge for the network management systems 260 A. Kousaridas et al. is the reduction of human intervention in the fundamental management functions

, packet loss, delay, jitter) by using a self management framework over a live network environment and exploiting monitoring

while section 5 concludes this paper. 2 Experimental Facilities Decription The testing facility connecting a fixed Wimax network to the service-aware network is shown in Fig. 1. The Wimax network environment

and SS operate in a laboratory environment with short distance direct line-of-sight condition, which keeps the signal strength relatively stable and strong throughout the measurement cases.

There are also some contributory entities that assist in improving the traffic simulation by providing log information Testing End-to-end Self management in a Wireless Future Internet Environment 261 Fig. 1. Octopus testbed Wimax

and tunneling between Octopus and Self-NET environments. We implemented A BS control software (i e. NECM) to allow dynamically collect Wimax link information from the BS

For the test environment provisioning the IP tunneling (IPIP) and routing was setup at both ends,

The traffic sent from the Uoa BS Connector (10.1.1.1) is routed over the IPIP tunnel to the Wimax BS Testing End-to-end Self management in a Wireless Future Internet Environment 263 Fig. 3. Network topology

in order to identify faults or optimization opportunities (e g.,, high packet loss) according to the specified rules or Qos requirements.

Testing End-to-end Self-Management in a Wireless Future Internet Environment 265 Fig. 4. Decision-making algorithm for configuration action selection Simple Fig. 4 presents

However, the Testing End-to-end Self management in a Wireless Future Internet Environment 267 increase rate is not linear

Testing End-to-end Self management in a Wireless Future Internet Environment 269 Table 6. Qos features improvement after partial (70%)Voip codec change from G. 711.1

The experiments that have been carried out by using the Octopus wireless network environment prove both the feasibility of the proposed architecture and the Qos improvement (e g.

However, in order to provide a wireless link as a bookable resource for a large set of customers,

Scalability issues and interactions with other network management tasks is part of our future work. Open Access.

An experimental path towards Self management for Future Internet Environments. In: Tselentis, G.,Galis, A.,Gavras, A.,Krco, S.,Lotz, V.,Simperl, E.,Stiller, B. eds.

Networks 273 Introduction Although the current Internet has been extraordinarily successful as a ubiquitous and universal means for communication

The very success of the Internet is creating obstacles to the future innovation of both the networking technology that lies at the Internet's core and the services that use it.

In addition, the ossification of the Internet makes the introduction and deployment of new network technologies and services very difficult and very costly.

Mobility of networks, services, and devices. Guaranteeing availability of services according to Service Level Agreements (SLAS) and high-level objectives.

Facilities to support Quality of Service (Qos) and Service Level Agreements (SLAS. Trust Management and Security, privacy and data protection mechanisms of distributed data.

Facilities for the large scale provisioning and deployment of both services and management, with support for higher integration between services and networks.

Facilities for the addition of new functionality, including the capability for activating a new service on-demand, network functionality

Support of security, reliability, robustness, mobility, context, service support, orchestration and management for both the communication resources and the services'resources.

Support of socioeconomic aspects including the need for appropriate incentives, diverse business models, legal, regulative and governance issues.

be adapted dynamically to changing environments, and; learn the desired behaviour over time. As self-organizing

and combined provisioning of different infrastructure resources and services that include both network and IT resources.

Demands become more and more sporadic and variable making dynamic provisioning highly needed. As a huge energy consumer, the Internet also needs to have energy-saving functions.

Applications critical for society and business or for real-time communication demand a highly reliable, robust,

Finally, the Future Internet needs to support sustainable business models, in order to drive innovation, competition, and research.

Combining optical network technology with Cloud technology is key to addressing these challenges. In this context, we propose an integrated approach:

Premium advanced networks and IT managed services integrated with the vanilla Internet will ensure a sustainable Future Internet,

National and Kapodistrian University of Athens, Dept. of Informatics and Communications, 15784, Panepistimiopolis, Ilissia, Athens, Greece nancy@di. uoa. gr Abstract.

be adapted dynamically to changing environments, and; learn the desired behaviour over time, based on the original context of the Self-NET research project effort.

Future related facilities will attract more users to innovative services requiring greater mobility and bandwidth

Furthermore, the Internet underpins the whole global economy. The diversity and sheer number of applications and business models supported by the Internet have affected also largely its nature and structure (3

4). The Future Internet (FI) will not be more of the same, but rather appropriate entities incorporating new technologies on a large scale that can unleash novel classes of applications

and related business models 5. If today's Internet is a crucial element of our economy,

7). The complexity of the FI, bringing together large communities of stakeholders and expertise, requires a structured mechanism to avoid fragmentation of efforts

in order to provide more potential options and/or opportunities for the market players involved. Europe remains an international force in advanced information

and communication technologies (ICT) and has adopted massively broadband and Internet services 8. The European union (EU) is actually a potential leader in the FI sector 9. Leveraging FI technologies through their use in smart infrastructures offer the opportunity to boost European competitiveness

in emerging technologies and systems, and will make it possible to measure, monitor and process huge volumes of information.

while fostering competition, openness and standardisation, involving consumer/citizen, ensuring trust, security and data protection with transparent and democratic governance and control of offered services as guiding principles (10,11). 1. 1 Autonomicity

and Self management Features in Modern Network Design The face of the Internet is continually changing,

as new services appear and become globally noteworthy, while market actors are adapting to these challenges through suitable business models 12.

The current Internet has been founded on a basic architectural premise that is: a simple network service can be used as a universal means Enhanced Network Self-Manageability in the Scope of Future Internet Development 279 to interconnect intelligent end systems 13.

addressing, reachability, new demands on quality of service (Qos), service/application provisioning, etc..The next generation network architecture will be flexible enough to support a range of application visions in a dynamic way,

Enhanced communication services will open many possibilities for innovative applications that are envisioned not even today.

scalability; services (i e.:cost, service-driven configuration, simplified services composition over heterogeneous networks, large scale and dynamic multi-service coexistence, exposable service offerings/catalogues;

monitoring; Service Level Agreements (SLAS) and protocol support for bandwidth (dynamic resource allocation), latency and Qos;

automation (e g. automated negotiation), and; the option for autonomicity. The resolution of these challenges would bring benefits to network and to serviceapplication providers, in terms of:

providing a natural complement to the virtualization of resources-by setting up and tearing down composed services, based on negotiated SLAS.

reduced cost and time-to-market for services; scalability of composed services, and; flexibility and independence from the underlying network details.

In addition, a current trend for networks is that they are becoming service-aware. Service awareness itself has many aspects,

Thus, the design of networks and services is moving forward to include higher levels of automation,

Conversely, services themselves are becoming network-aware. Networking-awareness means that services are executed and managed within network execution environments

and that both services and network resources can be managed uniformly in an integrated way. It is acknowledged commonly that the FI should have enhanced a considerably network manageability capability,

and be an inseparable part of the network itself. Manageability of the current network typically resides in client stations and servers,

which interact with network elements (NES) via protocols such as SNMP (Simple Network Management Protocol). The limitations of this approach are reduced scaling properties to 280 I. P. Chochliouros, A s. Spiliopoulou,

adapts dynamically to changing environments, and; learns the desired behaviour over time. The effective design of monitoring protocols so as to support detection mechanisms critical for the elaboration of self-organizing networks has to be based on a clear understanding of engineering trade-offs with respect to local vs. non-local

Furthermore, the diversity of services as well as the underlying hardware and software resources comprise management issues highly challenging, meaning that currently,

In addition, security risks currently present in network environments request for immediate attention. This could be achieved by building trustworthy network environments to assure security levels

and manage threats in interoperable frameworks for autonomous monitoring. 1. 2 The Vision of a Modern Self-Managing Network The future vision is that of a self-managing network

i) Cross-domain management functions, for networks, services, content, together with the design of cooperative systems providing integrated management functionality of system lifecycle, self-functionality, SLA and Qos;(

and monitoring probes for services'/network's behaviour, including traffic;(v) Mechanisms for conflict and integrity-issues detection/resolution across multiple self management functions;(

In such an evolving environment, it is required the network itself to help detect, diagnose and repair failures,

Suitable systems with communication and computational capabilities can be integrated into the fabric of the Internet,

and reduce the reliance on centrally planned services, especially if they are joined effectively with new network management techniques.

Operators may use these tools to guarantee Qos service in a period of exploding demand and rising network congestion at peak times.

When they are deployed in complex processes, these systems exhibit promising features and capabilities such as modularity and scalability, low cost, robustness and adaptability.

Some of the challenges for operators/service providers include management (especially in self-organized wireless environments), resilience and robustness, automated re-allocation of resources, operations'abstractions in the underlying infrastructure,

Qos guarantees for bundled services and optimization of operational expenditures (OPEX). Ubiquitous and self-organizing systems are not only disruptive technologies that impact the way how market actors organize core processes as well as existing structures in value chains and industry,

Among the core drivers for the FI are increased reliability, enhanced services, more flexibility, and simplified operation.

and ensure seamless service provisioning even in case of services with high bandwidth requirements. The completion of the aforementioned objective can make certain better Qos

and converged service capability across heterogeneous environments. Besides, the introduction of cognition in networks can contribute towards overcoming structural limitations of current infrastructures

-which render it difficult to cope with a wide variety of networked applications, business models, edge devices and infrastructures-so as to guarantee higher levels of scalability, mobility, flexibility,

security, reliability and Enhanced Network Self-Manageability in the Scope of Future Internet Development 283 robustness.

the MDE cycle) are shown as in Fig. 2. Cognitive capabilities can enable the perception of the NES environment and the decision upon the necessary action (e g. configuration, healing, protection measures, etc..

having as a main goal the efficient handling of complexity towards FI environments. This, combined with the introduction of cognitive functionalities at all layers, can allow decisions/configurations at shorter time-scales 24

Both present and future anticipated high proliferation of different services that a communications network should offer and support;

to make certain that the network delivers the desired services to its users. In many cases, the network operator is obliged to search through vast amounts of monitoring data to find any inconveniences to his network behaviour

and to ensure a proper services'delivery. Embedding selfmanagement functionalities in future NES and establishing cognition at the diverse network levels (e g.,

Thus, applying self-aware techniques in a modern network environment can ease network composition and network planning procedures

and can ensure the automatic adaptation of networks/services to capabilities of the network components.

it involves continuous upgrading/modifications to provide a consistent and a transparent service environment, to sustain high Qos,

In competitive markets, end-users wish to have access to a network offering adequate coverage and services of high quality,

such as network (or service) reconfiguration capabilities, broadband management and support of an increased set of services/facilities offered.

i) High availability & seamless services'continuity;(ii) Connectivity anywhere and anytime;(iii) Robustness and stability/steadiness of the underlying network;(

iv) Scalability in terms of features-functions;(v) Balance between cost network-related benefits (OPEX reduction and optimized network functionalities), and;(

In fact, management systems of modern FI networks incorporate autonomic capabilities to effectively deal with the increasing complexity of communication networks, to reduce human intervention,

In the proposed test-bed, a heterogeneous wireless network environment has been deployed, consisting of several IEEE 802.11 Soekris access points (AP) 33 and an IEEE 802.16 Base Station (BS) 34,

The NECM periodically monitored its internal state and local environment by measuring specific parameters, thus building its local view.

and the allocation of network devices in a realistic office environment (at OTE's R&d premises), have both been considered as shown in Fig. 3. The topology has been selected

and to depict conditions that are common to corporate environments and especially to those that can occasionally host numerous nomadic end-users.

The most time consuming processes are Execution and Communication. The communication phase is responsible for Soekris 1 and Soekris 4 high delay.

Specifically, both Soekris interact (i e. communicate) with Soekris 2. The duration of Execution phase is high and the same for all devices due to technical and implementation reasons.

The communication between NECMS increases the duration of the communication phase, while the duration of the execution phase is increased, due to technical and implementation reasons.

Similarly to the previous cases (i e. the channel (re-)selection) the communication phase takes again the majority of time.

001 0. 001 0. 018 Communication Phase 22.192 1. 711 2. 601 22.405 Monitor Phase 2. 760 2. 561 3

0. 500 0. 600 0. 700 0. 800 Decision Phase Communication Phase NDCM 0. 061 0. 733 Time (sec) Fig

and/or overload, affecting the network functionality. 5 Conclusion Evolution towards FI requests a more flexible architecture that will act as the basis for the disposal of a multiplicity of services-facilities with optimized quality levels,

or per domain, targeting at a more distributed environment both in terms of management and operational activities.

wireless, fixed and IP networks), taking into consideration the next generation Internet environment and the convergence perspective.

Communication on A Public-Private Partnership on the Future Internet. European commission, Brussels (2009) 2. Chochliouros,

Business models for Electronic Markets. The International Journal on Electronic Markets and Business Media 8 (2), 3 8 (1998) 4. Future Internet Assembly (FIA:

Internet Business models and Strategies: Text and Cases. Mcgraw-hill, New york (2000) 6. European Future Internet portal (2010), http://www. future-internet. eu/Enhanced Network Self-Manageability in the Scope of Future Internet

Communication on The Future EU 2020 Strategy. European commission, Brussels (2009) 9. Tselentis, G.,Domingue, L.,Galis, A.,Gavras, A.,et al.:

The Seoul Declaration for the Future of the Internet Economy. OECD, Paris, France (2008) 11.

The New European Telecom Framework for the Development of Modern Electronic Networks and Services. The Journal of the Communications network (TCN) 2 (4), 53 62 (2003) 12.

Communication on Future Networks and the Internet. European commission, Brussels (2008) 13. Galis, A.,Brunner, M.,Abramowitz, H.:

A survey of autonomic communications. ACM Trans. on Autonomous and Adaptive Systems (TAAS) 1 (2), 223 259 (2006) 17.

Proceedings of the 1st IEEE International Workshop on Modelling Autonomic Communications Environments (2006) 25. Strassner, J.:

First Report on Business Opportunities (2009) 29. Miller, B.:The autonomic computing edge: Can you CHOP UP autonomic computing?

Self-organization in Communication Networks: Principles and Design Paradigms. IEEE Communications Magazine 43 (7), 78 85 (2005) 31.

Mihailovic, A.,Chochliouros, I. P.,Georgiadou, E.,Spiliopoulou, A s.,et al.:Situation Aware Mechanisms for Cognitive Networks.

Redmax, Redline Communications: AN-100u/UX Single Sector Wireless Access Base Station User Manual (2008) 35.

Thus, any object or network element will have embedded communication capabilities and several objects in a certain environment will be able to create a communication network.

Challenges such as the infrastructure coverage extension or the infrastructure capacity extension, arise. Opportunistic networking seems a promising solution to the problem of coverage extension of the infrastructure

, for the time frame necessary to support particular network services and accommodate new FI-enabled applications (requested in a specific location and time).

At the lower layers, the operator designates the spectrum that will be used for the communication of the nodes of the ON (i e.,

or communication demand rises instantly and support is needed for successful handling. Also, authors in 10 propose

because based on the observed radio environment, the node capabilities, the network operator policies and the user profiles,

the detection of opportunities for ON establishment with respect to total nodes and potential radio paths should be taken into consideration as main inputs.

it will have to adapt dynamically during all its operational lifetime to changing environment conditions (e g. context, operator's policies, user profiles).

based on profile and policy information of the operator and the use of spectrum that will be designated by the network operator, for the communication of the nodes of the ON.

Suitability determination-Monitoring of radio environment parameters prior the creation of the ON Creation Maintenance-ON monitoring and management-ON reconfiguration Evaluation through operator's policies and fitness function Common pool of candidate

a Javabased prototype has been developed which calculates the fitness function and informs 302 A. Georgakopoulos et al. the system on the accepted and rejected nodes.

and analyzed using the Opportunistic Network Environment (ONE) 14,15. An indicative network topology of 60 total participant nonmoving nodes is illustrated in Fig. 6. Each node features 2 interfaces

INFOCOM 2006, 25th IEEE International Conference on Computer Communications (2006) 3. Rong, B.,Hafid, A.:

Computer Communications 31,1763 1776 (2008) 5. Verma, A.,Sawant, H.,Tan, J.:Selection and navigation of mobile sensor nodes using a sensor network.

IEEE International Conference on Communication (2004) 7. Han, S.,Xia, Y.:Optimal node-selection algorithm for parallel download in overlay content-distribution networks.

and combined provisioning of different infrastructure resources and services that include both network and IT resources.

Demands become more and more sporadic and variable making dynamic provisioning highly needed. As a huge energy consumer, the Internet also needs to be energyconscious.

, health, finance) or for real-time communication demand a highly reliable, robust and secure Internet. Finally, the future Internet needs to support sustainable business models,

in order to drive innovation, competition, and research. Combining optical network technology with Cloud technology is key to addressing the future Internet/Cloud challenges.

In this con-J. Domingue et al. Eds.):) Future Internet Assembly, LNCS 6656, pp. 307 320,2011. c The Author (s). This article is published with open access at Springerlink. com. 308 P. Vicat-Blanc et al. text,

Premium advanced network and IT managed services integrated with the vanilla Internet will ensure a sustainable future Internet/Cloud enabling demanding and ubiquitous applications to coexist.

The current Internet has become an ubiquitous commodity to provide communication services to the ultimate consumers:

enterprises or home/residential users. The Internet's architecture assumes that routers are stateless and the entire network is neutral.

and business communications as well as general information exchange thanks to emails, the web, Voip, triple play service, etc. the Internet is currently providing a rich environment for social networking and collaboration and for emerging Cloud-based applications such as Amazon's EC2,

Azure, Google apps and others. The Cloud technologies are emerging as a new provisioning model 2. Cloud stands for ondemand access to IT hardware or software resources over the Internet.

The new Internet's architecture should propose solutions for Qos provisioning, management and control, enabling a highly flexible usage of the Internet resources to meet bursty demands.

and new emerging services and application that require better control over the networking infrastructure and its Qos properties.

telecom operators have considered methods for dynamic provisioning of high-capacity network-connectivity services tightly bundled with IT resources.

the communication model offered by the Internet may break the hope for fully-transparent remote access and outsourcing.

dynamically invoked, consistent services. IT and network should be provisioned in a coordinated way in the future Internet. 3. Deal with the unpredictability and burstiness of traffic:

The traffic's bursty nature requires mechanisms to support the dynamic behavior of the services and applications.

seasonal or unpredictable demands. 4. Make the network energy-aware: It is reported in the literature 10,

and IT resources in an integrated globally optimized manner. 5. Enable secured and reliable services:

and IT providers to network operators. 6. Develop a sustainable and strategic business model: Currently, the business models deployed by telecom operators are focused on selling services on top of their infrastructures.

In addition, operators cannot offer dynamic and smooth integration of diversified resources and services (both IT and network) at the provisioning phase.

Network-infrastructure resources are understood not as a service within the value chain of IT service providers.

We believe that a novel business model is necessary, which can fully integrate the network substrate with the IT resources into a single infrastructure.

In Bringing Optical Networks to the Cloud 311 addition, such business model will let operators offer their infrastructures as a service to third-party entities. 3 Model In order to address the aforementioned challenges and opportunities

The Virtual Infrastructure concept and its operational model as a fundamental approach to enable the on-demand infrastructure services provisioning with guaranteed performance

and Qos, including manageable security services. A new layered architecture for the Control and Management Plane that allows dynamic services composition

and orchestration in the virtual infrastructures that can consistently address the manageability, energy-efficiency and traffic-unpredictability issues.

the emerging flexible technology supported by the required control mechanisms enable a more efficient utilization of the optical spectrum and on-demand flexible bandwidth allocation,

and enable advanced services including the concepts of Infrastructure-as-a-service (Iaas) and service-oriented networking 4. We aim to enable a flexible infrastructure provisioning paradigm in terms of configuration, accessibility and availability for the end users,

and provisioning dynamic security services, to address challenge#5. Fig. 1 shows the reference model of our architecture as it has been modeled in the context of the GEYSERS project.

Network Control Plane NIPS Network+IT Provisioning Services PIP Physical Infrastructure Provider SML Service Middleware Layer VI Virtual Infrastructure VIO Virtual

. 3 New Roles and Strategic Business model Given this virtualized network and IT architecture new actors are emerging:

capable of provisioning on-demand network services bundled with IT resources to meet challenge#2. New business relationships can be developed between Virtual IT Infrastructure Operators (VIO-IT) and Virtual Network Infrastructure Operators (VIO-N),

This creates new market opportunities for all the different actors addressing challenge#6: infrastructure providers, infrastructure operators and application providers cooperate in a business model where on-demand services are offered efficiently through the seamless provisioning of network and IT virtual resources.

To illustrate this, we now describe a sample use case. A company hosts an Enterprise Information system externally on a Cloud rented from a Softwareas-a-Service (Saas) provider.

It relies on the resources provided by one or more IT and network infrastructure providers.

Furthermore, it supports scaling (up and down) of services and load. It provides means to continuously monitor what the effect of scaling will be on response time

service providers and infrastructure providers to contribute in a business model where complex services (e g.,, Cloud computing) with complex attributes (e g.,

for the definition of the VI-provisioning workflow and all involved actors and services integration.

The enhanced Network Control Plane (NCP+)proposed in our architecture (Fig. 1) offers integrated mechanisms for Network+IT Provisioning Services (NIPS) through the on-demand and seamless provisioning of optical and IT resources.

The NIPS UNI offers functionalities for setup, modification and tear down of enhanced transport network services (optionally combined with advance reservations), monitoring and cross-layer recovery.

the network connectivity services are tailored automatically to the cloud dynamics, allowing for an efficient utilization of the underlying infrastructure.

+In anycast services the SML provides just a description of the required IT resources (e g. in terms of amount of CPU),

each source site has certain processing demands which need to be satisfied by suitable IT resources (in a data center).

in an initial sample case study on an European network where we have run the calculations for 10 random demand vectors for each demand size going from 5-up to 100 connections Bringing Optical Networks to the Cloud

One approach of the project is to validate some concepts in a simulation environment. To make this proposal a viable solution for future production networks

and evaluate prototypes of the different software components creating and managing optical virtual infrastructures. The other goal is to evaluate the performance and functionality of such a virtualized infrastructure in a realistic production context.

A Novel Architecture for Virtualization and Co-Provisioning of Dynamic Optical Networks and IT Services.

Services Part VI: Future Internet Areas: Services 323 Introduction The global economy can be characterised under three main sectors.

The primary sector involves transforming natural resources into primary products which then form the raw materials for other industries1.

or services sector where intangible goods or services are produced, bought and consumed3. Service provision is seen as an economic activity where generally no transfer of ownership is associated with the service itself

and the benefits are associated with the buyers'willingness to pay. Public services are those where society pays through taxes and other means.

The economic importance of the service sector is a major motivation for services research both in the software industry and academia.

The Internet of Services is concerned with the creation of a layer within the Future Internet

which can support the service economy. Two overarching requirements influence the scope and technical solutions created under the Internet of Services umbrella.

Firstly there is a need to support the needs of businesses in the area. Service oriented solutions can enable new delivery channels and new business models for the services industrial sector.

The Future Internet will be comprised of a large number of heterogeneous components and systems which need to be linked and integrated.

a second driving requirement for the Internet of Services is to provide a uniform conduit between the Future Internet architectural elements through service-based interfaces.

Architectural within a new global communications infrastructure there is a need to determine how a service layer would fit into an overall Future Internet architecture.

and also how services would operate over connected objects which may form adhoc networks. Management very quickly heterogeneity, dynamic contexts and scale lead to highly complex service scenarios where new approaches to managing the complexity are required.

Here research focuses on describing services enabling automated 1 http://en. wikipedia. org/wiki/Primary sector of the economy 2 http://en. wikipedia. org/wiki/Secondary sector of the economy 3 http://en

Services and semi-automated approaches to service discovery, composition, mediation and invocation. Cloud computing definitions vary

but cloud computing is acknowledged generally to be the provision of IT capabilities, such as computation, data storage and software on-demand, from a shared pool, with minimal interaction or knowledge by users.

Cloud services can be divided into three target audiences: service providers, software developers and users as follows6:

-Infrastructure as a service offering resources such as a virtual machine or storage services. -Platform as a service providing services for software vendors such as a software development platform

or a hosting service. -Software as a service offering applications, such as document processing or email to end-users. Within this section we have three chapters

The ability to trade IT-services as an economic good is seen as a core feature of the Internet of Services.

SLAS Empowering Services in the future Internet the authors discuss this in relation to Service Level Agreements (SLAS. In particular they claim a requirement for a holistic view of SLAS enabling their management through the whole service lifecycle:

Enterprise IT; ERP Hosting; Telco Service Aggregation; and egovernment. Ontologies are shared formal descriptions of a shared viewpoint over a domain

and service layers in a new communications infrastructure. Within the chapter Santos et al. Meeting Services and Networks in the future Internet an ontology based approach is taken combined with a simplification of the network layer structure

in order to facilitate network-service integration. More specifically, the approach, called FINLAN (Fast Integration of Network Layers), is a model

so that other resources can be discovered. 6 See http://www. internet-of-services. com/index. php?

Services 325 Given the growing take-up of Linked Data for sharing information on the Web at large scale there has begun a discussion on the relationship between this technology and the Future Internet.

and the Internet of Services discusses the relationship between Linked Data and the Internet of Services.

The Author (s). This article is published with open access at Springerlink. com. SLAS Empowering Services in the future Internet1 Joe Butler1, Juan Lambea2, Michael Nolan1, Wolfgang Theilmann3, Francesco Torelli4

However, the goal of reaching a truly serviceoriented economy would require that IT-based services can be traded flexibly as economic good,

which addresses the management of services and their related SLAS through the complete service lifecycle,

covering the areas of Enterprise IT, ERP Hosting, Telco Service Aggregation, and egovernment. Keywords: Service Level Agreement, Cloud, Service Lifecycle 1 Introduction Europe has set high goals in becoming the most active and productive service economy in the world.

Especially IT supported services have become of major relevance in all industries and domains. The service paradigm is a core principle for the Future Internet

which supports integration, interrelation and inter-working of its architectural elements. Besides being the constituting building block of the so-called Internet of Services,

the paradigm equally applies to the Internet of things and the underlying technology cloud platform below. Cloud computing gained significant attention and commercial uptake in many business scenarios.

This rapidly growing service-oriented economy has highlighted key challenges and opportunities in IT-supported service provisioning.

With more companies incorporating cloud based IT services as part of 1 The research leading to these results is supported partially by the European community's Seventh Framework Programme (FP7/2001-2013) under grant agreement n°216556.328 J. Butler et al. their own value chain,

reliability and dependability become a crucial factor in managing business. Service-level agreements are the common means to provide the necessary transparency between service consumers and providers.

For a vivid IT service economy, better tools are necessary to support end-to-end SLA management for the complete service lifecycle,

We provide an approach that allows services to be described by service providers through formal template SLAS.

Typically, a service is dependent on many other services, e g. the offering of a software service requires infrastructure resources, software licenses or other software services.

We propose an SLA management framework that offers a core element for managing SLAS in the future Internet.

This allows end to end management of resources and services for the business value chain. The scientific challenges include the understanding and modelling of the relationships between SLA properties.

The framework's architecture mainly focuses on separation of concerns, related to SLAS and services on the one hand,

namely ERP hosting, Enterprise IT, Service Aggregation and egovernment. ERP Hosting is investigating the practicalities

Enterprise IT focuses on SLA-aware provisioning of compute platforms, managing decisions at provisioning time and runtime,

Service Aggregation demonstrates the aggregation of SLA-aware telecommunication and third party web services: how multi-party, multi-domain SLAS for aggregated services can best be offered to customers. egovernment validates the integration of human-based services with those that are based technology,

showcasing the automated, dynamic SLA-driven selection, monitoring and adjustment of third-party provisioned services. SLAS Empowering Services in the future Internet 329 The remainder of this paper is organized as follows.

Chapter 2 introduces our reference architecture for an SLA management framework. Chapter 3 discusses the adoption of the framework, within the Future Internet but also in general System Management environments.

Chapters 4-7 cover the respective use cases and evaluation results and Chapter 8 concludes the overall discussion. 2 Reference Architecture for SLA Management The primary functional

goal of our SLA management framework is to provide a generic solution for SLA management that (1) supports SLA management across multiple layers with SLA (de-)composition across functional and organizational Domains,(2

namely customers who (want to) consume services and 3rd party providers which the actual service provider might rely upon.

Monitoring Event Channels serve as a flexible communication infrastructure that allows the framework to collect information about the service instance status. Furthermore,

SLAS Empowering Services in the future Internet 331 3. 1 Adoption Considerations for the Future Internet The SLA management framework architecture can easily be applied to different Future Internet scenarios.

and networking resources, to sensor-like resources in the Internet of things, to services in the Internet of Services,

a management environment consisting of SLA and Service Managers can be set up in different flavours.

and connected as needed according to the requirements of the involved value chain stakeholders in the respective Future Internet scenario.

In the following use-case chapters we also provide additional configuration examples of the framework. 3. 2 Adoption Considerations for Cloud computing The SLA@SOI framework should become an intrinsic part of each cloud environment,

The Enterprise IT use-case (Section 3) is basically an infrastructure cloud use case that features SLA enabling.

The overhead introduced depends significantly on the granularity of the SLA management (how fine-grained the decomposition of an IT stack into services

the actual scalability in a target environment depends on the number of interrelations between different artefacts.

allowing for different setups of the framework instances which due to the underlying OSGI-based integration approach can be changed even during run-time. 4 Use Case Enterprise IT The Enterprise IT Use Case focuses on compute infrastructure provisioning

in support of Enterprise services. We assume a virtualisation-enabled data centre style configuration of server capacity,

and a broad range of services in terms of relative priority, resource requirement and longevity. As a support service in most enterprises

IT is expected to deliver application and data service support to other enterprise services and lines of business.

This brings varied expectations of availability, mean-time-torecover, Quality of Service, transaction throughput capacity, etc.

run time adjustment decisions on workload migration SLAS Empowering Services in the future Internet 333 for efficiency,

The first scenario, titled Provisioning, responds to the issue of efficient allocation of new services ON IT infrastructure, SLA negotiation and provisioning of new services in the environment.

The second scenario, Run Time, deals with day-to-day, point in time operational efficiency decisions within the environment.

These decisions maximise the value from the infrastructure investment. The final scenario, Investment Governance builds on the first two to demonstrate how they feed back into future business decisions.

Taking a holistic cost view, it provides fine grained SLA based data to influence future investment decisions based on capital

security, compute power and energy efficiency. In order to enable realistic and effective reasoning at provisioning and run time,

a reference is included differentiates each of the supported Enterprise services in terms of their priority and criticality.

This is the Enterprise Capability Framework or ECF. From an implementation perspective, user interaction is via a web based UI,

used by both IT customers and administrators. The Enterprise IT SLAT defines use case specific agreement terms

which are loaded by the Business SLA manager to provide the inputs to provisioning requests in the form of Paas services.

Software services could potentially be selected by choosing a virtual machine template which contains pre-loaded applications,

but software layer considerations are considered not core to this Use Case and are dealt more comprehensively with in the ERP Hosting Use Case.

are complementary and allow the framework to be assessed based on realistic objectives of an Enterprise IT function.

Using Key Performance Indicators (KPIS) we evaluate the performance of the lab demonstrator in the areas of IT enabling the Enterprise IT Efficiency IT Investment/Technology adoption The Use Case identifies a hierarchy of KPIS

and therefore result in a credible assessment of the impact of the SLA Management Framework in an Enterprise IT context.

SLA management in this context promises great benefits to providers and customers: Providers are enabled to offer hosted solutions in a very 334 J. Butler et al. cost-efficient and transparent way,

which in particular offers new sales channels towards small and medium sized customers. Customers are enabled to steer their business in a more service-oriented and flexible manner that meets their business needs without spending too much consideration ON IT matters.

Furthermore, customers can flexibly negotiate the exact service details, in particular its service levels, so that they can eventually get the best fitting service for their needs.

The actual use case realizes a scenario with 4 layers of services. The top-level service considered is the so-called business solution.

Such a solution typically consists of a software package (an application) but also some business-level activities,

The business SLA is mainly about specifying support conditions (standard or enterprise support), quality characteristics (usage profile and system responsiveness

and provisioning of requested services can be reduced significantly. The dependability of provided services is increased proportional to the number of formally managed service level terms.

The efficiency of service provisioning can be improved in the dimensions of environmental efficiency, resource efficiency,

and a demo video are available at 7. SLAS Empowering Services in the future Internet 335 6 Use Case Service Aggregation The main aim of the Service Aggregation use case is the service

-enabling of core Telco services and their addition with services from third parties (as Internet, infrastructure, media or content services).

From the provider's point of view, they will be able to publish their services in the Service Aggregator

and will be benefited in terms of reach new markets in which their services can be consumed and to be sold to the customers joined with reliable communication services offered by Telco providers.

Customers can find the services and negotiate flexibly the terms of the consumption of the services included in the product.

It is necessary to point out that negotiation takes place in three faces: Bank Customer service Aggregator and Infrastructure provider.

This implies the negotiation of the SLAS with quality of service aspects and the final price.

Bank customer prototype uses several framework components mainly interfaces with Business Manager and Business SLA Manager.

Service Aggregator and Infrastructure prototype have been implemented using business and infrastructure layers; additionally Service Aggregator integrates software layer (from SLA@SOI framework architecture.

And finally Bank prototype is implemented using the top layer, business. Both providers utilize SLAT registries in their SLA Managers to publish the SLA templates of his services hierarchy.

Business SLA template for SMS service includes some business terms like support, termination or price and other guarantee terms like availability, throughput, and response time.

Communication of SLA templates between third party and Service Aggregator use advertising bus to share infrastructure templates.

Customer prototype is connected with Business Manager of the Service Aggregator to find and discover products;

in this case it found the‘Communications and Infrastructure bundle'product. Customer retrieves the different SLA templates available for the product and the negotiation starts.

Infrastructure provider can also define the business negotiation of his services in the same way.

The compo 336 J. Butler et al. nents that can be connected also in the use case are the monitors of the services (SMS and Infrastructure services.

In the new ecosystems of Future internet of services the key will be the exporting and interconnection of services between different parties.

and the quality of the services guaranteed on those SLAS. SLA-aware aggregation of telecommunications services introduces a business opportunity for the agile and efficient co-creation of new service offerings and significant competitive advantages to all.

Further details on this use case including a demo video are available at 8. 7 Use Case egovernment Public administrations often outsource human based services to 3rd party organizations.

Such relationships are regulated currently with legal documents and human readable SLAS. The egovernment use case aims at showing that the adoption of machine readable SLAS improves the agility

if the services are performed by humans. In our proof of concept we considered a composed service allowing citizens to book medical treatments

In this context, the SLA between the Government and the CSC regulates the provision of the health, mobile and contact services,

SLAS Empowering Services in the future Internet 337 From the technical point of view, one of the main challenges of this use case has been the modelling of human-provided services,

and the formalization of the strategies for handling human resources during negotiation and adjustment. This is still an ongoing task that has required several interviews with the operators working at the service providers.

, the difference between summer and winter in the delivery of the services considered in this use case.

and human provided services. Further details on this use case are available at 9. 8 Conclusions Service level agreements are a crucial element to support the emerging Future Internet

so that eventual services become a tradable, dependable good. The interdependencies of service level characteristics across layers and artefacts require a holistic view for their management along the complete service lifecycle.

Managing on-demand business applications with hierarchical service level agreements. In: Berre, A j.,Gómez-Pérez, A.,Tutschku, K. eds.

Enterprise IT Use Case. http://sla-at-soi. eu/research/focus-areas/use-case-enterprise-it/7. SLA@SOI project:

egovernment Use Case, http://sla-at-soi. eu/research/focus-areas/use-case-e-government/Meeting Services and Networks in the future Internet Eduardo Santos1

This paper presents the researches for better integration between services and networks by simplifying the network layers structure

FINLAN (Fast Integration of Network Layers) was modeled to be able to deal with semantics in the network communication, cross-layers,

Future Internet, Network Ontology, Post TCP IP, Services Introduction In recent years it has been remarkable the Internet advancement in throughput and the development of different services and application features.

when the Internet was used just for a limited number of hosts and with a few services support.

resulting in a communication gap between layers 7, 8. Integration of services and networks is an emerging key feature in the future Internet

proposals and discussions over questions related to a network able of supporting the current and Future Internet communication challenges.

This research also shows one proposal to improve the communication between services and networks with semantics

and Transport layers, meeting services directly to the network lower layers. Thereby, the networks are prepared to meet the requirements of services in a flexible

and optimized way. For example, the work in 6 shows how FINLAN can deal with the requirement of delivery guarantee,

and proposals to extend the use of ontology in computer networks to support the communication needs in a better way.

In current networks, the semantic communication generally is limited to the Application layer and this layer is restricted to sending meaning to the Network and Transport layers.

This helps the networks to improve the support to the communication needs, as the Application layer can inform,

Some of the communication needs that the lower layers can better support, by the ontology use in this work,

The Net-Ontology layer has semantic communication, in OWL (Web Ontology Language), with its superior layer and the DL-Ontology layer.

It is responsible to support the services needs of the superior layer. The DL-Ontology layer has semantic communication,

also using OWL, with the superior and the Net-Ontology layers. It is responsible to support the Data link communication to guarantee the correct delivery Meeting Services and Networks in the future Internet 341 of data transfer between links.

The main difference between these two layers is that the Net-Ontology layer is responsible to support service needs beyond simple data transfers.

One application example is the services integration in heterogeneous environment to the devices mobility in 4g networks handovers,

In this scenario, FINLAN approach contributes to the semantic communication between the DOHAND and the DL-Ontology layer, for the handover in 4g networks.

This work uses OWL as formal language for this communication as the OWL was adopted by a considerable number of initiatives

One example of the FINLAN ontology use in the future Internet research area is the possibility to support the AUTOI Functional Components communication with (and between) the network elements.

So, the interactions between these components and their communication with the network intermediate layers can use OWL, instead of IP, UDP and TCP protocols.

="Thing"/>Subclassof><Subclassof><Class IRI="#Service"/>Class IRI="#Entity"/>Subclassof>Meeting Services and Networks in the future Internet 343 This work shows how FINLAN can contribute with Future Internet researches (using Autoi

and the implementations to enable the network communication without using the IP, TCP, UDP and SCTP protocols,

the class that represents all that can establish communication. For example: a service, a content, a network element and even a cloud computing;

represents the requirements that an entity has during communication. For instance: delivery guarantee, Qos, security and others. 2. 1 Collaboration to the Autoi Planes One of the Autonomic Internet project expectations is to support the needs of virtual infrastructure management to obtain self management

which can cover heterogeneous networks and services like mobility, reliability, security and Qos. The FINLAN project can contribute in its challenges,

The FINLAN ontology supports the network communication used by the Autoi vcpi (Virtual Component Programming interface) 13,

By this, the FINLAN ontology layers can comprehend communication needs as the instantiation, remotion and modification of virtual resources.

DOCS (Distributed Orchestration Component) or ANPI (Autonomic Network programming Interface) and one OWL sample code for this communication is showed bellow:<

FINLAN allows to create the Net-Ontology interface with Autoi to support the contextaware control functions for the self management and adaptation in the CISP (Context Information Services Platform) needs.

The context information in the FINLAN layers can act as an intermediate unity with its own semantic to reduce Meeting Services

The network context, for example, can interact with network elements and services according to the ontology concepts in the following code

As the communication between the Autoi modules is done through UDP transactions or TCP connections, FINLAN can collaborate in this scenario,

the FINLAN ontology supports, for example, services that communicates with the Servicecloud Entity, which has need the of the information stored in the manifest requirement.

by the OWL experiments at the intermediate network layers and the cross layers communication. In the researches of service-centric,

to handle requests for services related to bandwidth, storage, encryption, location, indexing and others. Related to the content-centric it is presented in 19 the difficulties of the current networks to support the objects concept.

Meeting Services and Networks in the future Internet 347 In this proposal, the objects Media, Rules, Behaviour, Relations and Characteristics,

simplifying the communication process with the lower layers. Through the FINLAN Net-Ontology layer, requirements such as Qos and Security, can be requested to the network,

Individual>3 Integration between Services and Networks This section describes how to integrate this project in collaboration with others Future Internet works,

it is observed that the evolution of TCP IP layers to increase the networks communication possibilities, is need a growing

The benefit of this integration for the Autoi Orchestration plane is the use of the ontology at the intermediate layers to support the semantic needs to orchestrate the negotiation between the AMSS and the communications with the network elements.

and extends this functionality as it allows the understanding of the needs for establishing communication through the ontological model adopted.

With the use of the FINLAN library this communication can be done replacing the IP and TCP protocols with the FINLAN representation using OWL over raw sockets for the Net-Ontology

for the communication between the Service Enabler plane and the Management/Knowledge plane implemented by the AMS.

and DL-Ontology layers relate with the developed ontology, Services and Physical layers of the network.

and DL-Ontology layers allowing the semantic communication and network behavior control. From the OWL concepts, the Net-Ontology layer is skillful to receive requests for applications,

the communication Fig. 4. Overview of FINLAN Library Implementation Meeting Services and Networks in the future Internet 349 is ready to be established,

We have proposed to better meeting of services and networks by approaching services semantically to the network structure.

and scalability experiments with different Future Internet projects open implementations. Further work also will do the extension of the scope of the ontological representation,

We strongly believe that meeting services and networks through the reduction of network layers and

services and content complexity is a possible way to achieve flexibility in future networks. Moreover, we expect that ontological approaches can help to build a Future Internet with its real challenges, requirements and new paradigms.

Proposal for Hybrid Communication in Local Networks. In: 8th International Information and Telecommunication Technologies Symposium (2009) 6 Pereira, F. S f.,Santos, E s.,Pereira, J. H. S.,Rosa, P. F

IEEE International Conference on Networking and Services, p. 32 (2010) 7 Pereira, J. H. S.,Kofuji, S. T.,Rosa, P. F.:

IEEE International Conference on Networking and Services, p. 7 (2010) 10 Pereira, J. H. S.,Pereira, F. S f.,Santos, E s.,Rosa, P. F

International Journal On Advances in Networks and Services, in Press (2011) 12 Rochwerger, B.,Galis, A.,Breitgand, D.,Levy, E.,C'aceres, J.,Llorente,

IEEE Global Communications Conference (2010) 14 Rubio-Loyola, J.,Astorga, A.,Serrat, J.,Lefevre, L.,Cheniour, A.,Muldowney, D.,Davy, S.,Galis

Optimization Proposal for Communication Structure in Local Networks. In: IEEE International Conference on Networking and Services, p. 18 (2010) 17 Vanni, R. M. P.:

Integra¸c ao de Servi¸cos em Ambientes Heterog eneos: uso de Sem antica para Comunica¸c ao Entre Entidades em Mudan¸cas de Contexto.

The Author (s). This article is published with open access at Springerlink. com. Fostering a Relationship between Linked Data and the Internet of Services John Domingue1, Carlos Pedrinaci1, Maria Maleshkova1, Barry Norton2,

and the Internet of Services which we have been exploring recently. The Internet of Services provides a mechanism for combining elements of a Future Internet through standardized service interfaces at multiple levels of granularity.

Linked Data is a lightweight mechanism for sharing data at web-scale which we believe can facilitate the management and use of service-based components within global networks.

Linked Data, Internet of Services, Linked Services 1 Introduction The Future Internet is a fairly recent EU initiative

The Internet of Services is seen as a core component of the Future Internet: The Future Internet is polymorphic infrastructure,

From an Internet of Services perspective, Linked Data with its relatively simple formal representations and inbuilt support for easy access and connectivity provides a set of mechanisms supporting interoperability between services.

the integration between services and Linked Data is increasingly gaining interest within industry and academia.

for instance, research on linking data from RESTFUL services by Alarcon et al. 3, work on exposing datasets behind Web APIS as Linked Data by Speiser et al. 4,

We see that there are possibilities for Linked Data to provide a common‘glue'as services descriptions are shared amongst the different roles involved in the provision,

aggregation, hosting and brokering of services. In some sense service descriptions as and interlinked with, Linked Data is complementary to SAP's Unified Service Description Language2 5, within their proposed Internet of Services framework3,

as it provides appropriate means for exposing services and their relationships with providers, products and customers in a rich, yet simple manner

which is tailored to its use at Web scale. In this paper we discuss the relationship between Linked Data and services based on our experiences in a number of projects.

Using what we have learnt thus far, at the end of the paper we propose a generalization of Linked Data

so that they can discover more things. 1 http://developer. zemanta. com/2 http://www. internet-of-services. com/index. php?

id=288&l=0 3 http://www. internet-of-services. com/index. php? id=260&l=0 Fostering a Relationship between Linked Data and the Internet of Services 353 RDF (Resource Description Framework) is a simple data model for semantically describing resources on the Web.

Binary properties interlink terms forming a directed graph. These terms as well as the properties are described by using URIS.

Mark Zuckerberg, Facebook's CEO claimed recently that Open Graph was the the most transformative thing we've ever done for the Web 13.3 Services on the Web Currently the world of services on the Web is marked by the formation of two main groups

of services. On the one hand, classical Web services, based on WSDL and SOAP, play a major role in the interoperability within and among enterprises.

Web services provide means for the development of open distributed systems based on decoupled components, by overcoming heterogeneity

and enabling the publishing and consuming of functionalities of existing pieces of software. In particular, WSDL is used to provide structured descriptions for services, operations and endpoints,

while SOAP is used to wrap the XML messages exchanged between the service consumer and provider.

publicly available Web APIS, also referred to as RESTFUL services (properly when conforming to the REST architectural principles 7). RESTFUL services are centred around resources,

which are interconnected by hyperlinks and grouped into collections, whose retrieval and manipulation is enabled through a fixed set of operations commonly implemented by using HTTP.

In contrast to WSDL-based services, Web APIS build upon a light technology stack relying almost entirely on the use of URIS, for both resource identification and interaction,

The take up of both kinds of services is hampered, however by the amount of manual effort required

Research on Semantic web services 8 has focused on providing semantic descriptions of services so that tasks such as the discovery, negotiation,

composition and invocation of Web services can have a higher level of automation. These techniques, originally targeted at WSDL services,

have highlighted a number of advantages and are currently being adapted towards lighter and more scalable solutions covering Web APIS as well. 8 http://backstage. bbc. co. uk/9 http://news. bbc. co. uk/sport1/hi/football

and the Internet of Services 355 4 Linked Services The advent of the Web of Data together with the rise of Web 2 0 technologies and social principles constitute, in our opinion,

lead to a widespread adoption of services on the Web. The vision toward the next wave of services, first introduced in 9 and depicted in Figure 1,

is based on two simple notions: 1. Publishing service annotations within the Web of Data, and 2. Creating services for the Web of Data, i e.,

, services that process Linked Data and/or generate Linked Data. We have devoted since then significant effort to refining the vision 10

and implementing diverse aspects of it such as the annotation of services and the publication of services annotations as Linked Data 11,12,

as well as on wrapping, and openly exposing, existing RESTFUL services as native Linked Data producers dubbed Linked Open Services 13,14.

It is worth noting in this respect that these approaches and techniques are different means contributing to the same vision

What is essential though is exploiting the complementarity of services and the Web of Data through their integration based on the two notions highlighted above.

At the bottom are Legacy Services which are services which may be based WSDL or Web APIS, for

which we provide in essence a Linked Data-oriented view over existing functionality exposed as services.

Legacy services could in this way be invoked, either Fig. 2. Services and the Web of Data 356 J. Domingue et al. by interpreting their semantic annotations (see Section 4. 1)

or by invoking dedicated wrappers (see Section 4. 2) and RDF information could be obtained on demand.

In this way data from legacy systems, state of the art Web 2. 0 sites, or sensors, which do not directly conform to Linked Data principles can easily be made available as Linked Data.

In the second layer Are linked Service descriptions. These are annotations describing various aspects of the service which may include:

Note that we have made already our descriptions available in the Linked Data Cloud through iserve these are described in more detail in Section 4. 1. The final layer in Figure 2 concerns services which are able to consume RDF data

and RDF mash-ups 16 with the important difference that services are, in this case, RDF-aware and their functionality may range from RDF-specific manipulation functionality up to highly complex processing beyond data fusion that might even have real-life side-effects.

The use of services as the core abstraction for constructing Linked Data applications is therefore more generally applicable than that of current data integration oriented mashup solutions.

We expand on the second and third layers in Figure 2 in more detail below. 4. 1 Implementing Linked Services with Linked Data-based Annotations One thread of our work on Linked Services is based on the use of Linked

Data-based descriptions of Linked Services allowing them to be published on the Web of Data and using these annotations for better supporting the discovery, composition and invocation of Linked Services.

Our research there is based on the Minimal Service Model (MSM) 17 originally introduced together with hrests 18 and WSMO-Lite 19,

which captures the maximum common denominator between existing conceptual models for services. The best-known approaches to annotating services semantically are OWL-S 20, WSMO 21, SAWSDL 22,

and WSMO-Lite for WSDL services, and Microwsmo 23, and SA-REST for Web APIS.

To cater for interoperability, MSM represents essentially the intersection of the structural parts of these formalisms.

Additionally, as opposed to most Semantic web services research to date MSM supports both classical WSDL Web services,

as well as a procedural view on the increasing number of Web APIS and RESTFUL services, which appear to be preferred on the Web.

Fostering a Relationship between Linked Data and the Internet of Services 357 Fig. 3. Conceptual model for services used by iserve As it can be seen in Figure 3,

MSM defines Services, which have a number of Operations. Operations in turn have input, output and fault Messagecontent descriptions.

Messagecontent may be composed of mandatory or optional Messageparts. The addition of message parts extends the earlier definition of the MSM as described in 18.

Similarly, the second tool, SOWER, assists users in the annotation of WSDL services and is based in this case on SAWSDL for adding links to semantic descriptions as well as lifting and lowering mechanisms.

and WSDL services described using heterogeneous formalisms. iserve is, to the best of our knowledge,

as well as the first to provide advanced discovery over Web APIS comparable to that available for WSDL-based services.

Thanks to its simplicity, the MSM captures the essence of services in a way that can support service matchmaking

and invocation and still remains largely compatible with the RDF mapping of WSDL, with WSMOBASED descriptions of Web services, with OWL-S services,

and with services annotated according to WSMO-Lite and Microwsmo. The essence of the approach followed by iserve is the use of import mechanisms for a wide range of existing service description formalisms to automatically transform them into the MSM.

Once the services are transformed service descriptions are exposed following the Linked Data principles and a range of advanced service analysis and discovery techniques are provided on top.

application developers can easily discover services able to process or provide certain types of data,

which links service descriptions with users ratings, tags and comments about services in a separate server.

kmi. open. ac. uk/soa4all-studio/consumption-platform/rs4all/Fostering a Relationship between Linked Data and the Internet of Services 359 In summary,

SPICES18 24 (Semantic Platform for the Interaction and Consumption of Enriched Services) is a platform for the easy consumption of services based on their semantic descriptions.

In particular, SPICES supports both the end-user interaction with services and the invocation process itself, via the generation of appropriate user interfaces.

Further tooling covering the composition of services as well as analysis of the execution are also being developed as part of an integrated tool suite called SOA4ALL Studio19.

The SOA4ALL studio is a fully fledged system that provides extensive support for completing different tasks along the lifecycle of services,

enabling the creation of semantic service description, their discovery, composition, invocation and monitoring. 4. 2 Services

but about how services should be implemented on top of Linked Data in order to become first class citizens of the quickly growing Linking Open Data Cloud.

Note that we take a purist view of the type of services which we consider.

These services should take RDF as input and the results should be available as RDF;

Within existing work on Semantic web Services, considerable effort is expended often in lifting from a syntactic description to a semantic representation and lowering from a semantic entity to a syntactic form.

REST principles allows for re-exposing the wrappers as RESTFUL services so that the only required platform to interact with them is the Web (HTTP) itself.

As a general motivation for our case, we consider the status quo of the services offered over the geonames data set,

as seen in our version of these services, 21 uses the same languages and technologies in the implementation and description of services, communicated as the Linked Open Service (LOS) principles 14 encouraging the following:

allowing RDF-encoded messages for input/output; reusing URIS from Linked Data source for representing features in input and output messages;

the approach of Linked Data Services (LIDS) 25 is to URL-encode the input. For instance, the latitude and longitude and used as query parameters

and http://dbpedia. org/resource/Innsbruck airport, respectively. 21 http://www. linkedopenservices. org/services/geo/geonames/weather/Fostering a Relationship between Linked Data and the Internet of Services

In aligning LOS and LIDS principles, pursued via a Linked Services Wiki22 and a Linked Data and Services mailing list23,

and Linked Data Services so far concentrate on resource retrieval and therefore primarily the HTTP GET verb), in the standard REST style,

and query services offered at http://www. linkedopenservices. org/services. LOS and LIDS also coincide on the idea of refining the general principles of Linked Services communicated in Section 4

of describing accepted/expected messages using SPARQL graph patterns. While this is a design decision, it aims at the greatest familiarity and ease for Linked Data developers.

under certain restrictions24, query processing techniques can be used to assemble a set of services whose results can be combined to satisfy the initial user request.

and the graph patterns are used for both the discovery of services, and then also reused in defining the dataflow between services within a process,

defined again as SPARQL CONSTRUCT queries. Work is ongoing on graph pattern-based discovery and process definition and execution. 22 http://linkedservices. org 23 http://groups google. com/group/linkeddataandservices/24 Currently that the graph patterns contained in this request,

etc. and free of FILTERS. etc. 4 362 J. Domingue et al. 5 Conclusions In this paper we have outlined how Linked Data provides a mechanism for describing services in a machine readable fashion

We have described also a set of principles for how services should consume and produce Linked Data

From our work thus far, we see that integrating services with the Web of Data, as depicted before, will give birth to a services ecosystem on top of Linked Data,

whereby developers will be able to collaboratively and incrementally construct complex systems exploiting the Web of Data by reusing the results of others.

and our extensions can be generalized to the Internet of Services That is, to scenarios where services sit within a generic Internet platform rather than on the Web.

These principles are: Global unique naming and addressing scheme-services and resources consumed and produced by services should be subject to a global unique naming and addressing scheme.

This addressing scheme should be easily resolvable such that software clients are able to access easily underlying descriptions.

Linking linking between descriptions should be supported to facilitate the reuse of descriptions and to be able to specify relationships.

Service abstraction building from SOA principles functionality should be encapsulated within services which should have a distinct endpoint available on the Internet, through

Machine processability the descriptions of the services and resources should be machine-processable. RDF (S) achieves this by having an underlying semantics and also with the ability to point to an ontology based description of the schema used.

Ideally, the inputs and outputs for services should be machine-processable as well. Following from the above we believe that the Future Internet will benefit greatly from a coherent approach

More generally, we expect to see lightweight semantics appearing throughout the new global communications platform which is emerging through the Future Internet work

The authors would like to thank the members of the SOA4ALL project and the members of the STI Conceptual Models for Services Working group for their interesting feedback on this work. 25 http://socialmedia. net/node/175 26

http://www. soa4all. eu/Fostering a Relationship between Linked Data and the Internet of Services 363 Open Access.

Linking Data from RESTFUL Services. In: Workshop on Linked Data on the Web at WWW 2010 (2010) 4. Speiser, S.,Harth, A.:

Towards a Unified Service Description Language for the Internet of Services: Requirements and First Developments.

IEEE Int'l Conference on Services Computing, July 2010, pp. 602 609 (2010) 6. Berners-Lee, T.:

Semantic web Services. IEEE Intelligent Systems 16 (2), 46 53 (2001) 9. Pedrinaci, C.,Domingue, J.,Krummenacher, R.:

Services and the Web of Data: An Unexploited Symbiosis. In: AAAI Spring Symposium Linked Data Meets Artificial intelligence, March 2010, AAAI Press, Menlo Park (2010) 10.

Toward The next Wave of Services: Linked Services for the Web of Data. Journal of Universal Computer science 16 (13), 1694 1719 (2010) 11.

Maleshkova, M.,Pedrinaci, C.,Domingue, J.:Supporting the creation of semantic RESTFUL service descriptions. In:

a Linked Services Publishing Platform. In: Workshop: Ontology Repositories and Editors for the Semantic web at ESWC (June 2010) 13.

Towards Linked Open Services and Processes. In: Future Internet Symposium, October 2010, pp. 68 77.14.

Services Mashups: The New Generation of Web Applications. IEEE Internet Computing 12 (5), 13 15 (2008) 16.

Adapting SAWSDL for Semantic Annotations of RESTFUL Services. In: Workshop: Beyond SAWSDL at OTM, November 2009, pp. 917 926 (2009) 364 J. Domingue et al. 18.

An HTML Microformat for Describing RESTFUL Web Services. In: IEEE/WIC/ACM Int'l Conference on Web Intelligence and Intelligent agent Technology, December 2008, pp. 619 625 (2008) 19.

WSMO-lite annotations for web services. In: Bechhofer, S.,Hauswirth, M.,Hoffmann, J.,Koubarakis, M. eds.

Semantic Markup for Web Services. Technical Report, Member Submission, W3c (2004) 21. Fensel, D.,Lausen, H.,Polleres, A.,de Bruijn, J.,Stollberg, M.,Roman, D.,Domingue, J.:

Enabling Semantic web Services-The Web Service Modeling Ontology. Springer, Heidelberg (2006) 22. Farrell, J.,Lausen, H.:

Adapting SAWSDL for Semantic Annotations of RESTFUL Services. In: Meersman, R.,Herrero, P.,Dillon, T. eds.

Towards Linked Data Services. In: Int'l Semantic web Conference (Posters and Demonstrations (November 2010) 26.

The Media Internet is evolving to support novel user experiences such as immersive environments including sensorial experiences beyond video

taste and haptics) that are adaptable to the user, the networks and the provisioned services.

one of the areas where high investment in research has taken place in recent years is related to the multimedia and multimodal search and retrieval of multimedia objects over the Internet.

and end-users, finally enabling every user first to access the offered multimedia services in various con 368 Part VII:

. gr 4 Multimedia Communication, Klagenfurt University, Austria christian. timmerer@itec. uni-klu. ac. at 5 PCN, Greece vkoumaras@pcngreece. com,

ktroulos@pcngreece. com 6 VIOTECH Communications, France msidibe@viotech. net 7 Optibase Technologies Ltd, Israel Yaell@optibase. com 8 Applied

and end-users, finally enabling every user first to access the offered multimedia services in various contexts,

Towards this goal, the proposed concept provides content-awareness to the network environment, network-and user contextawareness to the service environment,

and adapted services/content to the end user for his best service experience possible, taking the role of a consumer and/or producer.

Future Internet, Multimedia Distribution, Content Awareness, Network Awareness, Content/Service Adaptation, Quality of Experience, Quality of Services, Service Composition, Content-Aware Network

1 Introduction One of the objectives of the future communication networks is the provision of audiovisual content in flexible ways and for different contexts, at various quality standards and associated price levels.

The system capabilities to assure different levels of endtoend Quality of Services, (i e. including content production,

and composition of services while being able to take into account information regarding the transport/terminal contexts

and adapt the services accordingly. Bringing together in a synergic way all the above factors, a new Media Ecosystem is hence foreseen to arise,

With this respect, new flexible business models have to be supported by the Media Ecosystem. Finally, such a system can bring breakthrough opportunities in various domains such as communication industry

education, culture and entertainment. However, the traditional and current layered architectures do not include exchanges of content and network-based information between the network layers and upper layers.

as a mean for quality provision and profit, to allow sustainable new forms of multimedia communications with an increasing importance in the future Internet.

and Network-Aware services/Applications (NAA) can be a way to overcome the traditional architectures limitations.

A Novel Approach for Content-Awareness in Future Networks 371 needs of individual users) or service-centric approach (i e. satisfying the different needs of various service types), that is required for the future services

Based on virtualization, the network can offer enhanced transport and adaptation-capable services. This chapter will introduce

and new functionalities for efficient cooperation between entities of various environments so as to finally provide the end user with the best and most complete service experience via a Media Ecosystem,

aiming to provide content-awareness to the network environment, network-and user context-awareness to the service environment,

and adapted services/content to the end user's Environment. 2 Background Numerous events and studies are dedicated currently to (re) define the directions which the Future Internet development should follow.

and telecommunication services as described in 3. The strong orientation of user-centric awareness to services

These environments are: User Environment (UE), to which the end users belong; Service Environment (SE), to which the service and content providers belong;

Network Environment (NE), to which the network providers belong. By Environment, it is understood a generic and comprehensive name to emphasize a grouping of functions defined around the same functional goal

and possibly spanning, vertically, one or more several architectural (sub-)layers. It characterizes a broader scope with respect to the term layer.

By Service, if not specified differently, we understand here high level services, as seen at application/service layer. 372 H. Koumaras et al. 3. 1 Layered Architectural Model The ALICANTE architecture contains vertically several environments/layers

and can be spanned horizontally over multiple network domains. The User Environment (UE) includes all functions related to the discovery

subscription, consumption of the services by the EUS. At the Service Environment (SE) the Service Provider (SP) entity is the main coordinator.

The architecture can support both synchronous communications or publish/subscribed ones. A novel type of service registry with enhanced functionalities allows new services supporting a variety of use case scenarios.

Rich service composition in various ways is offered to EUS, opening them the role of SP/CP and manager.

User and service mobility is targeted also. Below the SE there is a new Home-Box (HB) layer to coordinate the actual content delivery to the end user's premises.

The HB layer aims at allowing SPS to supply users with advanced context-aware multimedia services in a consistent and interoperable way.

It enables uniform access for heterogeneous terminals and supports enhanced Quality of Experience (Qoe. At the HB layer, the advanced user context management and monitoring functions provides real-time information on user context

and network conditions, allowing better control over multimedia delivery and intelligent adaptation. The assembly of HBS is called layer

The Network Environment (NE) comprises the virtual CAN layer (on top) and the traditional network infrastructure layer (at the bottom.

The goal of the Virtual CAN layer is to offer to higher layers enhanced connectivity services,

ALICANTE's advanced concept provides adapted services/content to the end-user for her/his best service experience possible.

These parameters are gathered from every environment using dedicated user profile management and/or monitoring entities/subsystems.

it is supposed that the specialisation of these VCANS is performed by their Meta Qos class (MQC) of services 12-13.

Scalability is achieved by largely avoiding per-flow signalling in the core part of the network. In the new architecture, MANE also can act as content caches,

The architecture can support the client-server communication style and also P2p (between HBS) style. 376 H. Koumaras et al.

and private communications. In public traffic no security or privacy guarantees are enforced. Secret content addresses content confidentiality

Private communications is to be adopted when the confidentiality and authenticity of the entire packets, including headers,

In this environment the main business actors/entities envisaged (as shown in Figure 3) are the following:

The NPS may interact with each other to expand content-aware services across a larger geographical span.

but agreed by The CANP offers content-aware network services to the upper layer entities.

which is responsible for the services offered to the end-user and may interact with NPS, and/or CANPS in order to use/expand their service base.

in order to distribute multimedia services (e g.,IPTV) in different modes (e g. P2p. Content is offered to the CCS

and deliver services to CCS with higher quality. SPS may not own a transport infrastructure, but rely on the connectivity services offered by Network Providers (NPS),

or CAN Providers (CANP). The SPS are ultimately responsible for the service offered to the CC

and use the services of NPS, or CANPS, via appropriate SLAS. In ALICANTE a single merged entity SP/CP is considered playing the both roles.

Each of the previously described environments is present in today actual deployments, but there is a profound limitation of collaboration among them.

The real challenge and ultimate objective is to find the appropriate means for efficient cooperation between entities of the various environments to provide the end-user with the best service experience

Qos guarantees, more intimate relation with their customers, etc..On the user side, it increases choice

and services by selecting, deploying, controlling and managing easy-to-use, affordable services and applications on service-enabled networks.

Eventually the end user will have a choice of service access methods: anywhere, anytime and in any context with the appropriate awareness degree 1. It also allows competitive content producers to enter

An effective scaling up of the infrastructure across multiple administrative domains (i e. multiple NPS) could help distinguish competition in the service and network layers.

The appropriate implementation would allow management of special services and best-effort services separately. Last and not least

The chapter has indicated also the novel business opportunities that are created by the proposed Media-Ecosystem.

Media Ecosystem Deployment Through Ubiquitous Content-Aware Network Environments. ALICANTE, No248652 (last accessed: March 2011)( 2011), http://www. ict-alicante. eu/2. Borcoci, E.,Negru, D.,Timmerer, C.:

User-Centric Future Internet and Telecommunication Services. In: Tselentis, G.,et al. eds.)) Towards the Future Internet, pp. 217 226.

Future Internet=Content+Services+Management. IEEE Communications Magazine 47 (7), 27 33 (2009) 5. Zahariadis, T.,et al.:

Content Adaptation Issues in the future Internet. In: Tselentis, G.,et al. eds.)) Towards the Future Internet, pp. 283 292.

IEEE Communications Magazine 45 (1), 84 90 (2007) 9. Baker, N.:Context-Aware Systems and Implications for Future Internet.

IEEE Communications Magazine 47 (7), 20 26 (2009) 12. Levis, P.,et al.:The Meta-Qos-Class Concept:

a Step Towards Global Qos Interdomain Services. Proc. IEEE, Softcom, Oct. 2004 (2004) 13. Paris Flegkas, et al.

IEEE Communications Magazine (June 2005) 14. Timmerer, C.,et al.:Scalable Video Coding in Content-Aware Networks:

High quality multimedia contents can distribute in a flexible, efficient and personalized way through dynamic and heterogeneous environments in Future Internet.

and dispense high quality multimedia contents in an efficient, supple and personalized way through dynamic and heterogeneous environments.

Multimedia content over internet are becoming a well-liked application due to users'growing demand of multimedia content and extraordinary growth of network technologies.

In contrast, Peer-to-peer (P2p) media streaming protocols, motivated by the great success of file sharing applications, have attracted a lot of interest in academic and industrial environments.

In order to handle such obscurity, scalability emerged in the field of video coding in the form of Scalable Video Coding (SVC) 1 4 and Multiple Description Coding (MDC) 5-6. Both SVC

By adjusting one or more of the scalability options, the SVC scheme allows flexibility and adaptability of video transmission over resource-constrained networks.

Although some of the earlier video standards, such as H. 262/MPEG-2 3, H. 263+and MPEG-4 Part 2 included limited support for scalability, the use

of scalability in these solutions came at the significant increase in the decoder complexity and/or loss in coding efficiency.

and complexity reduction when scalability is sought, compared to the previous video coding standards. The scalability is required usually in three different directions (and their combinations.

We define these directions of scalability as follows: Temporal scalability refers to the possibility of reducing the temporal resolution of encoded video directly from the compressed bit-stream,

i e. number of frames contained in one second of the video. Spatial scalability refers to the possibility of reducing the spatial resolution of the encoded video directly from the compressed bit-stream,

i e. number of pixels per spatial region in a video frame. Quality scalability, or commonly called SNR (Signal-to-noise-Ratio) scalability,

or fidelity scalability, refers to the possibility of reducing the quality of the encoded video.

This is achieved by extraction and decoding of coarsely quantised pixels from the compressed bit-stream.

Fig. 1. A typical scalable video coding chain and types of scalabilities by going to lower-rate decoding An example of basic scalabilities is illustrated in Figure 1,

which shows a typical SVC encoding, extraction and decoding chain. The video is encoded at the highest spatiotemporal resolution and quality.

After encoding, the video is organised into a scalable bit-stream and the associated bit-stream description is created.

and complexity reduction when scalability is sought, compared to the previous video coding standards 4. According to evaluations done by MPEG,

and also employs some other new techniques to provide scalability and to improve coding efficiency. It provides temporal, spatial and quality scalability with a low increase of bit-rate relative to the single layer H. 264/MPEG-4 AVC.

The scalable bit-stream is structured into a base layer and one or several enhancement layers.

Temporal scalability can be activated by using hierarchical prediction structures. Spatial scalability is obtained using the multi-layer coding approach.

Within each spatial layer, single-layer coding techniques are employed. Moreover, inter-layer prediction mechanisms are utilized to further improve the coding efficiency.

Quality scalability is provided using the coarse-grain quality scalability (CGS) and medium-grain quality scalability (MGS).

CGS is achieved by requantization of the residual signal in the enhancement layer, while MGS is enabled by distributing the transform coefficients of a slice into different network abstraction layer (NAL) units.

All these three scalabilities can be combined into one scalable bit-stream that allows for extraction of different operation points of the video. 2. 2 Wavelet-Based SVC (W-SVC) A enormous amount of research

and offer the basis for spatial and temporal scalability The ST decomposition results in two distinctive types of data:

in order to provide the basis for quality scalability. Finally the resulting data are mapped into the scalable stream in the Scalable and Adaptable Media Coding Techniques for Future Internet 385 bit-stream organisation module,

which encodes a video into A n (where N=2) independent decodable sub-bitstreams by exploiting the scalability features of SVC.

These coding schemes provide natural robustness and scalability to media streaming over heterogeneous networks. The amalgamation of SVC/MDC and P2p are likely to accomplish some of the Future Media Internet challenges.

and services, functioning under assorted and vibrant environments while maximizing not only Quality of Service (Qos) but also Quality of Experience (Qoe) of the users.

At last, we persuade Future Internet initiatives to take into contemplation these techniques when defining new protocols for ground-breaking services and applications.

Advanced video coding for generic audiovisual services, ITUT Recommendation H. 264 and ISO/IEC 14496-10 (MPEG-4 AVC) 3. ITU-T

Image Communication 24 (9), 691 701 (2009) 6. Tillo, T.,Grangetto, M.,Olmo, G.:Redundant slice optimal allocation for H. 264 multiple description coding.

in different sectors of the economy including the service sectors, and in social networks. Research on the Future Internet

Increasingly, research and innovation on the Future Internet such as envisaged in the future Internet PPP programme forms part of a diverse, dynamic and increasingly open Future Internet innovation-ecosystem, where different stakeholders such as researchers

In particular, there is a need to explore the opportunities provided by Future Internet technologies in various business

and societal sectors and how these opportunities could be realized through open innovation models. One of the key developments is towards smart enterprises and collaborative enterprise networks.

Enterprises of the future are envisioned to be ever more open, creative and sustainable; they will become smart enterprises.

Innovation lies at the core of smart enterprises and includes not only products, services and processes but also the organizational model and full set of relations that comprise the enterprise's value network.

The Future Internet should provide enterprises a new set of capabilities, enabling them to innovate through flexibility

and diversity in experimenting with new business values, models, structures and arrangements. Combinations of Future Internet technologies are needed to deliver maximum value

and these combinations require the federation and integration of appropriate software building blocks. A new generation of enterprise systems comprising applications

and services are expected to emerge, fine-tuned to the needs of enterprise users by leveraging a basic infrastructure of utility-like software services.

High-value Future Internet applications are also foreseen in the domain of living, healthcare, and energy.

Smart Living is one of the areas where the focus lies clearly on the human user,

and encompasses the combination of technologies in areas such as smart content, personal networks and ubiquitous services,

to provide the user a simpler, easier and enriched life across many domains including home life, education and learning, working,

including the provision of assisted living services for the elderly and handicapped, and also to increase the efficiency

One of the key developments in this respect is the use of advanced communication and computing infrastructure as part of the Smart Grid.

In such urban environments, people, companies and public authorities experience specific needs and demands regarding domains such as healthcare, media, energy and the environment, safety, and public services.

Therefore, cities and urban environments are facing challenges to maintain and upgrade the required infrastructures

effective, open and participative innovation processes to jointly create the innovative applications that meet the demands of their citizens.

when it comes to shaping the demand for advanced Internet-based services. The living labs approach which comprises open

and user driven innovation in large-scale real-life settings opens up a promising opportunity to enrich the experimentally-driven research approach as currently adopted in the future Internet community.

and opportunities mentioned. The first chapter Future Internet Enterprise Systems: a Flexible Architectural Approach for Innovation discusses how emerging paradigms,

such as Cloud computing and Software-as-a-service are opening up a significant transformation process for enterprise systems. This transformation arises from commoditization of the traditional enterprise system functions

and is accelerated by new and innovative development methods and architectures of Future Internet Enterprise Systems.

The chapter foresees a rich, complex, articulated digital world reflecting the real business world, where computational elements referred to as Future Internet Enterprise Resources will directly act

and evolve according to what exists in the real world. The chapter Renewable Energy Provisioning for ICT Services in a Future Internet discusses the Greenstar Network (GSN

of the first worldwide initiatives for provisioning ICT services that are entirely based on renewable energy such as solar wind and hydroelectricity across Canada and around the world.

GSN is developed to dynamically transport user services to be processed in data centers built in proximity to green energy sources,

thereby reducing greenhouse gas emissions of ICT equipments. While current approaches mainly focus on reducing energy consumption at the micro-level through energy efficiency improvements,

the proposed approach is much broader because it focuses on greenhouse gas emission reductions at the macro-level

and focuses on heavy computing services dedicated to data centers powered completely by green energy, from a large abundant reserve of natural resources in Canada, Europe and the US.

towards Cooperation Frameworks for Open Innovation elaborates the concept of smart cities as environments of open

and user driven innovation for experimenting and validating Future Internetenabled services. The chapter describes how the living labs concept has started to fulfill a role in the development of cities towards becoming smart.

In order to exploit the opportunities of services enabled by the Future Internet for smart cities, there is a need to clarify the way how living lab innovation methods,

These common resources can be made accessible and shared in open innovation environments to achieve ambitious city development goals.

This approach requires sustainable partnerships and cooperation strategies among the main stakeholders. The fourth chapter Smart Cities at the forefront of the Future Internet presents an example of city-scale platform architecture for utilizing innovative Internet of things technologies to enhance the quality of life of citizens.

and at the service level, where the platform can be used to interconnect with different Internet of Services testbeds,

The Author (s). This article is published with open access at Springerlink. com. Future Internet Enterprise Systems:

Future Internet and Saas (Software-as-a-service), is leading the area of enterprise systems to a progressive, significant transformation process.

while the challenge is shifted toward the support to enterprise innovation. This process will be accelerated by the advent of FINES (Future Internet Enterprise System) research initiatives,

where different scientific disciplines converge, together with empirical practices, engineering techniques and technological solutions. All together they aim at revisiting the development methods and architectures of the Future Enterprise Systems,

according to the different articulations that Future Internet Systems (FIS) are assuming, to achieve the Future Internet Enterprise Systems (FINES).

In particular, this paper foresees a progressive implementation of a rich, complex, articulated digital world that reflects the real business world,

where computational elements, referred to as FINER (Future Internet Enterprise Resources), will directly act and evolve according to what exists in the real world.

Future Internet, Future Enterprise Systems, component-based software engineering, COTS, SOA, MAS, smart objects, FINES, FINER. 1 Introduction In recent years, software

and cost required to develop enterprise systems (ES), even if one adopts a customisable pre-built application platform, e g.,

This paper explores some emerging ideas concerning a new generation of Internetbased enterprise systems along the line of what has been indicated in the FINES 408 D. Angelucci, M. Missikoff,

and F. Taglino (Future Internet Enterprise Systems) Research Roadmap1, a study carried out in the context of the European commission,

Internet of things and Enterprise Environments (DG Infso. The report claims that we are close to a significant transformation in the enterprise systems, where

(i) the way they are developed, and (ii) their architectures, will undergo a progressive paradigm shift.

Such paradigm shift is motivated primarily by the need to repositioning the role of enterprise systems that,

since their inception, have been conceived to support the management and planning of enterprise resources. Payroll, inventory management,

and realising enterprises software applications. In essence, while enterprise management and planning services will be increasingly available from the‘cloud',in a commoditised form,

the future business needs (and challenges) are progressively shifting towards the support to enterprise innovation.

But also innovation cannot remain as it used to be: Future Internet, Web 2. 0, Semantic web, Cloud computing, Saas, Social media,

and (ii) new agile architectures, capable of (instantly) adjusting to the continuous change required to enterprises.

A central role will be played by enterprise system Business Process Engineering, for the above point (i),

and a new vision, based on a new family of reusable components, in the implementation of enterprise operations (and related services) automation, for the last two points.

and advanced graphical user 1 http://cordis. europa. eu/fp7/ict/enet/documents/task-forces/research-roadmap/Future Internet Enterprise Systems 409

The second grand research challenge concerns the architecture of the Future Internet Enterprise Systems (FINES) that need to deeply change with respect to

the Internet of Services (Ios), Internet of things (Iot) and smart objects, Internet of Knowledge (Iok), Internet of People (Iop.

In fact, what is missing today is a unifying vision of the disparate business aspects and entities of an enterprise, supported by an adequate theory,

(and outside) an enterprise will have a digital image (a sort of‘avatar')that has been referred to as Future Internet Enterprise Resource (FINER) in the FINES Research Roadmap.

that of shifting the focus of the attention from the management and planning of business and enterprise resources to enterprise innovation.

Together, they need to cooperate in developing a new breed of services, tools, software packages, interfaces and user interaction solutions that are not available at the present time.

A new family of ICT solutions aimed at supporting the conception, design, implementation and deployment of enterprise innovation

if such software architectures will correspond to the enterprise architectures, and will be composed by elements tightly coupled with business entities.

and F. Taglino 2 A Long March towards Component-Based Enterprise Systems FINES represents a new generation of enterprise systems aimed at supporting continuous, open innovation.

Innovation implies continuous, often deep changes in the enterprise; such changes must be mirrored by the enterprise systems:

if the latter are too complex, rigid, difficult to evolve, they will represent a hindering factor for innovation.

Agents mark a fundamental difference from conventional software modules in that they are inherently autonomous and endowed with advanced communication capability 10.

On the other side, the spread of the Internet technologies and the rising of new communication paradigms, has encouraged the development of loosely coupled and highly interoperable software architectures through the spread of the Service-Oriented approach,

whose goal is to achieve loose coupling among interacting software services, i e.,, units of work performed by software applications,

In general, a SOA will be implemented starting from a collection of components (e-services) of two different sorts.

Some services will have a‘technical'nature, conceived to the specific needs of ICT people; some other will have a‘business'nature,

reflecting the needs of the enterprise. Furthermore, the very same notion of an eservice is an abstraction that often hides the entity

Conversely, for business people, services are generated not‘in the air':'there is an active entity (a person, an organization, a computer, a robot, etc.

that provides the services, with a given cost and time (not to mention SLA, etc. associated to it.

Future Internet Enterprise Systems 411 In summary, Web services were introduced essentially as a computation resource,

when we consider business services, where states, memories, and even the preexisting history of the entity providing the business service,

where business expert can directly manage a new generation enterprise software architectures. Cloud computing represents an innovative way to architect

and operating those resources (i e. applications, services and the infrastructure on which they operate) locally.

It refers to both the applications delivered as services over the Internet and the hardware and system software in the datacenters that provide those services 12.

Cloud computing may be considered the basic support for a brand new business reality where FINERS can easily be searched,

organizing and implementing the enterprises of the future. In conclusion for decades component technologies have been developed with an ICT approach,

since it is built by business experts by using Enterprise Systems/Architectures (including Business Process) Engineering methods

the new sort of computational enterprise components just introduced (see below for more details). S2 FINES Open Monitoring System This system is dedicated to the constant monitoring and assessment of the activities of S1,

to keep under control the health of the enterprise, its performances, both internally (HR, resources, productivity, targets, etc.)

proceed in designing the interventions on the enterprise and, correspondingly, on FINES. This task is achieved by using a platform with a rich set of tools necessary to support the business experts in their redesign activities that are,

net Future Internet Enterprise Systems 413 worked structure, conceived as an evolution of the Linked Open Data2 of today;

and the FINES Interoperability Infrastructure (I6-FII), supporting the smooth communication among the great variety of components, services, tools, platforms, resources,(produced by different providers) that compose a FINES. 4 The New

, for different classes of applications and services) and vertically (using sub-parts at different levels of granularity.

, computational units representing enterprise entities. They are recognised by business people as constituent parts of the enterprise,

and therefore easily manipulated by them. A FINER has also a computational nature, characterised by 5 aspects,

such as an enterprise, is itself a FINER. FINERS are conceived to interact and cooperate among themselves, in a more or less tight way,

depending on the complexity of the enterprise entity represented. In general we have: FID: FINER identifier. This is a unique identifier defined according to a precise, universally accepted standard (e g.,

Enterprise, being the‘key assembly'in our work. Public Administration, seen in its interactions with the enterprise.

People, a special class of FINERS for which avatars are mandatory. Tangible entity, from computers to aircrafts, to buildings and furniture.

Future Internet Enterprise Systems 415 5. 1 A Business-Driven FINES Develpment Platform In order to put the business experts at the centre of the ES development process, we foresee a platform

FINERS are represented visually in a 3d space that models the enterprise reality (i e.,a Virtual Enteprise Reality) where the user can navigate

since they will be positioned in different parts of the enterprise or in the Cloud, depending on the cases.

Fig. 3. FINES design environment 5. 2 A Cloud-Based Architecture for FINERS Runtime Once a FINES has been assembled

a runtime environment will recognise, connect, and support the execution and collaboration of the FINER components.

A similar interface, representing a Virtual Enterprise Reality will be made available to the users during business operations to navigate in the enterprise

and see how the operations evolve. The computational resources of a FINES are maintained in the Computing Cloud,

Fig. 4 reports a three levels macro-architecture where the top level is represented by the real world, with the enterprise and the actual business resources.

The platform is activated mainly by business events that are generated in the enterprise (but also the external world,

FINERS Cloud Space Real world Low Level FINERS EVENT RESPONSE High Level FINERS Fig. 4. FINES Runtime Environment Future Internet Enterprise

As a next prophecy we propose the Enterprise is the Computer, meaning that an enterprise,

with all its FINERS deployed and operational, will enjoy a fully distributed computing power, where computation will be performed directly by enterprise components,

mainly positioned in the enterprise itself of in the Cloud (typically, in case of intangible entities).

This approach represents a disruptive change, from both a technological point of view and a business perspective.

Iot, Ios, Multi-Agent Systems, Cloud computing, Autonomic Systems) and, in parallel, some key areas of the enterprise that will start to benefit of the FINES approach.

Wireless Personal Communications 53 (3)( 2010) 2. Buxmann, P.,Hess, T.,Ruggaber, R.:-Internet of Services.

Business & Information systems Engineering 1 (5), 341 342 (2009) 3. Chesbrough, H.:Open Innovation: The new Imperative for Creating

Communications of AIS 1 (11)( 1999) 5. Mansell, R. E.:Introduction to Volume II: Knowledge, Economics and Organization.

In: Mansell (ed.),The Information Society, Critical Concepts in Sociology, Routledge (2009) 6. Cordis. lu:

Retrieved May 29, 2010, from Value Proposition for Enterprise Interoperability Report (2009), http://cordis. europa. eu/fp7/ict/enet/ei-isg en. html 7. Sykes

Bringing Semantics to Web Services with OWL-S. In: Proc. Of WWW Conference (2007) 14.

Web Services: Principles and Technology. Prentice-hall, Englewood Cliffs (2007) 17. Mellor, S. J.,Scott, K.,Uhl, A.,Weise, D.:

The Author (s). This article is published with open access at Springerlink. com. Renewable Energy Provisioning for ICT Services in a Future Internet Kim Khoa Nguyen1, Mohamed Cheriet1, Mathieu

As one of the first worldwide initiatives provisioning ICT (Information and Communication Technologies) services entirely based on renewable energy such as solar wind and hydroelectricity across Canada and around the world, the Greenstar Network

(GSN) is developed to dynamically transport user services to be processed in data centers built in proximity to green energy sources, reducing GHG (Greenhouse Gas) emissions of ICT equipments.

the overall energy consumption will eventually increase due to the growing demand from new services and users, resulting in an increase in GHG emissions.

the heaviest computing services are dedicated to virtual data centers powered completely by green energy from a large abundant reserve of natural resources,

and Communication Technologies (ICT) 420 K. K. Nguyen et al. because of the alarming growth of indirect GHG emissions resulting from the overwhelming utilization of ICT electrical devices 1. The current approach

Research projects following this direction have focused on microprocessor design, computer design, power-on-demand architectures and virtual machine consolidation techniques.

The Greenstar Network (GSN) project 3 is one of the first worldwide initiatives aimed at providing ICT services based entirely on renewable energy sources such as solar wind and hydroelectricity across Canada and around the world.

, such as hand-held devices, home PCS), the heaviest computing services will be dedicated to data centers powered completely by green energy.

which collaborates with the GSN project to enhance the carbon footprint exchange standard for ICT services.

Services in a Future Internet 421 one is powered by a different renewable energy source) could be integrated into an everyday network.

Energy considerations are taken before moving virtual services without suffering connectivity interruptions. The influence of physical location in that relocation is addressed also

The main objective of the GSN/Mantychore liaison is to create a pilot and a testbed environment from

This allows complex underlying services to remain hidden inside the infrastructure provider. Resources are allocated according to user requirements;

allowing the user to run their application in a virtual infrastructure powered by green energy sources. 2 Provisioning of ICT Services over Mantychore FP7

and GSN with Renewable Energy In the European NREN community connectivity services are provisioned on a manual basis with some effort now focusing towards automating the service setup and operation.

Rising energy costs, working in an austerity based environment which has dynamically changing business requirements has raised the focus of the community to control some characteristics of these connectivity services,

so that users can change some of the service characteristics without having to renegotiate with the service provider.

and MPLS (Layer 2. 5) switches to configure different services. In this aspect, Mantychore will integrate the Ether project 6 and its capabilities for the management of Ethernet and MPLS resources. c) Layer 3

and firewall services, v) Creation, modification and deletion of resources (interfaces, routers) both physical and logical,

Building competency Renewable Energy Provisioning for ICT Services in a Future Internet 423 using renewable energy resources is vital for any NREN with such an abundance of natural power generation

which provides zero-carbon ICT services. The only difference between the GSN and a regular network is that the former one is able to transport ICT services to data centers powered Switch (Allied Telesis) Raritan UPS (APC) Gbe Tranceiver

PDU Servers (Dell Poweredge R710) To core network Wind power node architecture (Spoke) Switch (Allied Telesis) Raritan UPS (APC) PDU Servers (Dell

and Layer 2 using dynamic services, then pushes Virtual machines (VMS) or software virtual routers from the hub to a sun or wind node (spoke node) when power is available.

In such a case, the spoke node may switch over to grid energy for running other services

However, GSN services are powered entirely by green energy. The VMS are used to run user applications, particularly heavy-computing services.

Based on this testbed network, experiments and research are performed targeting cloud management algorithms and optimization of the intermittently-available renewable energy sources.

the proposed solution aims at distributing user-oriented services Fig. 3. Layered GSN and Cloud computing Architectures Renewable Energy Provisioning for ICT Services in a Future Internet 425 regardless of the underlying

implementing the platform level services that provide running environment enabling cloud computing and networking capabilities to GSN services.

The Cloud Middleware plane corresponds to the User-level Middleware, providing Platform as a service capabilities based on Iaas Framework components 5. The top Management plane or User level focuses on application services by making use of services provided by the lower layer

services. 4 Virtual Data center Migration In the GSN project, we are interested in moving a virtual data center from one node to another.

Such a migration is required for large-scale applications running on multiple servers with a high density connection local network.

i) Setting up a new environment (i e.,, a new data center) for hosting the application with required configurations,

This results in a reconfiguration of a large number of servers and network devices in a multi-domain environment.

ii) Iaas Resource used to build web services interfaces for manageable resources, iii) Iaas Service serves as a broker

It uses services provided by protocols and transport layers in order to achieve communications. Each engine has a state machine

which parses commands and decides to perform appropriate actions. The GSN management is achieved by three types of engines:

The Tool component provides additional services, such as persistence, which are shared by other components. Based on the J2ee/OSGI platform

OSGI (Open Services Gateway initiative) is a Java framework for remotely deployed service applications, which provides high reliability, collaboration, large scale distribution and wide-range of device usage.

Renewable Energy Provisioning for ICT Services in a Future Internet 427 5 Federated Network GSN takes advantage of the virtualization to link virtual resources together to span multiple cloud and substrate types.

or VPLS services at the network edge. Fig. 5. Energy-aware routing In the proposed new energy-ware routing scheme based on Mantychore support,

It links user requests to appropriate services provided by data centers distributed across the network. Each data center is represented by a virtual instance,

Fig. 6. Overview of GSN network management solution Renewable Energy Provisioning for ICT Services in a Future Internet 429 6 Conclusion In this chapter, we have presented a prototype of a Future

in order to provision renewable energy for ICT services worldwide. Virtualization techniques are shown to be the most appropriate solution to manage such a network

Our future work includes research on the quality of services hosted by the GSN and a scalable resource management.

Enabling the low carbon economy in the information age. Report on behalf of the Global esustainability Initiative, Gesi (2008) 2. Saunders, H.:

and Grid Services Using Iaas to Reduce GHG Emissions. J. of Lightwave Technology 27 (12)( 2009) 5. Lemay, M.:

Infrastructure Services for Optical Networks. J. of Optical Communications and Networking 1 (2)( 2009) 7. Kiddle, C.:

Geochronos: A Platform for Earth Observation Scientists. Opengridforum 28,3/2010) 8. Grasa, E.,Hesselbach, X.,Figuerola, S.,Reijs, V.,Wilson, D.,Uzé, J. M.,Fischer, L.,de

This paper explores smart cities as environments of open and user-driven innovation for experimenting

and validating Future Internet-enabled services. Based on an analysis of the current landscape of smart city pilot programmes, Future Internet experimentally-driven research

common resources regarding research and innovation can be identified that can be shared in open innovation environments.

Effectively sharing these common resources for the purpose of establishing urban and regional innovation ecosystems requires sustainable partnerships and cooperation strategies among the main stakeholders.

The Internet and broadband network technologies as enablers of e-services become more and more important for urban development

environment and business 1. Therefore the issue arises of how cities, surrounding regions and rural areas can evolve towards sustainable open

and user-driven innovation ecosystems to boost Future Internet research and experimentation for user-driven services and how they can accelerate the cycle of research,

inno 432 H. Schaffers et al. vation and adoption in real-life environments. This paper pays particular attention to collaboration frameworks which integrate elements such as Future Internet testbeds

and Living Lab environments that establish and foster such innovation ecosystems. The point of departure is the definition

which states that a city may be called‘smart'when investments in human and social capital and traditional (transport) and modern (ICT) communication infrastructure fuel sustainable economic growth and a high quality of life, with a wise management of natural resources,

through participatory government 2. This holistic definition nicely balances different economic and social demands as well as the needs implied in urban development,

Secondly, this characterisation implicitly builds upon the role of the Internet and Web 2. 0 as potential enablers of urban welfare creation through social participation, for addressing hot societal challenges, such as energy efficiency, environment

the potential role of cities as innovation environments is gaining recognition 4. The current European commission programmes FP7-ICT

and CIP ICT-PSP stimulate experimentation into the smart cities concept as piloting user-driven open innovation environments.

The implicit aim of such initiatives is to mobilise cities and urban areas as well as rural and regional environments as agents for change,

and as environments of democratic innovation 5. Increasingly, cities and urban areas are considered not only as the object of innovation

Partnerships and clear cooperation strategies among main stakeholders are needed in order to share research and innovation resources such as experimental technology platforms, emerging ICT tools, methodologies and know-how,

Ecosystems Actors Researchers ICT companies National and EU actors City policy actors Citizen platforms Business associations Living Lab managers, citizens, governments, enterprises,

scaling, mobility) Urban development Essential infrastructures Business creation User-driven open innovation Engagement of citizens Resources Experimental facilities Pilot environments Technologies Urban

Common, shared research and innovation resources as well as cooperation models providing access to such resources will constitute the future backbone of urban innovation environments for exploiting the opportunities provided by Future Internet technologies.

Cities and urban areas provide a potentially attractive testing and validating environment. However, a wide gap exists between the technology orientation of Future Internet research and the needs and ambitions of cities.

City policy-makers, citizens and enterprises are interested primarily in concrete and short-term solutions, benefiting business creation, stimulation of SMES and social participation.

and needs of cities and their stakeholders, including citizens and businesses, and which may bridge the gap between short-term city development priorities and longer term technological research and experimentation.

Living Labdriven innovation ecosystems may evolve to constitute the core of 4p (Public-Private-People-Partnership) ecosystems providing opportunities to citizens

explore, experiment and validate innovative scenarios based on technology platforms such as Future Internet experimental facilities involving SMES and large companies as well as stakeholders from different disciplines.

Section 2 addresses challenges for cities to exploit the opportunities of the Future Internet and of Living Lab-innovation ecosystems How methodologies of Future Internet experimentation and Living Labs could constitute the innovation ecosystems of smart cities is discussed in section 3. Initial examples of such ecosystems

innovation and globalisation 6. The World Foundation for Smart Communities advocated the use of information technology to 434 H. Schaffers et al. meet the challenges of cities within a global knowledge economy 7. However,

Intelligent cities, from the new intelligence of cities, collective intelligence of citizens, distributed intelligence, crowdsourcing, online collaboration, broadband for innovation, social capital of cities, collaborative learning

Smart cities, from smart phones, mobile devices, sensors, embedded systems, smart environments, smart meters, and instrumentation sustaining the intelligence of cities.

The most urgent challenge of smart city environments is to address the problems and development priorities of cities within a global and innovation-led world.

and upgrading of skills to promote the knowledge economy. Active labour market policy is a top priority to sustain employment,

sustain the innovation economy and wealth of cities, maintain employment and fight against poverty through employment generation, the optimisation of energy and water usage and savings,

and strategies that create the physical-digital environment of smart cities, actualising useful applications and e-services,

and assuring the long-term sustainability of smart cities through viable business models. The first task that cities must address in becoming smart is to create a rich environment of broadband networks that support digital applications.

This includes:(1) the development of broadband infrastructure combining cable, optical fibre, and wireless networks, offering high connectivity and bandwidth to citizens and organisations located in the city,(2) the enrichment of the physical space and infrastructures of cities with embedded systems, smart devices, sensors,

All city economic activities and utilities can be seen as innovation ecosystems in which citizens and organisations participate in the development, Fig. 1. Smart city key application areas 436 H. Schaffers et al. supply and consumption of goods and services.

Fig. 1 presents three key domains of potential smart city applications in the fields of innovation economy

infrastructure and utilities, and governance. Future media research and technologies offer a series of solutions that might work in parallel with the Internet of things and embedded systems, providing new opportunities for content management 12,13.

Media Internet technologies are at the crossroads of digital multimedia content and Internet technologies, which encompasses media being delivered through Internet networking technologies,

Technologies, such as content and context fusion, immersive multi-sensory environments, location-based content dependent on user location and context, augmented reality applications, open and federated

provide the ground for new e-services within the innovation ecosystems of cities (see Table 2). Table 2. Media Internet technologies

large scale ontologies and semantic content Cloud services and software components City-based clouds Open and federated content platforms Cloud-based fully connected city Smart systems based on Internet of things Smart power management Portable systems Smart systems enabling integrated solutions e g. health

telepresence Demand for e-services in the domains outlined in Fig. 1 is increasing, but not at a disruptive pace.

There is a critical gap between software applications and the provision of e-services in terms of sustainability and financial viability.

Not all applications are turned into e-services. Those that succeed in bridging the gap rely on successful business models that turn technological capabilities into innovations,

secure a continuous flow of data and information, and offer useful services. It is here that the third task for city authorities comes into play,

that of creating business models that sustain the long-term operation of smart cities. To date the environment for applications and their business models has been very complex, with limited solutions available‘off the shelf',a lot of experimentation,

and many failures. Cities currently face a problem of standardisation of the main building blocks of smart/intelligent cities in terms of applications, business models, and services.

Standardisation would dramatically reduce the development and maintenance costs of e-services due to cooperation, exchange Smart Cities and the Future Internet 437 and sharing of resources among localities.

Open source communities may also substantially contribute to the exchange of good practices and open solutions.

The current research on smart cities is guided partly by the above priorities of contemporary urban development and city governance.

and CIP programmes also aims at stimulating a wider uptake of innovative ICT-based services for smart cities,

and experimental facilities for exploring new applications and innovative services. Technology push is still dominant in the actual research agenda.

and business models for their sustainability been developed. Creating the market constitutes the first priority. Innovation ecosystems for smart cities have to be defined, in terms of applications, services, financial engineering and partnerships.

This will help cities to secure funding, identify revenue streams, broker public-private partnerships, and open public data up to developers as well as user communities.

As the major challenge facing European cities is to secure high living standards through the innovation economy

and the knowledge economy overall. 3 Future Internet Experimentation and Living Labs Interfaces In exploring the role of Future Internet experimentation facilities in benefiting urban development as we move towards smart cities,

although some interesting initiatives in that respect have started such as the Smart Santander project (services and applications for Internet of things in the city),

logistics and environment Iot-based services. A comparison of the role of users in FIRE facilities projects compared to Living Labs is presented in Table 3. Importantly,

services, architectures, platforms, system requirements; impacts Validation of user ideas, prototype applications and solutions. Testing as joint validation activity Scale of testing Large-scale mainly From small to large scale Stakeholders FI Researchers (ICT industry & academia) IT multidisciplinary researchers, End-users, enterprises (large

& SMES) Objective Facilities to support research Impact assessment of tested solutions Support the process of user-driven innovation as co-creation In order to explore the opportunities and interfaces,

we will now take a further look at Living Labs. The Web 2. 0 era has pushed cities to consider the Internet,

including mobile networks, as a participative tool for engaging citizens and tourists. Many initiatives have been launched by cities

Such infrastructure also creates many opportunities for innovative services such as green services mobility services, wellbeing services,

and playable city ser Smart Cities and the Future Internet 439 vices based on real-time digital data representing digital traces of human activity and their context in the urban space.

Promising applications and services seem to be emerging from user co-creation processes. Recent paradigms,

such as open innovation and open business models 16, Web 2. 0 17 as well as Living Labs 18, a concept originating from the work of William Mitchell at MIT

Private and People Partnership) ecosystem that provides opportunities to users/citizens to co-create innovative scenarios based on technology platforms such as Future Internet technology environments involving large enterprises

Internet services and sensor network in the city. www. smartsantander. eu ELLIOT (FP7-ICT, 2010.

Public sector services. EPIC (CIP ICT-PSP, 2010. Platforms for intelligent cities. Apollon (CIP ICT-PSP, 2010.

Six Living Labs in Rural areas using a common service platform. www. c-rural. eu Networking for Communications Challenges Communities (N4c.

and Future Internet interaction, elaborating three Iot use cases in three different Living Labs. The first use case is dedicated to co-creation by users of green services in the areas of air

The second one addresses wellbeing services in connection with a hospital and the third focuses on logistic services in product development facilities with professional users.

The green services use case takes place in the context of the ICT Usage Lab and within the Urban Community of Nice-Cote d'azur (NCA.

This use case involves local stakeholders, such as the regional institution for air measurement quality (Atmo PACA), the local research institute providing the Iot-based green service portal

The objectives of the Iot-based green services use case are twofold: to investigate experiential learning of the Iot in an open and environmental data context,

and the Future Internet 441 green services based on environmental data obtained via sensors. Various environmental sensors will be used,

The backbone of the green services use case is based an Iot service portal which addresses three main Iotrelated portal services by allowing the user:

1) to participate in the collection of environmental data; 2) to participate in the co-creation of services based on environmental data;

and 3) to access services based on environmental data, such as accessing and/or visualising environmental data in real time.

Three complementary approaches have already been identified as relevant for the green services use case: participatory/usercentred design methods;

diary studies for Iot experience analysis, and coupling quantitative and qualitative approaches for portal usage analysis. In this context of an open innovation and Living Lab innovation ecosystem,

focus groups involving stakeholders and/or citizen may be run either online or face-to-face. The Periphèria project is among the Smart Cities portfolio of seven projects recently launched in the European commission ICT Policy Support Programme.

Their aim is to develop smart cities infrastructures and services in real-life urban environments in Europe.

and the situation including the relational situations between people and between people and spaces, infrastructures, services, etc. in

which the integration of Future Internet infrastructures and services occurs as part of a discovery-driven process.

The Cloud is considered to be a resource environment that is dynamically configured (run-time) to bring together testbeds

applets, services, and whatever is relevant, available and configured for integration at the moment that the social interaction of People In places calls for those services.

Participation is at the heart of this bottom-up approach to Future Internet technology integration, whereby Future Internet research adopts a competitive offer stance to prove its added value to users.

and (5) the Smart City hall where mobile e-government services are delivered. As an example (see Fig. 2),

This approach draws on and integrates Future Internet technologies (such as augmented reality services for the appreciation of cultural heritage) with networks of video-cameras used to monitor public spaces.

In addition, the integration of these services occurs in the Living Lab context where citizens contribute both to the definition

and prioritisation of the cultural heritage in their city and also to an exploration of the privacy and security issues that are central to the acceptance and success of Future Internet services for the safety of urban environments.

and citizens in defining the services that make up a Smart City as well as the new sustainable lifestyles

other Future Internet paradigms such as cloud services and camera and sensor networks can be considered as already operational.

dynamic co-creation environments that make up a Smart City. These projects examples provide initial examples of collaboration models in smart city innovation ecosystems, governing the sharing and common use of resources such as testing facilities, user groups

such as specific testing facilities, tools, data and user groups, can be made accessible and adaptable to specific demands of any research and innovation projects.

1) physical and immaterial infrastructure, 2) networks and collaboration, 3) entrepreneurial climate and business networks, 4) demand for services and availability of advanced end-users (see Fig. 3). Additionally,

among the main stakeholders from business research, policy and citizen groups and achieve an alignment of local, regional and European policy levels and resources.

and developers. 444 H. Schaffers et al. 5 Conclusions and Outlook In this paper we explored the concept of smart cities as environments of open

and validating Future Internet-enabled services. Smart cities are enabled by advanced ICT infrastructure contributed to by current Future Internet research and experimentation.

the infrastructure for education and innovation, the networks between businesses and governments, the existence of demanding citizens and businesses to push for innovation and the quality of services.

As a concept applied to smart cities it embodies open business models of collaboration between citizens, enterprises and local governments,

Such common resources potentially can be shared in open innovation environments. Two layers of collaboration were distinguished that govern the sharing of these resources.

in order to develop concrete examples of resource sharing opportunities. Initial examples of resource sharing appear in making user communities available for joint use with Future Internet facilities (e g. the TEFIS project),

A key requirement emphasised in this paper is how, within an environment of open innovation in smart cities and governed by cooperation frameworks,

New opportunities require new business models. Forrester for Ventor Strategy Professionals (2010) 15. European commission, DG INFSO:

and its particular components, Internet of things (Iot) and Internet of Services (Ios), can become building blocks to progress towards a unified urban-scale ICT platform transforming a Smart City into an open innovation platform.

and at the service level (Ios as a suit of open and standardized enablers to facilitate the composition of interoperable smart city services).

Smart Cities, Sensor and Actuator Networks, Internet of things, Internet of Services, Ubiquitous Sensor Networks, Open, Federated and Trusted innovation platforms, Future Internet. 1 Introduction At a holistic level,

six dimensions 448 J. M. Hernández-Muñoz et al. of‘smartness'were identified (economy, people, governance, mobility, environment, and living).

As the upsurge of information and communication technologies (ICT) has become the nervous system of all modern economies,

The extensive use of ICT is also empowering the development of essential services for health, security, police and fire departments, governance and delivery of public services.

scalable and suitable for supporting new generations of services that are envisaged not even nowadays. Consequently, the successful development of the Smart Cities paradigm will require a unified ICT infrastructure to allow a sustainable economic growth 2,

and this unified ICT platform must be suitable to model, measure, optimize, control, and monitor complex interdependent systems of dense urban life 3. Therefore in the design of urban-scale ICT platforms,

Urban Communications Abstraction. One of the most urgent demands for sustainable urban ICT developments is to solve the inefficient use (i e. duplications) of existing or new communication infrastructures.

Due to the broad set of heterogeneous urban scenarios, there will be also a pronounced heterogeneity of the underlying communication layers.

So far, through communications abstraction, urban-scale ICT platforms will allow unified communications regardless the different network standards

and will enable data transfer services agnostic to the underlying connection protocol. Furthermore, a major challenge in future urban spaces will be how to manage the increasing number of heterogeneous and geographically dispersed machines

sensors and actuators intensively deployed everywhere in the city. Unified Urban Information Models. Also related to the huge amount of heterogeneous information generated at urban scale,

so that data and information could be shared among different applications and services at global urban levels.

enabling the development of information processing services involving different urban resources and entities of interest.

Open Urban Services Development. Together with unified communications and information a key functionality of urban ICT Platforms should be to guarantee interoperability at both the application and service levels.

Only through open, easyto-use, and flexible interfaces the different agents involved (public administrations, enterprises,

and citizens) will be able to conceive new innovative solutions to interact Smart Cities at the Forefront of the Future Internet 449 with

This will provide the necessary innovation-enabling capabilities for attracting public and private investments to create products and services

a crucial aspect for Smartcities to become future engines of a productive and profitable economy.

it can be approached as a socio-technical system comprising Internet-accessible information and services, coupled to the physical environment and human behavior,

The most relevant basic FI pillars 11 for a Smart City environment are the following:

and interoperable communication protocols where physical and virtual things are integrated seamlessly into the information network 5. The Internet of Services (Ios):

flexible, open and standardized enablers that facilitate the harmonization of various applications into interoperable services as well as the use of semantics for the understanding,

interact and exchange information about themselves and their social context and environment. At this point, it is important to highlight a bidirectional relationship between the FI and Smart Cities:

on the other direction, Smart Cities can provide an excellent experimental environment for the development,

required capacity, scalability, interoperability, and stimulation of faster development of new and innovative applications is required.

The availability of such infrastructures is expected to stimulate the development of new services and applications by various types of users,

and communications technologies to make the critical infrastructure components and services of a city administration, education, healthcare, public safety, real estate, transportation and utilities more aware, interactive and efficient.

Remote working and e-commerce services for businesses, entertainment and communications for individuals. Advanced location based services, social networking and collaborative crowdsourcing collecting citizens'generated data.

By analyzing these different Smart Cities application scenarios, together with the need of a broadband communication infrastructure that is becoming,

or starting to be considered, the 4th utility (after electricity, gas and water), two major ICT building blocks of a Smart City can be identified among the main pillars that the FI provides:

and services to meet the needs of cities and their inhabitants. In this context Ios evolution must be correlated undoubtedly with Iot advances.

Otherwise, a number of future Smart City services will never have an opportunity to be conceived due to the lack of the required links to the real world.

they can provide the necessary support for new innovative applications and services (the city as an Open Innovation Platform).

In that sense, the FI PPP promoted by the EC 10 11 seeks for the cooperation among the main European stakeholders

and open business models to improve market dynamics by involving third parties in the value chain (SMES).

Some of the essential functionalities identified as required for NG Iot platforms comprise the support for horizontality, verticality, heterogeneity, mobility, scalability,

Cross-domain NG Iot platforms may foster the creation of new services taking advantage of the increasing levels of efficiency attained by the reuse of deployed infrastructures.

There can be a long list of potential benefits for Smart Cities'services relaying on the same basic sensed information and a suite of application enablers (i e. from sensor data processing applications,

to enablers for accessing multimedia mobile communications or social networks, etc.).Thus the integration of innovative principles and philosophy of Ios will engage collective end-user intelligence from Web 2. 0

In that way, an increasing number of Smart Cities'services could be searched, 452 J. M. Hernández-Muñoz et al. discovered

the Smart Cities can represent an extraordinary rich ecosystem to promote the generation of massive deployments of city-scale applications and services for a large number of activity sectors.

Furthermore this will enable future urban models of convergent IT/Telecom/Content services, Machine to machine-Machine (M2m) services,

as most aspects are related closely (e g. environment and traffic, both of them to health, etc.).

and geographically disperse sensor networks into a common technological ground where services can be developed in a cost efficient manner.

and devices connected in Smart City environments. Through a set of basic functionalities it will support different types of Smart City services in multiple application areas:

Sensor Discovery: this functionality will provide services and applications information about all the registered sensors in the city.

In that way, a particular service interested in finding information (such as available parking places in a given area) will have access to efficient look up mechanisms based on the information they provide.

many Smart City services will rely on continuously generated sensor data (for example for energy monitoring, video surveillance or traffic control.

in other cases, services rely on some specific events happening in the city (such as traffic jams or extreme pollution situations.

The platform will allow services to subscribe not just to the observations provided by the sensors,

so city services could either change sensor configuration parameters (i e. the sensibility of a critical sensor) or to call actuator commands (as,

The information should be provided to the Smart City services using a unified information model, regardless of the particular information model used by the sensor technologies deployed through the city infrastructure.

Services should be agnostic to the communication protocol used. The platform should provide access to the information regardless the particular underlying communication protocol used. 454 J. M. Hernández-Muñoz et al.

so services and networks are decoupled in order to evolve independently 22. This capability will allow a seamless link between Iot and Ios,

so that USN platforms could provide support for third-party's agents interested in the deployment of different Smart City services,

thus allowing federation with different service creation environments and different business processes. 3. 2 USN Architecture for Urban Iot Platforms

USN-Management USN-Enabler Sensor Networks IMS User Equipment USN-Gateway SIP Services Web Services Configuration AAA Devicemanagement Application/Service

the USNENABLER (that interfaces services) and the USN-Gateways (that interacts with Sensor networks). This approach is inspired by the Open Geospatial Consortium (OGC) Sensor Web Enablement (SWE) activity 26.

where services will be capable to access any type of sensors through the web. This has been reflected by a set of standards used in the platform (Sensorml, Observation & Measurements, Sensor Observation Service, Sensor Planning Service, Sensor Alert Service and Web Notification Service 26.

Besides the SWE influence, the USN-Enabler relays on existing specifications from the OMA Service Environment (OSE) 27 enablers (such as presence, call conferencing, transcoding, billing, etc..

As a connection point between two networks (sensors networks deployed throughout the city and the core IP communication network),

Functionalities required to support services are offered both in synchronous and asynchronous mode by the USN-Enabler through the following entities:

The Sensor Tasking Entity (STE) allows services to perform requests operations to the sensor network,

The Service Protocol Adapter (SPA) provides protocol adaptation between the Web Services and SIP requests and responses.

The Catalogue and Location Entity (CLE) provides mechanisms in a distributed environment to discover which of the different instances of the entities is the one performing the request a user might be interested In for example

complexity and environmental conditions to create a realistic simulation environment. The consequence is clear: simulation results can only give very limited information about the feasibility of an algorithm or a protocol in the field.

compromising the viability of new services and applications. Most of these problems are related to scalability aspects and performance degradation.

The level of maturity achieved at the networking level, despite the fact that they can be improved further, foresees an increasing necessity of additional research activity at the sensor and context information management level 17.

so new services and information management activities can be performed over heterogeneous networking technologies. This increasing demand to move from network experimentation towards service provisioning requirements does not just apply to the Smart Cities field,

but also in a more generic way it is common to most FI experimentation areas. 4. 1 Smart Cities as Open Innovation Platforms To perform reliable large scale experimentation,

The resulting scale and heterogeneity of the environment makes it an ideal environment for enabling the above mentioned broad range of experi Smart Cities at the Forefront of the Future Internet 457 mentation needs.

Cities can act as invaluable source of challenging functional and nonfunctional requirements from a variety of problem and application domains (such as vertical solutions for the environment control and safety

This new smart city model can serve as an excellent incubator for the development of a diverse set of highly innovative services and applications 18.

There are very few initiatives addressing the creation of such smart city environments. Some examples are Oulu in Finland 28, Cambridge, Massachusetts 29,

create new business opportunities and sustainably increase ICT research and innovation capability with specific objective to make urban cities/areas"smarter".

and combine information (energy, traffic, weather, events, activities, needs and opinions) continuously as well as"on-demand".

"This will enable city environments to become"smarter, "as more adaptive and supportive environment, for people as well as organizations.

Interconnecting Infrastructure WISEBED SENSEI New Colour scheme: Telco2. 0 (TID) Common Testbed/Gateway Testbed management Testbed Access Interface Testbed Portal Overlay Enabler Security, Privacy and Trust Smart Santander

and aims at creating a unique-in-the-world European experimental test facility for the research and experimentation of architectures, key enabling technologies, services and applications for the Iot.

The facility will allow large-scale experimentation and testing in a real-world environment. The infrastructure will be deployed mainly in Santander in the North of Spain, with nodes in Guildford, UK;

Furthermore, it will be used also to provide real services to citizens. Smartsantander experimental facility is envisaged not as a closed

Thus, the platform will be attractive for all involved stakeholders: industries, communities of users, other entities that are willing to use the experimental facility for deploying

and assessing new services and applications, and Internet researchers to validate their cutting-edge technologies (protocols, algorithms, radio interfaces, etc.).

as well as traffic management services: creation of corridors for emergency vehicles, ecoways enablement proposing alternative routes for vehicles based on pollution monitoring in different city zones.

Alert services that, orchestrating several services such as such ehealth, environmental monitoring, traffic control and communication services, will inform and/or alert citizens of different critical situations (i e. urgent medical attention, city services recommendations, etc.)

Tourism information in different parts of the city through mobile devices using visual and interactive experiences and in different languages.

and is expected to accommodate additional requirements coming up from the different smart city services (use cases).

Finally, it must be noticed that financial aspects are of the utmost importance considering the investment required to deploy city scale testbeds.

to introduce requirements allowing the support of real life services simultaneously. This will be very useful to open new business opportunities and,

at least and not less important, provide the means to guarantee its day by day maintenance. 5 Conclusions Future Internet potential,

and services is huge in the smart city context. First time success of large Iot deployments is jeopardized seriously by the lack of testbeds of the required scale,

and testing limited to small domain-specific environments or application specific deployments. While those may suffice as proof-of-concepts,

At present, some practical implementations of advanced USN platforms 22 have been demonstrated successfully in real deployments for smart metering services, smart places scenarios,

The described implementation has shown a big potential to create a fan of new services, providing the key components required to intertwining Iot and Ios worlds.

Currently, the deployment of the first 2, 000 sensors in the urban environment is been carried.

The cardinality of the different stakeholders involved in the smart city business is so big that many nontechnical constraints must be considered (users, public administrations

Besides, and although market claims its readiness for supporting a vast range of sensing capabilities as well as the corresponding end-user services,

smart & proactive energy management, Open Innovation by FI-enabled services, Brussels, 15 january (2010) Smart Cities at the Forefront of the Future Internet 461 4. Position Paper:

New Opportunities Require New Business models, 2 november 2010. Forrester research (2010) 10. EC FI-PPP: http://ec. europa. eu/information society/activities/foi/lead/fippp/index en. htm 11.

http://services. future-internet. eu/images/d/d4/Report GSDPPANEL-FISO-FIA-Madrid-draft%2breqs. pdf 20.

OMA Service Environment Archive, http://www. openmobilealliance. org/technical/release program/ose archive. aspx 28. Oulu Smart City, http://www. ubiprogram. fi/29.


< Back - Next >


Overtext Web Module V3.0 Alpha
Copyright Semantic-Knowledge, 1994-2011