Seven out of 10 of them have a website -The percentage of companies with 10 or more employees using mobile broadband
98.3%of Spanish companies with 10 or more employees had an Internet connection in the first quarter 2014.
Moreover, the use of computers has expanded to almost the entirety of these companies (99.2%).%)In turn, 87.3%had a Local area network (LAN) installed, and
61.9%had a Wireless Local area network 95.3%of companies were set up with mobile phones On the other hand, 75.8%of companies with Internet access had a website.
In those with 250 or more employees, this percentage reached 95.7 %Percentage over the total number of companies with 10 or more employees
Number of employees TOTAL 10 to 49 50 to 249 250 or more %of companies with
-Computers 99.2 99.1 99.5 99.8 -Local area network 87.3 85.9 95.0 97.7 -Wireless Local area network 61.9 59.5 74.2 81.1
-Internet connection 98.3 98.2 99.1 99.8 -Mobile telephony 95.3 94.8 97.8 99.4 -Other technologies (for example, GPS, TPV, etc.
38.0 37.5 39.5 47.0 %of companies with an Internet connection and website (1) 75.8 73.4 87.5 95.7
%of companies that provide their employees with portable devices that allow a mobile connection to the Internet for
business purposes (1 54.6 50.1 77.2 90.3 1) Percentage over the total number of companies with an Internet connection
Use of ICT infrastructures by company size First Quarter 2014 2 54.6%of companies issued their employees with portable devices, enabling connection to
the internet for company use. 36.4%of these were laptop computers, and 49%were smartphones or PDA phones
Employment and ICT training 25.1%of companies hired ICT experts and 11.1%hired new experts in 2013
In turn, 22.9%of companies invested in ICT training in 2013. For companies with 250 or
more employees, this figure reached 59.8%,that is, six points over that of the last year
On the one hand, an increase of nearly four points in the use of mobile broadband and in the
possession of a website can be observed. On the other hand, the growth was slighter regarding ICT use for interacting with Public Administrations (from 90.4%to 91.1
Internet connection and Website (1 Mobile telephone broadband connection 1 Use of the Internet to interact with the Public
Administration (1 Fixed broadband connection (1 1) Â Percentageâ overâ theâ totalâ Â numberâ ofâ companiesâ withâ anâ Internetâ connection
2013 2014 3 Types of Internet connection 99.9%of companies with 10 or more employees with an Internet connection accessed it via
a broadband solution (fixed or mobile. The technologies used the most were access via DSL
solutions (90.4%)and 3g or 4g mobile phones (74.2 %Companies with an Internet connection by type of that connection
Percentage out of the total number of companies having 10 or more employees and an Internet connection
First Quarter 2014 Number of empoyees TOTAL 10 to 49 50 to 249 250 or more
Broadband (fixed or mobile) 99.9 99.8 100.0 100.0 Fixed broadband connection 98.1 97.9 99.1 99.7
-By means of 3g or 4g modem 55.0 51.1 73.7 88.6 -By means of Mobile 3g or 4g 74.2 71.7 86.4 92.4
Other mobile connections (GPRS, EDGE, etc. 23.7 21.0 35.8 50.6 Website availability and use The main services offered by companies with 10
or more employees via their website were company introduction (90.5%),privacy policy statement or certification related to website
security (65.2%)and access to catalogues and price lists (52.8 %Services available on the website Percentage over the total number of companies with 10 or more employees and an Internet connection
First Quarter 2014 Company introduction 90.5 Privacy policy statement or certification related to website security 65.2
Access to product catalogues or price lists 52.8 Links or references to the social media profiles of the company 34.7
Possibility of electronic submission of complaint forms 26.4 Posting vacancies or receiving online job applications 21.1
Ordering or booking online 16.9 Online order tracking 11.1 Website customisation for regular users 8. 4
Possibility of customers customising or designing products 7. 38 4 Seven out of 10 companies used digital signatures in some communication with external
agents. Of these, 98.4%used them to deal with the Public Administrations, and 17.2%to do
so with suppliers and clients In the year 2013,91. 1%of companies interacted with the Public Administrations via the
Internet. The main objectives were obtaining information from the websites of the Public Administrations (80%),downloading of forms (78.2),
%and filling tax forms by means of a full electronic management (76.6 %Use of social media by companies with 10 or more employees
36.9%of companies used any social media due to work issues Among them, 92.4%used social networks (Facebook, Linkedin, Tuenti, Google+,Viadeo
Yammer,..,),40.9%used company blogs or microblogs (Twitter, Presently, Blogger Typepad etc. and 39.6%did so with websites that share multimedia content (Youtube
Flickr, Picassa, Slideshare, Instagram The social media least used were based Wiki tools for sharing knowledge (website whose
pages may be edited by multiple volunteers via a web browser), representing 12.9 %The main uses of social media were aimed towards marketing, advertising and image
management (72.1%)and as a user information channel (56.8 %Out of the total number of companies, 87.3%stated that social media was useful, to a higher
or lesser extent, for the development of their business Use of Cloud computing solutions by companies with 10 or more employees
At the beginning of 2014,15%of companies used Cloud computing solutions. Those used the most were information storage (69),
%e-mail service (61.4%)and company database server (54.7 %53.4%of the companies that used Cloud computing did so by paying any service existing in
servers of shared services suppliers The main reasons that limited the companies using this service were the uncertainty about
laws (32.3%),the risk of corporate security holes (31%)and the high price of Could Computing services (27.8
%The companies that did not use this service stated that they did not do so since their
knowledge of this type of technology was advanced not very (46.5) %and/or it was not
necessary for developing their business (45.9 %5 ICT use by Autonomous Community Companies with 10 or more employees whose headquarters are located in Cataluã a
Comunidad de Madrid and Principado de Asturias presented the greatest intensities in their use of ICT in the first quarter 2014
*Conversely, those companies in the Autonomous Cities of Ceuta and Melilla and those companies in the Autonomous Communities of Extremadura and Castilla-La Mancha had the
lowest percentages of use of information technologies *The intensities in the use of Information and Communication Technologies refer to the following indicators
Internet connection, Interaction with the Public Administrations, Mobile broadband, Website, Use of Social media and Cloud computing First quarter 2014
Internet Connection Interaction with the Public Administration (1 Mobile Broadband Connection (1 Internet connection and
Website (1 Use of Social Media (1 Cloud Computing (1 TOTAL 98.3 91.1 78.3 75.8 36.9 15.0
Andalucã a 97.6 94.4 74.9 70.9 40.5 11.2 Aragã n 98.8 91.7 80.8 77.8 32.3 12.1
Asturias, Principado de 98.6 92.4 83.1 80.3 37.2 11.5 Balears, Illes 99.4 89.1 76.5 71.4 35.5 12.1
Canarias 98.9 94.5 72.0 63.4 40.5 15.1 Cantabria 97.8 95.3 79.0 77.1 35.9 7. 2
Castilla y Leã n 98.2 94.2 73.8 72.2 32.2 7. 9 Castilla-La Mancha 96.7 89.3 76.8 68.3 32.3 9. 3
1) Percentage over the total number of companies with an Internet connection Use of ICT by Autonomous Community and Autonomous City in which the company is
Use of Internet, Website and Mobile broadband by Autonomous Community and Autonomous City in which the company is
Mobile broadband Internet and website 7 E-commerce Sales via e-commerce by companies with 10 or more employees
12.2%of companies carried out sales via electronic commerce on a website. The total value of these transactions was 59,315 million euros, 30.3%of the total electronic commerce
68.2%of the sales by e-commerce were to companies (Business to business, B2b. The percentage of sales to final consumers (Business to consumer, B2c) was 29.9%.
%Lastly sales to the Public Administrations (Business to Government, B2g) represented 2. 0 %Purchases via e-commerce by companies with 10 or more employees
26.9%of companies carried out purchases via electronic commerce on a website. The total value of these transactions was 87,517. 9 million euros, 44.8%of the total electronic
72.3%of companies with fewer than 10 employees had computers, and 24.4%had a Local
Area Network (LAN) installed, according to the data from the first quarter 2014 67.7%of micro-companies had Internet access,
28.7%of companies with Internet access had a website. One year prior, this percentage was 29.3
-Computers 71.6 72.3 -Local area network 24.0 24.4 -Wireless Local area network 16.4 17.6 -Internet connection 65.7 67.7 -Broadband (fixed or mobile) Internet connection (1) 98.5 99.0
Mobile telephone 74.6 76.5 Other ICT infrastructures (i e. GPS, TPV, etc. 21.4 21.7 %companies having Internet connection and website/webpage (1) 29.3 28.7
1) Percentage over the total number of companies with less than 10 employees and an Internet connection
Evolution of ICT use in companies with fewer than 10 employees ICT use also had an uneven behaviour in companies with fewer than 10 employees between
the first quarter 2013 and the same period of 2014 Mobile broadband access experienced the most significant increase, from 56.8%to 66.4
%29.3 %56.8%61.4 %94.2 %28.7 %66.4%66.2 %92.8 %0 25 50 75 100 Internet connection and website (1
Mobile broadband connection (1 Interaction with the Public Administration by the Internet (1 Fixed broadband
connection (1 1) Percentage over the total number of companies with an Internet connection 2013 2014
11 Methodological annex The survey on the Use of Information and Communication Technologies (ICT) and Electronic
Commerce in Companies is integrated in the statistics plans of the European union designed to quantify the Information Society.
It is governed by European parliament and Council Regulation No. 808/2004, for carrying out statistics regarding the Information Society.
Communication Technologies based on Open sources (CENATIC Moreover, there is another partnership agreement with the Ministry of Industry, Tourism and
Telephone numbers: 91 583 93 63/94 08 â Fax: 91 583 90 87-gprensa@ine. es
Information Area: Telephone number: 91 583 91 00 â Fax: 91 583 91 58 â www. ine. es/infoine/?
/L=1
Quantitative Methods Inquires 105 SURVEY REGARDING RESISTANCE TO CHANGE IN ROMANIAN INNOVATIVE SMES FROM IT SECTOR1
Eduard Gabriel CEPTUREANU Phd, Assistant professor Bucharest University of Economic Studies, Romania E-mail: eduard ceptureanu@yahoo. com
Abstract Unfortunately, few changes predominantly generate positive effects involving major effort and costs are often not far short of expectations.
innovative Romanian SMES, we use a survey database that was collected by Romanian National Trade Registration Office-main legal entity with function of keeping the register of
large companies and was implemented by means of computer-assisted telephone interviewing. Data collection was done over a 2 month period during September-October
2014. To reliably identify trends only respondents with long tenure and representing enterprises that systematically innovate
innovation data, see OECD, 2005. Secondly, respondents had to be involved at least in one implementation of change management process during the last 5 years.
companies NACE code principal-6201 (Activities to develop custom software (software -oriented client), 20.9%CAEN 6202 (consultancy activities information technology), 1. 2
%-0â 9â employees 27 %10â 249â employees 50 %50â 249â employees 19 %overâ 250â employees
%-NACE code 6209 (Other information technology service activities), 10,9%-NACE 6311 data processing, hosting and related activities), 1, 2%-NACE 6312 (activities of web portals
and 6391 and 1%mainly operate on CAEN code 6399 and 6391 (Other information service activities
WP2 analysed available data to better understand the growth, impact and potential for social innovation in Europe.
require much more broad-scale data WP3: Removing barriers to social innovation The development and growth of social innovation
Data and monitoring Most of the future research questions we identified would benefit greatly from advanced databases
containing information on social innovation social needs, the social economy and its innovative potential, other environments of social innovation
into existing data sources on national technological innovation systems Social movements, power and politics Much of the existing literature on social innovation
enabled new forms of collaboration between users and firms. The concept and practice of â open
or social media platforms such as Facebook and Twitter) and social innovations. According to Hochgerner, what distinguishes innovations from
social innovations are intended the aims and objectives, and not necessarily the outcomes which may overlap. 22 Murdock
core of social innovations is this intention to create something better. But while these motivations might
is no data to be found on employment in the social economy. Thus, we are still lacking more
comprehensive and comparable data on the sector The Third Sector Impact project that started early in
2014 will help to make this data available. 48 Nonetheless, the extent to which social economy
to producing reliable data Concerning metrics for social innovation, we found that there are significant overlaps between
field and tap into existing data sources on national technological innovation systems Examples for such established metrics that
survey-based data related to social innovation are necessary. Considering the importance of entrepreneurial activities as push-factors for
social innovation, we need empirical survey data on organisations that are socially innovative in order to better understand how social innovation
existing knowledge and data sources on national technological innovation systems and make attempts to identify patterns in these systems
Information systems Management 31 (3), S 200â 224 Knowing what works at the micro level As social innovation is an area of increasing interest
more homogeneous data about social innovation and opportunities for social innovations in future DEFINING MEASURING
, crowdsourcing), problem solving (e g.,, co -design), and taking and influencing decisions (e g participatory budgeting. Our research further
the participation, co-operation and â buy inâ of users Legitimacy of projects And fourth, citizen engagement can have the
the adoption of the core â contentâ of the innovation. After this initial period, their role is
their role is to allow the core innovation to fit into a new context. But sometimes adaptations
 New flows of information (open data  Developing the knowledge base INTERMEDIARIES  Social innovation networks
 Platforms for open data/exchange of ideas Providing programmes/interventions  Networking opportunities/events
their role is to allow the core innovation to fit into a new context. But sometimes adaptations
 New flows of information (open data  Developing the knowledge base INTERMEDIARIES  Social innovation networks
 Platforms for open data/exchange of ideas Providing programmes/interventions  Networking opportunities/events
like the internet, the world-wide-web, social media and mobile devices, new ways of carrying out social innovation have become possible.
Often this means the barriers to social innovation (e g. connectivity outreach and scaling) have been reduced and
their relationships with offline communities It also enables new network effects at a scale not possible without digital technology which
For example, standard ICT, including web portals, mobile apps and social media, which are widely and inexpensively available, is being used
in the TEM initiative in Greece55 to support a local currency for the exchange of goods and services
public sector who use data to better target pockets of social need and tailor interventions or services
initiative in the UK57 uses the internet and mobile apps for identifying someoneâ s needs (e g.,
which are data-and analytics-heavy, and where high speed and global reach are important through reductions in
-and offline knowledge communities, and are able to nurture social capital both virtually and physically
Data and monitoring It is clear that we require more and better data on social innovation, social needs, the social economy
and its innovative potential, other environments of social innovation, relevant actors and networks technological innovations, etc.
greatly from advanced databases containing information on these and other variables. For instance, we could learn more about the complex
more advanced and nuanced databases would yield Currently, different approaches to create such databases are on their way:
The research centre CRISES81 in Canada builds a relational database on social innovations; the SI-Drive project82 will
produce a database of around 1000 global social innovations; and the ICSEM project83 based in
Belgium is in the process of building a database on different types of social enterprises all over the world.
develop a standard structure that allows such data to be combined and compared Civil society and the social economy as
data for sound analyses. We need to dig deeper into the numerous variables determining in how far
requires much more empirical data, in particular data separately considering socially innovative organisations 38 SOCIAL INNOVATION THEORY AND RESEARCH
Effective collaborations It is evident that the nature of social innovations requires various actors to collaborate to make them
upon, and tap into existing data sources on national technological innovation systems Social movements, power and politics
â¢Social Innovation Exchange â the global network of social innovators www. socialinnovationexchange. org â¢Siresearch. eu â a platform which brings together
users and communities â but equally, some innovation developed by these sectors does not qualify as social innovation
http://ec. europa. eu/bepa/pdf/publications pdf/social innovation. pdf 19. Murray R, Caulier-Grice J, Mulgan G. 2010.
The Open Book of Social Innovation, London: NESTA 20. Committee for Scientific and Technological Policy
/fileadmin/Downloads/Trendstudien/IMO%20 Trendstudie howaldt englisch final%20ds. pdf 23. Nicholls A, Murdock A. 2012. Social Innovation
Blurring Boundaries to Reconfigure Markets, Palgrave Macmillan 24. Ibid 25. Moulaert F.,et al (ed).(2013.
Avelino etal transit workingpaper 2014. pdf 30. Westley F. 2008. The Social Innovation Dynamic Social Innovation Generation, University of Waterloo
http://ec. europa. eu/bepa/pdf /publications pdf/social innovation. pdf 39. Howaldt J, Schwarz M. 2010.
Social Innovation Concepts, Research Fields and International Trends. Available at www. internationalmonitoring. com /fileadmin/Downloads/Trendstudien
/IMO%20trendstudie howaldt englisch final%20 ds. pdf 40. Lindhult, Eric (2008: Are Partnerships Innovative In: Lennart, Svensson/Barbro, Nilsson (eds
Partnership â As a Strategy for Social Innovation and Sustainable Change. Stockholm: Satã runs Academic
/fileadmin/Downloads/Trendstudien/IMO%20 Trendstudie howaldt englisch final%20ds. pdfa 42. Nicholls & A Murdock, Social Innovation:
63. www. emes. net/site/wp-content/uploads/EMES -WP-12-03 defourny-Nyssens. pdf 64.
Defourny J, Nyssens M. 2012. Conceptions of Social Enterprise in Europe: A Comparative Perspective with
-matters-how-it-can-be accelerated-March-2007. pdf 97. BEPA. 2010). ) Empowering people, driving change
http://ec. europa. eu/bepa/pdf /publications pdf/social innovation. pdf Executive summary Introduction Defining social innovation
Measuring social innovation Developing the field and overcoming barriers Financing social innovation An area of debate
fax:++385 1 2335 165 E-mail addresses: sradas@eizg. hr (S. Radas ljbozic@eizg. hr (L. Bozë icâ
Our data come from the Community Inno -vation Study performed in 2004 and covers period from
The data presented in this study were collected as part of Community Innovation Survey conducted on Croatian companies from manufacturing
The data were collected by mail survey followed up by two telephone prompts. This particular survey was the ï rst CIS
performed in Croatia and it refers to innovation activities over the period from the beginning of 2001 to the end of
the data, 448 ï rms were used in this analysis In this study, we deï ne a list of possible factors that have
drivers of innovation, our data interestingly show no evidence that having received municipality or government
for a cross-sectional data model obtained from large-scale surveys of this type Out of the external factors, collaboration with other
Regarding internal factors, data show that the propor -tion of highly educated staff has a positive effect on radical
Data show that there is no difference in process innovation between ï rms that report obstacles and those
More detailed investigation of data shows that sources of ï nancing are indeed lacking: most Croatian SMES ï nanced
) Regardless of problems with ï nancing, data reveal that 85.5%of the ï rms that reported obstacles managed to
-neurs and/or their social networks One thing to consider when devising innovation incen -tives is that SMES traditionally face high transaction costs
multi-site case study of family owned business. Journal of Business and Entrepreneurship 1 (2), 41â 58
Unable to extract PDF content at org. apache. tika. parser. pdf. PDF2XHTML. process (PDF2XHTML. java:
146 at org. apache. tika. parser. pdf. PDFPARSER. parse (PDFPARSER. java: 159 at org. apache. tika. parser.
Compositeparser. parse (Compositeparser. java: 244 at org. apache. tika. parser. Compositeparser. parse (Compositeparser. java: 244
at org. apache. tika. parser. Autodetectparser. parse (Autodetectparser. java: 121 at org. apache. tika. cli.
Tikacli$outputtype. process (Tikacli. java: 143 at org. apache. tika. cli. Tikacli. process (Tikacli. java: 422
at org. apache. tika. cli. Tikacli. main (Tikacli. java: 113 Caused by: java. io. IOEXCEPTION:
javax. crypto. Illegalblocksizeexception: Input length must be multiple of 16 when decrypting with padded cipher
at javax. crypto. Cipherinputstream. getmoredata (Cipherinputstream. java: 115 at javax. crypto. Cipherinputstream. read (Cipherinputstream. java:
233 at javax. crypto. Cipherinputstream. read (Cipherinputstream. java: 209 at org. apache. pdfbox. pdmodel. encryption.
Securityhandler. encryptdata (Securityhandler. java: 312 at org. apache. pdfbox. pdmodel. encryption. Securityhandler. decryptstream (Securityhandler. java:
413 at org. apache. pdfbox. pdmodel. encryption. Securityhandler. decrypt (Securityhandler. java: 386 at org. apache. pdfbox. pdmodel. encryption.
Securityhandler. decryptobject (Securityhandler. java: 361 at org. apache. pdfbox. pdmodel. encryption. Securityhandler. proceeddecryption (Securityhandler. java:
192 at org. apache. pdfbox. pdmodel. encryption. Standardsecurityhandler. decryptdocument (Standardsecurityhandler. java: 158 at org. apache. pdfbox. pdmodel.
PDDOCUMENT. openprotection (PDDOCUMENT. java: 1597 at org. apache. pdfbox. pdmodel. PDDOCUMENT. decrypt (PDDOCUMENT. java: 943
at org. apache. pdfbox. util. PDFTEXTSTRIPPER. writetext (PDFTEXTSTRIPPER. java: 337 at org. apache. tika. parser. pdf. PDF2XHTML. process (PDF2XHTML. java:
130 7 more Caused by: javax. crypto. Illegalblocksizeexception: Input length must be multiple of 16
when decrypting with padded cipher at com. sun. crypto. provider. Ciphercore. dofinal (Ciphercore. java: 750
at com. sun. crypto. provider. Ciphercore. dofinal (Ciphercore. java: 676 at com. sun. crypto. provider.
AESCIPHER. enginedofinal (AESCIPHER. java: 313 at javax. crypto. Cipher. dofinal (Cipher. java: 1970 at javax. crypto.
Cipherinputstream. getmoredata (Cipherinputstream. java: 112 19 more
1 THE CULTURE OF INNOVATION AND THE BUILDING OF KNOWLEDGE SOCIETIES -Issue Paper -UNESCO, Bureau of Strategic Planning
September 2003 2 I. The past and present scope of innovation During the last two decades, the term innovation has emerged as one of the key concepts of
academic, societal and political life. Many different actors, ranging from major regional organizations, various national governments, multinational corporations, and universities
worldwide, have underscored its importance. Major documents, such as the European Unionâ s Green Book on Innovation, published in 1995 and national strategies,
such as those formulated and implemented in countries like Singapore, Canada, and Australia, have put the innovation issue
relatively high on political agendas. At the same time, we are witnessing a proliferation of committees, institutes and think tanks, both privately and publicly funded, dedicated to the
promotion of the concept of innovation. More recently, the European commission has published a comprehensive study of innovation policies in the six candidate countries and is now in the process
of putting in place a Europe-wide common research framework All of the above described initiatives rest on three basic assumptions
Innovation is a national affair The major driving forces in the formulation of innovation strategies are national governments
knowledge and practices among the core competencies that are crucial in creating A Culture of
increasing importance of Information and Communication Technologies,(ICTS), the digital divide has grown at a rapid pace.
such as the digital divide which increases the development gap, free circulation and equal access to data, information and to good practices and
the knowledge of information societies, and the development of norms and principles based on an international consensus. In a similar vein, UNESCO is encouraging community-based approaches
Lecture Notes in Computer science 6656 Commenced Publication in 1973 Founding and Former Series Editors Gerhard Goos, Juris Hartmanis,
Microsoft Research, Cambridge, MA, USA Demetri Terzopoulos University of California, Los angeles, CA, USA Doug Tygar
Max Planck Institute for Informatics, Saarbruecken, Germany John Domingue Alex Galis Anastasius Gavras Theodore Zahariadis
The Future Internet Future Internet Assembly 2011 Achievements and Technological Promises 13 Volume Editors John Domingue
Alex Galis Anastasius Gavras Theodore Zahariadis Dave Lambert Frances Cleary Petros Daras Srdjan Krco Henning MÃ ller
SL 5 â Computer Communication Networks and Telecommuni -cations  The Editor (s)( if applicable) and the Author (s) 2011.
and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of
Business Information systems, University of Applied sciences Western Switzerland Sierre, Switzerland henning. mueller@hevs. ch VI List of Editors
The Internet will be a catalyst for much of our innovation and prosperity in the future It has enormous potential to underpin the smart, sustainable and inclusive growth
A competitive Europe will require Internet connectivity and services beyond the capabilities offered by current technologies.
Future Internet research is therefore a must Since the signing of the Bled declaration in 2008,
developing new technologies that can be used for the Internet of the Future. At the moment around 128 ongoing projects are being conducted in the field of networks
trustworthy ICT, Future Internet research and experimentation, services and cloud computing, networked media and Internet of things.
In total they represent an invest -ment in research of almost 870 million euro, of which the European commission funds
twice a year during the Future Internet Assembly, where they discuss research issues covering several of the domains mentioned above,
Apart from the Future Internet Assembly, the European commission has also launched a Public Private Partnership program on the Future Internet.
This 300 -million-euro program is focused on short-to middle-term research and runs from 2011 to 2014.
The core of this program will be a platform that implements and inte -grates new generic but fundamental capabilities of the Future Internet, such as interac
-tions with the real world through sensor/actuator networks, network virtualization and cloud computing, enhanced privacy and security features and advanced multimedia
capabilities. This core platform will be based on integration of already existing re -search results developed over the past few years,
and will be tested on large-scale use cases. The use cases that are part of the Public Private Partnership all have the poten
-tial to optimize large-scale business processes, using the properties of the core Future Internet platform.
Examples of these use cases are a smarter electricity grid, a more efficient international logistics chain, a more intelligent food value chain, smart mo
-bility, safer and smarter cities and a smarter content creation system for professional and nonprofessional users
Future Internet research is an important cornerstone for a competitive Europe. We believe that all these efforts will help European organizations to be in the driving seat
of many developments of the Future Internet. This book, already the third in this series, presents some of the results of this endeavor.
The uniqueness of this book lies in the breadth of the topics, all of them of crucial importance for the Future Internet
VIII Foreword We sincerely hope that reading it will provide you with a broader view on the Future
Internet efforts and achievements in Europe Budapest, May 2011 Luis Rodrã guez-Rosellã Mário Campolargo
1 The Internet Today Whether we use economic or societal metrics, the Internet is one of the most impor
-tant technical infrastructures in existence today. One easy measure of the Internetâ s impact and importance is the number of Internet users
which as of June 2010 was 2 billion1. But of course, this does not give one the full picture.
viewpoint, in 2010 the revenue of Internet companies in the US alone was over $70
In Europe, IDC estimated that in 2009 the broader Internet revenues (taking business usage into account) amounted to â 159 billion
At the start of the demonstrations in Egypt the Internet was closed down by the ruling government to hinder the activities of opposition groups
in Egypt used social media to support communication and the associated Facebook page had over 80,000 followers at its peak.
talking about the power of the Internet in a country where currently Internet penetra -tion is compared 21%5 to say 79%for Germany6
The Internet has recently been in the news with stories covering two main issues which are known commonly in the Internet research community.
Firstly, recent stories have highlighted the issue of the lack of address space associated with IPV4, which
can cater for 4 billion IP addresses7. Some headlines claim that the IPV4 address space has already run out8.
Technically, the issue has been solved through IPV6 al -though there is still the matter of encouraging take up 1 http://www. internetworldstats. com/stats. htm
2 http://money. cnn. com/magazines/fortune/fortune500/2010/industries/225/index. html 3 http://www. fi3p. eu
4 http://www. mediaite. com/tv/picture-of-the-day-cairo-protester-holds-sign-that-says
-thank-you-facebook /5 http://www. internetworldstats. com/africa. htm#eg 6 http://www. internetworldstats. com/europa. htm#de
7 http://www. bbc. co. uk/news/10105978 8 http://www. ndtv. com/article/technology/internet-will-run out-of-ip-addresses-by-friday
-83244 X Preface A second major news item has been on net neutrality, specifically, on legislation on net neutrality in the US and UK,
on the fact that the Internet was designed originally in a very different context and for
â¢Volume and nature of data â the sheer volume of Internet traffic and the change
For example, Ciscoâ s latest forecast predicts that global data traffic on the Internet will exceed 767 Exabytes by 2014.
Online video and high -definition TV services are expected to dominate this growth. Cisco state that the
average monthly traffic in 2014 will be equivalent to 32 million people continu -ously streaming the 2009 Avatar film in 3d12
â¢Mobile devices â the Internet can now be accessed from a wide variety of mobile devices including smart phones, Internet radios,
and vehicle navigation systems which is a radically different environment from the initial Internet based on physi
-cal links. Data traffic for mobile broadband will double every year until 2014, in -creasing 39 times between 2009 and 201413
â¢Physical objects on the net â small devices enable the emergence of the âoeinternet of Thingsâ where practically any physical object can now be on the net sending lo
-cation and local context data when requested â¢Commercial services â as mentioned above the Internet is now a conduit for a
wide variety of commercial services. These business services rely on platforms which can support a wide variety of business transactions and business processes
â¢Societal expectations â in moving from an obscure technology to a fundamental part of human communication, societal expectations have grown.
population demand that the Internet is at least: secure, trustworthy, ubiquitous, ro -bust, responsive and also upholds privacy
9 http://online. wsj. com/article/BT-CO-20110217-718244. html 10 http://www. bbc. co. uk/news/uk-politics-11773574
11 See http://googleblog. blogspot. com/2005/11/vint-cerf-speaks-out-on-net-neutrality. html
id=long-live-the-web http://www. theatlantic. com/technology/archive/2010/12/steve-wozniak-to-the-fcc-keep-the
-internet-free/68294 /12 http://www. ispreview. co. uk/story/2010/06/10/cisco-forecasts-quadruple-jump-in-global
-internet traffic-by-2014. html 13 http://www. ispreview. co. uk/story/2010/06/10/cisco-forecasts-quadruple-jump-in-global
-internet traffic-by-2014. html Preface XI 3 FIA Overview This book is based on the research that is carried out within the Future Internet As
-sembly (FIA. FIA is part of the European response to the problems outlined above In short, FIAS bring together over 150 research projects that are part of the FP7 Chal
-lenge 1 ICT Programme to strengthen Europeâ s Future Internet research activities and also to maintain the EUÂ s global competitiveness in the space.
â¢Cloud computing, Internet of services and advanced software engineering â¢Internet-connected objects â¢Trustworthy ICT
â¢Networked media and search systems â¢Socioeconomic considerations for the Future Internet â¢Application domains for the Future Internet
â¢Future Internet research and experimentation (FIRE Researchers and practitioners associated with the Future Internet gather at the FIAS
every six months for a dialogue and interaction on topics which cross the above areas
In conjunction with the meetings the FIA Working groups sustain activity throughout the year working toward a common vision for the Future Internet based on scenarios
and roadmaps. Since the opening FIA in the spring of 2008, we have held now FIAS
in the following cities: Bled, Madrid, Prague, Stockholm, Valencia and Ghent, with the next meetings scheduled for Budapest and Poznan.
FIA working groups can be found at the EU Future Internet portal: http://www. future -internet. eu
/4 Book Overview This book, the third in the series, contains a sample of the results from the recent
â¢Future Internet Areas â Networks â Services â Content â¢Applications
Future Internet Foundations: Architectural Issues Introduction to Part I...3 Towards a Future Internet Architecture...
7 Theodore Zahariadis, Dimitri Papadimitriou, Hannes Tschofenig Stephan Haller, Petros Daras, George D. Stamoulis, and
Towards In-Network Clouds in Future Internet...19 Alex Galis, Stuart Clayman, Laurent Lefevre, Andreas Fischer
Towards Scalable Future Internet Mobility...35 Laâ'szloâ'Bokor, Zoltaâ'n Faigl, and Saâ'ndor Imre
Review and Designs of Federated Management in Future Internet Architectures. 51 Martä Â'n Serrano, Steven Davy, Martin Johnsson, Willie Donnelly, and
An Architectural Blueprint for a Real-world Internet...67 Alex Gluhak, Manfred Hauswirth, Srdjan Krco, Nenad Stojanovic
Interlinked Data-Content-Information Space...81 Maria Chiara Pettenati, Lucia Ciofi, Franco Pirri, and Dino Giuli
A Cognitive Future Internet Architecture...91 Marco Castrucci, Francesco Delli Priscoli, Antonio Pietrabissa, and Vincenzo Suraci
Title Model Ontology for Future Internet Networks...103 Joao Henrique de Souza Pereira, Flavio de Oliveira Silva
Future Internet Foundations: Socioeconomic Issues Introduction to Part II...117 XIV Table of contents Assessment of Economic Management of Overlay Traffic:
Deployment and Adoption of Future Internet Protocols...133 Philip Eardley, Michalis Kanakakis, Alexandros Kostopoulos, Tapio Levaâ
the Future Internet...145 Costas Kalogiros, Costas Courcoubetis, George D. Stamoulis Michael Boniface, Eric T. Meyer, Martin Waldburger, Daniel Field, and
Future Internet Foundations: Security and Trust Introduction to Part III...163 Security Design for an Inter-Domain Publish/Subscribe Architecture...
Engineering Secure Future Internet Services...177 Wouter Joosen, Javier Lopez, Fabio Martinelli, and Fabio Massacci
Towards Formal Validation of Trust and Security in the Internet of Services...193 Roberto Carbone, Marius Minea, Sebastian Alexander Moâ dersheim
`Trustworthy Clouds Underpinning the Future Internet...209 Ruâ diger Glott, Elmar Husmann, Ahmad-Reza Sadeghi, and
Data Usage Control in the future Internet Cloud...223 Michele Bezzi and Slim Trabelsi Part IV: Future Internet Foundations:
Experiments and Experimental Design Introduction to Part IV...235 A Use-Case on Testing Adaptive Admission Control and Resource Allocation
Algorithms on the Federated Environment of Panlab...237 Christos Tranoris, Pierpaolo Giacomin, and Spyros Denazis
Testing End-to-end Self management in a Wireless Future Internet Environment 259 Apostolos Kousaridas George Katsikas, Nancy Alonistioti, Esa Piri
Future Internet Areas: Network Introduction to Part V...273 Challenges for Enhanced Network Self-Manageability in the Scope of Future
Internet Development...277 Ioannis P. Chochliouros, Anastasia S. Spiliopoulou, and Nancy Alonistioti Efficient Opportunistic Network Creation in the Context of Future Internet...
293 Andreas Georgakopoulos, Kostas Tsagkaris, Vera Stavroulaki, and Panagiotis Demestichas Bringing Optical Networks to the Cloud:
Future Internet...307 Pascale Vicat-Blanc, Sergi Figuerola, Xiaomin Chen, Giada Landi Eduard Escalona, Chris Develder, Anna Tzanakaki, Yuri Demchenko
Future Internet Areas: Services Introduction to Part VI...323 SLAS Empowering Services in the future Internet...327
Joe Butler, Juan Lambea, Michael Nolan, Wolfgang Theilmann Francesco Torelli, Ramin Yahyapour, Annamaria Chiasera, and
Meeting Services and Networks in the future Internet...339 Eduardo Santos, Fabiola Pereira, Joaëoeo Henrique Pereira, Luiz
Fostering a Relationship between Linked Data and the Internet of Services...351 John Domingue, Carlos Pedrinaci, Maria Maleshkova, Barry Norton, and
Future Internet Areas: Content Introduction to Part VII...367 XVI Table of contents Media Ecosystems: A Novel Approach for Content-Awareness in Future
Scalable and Adaptable Media Coding Techniques for Future Internet...381 Naeem Ramzan and Ebroul Izquierdo
Semantic Context Inference in Multimedia Search...391 Qianni Zhang and Ebroul Izquierdo Part VIII: Future Internet Applications
Introduction to Part VIII...403 Future Internet Enterprise Systems: A Flexible Architectural Approach for Innovation...
407 Daniela Angelucci, Michele Missikoff, and Francesco Taglino Renewable Energy Provisioning for ICT Services in a Future Internet...
419 Kim Khoa Nguyen, Mohamed Cheriet, Mathieu Lemay, Bill St. Arnaud Victor Reijs, Andrew Mackarel, Pau Minoves, Alin Pastrama, and
Smart Cities and the Future Internet: Towards Cooperation Frameworks for Open Innovation...431 Hans Schaffers, Nicos Komninos, Marc Pallot, Brigitte Trousse
Smart Cities at the Forefront of the Future Internet...447 Joseâ'M. Hernaâ'ndez-Munëoeoz, Jesuâ's Bernat Vercher, Luis Munëoeoz
Future Internet Foundations: Architectural Issues Part I: Future Internet Foundations: Architectural Issues 3 Introduction The Internet has evolved from a slow, person-to-machine, communication channel to
the most important medium for information exchange. Billions of people all over the world use the Internet for finding,
accessing and exchanging information, enjoying multimedia communications, taking advantage of advanced software services, buying and selling, keeping in touch with family and friends, to name a few.
The success of the Internet has created even higher hopes and expectations for new applications and
services, which the current Internet may not be able to support to a sufficient level On one hand, the increased reliability, availability and interoperability requirements
of the new networked services, and on the other hand the extremely high volumes of multimedia content challenge the todayâ s Internet.
As a result, the âoefuture Internetâ research and development threads have been gaining momentum all over the world and as such the international race to create a new generation Internet is in full swing
The current Internet has been founded on a basic architectural premise, that is: a simple network service can be used as a universal means to interconnect both dumb
and intelligent end systems. The simplicity of the current Internet has pushed com -plexity into the endpoints,
and has allowed impressive scale in terms of inter -connected devices. However, while the scale has reached not yet its limits, the growth
of functionality and the growth of size have slowed both down and may soon reach both its architectural capability and capacity limits.
The current Internet capability limit will be stressed further by the expected growth, in the next years, in order of
magnitude of more Internet services, the likely increase in the interconnection of smart objects and items (Internet of things) and its integration with enterprise applications
Although the current Internet, as a ubiquitous and universal means for communica -tion and computation, has been extraordinarily successful,
there are still many un -solved problems and challenges some of which have basic aspects. Many of these
aspects could not have been foreseen when the first parts of the Internet were built but these do need to be addressed now.
The very success of the Internet is now creat -ing obstacles to the future innovation of both the networking technology that lies at
the Internetâ s core and the services that use it We are faced with an Internet that is good at delivering packets, but shows a level
of inflexibility at the network and service layers and a lack of built-in facilities to
support any nonbasic functionality In order to move forward new architectures that can meet the research and societal
which are enhancing the existing Internet, are also of significant importance. Such new architectures, enhancements related artefacts would be based on
Internet core networking and servicing protocols, components, mechanisms and requirements â¢Integration models enabling better incorporation and usage of the communication
-centric, information-centric, resource-centric, content-centric, service/computation -centric, context-centric faces and internet of things-centric facets
4 Part I: Future Internet Foundations: Architectural Issues â¢Structures and infrastructures for control, configuration, integration, composition
organisation and federation â¢Unification and higher degree of integration of the communication, storage, con
-tent and computation as the means of enabling change from capacity concerns to -wards increased and flexible capability with operation control
â¢Higher degree of virtualisation for all systems: applications, services, networks storage, content, resources and smart objects
-tural research in Future Internet The âoetowards a Future Internet Architectureâ chapter identifies the fundamental
limitations of Internet, which are isolated not but strongly dependent on each other Increasing the bandwidth would significantly help to address
or mitigate some of these problems, but would not solve their root cause. Other problems would neverthe
The transmission can be improved by utilising better data processing & handling and better data storage, while the overall Internet performance
would be improved significantly by control & self-*functions. As an overall result this chapter proposes the following:
extensions, enhancements and re-engineering of todayâ s Internet protocols may solve several challenging limitations.
Yet, addressing the fundamental limitations of the Internet architecture is a multidimensional prob -lem. Improvements in each dimension combined with a holistic approach of the prob
-lem space are needed The âoetowards In-Network Clouds in Future Internetâ chapter explores the archi
-tectural co-existence of new and legacy services and networks, via virtualisation of connectivity and computation resources and self management capabilities, by fully
integrating networking with cloud computing in order to create In-Network Clouds. It also presents the designs and experiments with a number of In-Network Clouds plat
-forms, which have the aim to create a flexible environment for autonomic deployment and management of virtual networks and services as experimented with and validated
Towards Scalable Future Internet Mobilityâ chapter pro -vides a comprehensive overview and review of the scalability problems of mobile
Internet nowadays and to show how the concept of flat and ultra flat architectures emerges due to its suitability and applicability for the future Internet.
It also aims to introduce the basic ideas and the main paradigms behind the different flat networking
-sis of these areas guides the readers from the basics of flat mobile Internet architec
and power creating a novel Internet archi -tecture for future mobile communications The âoereview and Designs of Federated Management in Future Internet Architec
-turesâ chapter analyses issues about federated management targeting information sharing capabilities for heterogeneous infrastructure. An inter-operable, extensible
Future Internet Foundations: Architectural Issues 5 reusable and manageable new Internet reference model is critical for Future Internet
realisation and deployment. The reference model must rely on the fact that high-level applications make use of diverse infrastructure representations and not use of re
under the umbrella of the federated management work in the future Internet The âoean Architectural Blueprint for a Real-world Internetâ chapter reviews a num
-ber of architectures developed in projects in the area of Real-world Internet (RWI Internet of things (Iot),
and Internet Connected Objects. All of these systems are faced with very similar problems in their design with very limited interoperability among
these systems. To address these issues and to speed up development and deployment while at the same time reduce development and maintenance costs, reference architec
-linked Data-Content-Information Spaceâ chapter analyses the concept of âoecontent -Centricâ architecture, lying between the Web of Documents and the generalized Web
of Data, in which explicit data are embedded in structured documents enabling consis -tent support for the direct manipulation of information fragments.
It presents the In -terdatanet (IDN) infrastructure technology designed to allow the RESTFUL manage -ment of interlinked information resources structured around documents.
it provides a simple, uniform Web-based interface to distributed heterogeneous information management; it endows information fragments
The âoea Cognitive Future Internet Architectureâ chapter proposes a novel Cognitive Framework as a reference architecture for the Future Internet (FI), which is based on
so-called Cognitive Managers. The objective of the proposed architecture is twofold On one hand, it aims at achieving a full interoperation among the different entities
Future Internet Foundations: Architectural Issues The âoetitle Model Ontology for Future Internet Networksâ chapter contributes to
the use of ontologies in the future Internet, with the proposal of semantic formaliza -tion of the Entity Title Model.
It is suggested also the use of semantic representation languages in place of protocols Alex Galis and Theodore Zahariadis
) Future Internet Assembly, LNCS 6656, pp. 7â 18,2011 Â The Author (s). This article is published with open access at Springerlink. com
Towards a Future Internet Architecture Theodore Zahariadis1, Dimitri Papadimitriou2, Hannes Tschofenig3, Stephan Haller4 Petros Daras5, George D. Stamoulis6, and Manfred Hauswirth7
2 Alcatel-lucent, Belgium dimitri. papadimitriou@alcatel-lucent. com 3 Nokia Siemens Networks, Germany hannes. tschofenig@nsn. com
4 SAP, Germany stephan. haller@sap. com 5 Center of Research and Technology Hellas/ITI, Greece
daras@iti. gr 6. Athens University of Economics and Business, Greece gstamoul@aueb. gr 7 Digital Enterprise Research Institute, Ireland
emerging and mission critical applications is expected to stress the Internet to such a degree that it will possibly not be able to respond adequately to its new
-wide to search for structural modifications to the Internet architecture in order to be able to face the new requirements.
Future Internet Architecture (FIARCH) group organized and coordinated by the European commission (EC) and aims to capture the groupâ s view on the Future
Internet Architecture issue Keywords: Internet Architecture, Limitations, Processing, Handling, Storage Transmission, Control, Design Objectives, EC FIARCH group
1 Introduction The Internet has evolved from a remote access to mainframe computers and slow communication channel among scientists to the most important medium for informa
-tion exchange and the dominant communication environment for business relations and social interactions. Billions of people all over the world use the Internet for find
-ing, accessing and exchanging information, enjoying multimedia communications taking advantage of advanced software services, buying and selling, keeping in touch
with family and friends, to name a few. The success of the Internet has created even higher hopes and expectations for new applications and services, which the current
Internet may not be able to support to a sufficient level. It is expected that the number
8 T. Zahariadis et al of nodes (computers, terminals mobile devices, sensors, etc. of the Internet will soon
grow to more than 100 billion 1. Reliability, availability, and interoperability re -quired by new networked services,
and this trend will escalate in the future. There -fore, the requirement of increased robustness, survivability, and collaborative proper
-ties is imposed to the Internet architecture. In parallel, the advances in video capturing and content/media generation have led to very large amounts of multimedia content
and applications offering immersive experiences (e g.,, 3d videos, interactive envi -ronments, network gaming, virtual worlds, etc.
compared to the quantity and type of data currently exchanged over the Internet. Based on 2, out of the 42 Exabytes
1018) of consumer Internet traffic likely to be generated every month in 2014,56 %will be due to Internet video, while the average monthly consumer Internet traffic will
be equivalent to 32 million people streaming Avatar in 3d, continuously, for the en -tire month
All these applications create new demands and requirements, which to a certain ex -tent can be addressed by means of âoeover-dimensioningâ combined with the enhance
-ment of certain Internet capabilities over time. While this can be a satisfactory (al -though sometimes temporary) solution in some cases, analyses have shown 3, 4
that increasing the bandwidth on the backbone network will not suffice due to new qualitative requirements concerning, for example, highly critical services such as e
-health applications, clouds of services and clouds of sensors, new social network applications like collaborative 3d immersive environments, new commercial and
transactional applications, new location-based services and so on In other words, the question is to determine if the architecture and its properties
might become the limiting factor of Internet growth and of the deployment of new applications.
For instance, as stated in 5 âoethe end-to-end arguments are insufficiently compelling to outweigh other criteria for certain functions such as routing and con
On the other hand, the evolution of the Internet architecture is car -ried out by means of incremental and reactive additions 6, rather than by major and
change define necessary but not sufficient conditions for such change in the Internet architecture and/or its components.
Indeed, the Internet architecture has shown since so far the capability to overcome such limits without requiring radical architectural
or designing a new Internet Architecture (if a new one is needed), it is necessary to demonstrate the fundamental limits of the cur
to progressively determine the principles that will drive the Future Internet architec -ture that will adequately meet at least the abovementioned challenges EIFFEL
The Future Internet as a global and common communication and distributed infor -mation system may be considered from various interrelated perspectives:
Towards a Future Internet Architecture 9 Europe, a significant part of the Information and Communication Technology (ICT
of the Framework Program 7 is devoted to the Future Internet 14. Though many proposals for a Future Internet Architecture have already been developed, no specific
methodology to evaluate the efficiency (and the need) for such architecture proposals exist. The purpose of this paper is to capture the view of the Future Internet Architec
-ture (FIARCH) group organized and coordinated by the European commission Since so far, the FIARCH group has identified
agreement on the different types of limitations of the Internet and its architecture Interested readers may also refer to 15 for more information1
set of components (i e. procedures, data structures, state machines) and the characteri -zation of their interactions (i e. messages, calls, events, etc
We also qualify as a âoefundamental limitationâ of the Internet architecture a func -tional, structural,
Internet architecture (e g. separation of the locator and identifier role of IP ADDRESSES In the following, we use the term âoedataâ to refer to any organized group of bits
a k a. data packets, data traffic, information, content (audio, video, multimedia), etc and the term âoeserviceâ to refer to any action performed on data or other services and
the related Application programming interface (API. 2 Note however that this docu -ment does not take position on the localization and distribution of these APIS
3 Analysis Approach Since its creation, the Internet is driven by a small set of fundamental design princi
-ples rather than a formal architecture that is created on a whiteboard by a standardiza -tion or research group.
trade-off between Internet redesign and proposing extensions, enhancements and re -engineering of todayâ s Internet protocols are debated heavily
1 Interested readers may also search for updated versions at the FIARCH site http://ec. europa. eu/information society/activities/foi/research/fiarch/index en. htm
2 The definition of service does not include the services offered by humans using the Internet
10 T. Zahariadis et al The emergence of new needs at both functional and performance levels, the cost
and complexity of Internet growth, the existing and foreseen functional and perform -ance limitations of the Internetâ s architectural principles and design model put the
refers to forwarders (e g. routers, switches, etc computers (e g.,, terminals, servers, etc. CPUS, etc. and handlers (software pro
-grams/routines) that generate and treat as well as query and access data â¢Storage of âoedataâ:
refers to memory, buffers, caches, disks, etc. and associated logical data structures â¢Transmission of âoedataâ:
refers to physical and logical transferring/exchange of data â¢Control of processing, storage, transmission of systems and functions:
refers to the action of observation (input), analysis, and decision (output) whose execution affects the running conditions of these systems and functions.
Note that by using these base functions, the data communication function can be defined as the com
-bination of processing, storage, transmission and control functions applied to âoedataâ. The term control is used here to refer to control functionality but also man
-lyze the presumed problems and limitations of the Internet. This work was carried out by identifying an extensive list of limitations and potentially problematic issues or
i. The Internet does not allow hosts to diagnose potential problems and the network offers little feedback for hosts to perform root cause discovery and analysis. In to
-day's Internet, when a failure occurs it is often impossible for hosts to describe the
-tween Internet users and providers. Non-intrusive and non-discriminatory means to detect misbehavior and mitigate their effects while keeping open and broad ac
-cessibility to the Internet is a limitation that is crucial to overcome 16 ii. Lack of data identity is damaging the utility of the communication system.
As a result, data, as an â economic objectâ, traverses the communication infrastructure multiple times, limiting its scaling,
while lack of content â property rightsâ (not only author-but also usage-rights) leads to the absence of a fair charging model
Towards a Future Internet Architecture 11 iv. Real-time processing. Though this is not directly related to the Internet Architec
-ture itself, the limited capability for processing data on a real-time basis poses limitations in terms of the applications that can be deployed over the Internet.
On the other hand, many application areas (e g. sensor networks) require real-time Internet processing at the edges nodes of the network
3. 2 Storage Limitations The fundamental restrictions that have been identified in this category are i. Lack of context/content aware storage management:
Data are not inherently asso -ciated with knowledge of their context. This information may be available at the
communication end-points (applications) but not when data are in transit. So, it is not feasible to make efficient storage decisions that guarantee fast storage man
-agement, fast data mining and retrieval, refreshing and removal optimized for dif -ferent types of data 18
ii. Lack of inherited user and data privacy: In case data protection/encryption meth -ods are employed (even using asymmetric encryption and public key methods
data cannot be stored efficiently/handled. On the other hand, lack of encryption violates the user and data privacy. More investigations into the larger privacy and
data protection ecosystem are required to overcome current limits of how current information systems deal with privacy and protection of information of users, and
develop ways to better respect the needs and expectations 30,31, 32 iii. Lack of data integrity, reliability and trust, targeting the security and protection of
data; this issue covers both unintended disclosure and damage to integrity from defects or failures,
and vulnerabilities to malicious attacks iv. Lack of efficient caching & mirroring: There is no inherited method for on-path
caching along the communication path and mirroring of content compared to off -path caching that is currently widely used (involving e g. connection redirection
Such methods could deal with issues like flash crowding, as the onset of the phe
-nomenon will still cause thousands of cache servers to request the same docu -ments from the original site of publication
3. 3 Transmission Limitations The fundamental restrictions that have been identified in this category are i. Lack of efficient transmission of content-oriented traffic:
Multimedia content -oriented traffic comprises much larger volumes of data as compared to any other
information flow, while its inefficient handling results in retransmission of the same data multiple times.
Content Delivery Networks (CDN) and more generally architectures using distributed caching alleviate the problem under certain condi
-tions but canâ t extend to meet the Internet scale 19. Transmission from central -ized locations creates unnecessary overheads
and can be far from optimal when massive amounts of data are exchanged 12 T. Zahariadis et al
ii. Lack of integration of devices with limited resources to the Internet as autono -mous addressable entities.
Devices in environments such as sensor networks or even nano-networks/smart dust as well as in machine to machine-machine (M2m) envi
-ronments operate with such limited processing, storage and transmission capacity that only partly run the protocols necessary
in order to be integrated in the Internet as autonomous addressable entities iii. Security requirements of the transmission links:
Communications privacy does not only mean protecting/encrypting the exchanged data but also not disclosing that
communication took place. It is not sufficient to just protect/encrypt the data (in -cluding encryption of protocols/information/content, tamper-proof applications
etc) but also protect the communication itself, including the relation/interaction between (business or private) parties
In the current Internet model, design of IP (and more generally communication) control components have so far being
and (operational and system) cost of the Internet. Further, to maintain/sustain or even increase its value delivery over time,
the Internet will have to provide flexi -bility in its functional organization, adaptation, and distribution. Flexibility at run
Improper segmentation of data and control. The current Internet model segments horizontally) data and control,
whereas from its inception the control functional -ity has a transversal component. Thus, on one hand, the IP functionality isn't lim
-ited anymore to the âoenetwork layerâ, and on the other, IP is not totally decoupled
Towards a Future Internet Architecture 13 share the same control instance. Hence, the hourglass model of the Internet does
not account for this evolution of the control functionality when considered as part of the design model
The IP data plane is itself relatively simple but its associated control components are numerous and sometimes
Certain fundamental limitations of current Internet may fall in more than one category Examples of such limitations include
Internet do not have the possibility to enforce the path followed by their traffic Hence, even if multiple alternatives to reach a given destination would be offered
as the Internet enables any-to-any connectivity, there is no effective means to predict the spatial distribution of the traffic within a timescale that would
-bined with a sudden peak in demand for a particular piece of data may result in
The amount of foreseen data and information5 requires significant processing power/storage/bandwidth for indexing/crawling
and also solutions for large scale/real-time data mining/social network analysis so as to achieve successful retrieval and integration of information from an ex
the fast and scalable identification and discovery of and access to data. The expo -nential growth of information makes it increasingly harder to identify relevant in
v. Security of the whole Internet Architecture. The Internet architecture is not intrin -sically secure and is based on add-ons to, e g. protocols,
to secure itself. The con -sequence is that protocols may be secure but the overall architecture is not self
Support of mobility when using IP ADDRESS as both network and host identifier but also TCP connection identifier results in Transmission control protocol (TCP) con
rate or due to transient wireless link interruption in areas of poor coverage), render -ing the typical reaction of congestion control mechanism of TCP inappropriate.
wired and wireless, yielding a different trade-off between performance, efficiency and cost, and affecting several base functions again
the Internet architecture. We distinguish between âoehigh-levelâ and âoelow-levelâ design objectives. High-level objectives refer to the cultural, ethical, socioeconomic, but
also technological expectations to be met by the Internet as global and common in -formation communication system.
High-level objectives are documented in 15. By low-level design objectives, we mean here the functional and performance properties
5 Eric Schmidt, the CEO of Google, the worldâ s largest index of the Internet, estimated the
size at around 5 million terabytes of data (2005. Eric commented that Google has indexed roughly 200 terabytes of that is 0, 004%of the total size
Towards a Future Internet Architecture 15 common information communication system is expected to meet. From the previous
sections, some of low-level objectives are met and others are not by the (present architecture of the Internet.
We also emphasize here that these objectives are com -monly shared by the Internet community at large
The remaining part of this Section translates a first analysis of the properties that should be met by the Internet architecture starting from the initial of objectives as
enumerated in various references (see 27,28, 29. One of the key challenges is thus to determine the necessary addition/improvement of current architecture princi
-ples and the improvement (or even removal of architectural components needed to eliminate or at least tangibly mitigate/avoid the known effects of the fundamental
limitations. It is to be emphasized that a great part of research activities in this domain consists in identifying hidden relationships and effects
the Internet architecture has been structured around eight foundational objectives: i) to connect existing networks, ii) survivability, iii) to sup
1287, published in 1991 by the IAB 36, underlines that the Internet architecture needs to be able to scale to 109 IP networks recognizing the need to add scalability as
existing Internet design objectives compared to the approach that would consist of applying a tabula rasa approach, i e.,
Internet design objectives Based on previous sections, the present section describes the design objectives that are met currently, partly met
â¢Accessibility (open and by means of various/heterogeneous wireless/radio and wired interfaces) to the communication network but also to heterogeneous data, ap
-plications, and services, nomadicity, and mobility (while providing means to main -tain continuity of application communication exchanges when needed.
and nomadicity are addressed currently by current Internet architecture. On the other hand, mobility is realized still in most cases by means of dedicated/separated archi
â¢Accountability of resource usage and security without impeding user privacy utility and self-arbitration:
in the current Internet this service is the connectivity even if the notion of âoeserviceâ is embedded not in the architectural model of the Internet:
initially addressed but loosing ground â¢Distribution of processing, storage, and control functionality and autonomy
-gration of distributed but heterogeneous data and processes 16 T. Zahariadis et al â¢Scalability, including routing
â¢Reliability, referring here to the capacity of the Internet to perform in accordance to what it is expected to deliver to the end-user/hosts while coping with a growing
number of users with increasing heterogeneity in applicative communication needs â¢Robustness/stability, resiliency, and survivability:
and associated data traffic such as non/real-time streams, messages, etc. independently of the shared infrastructure par
-forced (migration of mobile network to IPV6 Internet, IPTV moving to Internet TV etc.)) otherwise leading to segmentation and specialization per application/service
In this article we have identified fundamental limitations of Internet architecture fol -lowing a systematic investigation thereof from a variety of different viewpoints
-ing better data processing and handling (e g. network coding, data compression intelligent routing) and better data storage (e g. network/terminals caches, data cen
-ters/mirrors etc. while the overall Internet performance would be significantly im -proved by control and self-*functions.
As an overall finding we may conclude the following: Extensions, enhancements and re-engineering of todayâ s Internet pro
-tocols may solve several challenging limitations. Yet, addressing the fundamental limitations of the Internet architecture is a multidimensional and challenging
research topic. While improvements are needed in each dimension, these should be combined by undertaking a holistic approach of the problem space
the EC Future Internet Architecture (FIARCH) group (to which the authors belong which is coordinated by the EC FP7 Coordination and Support Actions (CSA) projects
Towards a Future Internet Architecture 17 in the area of Future Internet: Nextmedia, IOT-I, SOFI, EFFECTS+,EIFFEL, Cho
-rus+,SESERV and Paradiso 2, and supported by the EC Units D1: Future Networks D2:
Networked Media Systems, D3: Software & Service Architectures & Infrastruc -tures, D4: Networked Enterprise & Radio frequency identification (RFID) and F5
Trust and Security. The authors would like to acknowledge and thank all members of the group for their significant input and the EC Scientific Officers Isidro Laso Balles
-teros, Jacques Babot, Paulo De Sousa, Peter Friess, Mario Scillia, Arian Zwegers for coordinating the activities
The Internet and its architecture have grown in evolutionary fashion from modest beginnings, rather than from a Grand Plan
Design Goals for Scalable Internet Routing. Work in progress, draft-irtf-rrg -design-goals-02.sep 2010 8 http://www. nsf. gov/pubs/2010/nsf10528/nsf10528. htm
13 http://mmlab. snu. ac. kr/fiw2007/presentations/architecture tschoi. pdf 14 http://www. future-internet. eu
/15 FIARCH Group: Fundamental Limitations of Current Internet and the path to Future Inter -net (December 2010
16 Perry, D.,Wolf, A.:Foundations for the Study of Software Architecture. ACM SIGSOFT Software engineering Notes 17,4 (1992
17 Papadimitriou, D.,et al. eds.):) Open Research Issues in Internet Congestion Control Internet Research Task force (IRTF), RFC 6077 (February 2011
18 Akhlaghi, S.,Kiani, A.,Reza Ghanavati, M.:Cost-bandwidth tradeoff in distributed storage systems (published on-line.
ACM Computer Communications 33 (17), 2105â 2115 (2010 19 Freedman, M.:Experiences with Coralcdn: A Five-Year Operational View.
In: Proc. 7th USENIX/ACM Symposium on Networked Systems Design and Implementation (NSDI â 10) San jose, CA (May 2010
18 T. Zahariadis et al 20 Dobson, S.,et al.:A survey of autonomic communications. ACM Transactions on
22 Evolving the Internet, Presentation to the OECD (March 2006 http://www. cs. ucl. ac. uk/staff/m. handley/slides
Invigorating the Future Internet Debate. ACM SIGCOMM Computer Com -munication Review 39 (5)( 2009 26 Eggert, L.:
Quality-of-Service: An End System Perspective. In: MIT Communications Futures Program â Workshop on Internet Congestion Management, Qos, and Intercon
-nection, Cambridge, MA, USA, October 21-22 (2008 27 Ratnasamy, S.,Shenker, S.,Mccanne, S.:Towards an evolvable internet architecture
SIGCOMM Comput. Commun. Rev. 35 (4), 313â 324 (2005 28 Cross-ETP Vision Document, http://www. future-internet. eu/fileadmin
/documents/reports/Cross-ETPS FI VISION DOCUMENT V1 0. pdf 29 Clark, D d.:The Design Philosophy of the DARPA Internet Protocols, Proc SIGCOMM
88 (reprinted in ACM CCR 25 (1), 102-111,1995. ACM CCR 18 (4), 106â 114 (1988
30 Saltzer, J. H.,Reed, D. P.,Clark, D d.:End-to-end Arguments in System Design. ACM
Architectural Principles of the Internet, Internet Engineering Task force IETF), RFC 1958 (July 1996 32 Krishnamurthy, B.:
ACM SIGCOMM Computer Communication Review (Oct. 2010), http://www2. research. att. com/bala /papers/ccr10-priv. pdf
33 W3c Workshop on Privacy for Advanced Web APIS 12/13 July 2010, London (2010 http://www. w3. org/2010/api-privacy-ws/report. html
34 Workshop on Internet Privacy, co-organized by the IAB, W3c, MIT, and ISOC, 8 and 9
December (2010), http://www. iab. org/about/workshops/privacy /35 Clark, D.,et al.:Towards the Future Internet Architecture, Internet Engineering Task
Force (IETF; RFC 1287 (December 1991 36 http://www. iso. org/iso/iso technical committee. html? commid=45072
37 http://www. 4ward-project. eu /Alicante http://www. ict-alicante. eu /ANA http://www. ana-project. org
/COAST http://www. fp7-coast. eu /COMET http://www. comet-project. org /ECODE http://www. ecode-project. eu
/Iot-A http://www. iot-a. eu /nextmedia http://www. fi-nextmedia. eu /OPTIMIX http://www. ict-optimix. eu
) Future Internet Assembly, LNCS 6656, pp. 19â 33,2011 Â The Author (s). This article is published with open access at Springerlink. com
Towards In-Network Clouds in Future Internet Alex Galis1, Stuart Clayman1, Laurent Lefevre2, Andreas Fischer3
which take advantage of flexible sharing of available connectivity, computation and storage resources. This paper aims to explore the architectural co-existence
of new and legacy services and networks, via virtualisation of connectivity and computation resources and self management capabilities, by fully integrating
networking with cloud computing in order to create In-Network Clouds. It also presents the designs and experiments with a number of In-Network Clouds plat
-forms, which have the aim to create a flexible environment for autonomic de -ployment and management of virtual networks and services as experimented
In-Network Clouds, Virtualisation of Resources, Self management Service plane, Orchestration plane and Knowledge plane 1 Introduction
The current Internet has been founded on a basic architectural premise, that is: a sim -ple network service can be used as a universal means to interconnect both dumb and
intelligent end systems. The simplicity of the current Internet has pushed complexity into the endpoints, and has allowed impressive scale in terms of interconnected de
-vices. However, while the scale has reached not yet its limits 1, 2, the growth of functionality and the growth of size have slowed both down
Internet applications increasingly re -quire a combination of capabilities from traditionally separate technology domains to
and dependability demanded by users. Internet use is expected to grow massively over the next few years with an order of magnitude more Internet
services, the interconnection of smart objects from the Internet of things, and the integration of increasingly demanding enterprise and societal applications
The Future Internet research and development trends are covering the main focus of the current Internet, which is connectivity,
routing, and naming as well as defining 20 A. Galis et al and design of all levels of interfaces for Services and for networksâ and servicesâ
resources. As such, the Future Internet covers the complete management and full lifecycle of applications, services, networks and infrastructures that are primarily
constructed by recombining existing elements in new and creative ways The aspects which are fundamentally missing from the current Internet infrastruc
-ture, include the advanced service networking platforms and facilities, which take advantage of flexible sharing of available resources (e g. connectivity, computation
and storage resources This paper aims to explore the architectural co-existence of new and legacy ser
-vices and networks, via virtualisation of resources and self management capabilities by fully integrating networking 4, 8, 10,15 with cloud computing 6, 7, 9 in order
to produce In-Network Clouds. It also presents the designs and experiments with a number of In-Network Clouds platforms 9, 10,
which have the aim to create a flexi -ble environment for autonomic deployment and management of virtual networks and
modifications to the existing Internet are limited now to simple incremental updates and deployment of new technology is next to impossible and very costly.
-Network virtualisation provides flexibility, promotes diversity, and promises security and increased manageability We define In-Network clouds as an integral part of the differentiated Future Inter
which supports multiple computing clouds from different service providers operating on coexisting heterogeneous virtual networks and sharing a com
-mon physical substrate of communication nodes and servers managed by multiple infrastructure providers. By decoupling service providers from infrastructure provid
-ers and by integrating computing clouds with virtual networks the In-Network clouds introduce flexibility for change
used to make the Future Internet of Services more intelligent, with embedded management functionality. At a logical
and execute on network hosts, devices, attachments, and servers Towards In-Network Clouds in Future Internet 21
Fig. 1. In-Network Cloud Resources within the network. Together these distributed systems form a software-driven net
-work control infrastructure that will run on top of all current networks (i e. fixed wireless, and mobile networks) and service physical infrastructures in order to pro
-vide an autonomic virtual resource overlay 2. 1 Service Plane Overview The Service Plane (SP) consists of functions for the automatic (redeployment of
ensuring integrity of the Future Internet management operations. The Orchestration Plane can be thought of as a control framework into which any number of compo
-ponents could have direct interworking with control algorithms, situated in the control plane of the Internet (i e. to provide real time reaction),
and interworking with other management functions (i e. to provide near real time reaction The Orchestration Plane is made up of one or more Autonomic Management Sys
Towards In-Network Clouds in Future Internet 23 administrative policies, a federation function would trigger a negotiation between
The governance functionality of the OP monitors the consistency of the AMSSÂ actions, it enforces the high level policies
2. 3 Virtualisation Plane Overview Virtualisation hides the physical characteristics 14,16 of the computing and net
-working resources being used, from its applications and users. This paper uses system virtualisation to provide virtual services and resources.
System virtualisation separates an operating system from its underlying hardware resources; resource virtualisation abstracts physical resources into manageable units of functionality.
For example, a single physical resource can appear as multiple virtual resources (e g.,, the concept of
a virtual router, where a single physical router can support multiple independent rout -ing processes by assigning different internal resources to each routing process;
alter -natively, multiple physical resources can appear as a single physical resource (e g when multiple switches are âoestackedâ so that the number of switch ports increases
but the set of stacked switches appears as a single virtual switch that is managed as a
single unit. Virtualisation enables optimisation of resource utilisation. However, this optimisation is confined to inflexible configurations within a single administrative
domain. This paper extends contemporary virtualisation approaches and aims at build -ing an infrastructure in which virtual machines can be relocated dynamically to any
physical node or server regardless of location, network, and storage configurations and of administrative domain
The virtualisation plane consists of software mechanisms to abstract physical re -sources into appropriate sets of virtual resources that can be organised by the Orches
-tration Plane to form components (e g.,, increased storage or memory devices (e g.,, a switch with more ports),
or even networks. The organisation is done in order to realise a certain business goal or service requirement.
Two dedicated interfaces are needed the vspi and the vcpi (Virtualisation System Programming interface and Virtualisa -tion Component Programming interface, respectively.
A set of control loops is formed using the vspi and the vcpi, as shown in Figure 2
24 A. Galis et al Fig. 2. Virtualisation Control Loop Virtualisation System Programmability Interface (vspi. The vspi is used to
enable the Orchestration Plane (and implicitly the AMS and DOC that are part of a given Orchestration Plane) to govern virtual resources,
and to construct virtual ser -vices and networks that meet stated business goals having specified service require
resources in response to changing user needs, business requirements, and environ -mental conditions. The low-level configuration (i e.,
Virtualisation Component Programming interface (vcpi. Each physical resource has associated an and distinct vcpi. The vcpi is fulfilling two main functions:
physical resource by the vcpi of the Virtualisation Plane. The AMS sends abstract i e.,, device-independent) commands via the vcpi,
Towards In-Network Clouds in Future Internet 25 controls that physical resource. Note that the AMS is responsible for obtaining man
-agement data describing the physical resource. The vcpi is responsible for providing dynamic management data to its governing AMS that states how many virtual re
-sources are currently instantiated, and how many additional virtual resources of what type can be supported 2. 4 Knowledge Plane Overview
-work architecture, contrasting with the data and control planes; its purpose is to pro -vide knowledge and expertise to enable the network to be self-monitoring, self
Plane (KP), consisting of context data structured in information models and ontolo -gies, which provide increased analysis
The KP brings together widely distributed data collection, wide availability of that data, and sophisticated and adaptive processing or KP functions, within a unify
-ing structure. Knowledge extracted from information/data models forms facts Knowledge extracted from ontologies is used to augment the facts,
so that they can be reasoned about. Hence, the combination of model and ontology knowledge forms a
which is used then to transform received data into a common form that enables it to be managed.
-cations and services in the future Internet Context Information Services. The Context Information Service Platform (CISP within the KP, has the role of managing the context information,
user-facing services or network management services, which make use of or/and adapt themselves to context information.
clients,(ii) the Context Processing (CP) Module which implements the core internal operations related to the context processing,(iii) the Context Information Base (CIB
Towards In-Network Clouds in Future Internet 27 applications/components and the CP module for the optimisation of the context in
in support of the Context Executive and Context Processor modules. Context is dis -tributed and replicated within the domain
they monitor hardware and software for their state, present their capabili -ties, or collect configuration parameters.
A monitoring mechanism and framework was developed to gather measurements from relevant physical and virtual resources
, the number of CPUS,(ii) N-time queries, which collect information periodically, and (iii) continuous queries that monitor information in an ongoing
manner. CCPS should be located near the corresponding sources of information in 28 A. Galis et al
-erations such as getting the state of a server with its CPU or memory usage, getting
bytes coming in and out, or getting the state of disks on a system presenting the total
own thread allowing each one to collect data at different rates and also having the
information retrieval is handled by the Virtualisation Plane The reader collects the raw measurement data from all of the sensors of a CCP
The collection can be done at a regular interval or as an event from the sensor itself
The reader collects data from many sensors and converts the raw data into a common measurement object used in the CISP Monitoring framework.
meta-data about the sensor and the time of day, and it contains the retrieved data from
the sensor The filter takes measurements from the reader and can filter them out before they
which they collect data;(ii) the filtering process, by changing the filter or adapting an
IP ADDRESS and port) that the ICP is connected to The vcpi supports the extension with additional functions,
which can measure attributes from CPU, memory, and network components of a server host, were created.
We can also measure the same attributes of virtualised hosts by interacting with a hypervisor to collect these values.
Towards In-Network Clouds in Future Internet 29 2. 5 Management Plane Overview The Management Plane is a basic building block of the infrastructure,
-tinuous migration of virtual routers into hosts (i e.,, physical nodes and servers) subject to constraints determined by the Orchestration Plane.
The Management Plane is de -signed to meet the following functionality â¢Embedded (Inside) Network functions:
i e. fixed, wireless and mobile networks) and service physical infrastructures â¢Aware and Self-aware functions:
It monitors the network and operational context as well as internal operational network state in order to assess if the network cur
the optimal placement and continuous migration of virtual routers into hosts (i e. physi -cal nodes and servers) subject to constraints determined by the Orchestration Plane
Fig. 5. Autonomic Control Loops 30 A. Galis et al The Management Plane consists of Autonomic Management Systems (AMS.
Mapping logic enables the data stored in models to be transformed into knowledge and combined with knowledge stored in ontologies
-oped and issued as open source 10, which aims to create a highly open and flexible
environment for In-Network Clouds in Future Internet. They are described briefly here -with. Full design and implementation of all software platforms are presented in 10
â¢vcpi (Virtual Component Programming interface is the VP s main component deal -ing with the heterogeneity of virtual resources and enabling programmability of net
-work elements In each physical node there is an embedded vcpi, which is aware of the structure of the virtual resources,
Towards In-Network Clouds in Future Internet 31 â¢CISP (Context Information Service Platform) is the KP s main component sup
add powerful and flexible monitoring facilities to system clouds (virtualisation of networks and services. Lattice has a minimal runtime footprint
The framework provides data sources, data consumers, and a control strategy. In a large distributed system there may be hundreds or thousands of measurement
probes, which can generate data â¢APE (Autonomic Policy-based Engine), a component of the MP, supports context
-tual entities, such as servers and routers â¢RNM (Reasoning and Negotiation Module), a core element of the KP, which me
-diates and negotiates between separate federated domains These In-Network Cloud platforms were integrated and validated on 2 testbeds ena
-bling experimentation with thousands of virtual machines: V3 â UCLÂ s Experimental Testbed located in London consisting of 80 cores with a dedicated 10 Gbits/s infra
-structure and Grid5000-an Experimental testbed located in France consisting of 5000 cores and linked by a dedicated 10 Gbits/s infrastructure.
Validation and performance analysis are described fully in 13. Demonstrations are available at: http://clayfour ee. ucl. ac. uk/demos/and they are used for
â¢Autonomic service provisioning on In-Network Clouds (Service Computing Clouds 4 Conclusion This work has presented the design of an open software networked infrastructure (In
-Network Cloud) that enables the composition of fast and guaranteed services in an efficient manner,
and service resources provided by an virtualisation environment. We have described also the management architectural and system model
for our Future Internet, which were described with the help of five abstractions and distributed systems â the OSKMV planes:
Virtualisation Plane (VP), Management Plane (MP), Knowledge Plane (KP), Service Plane (SP) and Orchestration Plane
OP). The resulting software-driven control network infrastructure was exercised fully and relevant analysis on network virtualisation and service deployments were carried
out on a large-scale testbed Virtualising physical network and server resources has served two purposes: Man
-aging the heterogeneity through introduction of homogeneous virtual resources and enabling programmability of the network elements.
The flexibility gained through this approach helps to adapt the network dynamically to both unforeseen and predictable
A vital component of such a virtualisation approach is a common management and monitoring interface of virtualised resources.
then form the basis for new types of applications and services in the future Internet Acknowledgments. This work was undertaken partially in the context of the FP7-EU
Autonomic Internet 10 and the RESERVOIR 9 research projects, which were funded by the Commission of the European union.
Future Generation Internet Architecture http://www. isi. edu/newarch /2. Galis, A.,et al.:Management and Service-aware Networking Architectures (MANA) for
Future Internet Position Paper: System Functions, Capabilities and Requirements. Invited paper IEEE Chinacom09 26-28, Xiâ an, China (August 2009
http://www. chinacom. org/2009/index. html 3. Rubio-Loyola, J.,et al.:Platforms and Software systems for an Autonomic Internet.
IEEE Globecom 2010; 6-10 dec.,, Miami, USA (2010 4. Galis, A.,et al.:Management Architecture and Systems for Future Internet Networks.
In Towards the Future Internet, IOS Press, Amsterdam (2009 5. Chapman, C.,et al.:Software Architecture Definition for On-demand Cloud Provisioning
ACM HPDC, 21-25, Chicago hpdc2010. eecs. northwestern. edu (June 2010 6. Rochwerger, B.,et al.:
An Architecture for Federated Cloud computing. In: Cloud Com -puting, Wiley, Chichester (2010 7. Chapman, C.,et al.:
Elastic Service Management in Computational Clouds. 12th IEEE/IFIP NOMS2010/Cloudman 2010 19-23 april, Osaka (2010
/Towards In-Network Clouds in Future Internet 33 8. Clayman, S.,et al.:Monitoring Virtual Networks with Lattice.
-Management of Future Internet 2010; 19-23 april, Osaka, Japan (2010 http://www. manfi. org/2010
-tures, and Protocols For Computer Communications (Karlsruhe, Germany, SIGCOMM â 03 Karlsruhe, Germany, August 25â 29,2003, pp. 3â 10.
Journal Computer networks: The International Journal of Computer and Tele -communications Networking 54 (5)( 2010 15.
Galis, A.,Denazis, S.,Bassi, A.,Berl, A.,Fischer, A.,de Meer, H.,Strassner, J.,Davy, S.,Ma
-ture and Systems for Future Internet Networks. In: Towards the Future Internet â A European
Research Perspective, p. 350. IOS Press, Amsterdam (2009), http://www. iospress. nl /16. Berl, A.,Fischer, A.,De Meer, H.:
Using System Virtualization to Create Virtualized Net -works. Electronic communications of the EASST 17, 1â 12 (2009
http://journal. ub. tu-berl. asst/article/view/218/219 J. Domingue et al. Eds.):) Future Internet Assembly, LNCS 6656, pp. 35â 50,2011
 The Author (s). This article is published with open access at Springerlink. com Flat Architectures:
Towards Scalable Future Internet Mobility Lászlã Bokor, Zoltã¡n Faigl, and Sándor Imre
Budapest University of Technology and Economics department of Telecommunications Mobile Communication and Computing Laboratory â Mobile Innovation Centre
Magyar Tudosok krt. 2, H-1117, Budapest Hungary {goodzi, szlaj, imre}@ mcl. hu Abstract. This chapter is committed to give a comprehensive overview of the
scalability problems of mobile Internet nowadays and to show how the concept of flat and ultra flat architectures emerges due to its suitability and applicability
for the future Internet. It also aims to introduce the basic ideas and the main
will guide the readers from the basics of flat mobile Internet architectures to the paradigmâ s complex feature set
and power creating a novel Internet architecture for future mobile communications Keywords: mobile traffic evolution, network scalability, flat architectures, mo
-bile Internet, IP mobility, distributed and dynamic mobility management 1 Introduction Mobile Internet has started recently to become a reality for both users and operators
thanks to the success of novel, extremely practical smartphones, portable computers with easy-to-use 3g USB modems and attractive business models.
Based on the cur -rent trends in telecommunications, vendors prognosticate that mobile networks will suffer an immense traffic explosion in the packet switched domain up to year 2020
1â 4. In order to accommodate the future Internet to the anticipated traffic demands technologies applied in the radio access
and core networks must become scalable to advanced future use cases There are many existing solutions aiming to handle the capacity problems of cur
-rent mobile Internet architectures caused by the mobile traffic data evolution. Reserv -ing additional spectrum resources is the most straightforward approach for increasing
the throughput of the radio access, and also spectrum efficiency can be enhanced thanks to new wireless techniques (e g.,
, High Speed Packet Access, and Long term Evolution). ) Heterogeneous systems providing densification and offload of the macro
-cellular network throughout pico, femtocells and relays or Wifi/Wimax interfaces also extend the radio range.
Since todayâ s mobile Internet architectures have been designed originally for voice services and later extended to
customers by balancing user traffic between a large variety of access networks. Scal -ability of traffic, network and mobility management functions has become one of the
most important questions of the future Internet The growing number of mobile users, the increasing traffic volume, the complexity
of mobility scenarios, and the development of new and innovative IP-based applica -tions require network architectures able to deliver all kind of traffic demands seam
nature of current and planned mobile Internet standards (e g.,, the ones maintained by the IETF or by the collaboration of 3gpp) prevents cost effective system scaling for
the novel traffic demands. Aiming to solve the burning problems of scalability from an architectural point of view, flat and fully distributed mobile architectures are gain
-ing more and more attention today The goal of this chapter is to provide a detailed introduction to the nowadays
emerging scalability problems of the mobile Internet and also to present a state of the
art overview of the evolution of flat and ultra flat mobile communication systems. In order to achieve this we first introduce the issues relating to the continuously growing
traffic load inside the networks of mobile Internet providers in Section 2. Then, in Section 3 we present the main evolutionary steps of flat architectures by bringing
the Mobile Internet 2. 1 Traffic Evolution Characteristics of the Mobile Internet One of the most important reasons of the traffic volume increase in mobile telecom
-munications is demographical. According to the current courses, worldâ s population is growing at a rate of 1. 2%annually,
and the total population is expected to be 7. 6 billion in year 2020. This trend also implies a net addition of 77 million new inhabi
billion people â are using the Internet. Over 60%of the global population â now we
the number of wireless broadband subscriptions is about to exceed the total amount of fixed broadband subscriptions and this development
Towards Scalable Future Internet Mobility 37 becomes even more significant considering that the volume of fixed broadband sub
The expansion of wireless broadband subscribers not only inflates the volume of mobile traffic directly, but also facilitates the growth in broadband wireless enabled
terminals. However, more and more devices enable mobile access to the Internet, only a limited part of users is attracted
or open to pay for the Wireless internet services meaning that voice communication will remain the dominant mobile application also
in the future. Despite this and the assumption of 5 implying that the increase in the number of people potentially using mobile Internet services will likely saturate after
2015 in industrialized countries, the mobile Internet subscription growth potential will be kept high globally by two main factors.
On one hand the growth of subscribers continues unbrokenly in the developing markets: mobile broadband access through
basic handhelds will be the only access to the Internet for many people in Asia/Pacific.
On the other hand access device, application and service evolution is also expected to sustain the capability of subscriber growth
The most prominent effect of services and application evolution is the increase of video traffic:
it is foreseen that due to the development of data-hungry entertainment services like television/radio broadcasting and Vod, 66%of mobile traffic will be
video by 2014 2. A significant amount of this data volume will be produced by mobile Web-browsing which is expected to become the biggest source of mobile
video traffic (e g.,, Youtube. Cisco also forecasts that the total volume of video (in -cluding IPTV, Vod, P2p streaming, interactive video, etc.
will reach almost 90 per -cent of all consumer traffic (fixed and mobile) by the year 2012, producing a substan
-tial increase of the overall mobile traffic of more than 200%each year 7. Video traffic is anticipated also to grow so drastically in the forthcoming years that it could
overstep Peer-to-peer (P2p) traffic 4. Emerging web technologies (such as HTML5), the increasing video quality requirements (HDTV, 3d, SHV) and special
application areas (virtual reality experience sharing and gaming) will further boost this process and set new challenges to mobile networks.
Since video and related enter -tainment services seems to become dominant in terms of bandwidth usage, special
optimization mechanisms focusing on content delivery will also appear in the near future. The supposed evolution of Content Delivery Networking (CDN) and smart
data caching technologies might have further impact on the traffic characteristics and obviously on mobile architectures
Another important segment of mobile application and service evolution is social networking. As devices, networks and modes of communications evolve,
users will choose from a growing scale of services to communicate (e g.,, e-mail, Instant Mes
-saging, blogging, micro-blogging, Voip and video transmissions, etc..In the future social networking might evolve even further,
like to cover broader areas of personal communication in a more integrated way, or to put online gaming on the next level
deeply impregnated with social networking and virtual reality Even though video seems to be a major force behind the current traffic growth of
the mobile Internet, there is another emerging form of communications called M2m Machine to machine-Machine) which has the potential to become the leading traffic contribu
-tor in the future. M2m sessions accommodate end-to-end communicating devices 38 L. Bokor, Z. Faigl, and S. Imre
without human intervention for remote controlling, monitoring and measuring, road safety, security/identity checking, video surveillance, etc.
will be 225 million cellular M2m devices by 2014 with little traffic per node but re
As a summary we can state that the inevitable mobile traffic evolution is foreseen thanks to the following main factors:
mobile networks, devices, applications and services, and significant device increase potential resulted by the tremendous number of novel subscriptions for Machine-to
2. 2 Scalability Problems of the Mobile Internet Existing wireless telecommunication infrastructures are prepared not to handle this
traffic increase, current mobile Internet was designed not with such requirements in mind: mobile architectures under standardization (e g.,
, 3gpp, 3gpp2, Wimax Fo -rum) follow a centralized approach which cannot scale well to the changing traffic
conditions On one hand user plane scalability issues are foreseen for anchor-based mobile Internet architectures, where mechanisms of IP ADDRESS allocation and tunnel estab
-lishment for end devices are managed by high level network elements, called anchor points (GGSN in 3gpp UMTS, PDN GW in SAE,
and CSN for Wimax networks Each anchor point maintains special units of information called contexts,
containing binding identity, tunnel identifier, required Qos, etc. on a per mobile node basis These contexts are updated continuously
and used to filter and route user traffic by the anchor point (s) towards the end terminals and vice versa.
However, network ele -ments (hence anchor points too) are limited in terms of simultaneous active contexts Therefore, in case of traffic increase new equipments should be installed or existing
service convergence in current mobile Internet architectures but introduces additional complexity regarding session establishment procedures.
and Charging Control architecture by 3gpp) to achieve interaction between the two levels during session establishment, modification and release routines.
operator policy and user subscription. Due to the number of standardized interfaces e g.,, towards IP Multimedia Subsystem for delivering IP multimedia services), the
interoperability between the service and the access layer can easily cause scalability and Qos issues even in the control plane
Towards Scalable Future Internet Mobility 39 As a consequence, architectural changes are required for dealing with the ongoing
future mobile networks must specify architecture optimized to maximize the end-user experience, minimize CAPEX/OPEX, energy efficiency, net
and to ensure mobile networks sustainability 3 Evolution of Flat Architectures 3. 1 Evolution of the Architecture of 3gpp Mobile networks
Fixed networks were firstly subject to similar scalability problems. The evolution of DSL access architecture has shown in the past that pushing IP routing and other func
-tions from the core to the edge of the network results in sustainable network infra
-cation and mobile Internet era The 3gpp network architecture specifications having the numbers 03.02 8 and
23.002 9 show the evolution of the 3gpp network from GSM Phase 1 published in
1995 until the Evolved Packet System (EPS) specified in Release 8 in 2010. The core
part of EPS called Evolved Packet Core (EPC) is extended continuously with new features in Release 10 and 11.
The main steps of the architecture evolution are sum -marized in the followings. Fig. 1 illustrates the evolution steps of the packet-switched
domain, including the main user plane anchors in the RAN and the CN In Phase 1 (1995) the basic elements of the GSM architecture have been defined
The reasons behind the hierarchization and centralization of the GSM architecture were both technical and economical.
Primarily it offloaded the switching equipments crossbar switch or MSC. In parallel, existing ISDN switches could be reused as
Fig. 1. The evolution of the packet-switched domain of the 3gpp architecture, including the
main user plane anchors in the RAN and the CN 40 L. Bokor, Z. Faigl, and S. Imre
Release 1999 (2002) describes the well known UMTS architec -ture clearly separating the CS and PS domains.
Seeing that UMTS was designed to be the successor of GSM, it is not strange that the central anchors remained in place in
3g and beyond Progress of mobile and wireless communication systems introduced some funda -mental changes. The most drastic among them is that IP has become the unique access
protocol for data networks and the continuously increasing future wireless traffic is also based on packet data (i e.,
, Internet communication. Due to the collateral effects of this change a convergence procedure started to introduce IP-based transport tech
-nology in the core and backhaul network: Release 4 (2003) specified the Media gate -way function, Release 5 (2003) introduced the IP Multimedia Subsystem (IMS) core
network functions for provision of IP services over the PS domain, while Release 6 standardized WLAN interworking and Multimedia Broadcast Multicast Service
MBMS With the increasing IP-based data traffic flattening hierarchical and centralized functions became the main driving force in the evolution of 3gpp network architec
-tures. Release 7 (also called Internet HSPA, 2008) supports the integration of the RNC with the Nodeb providing a one node based radio access network.
Another architectural enhancement of this release is the elaboration of Direct Tunnel service 10 11.
Direct Tunnel allows to offload user traffic from SGSN by bypassing it. The Direct Tunnel enabled SGSNS can initiate the reactivation of the PDP context to tun
-nel user traffic directly from the RNC to the GGSN or to the Serving GW introduced
in Release 8. This mechanism tries to reduce the number of user-plane traffic anchors
However it also adds complexity in charging inter-PS traffic because SGSNS can not account the traffic passing in direct tunnels.
When Direct Tunnel is enabled, SGSNS still handle signaling traffic, i e.,, keep track of the location of mobile devices and
participate in GTP signaling between the GGSN and RNC Release 8 (2010) introduces a new PS domain, i e.,
, the Evolved Packet Core EPC). ) Compared to four main GPRS PS domain entities of Release 6, i e. the base
station (called Nodeb), RNC, SGSN and GGSN, this architecture has integrated one radio access node, containing the precious base station and the radio network control
functions, and three main functional entities in the core, i e. the Mobility Management Entity (MME), the Serving GW (S-GW) and the Packet data Network GW (PDN GW
Release 9 (2010) introduces the definition of Home (e) Nodeb Subsystem. These systems allow unmanaged deployment of femtocells at indoor sites,
providing almost perfect broadband radio coverage in residential and working areas, and offloading the managed, pre-panned macro-cell network 14
In Release 10 (2010) Selective IP Traffic Offload (SIPTO) and Local IP Access LIPA) services have been published 15.
traffic from the macro-cellular network or the H (e) Nodeb subsystems, in order to offload the network elements in the PS and EPC PS domain.
Towards Scalable Future Internet Mobility 41 entities in the same residential/enterprise IP network without the user plane traversing
the core network entities. SIPTO enables per APN and/or per IP flow class based
traffic offload towards a defined IP network close to the UE's point of attachment to
The above evolutionary steps resulted in that radio access networks of 3gpp be -came flattened to one single serving node (i e.,
However, the flat nature of LTE and LTE-A architectures concerns only the control plane but not the user plane:
LTE is linked to the Evolved Packet Core (EPC) in the 3gpp system evolution, and in EPC
the main packet switched core network functional entities are still remaining central -ized, keeping user IP traffic anchored.
There are several schemes to eliminate the residual centralization and further extend 3gpp 3. 2 Ultra Flat Architecture
One of the most important schemes aiming to further extend 3gpp standards is the Ultra Flat Architecture (UFA) 16â 20.
Authors present and evaluate an almost green field approach which is a flat and distributed convergent architecture, with the excep
-tion of certain control functions still provided by the core. UFA represents the ulti -mate step toward flattening IP-based core networks, e g.,
, the EPC in 3gpp. The ob -jective of UFA design is to distribute core functions into single nodes at the edge of
the network, e g.,, the base stations. The intelligent nodes at the edge of the network
are called UFA gateways. Fig. 2 illustrates the UFA with HIP and PMIP-based mobil -ity control
Fig. 2. The Ultra Flat Architecture with HIP and PMIP-based mobility control Since mobility introduces frequent IP-level handovers a Session Initialization Proto
-col (SIP) based handover procedure has been described in 16. It has been shown by a numerical analysis, and in a later publication with measurements on a testbed 17
Back User Agents (B2buas) in UFA GWS can prepare for fast handovers by com -municating the necessary contexts, e g.,
, the new IP ADDRESS before physical handover This scheme supports both mobile node (MN) and network decided handovers
In the PS domain, IP multimedia services require a two-level session establishment procedure. First, the MN and the correspondent node (CN) negotiate the session pa
Interworking with Internet applications based on non SIP control protocol is a technical challenge for mobile operators.
A Mobile IPV6 and a Host Identity Protocol (HIP) based signaling scheme alternative has been introduced for UFA by Z. Faigl et al. 18.
-dures of UFA, to reduce the number of HIP Base Exchanges in the access and core
Flat mobile networks not only require novel architectural design paradigms, special network nodes and proprietary elements with peculiar functions, but also demand
routines of the future mobile Internet designs. The importance of this research area is also emphasized by the creation of a new IETF nonworking group called Distributed
and user traffic forward -ing. In 3g UMTS architectures centralized and hierarchical mobility anchors are
Flat Architectures: Towards Scalable Future Internet Mobility 43 implemented by the RNC, SGSN and GGSN nodes that handle traffic forwarding
tasks using the apparatus of GPRS Tunneling Protocol (GTP. The similar centraliza -tion is noticeable in Mobile IP (MIP) 21 where the Home Agent â an anchor node for
both signaling and user plane trafficâ administers mobile terminalsâ location informa -tion, and tunnels user traffic towards the mobileâ s current locations and vice versa
Several enhancements and extensions such as Fast Handoffs for Mobile IPV6 (FMIP 22, Hierarchical Mobile IPV6 (HMIP) 23, Multiple Care-of Addresses Registration
24, Network Mobility (NEMO) Basic Support 25, Dual-Stack Mobile IPV6 26 and Proxy Mobile IPV6 (PMIP) 27, were proposed to optimize the performance and
broaden the capabilities of Mobile IP, but all of them preserve the centralized and anchoring nature of the original scheme
There are also alternate schemes in the literature aiming to integrate IP-based mo -bility protocols into cellular architectures and to effectively manage heterogeneous
networks with special mobility scenarios. Cellular IP 28 introduces a gateway router dealing with local mobility management while also supporting a number of handoff
techniques and paging. A similar approach is the handoff-aware wireless access Inter -net infrastructure (HAWAII) 29,
Some of the above solutions are standardized already 12 13 33 for 3g and be -yond 3g architectures where the introduced architectural evolution is in progress:
E -UTRAN (Evolved Universal Terrestrial Radio Access Network) or LTE (Long term Evolution) base stations (enodebs) became distributed in a flatter scheme allowing
almost complete distribution of radio and handover control mechanisms together with direct logical interfaces for inter-enodeb communications.
mechanisms in current wireless and mobile networks anchor the user traffic relatively far from usersâ location.
This results in centralized, unscalable data plane and control plane with non-optimal routes, overhead and high end-to-end packet delay even in
case of motionless users, centralized context maintenance and single point of failures Anchor-based traffic forwarding
-ployment issues for caching contents near the user To solve all these problems and questions novel, distributed and dynamic mobility
-main in the core network. A good example is the Global HA to HA protocol 34, which
Link and distribute the Home Agents in Layer 3, at the scale of the Internet.
Distributed IP Mobility Approach) 35 can also be considered as a core-level scheme by allowing the distribution of MIP Home Agent (the normally isolated central server
to many and less powerful interworking servers called Mobility Agents (MA. These new nodes have combined the functionality of a MIP Home Agent and HMIP/PMIP
Mobility Anchor Points. The administration of the system of distributed MAS is done via a distributed Home Agent overlay table structure based on a Distributed Hash Table
The concept of UMTS Base Station Router (BSR) 37 realizes such an access-level mobility management distribution
scheme where a special network element called BSR is used to build flat cellular systems. BSR merges the GGSN, SGSN, RNC and Nodeb entities into a single ele
while a common UMTS network is built from a plethora of network nodes and is maintained in a hierarchical and centralized fashion,
Furthermore, the BSR can be considered a special wireless edge router that bridges between mobile/wireless and IP communication.
In order to achieve this, mobility support in the BSR is handled at three layers: RF channel mo
the access network side and terminals on the user side. Core network nodes are mainly simple IP routers.
The scheme applies DHT and Loc/ID separation: each mo -bile node has a unique identifier (ID) keeping persistent,
and an IP ADDRESS based locator (Loc) changed by every single mobility event. The (Loc, ID) pair of each mo
-bile is stored inside AGW nodes and organized/managed using DHTS A third type of DMM application scenarios is the so-called host-level
-spondent node, a special information server is required in the network, which can also Flat Architectures:
Towards Scalable Future Internet Mobility 45 be centralized or distributed. A good example for host-level schemes in the IP layer is
MIPV6 which is able to bypass the user plane anchor (i e.,, Home Agent) due to its
-ing and user planes based on their differences in traffic volume or end-host behavior i e.,
, only the user plane is distributed), or by granting mobility support only to nodes that actually need it (i e.,
Mobile IP without route optimization) do not separate signaling and user planes which means that all control
and data packets traverse the centralized or hierarchized mobility anchor. Since the volume of user plane traffic is compared much higher to
the signaling traffic, the separation of signaling and user planes together with the distribution of the user plane but without eliminating signaling anchors can still result
in effective and scalable mobility management. This is exploited by the HIP based UFA scheme 18â 20 where a relatively simple inter-UFA GW protocol can be used
thanks to the centralized HIP signaling plane, but the user plane is still fully distrib
-uted. Mobile IP based DMM solutions also rely on the advantages of this partial dis -tribution concept when they implement route optimization, hence separate control
packets from data messages after a short period of route optimization procedure The second type of partially distributed mobility management is based on the ca
Integrating this concept with distributed anchors, the algorithms supporting dynamic mobility could also be distributed. Such integration is accomplished in
-ing on the IP ADDRESS used. Based on this behavior, the system is able to avoid execu
deployment scheme of Proxy Mobile IP for flat architecture. This extension allows to dynamically distributing mobility functions among access routers:
the mobility sup -port is restricted to the access level, and adapted dynamically to the needs of mobile
, both data plane and control plane are distributed). This implies the introduc -tion of special mechanisms in order to identify the anchor that manages mobility sig
-naling and data forwarding of a particular mobile node, and in most cases this also
requires the absolute distribution of mobility context database (e g.,, for binding in -formation) between every element of the distributed anchor system.
by using Hi3 50 for core-level distribution of HIP signaling plane) are also feasible
directly connected to the IP core infrastructure. Therefore, they provide convenient and implicit interoperability between heterogeneous wireless technologies, and facili
additional delay that user and signaling plane messages perceive over a hierarchical and multi-element access
Towards Scalable Future Internet Mobility 47 BS nodes also minimizes the feedback time of intermodule communication, i e.,
-nents could be compared much cheaper to HSPA and LTE devices today because of the economy of scale.
tools due to the apparition of tools developed formerly for the Internet era may reduce the operational expenditures as well
due to lack of core controller entities base stations are managed no more centrally; hence failure diagnostics and recovery must be handled in a fully distrib
scalability, fault tolerance and flexibility Optimization of handover performance is another key challenge for flat networks
Since all the BSS are connected directly to the IP core network, hiding mobility events from the IP layer is much harder
tional hierarchical and centralized mobile telecommunication architectures. The IP network that deals with the interconnection of base stations in flat networks must be
mobile Internet architecture for better adaptation to future needs Acknowledgments. This work was made in the frame of Mobile Innovation Centre's
1. UMTS Forum White paper: Recognising the Promise of Mobile Broadband (June 2010 2. Cisco VNI:
Global Mobile Data Traffic Forecast Update, 2009-2014 (Feb. 2010 3. Dohler, M.,Watteyne, T.,Alonso-Zá
rate, J.:Machine to machine-Machine: An Emerging Commu -nication Paradigm, Tutorial. In: Globecomâ 10.dec 2010 4. Schulze, H.,Mochalski, K.:
Ipoque, Internet Study 2008/2009, Ipoque (Jan. 2011 5. UMTS Forum, REPORT NO 37, Magic Mobile Future 2010-2020 (April 2005
6. International Telecommunication Union, Press release: ITU sees 5 billion mobile sub -scriptions globally in 2010 (February 2010
7. Cisco VNI: Hyperconnectivity and the Approaching Zettabyte Era (June 2010 8. ETSI GTS GSM 03.02-v5. 1. 0:
Digital cellular telecommunications system (Phase 2 +-Network architecture (GSM 03.02)( 1996 9. 3gpp TS 23.002: Network architecture, V10. 1. 1, Release 10.jan 2011
10. 3gpp TR 23.919: Direct Tunnel Deployment Guideline, Release 7, V1. 0. 0 (May 2007
11. 3gpp TS 23.401: General Packet Radio Service (GPRS) enhancements for Evolved Uni -versal Terrestrial Radio Access Network (E-UTRAN) access, Rel. 8, V8. 12.dec 2010
12. 3gpp TS 29.275, Proxy Mobile IPV6 (PMIPV6) based Mobility and Tunneling protocols Stage 3, Release 10, V10. 0. 0 (Dec. 2010
13. 3gpp TS 24.303, Mobility management based on Dual-Stack Mobile IPV6, Stage 3, Re -lease 10, V10. 1. 0 Dec (2010
14. Femtoforum: Femtocells â Natural Solution for Offload â a Femto Forum brief (June 2010
15. 3gpp TR 23.829: Local IP Access and Selected IP Traffic Offload, Release 10, V1. 3 (2010
16. Daoud, K.,Herbelin, P.,Crespi, N.:UFA: Ultra Flat Architecture for high bitrate services
in mobile networks. In: Proc. of PIMRCÂ 08, Cannes, France, pp. 1â 6 (2008 17. Daoud, K.,Herbelin, P.,Guillouard, K.,Crespi, N.:
Performance and Implementation of UFA: a SIP-based Ultra Flat Mobile network Architecture. In: Proc. of PIMRC (Sep. 2009
18. Faigl, Z.,Bokor, L.,Neves, P.,Pereira, R.,Daoud, K.,Herbelin, P.:Evaluation and compari
-son of signaling protocol alternatives for the Ultra Flat Architecture, ICSNC, pp. 1â 9 (2010
Towards Scalable Future Internet Mobility 49 19. Bokor, L.,Faigl, Z.,Imre, S.:A Delegation-based HIP Signaling Scheme for the Ultra Flat
Journal of Computer networks (2011), doi: 10.1016/j. comnet. 2011.02.005 21. Johnson, D.,Perkins, C.,Arkko, J.:
IP Mobility Support in IPV6, IETF RFC 3775 (2004 22. Koodli, R. ed.:Fast Handoffs for Mobile IPV6, IETF RFC 4068 (July 2005
23. Soliman, H.,Castelluccia, C.,El Malki, K.,Bellier, L.:Hierarchical Mobile IPV6 Mobility Management (HMIPV6), IETF RFC 4140 (Aug. 2005
24. Wakikawa, R. ed.:V. Devarapalli, G. Tsirtsis, T. Ernst, K. Nagami: Multiple Care-of
Mobile IPV6 Support for Dual Stack Hosts and Routers, IETF RFC 5555 (June 2009 27.
Proxy Mobile IPV6, IETF RFC 5213 (Aug. 2008 28. Valko: Cellular IP: A New Approach to Internet Host Mobility, ACM SIGCOMM Comp
Commun. Rev. 29 (1), 50-65 (1999 29. Ramjee, R.,Porta, T. L.,Thuel, S.,Varadhan, K.,Wang, S.:
HAWAII: A Domain-Based Approach for Supporting Mobility in Wide-area Wireless Networks. In: IEEE Int. Conf
Network protocols (1999 30. Grilo, A.,Estrela, P.,Nunes, M.:Terminal Independent Mobility for IP (TIMIP.
33. 3gpp TS 23.402, Architecture enhancements for non-3gpp accesses, Rel. 10, V10. 2 (2011
Global HA to HA protocol, IETF Internet -Draft, draft-thubert-nemo-global-haha-02. txt (Sept. 2006
-bility Approach for 3g SAE. In: Proc. of 19th PIMRC, ISBN: 978-1-4244-2643-0 (Sept
The UMTS base station router. Bell labs Tech. Journal, I. 11 (4), 93â 111 (2007 38.
Liu Yu, Zhao Zhijun, Lin Tao, Tang Hui: Distributed mobility management based on flat network architecture. In:
IEEE conference on Global telecommunications (GLOBECOMÂ 09), Honolulu, HI (2009 46. Kassi-Lahlou, M.,Jacquenet, C.,Beloeil, L.,Brouckaert, X.:
Dynamic Mobile IP (DMI IETF Internet-Draft, draft-kassi-mobileip-dmi-01. txt (Jan. 2003
47. Song, M.,Huang, J.,Feng, R.,Song, J.:A Distributed Dynamic Mobility Management Strategy for Mobile IP Networks.
Dynamic Mobility Anchoring, IETF Internet-Draft (May 2010 49. Yan, Z.,Lei, L.,Chen, M.:
Future Wireless communication Systems, Wireless World Research Forum (Oct. 2008 50. Gurtov, A.,et al.:Hi3: An efficient and secure networking architecture for mobile hosts
Journal of Computer Communications 31 (10), 2457â 2467 (2008 J. Domingue et al. Eds.):) Future Internet Assembly, LNCS 6656, pp. 51â 66,2011
 The Author (s). This article is published with open access at Springerlink. com Review and Designs of Federated Management in
Future Internet Architectures Martã n Serrano1, Steven Davy1, Martin Johnsson1, Willie Donnelly1, and Alex Galis2
Telecommunications Software and Systems Group â TSSG, Co. Waterford, Ireland {jmserrano, sdavy, mjohnsson, wdonnelly}@ tssg. org
The Future Internet as a design conception is network and service -aware addressing social and economic trends in a service oriented way.
Future Internet, applications transcend disciplinary and technology boundaries following interoperable reference model (s). In this paper we discuss issues
In Future Internet architectures, service and network requirements act as design inputs particularly on information interoperability
and manageable new Internet reference model is critical for Future Internet re -alisation and deployment.
We address challenges for a future Internet Architec -ture perspective using federation. We also provide, in a form of realistic imple
-ity in the future Internet Keywords: Federation, Management, Reference Model, Future Internet, Archi -tectures and Systems, Autonomics, Service Management, Semantic Modelling
and Management, Knowledge Engineering, Networking Data and Ontologies Future Communications and Internet 1 Introduction In recent years convergence on Internet technologies for communicationâ s, computa
-tionâ s and storageâ s networks and services has been a clear trend in the Information
and Communications technology (ICT) domain. Although widely discussed and 52 M. Serrano et al researched, this trend has not fully run its course in terms of implementation, due to
many complex issues involving deployment of non-interoperable and management infrastructural aspects and also due to technological, social, economic restrictions and
bottlenecks in the future Internet In the future Internet, services and networks follow a common goal: to provide so
-lutions in a form of implemented interoperable mechanisms. Telecommunications networks have undergone a radical shift from a traditional circuit-switched environ
-ment with heavy/complex signalling focused on applications-oriented perspective towards a converged service-oriented space, mostly Internet interaction by customer
as end-user and network operators as service providers. The benefits of this shift re -flect cost reduction and increase systems flexibility to react to user demands, by re
-placing a plethora of proprietary hardware and software platforms with generic solu -tions supporting standardised development and deployment stacks
The Future Internet as design conception is service-aware of the network infra -structure addressing service-oriented, social trends and economic commitments.
In the Future Internet trans-disciplinary solutions (applications that transcend disciplinary boundaries) following reference model (s) are crucial for a realistic integrated man
-agement realisation. Challenges in the future communications systems mainly de -mand, in terms of end user requirements, personalized provisioning, service-oriented
performance, and service-awareness networking Additionally to those technology requirements, necessities to support information interoperability as result of more service-oriented demands exist.
communication systems supporting end user and network requirements. Demands on data models integration are requirements to be considered during the design and im
-plementation phases of any ICT system The emergence and wide-scale deployment of wireless access network technolo
-gies calls into question the viability of basing the future Internet on IP and TCP â
Internet, argue that the future lies in layers of overlay networks that can meet various
-ing Internet. Others initiatives such as Clean slate program 2 Stanford university and Architecture Design Project for New Generation Network 3 argue that the im
core Internet Protocols themselves We argue that service agnostic network design are no longer a way to achieve in
that meet the rapidly changing needs of the communities of users for which the hour
Review and Designs of Federated Management in Future Internet Architectures 53 In this paper service and network requirements 4 5 6 7 8 9 acts as inputs par
-ling communication systems for the Future Internet. We support the idea of interoper -able, extensible, reusable, common and manageable new Internet reference model is
critical for Future Internet realization and deployment. The new Internet reference model must rely on the fact that high-level applications make use of diverse infrastruc
-ture representations and not use of resources directly. So when resources are not being required to support
or deploy services they can be used in other tasks or services. As implementation challenge for controlling
We address challenges for a future Internet Architecture perspective using federation. We also provide, in a form of realistic im
-lenges about Future Internet architectures in terms of cross-domain interoperability Section III presents the rationale about federation as crucial concept in the framework
of this Future Internet research. Section IV presents a Federated Management Refer -ence Model and its implications for networks and services.
and outlook of this research. Finally some bibliography references supporting this research are included 2 Challenges for Future Internet Architectures
This section focuses on interdisciplinary approaches to specify data link and cross -domain interoperability to, collectively, constitute a reference model that can guide the
realisation of future communications environments in the future Internet 4 11 12 13. The Future Internet architecture must provide societal services and,
in doing so support and sustain interactions between various communities of users in straight rela
-tion with communication infrastructure mechanisms. Service-awareness 4 has many aspects to consider as challenges,
communication, storage, content and computation substrata Networking-awareness 4 challenges imply the consumer-facing and the resource
The optimization of resources 15 16 17 using federation in the future Internet relies on classify and identify properly what resources need to be used, thus dynami
3 Rationale for Federation in the future Internet Federation is relatively a new paradigm in communications, currently studied as the
-vices in the future Internet. Federation in the future Internet envisions management systems (networks and services) made up of possibly heterogeneous components
each of which has some degree of local autonomy to realize business goals. Such business goals provide services that transcend legal and organizational boundaries in
Future Internet environments consist of heterogeneous administrative domains each providing a set of different services. In such complex environment, there is no
Review and Designs of Federated Management in Future Internet Architectures 55 authorities in which each domain has a set of limited powers regarding their own
4 Federated Management Activity in the future Internet This section references theoretical foundation for the development of interdiscipli
-nary Future Internet visions about a Federated Management and their implications for networks and services.
In future Internet end user, service, application and network requirements act as guidelines to identify study and clarify part of complex requirements.
-ships between Network Virtualisation and Federation 16 21 22 23 and the rela -tionship between Service virtualisation (service clouds) and federation 17 are the
support of a new world of solutions defining the Future Internet Next generation networks and services 3 4 24 can not be conceived without
systems acting and reacting in a dynamic form to the changes in its surrounding (con
of monitoring/fault data is a problem that has not yet been solved completely here is where federation take place
Management refers to the ability of such systems not just to configure, monitor and control a network element or service,
requirements from different information and data domains. This higher level of ab -straction enables business
resources, the software that manages them, and the actors who direct such manage -ment. In federation management end-to-end communication services involve config
data to guide rapid service innovation Concepts related to Federation such as Management Distribution, Management Con -trol and process representation are clear on their implications to the network manage
Future internet design with service systems using heterogeneous network technologies imply. A clear scenario where federation is being identified as useful mechanism is the
Internet service provisioning, in todayâ s Internet it is observed the growing trend for services to be provided both
Review and Designs of Federated Management in Future Internet Architectures 57 to offer âoecommonâ and âoeagreedâ services even with many technological restrictions
the current Internet typical large enterprise systems contain thousands of physically distributed software components that communicate across different networks 27 to
satisfy end-to-end services client requests. Given the possibility of multiple network connection points for the components cooperating to serve a request (e g.,
-nents may be deployed in different data centres), and the diversity on service demand and network operating conditions, it is very difficult avoid conflicts 14 20 28
the Future Internet. We are exploring how the definition and contractual agreements between different enterprises (1. Definition) establish the process for monitoring
2. Observation) and also identify particular management data at application, service middleware and hardware levels (3. Analysis) that can be gathered, processed, aggre
-gated and correlated (4. Mapping) to provide knowledge that will support management operations of large enterprise applications (5. Federated Agreements) and the network
data at the network and application level can be used to generate knowledge that can be used to support enterprise application management in a form of control loops in the
a feature necessary in the future Internet service provisioning process 7. Federated Decisions. Thus infrastructure can be re-configurable and adaptive to
high level representation and mapping of data and information. Negotiations in form of data representation between different data and information models by
components in the system (s) are associated to this feature â¢Management Control-Administration functionality for the establishment of
Review and Designs of Federated Management in Future Internet Architectures 59 5 Federated Management Architecture
architectures in the future Internet. These designs about architecture for the federated reference model by functional blocks addresses the specification of mechanisms in
-cluding models, algorithms, processes, methodologies and architectures. The func -tional architecture collectively constitute, in terms of implementation efforts, frame
communities of users (heterogeneous data & infrastructure The federated architecture must be enabled for ensuring the information is avail
formal manner, information and data can be integrated, and the power of machine -based learning and reasoning can be exploited more fully.
and its formalisms 29 30, such as FOCALE 25 and Autoi 21 23 translate data from a device-specific form to a device-and technology-neutral form to facilitate its
architecture, information is used to relate knowledge, rather than only map data, at different abstractions and domain levels corelating independent events each other in
-Review and Designs of Federated Management in Future Internet Architectures 61 agement distribution. Such regulations must be deployed with no further considera
-to end delivery of services to end-users. Furthermore, there are challenges relating to securing the delivery of services across (possible multiple) wireless mesh infrastruc
Typical large enterprise systems contain thousands of physically distributed software components that communicate across different networks to satisfy client requests
The complex nature of user requests can result in numer -ous traffic flows within the networks that can not be correlated with each other, thus
that will enable enterprise application management systems to reconfigure software components to better adapt applications to prevailing network conditions.
applications, to participative applications including blogs, wikis, online social net -works, RSS feeds, Instant Messaging, P2p applications, online gaming and increas
Particularly as users have been empowered to mix and match applications to create customised functionality (e g. mash-ups). Similarly
) Value networks share with Web 2. 0 application users a concern with value of interacting effectively with rest of the network community (federation
-Review and Designs of Federated Management in Future Internet Architectures 63 bers. Value networks of customers can only properly be served by federated service
-tween telecommunications network management systems and devices. In particular, it is important to develop methods (management functions) through which network
correlation techniques that can process relevant data in a timely and decentralised manner and relay it as appropriate to management federated making functions are
7 Summary and Outlook In the future Internet new designs ideas of Federated Management in Future Internet
Architectures must consider high demands of information interoperability to satisfy service composition requirements being controlled by diverse, heterogeneous systems
Future Internet architectures emerges as an alternative to address this complex prob -lem in the future Internet of networks and services
We have studied how federation brings support for realisation on the investigated solution (s) for information interoperability and cross-domain information sharing
controlling communication systems in the future Internet. Additional issues such as service representation and networks information can facilitate service composition
â¢Algorithms and processes to allow federation in enterprise application systems to visualize software components, functionality and performance
â¢Techniques for analysis, filtering, detection and comprehension of monitoring data in federated enterprise and networks
â¢Algorithms and processes to allow federated application management systems reconfigure or redeploy software components realizing autonomic application
functionality â¢Guidelines and exemplars for the exchange of relevant knowledge between net -work and enterprise application management systems
This paper makes references to design foundations for the development of federated autonomic management in architectures in the future Internet.
Scenarios has been shortlisted to identify challenges and provide research results about what information enterprise application management systems can provide to federate management sys
1. NSF-funded initiative to rebuild the Internet (Online: Oct. 2010 http://www. geni. net
Review and Designs of Federated Management in Future Internet Architectures 65 4. Galis, A.,et al.:
Future Internet Position Paper: System Functions, Capabilities and Requirements (Invited paper). ) In: IEEE 2009 Fourth International Conference on Communications and Network
Future Generation Internet Architecture. Newarch Final Technical Report, http://www. isi. edu/newarch /6. van der Meer, S.,Davy, A.,Davy, S.,Carroll, R.,Jennings, B.,Strassner, J.:
Autonomic Networking and Communication, Birkhã¤user, Basel (2008 8. Raymer, D.,van der Meer, S.,Strassner, J.:
From Autonomic Computing to Autonomic Networking: an Architectural Perspective. In: Proc. of 5th IEEE Workshop on Engineering
Rethinking the design of the Internet: the end to end arguments vs. the brave new world. ACM Transactions on Internet Technology 1 (1)( 2001
11. Subharthi, P.,Jianli, P.,Raj, J.:Architectures for the Future Networks and The next Generation Internet:
A Survey. Computer Communications (July 2010), 63 pp http://www1. cse. wustl. edu/jain/papers/ftp/i3survey. pdf
12. Curran, K.,Mulvenna, M.,Galis, A.,Nugent, C.:Challenges and Research Directions in Autonomic Communications.
International Journal of Internet Protocol Technology IJIPT) 2 (1)( 2006 13. Rubio-Loyola, J.,Astorga, A.,Serrat, J.,Chai, W. K.,Mamatas, L.,Galis, A.,Clayman, S
Cheniour, A.,Lefevre, L.,Fischer, A.,Paler, A.,Al-Hazmi, Y.,de Meer, H.:Platforms and
Software systems for an Autonomic Internet. In: IEEE Globecom 2010, Miami, USA, 6 -10 december (2010 14.
Autonomic Network Management in the future Internet. In: Manfi workshop, June, NY USA (2009 15. Strassner, J. C.,Foghlã, M. Ã.,Donnelly, W.,Serrat, J.,Agoulmine, N.:
Inference Plane to Support The next Generation Internet. In: IEEE GIIS 2007,2-6 july (2007 17. Galis, A.,Denazis, S.,Brou, C.,Klein, C.:
-porting Integrated Management Tasks in the future Internet. In: 1st IFIP/IEEE Manfi Intl Workshop, In conjunction 11th IEEE IM2009, Long island, NY, USA, June 2009, IEEE
Computer Society Press, Los Alamitos (2009 19. Brennan, R.,Feeney, K.,Keeney, J.,Oâ Sullivan, D.,Fleck II, J.,Foley, S.,van der Meer
of Autonomic Management in the future internet. In: IEEE/IFIP Network Operations & Management Symposium, NOMS 2010, Osaka, Japan, 19-23 april (2010
Autonomic Internet A Perspective for Future Internet Services Based on Autonomic Principles. In: 2007 IEEE Management Week â Manweek 2007 2nd IEEE MACE 2007 Workshop, San Josã, CA
USA, 29 oct. â 2 nov (2007 22. Rochwerger, B.,et al.:An Architecture for Federated Cloud computing. In:
Cloud Com -puting: Principles and Paradigms, Wiley, ISBN: 0470887990 (April 2011 23. Galis, A.,et al.:
Management Architecture and Systems for Future Internet Networks. In Towards the Future Internet â A European Research Perspective, p. 350.
IOS Press, Am -sterdam (2009 24. Feldmann, A.:Internet clean-slate design: what and why? ACM SIGCOM Computer
Communication Review 37 (3)( 2007 25. Strassner, J.,Agoulmine, N.,Lehtihet, E.:FOCALE â A Novel Autonomic Networking
Architecture. ITSSA Journal 3 (1), 64â 79 (2007 26. Foley, S n.,Zhou, H.:Authorisation Subterfuge by Delegation in Decentralised Networks
In: Proc. of the 13th International security Protocols Workshop, Cambridge, UK (April 2005 27. Jennings, B.,et al.:
Service Operations in Autonomic Communication systems. Phd Thesis, UPC (2008 31. Univerself Project (January 2011), http://www. univerself-project. eu
) Future Internet Assembly, LNCS 6656, pp. 67â 80,2011 Â The Author (s). This article is published with open access at Springerlink. com
An Architectural Blueprint for a Real-world Internet Alex Gluhak1, Manfred Hauswirth2, Srdjan Krco3, Nenad Stojanovic4, Martin Bauer5
Numerous projects in the area of Real-world Internet (RWI), Internet of Things (Iot), and Internet Connected Objects have proposed architectures
for the systems they develop. All of these systems are faced with very similar problems in their architecture and design and interoperability among these sys
-tems is limited. To address these issues and to speed up development and de -ployment while at the same time reduce development and maintenance costs
Real-world Internet, Internet of things, Internet Connected Objects Architecture 1 Introduction Devices and technologies ubiquitously deployed at the edges of the networks will
foundations for the Real-world Internet (RWI Leveraging the collective effort of several projects over the last number of years
SENSEI, ASPIRE, IOT-A, PECES, CONET, SPITFIRE, Semsorgrid4env, this chapter presents the current status of the work aimed at definition of an RWI refer
The core contribution of this paper is the distillation of an initial model for RWI based on an analysis of these state of art architectures and an under
â¢An identification of a core set of functions and underlying information models operations and interactions that these architecture have in common
2 The Real world Internet Since the introduction of the terminology over a decade ago, the"Internet of things
Iot)" has undergone an evolution of the underlying concepts as more and more rele -vant technologies are maturing.
The initial vision was of a world in which all physical objects are tagged by Radio frequency identification (RFID) transponders in order to
be identified uniquely by information systems. However, the concept has grown into multiple dimensions, encompassing sensor networks able to provide real world intel
-ligence or the goal-oriented autonomous collaboration of distributed objects via local wireless networks or global interconnections such as the Internet
Kevin Ashton, former Director of the Auto-ID Center, once famously formulated âoeadding radiofrequency identification and other sensors to everyday objects will create
an Internet of things, and lay the foundations of a new age of machine perceptionâ We believe that machine perception of the real world is still at the heart of the
Internet of things, no matter what new technologies have meanwhile become avail -able to enable it. As such, one of the key roles of the Internet of things is to bridge
the physical world and its representation in the digital world of information systems enabling what we refer to in part of the Future Internet Assembly (FIA) community as
the so called Real world Internet (RWI The RWI is the part of a Future Internet that builds upon the resources provided by
the devices HAL of the Internet of things, offering real world information and in -teraction capabilities to machines, software artifacts and humans connected to it
The RWI assumes that the information flow to and from Iot devices is taking place via local wired and wireless communication links between devices in their prox
-imity and/or through global interconnections in the form of the current Internet and mobile networks or future fixed and mobile network infrastructures
One important property of the RWI which distinguishes it from the current Internet is its heterogeneity, both regarding the types of devices as well as communication
protocols used. IPV6 and in particular 6lowpan play an important role, but other proprietary wireless protocols will see continued use as well.
To deal with this het -erogeneity, services â in the form of standard Web Services and DPWS1, but more
likely using RESTFUL approaches and application protocols like Coap â provide a useful abstraction. As services play a pivotal role in the future Internet Architecture
the use of services for integrating the RWI also fits well into the overall architectural
picture. One has to keep in mind though that RWI services have some different prop -erties from common, enterprise-level services:
They are of lower granularity, e g.,, just providing simple sensor readings and, more importantly, they are inherently unreli
-able; such RWI services may suddenly fail and the data they deliver has to be associ
-ated with some quality of information parameters before further processing 1 Device Profile for Web Services
An Architectural Blueprint for a Real-world Internet 69 3 Reference Architecture In this section we present an initial model on which several of the current RWI archi
-tecture approaches are based. While not as comprehensive as a reference architecture it already identifies the major underlying system assumptions and architectural arti
-facts of the current RWI approaches. The model has been developed through a careful analysis of the existing RWI architectures according to the following dimensions
1. Underlying system assumptions 2. functional coverage of the services provided by the architectures 3. underlying information models in the architectures, and
4. operations and interactions supported in these architectures 3. 1 Underlying RWI Architecture Assumptions Common to all RWI architectures is the underlying view of the world,
which is di -vided into a real and a digital world as depicted in Fig. 1. The real world consists of
c) Resource Users which represent the physical people or application software that intends to interact with Resources and Eoi
physical and the digital world by allowing users/applications to interact with the Re -sources and Eoi is the main contribution of the RWI reference architecture towards a
RFID actuator sensor sensor Entity-based Context Model models relevant aspects of Real world Real-world Internet
Association of resources to modelled entities Resources Identify measure, observe or interact Fig. 1. World-view of RWI systems
On the resource level, resource users directly interact with resources. Such interac -tions are suitable for certain types of RWI applications where the provided informa
3. Resource Users who are the main users of the resources or architectural services 3. 1 Functional Coverage of RWI Architectures
resource users and the corresponding business roles inside the RWI ecosystem Resource discovery is one of the basic services RWI architectures provide for re
It allows resource users to lookup and find resources that are made available by resource providers in an RWI community.
Resource users specify characteristics of a resource, e g.,, the identifier or type they are interested in, and
It allows resource users to directly access context information in the RWI concerning Eois or find resources from which such
It allows resource users to declaratively specify simple or complex actuation requests or expected outcomes of actuations on an Eoi
The respective functions ensure that resource users are provided with an adequate set of resources able to achieve the specified objectives
-An Architectural Blueprint for a Real-world Internet 71 namic instantiation of resources (e g.,, processing services) on resource hosts in order
between resources and resource users, in particular if these interactions span multiple resources. Longer lasting interactions may require adaptation of the interactions to
complexity from the resource user Access control functionality is essential to ensure that only authorized resource us
users at request time and subsequent authorization of resource usage. Another aspect of resource access is access arbitration,
-thorized users. This requires mechanisms to resolve contention if multiple conflicting requests are made including preemption and prioritization
Based on the accounting model, resource users can be charged for the access to resources or provided information and actuation services
At its core, the proposed architectural model defines a set of entities and their rela
-tion capabilities comparable to web resources in the current web architecture. In the same way as a web user interacts with a web resource, e g.,
, retrieve a web page, the user can interact with the real-world resources, e g.,, retrieve sensor data from a sen
-sor. However, while the concept of the web resource refers to a virtual resource iden
-tified by a Universal Resource Identifier (URI), a resource in the RWI context is an
abstraction for a specific set of physical and virtual resources The resources in the Smart Object model abstract capabilities offered by real-world
entities such as sensing, actuation, processing of context and sensor data or actuation loops, and management information concerning sensor/actuator nodes, gateway devices
or entire collections of those. Thus a resource has a manifestation in the physical world
resources and the software components implementing the interaction endpoints from the user perspective (Resource End point â REP). Furthermore, the model distin
-guishes between the devices hosting the resources (Resource Host) and the network devices hosting the respective interaction end points (REP Host.
A REP is a software component that represents an interaction end-point for a physical resource.
In comparison to the current web architecture, REPS can be considered equivalent to web resources, which are identified uniquely by a URI
The device hosting a resource is referred to as the Resource Host. Sensor nodes are typical examples for resource hosts,
role, for example, mobile phones or access points that embed resources. A REP Host is a device that executes the software process representing the REP
As mentioned before, the resources and REPS are separated conceptually from their hosts to facilitate different deployment options.
-bile phone. Similarly, there may be cases where the REP is not hosted on the resource
host itself, for example, a computer in the network or an embedded server may act as the REP host for a resource,
which is physically hosted on a sensor node connected to it This distinction is important when mobility, disconnections and other system dynamics
-sor nodes, from attacks by hosting their REPS on more powerful hardware Unlike other models, the Smart Object model considers also real-world entities in
An Architectural Blueprint for a Real-world Internet 73 users or applications. A resource in the Smart Object model thus provides (context
information or interaction capabilities concerning associated real-world entities 3. 3 Interaction Styles The classes of system functions described in Section 2. 1 may be realized through
Interactions among resources and resource users can be 1: 1, 1: n or m: n
In a Radio frequency identification (RFID) based sce -nario, the tags act as hosts for the resources in form of Electronic Product Codes
e g. sensor data. The resource hosts are abstracted through the RFID readers due to the passive communication of the tags.
The Object Naming Service (ONS) corre -sponds to the Entity Directory that returns the URLS of relevant resources for the EPC
logic for interactions using semantics of the specific RFID application. Query plan -ning is done through the definition of an ECSPEC
The system is based on the OSGI service middleware and consists of two main sub systems: the service platform openaal and the
An Architectural Blueprint for a Real-world Internet 75 services like context management for collecting and abstracting data about the envi
-ronment, workflow based specifications of system behaviour and semantically -enabled service discovery. Framework and platform services are coupled loosely by
User and RWI Entities of Interest (Entities of Interest) are analogous to the contextual information provided by AAL contextual manager.
The PECES architecture PECES provides a comprehensive software layer to enable the seamless cooperation of embedded devices across various smart spaces on a
supporting nomadic users and remote collaboration among objects in different smart spaces in a seamless and automatic way.
The PECES middleware architecture enables dynamic group-based communication between PECES applications (Resources) by utilizing contextual information based on a flexible context ontology.
-sources are not directly analogous to PECES middleware instances, gateways to these devices are more resource-rich
and can host middleware instances, and can be queried provided that an application-level querying interface is implemented.
must be running the PECES middleware before any interaction may occur. Both one-shot and continuous interactions are supported
use of sensor-based, streaming and static data sources in manners that were not neces
or the data sources made available. The architecture may be applied to almost any type of real world entity
streaming data sources, normally containing historical information from sensors; and even relational databases, which may contain any type of information from the digital world (hence
resource hosts are multiple. These resources are made available through a number of data-focused services (acting as resource endpoints),
which are based on the WS-DAI specification for data access and integration and which are supported by the Semsor
-Grid4env reference implementation. These services include those focused on data registration and discovery (where a spatiotemporal extension of SPARQL â
stsparql-,is used to discover data sources from the Semsorgrid4env registry data access and query (where ontology-based and non-ontology-based query lan
-guages are provided to access data: SPARQL-Stream and SNEEQL â a declarative continuous query language over acquisition sensor networks, continuous streaming
data, and traditional stored data), and data integration (where the ontology-based SPARQL-Stream language is used to integrate data from heterogeneous and multi
-modal data sources. Other capabilities offered by the architecture are related to sup -porting synchronous and asynchronous access modes, with subscription/pull and
push-based capabilities, and actuating over sensor networks, by in-network query processing mechanisms that take declarative queries
and transform them into code that changes the behavior of sensor networks. Context information queries are sup
-ported by using ontologies about roles, agents, services and resources 4. 5 SENSEI The SENSEI architecture SENSEI aims at integrating geographically dispersed and
internet interconnected heterogeneous WSAN (Wireless Sensor and Actuator Net -works) systems into a homogeneous fabric for real world information and interaction
It includes various useful services for both providers and users of real world resources to form a global market space for real world information and interaction.
SENSEI takes a resource oriented approach which is inspired strongly by service oriented principles and semantic web technologies.
In the SENSEI architecture each real world resource is described by a uniform resource description, providing basic and semanti
-cally expressed advanced operations of a resource, describing its capabilities and REP information. These uniform descriptions provide the basis for a variety of different
supporting services that operate upon. On top of this unifying framework SENSEI builds a context framework, with a 3 layer information model.
One of the key support services is a rendezvous mechanism that allows resource users to discover and query
resources that fulfill their interaction requirements. At lower level this is realized by a federated resource directory across different administrative domains.
An Architectural Blueprint for a Real-world Internet 77 architecture provides a semantic query support, allowing resource users to declara
-tively express context information or actuation tasks. Using a semantic query resolver and the support of an entity directory (in which bindings of real world resources and
-tecture supports both onetime and longer lasting interactions between resource users and resource providers, that can be streaming
a security token service for resource users and AAA (Authentication, Authorization and Accounting) service to enforce access at the access controlled entities covering
this chapter, the most prominent being SPITFIRE SPITFIRE and Iot-A Iot-A as these projects have started just and have not produced architectures yet,
SPITFIRE aims at extending the Web into the embedded world to form a Web of
Things (Wot), where Web representations of real-world entities offer services to access and modify their physical state
traditional services and data available in the Web. SPITFIRE extends the architectural model of this chapter by its focus on services,
-constrained devices, its extensive use of existing Web standards such as RESTFUL interfaces and Linked Open Data,
along with semantic descriptions throughout the whole architecture The Iot-A project extends the concepts developed in SENSEI further to provide a
unified architecture for an Internet of things. It aims at the creation of a common architectural framework making a diversity of real world information sources such as
wireless sensor networks and heterogeneous identification technologies accessible on a Future Internet. While addressing various challenges ZGL+,it will provide key
building blocks on which a future Iot architecture will be based, such as a global resolution infrastructure that allows Iot resources to be resolved dynamically to enti
-ties of the real world to which they can relate 78 A. Gluhak et al 4. 7 Summary of Project Realizations
Table 2a. Functional coverage of current RWI architecture approaches LL A A L U si
PC IS w hi ch st or es W H A T W H ER
An Architectural Blueprint for a Real-world Internet 79 Table 2b. Functional coverage of current RWI architecture approaches
The work on the Iot reference architecture will continue to be driven by the RWI group of the FIA in collaboration with the FP7 IOT-i coordinated action project
http://www. iot-i. eu) and the IERC, the European Research Cluster on the Internet of
Things (http://www. internet-of-things-research. eu/).The results will be contributed to the FIA Architecture track.
It is expected that the final architecture will be ready by the end of 2011 Open Access.
ASPIRE Advanced Sensors and lightweight Programmable middleware for Innovative RFID Enterprise applications, FP7, http://www. fp7-aspire. eu
/CONET Cooperating Objects Noe, FP7 http://www. cooperating-objects. eu /EPC EPCGLOBAL: The EPCGLOBAL Architecture Framework 1. 3 march 2009
The Things in the Internet of things. Poster at the Internet of Things Conference, Tokyo (Iot, 2010)( 2010), available at http://www
iot-a. eu/public/news/resources/Thethingsintheinternetof Things sh. pdf Accessed Jan 24, 2011 Iot-A EU FP7 Internet of things Architecture project
http://www. iot-a. eu/public LLAAL FZI Living Lab AAL, http://aal. fzi. de
/PECES PERVASIVE Computing in Embedded systems, FP7 http://www. ict-peces. eu /Semsorgrid4env Semantic Sensor Grids for Rapid Application Development for Environ
-mental Management, FP7, http://www. semsorgrid4env. eu /SENSEI Integrating the Physical with the Digital World of the Network of the Fu
-ture, FP7, http://www. ict-sensei. org SPITFIRE Semantic-Service Provisioning for the Internet of things using Future
Internet Research By experimentation, FP7, http://www. spitfire -project. eu /ZGL+Zorzi, M.,Gluhak, A.,Lange, S.,Bassi, A.:
From Todayâ s INTRANET of Things to a Future INTERNET OF THINGS: A Wireless-and Mobility-Related
View. IEEE Wireless communications 17 (6)( 2010 J. Domingue et al. Eds.):) Future Internet Assembly, LNCS 6656, pp. 81â 90,2011
 The Author (s). This article is published with open access at Springerlink. com Towards a RESTFUL Architecture for Managing a Global
Distributed Interlinked Data-Content-Information Space Maria Chiara Pettenati, Lucia Ciofi, Franco Pirri, and Dino Giuli
Electronics and Telecommunications Department, University of Florence, Via Santa marta, 3 50139 Florence, Italy {mariachiara. pettenati, lucia. ciofi, franco. pirri
dino. giuli}@ unifi. it Abstract. The current debate around the future of the Internet has brought to
front the concept of âoecontent-Centricâ architecture, lying between the Web of Documents and the generalized Web of Data, in which explicit data are embed
-ded in structured documents enabling the consistent support for the direct ma -nipulation of information fragments.
In this paper we present the Interdatanet IDN) infrastructure technology designed to allow the RESTFUL management of
interlinked information resources structured around documents. IDN deals with globally identified, addressable and reusable information fragments;
it adopts an URI-based addressing scheme; it provides a simple, uniform Web-based in
-terface to distributed heterogeneous information management; it endows infor -mation fragments with collaboration-oriented properties, namely:
privacy, li -censing, security, provenance, consistency, versioning and availability; it glues together reusable information fragments into meaningful structured and inte
-grated documents without the need of a predefined schema Keywords: Web of Data; future Web;
Linked Data; RESTFUL; read-write Web collaboration 1 Introduction There are many evolutionary approaches of the Internet architecture
which are at the heart of the discussions both in the scientific and industrial contexts:
Web of Data/Linked Data, Semantic web, REST architecture, Internet of Services, SOA and Web Services and Internet of things approaches.
Each of these approaches focus on specific aspects and objectives which underlie the high level requirements of being a
driver towards âoea better Internetâ or âoea better Webâ Three powerful concepts present themselves as main drivers of the Future Internet
1 2. They are: a user-centric perspective, a service-centric perspective and a content
-centric perspective. The user-centric perspective emphasizes the end-user experience as the driving force for all technological innovation;
the service-centric perspective is currently influenced in enterprise IT environment and in the Web2. 0 mashup culture
showing the importance of flexibly reusing service components to build efficient appli -cations. The Content-Centric perspective leverages on the importance of creating, pub
-82 M. C. Pettenati et al lishing and interlinking content on the Web and providing content-specific infrastruc
-tural services for (rich media) content production, publication, interlinking and con -sumption. Even if it is very difficult to provide a strict separation of approaches because
either they are positioned often or have evolved touching blurred areas between Con -tent, Services and User perspectives, a rough schema in Table 1 can provide highlights
the main, original, driving forces of such approaches Table 1. Rough classification of main driving forces in current Future Network evolutionary
Content-centric Service-centric Users-centric Approaches Web of Data /Linked Data REST Internet of
Services WS -*SOA Web 2. 0 Web 3. 0 Semantic web Internet of things The three views can be interpreted as emphasizing different aspect rather than ex
-pressing opposing statements. Hence, merging and homogenizing towards an encom -passing perspective may help towards the right decision choice for the Future Internet
Such an encompassing perspective has been discussed in terms of high-level general architecture in 1 and has been named âoecontent-Centric Internetâ.
At the heart of this architecture is the notion of Content, defined as âoeany type and volume of raw infor
-mation that can be combined, mixed or aggregated to generate new content and me -diaâ which is embedded in the Content Object, âoethe smallest addressable unit man
-aged by the architecture, regardless of its physical locationâ. In such an high-level platform, Content and Information are separate concepts 3
and Services are built as a result of a set of functions applied to the content, to pieces of information or ser
-vices. As a consequence of merging the three views (user, content, service-oriented the Future Internet Architecture herewith described essentially proposes a Virtual
Resources abstraction required for the Content-Centric approach. Another view of âoecontent-centric Internet architectureâ is elaborated in 2 by Danny Ayers, based on
the assumption that âoewhat is missing is the ability to join information pieces together and work more on the level of knowledge representationâ.
Ayersâ proposal is there -fore a âoetransitional Webâ lying between the Web of Documents and the generalized
Web of Data in which explicit data are embedded in documents enabling the consis -tent support for the direct manipulation of information as data without the limitation
of current data manipulation approaches. To this end, Ayers identifies the need to find and develop technologies allowing the management of âoemicro-contentâ i e. sub
-document-sized chunks (information/document fragments), in which content being managed and delivered is associated with descriptive metadata
Abstracting from the different use of terms related to the concepts âoedataâ, âoecon -tentâ and âoeinformationâ which can be found in literature with different meanings 4
small, Web-wide addressable data/content/information unit which should be organ -ized according a specific model and handled by the network architecture so as to
Managing a Global Distributed Interlinked Data-Content-Information Space 83 provide basic Services at an âoeinfrastructural levelâ which in turn will ground the de
-velopment of Applications fulfilling the user-centric needs and perspectives. Among the different paths to the Web of Data the one most explored is adding explicit data to
content. Directly treating content as data has had instead little analysis In this paper we discuss evolution of Interdatanet (IDN) an high-level Resource
Oriented Architecture proposed to enable the Future Internet approaches (see 5 6 and references therein
Interdatanet is composed of two main elements: the IDN-Information Model and the IDN-Service Architecture.
4. the Web-wide scalability of the approach The purpose of this paper is to show that Interdatanet can provide a high-level model
of the Content-Centric Virtualized Network grounding the Future Internet Architec -ture. For such a purpose Interdatanet can provide a Content-Centric abstraction level
Fig. 1. Interdatanet architecture situated with respect to the Future Internet architecture envis -aged in 7 84 M. C. Pettenati et al
though aiming at dealing with distributed granular content over the Web, suffer from a main limitation:
the more we get away from the data and move into the direction of information, the fewer available solutions are there capable of covering the following
â the Web-wide scalability of the approach This consolidates the need to look for
as in Web of Data 2. IDN adopts an URI-based addressing scheme (as in Linked Data
3. IDN provides simple a uniform Web-based interface to distributed heterogeneous data management (REST approach
4. IDN provides-at an infrastructural level-collaboration-oriented basic services namely: privacy, licensing, security, provenance, consistency, versioning and
availability 5. IDN glues together reusable information fragments into meaningful structured and integrated documents without the need of a predefined schema
such as Linked Data, RESTFUL Web Services, Internet of Service, Internet of things 2. 1 The Interdatanet Information Model and Service Architecture
Managing a Global Distributed Interlinked Data-Content-Information Space 85 IDN-SA (Interdatanet Service Architecture.
users to âoeactâ on pieces of information and documents. The IDN-SA implements the reference functionalities defining subsystems, protocols and interfaces for IDN docu
data model (see Figure 3) to describe interlinked data representing a generic docu -ment model in IDN and is the starting point from
Generic information modeled in IDN-IM is formalized as an aggregation of data units. Each data unit is assigned at least with a global identifier
and contains generic data and metadata; at a formal level, such data unit is a node in a Directed Acyclic
Graph (DAG. The abstract data structure is named IDN-Node. An IDN-Node is the âoecontent-itemâ handled by the âoecontent-centricâ IDN-Service Architecture.
The de -gree of atomicity of the IDN Nodes is related to the most elementary information
fragment whose management is needed in a given application. The information frag -ment to be handled in IDN-IM compliant documents,
data units is composed of nodes related to each other through directed âoelinksâ. Three main link types are defined in the Information Model
-pressed by the âoehrefâ attribute in HTML tags inherently incorporate different âoemean -ingsâ of the link:
Managing a Global Distributed Interlinked Data-Content-Information Space 87 Replica Management (RM) provides a delocalized view of the resources to the upper
identify the resources within IDN-middleware independent of their physical locations in the lower layer are used Uniform Resource Locators (URL) to identify resource
The implementations of IDN-SA are a set of different software modules, one mod -ule for each layer.
Each module, implemented using an HTTP server, will offers a REST interface. The interaction between IDN-compliant applications and IDN-SA
therefore be enabled to the manipulation of data on a global scale within the Web REST interface has been adopted in IDN-SA implementation as the actions al
-lowed on IDN-IM can be translated in CRUD style operations over IDN-Nodes with the assumption that an IDN-document can be thought as an IDN-Node resources
which are coded in an âoeidn/XML formatâ (data format defined with XML language Every resource in such format must be well formed with respect to XML syntax, and
Managing a Global Distributed Interlinked Data-Content-Information Space 89 without the need to achieve the complete development of the architecture before its
The presented approach is not an alternative to current Web of Data and Linked Data
approaches rather it aims at viewing the same data handled by the current Web of
Data from a different perspective, where a simplified information model, representing only information resources, is adopted
naming convention or suggesting new methods of handling data, relying on standard Web techniques Interdatanet could be considered to enable a step ahead from the Web of Docu
-ment and possibly grounding the Web of Data, where an automated mapping of IDN -IM serialization into RDF world is made possible using the Named Graph approach
9. Details on this issue are beyond the scope of the present paper The authors are aware that the IDN vision must be confronted with the evaluation
of the proposed approach. Providing demonstrable contribution to such a high level goal is not an easy task,
Web 11; c) the adoption of a RESTFUL Web Services, also known as ROA â Re -source Oriented Architecture to leverage on REST simplicity (use of well-known
standards i e. HTTP, XML, URI, MIME), pervasive infrastructure and scalability The current state of Interdatanet implementation and deployment, is evolving along
The implemented Web application allows Public Officers to assess current citizensâ official residence address requesting certificates to the entitled body, i e. the
the Application level because it offers infrastructural enablers to Web-based interop -eration without requiring major preliminary agreements between interoperating par
-ties thus providing a contribution in the direction of taking full advantage of the Web
of Data potential Acknowledgments. We would like to acknowledge the precious work of Davide Chini, Riccardo Billero, Mirco Soderi, Umberto Monile, Stefano Turchi, Matteo
Towards a Content-Centric Internet. In: Tselentis, G.,Galis, A.,Gavras, A.,Krco, S.,Lotz
Towards the Future Internet-Emerging Trends from European Research, pp. 227â 236. IOS Press, Amsterdam (2010
2. Ayers, D.:From here to There. IEEE Internet Comput 11 (1), 85â 89 (2007 3. European commission Information Society and Media.
Future Networks The way ahead European communities: Belgium (2009 4. Melnik, S.,Decker, S.:A Layered Approach to Information Modeling and Interoperability
on the Web. In: Proceedings ECDLÂ 00 Workshop on the Semantic web, Lisbon (September 2000 5. Pettenati, M. C.,Innocenti, S.,Chini, D.,Parlanti, D.,Pirri, F. 2008) Interdatanet:
A Data Web Foundation For The Semantic web Vision. Iadis International Journal On Www /Internet 6 (2 december 2008
6. Pirri, F.,Pettenati, M. C.,Innocenti, S.,Chini, D.,Ciofi, L.:Interdatanet: a Scalable Mid
-dleware Infrastructure for Smart Data Integration, in D. In: Giusto, D.,et al. eds.)) The Internet of things:
20th Tyrrhenian Workshop on Digital communications, Springer, Hei -delberg (2009), doi: 10.1007/978-1-4419-1674-7 12
7. Zahariadis, T.,Daras, P.,Bouwen, J.,Niebert, N.,Griffin, D.,Alvarez, F.,Camarillo, G
Towards a Content-Centric Internet Plenary Keynote address. Presented at Future Internet Assembly (FIA) Valencia, SP, 15-16 april (2010
8. Richardson, L.,Ruby, S.:RESTFUL Web Services; Oâ Reilly Media, Inc.:Sebastopol, CA USA (2007
9. Carroll, J. J.,Bizer, C.,Hayes, P.,Stickler, P.:Named graphs, provenance and trust.
In Proceedings of the 14th international conference on World wide web-WWW â 05. Pre -sented at the 14th international conference, Chiba, Japan, p. 613.
Chiba, Japan (2005 doi: 10.1145/1060745.1060835 10. Zweben, S. H.,Edwards, S. H.,Weide, B. W.,Hollingsworth, J. E.:
and Encapsulation on Software Development Cost and Quality. IEEE Trans. Softw Eng. 21 (3), 200â 208 (1995
Web of Data. âoeoh â it is data on the Webâ posted on April 14, 2010;
-it-is-data-on-the-web /J. Domingue et al. Eds.):) Future Internet Assembly, LNCS 6656, pp. 91â 102,2011
 The Author (s). This article is published with open access at Springerlink. com A Cognitive Future Internet Architecture
Marco Castrucci1, Francesco Delli Priscoli1, Antonio Pietrabissa1, and Vincenzo Suraci2 1 University of Rome âoela Sapienzaâ, Computer and System Sciences Department
Via Ariosto 25,00185 Rome, Italy {castrucci, dellipriscoli, pietrabissa}@ dis. uniroma1. it 2 Universitã degli studi e-Campus
-chitecture for the Future Internet (FI), which is based on so-called Cognitive Managers. The objective of the proposed architecture is twofold.
Future Internet architecture, Cognitive networks, Virtualization, In -teroperation 1 Introduction Already in 2005, there was the feeling that the architecture and protocols of the Inter
-net needed to be rethought to avoid Internet collapse 1. However, the research on Future Internet became a priority only in the last five years, when the exponential
growth of small and/or mobile devices and sensors, of services and of security re -quirements began to show that current Internet is becoming itself a bottleneck.
Two main approach have been suggested and investigated: the radical approach 2, aimed at completely redesign the Internet architecture,
and the evolutionary approach 3 trying to smoothly add new functionalities to the current Internet towards
Right now, the technology evolution managed to cover the lacks of current Internet architecture, but, probably, the growth in Internet-aware devices and the always more
demanding requirements of new services and applications will require radical archi -tecture enhancements very soon.
This statement is proved by the number of financed projects both in the USA and in Europe
92 M. Castrucci et al In the USA, there are significant initiatives. Nets 4 (Networking Technology and Systems) was a program of the National Science Foundation (NSF) on network
-ratory for at scale experimentation of network science, based on a 40 Gbps real infra -structure.
platforms available to the research and user communities In Europe, Future Internet research has been included as one of the topics in FP6
and FP7. European initiatives appear less prone to a completely clean-state approach with respect of USA ones,
applications by utilizing the current Internet infrastructure. For instance, G-Lab 8 Design and experiment the network of the future,
platform for Future Internet studies, includes both research studies of Future Internet technologies and the design and setup of experimental facilities.
Group for the Future Internet, France) and Internet del Futuro 10 (Spain) promotes cooperation based on several application areas (e g.,
testbeds for Future Internet technologies The contribution of this Chapter is the proposal of a Future Internet architecture
which seamlessly cope with the evolutionary approach but is also open to innovative technologies and services. The main idea is to collect
, users, contents, services, network re -sources, computing resources, device characteristics) via virtualization and data min
-ing functionalities; the metadata produced in this way are then input of intelligent cognitive modules which provide the applications/services with the required function
-alities in order to maximize the user Quality of Experience with the available re -sources The Chapter is organized as follows:
Section 3 describes the Future Internet platform in detail; experimental results showing the potential of the platform are de
A more specific definition of the entities involved in the future Internet, as well as of the Future Internet target, can be as follows
â¢Actors represent the entities whose requirement fulfillment is the goal of the Future Internet;
for instance, Actors include users, developers, network providers, service providers, content providers, etc A Cognitive Future Internet Architecture 93
â¢Resources represent the entities that can be exploited for fulfilling the Actorsâ requirements; example of Resources include services, contents, terminals, devices
middleware functionalities, storage, computational, connectivity and networking capabilities, etc â¢Applications are utilized by the Actors to fulfill their requirements and needs ex
-ploiting the available resources In the authorsâ vision, the Future Internet target is to allow Applications to transpar
-ently, efficiently and flexibly exploit the available Resources, thus allowing the Actors by using such Applications,
this target, the Future Internet should overcome the following main limitations i) A first limitation is inherent in the traditional layering architecture which forces to
keep algorithms and procedures, laying at different layers, independent one another In addition, even in the framework of a given layer, algorithms and procedures deal
-ing with different tasks are designed often independently one another. These issues greatly simplify the overall design of the telecommunication networks and greatly
reduce processing capabilities, since the overall problem of controlling the telecom -munication network is decoupled in a certain number of much simpler sub-problems
Nevertheless, a major limitation of this approach derives from the fact that algorithms and procedures are poorly coordinated one another,
impairing the efficiency of the overall telecommunication network control. The issues above claim for a stronger
coordination between algorithms and procedures dealing with different tasks ii) A second limitation derives from the fact that, at present, most of the algorithms
and procedures embedded in the telecommunication networks are open-loop, i e. they are based on off-line"reasonable"estimation of network variables (e g. offered traf
-fic), rather than on real-time measurements of such variables. This limitation is be -coming harder and harder,
since the telecommunication network behaviours, due to the large variety of supported services and the rapid evolution of the service charac
-teristics, are becoming more and more unpredictable. This claims for an evolution towards closed-loop algorithms and procedures which are able to properly exploit
appropriate real-time network measurements. In this respect, the current technology developments, which assure cheap and powerful sensing capabilities, favours this
and hence embedding technology-dependent algorithms and procedures, as well as from the large variety of heterogeneous Actors who are playing in the ICT arena.
framework, on the one hand, is expected to embed algorithms and procedures which leaving out of consideration the specificity of the various networks,
The concept behind the proposed Future Internet architecture, which aims at over -coming the three above-mentioned limitations, is sketched in Fig. 1. As shown in the
figure, the proposed architecture is based on a so-called"Cognitive Future Internet Framework"(in the following, for the sake of brevity, simply referred to as"Cogni
-tive Framework")adopting a modular design based on middleware"enablers"."The enablers can be grouped into two categories:
the Semantic Virtualization Enablers and the Cognitive Enablers. The Cognitive Enablers represent the core of the Cognitive
Framework and are in charge of providing the Future Internet control and manage -ment functionalities. They interact with Actors, Resources and Applications through
Semantic Virtualization Enablers The Semantic Virtualization Enablers are in charge of virtualizing the heterogene -ous Actors, Resources and Applications by describing them by means of properly
selected, dynamic, homogeneous, context-aware and semantic aggregated metadata The Cognitive Enablers consist of a set of modular, technology-independent, interop
-erating enablers which, on the basis of the aggregated metadata provided by the Seman -tic Virtualization Enablers, take consistent control and management decisions concern
-ing the best way to exploit and configure the available Resources in order to efficiently and flexibly satisfy Application requirements and, consequently, the Actorsâ needs.
reliable connection, satisfy the user perceived quality of experience and so on The control and management decisions taken by the Cognitive Enablers are han
-dled by the Semantic Virtualization Enablers, in order to be actuated involving the proper Resources, Applications and Actors
Cognitive Future Internet Framework Actors Users Network Providers Prosumer Developers Content Providers Service Providers A
pplications Semantic Virtualization Enablers Cognitive Enablers Identity, Privacy Confidentiality Preferences, Profiling, Context Multimedia Content Analysis and Delivery
Connectivity Resource Adaptation & Composition Generic Enabler X Generic Enabler Y Generic Enabler Z Resources
Services Networks Contents Devices Cloud storage Terminals Computational Fig. 1. Proposed Cognitive Future Internet Framework conceptual architecture
A Cognitive Future Internet Architecture 95 Note that, thanks to the aggregated semantic metadata provided by the Semantic Vir
-tualization Enablers, the control and management functionalities included in the Cog -nitive Enablers have a technology-neutral, multi-layer, multi-network vision of the
surrounding Actors, Resources and Applications. Therefore, the information enriched fully cognitive) nature of the aggregated metadata,
input, coupled with a proper design of Cognitive Enabler algorithms (e g.,, multi -objective advanced control and optimization algorithms), lead to cross-layer and
cross-network optimization The Cognitive Framework can exploit one or more of the Cognitive Enablers in a
-minals, Base Stations, Backhaul network entities, Core network entities. The selec -tion and the mapping of the Cognitive Framework functionalities in the network enti
adoption of algorithms and procedures coordinated one another and even jointly ad -dressing in a one-shot way,
3 Cognitive Future Internet Framework Architecture The Cognitive Framework introduced in the previous section consists of a conceptual
-ized through the implementation of appropriate Cognitive Middleware-based Agents in the following referred to as Cognitive Managers)
-haul Network entities, Core Network entities. There not exist a unique mapping be -tween the proposed conceptual framework over an existing telecommunication net
-work. However we proposed a proof-of-concept concrete scenario in section 4, where the conceptual framework has been deployed in a real home area network test case
Indeed the software nature of the Cognitive Manager allows a transparent integration in the network nodes.
is enhanced with the Future Internet functionalities and become part of the Future Internet assets Fig. 2 outlines the high-level architecture of a generic Cognitive Manager, showing
its interfacing with Resources, Actors and Applications Fig. 2 highlights that a Cognitive Manager will encompass five high-level modular
data/servicse/contents Monitored Actor related information Aggregated metadata present context Exchanged metadata TO /FR
A Cognitive Future Internet Architecture 97 The Metadata Handling functionalities are embedded in the so-called Metadata Han
in particular, the Cognitive Enablers which are the core of the proposed architecture are independent of the peculiarities of the surrounding Resources, Actors and Appli
-tionalities are embedded in the Semantic Virtualization Enablers, while the Elabora -tion functionalities are embedded in the Cognitive Enablers.
above-mentioned heterogeneous parameters/data/services/contents in homogeneous metadata according to proper ontology based languages (such as OWL â Web Ontol
-ogy Language Metadata Handling functionalities are in charge of the storing, discovery and com -position of the metadata coming from the sensing functionalities and/or from meta
-data exchanged among peer Cognitive Managers, in order to dynamically derive the aggregated metadata which can serve as inputs for the Cognitive Enablers;
(ii) providing enriched data/services/contents to the Actors In addition, these enablers control the sensing, metadata handling, actuation and API
data/contents/services produced by the Cognitive Enablers (Provisioning functional -ities embedded in the Actor Interface;
AAA) at user and device level, Service Security, Intrusion Detection, etc..Another key role of this module is to dynamically decide, consistently with the application
adoption of multi-object algorithms and procedures which jointly address prob -lems traditionally dealt with in a separate and uncoordinated fashion at different
data mining, adaptive control, robust control, game theory, operation research etc.)) for the algorithms and rules embedded in the Cognitive Enablers,
which are expected to remarkably improve efficiency Advantages Related to Flexibility 4) Thanks to the fact that the Cognitive Managers have the same architecture and
5) The transparency and the middleware (firmware based) nature of the proposed Cognitive Manger architecture makes relatively easy its embedding in any
fixed/mobile network entity (e g. Mobile Terminals, Base Station, Backhaul network entities, Core network entities: the most appropriate network entities
for hosting the Cognitive Managers have to be selected environment by envi -ronment. Moreover, the Cognitive Managers functionalities (and, in particular
the Cognitive Enabler software) can be added/upgraded/deleted through remote wired and/or wireless) control
from very simple SW/HW/computing implementations, even specialized on a single-layer/single-network specific monitoring/elaboration/actuation task, to
A Cognitive Future Internet Architecture 99 complex multi-layer/multi-network/multi-task implementations. In particular
entailed additional SW/HW/computation complexity 7) Thanks to the flexibility degrees offered by issues (4)-(6), the Cognitive Manag
Internet of things 8) The above-mentioned flexibility issues favours a smooth migration towards the proposed approach. As a matter of fact, it is expected that Cognitive Manager
we propose to achieve Future Internet revolution through a smooth evolution. In this evolution, Cognitive Managers pro
respect to the increased SW/HW/computing complexity The following section shows an example of application of the above-mentioned
-work, where connectivity among devices is provided using heterogeneous wireless e g.,, Wifi, UWB) and wired (e g.,
, Ethernet, PLC) communication technologies. For 100 M. Castrucci et al testing purposes, only a simplified version of the Cognitive Manager has been imple
-mented in each node of the network, which includes the following functionalities â¢the Service and Content adapter:
and stored in proper database ready to be used by elaboration functionalities â¢a Cognitive connectivity enabler:
independent resource management algorithms (e g.,, layer 2 path selection), in order to guarantee that flowâ s Qos requirements are satisfied during the transmission of
-rithm, a Path selection algorithm and a Load Balancing algorithm has been consid -ered in our tests
The framework has been implemented as a Linux Kernel Module and it has been installed in test-bed machines and in a legacy router1 for performance evaluation.
1 We have modified the firmware of a Netgear router (Gigabit Open source Router with Wireless-N and USB port;
453 MHZ Broadcom Processor with 8 MB Flash memory and 64 MB RAM; a WAN port and four LAN up to 1 Gigabit/s) and âoecross-compiledâ the code, to
run the framework on the Router A Cognitive Future Internet Architecture 101 To test the technology handover performances a FTP download session (file size 175
MB) has been conducted on the Ethernet link. After approximately 10s, one extremity of the Ethernet cable has been disconnected physically from its socket and the flow
has been redirected automatically onto the wireless link thanks a context-aware deci -sion taken by the Cognitive connectivity enabler.
Switching on the Wi-fi link causes more TCP retransmissions and an increased transfer time. This is natural, since
Ethernet and Wi-fi have different throughputs. Without the cognitive framework, it is evident that the FTP session would not be terminated at all.
As shown in Fig. 4, the experimented handover time is around 240 ms, during which no packet is received
The delay is influenced by the processing time that the framework module spends in triggering and enforcing the solutions evaluated by the path selection routines im
-plemented in the cognitive connection enabler Fig. 4. Technology handover 5 Conclusions This paper proposes a novel reference architecture for the Future Internet, with the aim
to provide a solution to overcome current Internet limitations. The proposed architecture is based on Cognitive Modules
which can be embedded transparently in selected net -work entities. These Cognitive Modules have a modular organization
which is claimed to be flexible and scalable, thus allowing a smooth migration towards the Future Inter
their virtualization, obtained thanks to the introduction of Semantic Virtualization En -ablers. At the same time, the Cognitive Enablers,
which are the core of the Cognitive Managers, can potentially benefit from information coming from all layers of all net
the algorithms the Cognitive Enabler will be based on, have all to be selected carefully case by case;
The Internet is broken, Technology Review, December 2005-January 2006 2006), http://www. technologyreview. com/article/16356
-FISS09. pdf 3. Miller. R.:Vint Cerf on the Future of the Internet. The Internet Today, The Singularity
University (2009), http://www. datacenterknowledge. com/archives/2009/10 /12/vint-cerf-on-the-future-of-the-internet
/4. National Science Foundation: Networking Technology and Systems, Nets (2008 http://www. nsf. gov/pubs/2008/nsf08524/nsf08524. htm
5. National Science Foundation: Network Science and Engineering, Netse (2010 http://www. nsf. gov/funding/pgm summ. jsp?
National Future Internet Initiatives-GRIF (France http://www. francenumerique2012. fr/(2010 10. AETIC: Internet del Futuro, http://www. idi. aetic. es/esinternet/(2008
11. ICT FP7 Research: Future Internet Research & Experimentation (FIRE http://cordis. europa. eu/fp7/ict/fire/(2010
Title Model Ontology for Future Internet Networks Joao Henrique de Souza Pereira1, Flavio de Oliveira Silva1
Edmo Lopes Filho2, Sergio Takeo Kofuji1, and Pedro Frosi Rosa3 1 University of Sao paulo, Brazil
2 Algar Telecom, Brazil edmo@algartelecom. com. br 3 Federal University of Uberlandia, Brazil pedro@facom. ufu. br
The currently Internet foundation is characterized on the in -terconnection of end-hosts exchanging information through its network
Internet of active social, mobile and voracious content producers and con -sumers. Considering the limitations of the current Internet architecture
the envisaged scenarios and work eï orts for Future Internet, this paper presents a contribution for the interaction between entities through the
formalization of the Entity Title Model Keywords: Entity, Future Internet, Ontology, Title Model Introduction The Internet of today has diï culties to support the increasing demand for re
-sources and one of the reasons is restricted related to the evolution of the TCP IP architecture since the 80s.
More speciï cally, the evolution of the layers 3 and 4, as discussed in 23.
The commercial usage of Internet and IP networks was a considerable obstacle to the improvements in the intermediate layers in this
The challenges to Future Internet Networks are the primary motivation to this paper and the cooperation in the evolution of computer networks, speciï cally
in the TCP IP intermediate layers, is another one. The purpose is to present the Entity Title Model formalization, using the OWL (Web Ontology Language), to
collaborate with one integrated reference model for the Future Internet, including others projects eï orts
This paper is organized as follows: Section 1 presents works in the area of Fu -ture Internet and ontology in computer systems.
Section 2 describes the concepts of the Entity Title Model and the ontology at network layers.
) Future Internet Assembly, LNCS 6656, pp. 103â 114,2011 câ The Author (s). This article is published with open access at Springerlink. com
1 Future Internet Works A Future Internet full of services requirements demands networks where the necessary resources to service delivery are orchestrated
and optimized eï ciently In this research area there are extensive number of works and projects for the
Future Internet and some of these are being discussed in collaboration groups like FIA, FIND, FIRE, GENI and others 10,11, 14,31, 32
the concept of addressing by use of a Title is suitable for real world Internet and
providing new important inputs to the content-centric view of Future Internet 1. 1 Some other Future Internet and Ontology Works
Studies and proposals for development of the intermediate layers of the TCP IP architecture are being discussed since the 80s,
-tives to contribute to the evolution of computer networks. In the proposed imple -mentation of LISP there is low impact on existing infrastructure of the Internet
since it can use the structure of IP and TCP, with the separation of Internet
addresses into Endpoint Identiï ers (EID) and Routing Locators (RLOC) 9 In the area of next generation Internet there is also the works of Landmark
developed by Tsuchiya, that proposed hierarchical routing in large networks and Krioukov work on compact routing for the Internet.
Pasquini proposes changes in the use of Landmark with Rofl (Routing on Flat Labels), and ï at routing
next-generation Internet architecture 21 22 Previous studies in Rofl were presented by Caesar who also made proposals
area of mobility on a next-generation Internet Wong proposes solutions that include support for multi-homing 36.
Title Model Ontology for Future Internet Networks 105 by Ford, who speciï es the UIP/UIA (Unmanaged Internet Protocol) and UIA
Unmanaged Internet Architecture) 12 Related to ontology, there are extensive studies in philosophy, whose concept of this term is assigned to Aristotle,
who deï nes it as the study of âoebeing as be -ingâ. However, the name ontology was used ï rst only in the seventeenth century
database, information systems, software engineering and semantic web. In the technology area one of the most commonly used deï nitions is from Tom Gruber
-lus of First order, Propositional logic, Ontolingua, Loom, and Semantic web languages (RDF, RDFS, DAML+OIL, OWL SPARQL, GRDDL, RDFA, SHOE
AND SKOS), among others 13 For communication between network elements, ontology is used usually in the
application layer, without extending to the middle and lower layers of computer networks. In this research area, this paper aims to contribute to advancing the
Future Internet 2 Ontology at Network Layers Ontologies can use layer model or distinct architectures, however, in general
of the Web Ontology Language deï ned by W3c, presented in Fig. 1 extracted from 17, is conï ned in the application layer of the TCP IP architecture
Fig. 1. Architecture of Web Ontology Language 17 106 J. H. de Souza Pereira et al
content, host, user, cloud computing and sensor networks. The notion of entity in the Title Model diï ers from the notion of resources in some relevant litera
For example, one user, that demands resources, is one communication entity in the Title Model. Also, applications
host, user. Also can be created other kinds of classiï cation, such as hardware software and network, among others.
Some one of them (not all) can be used as resources in others relevant literature As the root superclass of one ontology is âoeentityâ or âoethingâ the Entity
Title Model ontology designates a conceptually diï erent âoeentityâ of this model which in turn is an communication element that have its communication needs
understood and supported by computer networks. For example, in this taxonomy the class âoelayerâ is a subclass of âoethingâ and neither this class nor its subclasses
Title Model Ontology for Future Internet Networks 107 Title: It is the only designation to ensure an unambiguous identiï cation
the other communication entities of the computer networks. According to this recommendation, the ASO-title (Application Service Object-title), which are
improving the addressing of internet architecture by horizontal addressing and facilitate communication among the entities and with the other layers 24.
It is a tangible material in a computer network, such as: cables connectors, general optical distributor, antenna, base station and air interface
-cation element, based on âoeservice conceptâ presented by Vissers, where users communicate with each other through a âoeservice Providerâ,
For example, to transfer data from a ï le, or content of email/instant message, it is necessary to have delivery guarantee in commu
-nication. On the other hand, for an audio or video communication in real time it will not necessarily be important the delivery guarantee,
physical or logical location of entities in computer networks, without the need of reserved bandwidth, networks segmentation, speciï c physical connections or
and translate them into functionality in computer networks Link Layer: This is the layer that has the responsibility to establish the link
between two or more entities and ensure that data exchange occurs at the link level and takes place according to the understanding made by the service layer
2. 2 Cross Layer Ontology for Future Internet Networks For intermediate semantic layer, this work did the creation of an ontology for
Internet, as 4ward, Content-Centric, User-Centric, Service-Centric and Autoi Title Model Ontology for Future Internet Networks 109
Source Service Content User DTS NE1 NE2 NE NE3 Destination Service Content User Network Elements (NE
Fig. 2. Entities Communication Orchestrated by the DTS 4 28. This ontology also supports the proposal of Horizontal Addressing by
Entity Title, presented in 26, as well as the semantic approaching cross layers for the Future Internet
The Horizontal Addressing by Entity Title has related limitations with the communications needs formalization and standardization,
-tions with the collaboration with others Future Internet projects eï orts. The rea -son is because the solution for horizontal addressing and communication needs
-tation facility in software and hardware. However, in a collaborative eï ort to others Future Internet works, the Entity Title Model has better contributions
by the use of a more expressive and standardized representation language Also, this Model is more complete than the solution for just the horizontal
support to approaches like the Content, Service and User Centric. In addition it permits semantic communication cross layers to contribute with, for example
layers running in a Distributed Operating system, without the traditional sock -ets used in TCP IP, is used the Raw Socket to enable the communication 19
Payload Size Control equal to 84 Bytes; and; Delivery Guarantee re -quest. In this context, this need is informed, to the Service Layer, by the direct
use of the Raw Socket to communicate with the Distributed Operating system without the use of IP, TCP, UDP and SCTP
><Payload size control>84 Bytes</Packet size control ><Deliveryguarantee rdf: datatype="&xsd; boolean">Yes </Deliveryguarantee ><rdfs: comment>Example of the Entity Title Model to support
distributed programming needs </rdfs: comment ><Has need rdf: resource="&titlemodel Distributed programming lam mpi "/>owl: Thing >By this semantic information, the Service and Data link layers can support the
distributed programming communication using diï erent approaches, as the ad -dressing proposal presented in 25.
Title Model Ontology for Future Internet Networks 111 them, as Rofl and LISP, should change their structure to semantically support
one user may need the Content directly from Services or from other Users (thoughts. In this
perspective, the Entity Title Model and its ontology can contribute to converge some Future Internet projects,
as the Content, Service and User Centric works monitored and managed by the OSKMV planes using semantics cross layers
and not only in the application layer as happen in the TCP IP architecture In this example for the contribution with the Content, Service and User
Centric works, in the Title Model it is possible the uniï cation of the diï erent
entities address in the future Internet. This means that application, content host and user can have supported its needs
and can be located by its title By this possibilities, this work aims to contribute with the discussions for
a collaborative reference model in the future Internet, that includes diï erent categories of communication entities, and its needs.
the Web Ontology Language, so that the Entity layer can communicate semanti -cally with the Service layer,
addresses the entities horizontally, the mobility on the Internet becomes natural since there is no longer the hierarchy of segments of the network and sub network
that occurs in the IP ADDRESS with the use of masks. By this, the coupling between
ontology in the middle layers of the Internet, with the proposal of semantic formalization, in computer networks, for the Entity Title Model
Therefore, it is possible the approaching between the upper and lower lay -ers. As a result there is improvement in the exchange of meanings between the
-bution to the Future Internet eï orts and projects like Autoi, Content-Centric User-Centric, Service-Centric, 4ward and others.
Also, is a possibility for the collaborative discussions about the reference model related to these, and others
Future Internet eï orts As future work there will be continued the development of this ontology and
its collaborative perspective with others Future Internet eï orts and projects. It is suggested to extend discussions
layers of computer networks, thereby deï ning the communication architecture whose study go over the deï nitions in the area of protocols architecture
Title Model Ontology for Future Internet Networks 113 Open Access. This article is distributed under the terms of the Creative Commons
Autonomic Internet Project. European union IST 7th Framework Pro -gramme (2011 5 Baioë co, G.,Costa, A.,Calvi, C.,Garcia, A.:
International Conference on Ultra Modern Telecommunications, IEEE Xplore, Print ISBN: 978-1-4244-3942-3 (2009
Future Internet Design Program. National Science Foundation http://www. nets-find. net (2011 11 FIRE:
Future Internet Research and Experimentation (2009 12 Ford, B.:UIA: A Global Connectivity Architecture for Mobile Personal Devices
International Journal of Human and Computer Studies, 43 (5â 6: 907â 928 (1995 16 ITU-T:
Information technology-Open Systems Interconnection-Application Layer Structure. Recommendation X. 207-ISO/IEC 9545: 1993 (1993
Representing Information Using the Web Ontology Language Traï ord (2005 18 Lesniewski, S.:Comptes rendus des seâ'ances de la Socieâ'teâ'des Sciences et des
Telecommunication Technologies Symposium (2009 114 J. H. de Souza Pereira et al 20 Mealy, G.:Another look at data.
In: Proceedings of the Fall Joint Computer Conference. AFIPS November 14-16, Volume 31, pp. 525â 534.
Thompson Books Washington and Academic Press, London (1967 21 Pasquini, R.,Paula, L.,Verdi, F.,Magalhaëoees, M.:
Generation Internet Architecture. In: IEEE Wireless communications and Net -working Conference-WCNC (2009 22 Pasquini, R.,Verdi, F.,Magalhaëoees, M.:
Towards a Landmark-based Flat Routing In: 27th Brazilian Symposium on Computer networks and Distributed systems -SBRC (2009
23 Pereira, J. H. S.,Kofuji, S. T.,Rosa, P. F.:Distributed systems Ontology. In IEEE/IFIP New Technologies, Mobility and Security Conference (2009
24 Pereira, J. H. S.,Kofuji, S. T.,Rosa, P. F.:Horizontal Address Ontology in In
Distributed Programming. In: 9th International Information and Telecommuni -cation Technologies Symposium (2010 26 Pereira, J. H. S.,Kofuji, S. T.,Rosa, P. F.:
Next Generation Internet. In: IEEE International Conference on Networking and Services p. 7 (2010 27 Prudeë ncio, A.,Willrich, R.,Diaz, M.,Tazi, S.:
de Gereë ncia e Operacâ¸aëoeo de Redes e Servicâ¸os-WGRS-SBRC (2009 28 Rubio-Loyola, J.,Serrat, J.,Astorga, A.,Chai, W. K.,Galis, A.,Clayman, S
Autonomic Internet Framework Deliverable D6. 3. Final Results of the Autonomici Approach. Autoi Project 2010
Publish Subscribe Internet Routing Paradigm-PSIRP. Final Updated Architecture, Deliverable D2. 5 (2010 31 Tselentis, G.,et al.:
Towards the Future Internet-A European Research Per -spective. IOS Press, Amsterdam (2009 32 Tselentis, G.,et al.:
Towards the Future Internet-Emerging Trends from Euro -pean Research. IOS Press, Amsterdam (2010 33 Tsiatsis, V.,Gluhak, A.,Bauge, T.,Montagut, F.,Bernat, J.,Bauer, M.,Villa
-longa, C.,Barnaghi, P.,Krco, S.:The SENSEI architecture-Enabling the Real World Internet. In:
Towards the Future Internet, pp. 247â 256. IOS Press, Ams -terdam (2010 34 Vissers, C.,Logrippo, L.:
The Importance of the Service Concept in the Design of Data communications Protocols. In: Proceedings of the IFIP WG6 1, 3 (1986
35 Wang, J.,Guo, M.,Camargo, J.:An Ontological Approach to Computer system Security. Information security Journal:
A Global Perspective (2010 36 Wong, W.:et al.:An Architecture for Mobility Support in a Next Generation
Internet. In: The 22nd IEEE International Conference on Advanced Information Networking and Applications-AINA (2008
Part II Future Internet Foundations: Socioeconomic Issues Part II: Future Internet Foundations: Socioeconomic Issues 117
Introduction Information and Communication Technologies (ICT) provide in recent years solutions to the sustainability challenge by, e g.,
, measuring impacts and benefits of economic activity via integrated environmental monitoring and modeling, by managing conse
technology of the Internet, is particularly responsible for this accelerating trend Particularly, controlling and monetizing the evolution of the Internet and its vast
application range is seen as a critical goal for most economic regions. Therefore socioeconomic aspects determine a highly important set of influencing factors, which
decades, the combination of the two and its application to the new Internet â the one
which is rooted in the commercialization of the native research Internet of the early 90â s â becomes an important element in investigating,
As collected by the FISE (Future Internet Socioeconomics) working group within the FIA on its wiki, the following general aspects of socioeconomics, particularly in
any sort of economic activity (here networking in the areas of Internet-based and telecommunications-based communications for a variety of lower-level network/tele
-communication as well as application-based services) and the social life of user (here mainly addressing private customers of such services
and providers offering such services);()( 2) Markets of Internet service providers (ISP) and Telecommunication Providers;( (3) ISPS peering agreements and/or transit contracts;(
4) Customer usage behavior and selections of content;(5) The investigation of emerging technologies and disruptive technologies,
which effect the user/customer-to-provider relation;(6 The investigation of (European) regulation for e-services markets and security regula
social and economic viewpoints on pure Internet-based networking is essential Thus, the full understanding and modeling of these socioeconomic impacts on
Internet communications particularly and the Internet architecture generally chal -lenges networking research and development today. Economic effects of technical
Future Internet Foundations: Socioeconomic Issues effective approaches. Furthermore, the usersâ perspectives need to be taken into close
-of-operations of a variety of Internet-based services In this emerging area of research the specific view on the networking and transmis
-sion domain of the Internet had been taken as one starting point of socioeconomic research for this FIA book.
the Future Internet contains three views, where the decision of inclusion was based on two rounds of abstract reviews and on subsequent reviews of complete chapter pro
applications as of today still generate large volumes of data, Internet Service Provid -ers (ISP) need to address the problem of expensive interconnection-charges.
mutually beneficial situation for all stakeholders in a Future Internet scenario, the âoetri -plewinâ investigations determine the key goal of Economic Traffic Management
Adoption of Future Internet Protocolsâ. Based on the assumption that many well -designed protocols designed for the Future Internet will fail â as it happened for the
traditional Internet â, however, badly-designed ones are successful. Thus, the problem of protocolsâ deployability is addressed.
In order to do so, a framework had been devel -oped, which includes the investigation possibilities for deployment effects, adoption
protocol, as it happens currently for the Future Internet, can get adopted Finally, the third chapter by C. Kalgoris et al. is on âoean Approach to Investigating
assumption that the Internet has evolved into a worldwide social and economic plat -form with a variety of stakeholders involved, the key motivations of each of them and
Future Internet Foundations: Socioeconomic Issues 119 investigate, classify, and develop an analysis framework for such tussles in the socio
-economic domain of Internet stakeholders. In turn, the chapter outlines a new meth -odology, with which tussles are analyzed.
) Future Internet Assembly, LNCS 6656, pp. 121â 131,2011 Â The Author (s). This article is published with open access at Springerlink. com
Overlay applications generate huge amounts of traffic in the Internet which determines a problem for Internet service providers,
Future Internet. This"Triplewin"situation is the target of Economic Traffic Management (ETM. A wide variety of techniques are employed by ETM for
Applications such as peer-to-peer (P2p) file sharing and video-streaming generate huge volumes of traffic in the Internet due to their high popularity and large size of
the files exchanged. This typically underlay-agnostic overlay traffic results in high inter-domain traffic,
which implies significant charges for the Internet Service Pro -viders (ISP. Individual optimization in the overlay (decisions made either at ran
traffic oscillations and degraded Quality-of-Experience (Qoe) for the end users 1 Therefore, an incentive-based approach is required that employs economic concepts
beneficial for all end users, overlay providers and ISPS. The so-called"Triplewin "situation is the main target of Economic Traffic Management (ETM) 2 proposed by
providing effective solutions for Internet at present ETM is deemed as applicable to the Future Internet, both conceptually and concerning specific ideas and mechanisms
All approaches proposed within ETMS are classified in three main categories â¢Locality Promotion enables peers of an ISP domain to receive ratings of their over
An example is locality promotion based on BGP routing data â¢Insertion of Additional Locality-Promoting Peers/Resources involves (a) the inser
stakeholders (end users, service providers, and ISP) would benefit thereby and under which circumstances âoetriplewinâ arises.
ETM deployment degree, popularity of ETM among end users, various swarm sizes, peer distribution among network domains, network topologies etc
-actions by taking into account the end user benefit as well From the ISP point of view, the ultimate confirmation of âoewinâ is a monetary benefit
This metric is used in an ongoing external trial with real users As a measure of âoewinâ for end users Qoe metrics are used.
For file sharing P2p applications the most important perceivable parameter is download time (or download speed).
) It can be influenced strongly by ETM mechanisms, both favorably and ad -versely. Users will use a given mechanism
if this improves or, at least, preserves their download time. Ideally, this should be guaranteed on a per individual user basis
However, it is analyzed most often by comparing the average values of the metrics with and without an ETM mechanism.
Such averages are taken over all peers in a swarm, or over subsets (e g.,, those that belong to the same AS.
Main Qoe metrics associated with video streaming applications taken into account in assessment of âoewinâ are the probability of playback stalling, stalling time,
decreased traffic volume from its own content servers and reduced load of the servers as well as an improved performance of the application,
objectives of the end users and possibly of the ISPS. Thus, this paper focuses hereafter on assessing win-win for the ISP and end users
To obtain a reliable assessment of ETM mechanisms several evaluation scenarios have been defined â¢Various network topologies:
-flecting a part of the real Internet topology, with a subset of ASES and inter-domain
â¢Varied end user interest in and adoption of ETM: coexistence of users employing ETM and ones declining support, even within a single swarm
â¢Different swarm sizes; and â¢Various type of content: files and video of different sizes
-awareness on each of the different user groups separately. This is a new methodology in contrast to related work, where average results or a cumulative density function for
Peers and the ETMS servers, providing rating information, are located in these stub-ASES, which are interconnected via a hub-AS containing the
the overlay performance from the user's point of view. Here, download times of all peers are averaged in one AS in one simulation Run for each parameter setting 20
Fig. 1. Mean Inter-AS Bandwidth Fig. 2. Download Times On the other hand, the situation is not as simple when considering end users, cf.
Fig. 2 Typically no-lose situations are the result in related work. However, this is true only
-spective, it is given not that users would accept such a mechanism, since they cannot be sure not to lose from it.
no reduction in the performance for the user, even if considering a more realistic sce -nario than typically used in related studies
links, and to improve performance experienced by the users of peer-to-peer applica -tions. Two approaches, the insertion of ISP-owned Peers (Iops),
does not have end users. The tracker and an original seeder are connected to the hub AS, while the Iop is inserted always in AS 1. Values for access bandwidth are similar
but an increase of the outgoing traffic due to the data exchange also with remote peers;
verified (by running couples simulations) that users benefit with respect to perform -ance not just on the average but 95%of them on an individual basis too
Fig. 3. Mean Inter-AS Bandwidth Fig. 4. Download Times Swarm Selection. In the underlay considered the same setup was applied;
Fig. 5. Mean Inter-AS Bandwidth Fig. 6. Download Times 128 I. Papafili et al Table 1. Evaluation Scenarios for the Swarm Selection
'download times, respectively. It can be observed that the impact on inbound inter-AS traffic of AS1 is higher
Due to the additional upload capacity in the swarm, users benefit from this ETM mechanism, while the inter-AS traffic of the ISP employing the Iop is
download times of peers that want to become HAPS (due to the extra download bandwidth offered to them.
locality promotion mechanism, the mean download time decreases significantly (see difference between â No SISÂ and â 0 HAPSÂ;
Afterwards, the download time can be further reduced by increasing the number of active HAPS.
the former case, the mean download time is reduced more than in the latter. This is due to the fact that the injection of, say,
-cant when less peers are present in the AS, hence the difference in download time
download bandwidth, but also, with their extra upload bandwidth HAPS lead to the significant reduction of the average download time too
Fig. 7. Mean Download Times for Peers in AS1 With respect to the Number of HAPS When an HAP is implemented along with locality-awareness mechanisms, the opera
-tor benefits from reduced inter-domain traffic 17. It allows for reducing costs for ISPS and confirms the advantages of the HAP ETM mechanism and the fact that it
more specifically, ISP and end users interrelations in the context of such mechanisms The application of this methodology has been outlined and related evaluation results
SIS) has been designed as a Web-based tool for the ISP to administrate, monitor, and fine-tune the operation of the entire ETMS
not only P2p) generated according to trends in the future Internet is an interesting and promising direction for future research
org/html/draft-ietf-alto-reqs-06 (work in progress)( October 2010 5. Papafili, I.,Stamoulis, G. D.:
-Peer Computing P2p 2010, Delft, The netherlands (August 2010 7. Bindal, R.,Cao, P.,Chan, W.,Medval, J.,Suwala, G.,Bates, T.,Zhang, A.:
Conference on Distributed computing Systems, Montreal, Canada (June 2006 Assessment of Economic Management of Overlay Traffic:
-tional Conference on Peer-to-peer Computing (P2pâ 09), Seattle, USA (September 2009 9. The Smoothit Project:
19th IEEE International Conference on Computer Communications and Net -works (ICCCN 2010), ZÃ rich, Switzerland (August 2010
Characterization of Bittorrent Swarms and their Distribution in the Internet, to appear in the Computer networks (2011
13. Cohen, B.:Incentives Built Robustness in Bittorrent. In: Kaashoek, M. F.,Stoica, I. eds
) Future Internet Assembly, LNCS 6656, pp. 133â 144,2011 Â The Author (s). This article is published with open access at Springerlink. com
Deployment and Adoption of Future Internet Protocols Philip Eardley1, Michalis Kanakakis2, Alexandros Kostopoulos2, Tapio Levã¤3
Many, if not most, well-designed Future Internet protocols fail, and some badly-designed protocols are very successful.
increase the chances that a future Internet protocol is adopted widely Keywords: Protocol Deployment, Adoption Framework, Multipath TCP, Con
GSM but there are many more examples of protocols that are designed well techni -cally but where deployment has failed
and new Internet protocols, including 2, 3, 4, 5, 6 and 7, which we build on
The adoption of Internet protocols is tricky because the Internet is a complex system with diverse end-systems, routers and other network elements, not all of whose aspects
are under the direct control of the respective end users or service providers In this Chapter we propose a new framework for a successful adoption process
Section 2), and apply it to two emerging protocols, Multipath TCP (Section 3) and Congestion Exposure (Section 4
134 P. Eardley et al The framework is not a âoeblack boxâ where candidate protocols are the inputs and
Future Internet Protocols We propose a new framework (Figure 1) for a successful adoption process, with sev
Deployment and Adoption of Future Internet Protocols 135 A version of the framework has been applied in two papers, 8 and 9. The frame
-work is intended to be generally applicable to Internet protocols The first key question is: what are the benefits (and costs) of the protocol?
browsers and the underlying http/html protocols give a significant benefit to both the end users (a nice user interface for easy access to the web) and to the content provid
-ers (their content is accessed more; new opportunities through forms etc. As another example, a NAT (Network Address Translator) allows an operator to support more
users with a limited supply of addresses, and has some security benefit. As a counter
-example, IPV6 deployment has a cost to the end host to support the dual stack, but the
-example, IPV6 requires at least both ends and preferably the network to change Combining these two key factors leads to the idea of an incremental process, where
to distribute TV online Hence the framework distinguishes initial scenarios from a widespread one At each step of the framework careful consideration is needed of benefits and in
software has already been developed for the initial scenario and it is simply a matter of deploying and adopting it on a wider scale.
and users will complain if they adopt it and it breaks something Note that it is not possible to prove that the framework is necessary or sufficient to
Deployment and Adoption of Future Internet Protocols 137 extensions to support MPTCP. This allows endpoints to negotiate additional features
persuade the IETF that it is safe to deploy on the internet. Also an operator might
-put of its âoelegacyâ users â¢It is designed to be application-friendly: it just uses TCP s API
user can still communicate with legacy TCP users and can still communicate if the signalling is corrupted by a middlebox
â¢It is designed to be middlebox-friendly (be it a NAT, firewall, proxy or whatever
a NAT survey to probe random paths across the Internet to test how operational NATS impact MPTCPÂ s signalling messages 21
For MPTCP, our current belief is that a data centre is the most promising initial sce
-nario (Figure 2). Within a data centre, one issue today is how to choose what path to
use between two servers amongst the many possibilities-MPTCP naturally spreads traffic over the available paths
Simulations show there are significant gains in typical data centre to -pologies 25, perhaps increasing the throughput from 40%to 80%of the theoreti
However, the protocol implementation should not impact hardware offloading of segmentation and check-summing. One reason that MPTCP uses
MPTCP s signalling and data â¢Incremental: the story is good, as only one stakeholder is involved viz the data centre
operator Fig. 2. Potential MPTCP deployment scenario, in a data centre. In this example, traffic between the two servers (at the bottom) travels over two paths through the switching fabric of the data
centre (there are four possible paths Another potential initial scenario would be a mobile user using MPTCP over multiple
interfaces. The scenario reveals a potential distinction between deployment (which involves the OS vendor updating their stack) and adoption
(which means that MPTCP is actually being used and requires the consumer to have multiple links) â so in theory
it would be possible for MPTCP to be deployed fully but zero adopted. Note thereâ s
and deployment is decided mainly by the OS (Operating system) vendor and not the end user Therefore we believe that a more promising initial scenario is an end user that ac
-cesses content, via wireless LAN and 3g, from a provider that controls both end user devices and content servers 26 â for example, Nokia or Apple controls both the
device and the content server, Nokia Ovi or Apple App store â¢Benefits: MPTCP improves resilience
-if one link fails on a multi-homed terminal the connection still works over the other interface.
But it is a prerequisite, and cost that devices are multihomed â¢Incremental: Both the devices and servers are under the control of one stakeholder
so the end user â unconsciouslyâ adopts MPTCP. However, there may be NATS on the data path,
and MPTCPÂ s signalling messages must get through them Deployment and Adoption of Future Internet Protocols 139
The wider scenario of widespread deployment and adoption is again worth thinking about this even during the design of the protocol
â¢Benefits: Several stakeholders may now be involved. For instance, it is necessary to think about the benefits and costs for OS vendors, end users, applications and
ISPS (Internet service providers. Here also we see the importance of network ef -fects. For instance, as soon as a major content provider, such as Google, deploys
MPTCP â perhaps as part of a new application with better Qos-then there is a much stronger incentive for OSS to deploy it as well as the network externality has
suddenly increased â¢Incremental: Existing applications can use MPTCP as though it was TCP, ie the
) MPTCP is an extension for end-hosts â it doesnâ t require an upgrade to the routing system;
The main intention of Congestion Exposure (Conex) is to make users and network nodes accountable for any congestion that is caused by the traffic they send or forward
In todayâ s internet this information is only visible at the transport layer, and hence
Secondly, a policer to enforce policy specifically related to the user being served. A user pays, as part of its contract, to be allowed to cause a certain
amount of congestion. The policer checks the user is within its allowance by counting the Conex-Re-echo signals.
Similarly, a policer at a networkâ s border gateway checks that a neighbouring ISP is within its contractual allowance
and to decrease the latency of data delivery. The CDN server sends âoepremiumâ packets (perhaps for IPTV) as Conex-Not-Marked or Conex
-Re-echo. Conex traffic is prioritised by the operator (âoepremium serviceâ. To a first order of approximation, the only point of contention is the backhaul â where the op
typically doing per end user (consumer volume caps and maybe deep packet inspection, to provide all users with a âoefair
shareâ. The operator upgrades its traffic management box so that it drops Conex traf -fic with a lower probability.
However, the operator does need not to deploy a policer or auditor, since it is also running the CDN
Conex (premium) traffic is not subject to per end user caps or rate limits by the ISP
Only one party has to upgrade, ie the combined CDN-ISP. The Con -tent providers and consumers donâ t know about Conex.
Deployment and Adoption of Future Internet Protocols 141 One way this scenario could widen out is that the content provider is informed now
-effectively it can choose different Qos classes for different users Another way this scenario could develop is that the operator offers the service to
Therefore the ISP needs to upgrade two things. Firstly its traffic man -agement box: it needs to do occasional auditing spot-checks,
and then the hostâ s software would automatically send the userâ s premium traffic (Voip say) as Conex-enabled.
-effectively Qos is controlled by the CDN or end user, so that they choose which of their traffic is within which class of Qos,
Conex capability is added a CDN or end user at a time 5 Enhancing the Framework One important development in telecoms is virtualisation.
Although the basic idea is longstanding, it has recently come to much greater practical importance with the rise
users use a virtualised instance of the new application. Although our adoption frame -work is still valid,
â¢Roll out of the software should be cheaper, therefore the expected benefits of the deployment can be less
â¢There is no need to coordinate end users all having to upgrade. Every user can immediately use the new (virtualised) software, so effectively a large number of
users can be enabled simultaneously â¢These factors reduce the deployment risk, especially as it should also be easier to
âoeroll backâ if there is some problem with the new software Virtualisation is not suitable for all types of software, for instance new transport layer
functionality, such as MPTCP and CONEX, needs to be on the actual devices 142 P. Eardley et al
There is an analogy with the digitalisation of content, which has lowered greatly the costs of distribution.
Virtualisation should similarly lower the cost of distribution â in other words, it eases deployment Another aspect is the interaction of a new protocol with existing protocols.
It is important that the design minimises negative interactions, and to test for this. For
One set of examples is the various IPV4 -IPV6 transition mechanisms that try to release the (currently hidden) benefits of IPV6
Another example is a protocol âoebundleâ, for instance telepresence offerings now wrap together several services that separately had less market traction
-works, whilst bringing benefits to MPTCP-enabled end users. For Congestion Expo -sure (Conex), a reasonable initial deployment scenario is combined a CDN-ISP that
Deployment and Adoption of Future Internet Protocols 143 3. Burness, L.,Eardley, P.,Akhtar, N.,Callejo, M. A.,Colas, J. A.:
key requirement for systems beyond 3g. In: VTC 2005-Spring, IEEE 61st Vehicular Technology Conference (2005
A model of Internet Standards Adoption: the Case of IPV6. Information systems Journal 14 (3), 265â 294 (2004
5. Katz, M.,Shapiro, C.:Technology Adoption in the Presence of Network Externalities Journal of Political Economics 94, 822â 841 (1986
6. Joseph, D.,Shetty, N.,Chuang, J.,Stoica, I.:Modeling the Adoption of New Network Ar
ACM SIGCOMM Computer Communications Review 40 (2)( 2010 8. Kostopoulos, A.,Warma, H.,Leva, T.,Heinrich, B.,Ford, A.,Eggert, L.:
on Next Generation Internet, Paris (2010 9. Kostopoulos, A.,Richardson, K.,Kanakakis, M.:Investigating the Deployment and Adop
IEEE International Conference on Network protocols, ICNP (2002 http://www. ece. gatech. edu/research/GNAN/work/ptcp/ptcp. html
14. Rojviboonchai, K.,Aida, H.:An Evaluation of Multi-path Transmission control protocol M/TCP) with Robust Acknowledgement Schemes.
Internet Conference IC (2002 15. Zhang, M.,Lai, J.,Krishnamurthy, A.,Peterson, L.,Wang, R.:
Adding concurrent data transfer to transport layer, Proquest ETD Collection for FIU, Paper AAI3279221 (2007), http://digitalcommons. fiu. edu/dissertations
Improved data dis -tribution for multipath TCP communication. In: IEEE GLOBECOM (2005 19. Kelly, F.,Voice, T.:
Stability of end-to-end algorithms for joint routing and rate control Computer Communication Review 35,2 (2005
20. Key, P.,Massoulie, P.,Towsley, D.:Combined Multipath Routing and Congestion Con -trol: a Robust Internet Architecture, no.
MSR-TR-2005-111 (2005), http://research microsoft. com/pubs/70208/tr-2005-111. pdf
21. Honda, M.:Call for contribution to middlebox survey (2010), http://www. ietf org/mail-archive/web/multipathtcp/current/msg01150. html
22. Becke, M.,Dreibholz, T.,Iyengar, J.,Natarajan, P.,Tuexen, M.:Load Sharing for the
HTTP Extensions for Simultaneous Download from Multiple Mir -rors, draft-ford-http-multi-server, work in progress (2009
25. Raiciu, C.,Plunkte, C.,Barre, S.,Greenhalgh, A.,Wishcik, D.,Handley, M.:Data center Networking with Multipath TCP.
ACM Sigcomm Hotnets (2010 26. Warma, H.,Levã¤,T.,Eggert, L.,Hämmã¤inen, H.,Manner, J.:
Mobile Internet In Stereo: an End-to-end Scenario. In: 3rd Workshop on Economic Traffic Management, ETM (2010
) Future Internet Assembly, LNCS 6656, pp. 145â 159,2011 Â The Author (s). This article is published with open access at Springerlink. com
Arising from Building the Future Internet Costas Kalogiros1, Costas Courcoubetis1, George D. Stamoulis1, Michael Boniface2
3 Oxford Internet Institute, University of Oxford, United kingdom eric. meyer@oii. ox. ac. uk 4 University of ZÃ rich, Switzerland
With the evolution of the Internet from a controlled research network to a worldwide social and economic platform, the initial assumptions regarding
Future Internet Socioeconomics, Incentives, Design Principles Tussles, Methodology 1 Introduction The Internet has moved already long since from the original research-driven network
of networks into a highly innovative, highly competitive marketplace for applications services, and content. Accordingly, different stakeholders in the Internet space have
developed a wide range of on-line business models to enable sustainable electronic business. Furthermore, the Internet is increasingly pervading society 3. Widespread
access to the Internet via mobile devices, an ever-growing number of broadband users worldwide, lower entry barriers for nontechnical users to become content and ser
-vice providers, and trends like the Internet-of-Things or the success of Cloud services
all provide indicators of the high significance of the Internet today. Hence, social and economic impacts of innovations in the future Internet space can be reasonably ex
-146 C. Kalogiros et al pected to increase in importance. Thus, since the future Internet can be expected to be
characterized by an ever larger socioeconomic impact, a thorough investigation into socioeconomic tussle analysis becomes highly critical 9
The term tussle was introduced by Clark et al. 5 as a process reflecting the com -petitive behavior of different stakeholders involved in building
and using the Internet That is, a tussle is a process in which each stakeholder has particular self-interests, but
which are in conflict with the self-interests of other stakeholders. Following these interests results in actions â and inter-actions between and among stakeholders.
-tween autonomous systems 11 and mobile network convergence 10 constitute only two representative examples for typical tussle spaces
the future Internet is in the number of observed stakeholders in the current Internet and their interests.
Clark et al. speak of tussles on the Internet as of today. They argue 5 that âoe t here are,
that make up the Internet milieu with interests directly at odds with each other. â With the ongoing success of the Internet and with the assumption of a future Internet being
a competitive marketplace with a growing number of both users and service provid -ers, tussle analysis becomes an important approach to assess the impact of stakeholder
behavior This paper proposes a generic methodology for identifying and assessing socio -economic tussles in highly-dynamic and large systems,
Internet. In order to help an analyst during the tussle identification task, the approach presented here provides several examples of tussles, together with their mappings to
Future Internet. In Section 3 we provide a classification of tussles according to stake -holdersâ interests into social and economic ones,
The Design for Tussle goal is considered to be a normal evolution of Internet design goals to reflect the changes in Internet usage.
This paradigm shift should be reflected in new attempts for building the Future Internet. However, identifying both existing
and future socioeconomic tussles, understanding their relationship, assessing their importance and making informed technical decisions can be complicated very and
Internet researchers. Such a methodology should be a step-by-step procedure that can be applied to any Internet functionality,
acting as a guide for making sure that all important factors are considered when making technology decisions.
-tive and negative ones, for the Future Internet The proposed methodology is composed of three steps
In the first iteration, congestion control mainly affects heavy users (HUS), interac -tive users (IUS) and ISPS.
Two tussles have been identified, which are related closely a) contention among HUS and IUS for bandwidth on congested links and (b) conten
since there is no API (Application Programming Inter -face) for ASPS to affect how their traffic will be handled.
-acteristics of each pattern can be seen in many current and future Internet scenarios Each pattern looks at relationships between consumers and suppliers and how con
For instance, while individual Internet users are typically con -sumers, when they are creating data that a business would like to sell, with or without
their knowledge and consent, they are â providersâ of the resource in such a scenario
-tions in the Internet space have involved repurposing of resources, so identifying this sort of tussle also represents a way to find potential areas of growth and innovation
A popular example is bandwidth of bottleneck links and radio frequencies shared between users and wireless devices.
In the former case, modern transport con -trol protocols perform congestion control without considering the utility of the sender
with the prevalence of flat pricing schemes, has led to a contention tussle among user types, which economists identify as a âoetragedy of the commonsâ.
-age capabilities of servers and networking infrastructure. For example, routing table memory of core Internet routers can be considered a âoepublic goodâ that retail ISPS
have an incentive to over-consume by performing prefix de-aggregation with Border Gateway Protocol (BGP.
Another type of scarce Internet resources is network identi -fiers, like IPV4 addresses and especially âoeprovider Independentâ ones that ease net
-An Approach to Investigating Socioeconomic Tussles 153 work management and avoid ISP lock in. Sometimes a contention tussle between
allocated across users and services The remaining tussle patterns are seen mostly in bilateral or multilateral transac
-rate during service provision with strict requirements, like long-distance phone con -versations taking place over Internet.
Each provider has partial private information about the problem and no one is willing to take responsibility and the resulting cost
example of file sharing applications, if an ISP deployed middle-boxes and performed traffic shaping then it may have negative impact on the services,
for example ISPS selecting the next hop of user traffic while users selecting the traffic source in their requests.
redundancy and reliability asking for a backup path towards a destination, or prefer 154 C. Kalogiros et al
when multiple candidate servers are available, a consumer may prefer the one offering better Qos,
the server that minimizes its cost; e g.,, this is possible if the provider operates a local
Repurposing tussles occur in regards to the privacy of user communication data be -tween users, ISPS, service providers and regulators.
The users are social actors who have a desire, generally speaking, that networks are trustworthy and private 2. The
privacy of communications is based on democratic ideals, that persons should be secure from unwarranted surveillance.
may be warranted in ways that individual users are willing to forego their privacy concerns in the interest of broader societal concerns.
-munication data. Furthermore, ISPS and other companies such as Google and Amazon have increasingly been able to monetize their user transaction data and personal data
Google is feed able to advertisements based on past searching and browsing habits and Amazon is able to make recommendations based on viewing and purchasing
habits. These applications of user data as marketing tools are largely unregulated. And in many cases, users have proved willing to give up some of their privacy in exchange
for the economic benefit of better deals that can come from targeted advertising However, for users who wish to opt out of such systems,
the mechanisms for doing so are often less than clear, since the owners of the system prefer to keep people in
rather than easily let them out Responsibility tussles occur with ISPS that often inhabit a middle ground â they are
the bodies with direct access to the data, but are simply businesses, trying to make a
profit. ISPS, however, are placed often in the uncomfortable position of trying to negoti -An Approach to Investigating Socioeconomic Tussles 155
monitoring and monetizing the communication of their users, and the demands of gov -ernment bodies to be able to monitor the networks for illegal or unwanted activities
change in many technological systems such as the Future Internet. In practice, tech -nology that upsets the balance of control is released often and the debates over control
-nical designs can protect such sites from being attacked by entities inconvenienced or embarrassed by their revelations?
The Internet makes this a particularly contentious issue because with the global nature of the Internet one can't just assume Western values
as if it were possible even within Europe to agree to what that means. Where does
The Trilogy project 16 studied extensively the contention tussle among users as well as among an ISP and its customers, due to the aggressive behavior of popular
file sharing applications. On the one hand it proposed two protocols and a novel con -156 C. Kalogiros et al
gestion control algorithm that gives the right incentives to users of bandwidth inten -sive applications.
are shared between users in a fairer manner. This is achieved by configuring MPTCP so that it acts less aggressively than TCP when the latter flows experience congestion
-tempt to acquire sensitive personal data of end-users by masquerading as a trustwor -thy entity, as a reverse contention tussle among two website owners (the â consum
-ersâ). ) The tussle is being played out in the routing domain: the fraudulent one adver -tises more specific BGP prefixes so that ISPS update the entries in their routing tables
the resource) and route end-user requests to the fake website instead of the real one This situation has been shown to be a real problem due to the incentives of ISPS to
Traffic in Heterogeneous Internet Topologies) studies the control tussle that arises between ISPS and ASPS with respect to the routing decisions of each party.
based on a lean architecture to operate new services in the future Internet, the discovery of capabilities and the adaptation of many management operations to current working
arises, where embedded capabilities of networking devices and elements see âoedefault -onâ management functionality, which consist out of autonomous components interact
The MOBITHIN project 13 is related to a responsibility tussle between users of wireless services, mobile operators and regulators that has arisen from the social in
where most applications run on a remote server, is considered to achieving energy savings but to the disadvantage of the server provider
However under some assumptions, Wifi hotspots can consume much less energy than UMTS (Universal mobile telecommunications system) networks.
Thus, responsibil -ity cannot be checked easily. Furthermore, this situation triggers a control tussle be -tween wireless network operators and users of dual-band devices (e g.
Wifi and UMTS) on the technology used to communicate. Next generation networks, where a provider can control
which access technology is used by its end-users, could affect the userâ s ability to derive maximum value from the service
The SENDORA project 14 identifies a contention tussle based on their own eco -system design for Sensor Network aided Cognitive Radio technology that utilizes
wireless sensor networks to support the coexistence of licensed and unlicensed wire -less users in an area.
In this case, the spectrum is the resource in contention and the âoeproviderâ is the regulator,
Existing mobile operators, TV broadcasters and new operators are the â con -sumersâ of the resource in contention.
mobile operators and TV broadcasters) such as reduced operating costs, superior technology and potentially lucrative spectrum trading.
the Future Internet. One challenge for the technologists designing new hardware software systems, and platforms, however, is to be aware that technology is not
value-free, since it can have several consequences. To some extent, this message has already been taken on board by many policy makers, computer scientists, and systems
designers. The recognition that technology-in use frequently differs from technology -158 C. Kalogiros et al during-design is growing.
Thus technology will have socioeconomic consequences when released, and the challenge is to take steps to anticipate those consequences
-tween socioeconomic priorities and the Future Internet research community by offering selected services to FP7 projects in Challenge 1. SESERV provides access to socioeco
-sles that are present in the Internet, or may arise after a protocol or service has been
-cal solutions that achieve efficient spectrum usage for mobile devices. Following the increasing consensus on benefits of incorporating economic incentive mechanisms in
difficulty of addressing socioeconomic issues in the Internet when such challenges still exist in the real world
Towards a Future Internet: Interrelation between Technological, Social and Economic Trends, Final Report for DG Information Society and Media, European Com
The Future of the Internet: Tussles and Challenges in the Evolution Path as Iden -tified.
Tomorrowâ s Internet. IEEE/ACM Transactions on Networking 13 (3), 462â 475 (2005 6. Courcoubetis, C.,Weber, R.:
New Design Principles for the Internet. In: IEEE International Conference on Communications Workshops, June 2009, pp. 1â 5 (2009
Theoretical Aspects of Computer science 1999, pp. 404â 413 (1999 13. MOBITHIN project: D2. 5 Business models, Public Deliverable
Internet-Emerging Trends from European Research, IOS Press, Amsterdam (2010 16. Trilogy: D10-Initial Evaluation of Social and Commercial Control Progress, 2009, Public
Future Internet Foundations: Security and Trust Part III: Future Internet Foundations: Security and Trust 163
Introduction If you are asking for the major guiding principles of Future Internet technology and applications, the answer is likely to include âoesharing and collaborationâ.
Cloud com -puting, for instance, is built on shared resources and computing environments, offer -ing virtualized environments to individual tenants or groups of tenants, while execut
-ing them on shared physical storage and computation resources. The concept of Plat -form-as-a-Service provides joint development and execution environments for soft
-ware and services, with common framework features and easy integration of func -tionality offered by third parties.
The Internet of Services allows the forming of value networks through on-demand service coalitions, built upon service offerings of differ
reaches to the applications and business models, ranging from the exchange of data of physical objects for the optimization of business scenarios in, e g.,
management or manufacturing, â the Internet of things â to social networks While it is evident that sharing
and collaboration brings the Internet, its technolo -gies, applications and users to the next level of evolution, it also raises security and
privacy concerns and introduces additional protection needs. The Future Internet is characterized by deliberate exposure of precious information and resources on one
hand and a number of likely previously unknown interacting entities on the other hand, including service and platform providers as well as service brokers and aggre
or personal data, should however, only be exposed to known and trusted entities and in a controlled way, al
-lowing the owner of the data to decide and control how, when, and where it is going
but the Future Internet adds new dimensions of scale and complexity. The number of participating and collaborating
Data travel through a multitude of different domains, contexts and locations while being processed by a large number of entities with different owner
and treated according to the data ownerâ s policy in balance with the processing entitiesâ policies
Future Internet entity, while distribution and exchange of data serve for additional entry points that can potentially be exploited to penetrate a system.
The challenge is to design security and trust solutions that scale to Future Internet complexity and keep
the information and resource owner in control, balancing potentially conflicting re -quirements while still supporting flexibility and adaptation.
Future Internet Foundations: Security and Trust The chapters presented in the Security and Trust section of this volume look at the
First, Future Internet princi -ples are supported by revised communication paradigms, which address potential security issues from the beginning,
data-centric approach for the Future Internet, replacing point-to-point communication by a publish/subscribe approach.
that ensure the availability of data and maintains their integrity. It is a good example of how clean-slate approaches to the Future Internet can support security needs by
design, rather than provided as an add-on to an existing approach, as has been the case
for the current Internet The second group of chapters investigates the provision of assurance of the secu
-rity properties of services and infrastructures in the future Internet. The provision of evidence and a systematic approach to ensure that best security practices are applied
in the design and operation of Future Internet components are essential to provide the needed level of trustworthiness of these components.
âoeengineering Secure Future Internet Servicesâ by W. Joosen et al. makes a point for establishing an engineering discipline for secure services,
the Future Internet into account. Such a discipline is required to particularly empha -size multilateral security requirements, the composability of secure services, the pro
-rity support in programming and execution environments for services, and suggest using rigorous models through all phases of the SDLC, from requirements engineer
of Future Internet specific security engineering research strands. One of the major ingredients of this program, the provision of security assurance through formal valida
Formal Validation of Trust and Security in the Internet of Servicesâ by R. Carbone et
the feasibility of the approach to Future Internet scenarios and the scalability to its complexity:
-strate the way towards rigorous security and trust assurance in the future Internet addressing one of the major obstacles preventing businesses and users to fully exploit
the Future Internet opportunities today While engineering and validation approaches provide a framework for the secure
design of Future Internet artifacts adapted to its characteristics, the third group of Part III:
Future Internet Foundations: Security and Trust 165 chapters looks into specific instances of the information sharing and collaboration
principle and introduces novel means to establish their security. The chapter âoetrust -worthy Clouds underpinning the Future Internetâ of R. Glott et al. discusses latest
trends in cloud computing and related security issues. The vision of clouds-of-clouds describes collaboration and federation of independent cloud providers to provide
seamless access to end users, as if they were working within a single cloud environ -ment. This advanced level of distribution offers increased economic benefits, but also
and provide an outlook to their mitigation, embedded in a system -atic security risk management process.
In cloud computing, but also in most other Future Internet scenarios like the Internet of Services, the need for data exchange
leads to sensitive data, e g.,, personally identifiable information, travelling across a number of processes, components, and domains.
All these entities have the means to collect and exploit these data, posing a challenge to the enforcement of the usersâ
protection needs and privacy regulations. This is amplified by the dynamic nature of the Future Internet,
which does not allow one to predict by whom data will be proc -essed or stored.
To provide transparency and control of data usage, the chapter âoedata Usage Control in the future Internet Cloudâ proposes a policy-based framework for
expressing data handling conditions and enforcing them. Policies relating events and obligations are coupled with data (âoesticky policiesâ) and,
hence, cannot get lost in transition. A common policy framework based on tamper-proof event handlers and
obligation engines allows for the evaluation of user-defined policies and their execu -tion, leaving control to the user
With the three groups of chapters, this section of the book provides directions on how security and trust risks emerging from the increased level of sharing and collabo
-ration in the future Internet can be mitigated, removing a major hurdle for using its exciting opportunities in sensitive scenarios of both the business and societal worlds
Volkmar Lotz and Frances Cleary J. Domingue et al. Eds.):) Future Internet Assembly, LNCS 6656, pp. 167â 176,2011
 The Author (s). This article is published with open access at Springerlink. com Security Design for an Inter-Domain Publish/Subscribe
Architecture Kari Visala1, Dmitrij Lagutin1, and Sasu Tarkoma2 1 Helsinki Institute for Information technology HIIT /Aalto University School of Science and Technology, Espoo, Finland
{Kari. Visala, Dmitrij. Lagutin}@ hiit. fi 2 Department of computer science, University of Helsinki, Helsinki, Finland Sasu. Tarkoma@cs. helsinki. fi
Internet Protocol Suite with a data-centric or publish/subscribe (pub/sub) net -work layer waist for the Internet.
The clean-slate design makes it possible to take into account issues in the current Internet, such as unwanted traffic, from
the start. If these new proposals are deployed ever as part of the public Internet as an essential building block of the infrastructure, they must be able to operate
in a hostile environment, where a large number of users are assumed to collude against the network and other users.
In this paper we present a security design through the network stack for a data-centric pub/sub architecture that achieves
availability, information integrity, and allows application-specific security poli -cies while remaining scalable. We analyse the solution
and examine the mini -mal trust assumptions between the stakeholders in the system to guarantee the
Future Internet, publish/subscribe networking, network security 1 Introduction Data-centric pub/sub as a communication abstraction 2, 3,
4 reverses the control between the sender and the receiver. Publication in the middle decouples the publisher
whole Internet protocol suite with a clean-slate data-centric pub/sub network waist 14. This enables new ways to secure the architecture in a much more fundamental
For example, it must be assumed that the core routers forward packets at line-speeds of tens of Gigabits per second, which requires ex
-pensive, high speed memory for the routing tables. In the inter-domain setting, we have to take into account the various stakeholders such as ISPS, end-users, and
Data-or content-centric networking can be seen as the inversion of control between the sender and the receiver compared to message passing:
-fied data that the network then returns when it becomes available taking advantage of multicast and caching 2,
-tion pattern to emphasize that the data items can link to other named data and that the
data has structure An immutable association can be created between a rendezvous identifier (Rid) and a data value by a publisher
and we call this association a publication. At some point in time, a data source may then publish the publication inside a set of scopes that
determine the distribution policies such as access control, routing algorithm, reach -ability, and Qos for the publication and may support transport abstraction specific
policies such as replication and persistence for data-centric communication. The Security Design for an Inter-Domain Publish/Subscribe Architecture 169
scope must be trusted by the communicating nodes to function as promised and much of the security of our architecture is based on this assumption as we explain in 5
function, operates solely using data-centric pub/sub model, it can be used to set up communication using any kind of transport abstraction on the data plane fast path
that is used for the payload communication. The data-centric paradigm is a natural match with the communication of topology information that needs to be distributed
typically to multiple parties and the ubiquitous caching considerably reduces the ini -tial latency for the payload communication as popular operations can be completed
locally based on cached data Below the control plane, t he network is composed of domains, that encapsulate re
-sources such as links, storage space, processing power in routers, and information. The concept of domain is here very general,
such as software components, individual nodes, or ASES. An upgraph of a node is the set of potential resources, that can be represented as a network map of domains and their
endpoints are a source and a destination or for data-centric transport: a data source
and a subscriber. The topic is identified with an Rid and is used to match the end
For example, for data-centric communication, the topic identifies the requested publication A graphlet defines the network resources used for the payload communication and
the identifier and L is a variable length label of binary data. Only fixed length hash of
variable length names are needed for dynamically generated content, where the data source uses the label as an argument to produce the publication on the fly.
where PN is the public key of the user's own namespace. The contents of this publication point to another âoemovie frame dataâ
hardware accelerator has been developed for PLA 24 accelerating cryptographic operations Security Design for an Inter-Domain Publish/Subscribe Architecture 171
scopes, where publications are made available are orthogonal to the structure of the data In Fig. 1, the publication on the left is published inside âoemy home scopeâ that is fully
controlled by the local user. On the other hand, the movie frame publication on the right is stored inside movies studio's localized scope,
easy to see that the logical structure of the data, e g. the link between the two publica
-tions, is orthogonal to the scoping of the data that determines the communication aspects for each publication
In the current Internet, most policy compliant paths have the so-called valley-free property 16,
a data-centric pub/sub primitive as a recursive, hierarchical structure, which first joins node local rendezvous implementations into rendezvous networks (RN) and then RNS
-dezvous core and scope-specific implementations of scope home nodes that imple -ment the functionality for a set of scopes
-end path between the service container (e g. a data source) and the client (e g. a subscriber) and
tion data or pending subscription alive. This pub/sub primitive is the only functional -ity implemented by the rendezvous core.
We refer to our work in 5 for a detailed description of the rendezvous security mechanisms
be found in the rendezvous core, the subscription reaches the scope, which can then dynamically generate the response
should be supported by adding a data-centric transport to the data plane as we did
Each scope also publishes a meta-data publication inside itself named DKX, âoescope meta-dataâ) describing which transports the scope supports, among
The upgraph data itself is published by the provider domain of the node Because many nodes share the same upgraph, the data-centric rendezvous system
caches them orthogonally close to the scope homes that are nodes implementing the scope in question. Similarly, the result of the rendezvous is cached automatically and
If the transport in question is multicast data dissemination then a separate resource allocation protocol could be coupled with the protocol as we
used to hide the location of the service from its users. We refer to our work in 2 for
A data-oriented network architecture DONA 4 replaces a tradi -tional DNS-based namespace with self-certifying flat labels,
which owns the data and L is a label. DONA utilizes an IP header extension mechanism to add a DONA header to the IP header, and sepa
Consumers of data send interest packets to the network, and a nodes possessing the data reply with the corresponding
data packet. Since packets are named independently, a separate interest packet must be sent for each required data packet.
In CCN data packets are signed by the original publisher allowing independent verification, however interest packet's are not always
protected by signatures Security issues of the content-based pub/sub system have been explored in 7. The
work proposes secure event types, where the publication's user friendly name is tied to the publisher's cryptographic key
Security Design for an Inter-Domain Publish/Subscribe Architecture 175 5. 1 Security Mechanisms Most of existing network layer security proposals utilize hash chains or Merkle trees
8. Examples of hash chain based solutions include TESLA 9, which is based time hash chain scheme,
Accountable Internet Protocol (AIP) 11 aims to improve security by providing accountability on the network layer.
If the router receives a packet from the unknown EID the router will send a verification message back
and the node will reply with a mes -sage signed by its private key. Since EID is hash of node's public key,
user's e-mail address to be used as user's public key, simplifying the key distribution
PKG), which knows all private keys of its users 6 Conclusion and Future Work In this paper we introduced a data-centric inter-domain pub/sub architecture addressing
availability and data integrity. We used the concept of scope to separate the logical structure of linked data from the orthogonal distribution strategies used to determine
how the data is communicated in the network. This is still ongoing work and, for exam -ple, the ANDL language and quantitative analysis will be covered in our future work
Open Access. This article is distributed under the terms of the Creative Commons Attribution Noncommercial License which permits any noncommercial use, distribution, and reproduction
in any medium, provided the original author (s) and source are credited References 1. Wang, C.,Carzaniga, A.,Evans, D.,Wolf, A l.:
Internet-scale publish-subscribe systems. In: HICSS â 02, Hawaii, USA (2002 2. Visala, K.,Lagutin, D.,Tarkoma, S.:
An Inter-Domain Data-Oriented Routing Architecture. In: Rearchâ 09, Rome, Italy (2009 3. Jacobson, V.,Smetters, D. K.,Thornton, J. D.,Plass, M.,Briggs, N.,Braynard, R. L.:
A Data-Oriented (and Beyond) Network architecture. In: ACM SIGCOMM 2007 Kyoto, Japan (2007 176 K. Visala, D. Lagutin, and S. Tarkoma
-rowâ s Internet. IEEE/ACM Transactions on Networking 13 (3), 462â 475 (2005 7. Pesonen, L. I.,Bacon, J.:
5th international workshop on Software engineering and mid -dleware, pp. 98â 105 (2005 8. Merkle, R.:
-countable internet protocol (AIP. In: Proceedings of the ACM SIGCOMM 2008, pp. 339â 350 (2007
-tions on Computer systems 2 (4), 277â 288 (1984 14. Lagutin, D.,Visala, K.,Tarkoma, S.:
Publish/Subscribe for Internet: PSIRP Perspective Valencia FIA book (2010 15. Tarkoma, S.,Antikainen, M.:
13th IEEE Global Internet Symposium 2010 (2010 16. Gao, L.:On Inferring Autonomous System Relationships in the Internet.
IEEE/ACM Transactions on Networking 9 (6), 733â 745 (2001 17. Yang, X.,Clark, D.,Berger, A w.:
IEEE Computer Society Press, Los Alamitos (2004 20. Carpenter, B.:rfc1958: Architectural Principles of the Internet.
IETF (June 1996 21. Jokela, P.,Zahemszky, A.,Esteve, C.,Arianfar, S.,Nikander, P.:LIPSIN:
European Conference on Computer Net -work Defence, EC2ND (2009 23. Miller, V. S.:Use of elliptic curves in cryptography.
In: Williams, H. C. ed.)CRYPTO 1985. LNCS, vol. 218, pp. 417â 426. Springer, Heidelberg (1986
Hardware subtask final report. Helsinki University of Technology, Tech. Rep (2008), http://www. tcs. hut. fi
/Software/PLA/new/doc/PLA HW FINAL REPORT. pdf 25. Lagutin, D.:Securing the Internet with Digital Signatures.
Doctoral dissertation, Depart -ment of Computer science and Engineering, Aalto University, School of Science and Technology (2010
Engineering Secure Future Internet Services Wouter Joosen1, Javier Lopez2, Fabio Martinelli3, and Fabio Massacci4 1 Katholieke Universiteit Leuven
wouter. joosen@cs. kuleuven. be 2 University of Malaga jlm@lcc. uma. es 3 National Research Council of Italy
establishing a discipline for engineering secure Future Internet Services typically based on research in the areas of software engineering, of service
engineering and security engineering. Generic solutions that ignore the characteristics of Future Internet services will fail,
yet it seems obvious to build on best practices and results that have emerged from various research communities
in the scope of secure service engineering into comprehensive software and service life cycle support. Such a life cycle support must deliver
order to jointly enable the security and trustworthiness of Future Internet services 1 Introduction 1. 1 Future Internet Services
The concept named Future Internet (FI) aggregates many facets of technology and its practical use, often illustrated by a set of usage scenarios and typical
applications. The Future Internet may evolve to use new infrastructures, net -work technologies and protocols in support of a growing scale and a converging
world, especially in light of smaller, portable, ubiquitous and pervasive devices Besides such a network-level evolution, the Future Internet will manifest itself to
the broad mass of end users through a new generation of services (e g. a hybrid aggregation of content and functionality), service factories (e g.,
, personal and enterprise mash-ups), and service warehouses (e g.,, platform as a service. One speciï c service instance may
) Future Internet Assembly, LNCS 6656, pp. 177â 191,2011 câ The Author (s). This article is published with open access at Springerlink. com
In addition, the user community of such FI services evolves and widens rapidly, including masses of typical end users in the role
of prosumers (producing and consuming services. This phenomenon increases the scale, the heterogeneity and the performance challenges that come with FI
Multiparty service systems are not entirely new, yet the Future Internet stretches the present know how on building secure software services and systems:
more stakeholders with diï erent trust levels are involved in a typical service com -position and a variety of potentially harmful content sources are leveraged to
provide value to the end user. This is attractive in terms of degrees of freedom in the creation of service oï erings and businesses.
Furthermore, the Future Internet will be an intrinsically dynamic and evolv -ing paradigm where, for instance, end users are empowered more and more and
therefore decide (often on the spot) on how content and services are shared and composed. This adds an extra level of complexity,
1. 2 The Need for Engineering Secure Software Services The need to organize, integrate and optimize the research on engineering secure
software services to deal eï ectively with this increased challenge is pertinent and well recognized by the research community and by the industrial one.
Internet services and causes signiï cant monetary losses in recovering from those attacks. In addition, this induces users at several levels to lose conï dence in the
adoption of ICT-services From a business perspective, however, we are now witnessing the emergence
of new and unprecedented models for service-oriented computing for the Future Internet: Infrastructure as a service (Iaas), Platform as a service (Paas) and
Software as a service (Saas). These models have the potential to better adhere to an economy of scale
and have shown already their commercial value fostered by key players in the ï eld. Nevertheless, those new models present change of control
New Internet services will have to be Engineering Secure Future Internet Services 179 provided in the near future,
and security breaches in these services may lead to large ï nancial loss and damaged reputation
-cesses and tools for secure software development. This typically covers require -ments engineering, architecture creation, design and implementation techniques
developed software is secure. Assurance must be based on justiï able evidence and the whole process designed for assurance.
ICT-services according to the latest Future Internet paradigms, where services are composed by simpler services (provided by separate administrative domains
service architectures and secure service design,(3) supporting programming en -vironments for secure and compose-able services,(4) enabling security assurance
integrating the former results in (5) a risk-aware and cost-aware software devel -opment life-cycle (SDLC),
and (6) the delivery of case studies of future internet application scenarios The ï rst three activities represent major and traditional stages of (secure
software development: from requirements over architecture and design to the composition and/or programming of working solutions.
These three activities interact to ensure the integration between the methods and techniques that are
techniques that we consider useful for engineering secure Future internet services 2 Security Requirements Engineering
The need for assurance in the future Internet demands a set of novel engi -neering methodologies to guarantee secure system behavior and provide credible
The security requirements of Future Internet applica -tions will diï er considerably from those of traditional applications.
is that Future Internet applications will not only be distributed geographically as are traditional applications, but they will also involve multiple autonomous
stakeholders, and may involve an array of physical devices such as smart cards phones, RFID sensors and so on that are connected perpetually and transmit
a variety of information including identity, bank accounts, location, and so on Some of these transactions might even happen transparently to the user;
for example, a personâ s identity could be communicated seamlessly by a personal device to the store she is entering to do the shopping.
Engineering Secure Future Internet Services 181 This picture is complicated further by the vast number and the geographical
Sensor networks, RFID tags, smart appliances that communicate not only with the user but with their manufacturers, are examples of such devices.
Such de -ployments inherit security risks from the classical Internet and, at the same time create new and more complex security challenges.
Examples include illicit track -ing of RFID tags (privacy violation) and cloning of data on RFID tags (identity
theft). ) Applications that involve such deployments typically cross organization boundaries In light of the challenges and principles highlighted above,
-neous users and a high level of composition and adaptation is required. These factors increase the complexity of applications
-age existing mechanisms and methodologies for software construction as well as researching about new ways to take this complexity into account in a holistic
-ple users, devices, third-party components interact continuously and seamlessly so security enforcement mechanisms are indispensable.
software service and/or system is a timely moment to enforce and reason about these security mechanisms,
The software architecture encompasses the more relevant elements of the ap -plication, providing either a static or/and a dynamic view of the application.
which comprise software elements, the ex -ternally visible properties of those elements, and the relationships among themâ
early phase in the software development cycle The research topics one must focus on in this subarea relate to model-driven
Until this point in the software and service development process, diï erent concerns â security among them â of the whole application have been sepa
Engineering Secure Future Internet Services 183 in order to grasp a comprehensive understanding of the application as a whole
limiting the propagation of design ï aws through the models Second, given that diï erent sub-architectures may exist, each addressing dif
-curring problem in software design. Design patterns, once identiï ed, allow reuse of design solutions that have proved to be eï ective in the past, reducing costs
security-critical software systems 4 Security Support in Programming Environments Security Support in Programming Environments is not new;
still it remains a grand challenge, especially in the context of Future Internet (FI) Services.
Secur -ing Future Internet Service is inherently a matter of secure software and systems The context of the future internet services sets the scene in the sense that (1
speciï c service architectures will be used, that (2) new types of environments will be exploited, ranging from small embedded devices (âoethingsâ) to service in
-frastructures and platform in the cloud, and (3) a broad range of programming technologies will be used to develop the actual software and systems
The search for security support in programming environments has to take this context in account.
The requirements and architectural blueprints that will be produced in earlier stages of the software engineering process cannot deliver
the expected security value unless the programs (code) respect these security artefacts that have been produced in the preceding stages.
This sets the stage for model driven security in which transformations of architecture and design
artefacts is essential, as well as the veriï cation of code compliance with various 184 W. Joosen et al
-ciï c elements of the software design; other may simply be high priority security requirements that have articulated â such as the appropriate treatment of con
Supporting security requirements in the programming â code â level requires a comprehensive approach. The service creation means must be improved and
as well as programming new services from scratch using a state-of-the-art programming language. The service creation context will typ
-ically aim for techniques and technologies that support compile and build-time feedback. One could argue that security support for service creation must focus
Future Internet services and applications will be composed of several services created and hosted by various organizations and providers), each with its own
Middleware Aspects. The research community should re-investigate ser -vice-oriented middleware for the Future Internet, with a special emphasis on
Engineering Secure Future Internet Services 185 enabling deployment, access, discovery and composition of pervasive services
oï ered by resource-constrained nodes 4. 2 Secure Service Programming Many security vulnerabilities arise from programming errors that allow an ex
-ploit. Future Internet will further reinforce the prominence of highly distributed and concurrent applications, making it important to develop methodologies that
ensure that no security hole arises from implementations that exploit the com -putational infrastructure of the Future Internet.
The research community must further investigate advances over state-of-the-art in ï ne-grained concurrency to
enable highly concurrent services of the Future Internet, and will improve anal -ysis and veriï cation techniques to verify, among others, adherence to program
-ming principles and best-practices 10 Veriï able Concurrency. Lock-free wait-free algorithms for common soft
-ware abstractions (queues, bags, etc. are one of the most eï ective approaches to exploit multi-core parallelism.
These algorithms are hard to design and prove correct, error-prone to program, and challenging to debug.
Adherence to Programming Principles and Best-Practices. Program -ming support must include methods to ensure the adherence of a particular pro
-gram to well-known programming principles or best-practices in secure software development. Emphasis will be put on language extensions that guarantee adher
currently used in order to prevent cross-site scripting attacks and similar vul -nerabilities associated with web-based distributed applications.
Obviously, the logical rationales underlying such best-practises must be articulated, enabling he development of type systems enforcing these practises directly â thus allowing
users to deviate from rigid best-practices while still maintaining security 4. 3 Platform Support for Security Enforcement
Future Internet applications span multiple trust domains, and the hybrid aggre -gation of content and functionality from diï erent trust domains requires com
Web technology inherently embeds the concept of cross-domain references, and applications are isolated via the
run-time execution monitors that can provably enforce advanced security policies 19,3 including ï ned-grained access control policies usage control policies and
central role in the development of software based services to provide conï dence about the desired security level.
giving feedback at each stage of the software life cycle by checking that the related models and artefacts satisfy their functional and security requirements
Obviously the security support in programming environments that must be delivered will be essential to incept a transverse methodology that
enables to manage assurance throughout the software and service development life cycle (SDLC. The next section clariï es these issues
Engineering secure Future Internet services demands for at least two traversal issues, security assurance and risk and cost management during SDLC
The main objective is to enable assurance in the development of software based services to ensure conï dence about their trustworthiness.
Our core goal is to incept a transverse methodology that enables to manage assurance throughout
the software development life cycle (SDLC. The methodology is based on two strands: A ï rst sub-domain covers early assurance at the level of requirements
failures in Future Internet applications reduces development costs and improves assurance in the ï nal system.
Engineering Secure Future Internet Services 187 secure protocols, services, and systems. This involves the deï nition of suitable
-ï cation of Future Internet protocols. The planned extensions require not only signiï cant eï ciency improvements,
programming discipline. Internet applications can be validated through testing In that case, it is possible to develop test data generation that speciï cally targets
the integration of services, access control policies or speciï c attacks. Moreover implementations can be monitored at run-time to ensure that they satisfy the
required security properties Complementing activities are related to secure programming. This strand addresses a comprehensive solution for program veriï cation,
while adding a par -ticular focus on session management in concurrent and distributed service com -positions
characteristic for service-oriented applications in the future Internet: penetration testing that leverages on the high-level models that are generated in early stages
of the software life cycle, automated generation in XML-based input data to maximize the eï ciency in the security testing process,
-tion must complement programming-level veriï cation and testing in order to provide the ï nal assurance that the latter cannot deliver,
-positions in Future Internet. We will study approaches for run-time monitoring of data ï ow,
as well as technologies for privacy-preserving usage control Towards a Traverse Methodology. Security concerns are speciï ed at the
Metrics can be used directly for computing risks (e g.,, probability of threat occurrence) or indirectly (e g.,
-curity metrics in the future Internet applications become increasingly impor -tant. Service-oriented architectures demand for assurance indicators that can
Clients want to be sure that their data outsourced to other domains, which the clients cannot control,
While the software development proceeds through incremental phases, the risk and cost analysis will undergo new iterations for
-gate through the software development phases and become more reï ned. In order to support the propagation of analysis results through the phases of the SDLC
Engineering Secure Future Internet Services 189 one needs to develop methods and techniques for the reï nement of risk analysis
In order to accommodate to a modular software development pro -cess, as well as eï ectively handling the heterogeneous and compositional nature
of Future Internet services, one needs to focus on a modular approach to the analysis of risks and costs.
-tablishing a discipline for engineering secure Future Internet Services, typically based on research in the areas of software engineering, security engineering and
of service engineering. We have clariï ed why generic solutions that ignore the characteristics of Future Internet services will fail:
the peculiarities of FI services must be reï ected upon and be addressed in the proposed and validated solution
Network of Excellence on Engineering Secure Future Internet Software Services and Systems) under the grant agreement n. 256980
Software Architecture In practice, 2nd edn Addison-Wesley, Boston (2003 3. Bauer, L.,Ligatti, J.,Walker, D.:
agent-oriented software development methodology. Autonomous Agents and Multi -Agent Systems 8, 203â 236 (2004
Engineering Secure Future Internet Services 191 8. Dardenne, A.,van Lamsweerde, A.,Fickas, S.:Goal-directed requirements acqui
of the 22nd Annual Symposium on Foundations of Computer science, Washing -ton, DC, USA, pp. 350â 357.
IEEE Computer Society Press, Los Alamitos (1981 doi: 10.1109/SFCS. 1981.32 10. Erlingsson, U.,Schneider, F. B.:
Irm enforcement of java stack inspection. In: Pro -ceedings of the 2000 IEEE Symposium on Security and Privacy, WASHINGTON DC
IEEE Computer Society Press, Los Alamitos (2000 11. France, R.,Fleurey, F.,Reddy, R.,Baudry, B.,Ghosh, S.:
Enterprise Distributed Object Computing Conference, WASHINGTON DC, USA, p 253. IEEE Computer Society Press, Los Alamitos (2007
12. Giorgini, P.,Mouratidis, H.,Zannone, N.:Modelling security and trust with secure tropos. In:
Integrating Security and Software engineering: Advances and Future Vision, IDEA (2006 13. Group, O.:Security design pattern technical guide
Ubiquitous Knowledge Discovery for Users at ECML/PKDD, pp. 51â 64 (2006 15. Hamlen, K. W.,Morrisett, G.,Schneider, F. B.:
SPAQUÂ 08 (Int. Workshop on Software Patterns and Quality)( 2008 18. Lazouski, A.,Martinelli, F.,Mori, P.:
Computer science Review 4 (2), 81â 99 (2010 19. Le Guernic, G.,Banerjee, A.,Jensen, T.,Schmidt, D. A.:
secure mobile grid systems. Journal of Systems Architecture. In Press (2010 24. Sabelfeld, A.,Myers, A c.:
Progress in Informatics 5, 35â 47 (2008 Towards Formal Validation of Trust and Security in the Internet of Services
Roberto Carbone1, Marius Minea2, Sebastian Alexander Moâ dersheim3 Serena Elisa Ponta4, 5, Mathieu Turuani6, and Luca Vigano`7
in the release of ï awed products to end-users. This issue can be sig -niï cantly mitigated by empowering designers and developers with tools
The formal veriï cation of trust and security of the Internet of Services will signiï cantly boost its development and public acceptance
The vision of the Internet of Services (Ios) entails a major paradigm shift in the way ICT systems and applications are designed,
they are no longer the result of programming components in the tra -ditional meaning but are built by composing services that are distributed over
In the Ios, services are business functionalities that are designed and implemented by producers, deployed by providers,
However, the new opportunities opened by the Ios will only materialize if concepts, techniques and tools are provided to ensure secu
) Future Internet Assembly, LNCS 6656, pp. 193â 207,2011 câ The Author (s). This article is published with open access at Springerlink. com
are already plaguing complex web-based security-sensitive applications, and thus severely aï ect the development of the future internet.
Moreover, security vali -dation should be carried out at all phases of the service development process in particular during the design phase by the service designers themselves or by
-sumption time, thereby signiï cantly improving the all-round security of the Ios In this chapter, we give a brief overview of the main scientiï c and industrial chal
thus increase the development and public acceptance of the Ios We proceed as follows. In Sections 2 and 3, we discuss, respectively, some of
Towards Formal Validation of Trust and Security in the Internet of Services 195 Second, SOAS are also distributed systems, with functionality and resources
distributed over several machines or processes. The resulting exponential state -space complexity makes their design and eï cient validation diï cult, even more
of the communicated data. More elaborate goals are structural properties (which can sometimes be reduced to conï dentiality and authentication goals) such as
, for a given web service for online shopping one may require that every order will eventually be processed
9 The AVANTSSAR Platform allows users also to input their services by specifying them using the high-level formal speciï cation language ASLAN,
-sider the policies that a user U has access to a ï le F if U belongs to a group G
or U is the deputy of a user that has access to F access (U, F) â member (U, G) â§owner (G, F
For instance, if user Alice changes to another group within the organization, she will immediately obtain all access
except for those that she maintains due to her being a deputy for other users We consider transition systems in which a state is a set of facts like member
Towards Formal Validation of Trust and Security in the Internet of Services 197 purposes, no agent can access both ï les f1 and f2.
the Internet of Services, the challenge of validating services and service-oriented applications cannot be addressed simply by scaling up the current generation of
composing web services have been considered, which diï er by their architecture orchestration is centralized and all traï c is routed through a mediator, whereas
and all web services can communicate directly 198 R. Carbone et al Several âoeorchestrationâ notions have been advocated (see, e g.,
data of each organization; and our main motivation is to take into account the se -curity policies while computing an orchestration.
The AVANTSSAR Platform for example, implements an idea presented in 11 to automatically generate a mediator.
We specify a web service proï le from its XML Schema and WS -Securitypolicy using ï rst-order terms (including cryptographic functions.
mediator is able to use cryptography to produce new messages, and is con -structed with respect to security goals using the techniques we developed for the
Towards Formal Validation of Trust and Security in the Internet of Services 199 of course, undesirable to verify the entire system as a whole:
For instance, Tulafale 6, a tool by Microsoft Research based on Proverif 7, exploits abstract interpretation for veriï cation of web services
that use SOAP messaging, using logical predicates to relate the concrete SOAP messages to a less technical representation that is easier to reason about
representing, for instance, agents, request numbers, or cryptographic keys) into ï nitely many equivalence classes and to compute on those equivalence classes
ï xed-point computations of static analysis. Thanks to the over-approximation these systems completely avoid the state-explosion problems of model checking
is to organize data by means of sets and to abstract data by set membership.
the example of Section 2, we may consider the set Ug of users that are currently
members of a group g. We can then identify all users that belong to the same set
, if a user changes from one group to another. Here, the set-abstraction method deï nes a mechanism to reason about
user would not delete any information that he has learned in the old group, but he
layer of software modules that carry out the translation from application-level speciï cation languages (such as BPMN and BPEL,
Towards Formal Validation of Trust and Security in the Internet of Services 201 Vu ln
-quired to determine the access to private data and to the meta-policies that control them.
data available anywhere and anytime in a health care organization, while lower -ing infrastructure costs. Clearly, privacy requirements will be much more diï cult
the detection of a serious ï aw in the SAML-based SSO solution for Google
Towards Formal Validation of Trust and Security in the Internet of Services 203 proï le and which are not.
Still, when Google de -veloped their SAML-based SSO solution for Google Apps they released a ï awed
product, which allowed a dishonest service provider to impersonate the victim user on Google Apps, granting unauthorized access to private data and services
email, docs, etc..The vulnerability was detected by the SATMC backend of the AVANTSSAR Platform and the attack was reproduced in an actual deployment
of SAML-based SSO for Google Apps. Google and the US Computer Emergency Readiness Team (US-CERT) were informed
and the vulnerability was kept con -ï dential until Google developed a new version of the authentication service and
Googleâ s customers updated their applications accordingly. The severity of the vulnerability has been rated High in a note issued by the National Institute of
Standard and Technology (NIST Moreover, as shown in 2, the SATMC backend of the AVANTSSAR Plat
It also allows an attacker to launch Cross-Site Scripting (XSS and Cross-Site Request Forgery attacks (XSRF.
This last type of attack is even more pernicious than classic XSS, because XSRF requires the client to have
SAML-based SSO for Google Apps and that could have allowed a malicious web server to impersonate a user on any Google application.
In 2, solutions that can be used to mitigate and even solve the problem are described. These possible
, USB tokens or smart cards Sensitive cryptographic keys, stored inside the token, should not be revealed to the outside and it should be impossible for an attacker to change those keys
The attacks found show that in many implementations this is not the case: the compromise of a key allows an attacker to clone the token and, more generally
to perform the same security-critical operations as the legitimate token user Formal validation of trust and security will become a reality in the Internet
of Services only if and when the available technologies will have migrated to in -dustry, as well as to standardization bodies (which are driven mostly by industry
FM would promote a more secure development environment, a variety of prac -tical and cultural reasons lead the industrial world to perceive FM approaches
and (iii) the diï erences between formal languages and models and those used in industrial design and development environments (e g.,
, BPMN, Java, ABAP The problem is how to make new, eï cient methodologies and technologies
accessible and readily exploitable, beneï tting industry designers and develop -ers. This amounts to migrating the research outcomes of the logical level into
with easy-to-use GUIS and translators to and from the core formal models should be devised and migrated to the selected development environments
A concrete example is the industry migration of the AVANTSSAR Platform to the SAP environment.
out by building contacts with core business units. First, in the trail of the suc
Management (SAP NW SIM) with the objective of exploiting the AVANTSSAR technology to initiate a deep formal analysis of the SAP Netweaver SAML Next
SAP have been identiï ed. All discovered risks and ï aws in the SAML protocol have been addressed in NW-NGSSO implementation
Towards Formal Validation of Trust and Security in the Internet of Services 205 there and helped SAP Research to better understand the vulnerability itself and
-complished by means of the Need-to-Know principle (giving to the users enough rights to perform their job,
6 Conclusions and Outlook As exempliï ed by these case studies and success stories, formal validation tech
-nologies can have a decisive impact for the trust and security of the Ios. The
advances will signiï cantly improve the all-round security of the Ios, and thus boost its development and public acceptance
Analysis of SAML 2. 0 Web browser Single Sign-on: Breaking the SAML-based Single Sign-on for Google Apps.
In: Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering (FMSE 2008), pp. 1â 10.
for web services. In: de Boer, F. S.,Bonsangue, M m.,, Graf, S.,de Roever, W.-P
IEEE Computer Society Press, Los Alamitos (2001 8. Bodei, C.,Buchholtz, M.,Degano, P.,Nielson, F.,Nielson, H r.:
Boichut/ta4sp. html 10. Bortolozzo, M.,Centenaro, M.,Focardi, R.,Steel, G.:Attacking and Fixing
Proceedings of Web Service Composition and Adaptation Workshop (held in conjunction with SCC/SERVICES-2008), pp. 529â 537.
Computer Society Press, Los Alamitos (2008 12. Ciobaë ca, S.,Cortier, V.:Protocol composition for arbitrary primitives.
IEEE Computer Society Press, Los Alamitos (2010 13. Clarke, E. M.,Grumberg, O.,Peled, D. A.:
Towards Formal Validation of Trust and Security in the Internet of Services 207 17. Dolev, D.,Yao, A.:
on Information theory 2 (29)( 1983 18. Hodkinson, I.,Reynolds, M.:Temporal Logic. In: Blackburn, P.,van Benthem, J
Logic and Algebraic Programming 70 (1), 96â 118 (2007 20. Marconi, A.,Pistore, M.:Synthesis and Composition of Web Services.
In: Bernardo M.,Padovani, L.,Zavattaro, G. eds. SFM 2009. LNCS, vol. 5569, pp. 89â 157
and Web Services with Databases. In: Proceedings of 17th ACM conference on Computer and Communications security (CCS 2010), pp. 351â 360.
ACM Press New york (2010 22. Moâ dersheim, S.,Vigano`,L.:Secure Pseudonymous Channels. In: Backes, M.,Ning
Web Services Business Process Execution Language vers. 2. 0 2007), http://docs. oasis-open. org/wsbpel/2. 0/OS/wsbpel-v2. 0-OS. pdf
25. Pnueli, A.:The Temporal Logic of Programs. In: Proceedings of the 18th IEEE Symposium on Foundations of Computer science, pp. 46â 57.
IEEE Computer So -ciety Press, Los Alamitos (1977 26. T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol, Version
1. 2. IETF RFC 5246 (Aug. 2008 27. Turuani, M.:The CL-Atse Protocol Analyser.
Internet Ruâ diger Glott1, Elmar Husmann2, Ahmad-Reza Sadeghi3, and Matthias Schunter2 1 Maastricht University, The netherlands
2 IBM Research â Zuâ rich, Ruâ schlikon, Switzerland huselmar@de. ibm. com, mts@zurich. ibm. com
3 TU Darmstadt, Germany ahmad. sadeghi@trust. rub. de Abstract. Cloud computing is a new service delivery paradigm that
aims to provide standardized services with self-service, pay-peruse, and seemingly unlimited scalability. This paradigm can be implemented on
in the future Internet This article introduces upcoming security challenges for cloud services such as multi-tenancy, transparency and establishing trust into correct
1 Cloud computing and the Future Internet Cloud computing is expected to become a backbone technology of the Future
Internet that provides Internet-scale and service-oriented access to virtualized computing, data storage and network resources as well as higher level services
In contrast to the current cloud market that is mainly characterized by isolated providers, cloud computing in the future Internet is expected to be character
-ized by a seamless cloud capacity federation of independent providers-similar to the network peering
and IP transit purchasing of ISPS in todayâ s Internet For an end-user this means that via interacting with one cloud provider, re
-sources and services provided by multiple similar providers are seamlessly ac -cessed. Cloud computing goes beyond technological infrastructure that derives
from the convergence of computer server power, storage and network bandwidth It is a new business
and distribution model for computing that establishes a new relationship between the end user and the data center, which âoe...
gives the user â programmatic controlâ over a part of the data centerâ 1, pp. 8-9
For this cloud-of-clouds vision4this article will investigate the related chal -lenges for trust and security architectures and mechanisms
4 For which the Internet pioneer Vint Cerf has suggested recently the term âoeinter -cloudâ J. Domingue et al.
Eds.):) Future Internet Assembly, LNCS 6656, pp. 209â 221,2011 câ The Author (s). This article is published with open access at Springerlink. com
210 R. Glott et al FIA projects like RESERVOIR or VISION are conducting research on core
technological foundations of the cloud-of-clouds such as federation technologies interoperability standards or placement policies for virtual images or data across
providers. Many of these developments can be expected to be transferred into the Future Internet Core Platform project that will launch in 2011.
This goes along with increased collaboration on open cloud standards under developments by groups such as the DMTF Open Clouds Standards Incubator, the SNIA
Cloud storage Technical Working group or the OGF Open Clouds Computing Interface Working group Trust and security are regarded often as an afterthought in this context, but
computing, data protection and privacy issues as well as liability and compliance problems may hinder to tap the full potential of cloud computing 22,8, 26.
By clouds becoming regulation-aware, in the sense that it will ensure that data mobility is limited to ensure compliance with a wide range of diï erent national
legislation including privacy legislation such as the EU Data protection Directive 95/46/EC As of today, cloud computing is facing signiï cant acceptance hurdles when it
comes to hosting important business applications or critical infrastructures such as those of the usage domains addressed by FIA.
This article will illustrate the reasons for this, and discuss the complex trust and security requirements.
Trustworthy Clouds Underpinning the Future Internet 211 An example for the ï rst category is the Google gov. app cloud launched in
September 2009 that oï ers a completely segregated cloud targeted exclusively at US government customers.
Similarly, IBM has launched a FISMA compliant Federal Community Cloud in 2010 Other cloud providers also adapt basic service security to the needs of spe
Following its software-plus-services strategy an -nounced in 2007, Microsoft has developed in the past years several Saas cloud
services such as the Business Productivity Online Suite (BPOS. While all of them may be delivered from a multi-tenant public cloud for the entry level
user, Microsoft oï ers dedicated private cloud hosting and supports third-party or customer-site hosting. This allows tailor made solutions to speciï c security
the base security of Microsoft public cloud services is adapted to the targeted market. Whereas Microsoft uses, e g.,
, for the Oï ce Live Workspace-in analogy to what Google does with Gmail-unencrypted data transfer between the cloud
and the user, cloud services for more sensitive markets (such as Microsoft Health Vault) use SSL encryption by default
On the other hand commodity public cloud services such as the Amazon EC2 are still growing even though they oï er only limited base security and largely
, Novell, IBM), virtual private network -ing (e g.,, Amazon Virtual Private cloud), encryption (e g.,, Amazon managed encryption services) and web traï c ï ltering services (e g.,
, Zscaler, Scansafe 2. 2 Todayâ s Datacenters as the Benchmark for the Cloud Using technology always constitutes a certain risk.
allows transfer into systems that are connected not to the Internet 5 Cloudsourcing 15 follows more or less the same economic rationale as tra
upgrades and patches, quick procurement services, avoidance of vendor lock ins and legacy modernization 18. Many cloudsourcers oï er bundles of consulting
Rather than that, cloud computing might be hindered signiï cantly by the legal problems that remain to be solved
Cloud computing being a novel technology introduces new security risks 7 that need to be mitigated. As a consequence, cautious monitoring and management
Trustworthy Clouds Underpinning the Future Internet 213 3. 1 Isolation Breach between Multiple Customers Cloud environments aim at eï ciencies of scale by increased sharing resources
As a consequence, data leakage and service disrup -tions gain importance and may propagate through such shared resources.
important requirement is that data cannot leak between customers and that malfunction or misbehavior by one customer must not lead to violations of the
through dedicated infrastructure for each individual customer and data wiping before reuse. Sharing of resources and multi-tenant isolation can be implemented
such as virtual machines, vlans, or SANS provide isolation. Sharing resources such as operating systems, middleware, or actual software requires a case-by-case
design of isolation mechanisms. In particular the last example of Software-as-a -Service requires that each data instance is assigned to a customer and that
these instances cannot be accessed by other customers. Note that in practice these mechanisms are mixed often: While an enterprise customer may own a vir
-tual machine (Machine-level isolation), this machine may use a database server Middleware isolation) and provide services to multiple individual departments
Application isolation In order to mitigate this risk in a cloud computing environment, multi-tenant isolation ensures customer isolation.
A principle to structure isolation manage -ment is One way to implement such isolation is labeling and ï ow control
Labeling: By default all resources are assigned to a customer and labeled with a corresponding label
Flow control: Shared resources must moderate potential data ï ow and ensure that no unauthorized data ï ow occurs between customers.
To limit ï ow control, mechanisms such as access control that ensures that machines and applications of one customer cannot access data or resources from other
customers can be used Actual systems then need to implement this principle for all shared resources 4
see, e g.,, 2, 3 for network isolation. An important challenge in practice is to identify and moderate all undesired information ï ows 19
may include a network administrator impacting database operations or admin -istrators stealing and disclosing data.
This risk is hard to mitigate since security controls need to strike a balance between the power needed to administrate and
or transported data â Security administrators can design and deï ne policies but cannot play any
â Customer employees can access their respective data and systems (or parts thereof) but cannot access infrastructure
or data owned by diï erent cus -tomers This so-called privileged identity management system is starting to be imple
For instance, a database ad -ministrator may only obtain administrative privileges over the tables owned by its employer
a database administrator asks for privileges to modify a given database schema 3. The administrator performs the desired task
4. The administrator returns the privileges Due to the corresponding logging, the security auditors can later determine which
, trusted computing 21 or computations on out -sourced data 20 Trustworthy Clouds Underpinning the Future Internet 215
3. 3 Failures of the Cloud Management Systems Due to the highly automated nature of the cloud management systems and the
high complexity of the managed systems software quality plays an important role in avoiding disruptions and service outages:
Another source of failure stems from the fact that large-scale computing clouds are built often using low-cost commodity hardware that fails (relatively
often. This leads to frequent failures of machines that may also include a subset of the management infrastructure
The consequence of these facts is automated that fault tolerance, problem -determination, and (self-)repair mechanisms will be needed commonly in the
cloud environment or recover from software and hardware failures For building such resilient systems, important tools are data replication
atomic updates of replicated management data, and integrity checking of all data received (see, e g.,
, 24. In the longer run, usage of multiple clouds may further improve resiliency (e g.,, as pursued by the TCLOUDS project www. tclouds-pro
ject. eu or proposed in 11 3. 4 Lack of Transparency and Guarantees While the proposed mechanisms to mitigate the identiï ed risks are important
Data corruption may not be detected for a long time. Data leakage by skilled insiders is unlikely to be detected.
Furthermore, the operational state and potential problems are usually not communicated to the customer except after an outage has occurred
âoeblack-boxâ approach to cloud computing where customers cannot obtain in -sight on or evidence of correct cloud operations.
and no data is corrupted or leaked. In practice, these problems are unsolved largely. Cryptographers have designed schemes such as homomorphic encryption 9 that allow veriï able com
-putation on encrypted data. However, the proposed schemes are too ineï cient and do not meet the complete range of privacy requirements 23.
A more practi -cal solution is to use Trusted Computing to verify correct policy enforcement 6
Trusted computing instantiation as proposed by the Trusted Computing Group TCG) uses secure hardware to allow a stakeholder to perform attestation, i e.,
, to obtain proof of the executables and conï guration that were loaded at boot-time However, run-time attestation solution still remains an open and challenging
problem 3. 5 What about Privacy Risks To enable trusted cloud computing, privacy protection is an essential require
-ment 26. In simple terms, data privacy aims at protecting personally iden -tiï able data (PID.
In Europe, Article 8 of the European Convention on Hu -man Rights (ECHR) provides a right to respect for ones âoeprivate and family
life, his home and his correspondenceâ. The European Court of Human rights states in several decisions that this article also safeguards the protection of an
individualâ s PID. Furthermore, the European Data protection Directive (Direc -tive 95/46/EC) substantiates this right
in order to establish a comprehensive data protection system throughout Europe. This directive takes into account the OECD privacy principles 16 which mandate several principles such as, e g
limited collection of data, the authorization to collect data either by law or by informed consent of the individual whose data are processed (âoedata subjectâ
the right to correction and deletion as well as the necessity of reasonable security safeguards for the collected data
Since cloud computing often means outsourcing data processing, the user as well as the data subject might face risks of data loss, corruption or wiretap
-ping due to the transfer to an external cloud provider. Related to these de facto obstructions in regard to the legal requirements, there are three particular chal
-lenges that need to be addressed by all cloud solutions: Transparency, technical and organizational security safeguards and contractual commitments (e g.,
, Ser -vice Level Agreements, Binding Corporate Rules According to European law, the user who processes PID in the cloud or else
-where remains responsible for the compliance with the aforementioned principles of data privacy. Outsourcing data processing does not absolve the user from his
responsibilities and liabilities concerning the data. This means that the user must be able to control
and comprehend what happens to the data in the cloud and which security measures are deployed. Therefore, the utmost transparency
Trustworthy Clouds Underpinning the Future Internet 217 regarding the processes within the cloud is required to enable the user to carry
out his legal obligations. This might be realized technically by, e g.,, installing informative event and access logs which enable the user to retrace in detail what
happens to his data, where they are stored and who accesses them. Also, the cloud service provider could prove to have an appropriate level of security mea
-surements by undergoing acknowledged auditing and certiï cation processes on a regular basis. Legally, the compliance of the cloud service providers with the
European law may be ensured by a commitment to Binding Corporate Rules BCR). ) Another method is the implementation of Service Level Agreements
SLAS) into the contracts, which guarantee the adherence to the spelled out pri -vacy requirements.
These SLAS could, for example, stipulate an enforcement of privacy via contractual penalties in case of the breach of the agreement
This applies all the more in cases of cross-border cloud computing with vari -ous subcontracting cloud service providers.
practiced in the cloud computing ï eld. Cloud services commonly rely on each other, since their structures may be based consecutively upon each other.
a computing cloud may use the services of a storage cloud. Unlike local data centers residing in a single country,
such cloud infrastructures often extend over multiple legislation and countries. Therefore, the question of applicable law and
safeguarding the userâ s responsibilities regarding data privacy in cross-border cloud scenarios is a matter of consequences for the use of these cloud services
So to avoid unwanted disclosure of data, suï cient protection mechanisms need to be established. These may also extend to the level of technical solutions
such as encryption, data minimization or enforcement of processing according to predeï ned policies 4 Open Research Challenges
the foundation for cloud computing. Nevertheless, due to its global scale and the need for full automation, there are still open research challenges that need
Furthermore, data generated by systems need to be assigned to one or more customers to enable access to critical data such as logs and monitoring data
A particularly hard challenge will be to reduce the amount of covert and side channels. Today, such channels are frozen often in hardware
and thus cannot easily be reduced 218 R. Glott et al Insider Attacks. The second area of research are practical and cost-eï cient
Today, regulations often mandate that data needs to be processed in a particular country. This does not align well with todayâ s cloud architectures
Trustworthy Clouds Underpinning the Future Internet 219 5 Outlook â The Path Ahead Cloud computing is not new â it constitutes a new outsourcing delivery model
that aims to be closer to the vision of true utility computing. As such, it can rely
on security and privacy mechanisms that were developed for service-oriented ar -chitectures and outsourcing. Unlike outsourcing, clouds are deployed on a global
scale where many customers share one cloud and multiple clouds are networked and layered on top of each other.
and data integrity through authen -tication. However, we expect that they will then move on to the harder problems
of the 2010 IEEE 30th International Conference on Distributed computing Systems Workshops, WASHINGTON DC, USA. ICDCSW â 10, pp. 77â 81.
IEEE Computer Society Press, Los Alamitos (2010), doi: 10.1109/ICDCSW. 2010.39 4. Cabuk, S.,Dalton, C i.,Eriksson, K.,Kuhlmann, D.,Ramasamy, H. V.,Ramunno
enforcement in multi-tenant virtual data centers. J. Comput. Secur. 18, 89â 121 2010 220 R. Glott et al
//www. symantec. com/connect/blogs/w32stuxnet-dossier 6. Chow, R.,Golle, P.,Jakobsson, M.,Shi, E.,Staddon, J.,Masuoka, R.,Molina
Controlling data in the cloud: outsourcing computation without outsourcing control. In: ACM Workshop on Cloud computing Security (CCSWÂ 09), pp. 85â 90
ACM Press, New york (2009 7. Cloud Security Alliance (CSA: Top threats to cloud computing, ver -sion 1. 0. March 2010), http://www. cloudsecurityalliance. org/topthreats
/csathreats. v1. 0. pdf 8. Computer and Communication Industry Association (CCIA: Cloud comput -ing (2009), http://www. ccianet. org/CCIA/files/cclibraryfiles/Filename
/000000000151/Cloud computing. pdf 9. Gentry, C.:Fully homomorphic encryption using ideal lattices. In: Pro -ceedings of the 41st annual ACM symposium on Theory of computing
Bethesda, MD, USA. STOC â 09, pp. 169â 178. ACM Press, New york (2009 doi: 10.1145/1536414.1536440
10. Grobauer, B.,Schreck, T.:Towards incident handling in the cloud: challenges and approaches. In:
Proceedings of the 2010 ACM workshop on Cloud computing se -curity workshop, Chicago, Illinois, USA. CCSW â 10, pp. 77â 86.
ACM Press, New York (2010), doi: 10.1145/1866835.1866850 11. Guerraoui, R.,Yabandeh, M.:Independent faults in the cloud.
In: Proceedings of the 4th International Workshop on Large scale Distributed systems and Middle -ware, Zuâ rich, Switzerland.
LADIS â 10, pp. 12â 17. ACM Press, New york (2010 doi: 10.1145/1859184.1859188 12. International organization for Standardization (ISO:
ISO27001: Information se -curity management system (ISMS) standard (Oct 2005), http://www. 27000. org /iso-27001. htm
& service brokers (2010), http://www. processor. com/editorial/article. asp article=articles%2fp3203%2f39p03%2f39p03. asp
Why not cloudsourcing for enterprise app user adoption/train -ing?( (2009), http://velocitymg. com/explorations/why-not-cloudsourcing
-for-enterprise-app-user-adoptiontraining /16. Organization for Economic Co-Operation and Development (OECD: Guidelines
on the protection of privacy and transborder ï ows of personal data. From http //www. oecd. org/document/18/0, 2340, en 2649 34255 1815186 1 1 1 1, 00. html
last modiï ed January 5 1999), the OECD Privacy Principles 17. Penn, J.:Security and the cloud:
-ings of the 16th ACM conference on Computer and communications security Chicago, Illinois, USA. CCS â 09, pp. 199â 212.
Trustworthy Clouds Underpinning the Future Internet 221 20. Sadeghi, A r.,Schneider, T.,Winandy, M.:Token-Based Cloud computing Se
-cure Outsourcing of Data and Arbitrary Computations with Lower Latency. In Acquisti, A.,Smith, S.,Sadeghi, A r. eds.
Proceedings of the 3rd international conference on Trust and trustworthy computing, Berlin, Germany, June 21-23
2010. LNCS, vol. 6101, pp. 417â 429. Springer, Heidelberg (2010 21. Santos, N.,Gummadi, K. P.,Rodrigues, R.:
Towards trusted cloud computing. In Proceedings of the 2009 conference on Hot topics in cloud computing. pp. 3â 3
Hotcloudâ 09, USENIX Association, Berkeley, CA, USA (2009), http://portal acm. org/citation. cfm? id=1855533.1855536
On the Impossibility of Cryptography Alone for Privacy -Preserving Cloud computing. IACR eprint 305 (2010 24.
Vukolicâ',M.:The byzantine empire in the intercloud. SIGACT News 41, 105â 111 2010), doi: 10.1145/1855118.1855137
Cloud computing and security. Lecture Univ. Stuttgart (November 2009 26. Weichert, T.:Cloud computing und Datenschutz (2009
http://www. datenschutzzentrum. de/cloud-computing /Data Usage Control in the future Internet Cloud Michele Bezzi and Slim Trabelsi
SAP Labs 06253, Mougins, France Abstract. The increasing collection of private information from indi -viduals is becoming a very sensitive issue for citizens, organizations, and
collected data, but generally not providing a real eï cient solution. Tech -nical solutions are missing to help
and support the legislator, the data owners and the data collectors to verify the compliance of the data usage
conditions with the regulations. Recent studies address these issues by proposing a policy-based framework to express data handling conditions
and enforce the restrictions and obligations related to the data usage. In this paper, we ï rst review recent research ï ndings in this area, outlin
-ing the current challenges. In the second part of the paper, we propose a new perspective on how the users can control
and visualize the use of their data stored in a remote server or in the cloud.
We introduce a trusted event handler and a trusted obligation engine, which monitors and informs the user on the compliance with a previously agreed privacy
policy Keywords: Privacy, Usage control, Privacy Policy 1 Introduction The vision of the Future Internet heralds a new environment where users, services
and devices transparently and seamlessly exchange and combine information giving rise to new capabilities. In order for it to materialize,
this vision needs a mix of adaptation of existing technologies and business models, such as ï exible
In the cloud users and businesses can buy computing resources (e g.,, servers services, applications) provided by the cloud,
that are provisioned rapidly with a minimal management eï ort and pay-peruse. In the cloud, data may ï ow around
the world, ignoring borders, across multiple services, all in total transparency for the user However, this ideal cloud world raises concerns about privacy for individu
-als, organizations, and society in general. In fact, when data cross borders, they have to comply with privacy laws in every jurisdiction,
and every jurisdiction has its own data protection laws. In addition, the risk, for personal data to travel
across boundaries and business domains, is that the usage conditions agreed J. Domingue et al. Eds.):
) Future Internet Assembly, LNCS 6656, pp. 223â 231,2011 câ The Author (s). This article is published with open access at Springerlink. com
224 M. Bezzi and S. Trabelsi upon collection are lost, and, as a consequence, users cannot control their per
-sonal information any more, as well as, honest businesses may lose conï dence in handling data, when usage conditions are uncertain
To face these challenges, the concept of sticky policy has been introduced 5 Personal information is associated with a machine-readable policy (sticky policy
-pressing that the data should be used for speciï c purposes only, or the retention period should not exceed 6 months,
the user when data are transfered to a third party. The sticky policy is prop -agated with the information throughout its lifetime, and data processors along
the supply chain of the cloud have to handle the data in accordance with their
as setting and comparing user preferences with server privacy policies, ex -pressing conditions on complex secondary usage cases, specifying obligations
â Providing the data owner with a user friendly way to express their prefer -ences, as well as to verify the privacy policy the data are collected with
â Develop mechanisms to enforce these sticky policies in ways that can be veriï ed and audited
which combines access and data handling policies; we then describe the corresponding policy engine, enabling the deploy
particular, the current framework lacks mechanisms to provide the data owner with the guarantee that policy and obligations are enforced actually.
In many web applications, users are asked to provide various kinds of personal in -formation, starting from basic contact information (addresses, telephone, email
to more complex data such as preferences, friendsâ list, photos. Service providers Data Usage Control in the future Internet Cloud 225
Fig. 1. PPL high level architecture describe how the usersâ data are handled using privacy policy,
which is, more or less explicitly, presented to users during the data collection phase. Privacy
policies are composed typically of a long text written in legal terms that are rarely fully understood,
or even read, by the users. As a result, most of the users creating accounts on web 2. 0 applications are not aware of the conditions under
which their data are handled Therefore, there is need to support the user in this process, providing an
as-automatic-as-possible means to handle privacy policies. In this context, the European FP7 project Primelife1 developed a novel privacy policy framework
able to express and automatically process privacy policies in web interactions This approach enables applications, like web browsers,
to automate the inter -pretation of the content of a privacy policy and to compare the service privacy
policy with user privacy preferences The Primelife project introduced the Primelife Policy Language (PPL, herein
10,4, which allows to describe in an XML machine-readable format the condi -tions of access and usage of the data.
A PPL policy can be used by a service provider to describe his privacy policies (how the data collected will be treated
and with whom they will be shared), or by a user to specify his preferences about the use of his data (who can use it
and how it should be treated). Before disclos -ing his personal information, the user can automatically match his preferences
with the privacy policy of the website and the result of the matching generates an agreed policy,
which is bound to the data (sticky policy) and travels with them. In fact, this sticky policy will be sent to the server
and follow the data in all their lifecycle to specify the usage conditions The PPL sticky policy deï nes the following conditions
1 www. primelife. eu 226 M. Bezzi and S. Trabelsi â Access control: PPL inherits from the XACML 8 language the access control
capabilities that express how access to which resource under which condition can be achieved â Data Handling:
the data handling part of the language deï nes two condi -tions â¢Purpose: expressing the purpose of usage of the data.
Purpose can be for example marketing, research, payment, delivery, etc â¢Downstream usage: supporting a multilevel nested policy describing the
data handling conditions that are applicable for any third party collect -ing the data from the server.
This nested policy is applicable when a server storing personal data decides to share the data with a third party
â Obligations: Obligations in sticky policies specify the actions that should be carried out after collecting
or storing a data. For example, notiï cation to the user whenever his data are shared with a third party,
or deleting the credit card number after the payment transaction is ï nished, etc Introducing PPL policies requires the design of a new framework for the process
-ing of such privacy rules. In particular, it is important to stress that during the lifecyle of personal data, the same actor may play the role of both data collector
and data provider. For this reason, Primelife proposed the PPL engine based on a symmetric architecture, where any data collector can become a data provider
if a third party requests some data (see Figure 1). According to the role played by an entity (data provider or data collector) the engine behaves diï erently by
invoking the appropriate modules In more detail, on the data provider side (user) the modules invoked are
â The access control engine: it checks if there is any access restriction for the data before sending it to any server.
For example, we can deï ne black or white lists for websites with whom we do not want to exchange our personal
information â Policy matching engine: after verifying that a data collector is in the white
list, a data provider recovers the serverâ s privacy policy in order to compare it to its preferences and verify
whether they are compatible in terms of data handling and obligation conditions. The result of this matching may be
displayed through a graphical interface, where a user can clearly understand how the information is handled
if he accepts to continue the transaction with the data collector. The result of the matching conditions,
as agreed by the user, is transformed into a sticky policy On the data collector side, after recovering the personal information with its
sticky policy the invoked modules are â Event handler: it monitors all the events related to the usage of the collected
data. These event notiï cations are handled by the obligation engine in order to check if there is any trigger that is related to an event.
For example, if a sticky policy provides for the logging of any information related to the usage
of a data, the event handler will notify the obligation engine whenever an Data Usage Control in the future Internet Cloud 227
access (read, write, modiï cation, deletion etc.)to data is detected in order to keep track of this access
â Obligation engine: it triggers all the obligations required by the sticky policy If a third party requests some data from the server,
the latter becomes a data provider and acts as a user-side engine invoking access control and matching
modules, and the third party plays the role of data collector invoking the obli -gation engine and the event handler
3 Open Challenges Although the PPL framework represents an important advancement in fulï lling many privacy requirements of the cloud scenario, there are still some issues
which are addressed not by the PPL framework Firstly, in the current PPL framework, the data owner has no guarantee of
actual enforcement of the data handling policies and obligations. Indeed, the data collector may implement the PPL framework,
thus having the technical capacity of processing the data according to the attached policies, but it could
always tamper with this system, which controls, or simply access directly the data without using the PPL engine.
In practice, the data owner should trust the data collector to behave honestly A second problem relates to the scalability of the sticky policy approach
Clearly, the policy processing adds a relevant computational overhead. Its appli -cability to realistic scenarios, where large amounts of data have to be transmitted
and processed, has to be investigated A last issue relates to the privacy business model. The main question is:
What should motivate the data collectors/processors to implement such technology Actually, in many cases, their business model relies on the as-less-restricted-as
-possible use of private data. On the user side, a related question is, are the data
owners ready to pay for privacy 9? Both questions are diï cult to address, es -pecially when dealing with such a loosely deï ned concept as privacy.
Although studies exist (see 11,3, and references therein), mainly in the context of the web
2. 0, we should notice that the advent of cloud changes the business relevance of
privacy. In fact, in a typical web 2. 0 application the user is disclosing his own
data, balancing the value of his personal data with the services obtained. As a matter of fact, users have diï culties to monetize the value of their personal
information, and they tend to disclose their data quite easily. In the cloud world organizations store the data they have collected (under speciï c restrictions) with
the cloud provider. These data have a clear business value, and typically com -panies can evaluate the amount of money they are risking
if such data are lost or made public. For these reasons, it is likely that they are ready to pay for a
stronger privacy protection All these issues need further research work to be addressed. In the next section, we present our initial thoughts on how we may extend the Primelife
framework to address the ï rst problem we mentioned above, i e.,, how to provide a secure enforcement for privacy policy
228 M. Bezzi and S. Trabelsi Fig. 2. The key elements of the extension of the PPL framework to guarantee the
enforcement of privacy policy 4 Towards Privacy Policy Enforcement in the Cloud In the current PPL framework, there is no guarantee of enforcement of the data
handling policies and obligations. In other words, we suppose that the server enforces correctly the sticky policies,
but, actually, nothing prevents him from creating a back door in his database in order to get unauthorized access to the
collected information For this reason, we propose in the rest of the paper a secure architecture
for the enforcement of the sticky policies and facilitating the task of external auditors to verify the compliance with the privacy requirements, as well as giving
the user control on the released data. The main idea is to introduce tamper -proof 6 obligation engine and event handler, certiï ed by a trusted third party
which mediate the communication and the handling of private data in the cloud platform. The schedule of the events,
as well as the logs of these components can also be accessed (partly by the users to monitor the handling of their personal
information. Lastly, the trusted-third party can ensure the auditing of the whole system Let us sketch how our proposal can work in a simple cloud scenario.
Let us consider a cloud platform provider, which hosts one or more services/applications provided by external parties that deal with personal data (e g.,
, a human resource management application, a remote storage service. Say, these services handle personal data using a PPL framework (as described in Sect. 2). In order to
guarantee enforcement of the privacy policies and corresponding obligations by the service, we replace the service provider obligation engine and event handler
Data Usage Control in the future Internet Cloud 229 with a tamper-proof event handler and a tamper-proof obligation engine certiï ed
by a trusted third party (e g.,, governmental oï ce), see Fig. 2. For instance, the cloud provider may provide these certiï ed components as premium service
In fact, trust is an essential part of the cloud paradigm. If the data owner has the guarantee from a trusted authority (governmental oï ce, EU commission
etc.)) that the application hosted in the cloud is compliant with his privacy requirements, he will tend to transfer his data to the certiï ed host.
In order to certify the compliance of an application, the trusted authority has, ï rst, to
certify the secure privacy components in charge of enforcing sticky policies, then to perform audits to check
if the stored data are handled correctly The diï culty comes for the access to the database by the service provider
One solution would be to use a speciï c tamper-proof database, but this can be
technically complex, and impact the business eï ciency of the service provider A possible solution is to specify an API to access the database that is compatible
with the event handler. This API should be deï ned as a standard interface to
communicate with the event handler and access to the database. The service has to exclusively use an interface compatible with the standardized API, and this
Fig. 3. A sketch of data track administration console The particularity of this API is that all the methods to access the data can be
detected by the event handler. For example, if the service adds a new element data and sticky policy) this action should be detected,
managed and logged by the event handler. If there is any method (like table dump) to access the
database that cannot be recognized by the event handler, the service will not be certiï ed by the trusted authority
-sibility of providing a monitoring console. The monitoring can be accessible by any data owner, who, once authenticated, can list all the data (or set of data
with their related events and pending or enforced obligations. The data owner can at any time control how his data are handled, under
which conditions the information is accessed, and compare them with the corresponding stored sticky policy. Fig. 3 shows a very simple example of how the remote administrative
console could be structured, this monitoring console could of course be more complex. The remote monitoring console adds more transparency and more con
-trol to the data hosted within the cloud. It also allows the user to detect any
improper usage of his data, and, in this case, notify the host or the trusted authority
230 M. Bezzi and S. Trabelsi The advantages of the proposed solution are twofold. First, from the data
owner perspective, there is a guarantee that actual enforcement has taken place and that he can monitor the status of his data and corresponding policies.
Second from the auditorsâ point of view, it limits the perimeter of their analysis, since the conï dence zone provided by the tamper proof elements and the standardized API
facilitate the distinction between authorized and non authorized actions 5 Conclusions Cloud computing and the SOA paradigm are fundamental building blocks for the
Future Internet, enabling the seamless combination of services across platforms geographies, businesses and transparently from the user point of view.
However these new capabilities may entail privacy risks. From the user perspective, the risk is that of losing control of his personal information once they are released in
the cloud. In particular, when personal data are consumed by multiple services possibly owned by diï erent entities in diï erent locations, the conditions of the
data usage, agreed upon collection, may be lost in the lifecycle of the personal data. From the data consumer point of view, businesses and organizations seek to
ensure compliance with the plethora of data protection regulations, and minimize the risk of violating the agreed privacy policy
The concept of sticky policy may be used to address some of the privacy requirements of the cloud scenario.
In this paper we reviewed the recently in -troduced PPL framework, which provides a ï exible language to express privacy
policy as well as the necessary mechanisms to process and compare sticky poli -cies. The current PPL framework presents some limitations;
it notably requires a high level of trust in the data collector/processor. We presented some initial
thoughts about how this problem can be mitigated through the usage of a tam -per proof implementation of the architecture.
authorization language (EPAL 1. 1). IBM Research Report (2003 Data Usage Control in the future Internet Cloud 231
3. Bonneau, J.,Preibusch, S.:The privacy jungle: on the market for data protection in social networks.
In: Moore, T.,Pym, D.,Ioannidis, C. eds. Economics of In -formation Security and Privacy, pp. 121â 167.
Springer, New york (2010 4. Bussard, L.,Neven, G.,Preiss, F. S.:Downstream usage control. In:
-national Workshop on Policies for Distributed systems and Networks, pp. 22â 29 2010 5. Karjoth, G.,Schunter, M.,Waidner, M.:
Privacy-enabled management of customer data. In: Dingledine, R.,Syverson, P. F eds.)) PET 2002.
Trust and tamper-proof software delivery. In: Proceed -ings of the 2006 international workshop on Software engineering for secure sys
-tems. SESS â 06, New york, NY, USA, pp. 51â 58. ACM Press, New york (2006 doi:
extensible access control markup language (xacml) version 3. 0, ex -tensible access control markup language (xacml) version 3. 0, oasis (August 2008
9. Shostack, A.,Syverson, P.:What price privacy? In: Camp, L.,Lewis, S. eds Economics of Information security, Advances in Information security, vol. 12, pp
W3c Workshop on Privacy and data usage control p. 5 october 2010), http://www. w3. org/2010/policy-ws
Future Internet Foundations Experiments and Experimental Design Part IV: Future Internet Foundations: Experiments and Experimental Design 235
Introduction Research into new paradigms and the comprehensive test facilities upon which the ideas are experimented upon together build a key resource for driving European re
It provides a core infrastructure, and also a playground for future discoveries and innovations, combin
The heterogeneous and modular field of Future Internet Research and Experimen -tation with its national and international stakeholder groups requires community and
Adaptive Admission Control and Resource Allocation Algorithms on the Federated Environment of Panlabâ reports on experiments needing to directly interact with the
-strates the practical usefulness of federation and virtualisation in heterogeneous testbeds These multipath routing slice experiments were performed over multiple federated
âoetesting End-to-end Self management in a Wireless Future Internet Environmentâ reports on the network management protocol test that exploited the availability of dif
) Future Internet Assembly, LNCS 6656, pp. 237â 245,2011 Â The Author (s). This article is published with open access at Springerlink. com
Resource Allocation Algorithms on the Federated Environment of Panlab Christos Tranoris, Pierpaolo Giacomin, and Spyros Denazis
Electrical and Computer engineering department, University of Patras Rio, Patras 26500, Greece tranoris@ece. upatras. gr, yrz@anche. no, sdena@upatras. gr
Panlab is a Future Internet initiative which integrates distributed fa -cilities in a federated manner.
where an adaptive resource allocation algorithm was tested utilizing Panlabâ s infrastructure. Implementation details are given in terms of building a RUBIS
called Federation Computing Interface (FCI) API which enables applications to access resources during an experiment
Panlab, experimental testing, resource federation, Future Internet 1 Introduction Future Internet research results in new experimental infrastructures for supporting
approaches that exploit extend or redesign current Internet architecture and protocols The Pan-European laboratory 1, Panlab, is a FIRE 2 initiative and builds on a fed
-eration of interconnected and distributed facilities allowing third parties to access a wide variety of resources like platforms, networks,
Architecture Elements to be used for experimentation in the future Internet The Panlab infrastructure manages interconnections of different geographically
A Web portal is available where customers and providers can access ser -vices, a visual Creation Environment which is called âoevirtual Customer Testbed
Resource Adapter (a concept similar to device drivers) wraps a domainâ s resource API in order to create a homogeneous API defined by Panlab.
moving a designed algorithm from a simulating environment to near production best -effort environment and ii) to exploit the framework in such a way that will allow the
by means of Federation Computing Interface API to managed resource. We finally conclude this paper
-rithm, it is necessary to set up an appropriate testbed of a distributed web application like RUBIS benchmark 3, an auction site prototype modeled after ebay. com. It
provides a virtualized distributed application that consists of three components, a web server, an application server, a database and a workload generator, which produces
the appropriate requests. Furthermore it can be deployed in a virtualized environment using Xen server technology,
which allows regulating system resources such as CPU usage and memory, and provides also a monitoring tool, Ganglia, that measures net
-work metrics, such as round trip time and other statistics, and resource usage in vir -tual machines
Fig. 1. The setup for testing the algorithm The adaptive admission control and resource allocation algorithm is applied to suc
-ceed in specific target of network metrics, like round trip time and throughput. This will be done by deploying a proxy-like control component for admission control and
using Xen server technology to regulate CPU usage. During this scenario the adaptive admission control and resource allocation algorithm is tested against network metrics
like round trip time and throughput. RUBIS clients will produce requests so that push RUBIS components to their limits,
so that resource like CPU usage and network throughput get high values During the setup, the researcher wants to test http proxy software written in C pro
-gramming language that implements an admission algorithm. Figure 1 displays the 240 C. Tranoris, P. Giacomin, and S. Denazis
setup for the discussed scenario. The setup consists of 3 work load http traffic genera
-tors, making requests through a hosting unit. The algorithm, which is located at the proxy unit, needs to monitor the CPU usage of the Web application and Database
machines. Then the algorithm should be able to set new CPU capacity limits on both
resources. Additionally the algorithm should be able to start and stop the work load generators on demand
3 Technical Environment, Testbed Implementation and Deployment From the requirements of the use case, it is evident that it would benefit from a test
-bed offering RUBIS resources. Moreover, the experiment needs to manage and moni -tor resources within the C algorithm.
So the resources need to provide monitoring and provisioning mechanisms To support such an experiment and similar ones, a required infrastructure needed
to be built. The equipment used is as follows â Linux machines for the RUBIS based work load generators
â A Linux machine for the hosting the algorithm unit, capable of compiling C and
Java software â Linux machines for running XEN server where on top will run the RUBIS Web
app and database The final user needs to provide the algorithm under test. He will just login to the
Proxy Unit, compile the software and execute it. The user will not have access to the
RUBIS resources (i e. cannot login) so there is a need to encapsulate the monitoring and provisioning capabilities.
For this requirement and to make available the RUBIS resources for future testing within the Panlab federation, the so called Resource
Adapters (RA) where built For each resource there is a corresponding RA which exposes configuration pa
-rameters to the end user. As displayed in Figure 2, all the components are based on Virtual machines managed by a XEN server.
The implemented RAS instantiate all these Virtual machines and configure the internal components according to end-user needs.
The work load generator exposes parameters such as: used IP for the testbed memory, hard disk size, number of clients, ramp up time for the requests and a pa
-rameter used during the execution of the experiment called Action which accepts the values start and stop.
The Proxy Unit exposes parameters such as used IP for the test -bed, memory, hard disk size, username,
password and IP to connect to the RUBIS application resource. The RUBIS application and the RUBIS database have similar
parameters to the above and additionally a MON CPU UTILIZATION parameter which is used to monitor the resource
cpu capacity of the resource A Use-Case on Testing Adaptive Admission Control 241 Fig. 2. The Resource adapters of the available testbed resources
Java or other target language. RADL is useful in cases when there is a need to config
The user can configure the re -source through some Configuration Parameters. The RA âoewrapsâ the parameters and
displays the RADL definition for the RUBIS application server The Configuration Parameters section describes the exposed parameters to the end
user. The Binding Parameters are used for internal purposes of the local testbed con -figuration. The On Update section describes what the rubis app RA does when it
Figure 4 displays the use case setup as can be done inside the VCT tool of Panlab.
rubis database. Interconnections where made also between these components in order to assign reference values to all resources.
know about the IP of the proxy which hosts the algorithm. The proxy needs to know
the IP of the RUBIS application which also needs a reference to the RUBIS database 4 Running and Operating the Experiment
The scenario during the experiment utilizes the Federation Computing Interface (FCI API that Panlab provides 5. Federation Computing Interface (FCI) is an API for
accessing resources of the federation. It is an SDK for developing applications that access VCT requested resources through the Panlab office services during operation
This allows the User -Application/SUT to access the testbed resources during execution of the experiment
Fig. 5. Designing the algorithm to operate resources during execution In our testing scenario there is a need to configure resources
status data properly after the VCT is provisioned and while the testing is in progress Figure 5 displays this condition where the System Under Test (SUT) is our algorithm
FCI automatically creates all the necessary code that the end user can then inject in -side the algorithmâ s code.
The end-user needs just to ender his credentials in order 244 C. Tranoris, P. Giacomin, and S. Denazis
code listing in Java //an example Java federation program public class Main {public static void main (String args
{//An example for VCT: academic07 academic07 myvct=new academic07 myvct. getuop rubis cl 91(.setramp up time("55000 "myvct. getuop rubis cl 91(.
Assuming that we have given the name academic07 for our VCT definition, the java listing displays how we can access the resources of this VCT.
FCI creates a java class called academic07()that we can instantiate in order to get access to the resources
Additionally, for each resource that participates in the VCT java classes are able to provide access.
For example the command myvct. getuop rubis cl 91(.set -ACTION("start";"starts the RUBIS client of the rubis cl 91 resource.
back the CPU usage of the database resource 5 Conclusions The results of running an experiment in Panlab are encouraging in terms of moving
the designed algorithms from simulating environments to near production environ -ments. What is really attractive is that such algorithms can be tested in a best-effort
environment with real connectivity issues that cannot be performed easily in simula -tion environments. The presented use case example demonstrated the usage of exist
similar approaches are really encouraging in terms of moving the designed algorithms from simulating environments to near production environments.
What is really attractive is that such algorithms can be tested in a best-effort environ
The scenario presented can be scaled easily up with many clients and web applications. Also, the proxy under test can be replaced by one or more load balancers
1. Website of Panlab and PII European projects, supported by the European commission in its both framework programmes FP6 (2001-2006) and FP7 (2007-2013:
2. European commission, FIRE website: Last cited: November 21, 2010, http://cordis europa. eu/fp7/ict/fire
5. Federation Computing Interface (FCI), http://trac. panlab. net/trac/wiki/FCI Multipath Routing Slice Experiments in
1 FOKUS-Fraunhofer Institute for Open Communication systems, Berlin, Germany tanja. zseby carsten. schmoll@fokus. fraunhofer. de
2 University of Wuerzburg, Institute of Computer science, Wuerzburg, Germany thomas. zinner christian. schwartz phuoc. trangia@informatik. uni-wuerzburg. de
The Internet today consist of many heterogeneous infras -tructures, owned and maintained by separate and potentially competing
-verse demands, are likely to stay or even increase in the Internet of the future.
In such an environment federation and virtualization of resources are key features that should be supported in a future Internet.
The ability to form slices across domains that meet application speciï c requirements enables many of the desired features in future networks
example use case for the future Internet itself because we assume that the Internet will consist of multiple diï erent infrastructures that have to be
combined in application speciï c overlays or routing slices, very much like the experimental facilities we used in this experiment.
instrumentation of the future Internet. The tools used in our experiment can provide a starting point for this
) Future Internet Assembly, LNCS 6656, pp. 247â 258,2011 câ The Author (s). This article is published with open access at Springerlink. com
Network Virtualization (NV) techniques 5, 17 allow the establishment of such separate slices on top of a joint physical infrastructure (substrate.
networks (e g. for banking, gaming, web) with their own virtual topology, nam -ing, routing and resource management on top of a shared physical infrastructure
to a single application and that implement a general data transport service are designated as routing slices 13.
known as Transport Virtualization (TV) 23,24. These concepts have roots in the work on active networks, where the control plane of a router enabled applica
-tions ï ne-grained control of their own routing 6, 11 and sharing of the resources at the routers using either constant or ad hoc slices 16
Slices, and routing slices in particular, are made up of shared resources that can be contributed by diï erent administrative authorities.
of fractions of (virtual) links and (virtual) routers Due to the ï ne grained granularity of networking resources,
they permit data transport resource to be accessed without knowledge of their physical or network location
testbeds as well as in the real Internet. Measurement functions can help to sup -port this. Inter-domain SLA validation would proï t from common data formats
and data exchange among providers (e g. 8). Intrusion detection systems can increase situation awareness (and with this overall security) by sharing infor
-mation. Nevertheless, the operators of the testbeds we considered in our setup are willing to cooperate.
to the high costs of such hardware. In short, as network scientists, we need larger testbeds in order to supplement theoretical analysis and validate theoretical re
typically customized to particular user groups and oï er diï erent capabilities and interfaces. The federation of them still requires research on how these facilities
-tion 7 provides a brief summary and outlook to the enhancements of federated facilities 2 Experiment Objectives and Requirements for a
reservation and installation of arbitrary software but is distributed only within Germany, has limited a access, and currently provides no federation method
Booking of Resources With the SFA software it was possible to book nodes in Planetlab, Planetlab Europe and in the VINI Testbed.
a website dedicated to information about Free Tools for Future Internet Research and Experimentation. The Ad
-vanced Network Monitoring Equipment (ANME) deployed by the Onelab project within Planetlab Europe includes precise network cards for active
arbitrary software on the G-Lab nodes. We assume that such features are of interest for many experimenters,
experiments that require real Internet conditions with regard to scale, delay values, and geographical distribution of nodes
Free T-REX 2 provides a platform for testbed users, testbed op -erators and developers to oï er their measurement results and software tools to
the public and to share their experience. Further, free T-Rex seeks to employ standardized instruments to improve the comparability and openness of scientiï c
results in the ï eld of future Internet research. The platform gives an overview of available tools in future Internet experimental facilities and, based on user
feedback, the toolsâ feasibility for experiment requirements can be assessed. An -other objective is to create links to relevant groups and support standardization
and tool database and measurement services, the employed packet tracking ser -vice 18, Tophat 9,
-ties can contribute to an improved design of future, federated Internet archi -tectures. We described how federated transmission resources can be exploited
1. FIRE-Future Internet Research & Experimentation (2010), Information available at http://ict-fire. eu
Free Tools for Future Internet Tools and Experimentation (2010 Information available at http://www. free-t-rex. net
/3. Onelab-Future Internet Testbeds (2010), Information available at http://onelab eu /4. VINI-A Virtual Network Infrastructure (2010), Information available at http
Overcoming the internet im -passe through virtualization. IEEE Computer, 34â 41 (April 2005 6. Anerousis, N.,Hjlmtysson, G.:
Service level routing on the Internet. In: IEEE GLOBECOMÂ 99, vol. 1, pp. 553â 559 (2002
7. Becke, M.,Dreibholz, T.,Yyengar, J.,Natarajan, P.,Tuexen, M.:Load Sharing for the Stream Control Transmission Protocol (SCTP), Internet-Draft (2010), http
//tools. ietf. org/html/draft-tuexen-tsvwg-sctp-multipath-00 8. Boschi, E.,Denazis, S.,Zseby, T.:
A measurement framework for inter-domain sla validation. Comput. Commun. 29, 703â 716 (2006), doi:
10.1016/j. comcom. 2005 07.026 9. Bourgeau, T.,Augeâ',J.,Friedman, T.:Tophat: supporting experiments through
Computer networks 36 (1), 21â 34 (2001 12. Mome. Cluster of European Projects aimed at Monitoring and Measurement
/sfa. pdf 16. Psounis, K.:Active Networks: Applications, Security, Safety, and Architec -tures. IEEE Communications Surveys 2 (1)( 1999), http://www. comsoc. org/pubs
/surveys/1q99issue/psounis. html 17. Scott Rixner. Network virtualization: Breaking the performance barrier. ACM Queue,(Jan./Feb. 2008
18. Santos, T.,Henke, C.,Schmoll, C.,Zseby. T.:Multi-Hop Packet Tracking for Experimental Facilities.
Let the internet measure itself. ACM SIGCOMM Computer Communication Review 35 (5), 71â 74 (2005
20. Phuoc Tran-Gia. G-Lab: A Future Generation Internet Research Platform (2008 Information available at http://www. future-internet. eu
/21. Trilogy. Trilogy: Architecting the Future Internet (2010), Information available at http://www. trilogy-project. org
/22. Wischik, D.,Handley, M.,Braun, M. B.:The Resource Pooling Principle. SIG -COMM Comput.
Commun. Rev. 38, 47â 52 (2008), doi: 10.1145/1452335.1452342 23. Zinner, T.,Tutschku, K.,Nakao, A.,Tran-Gia, P.:
Virtualization. In: Proc. of the 16. Kivs 2009, Kassel, Germany (Mar. 2009 24. Zinner, T.,Tutschku, K.,Nakao, A.,Tran-Gia, P.:
Transmission for Transport Virtualization: Analyzing Path Selection. In: Proceed -ings of the 22nd International Teletraï c Congress (ITC), Amsterdam, Netherlands
) Future Internet Assembly, LNCS 6656, pp. 259â 270,2011 Â The Author (s). This article is published with open access at Springerlink. com
Testing End-to-end Self management in a Wireless Future Internet Environment Apostolos Kousaridas1, George Katsikas1, Nancy Alonistioti1, Esa Piri2
Marko Palola2, and Jussi Makinen3 1 University of Athens Athens, Greece scan. di. uoa. gr
-complishing tests and experiments for future Internet new paradigms. In this work the Panlab experimental facilities and specifically the Octopus network
-tures by using the Self-NET software for self management over a Wimax network environment. The monitoring and configuration capabilities that differ
Internet, Wimax, Quality of Service 1 Introduction Several network management frameworks have been specified during the last two
decades by various standardization bodies and forums, like IETF, 3gpp, DMTF, ITU all trying to specify interfaces,
telecom world, the Internet and cellular communications. The current challenge for the network management systems
the development of the mechanisms that will render the Future Internet network capa -ble of autonomously configuring,
router, access point), is considered potentially as an autonomic element which is capable of monitoring its network-related state
the so called closed control loop or Monitor-Decide-Execute Cycle (MDE) and con -sists of the Network Element Cognitive Manager (NECM) and the Network Domain
The testing facility connecting a fixed Wimax network to the service-aware network is shown in Fig. 1. The Wimax network environment consists of Airspan Micro
-MAX base station (BS) 7 and Airspan Prost subscriber station (SS) located on the Octopus testbed at Oulu 4. The BS and SS operate in a laboratory environment with
-sion side at Greece Distributed Internet traffic Generator (D-ITG) 8 has been used which is a software tool that generates traffic at both Uoa end machines.
This is a Java based platform that manipulates two independent entities, the first is ITGSEND process that undertakes the traffic generation
and the latter is ITGRECV process that captures the packets to the receiver. Traffic sender can concurrently generate multiple
flows with user-defined parameters that can be analyzed from the receiver to extract traffic Qos features (e g. packet loss, delay, jitter.
Testing End-to-end Self management in a Wireless Future Internet Environment 261 Fig. 1. Octopus testbed Wimax and Self-NET software federation
ITGLOG), printing and plotting specific metrics (ITGDEC, ITGPLOT) and remotely controlling the traffic generation (ITGAPI.
ICMP, DNS, Telnet, and Voip (G. 711, G. 723, G. 729, Voice Activity Detection and
The Self-NET project carries out experiments over the Wimax testbed, remotely via the Internet.
The experiment required development of an additional BS control software and deployment of IP routing
and tunneling between Octopus and Self-NET environments We implemented A BS control software (i e. NECM) to allow dynamically collect
Wimax link information from the BS and to control Quality of Service (Qos) set -tings on the fly.
The NECM changes Qos service classes by setting a new configura -tion to the BS using Simple Network Management Protocol (SNMP
real-time multimedia streaming are much stricter than that of bulk data transfer. IEEE 802. 16d 5, the employed Wimax testbed is based on,
specifies four different scheduling types, namely Unsolicited Grant Service (UGS), Real-time Polling Service rtps), Non-real-time Polling Service (nrtps),
-tolerant data transmission. However, nrtps provides assured bandwidth for the traffic flow whereas BE does guarantee nothing for the traffic flow
source and/or destination MAC address, IP ADDRESS, or port number. In our experi -ments, we used port numbers to classify the IP traffic flows.
-ing from and to the Wimax link. Two routers are dedicated on the Octopus testbed for tunneling and routing IP traffic.
The user traffic from the Self-NET experimenta -tion is tunneled by using two IP tunnels over the Internet
and rerouted over the Wi -MAX air interface at the Octopus testbed. For the test environment provisioning, the
IP tunneling (IPIP) and routing was setup at both ends, which requires two routers at
the user premises â one for sending data to the uplink and receiving the downlink
flows and one for sending to the downlink and receiving from the uplink As depicted in Fig. 3,
Wimax BS with the Uoa BS Connector (10.1.3.3 â 10.1.3.1) while the second one connects the Wimax SS with the Uoa SS Connector (10.1.3.4 â 10.1.3.2),
creating an internal 10.1.3.0/24 network between these network entities. The traffic sent from the Uoa BS Connector (10.1.1.1) is routed over the IPIP tunnel to the Wimax BS
Testing End-to-end Self management in a Wireless Future Internet Environment 263 Fig. 3. Network topology and IPIP tunneling
and after the Wireless transmission (DL) to the Wimax SS, the Uoa SS Connector 10.1.2.1) receives the packets via the second tunnel.
The respective procedure occurs for the UL, while the Uoa SS Connector traffic is tunneled to the Wimax SS, trans
-mitted to the Wimax BS and routed again through IPIP tunnel to the Uoa BS Con
-nector. During the traffic exchange, the public IPSÂ are opaque, as the routing proce -dure explicitly uses the private addresses
Adapter Description Language (RADL) 9 was used to generate source code for each Resource Adaptor (RA), where, for example, the Wimax network elements can be
considered as available and configurable resources. We decided to use a separate RA for each IP tunneling machine, BS and SS.
-fault values are stored in each RA and the user of the VCT tool needs to input only
public IP ADDRESSES and user credentials for the two external tunneling machines in order to setup the IP tunnels and routes
monitoring data and the usage of service-level adaptation actions for efficient network adaptation The NECM of the Wimax BS constantly monitors network device statistics (e g
UL/DL used capacity, TCP/UDP parameters, service flows), which are periodically transmitted to the corresponding NDCM.
The Service-level NECM undertakes to collect service-level data. The Service-level NECM could be placed at the service providerâ s side, even at premises
The decision making engine of the NDCM filters the collected monitoring data from the network and the service level
â¢Change the priority of 2k â â oe flows at the Wimax BS â¢Change the priority of 3k â â oe flows at the Wimax BS and the codec of 4k â â oe
flows Two schemes for the selection of the optimal action have been proposed and they are described below (Fig. 4 and Fig. 5
-ther to the Wimax BS NECM in order to execute the change priority action via SNMP set command
Testing End-to-end Self management in a Wireless Future Internet Environment 265 Fig. 4. Decision-making algorithm for configuration action selection â Simple
Fig. 4 presents the simple version of the decision taking scheme Firstly, the PER value is checked
change all flows from low priority to high priority service class at the WIMAX BS
that achieves higher data compression, resulting in less data rate requirements; thus reducing packet error rate value.
Fig. 5. Decision making algorithm for configuration action selection â Advanced 266 A. Kousaridas et al The above figure (Fig. 5) illustrates the advanced version of the scheme presented
â¢The change of the prioritization scheme at the Wimax BS side (e g.,, from low
â¢The change of the Voip codec between the service provider and the end user (ser
â G. 711.1: 48 kbps â G. 711.2: 40 kbps â G. 729.3: 8 kbps
â G. 729.2: 7 kbps â G. 723.1: 5 kbps Table 1. Critical thresholds of Packet Loss sharp increment
Codec Type Threshold of Flows Number G. 711.1-(fl1. 1) 29 G. 711.2-(fl1. 2) 46
G. 729.2-(fl1. 3) 63 G. 729.3-(fl1. 4) 97 G. 723.1-(fl1. 5) 120
As it is described in Section 3, the decision making schemes that have been proposed for the selection of the appropriate action use a list of thresholds (i e.
Testing End-to-end Self management in a Wireless Future Internet Environment 267 increase rate is not linear
from low priority to high priority service class) at the Wimax BS of the 28 Voip
G. 711.1 Voip flows that traverse the Wimax BS and face high packet error rate.
the end user, selecting the G. 711.2 codec, reduces the number of the dropped packets Since the total codec change may be a simple but greedy solution, an advanced ad
Testing End-to-end Self management in a Wireless Future Internet Environment 269 Table 6. Qos features improvement after partial (70%)Voip codec change from G. 711.1 to
Different wireless links and networks have different capabilities and often service implementers and providers do not have a possibility to test their service over various
remote wireless link such as Wimax can be used remotely. However, in order to provide a wireless link as a bookable resource for a large set of customers, the estab
-lishment of the tunnels between the wireless link and the remote user of the link and a
An experimental path towards Self management for Future Internet Environments. In Tselentis, G.,Galis, A.,Gavras, A.,Krco, S.,Lotz, V.,Simperl, E.,Stiller, B. eds.
-wards the Future Internet-Emerging Trends from European Research, pp. 95â 104 (2010 270 A. Kousaridas et al
3. Website of Panlab and PII European projects, supported by the European commission in its both framework programmes FP6 (2001-2006) and FP7 (2007-2013:
Air Interface for Fixed Broadband Wireless Access Systems. IEEE Std 802.16-2004 (October 2004 6. Wahle, S.,Magedanz, T.,Gavras, A.:
Towards the Future Internet-Emerging Trends from European Research, pp. 51â 62. IOS Press, Amsterdam (2010
7. Airspan homepage, http://www. airspan. com 8. Distributed Internet traffic Generator http://www. grid. unina. it/software/ITG/index. php
9. Resource Adapter Description Language http://trac. panlab. net/trac/wiki/RADL Part V Future Internet Areas:
Networks Part V: Future Internet Areas: Networks 273 Introduction Although the current Internet has been extraordinarily successful as a ubiquitous and
universal means for communication and computation, there are still many unsolved problems and challenges some of which have basic aspects.
Many of these aspects could not have been foreseen when the first parts of the Internet were built, but they
do need to be addressed now. The very success of the Internet is creating obstacles to the future innovation of both the networking technology that lies at the Internetâ s core
and the services that use it. In addition, the ossification of the Internet makes the in
-troduction and deployment of new network technologies and services very difficult and very costly The aspects,
which are considered to be fundamentally missing, are â¢Mobility of networks, services, and devices â¢Guaranteeing availability of services according to Service Level Agreements (SLAS
and high-level objectives â¢Facilities to support Quality of Service (Qos) and Service Level Agreements (SLAS
â¢Trust Management and Security, privacy and data protection mechanisms of dis -tributed data â¢An addressing scheme, where identity and location are embedded not in the same
address â¢Inherent network management functionality, specifically self management func -tionality â¢Cost considerations, whereby the overhead of management should be kept under
control since this is a critical part of life-cycle costs â¢Facilities for the large scale provisioning and deployment of both services and
challenges in Future Internet. It also includes a tie to a paper from the Socioeconomics
Internet Developmentâ chapter examines perspectives from the inclusion of the autonomicity and self-manageability features in the scope of Future Internetâ s (FI
Future Internet Areas: Networks management (NM), as FI should possess a considerably enhanced network manage
In the future Internet era, mechanisms for extending the coverage of the wireless access infrastructure and service provisioning to locations that cannot be served otherwise or for engineering
Cloud technology in order to achieve the challenges of Future Internet. The extent of Internet growth and usage raises critical issues associated with its design principles
that need to be addressed before it reaches its limits. Many emerging applications have increasing requirements in terms of bandwidth, Qos and manageability.
-over, applications such as Cloud computing and 3d-video streaming require optimi -zation and combined provisioning of different infrastructure resources and services
As a huge energy consumer, the Internet also needs to have energy-saving func -tions.
and secure Internet. Finally, the Future Internet needs to support sustainable business models, in order to drive innovation, competi
-tion, and research. Combining optical network technology with Cloud technology is key to addressing these challenges.
advanced networks and IT managed services integrated with the vanilla Internet will ensure a sustainable Future Internet,
which enables demanding and ubiquitous appli -cations to coexist Part V: Future Internet Areas: Networks 275
The âoedeployment and Adoption of Future Internet Protocolsâ chapter from the Socioeconomics Area addresses the deployability of network protocols.
The main message of this chapter is that implementation, deployment, and adoption need to be
thought about carefully during the design of the protocol, as even the best technically designed protocol can fail to get deployed.
benefits to end users. For Congestion Exposure (Conex), a reasonable initial deploy -ment scenario is combined a CDN-ISP that offers a premium service using Conex, as
) Future Internet Assembly, LNCS 6656, pp. 277â 292,2011 Â The Author (s). This article is published with open access at Springerlink. com
the Scope of Future Internet Development Ioannis P. Chochliouros1,,*Anastasia S. Spiliopoulou2, and Nancy Alonistioti3
Hellenic Telecommunications Organization S. A. OTE 99 Kifissias Avenue, 15124 Maroussi, Athens, Greece ichochliouros@oteresearch. gr
Hellenic Telecommunications Organization S. A. OTE 99 Kifissias Avenue, 15124 Maroussi, Athens, Greece aspiliopoul@ote. gr
Dept. of Informatics and Communications, 15784, Panepistimiopolis, Ilissia, Athens, Greece nancy@di. uoa. gr Abstract.
Autonomicity, cognitive networks, Future Internet (FI), network manageability, Network Management (NM), self-configuration, self-manage
1 Introduction â Moving Towards the Future Internet There is an extensive consensus that the Internet,
as one of the most critical infra -structures of the 21st century, can critically affect traditional regulatory theories as
as the future of the Internet comes into consideration, in parallel with the appearance and/or the development of modern
Future related facilities will âoeattractâ more users to innovative services requiring greater mobility and bandwidth, higher speeds and
scalable and easily manageable Internet architecture. If well deployed, the Internet of the future can bring novelty, productivity gains, new markets and growth
In fact, innovative functionalities with more enhanced performance levels are nec -essary to sustain the real-time requirements of a multitude of novel applications.
-thermore, the Internet underpins the whole global economy. The diversity and sheer number of applications and business models supported by the Internet have also
largely affected its nature and structure (3, 4 The Future Internet (FI) will not be âoemore of the sameâ, but rather âoeappropriate
entitiesâ incorporating new technologies on a large scale that can unleash novel classes of applications and related business models 5. If todayâ s Internet is a crucial
element of our economy, FI will play an even more vital role in every conceivable business process.
defining and implementing a new architecture for the Internet intended to overcome existing limitations mostly in the area of networking (6, 7). The complexity of the
and Internet services 8. The European union (EU) is actually a potential leader in the FI sector 9. Leveraging FI technologies through their use in âoesmart infrastruc
data protection with transparent and democratic governance and control of offered services as guiding principles (10,11
The face of the Internet is continually changing, as new services appear and become globally noteworthy,
The current Internet has been founded on a basic archi -tectural premise, that is: a simple network service can be used as a âoeuniversal meansâ
Enhanced Network Self-Manageability in the Scope of Future Internet Development 279 to interconnect intelligent end systems 13.
end-points, thus allowing Internet to reach an impressive scale in terms of inter -connected devices. However, while the scale has reached not yet its limits, the growth
belief that current Internet is reaching both its architectural capability and its capacity limits (i e.:
providing a natural complement to the virtualization of resources -by setting up and tearing down composed services, based on negotiated SLAS.
of the current network typically resides in client stations and servers, which interact with network elements (NES) via protocols such as SNMP (Simple Network Man
underlying hardware and software resources comprise management issues highly challenging, meaning that currently, a diversity in terms of hardware resources leads
to a diversity of management tools (distinguished per vendor. In addition, security risks currently present in network environments request for immediate attention.
Enhanced Network Self-Manageability in the Scope of Future Internet Development 281 objectives of minimizing system life-cycle costs and energy footprints;(
Furthermore, new wireless sensor network technologies pro -vide options for inclusion of additional intelligence and the capability, for the network
Internet, providing an accurate reflection of the real world, delivering fine-grained information and enabling almost real-time interaction between the virtual world and
real world. In particular, autonomous self-organizing systems are beginning to emerge and to be established widely 17.
Internet model is based on clear separation of concerns between protocol layers, with intelligence moved to the edges,
and with the existent protocol pool targeting user and control plane operations with less emphasis on management tasks 18.
without neglecting the advantages of current Internet. Among the core drivers for the FI are increased reliability, enhanced services, more flexibility, and simplified opera
-tion. The latter calls for including Network Management (NM) issues into the design process for FI principles.
support interoperability between heterogeneous, complex and distributed systems while it should remain open for further and continuous improvement without the
Enhanced Network Self-Manageability in the Scope of Future Internet Development 283 robustness. Self-NET principle design is based on high autonomy of NES in order to
that characterizes the daily operation of FI users 21. Among the main Self-NETÂ s
allowing an ever-evolving Internet. Towards realizing this aim, Self-NET considers that a DC-SNM along with a hierarchical distribution over
Enhanced Network Self-Manageability in the Scope of Future Internet Development 285 3 Challenges and Benefits for the Market Sector
benefits for all relevant âoeactorsâ (i e. for both operators and users), as follows Automatic network planning and reduction of management time of complex net
-ers the desired services to its users. In many cases, the network operator is obliged to
search through vast amounts of monitoring data to find any âoeinconveniencesâ to his network behaviour and to ensure a proper servicesâ delivery.
Traffic management configuration of large wireless networks consist -ing of multiple, distributed NES of varying technologies, is challenging, time
high quality, on a real-time basis. Self management can offer decentralized monitor -ing and proper decision-making techniques so that appropriate optimization hints can
failures and to ensure continuity of service delivery is a critical matter for the user and
Enhanced Network Self-Manageability in the Scope of Future Internet Development 287 4 Experimental Results for Network Coverage and
In the proposed test-bed, a heterogeneous wireless network environment has been deployed, consisting of several IEEE 802.11 Soekris access points (AP) 33 and an
Wi-fi) and multi-RATS (i e. Wifi, Wimax were located in the corresponding area, consuming a video service delivered by VLC
video LAN client)- based service provider 35. For the management of the NECMS a NDCM has been deployed.
of a new Wifi AP;(ii) the self-optimization of the network topology through the
Enhanced Network Self-Manageability in the Scope of Future Internet Development 289 0. 000 5. 000
Monitor Phase 2. 760 2. 561 3. 137 2. 547 Tim e se c Fig. 4. Channel Selection Duration
-gies (Wifi, Wimax), especially in cases where there is âoeextremeâ network traffic and/or overload, affecting the network functionality
-ment, virtualization of systems and network resources, advanced and cognitive net -working of information objects), have to âoere-defineâ the overall FI network architec
fixed and IP networks), taking into consideration the next generation Internet envi -ronment and the convergence perspective.
-NET (âoeself-Management of Cognitive Future Internet Elementsâ) European Research Project and has been supported by the Commission of the European communities, in
4. Future Internet Assembly (FIA: Position Paper: Real world Internet (2009 http://rwi. future-internet. eu/index. php/Position paper
5. Afuah, A.,Tucci, C. L.:Internet Business models and Strategies: Text and Cases Mcgraw-hill, New york (2000
6. European Future Internet portal (2010), http://www. future-internet. eu /Enhanced Network Self-Manageability in the Scope of Future Internet Development 291
7. Blumenthal, M. S.,Clark, D d.:Rethinking the Design of the Internet: The End-to-end Ar
-guments vs. the Brave New world. ACM Trans. on Internet Techn. 1 (1), 70â 109 (2001
8. Commission of the European communities: Communication on âoethe Future EU 2020 Strategyâ. European commission, Brussels (2009
9. Tselentis, G.,Domingue, L.,Galis, A.,Gavras, A.,et al.:Towards the Future Internet-A
European Research Perspective. IOS Press, Amsterdam (2009 10. Organization for Economic Co-operation Development (OECD:
The Seoul Declaration for the Future of the Internet Economy. OECD, Paris, France (2008 11.
Chochliouros, I. P.,Spiliopoulou, A s.:Innovative Horizons for Europe: The New Euro -pean Telecom Framework for the Development of Modern Electronic Networks and Ser
-vices. The Journal of the Communications network (TCN) 2 (4), 53â 62 (2003 12. Commission of the European communities:
Communication on âoefuture Networks and the Internetâ. European commission, Brussels (2008 13. Galis, A.,Brunner, M.,Abramowitz, H.:
-vice-Aware Networking Architecture (MANA) for Future Internet/Draft 5. 0 (2008 14. International Telecommunication Union-Telecommunication Standardization Sector:
Rec M. 3400: TMN Management Functions. ITU-T, Geneva, Switzerland (2000 15. Pastor-Satorras, R.,Vespignani, A.:
Evolution and Structure of the Internet: A Statistical Physics Approach. Cambridge university Press, Cambridge (2004 16.
Autonomic Network Management in the Scope of the Future Internet. In: Proceedings of the 48th FITCE International Congress, FITCE, Prague, Czech republic, pp. 102â 106 (2009
Future Internet Elements Cognition and Self management Design Issues. In: Proceedings of the 2nd International Conference on Autonomic Computing and Communication systems, pp. 1â 6 (2008
21. Raptis, T.,Polychronopoulos, C.,et al.:Technological Enablers of Cognition in Self -Manageable Future Internet Elements.
In: Proceedings of The First International Confer -ence on Advanced Cognitive Technologies and Applications COGNITIVE 2009, pp. 499â
Principles for Synergy of Self management and Future internet Evolutions. In: Proceed -ings of the ICT Mobile Summit 2009, pp. 1â 8. IMC Ltd, Dublin (2009
23. Self-NET Project: Deliverable D1. 1: System Deployment Scenarios and Use Cases for Cognitive Management of Future Internet Elements (2008), https://www. ict-selfnet
eu /24. Agoulmine, N.,Balasubramaniam, S.,Botvitch, D.,Strassner, J.,et al.:Challenges for Autonomic Network Management.
IEEE International Conference on Personal Wireless communications, pp. 355â 362 (2000 292 I. P. Chochliouros, A s. Spiliopoulou, and N. Alonistioti
Internet Wireless Networks: Dynamic Resource Allocation and Traffic Routing for Multi -Service Provisioning. In: Proceedings of MOBILIGHT-2009, pp. 1â 12.
The autonomic computing edge: Can you CHOP UP autonomic computing IBM Corporation (2008 30. Prehofer, C.,Bettstetter, C.:
Self-organization in Communication Networks: Principles and Design Paradigms. IEEE Communications Magazine 43 (7), 78â 85 (2005
31. Mihailovic, A.,Chochliouros, I. P.,Georgiadou, E.,Spiliopoulou, A s.,et al.:Situation Aware Mechanisms for Cognitive Networks.
-ence on Ultra Modern Telecommunications (ICUMT-2009), pp. 1â 6. IEEE Computer So -ciety Press, Los Alamitos (2009
AN-100u/UX Single Sector Wireless Access Base Station User Manual (2008 35. C.:open-source multimedia framework, player and server
http://www. videolan. org/vlc J. Domingue et al. Eds.):) Future Internet Assembly, LNCS 6656, pp. 293â 306,2011
 The Author (s). This article is published with open access at Springerlink. com Efficient Opportunistic Network Creation in the Context
of Future Internet Andreas Georgakopoulos, Kostas Tsagkaris, Vera Stavroulaki, and Panagiotis Demestichas University of Piraeus, Department of Digital Systems
80, Karaoli and Dimitriou Street, 18534 Piraeus, Greece {andgeorg, ktsagk, veras, pdemest}@ unipi. gr Abstract.
In the future internet era, mechanisms for extending the coverage of the wireless access infrastructure and service provisioning to locations that can
-pacity Extension, Future Internet 1 Introduction The emerging wireless world will be part of the Future Internet (FI.
All kinds of devices and networks will have the interconnection potential. Thus, any object or network element will have embedded communication capabilities and several objects
algorithm and strengthen the proof of concept. Finally, the article concludes with key findings and future work
Efficient Opportunistic Network Creation in the Context of Future Internet 295 ZÄ Ä Å Å ï¿
In 7, the issue of server selection is being investigated by proposing a node selection algorithm with respect to the worst-case link stress (WLS) criterion
secure, remote access to users of e g. an office network. Also, Virtual LANS (VLANS which are another type of VNS are logical networks
the application provisioning via the use of various kinds of nodes (e g. cell phones PDAS, laptops and other network-enabled devices.
Thus, a fitness function is pre -sented which is able to evaluate the eligibility of each candidate node
the user profiles, the outcome of this phase will be to decide whether it is suitable to
Efficient Opportunistic Network Creation in the Context of Future Internet 297 3. 2 ON Creation
lifetime to changing environment conditions (e g. context, operatorâ s policies, user profiles). ) In order to achieve this, after the successful completion of the creation
and enable service provisioning to end-users it is needed to gain awareness of the status of candidate,
can be used as routers, even when they do need not to use an application) and the
According to this scenario, a node which acts as a traffic source like a laptop or a camera is out of the coverage of the infrastructure.
the end user gets access to the infrastructure in situations where it nor -mally would not be possible,
cashflow as more users are being supported Another indicative scenario would comprise the notion of the opportunistic capac
Efficient Opportunistic Network Creation in the Context of Future Internet 299 Access providers are benefited from the fact that more users can be supported since
new incoming users that otherwise would be blocked can now be served, while end users experience improved Qos since congestion situations can be resolved as illus
-trated in Fig. 4 ZÄ Å Ä Ç ï Å Ä Ä ae Å ae aeoeä Ä ï
Å Ä Ä 'Ä ae Ä Ç Ä Ç ï Å Ä Ä DÄ Ä aeoeå ï¿
Efficient Opportunistic Network Creation in the Context of Future Internet 301 matrix contains the three factors (i e. energy, availability and delivery probability
In order to obtain some proof of concept for our network creation solution, a Java -based prototype has been developed
-trated in Fig. 6. Each node features 2 interfaces, a Bluetooth (IEEE 802.15.1) 16 and
interface, each node has a transmission data rate of 15 Mbps. On the other hand, the Bluetooth interface has a transmission data rate of 1 Mbps
but it is used for a rather short-range coverage (e g. 10 meters. Also, every new message is created at a 30
Efficient Opportunistic Network Creation in the Context of Future Internet 303 of significantly lower delivery rates as the message size increases to 1000 and 1500
Efficient Opportunistic Network Creation in the Context of Future Internet 305 0 0. 5 1
This work presents the efficient ON creation in the context of Future Internet. Opera -tor-governed ONS are a promising solution for the coverage or capacity extension of
1. European Telecommunications Standards Institute (ETSI), Reconfigurable Radio Systems RRS), âoesummary of feasibility studies and potential standardization topicsâ, TR 102.838
-tional Conference on Computer Communications (2006 3. Rong, B.,Hafid, A.:A Distributed Relay Selection algorithm for Cooperative Multicast in
5th International Conference on Mobile Ad hoc and Sensor Networks, Fujian (2009 4. Bouabdallah, F.,Bouabdallah, N.:
Computer Communications 31, 1763â 1776 (2008 5. Verma, A.,Sawant, H.,Tan, J.:Selection and navigation of mobile sensor nodes using a
Pervasive and Mobile Computing 2, 65â 84 (2006 6. Chen, H.,Wu, H.,Tzeng, N.:
Optimal node-selection algorithm for parallel download in overlay con -tent-distribution networks. Computer networks 53, 1480â 1496 (2009
8. Akyildiz, I.,Wang, X.,Wang, W.:Wireless mesh networks: a survey. Computer Net -works 47, 445â 487 (2005
9. Akyildiz, I.,Lee, W.,Chowdhury, K.:CRAHNS: Cognitive radio ad hoc networks. Ad Hoc Networks 7, 810â 836 (2009
Computer networks 36, 137â 151 (2009 11. Rossberg, M.,Schaefer, G.:A survey on automatic configuration of virtual private net
Computer networks (2011 12. Houidi, I.,Louati, W.,Ameur, W.,Zeghlache, D.:Virtual network provisioning across
Computer networks 55, 1011â 1023 (2011 13. Saaty, T. L.:The Analytic Hierarchy Process. Mcgraw-hill, New york (1980
http://www. ieee802. org/15/pub/TG1. html 17. IEEE 802.11 Wireless Local area networks, http://ieee802. org/11
/18. Spyropoulos, T.,Psounis, K.,Raghavendra, C.:Spray and Wait: An Efficient Routing Scheme for Intermittently Connected Mobile networks.
In: ACM SIGCOMM Workshop on Delay-Tolerant Networking, WDTN (2005 Bringing Optical Networks to the Cloud:
Architecture for a Sustainable Future Internet Pascale Vicat-Blanc1, Sergi Figuerola2, Xiaomin Chen4, Giada Landi5
6 Athens Information technology 7 SAP Research 8 Poznan Supercomputing and Networking Center 9 INRIA 10 University of Essex
14 Alcatel-lucent 15 Telefoâ'nica I+D 16 Telekomunikacja Polska 17 Indian Institute of technology, Bombay Abstract.
Over the years, the Internet has become a central tool for society. The extent of its growth and usage raises critical issues associ
as Cloud computing and 3d-video streaming require optimization and combined provisioning of diï erent infrastructure resources and services
As a huge energy consumer, the Internet also needs to be energy -conscious. Applications critical for society and business (e g.,
and secure Internet. Finally, the future Internet needs to support sus -tainable business models, in order to drive innovation, competition, and
research. Combining optical network technology with Cloud technology is key to addressing the future Internet/Cloud challenges.
In this con -J. Domingue et al. Eds.):) Future Internet Assembly, LNCS 6656, pp. 307â 320,2011 câ The Author (s). This article is published with open access at Springerlink. com
308 P. Vicat-Blanc et al text, we propose an integrated approach: realizing the convergence of the
and IT managed services integrated with the vanilla Internet will ensure a sustainable future Internet/Cloud enabling demanding and ubiquitous
applications to coexist Keywords: Future Internet, Virtualization, Dynamic Provisioning, Vir -tual Infrastructures, Convergence, Iaas, Optical Network, Cloud
1 Introduction Over the years, the Internet has become a central tool for society. Its large
adoption and strength originates from its architectural, technological and opera -tional foundation: a layered architecture and an agreed upon set of protocols for
the sharing and transmission of data over practically any medium. The Inter -netâ s infrastructure is essentially an interconnection of several heterogeneous net
-ment called gateways or routers. Routers are interconnected together through links, which in the core-network segment are mostly based on optical transmis
-sion technology, but also in the access segments gradual migration to optical technologies occurs. The current Internet has become an ubiquitous commod
-ity to provide communication services to the ultimate consumers: enterprises or home/residential users. The Internetâ s architecture assumes that routers are
stateless and the entire network is neutral. There is no control over the content and the network resources consumed by each user.
It is assumed that users are well-behaving and have homogeneous requirements and consumption After having dramatically enhanced our interpersonal and business commu
-nications as well as general information exchangeâ thanks to emails, the web Voip, triple play service, etc. â the Internet is currently providing a rich envi
-ronment for social networking and collaboration and for emerging Cloud-based applications such as Amazonâ s EC2, Azure, Google apps and others.
The Cloud technologies are emerging as a new provisioning model 2. Cloud stands for on
-demand access to IT hardware or software resources over the Internet. Clouds are revolutionizing the IT world 11,
but treat the Internet as always available without constraints and absolutely reliable, which is yet to be achieved.
Ana -lysts predict that in 2020, more than 80%of the IT will be outsourced within the Cloud 9!
With the increase in bandwidth-hungry applications, it is just a matter of time before the Internetâ s architecture reaches its limits
The new Internetâ s architecture should propose solutions for Qos provision -ing, management and control, enabling a highly ï exible usage of the Internet re
-sources to meet bursty demands. If the Internetâ s architecture is redesigned not not only mission-critical or business applications in the Cloud will suï er, but
even conventional Internetâ s users will be aï ected by the uncontrolled traï c or business activity over it
Bringing Optical Networks to the Cloud 309 Today, it is impossible to throw away what has made the enormous success
of the Internet: the robustness brought by the datagram building block and the end-to-end principle which are of critical importance for all applications.
-sioning and the virtualization paradigm with dynamic network provisioning as a way towards such a sustainable future Internet.
The proposed architecture for the future Internet will provide a basis for the convergence of networksâ optical
networks in particularâ with the Clouds while respecting the basic operational principles of todayâ s Internet.
It is important to note that for several years, to serve the new generation of applications in the commercial and scientiï c sec
-tors, telecom operators have considered methods for dynamic provisioning of high-capacity network-connectivity services tightly bundled with IT resources
There are various challenges that are driving todayâ s Internet to the limit, which in turn have to be addressed by the future Internetâ s architecture.
As of today, the users /applications that require bandwidth beyond 1 Gbps are rather common
with a growing tendency towards applications requiring a 10 Gbps or even 100 Gbps connectivity.
Examples include networked data storage, high-deï -nition (HD) and ultra-HD multimedia-content distribution, large remote in
-strumentation applications, to name a few. But today, these applications cannot use the Internet because of the fair-sharing principle and the basic
routing approach. As TCP, referred to as the one-size-ï ts-all protocol, has
reached its limits in controllingâ aloneâ the bandwidth, other mechanisms must be introduced to enable a ï exible access to the huge available band
-width 18 http://www. geysers. eu 310 P. Vicat-Blanc et al 2. Coordinate IT and network service provisioning:
Indeed, IT resources are processing data that should be transferred from the userâ s premises or from the data repository to the computing resources
When the Cloud will be adopted largely and the data deluge will fall in it the communication model oï ered by the Internet may break the hope for
fully-transparent remote access and outsourcing. The interconnection of IT resources over networks requires well-managed,
dynamically invoked, consis -tent services. IT and network should be provisioned in a coordinated way in
the future Internet 3. Deal with the unpredictability and burstiness of traï c: The increas
-ing popularity of video applications over the Internet causes the traï c to be unpredictable in the networks.
-plications on the Internet will be more and more sporadic: the network eï ect ampliï es reactions. Therefore, the future Internet needs to provide mecha
-nisms that facilitate elasticity of resources provisioning with the aim to face sporadic, seasonal or unpredictable demands
few years following the growth of the Internet. Therefore, as a signiï cant contributor to the overall energy consumption of the planet, the Internet
needs to be energy-conscious. In the context of the proposed approach, this should involve energy awareness both in the provisioning of network and IT
dependency on information systems. The current Internetâ s service paradigm allows service providers to authenticate resources in provider domains but
end users to resources is a challenge. This issue is even more signiï cant in the emerging systems with the provisioning of integrated resources provided
business models deployed by telecom operators are focused on selling services on top of their infrastructures. In addition, operators cannot oï er dynamic
Internet â The Virtual Infrastructure concept and its operational model as a funda -mental approach to enable the on-demand infrastructure services provision
This concept has little to do with the way data is processed or trans -mitted internally, while enabling the creation of containers with associated non
-nents for the future Internet. They inherently provide plenty of bandwidth and in particular, the emerging ï exible technology supported by the required con
-sources comprise another important category of future Internet shared resources aggregated in large-scale data centers and providing high computational and
storage capacities. In order to build VIS, these resources are abstracted, parti -tioned or grouped into Virtual Resources (VRS),
of conï guration, accessibility and availability for the end users, as well as a sep -aration of the functional aspects of the entities involved in the converged service
-virtualization layer, the enhanced control plane, that corresponds to the network management layer, and the service middleware layer.
Each layer is responsible for implementing diï erent functionalities covering the full end-to-end service delivery from the service layer to the physical substrate
Central to this novel architecture is the infrastructure virtualization layer which abstracts, partitions and interconnects infrastructure resources
-acting with the virtualization layer 3. Finally, a service middleware layer is introduced to fully decouple the
physical infrastructure from the service level. It is an intermediate layer between applications running at the service consumerâ s premises and the
-virtualization layer is implemented as the Logical Infrastructure Composition Layer (LICL) and the enhanced control plane as the NCP+.
SML Service Middleware Layer VI Virtual Infrastructure VIO Virtual Infrastructure Operator VIO-IT Virtual IT Infrastructure Operator
Enterprise Information system externally on a Cloud rented from a Software -as-a-Service (Saas) provider.
It also connects heterogeneous data resources in an isolated virtual infrastructure. Furthermore, it supports scaling
role for telecom operators that own their infrastructure to oï er their optical network integrated with IT infrastructures (either owned by them or by third
resilience) can be oï ered economically and eï ciently to users and applications 4 Virtual Infrastructures in Action
terms of provisioning of IT resources, where distributed computing and storage resources are scaled automatically up and down, with guaranteed high-capacity
between the NCP+and the service middleware layer (SML) via a service -to-network interface, named NIPS UNI during the entire VI service life cycle
19 http://www. ens-lyon. fr/LIP/RESO/Software/vxdl/home. html 316 P. Vicat-Blanc et al
of amount of CPU), while the NCP+computes the most eï cient combination of end-points and network path to be used for the speciï c service.
path computation is performed by dedicated PCES that implements enhanced computation algorithms able to combine both network and IT parameters with
energy-consumption information in order to select the most suitable resources and ï nd an end-to-end path consuming the minimum total energy (see Sec. 5
the infrastructure-virtualization layer, in order to trigger the procedures for the Virtual Infrastructureâ s dynamic replanning on the network side, besides the IT
plane is able to request the upgrade or downgrade of the virtual resources, in order to automatically optimize the VIÂ s size to the current traï c load
eï cient routing algorithm (due to space limitations, the detailed algorithm is not 318 P. Vicat-Blanc et al
Fig. 6. Number of activated ï bers Fig. 7. Number of activated data centers shown here) from a networked IT use case:
each source site has certain processing demands which need to be satisï ed by suitable IT resources (in a data center
Note that we assume anycast routing, implying that the destination IT resource can be chosen freely among the available ones,
4-6) indicate that our proposed algorithm can decrease the energy consumption by 10%compared to schemes where only IT infrastructure is considered and
the Internet has to face urgently to support emerging disruptive applications and continue to grow safely.
-opment activities of the GEYSERS project to achieve the complete software stack and provide the proof of concept of these architectural considerations
of the diï erent software components creating and managing optical virtual in -frastructures. The other goal is to evaluate the performance and functionality of
Market-Oriented Cloud computing: Vision, Hype, and Reality of De -livering Computing as the 5th Utility.
In: Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, WASHINGTON DC
USA. CCGRID â 09, p. 1. IEEE Computer Society Press, Los Alamitos (2009 doi: 10.1109/CCGRID. 2009.97
20 Mintotalpower: minimizing both network -and IT power; Minnetworkpower only minimizing the network power; Minnetcapacity:
-mizing the energy consumed by the data centers 320 P. Vicat-Blanc et al 3. Clark, D.:
The design philosophy of the DARPA internet protocols. SIGCOMM Comput. Commun. Rev. 18, 106â 114 (1988), doi:
A Novel Architecture for Virtualization and Co-Provisioning of Dynamic Optical Networks and IT Services.
ICT Future Network and Mobile Summit 2011 Santander, Spain (June 2011 5. Farrel, A.,Vasseur, J. P.,Ash, J.:
A Path Computation Element (PCE)- Based Architecture. RFC 4655 (Informational)( Aug 2006), http://www. ietf. org/rfc
Why the Internet only just works. BT Technology Journal 24, 119â 129 2006), doi: 10.1007/s10550-006-0084-z
The next Generation Internet, E-business, and E-everything http://www. aaas. org/spp/rd/ch20. pdf
10. Pickavet, M.,Vereecken, W.,Demeyer, S.,Audenaert, P.,Vermeulen, B.,Develder C.,Colle, D.,Dhoedt, B.,Demeester, P.:
Advanced Networks and Telecommunication Systems, 2008. ANTS â 08. 2nd International Symposium on. pp. 1â 3 (2008
Future Internet Areas: Services Part VI: Future Internet Areas: Services 323 Introduction The global economy can be characterised under three main sectors.
The primary sec -tor involves transforming natural resources into primary products which then form the raw materials for other industries1.
motivation for services research both in the software industry and academia The Internet of Services is concerned with the creation of a layer within the Future
Internet which can support the service economy. Two overarching requirements influ -ence the scope and technical solutions created under the Internet of Services umbrella
Firstly, there is a need to support the needs of businesses in the area. Service oriented
solutions can enable new delivery channels and new business models for the services industrial sector The Future Internet will be comprised of a large number of heterogeneous compo
-nents and systems which need to be linked and integrated. For example, sensor net -works will be composed on adhoc collections of devices with low-level interfaces for
accessing their status and data online. Mobile platforms will need to access to external data and functionality in order to meet consumer expectations for rich interactive
seamless experiences. Thus, a second driving requirement for the Internet of Services is to provide a uniform conduit between the Future Internet architectural elements
through service-based interfaces Under the above broad requirements a number of research themes arise
â¢Architectural â within a new global communications infrastructure there is a need to determine how a service layer would fit into an overall Future Internet architecture
For example, the boundary between the network and service layers and also how ser -vices would operate over connected objects
1 http://en. wikipedia. org/wiki/Primary sector of the economy 2 http://en. wikipedia. org/wiki/Secondary sector of the economy 3 http://en. wikipedia. org/wiki/Tertiary sector of the economy
4 http://www. eurofound. europa. eu/emire/GREECE/TERTIARIZATION-GR. htm 5 http://en. wikipedia. org/wiki/List of countries by gdp sector composition
324 Part VI: Future Internet Areas: Services and semi-automated approaches to service discovery, composition, mediation and
invocation â¢Cloud computing â definitions vary but cloud computing is generally acknowl -edged to be the provision of IT capabilities, such as computation, data storage and
software on-demand, from a shared pool, with minimal interaction or knowledge by users. Cloud services can be divided into three target audiences:
service providers software developers and users as follows6 â Infrastructure as a service â offering resources such as a virtual machine or
storage services â Platform as a service â providing services for software vendors such as a soft -ware development platform or a hosting service
â Software as a service â offering applications, such as document processing or email to end-users Within this section we have three chapters
which cover several of the issues outlined above. The ability to trade IT-services as an economic good is seen as a core feature of
the Internet of Services. In the chapter Butler et al. âoeslas Empowering Services in the Future Internetâ the authors discuss this in relation to Service Level Agreements
SLAS). ) In particular they claim a requirement for a holistic view of SLAS enabling their management through the whole service lifecycle:
from engineering to decommission -ing. An SLA management framework is outlined as a proposal for handling SLAS in the
Future Internet. Evidence supporting the claims is provided through experiences in four industrial case studies in the areas of:
Enterprise IT; ERP Hosting; Telco Service Ag -gregation; and egovernment Ontologies are shared formal descriptions of a shared viewpoint over a domain
which have attracted attention in recent years within the context of the Web. This work has led to the Semantic web,
and extension of the Web which is machine read -able. Ontologies and semantics form a part of the next two chapters in this section
As mentioned above there is an open question on how best to connect the network and service layers in a new communications infrastructure.
Within the chapter Santos et al. âoemeeting Services and Networks in the future Internetâ an ontology based ap
-proach is taken combined with a simplification of the network layer structure in order to facilitate network-service integration.
More specifically, the approach, called FINLAN Fast Integration of Network Layers), is a model which replaces several network layers
with ontologies providing the foundations for an âoeautonomic Internetâ Linked Data is the Semantic web in its simplest form
and is based on four principles â¢Use URIS (Uniform Resource Identifiers) as names for things
using Semantic web standards â¢Include links to other URIS, so that other resources can be discovered 6 See http://www. internet-of-services. com/index. php?
id=274&l=0 Part VI: Future Internet Areas: Services 325 Given the growing take-up of Linked Data for sharing information on the Web at
large scale there has begun a discussion on the relationship between this technology and the Future Internet.
In particular, the Future Internet Assemblies in Ghent and Budapest both contained sessions on Linked Data.
The final chapter in this section Domingue et al. âoefostering a Relationship Between Linked Data and the Internet of
Servicesâ discusses the relationship between Linked Data and the Internet of Services Specifically, the chapter outlines an approach which includes a lightweight ontology
and a set of supporting tools John Domingue J. Domingue et al. Eds.):) Future Internet Assembly, LNCS 6656, pp. 327â 338,2011
 The Author (s). This article is published with open access at Springerlink. com SLAS Empowering Services in the future Internet1
Joe Butler1, Juan Lambea2, Michael Nolan1, Wolfgang Theilmann3 Francesco Torelli4, Ramin Yahyapour5, Annamaria Chiasera6, and Marco Pistore7
1 Intel, Ireland, {joe. m. butler, michael. nolan}@ intel. com 2 Telefã nica Investigaciã n y Desarrollo, Spain, juanlr@tid. com
3 SAP AG, Germany, wolfgang. theilmann@sap. com 4 ENG, Italy, francesco. torelli@eng. com
5 Technische Universitã¤t Dortmund, Germany, ramin-yahyapour@udo. edu 6 GPI, Italy, achiasera@gpi. it
propose an SLA management framework that can become a core element for managing SLAS in the future Internet.
Last, we present early results and ex -periences gained in four different industrial use cases,
The service paradigm is a core principle for the Future Internet which supports integration, interrelation and inter-working of its architectural
elements. Besides being the constituting building block of the so-called Internet of Services, the paradigm equally applies to the Internet of things and the underlying
technology cloud platform below. Cloud computing gained significant attention and commercial uptake in many business scenarios. This rapidly growing service-oriented
economy has highlighted key challenges and opportunities in IT-supported service provisioning. With more companies incorporating cloud based IT services as part of
1 The research leading to these results is supported partially by the European community's Seventh Framework Programme (FP7/2001-2013) under grant agreement nâ°216556
-cally, a service is dependent on many other services, e g. the offering of a software service requires infrastructure resources, software licenses or other software services
We propose an SLA management framework that offers a core element for manag -ing SLAS in the future Internet.
The framework supports the configuration of com -plex service hierarchies with arbitrary layers. This allows end to end management of
resources and services for the business value chain. The scientific challenges include the understanding and modelling of the relationships between SLA properties.
-ness, software, and infrastructure) on the other With a set of four complementary use case studies, we are able to evaluate our ap
-cation and third party web services: how multi-party, multi-domain SLAS for aggre -gated services can best be offered to customers. egovernment validates the integra
SLAS Empowering Services in the future Internet 329 The remainder of this paper is organized as follows. Chapter 2 introduces our ref
adoption of the framework, within the Future Internet but also in general System Management environments. Chapters 4-7 cover the respective use cases and evalua
2) supports arbitrary service types (business, software, infrastructure) and SLA terms,(3) covers the complete SLA and service lifecycle with consistent interlinking
business, software and infrastruc -ture. The framework communicates to external parties, namely customers who (want
On the highest level, we distinguish the Framework Core, Service Managers (infra -structure and software), deployed Service Instances with their Manageability Agents
and Monitoring Event Channels. The Framework Core encapsulates all functionality related to SLA management, business management,
and the evaluation of service setups. Infrastructure-and Software Service Managers contain all service-specific
functionality. The deployed Service Instance is the actual service delivered to the customer and managed by the framework via Manageability Agents.
Software SLA Manager Infrastructure SLA Manager Business Manager Service Evaluation Infrastructure Service Manager Software Service Manager
Customer 3rd Party Manageability Agent Infrastructure Service <<provider relations >><negotiate >><customer relations >>Monitored Event Channel <<control/track
Software Service <<adjust >>deployed infrastructure service deployed software service <<negotiate >>framework core Fig. 1. Overview of the SLA Framework Reference Architecture
While all framework components come with default implementations they can also easily be extended or enhanced for more specific domain needs.
Similarly, the pro -vided meta-models come with clear extension mechanisms, e g. to specify additional service level terms
Internet. Second, we give an overview how SLA management relates to other man -agement functions.
SLAS Empowering Services in the future Internet 331 3. 1 Adoption Considerations for the Future Internet The SLA management framework architecture can easily be applied to different Fu
-ture Internet scenarios. The SLA model is rich and extensible enough to be applied to e g. infrastructure and networking resources, to sensor-like resources in the Internet of
Things, to services in the Internet of Services, but also to describe people, knowledge and other resources.
Similarly, the service construction model can be adopted, which allows specification of arbitrary internal resource/service aspects
Based on this model foundation, the framework components can be flexibly instan -tiated. Assuming to have Manageability Agents for the relevant artefacts in the future
Internet, a management environment consisting of SLA and Service Managers can be set up in different flavours.
respective Future Internet scenario. In the following use-case chapters we also pro -vide additional configuration examples of the framework
3. 2 Adoption Considerations for Cloud computing The SLA@SOI framework should become an intrinsic part of each cloud environ
contains many aspects of a software cloud 3. 3 Interlinkage with System Management SLA-driven system management is the primary approach discussed in this paper.
We assume a virtualisation-enabled data centre style configura -tion of server capacity, and a broad range of services in terms of relative priority
resource requirement and longevity. As a support service in most enterprises, IT is expected to deliver application
and data service support to other enterprise services and lines of business. This brings varied expectations of availability, mean-time-to
SLAS Empowering Services in the future Internet 333 for efficiency, and longer term strategic issues such as infrastructure refresh (in the
Taking a holistic cost view, it provides fine grained SLA based data to influence future investment decisions based on capital, security, compute power and
From an implementation perspective, user interaction is via a web based UI, used by both IT customers and administrators.
Software services could potentially be selected by choosing a virtual machine template which contains pre-loaded applications,
but software layer considerations are considered not core to this Use Case and are dealt more comprehensively with in the ERP Hosting Use Case
The Business SLA Manager passes service provisioning requests to the Infrastructure SLA Manager whose role is to carry out the creation of the new virtual machines
which constitute the service along with monitoring and reporting for that service Evaluation of the framework is carried out with reference to parameters which
a software package (an application) but also some business-level activities, such as a support contract. At the next level, there are the actual software applications, such as for
example a hosted ERP SOFTWARE package. At the next level, there are the required mid -dleware components which are used equally for different applications.
At the lowest layer, there are the infrastructure resources, delivered through an internal or external cloud.
Application SLA is mainly about the throughput capacity of the software solution, its response time, and the provider internal costs required for the offering.
The Middleware SLA specifies the capacity of the middleware components, the response time guarantee of the middleware components and the costs required for the offering.
The Infrastructure SLA specifies the characteristics of the virtual or physical resources (CPU speed, mem
-ory, and storage) and again the costs required for the offering The use case successfully applies the SLA framework by realizing distinct SLA
Managers for the 4 layers and also 4 distinct Service Managers that bridge to the actual
support department, the application, the middleware, and the infrastructure artefacts From a technical perspective, the most difficult piece in the realization of the
the different components, e g. the performance characteristics of the middleware. We collected a set of model-driven architecture artefacts, measurements,
SLAS Empowering Services in the future Internet 335 6 Use Case â Service Aggregation The main aim of the Service Aggregation use case is the service-enabling of core
Telco services and their addition with services from third parties (as Internet, infra -structure, media or content services.
From the providerâ s point of view, they will be able to publish their services in the Service Aggregator
integrates software layer (from SLA@SOI framework architecture. And finally Bank prototype is implemented using the top layer, business.
way it is necessary to outline also is executed the provision of Telco web service wrappers by Software SLA Manager in an application server and also the provision of
the infrastructure driven by Infrastructure SLA Manager (using the appropriate ser -vice manager. SMS wrappers deployed in the application server of the corresponding
virtual machine has to connect and execute different tasks with core mobile network systems that are behind Telefã nica Software Delivery Platform (SDP.
The compo -336 J. Butler et al nents that can be connected also in the use case are the monitors of the services (SMS
and Infrastructure services. To take care about the violations, track interfaces are used to connect the adjustment components in each SLA Manager.
Finally, Service Aggregator converts violations in penalties, and takes actions to adjust these viola -tions and reports the situation to the customer
Technical evaluation about SLA@SOI framework can be seen in a very positive way in terms of the functionality of the components and the outcome obtained by the
In the new ecosystems of Future internet of services the key will be the exporting and interconnection of services between different parties.
SLA-aware aggregation of telecommunications services introduces a business opportunity for the agile and efficient co-creation of new service offerings and sig
Such a Health & Mobile Service is provided by a so called âoecitizen Service Centerâ (CSC) and is composed of:
health, mobile and contact services, as well as the expected overall satisfaction of the citizen. The SLA@SOI framework automates activities of the CSC that are usually
SLAS Empowering Services in the future Internet 337 From the technical point of view, one of the main challenges of this use case has
For example, while typical software/hardware guarantee terms constraint the quality of each single execution of a service, in this use case the guarantee terms constraint
to sensitive data on the health status of the citizens and quite challenging for the key
system from the users, effectiveness of monitoring and adjustment functionalities The results obtained from this evaluation is integrated further
trends in the real data extracted from the past behaviours of the systems at the service
Service level agreements are a crucial element to support the emerging Future Internet so that eventual services become a tradable, dependable good.
-purpose SLA management framework that can become a core element for managing SLAS in the future Internet.
The framework allows the systematic grounding of SLA requirements and capabilities on arbitrary service artefacts, including infrastructure
network, software, and business artefacts. Four complementary industrial use cases demonstrated the applicability and relevance of the approach.
-narios, especially relevant for the Future Internet. Last, we plan to open up our devel -opment activities via an Open source Project.
The first framework version fully pub -lished as open source can be found at 5 Open Access.
This article is distributed under the terms of the Creative Commons Attribution Noncommercial License which permits any noncommercial use, distribution, and reproduction
Journal of Internet Engineering 4 (1 2010), http://www. jie-online. org/ojs/index. php/jie/issue/view/8
3. Miller, B.:The autonomic computing edge: Can you CHOP UP autonomic computing Whitepaper IBM developerworks (March 2008), http://www. ibm. com/developer
works/autonomic/library/ac-edge4 /4. Theilmann, W.,Winkler, U.,Happe, J.,Magrans de Abril, I.:
Managing on-demand busi -ness applications with hierarchical service level agreements. In: Berre, A j.,GÃ mez-PÃ rez
A.,Tutschku, K. eds. FIS 2010. LNCS, vol. 6369, Springer, Heidelberg (2010 5. SLA@SOI Open source Framework.
First full release by December 2010 http://sourceforge. net/projects/sla-at-soi 6. SLA@SOI project:
Internet Eduardo Santos1, Fabiola Pereira1, Joaëoeo Henrique Pereira2 Luiz Claâ'udio Theodoro1, Pedro Rosa1, and Sergio Takeo Kofuji2
and collaborate with Future Internet researches, like the Autonomic Internet Keywords: Future Internet, Network Ontology, Post TCP IP, Services
Introduction In recent years it has been remarkable the Internet advancement in throughput and the development of diï erent services and application features.
Many of these are supported by the TCP IP protocols architecture, however, the intermediate layers based on the protocols IP, TCP, UDP and SCTP were developed more
than 30 years ago, when the Internet was used just for a limited number of hosts
and with a few services support. Despite the development of the Internet and its wonderful ï exibility and adaptability, there were no signiï cant improvements
in its Network and Transport layers, resulting in a communication gap between layers 7, 8
Internet and there are a lot of studies, proposals and discussions over questions related to a network able of supporting the current and Future Internet commu
-nication challenges. Some of these studies are related to: EFII, FIA, FIRE, FIND GENI and other groups.
) Future Internet Assembly, LNCS 6656, pp. 339â 350,2011 câ The Author (s). This article is published with open access at Springerlink. com
-tecture with collaboration for the Future Internet, this work is focused in one alternative to the TCP IP protocols, at layers 3 and 4, in one perspective to meet
-ogy in computer networks to support the communication needs in a better way Another aspect that can be placed in the context of the Future Internet is the
use of ontology in networks. In current networks, the semantic communication generally is limited to the Application layer
The use of ontology at the intermediate layers permits the Internet Applica -tion layer better inform its needs to the intermediate layers.
has semantic communication, in OWL (Web Ontology Language), with its su -perior layer and the DL-Ontology layer.
Meeting Services and Networks in the future Internet 341 of data transfer between links. The main diï erence between these two layers
is that the Net-Ontology layer is responsible to support service needs beyond simple data transfers.
These layers, compared with the TCP IP layers, are rep -resented in Fig. 1, with examples of some Future Internet works that can be
integrated with this approach at the intermediate layers Fig. 1. TCP IP and FINLAN Layers Comparison
in heterogeneous environment to the devices mobility in 4g networks handovers using the DOHAND (Domain Ontology for Handover.
for the handover in 4g networks In another application example, the FINLAN ontology can be used by the
Management and Virtualisation planes), presented in 3, to better monitor the networks, as the semantic information can directly be handled by the Net
there are some limitations for the software-driven control network infrastruc -ture, formed by the OSKMV,
protocols generally just can send information at the data ï eld and do not support
contribute to the translations of the MBT (Model-based Translator) software package, by the use of the FINLAN formal representation in OWL.
-siderations about contributions can be done at the Service, Content and User Centric approaches, when using the current TCP IP layers 3 and 4, and not
represented in OWL, the OSKMV planes and the Service, Content and User Centric works can have the beneï t to inform their needs to the Net-Ontology
Internet proposals by the separation of the internal complexities of each layer and exposing only the interfaces between them.
This work uses OWL as formal language for this communication, as the OWL was adopted by a considerable number of initiatives
One example of the FINLAN ontology use in the future Internet research area is the possibility to support the AUTOI Functional Components commu
>Meeting Services and Networks in the future Internet 343 This work shows how FINLAN can contribute with Future Internet researches
using Autoi as integration example) and it is not scope to describe the ontology foundation concepts and the implementations to enable the network communi
2 Contributions to the Future Internet Works The FINLAN project has adherence with some current eï orts in the future
Internet research area, and the representation example above shows that the on -tology cross layers can,
Attempting to the alignment with some Future Internet groups proposals, the next section extends possible collaborations that may be
a service, a content, a network element and even a cloud computing â ID: the unique identiï er of each entity
One of the Autonomic Internet project expectations is to support the needs of virtual infrastructure management to obtain self management of virtual re
-work communication used by the Autoi vcpi (Virtual Component Programming Interface) 13, allowing a localized monitoring and management of the virtual
use of the CPU memory assignment, packets lost and others. The invocation of the methods can
two network elements, like virtual routers, can interact between them through the property hasvirtuallink Collect, Dissemination and Context Information Processing:
Meeting Services and Networks in the future Internet 345 the number of interactions between the context sources and the context clients
The Autoi open source implements a scal -able and modular architecture to the deployment, control and management of
forwarding engine like a router 15 Its integration with FINLAN can act in some components, like the Diverter
the Session Broker and the Virtualisation Broker. There are many others but these are essentials. As the communication between the Autoi modules is done
-sites for an instance (memory size, storage pool size, number of virtual CPUS 346 E. Santos et al
>2. 3 Collaboration to the Complexity Reduction for {User, Service Content}- Centric Approaches This work can collaborate to reduce the complexity of the network use by the
user, service and content centric projects, as the ontology can oï er better com -prehension for the networks.
Meeting Services and Networks in the future Internet 347 In this proposal, the objects Media, Rules, Behaviour, Relations and Charac
making the {user, service, content -centric approaches simpler, as shown in the sample code below
-ers Future Internet works, continuing the examples with the Autoi integration As the Autoi project has been fulï lling its purposes,
and can not be disregarded to the future of the Internet infrastructure Autoi modules connections are performed in well deï ned form using connec
Based on the Autoi Java open source, in the ANPI demo, the ANPISDD class is prepared to use the IP and
from the ANPISDD. java code 348 E. Santos et al public class ANPISDD extends Thread {private Serversocket server
private int port=43702 private Socket s=null public static Knowledgeplane KP=null private ANPICONNECTIONHANDLER HD=null
+""s1=server. accept With the use of the FINLAN library this communication can be done replacing
layers of the networks in the future Internet, for the communication between the Service Enabler plane and the Management/Knowledge plane implemented
the needs of the data ï ow that will start. With the understanding of application
Meeting Services and Networks in the future Internet 349 is ready to be established, and the data is sent through the layers also using raw
sockets At the current stage of development the implementation of FINLAN library is made in application level.
the FINLAN ontology in Linux operating system kernel level, allowing the facil -ities in its use in diï erent programming languages,
since the methods proposed would be available at the operating system level 4 Conclusions This paper has presented the FINLAN ontology works in a collaboration per
-spective with some Future Internet projects. We have proposed to better meet -ing of services and networks by approaching services semantically to the network
structure. It was showed how to integrate FINLAN with Future Internet projects taking Autoi as example,
and how the ontological approach can be applied to Future Internet works like monitoring and content-centric Internet
Future work will implement the FINLAN ontology at the Linux kernel level and run performance and scalability experiments with diï erent Future Internet
projects open implementations. Further work also will do the extension of the scope of the ontological representation, by modeling the behavior of FINLAN to
support requirements in contribution with diï erent Future Internet projects We strongly believe that meeting services and networks through the reduction
of network layers and, consequently, through the decreasing of users, services and content complexity is a possible way to achieve ï exibility in future networks
Moreover, we expect that ontological approaches can help to build a Future Internet with its real challenges, requirements and new paradigms
Acknowledgment. This work is a result of conceptual discussions and re -searches of all members of the FINLAN group.
The authors would like to ac -knowledge the implementations and philosophical talks with this group. Also to
thank the eï orts to gather on the state-of-the-art of the Future Internet Open Access.
Monitoring Service Clouds in the future Internet. In: Towards the Future Internet-Emerging Trends from European Research, p. 115 (2010
2 FIRE: FIRE White paper (Aug. 2009), http://www. ict-fireworks. eu /fileadmin/documents/FIRE WHITE PAPER 2009 V3. 1. pdf
350 E. Santos et al 3 Galis, A.,Denazis, S.,Bassi, A.,Giacomin, P.,Berl, A a.,Fischer, o.:
-agement Architecture and Systems for Future Internet. In: Towards the Future Internet-A European Research Perspective, p. 112 (2009
4 Malva, G r.,Dias, E. C.,Oliveira, B c.,Pereira, J. H. S.,Kofuji, S. T.,Rosa, P. F
Telecommunication Technologies Symposium (2009 5 Pereira, F. S f.,Santos, E s.,Pereira, J. H. S.,Rosa, P. F.,Kofuji, S. T.:
and Telecommunication Technologies Symposium (2009 6 Pereira, F. S f.,Santos, E s.,Pereira, J. H. S.,Rosa, P. F.,Kofuji, S. T.:
Packet Delivery Proposal in a Next Generation Internet. In: IEEE International Conference on Networking and Services, p. 32 (2010
Distributed systems Ontology. In IEEE/IFIP New Technologies, Mobility and Security Conference (2009 8 Pereira, J. H. S.,Kofuji, S. T.,Rosa, P. F.:
Horizontal Address Ontology in Internet Architecture. In: IEEE/IFIP New Technologies, Mobility and Security Conference
Generation Internet. In: IEEE International Conference on Networking and Ser -vices, p. 7 (2010 10 Pereira, J. H. S.,Pereira, F. S f.,Santos, E s.,Rosa, P. F.,Kofuji, S. T.:
Address by Title in the Internet Architecture. In: 8th International Information and Telecommunication Technologies Symposium (2009
11 Pereira, J. H. S.,Santos, E s.,Pereira, F. S f.,Rosa, P. F.,Kofuji, S. T.:
Design for Future Internet Service Infrastructures. In: Towards the Future Internet-A European Research Perspective, p. 227 (2009
13 Rubio-Loyola, J.,Astorga, A.,Serrat, J.,Chai, W. K.,Mamatas, L.,Galis, A
Platforms and Software systems for an Autonomic Internet. In: IEEE Global Communications Conference (2010 14 Rubio-Loyola, J.,Astorga, A.,Serrat, J.,Lefevre, L.,Cheniour, A.,Muldowney
D.,Davy, S.,Galis, A.,Mamatas, L.,Clayman, S.,Macedo, D.,et al.:Manageabil -ity of Future Internet Virtual Networks from a Practical Viewpoint.
In: Towards the Future Internet-Emerging Trends from European Research, p. 105 (2010 15 Rubio-Loyola, J.,Serrat, J.,Astorga, A.,Chai, W. K.,Galis, A.,Clayman, S
Mamatas, L.,Abid, M.,Koumoutsos, G.:et al.:Autonomic Internet Framework Deliverable D6. 3. Final Results of the Autonomici Approach.
Autoi Project (2010 16 Santos, E s.,Pereira, F. S f.,Pereira, J. H. S.,Rosa, P. F.,Kofuji, S. T.:
Integracâ¸aëoeo de Servicâ¸os em Ambientes Heterogeë neos: uso de Semaë ntica para Comunicacâ¸aëoeo Entre Entidades em Mudancâ¸as de Contexto.
Towards a Content-Centric Internet. In: Towards the Future Internet -Emerging Trends from European Research, p. 227 (2010
J. Domingue et al. Eds.):) Future Internet Assembly, LNCS 6656, pp. 351â 364,2011 Â The Author (s). This article is published with open access at Springerlink. com
Fostering a Relationship between Linked Data and the Internet of Services John Domingue1, Carlos Pedrinaci1, Maria Maleshkova1, Barry Norton2, and
Reto Krummenacher3 1 Knowledge Media Institute, The Open university, Walton Hall, Milton Keynes MK6 7aa UK
{j. b. domingue, c. pedrinaci, m. maleshkova}@ open. ac. uk 2 Karlsruhe Institute of technology, Karlsruhe, Germany
We outline a relationship between Linked Data and the Internet of Services which we have been exploring recently.
The Internet of Services pro -vides a mechanism for combining elements of a Future Internet through stan
-dardized service interfaces at multiple levels of granularity. Linked Data is a lightweight mechanism for sharing data at web-scale which we believe can fa
-cilitate the management and use of service-based components within global networks Keywords: Linked Data, Internet of Services, Linked Services
1 Introduction The Future Internet is a fairly recent EU initiative which aims to investigate scientific
and technical areas related to the design and creation of a new global infrastructure An overarching goal of the Future Internet is that the new platform should meet
Europeâ s economic and societal needs. The Internet of Services is seen as a core com
-ponent of the Future Internet âoethe Future Internet is polymorphic infrastructure, where the bounda -ries between silo systems are changing
and blending and where the em -phasis is on the integration, interrelationships and interworking of the
architectural elements through new service-based interfacesâ. Frederic Gittler, FIA Stockholm The Web of Data is a relatively recent effort derived from research on the Semantic
Web 1, whose main objective is to generate a Web exposing and interlinking data previously enclosed within silos.
Like the Semantic web the Web of Data aims to extend the current human-readable Web with data formally represented so that soft
-ware agents are able to process and reason with the information in an automatic and
352 J. Domingue et al flexible way. This effort, however, is based on the simplest form of semantics
RDF (S) 2, and has focused thus far on promoting the publication, sharing and link -ing of data on the Web
From a Future Internet perspective a combination of service-orientation and Linked Data provides possibilities for supporting the integration, interrelationship and inter
-working of Future Internet components in a partially automated fashion through the extensive use of machine-processable descriptions.
From an Internet of Services per -spective, Linked Data with its relatively simple formal representations and inbuilt
support for easy access and connectivity provides a set of mechanisms supporting interoperability between services.
In fact, the integration between services and Linked Data is increasingly gaining interest within industry and academia.
Examples include for instance, research on linking data from RESTFUL services by Alarcon et al. 3 work on exposing datasets behind Web APIS as Linked Data by Speiser et al. 4, and
Web APIS providing results from the Web of Data like Zemanta1 We see that there are possibilities for Linked Data to provide a common â glueâ as
services descriptions are shared amongst the different roles involved in the provision aggregation, hosting and brokering of services.
In some sense service descriptions as and interlinked with, Linked Data is complementary to SAPÂ s Unified Service De
-scription Language2 5, within their proposed Internet of Services framework3, as it provides appropriate means for exposing services and their relationships with provid
-ers, products and customers in a rich, yet simple manner which is tailored to its use at
Web scale In this paper we discuss the relationship between Linked Data and services based on our experiences in a number of projects.
Using what we have learnt thus far, at the end of the paper we propose a generalization of Linked Data and service principles
for the Future Internet 2 Linked Data The Web of Data is based upon four simple principles, known as the Linked Data
principles 6, which are 1. Use URIS (Uniform Resource Identifiers) as names for things 2. Use HTTP URIS so that people can look up those names
3. When someone looks up a URI, provide useful information, using standards RDF*,SPARQL 4. Include links to other URIS,
so that they can discover more things 1 http://developer. zemanta. com /2 http://www. internet-of-services. com/index. php?
id=288&l=0 3 http://www. internet-of-services. com/index. php? id=260&l=0
Fostering a Relationship between Linked Data and the Internet of Services 353 RDF (Resource Description Framework) is a simple data model for semantically
describing resources on the Web. Binary properties interlink terms forming a directed graph. These terms as well as the properties are described by using URIS.
Since a property can be a URI, it can again be used as a term interlinked to another property
SPARQL is a query language for RDF data which supports querying diverse data sources, with the results returned in the form of a variable-binding table, or an RDF
graph Since the Linked Data principles were outlined in 2006, there has been a large up -take impelled most notably by the Linking Open Data project4 supported by the W3c
Semantic web Education and Outreach Group As of September 2010, the coverage of the domains in the Linked Open Data
Cloud is diverse (Figure 1). The cloud now has nearly 25 billion RDF statements and
over 400 million links between data sets that cover media, geography, academia, life -sciences and government data sets
Fig. 1. Linking Open Data cloud diagram as of September 2010, by Richard Cyganiak and Anja
Jentzsch5 From a government perspective significant impetus to this followed Gordon Brownâ s announcement when he was UK Prime Minister6 on making Government data freely
available to citizens through a specific Web of Data portal7 facilitating the creation of a diverse set of citizen-friendly applications
4 http://esw. w3. org/Sweoig/Taskforces/Communityprojects/Linkingopendata 5 http://lod-cloud. net /6 http://www. silicon. com/management/public-sector/2010/03/22/gordon-brown-spends-30m
-to-plug-britain-into-semantic web-39745620 /7 http://data. gov. uk /354 J. Domingue et al
On the corporate side, the BBC has been making use of RDF descriptions for some time.
BBC Backstage8 allows developers to make use of BBC programme data avail -able as RDF.
The BBC also made use of scalable RDF repositories for the back-end of the BBC world cup website9 to facilitate âoeagile modelingâ 10.
This site was very popular during the event receiving over 2 million queries per day
Other examples of commercial interest include: the acquisition of Metaweb11 by Google to enhance search,
and the release of the Opengraph12 API by Facebook Mark Zuckerberg, Facebookâ s CEO claimed recently that Open Graph was the âoethe
most transformative thing weâ ve ever done for the Webâ 13 3 Services on the Web
Currently the world of services on the Web is marked by the formation of two main
groups of services. On the one hand, âoeclassicalâ Web services, based on WSDL and SOAP, play a major role in the interoperability within and among enterprises.
Web services provide means for the development of open distributed systems, based on decoupled components, by overcoming heterogeneity
and enabling the publishing and consuming of functionalities of existing pieces of software. In particular, WSDL is
used to provide structured descriptions for services, operations and endpoints, while SOAP is used to wrap the XML messages exchanged between the service consumer
and provider. A large number of additional specifications such as WS-Addressing WS-Messaging and WS-Security complement the stack of technologies
On the other hand, an increasing number of popular Web and Web 2. 0 applications as offered by Facebook, Google,
Flickr and Twitter offer easy-to-use, publicly avail -able Web APIS, also referred to as RESTFUL services (properly
when conforming to the REST architectural principles 7). RESTFUL services are centred around re -sources, which are interconnected by hyperlinks
and grouped into collections, whose retrieval and manipulation is enabled through a fixed set of operations commonly
implemented by using HTTP. In contrast to WSDL-based services, Web APIS build upon a light technology stack relying almost entirely on the use of URIS, for both
resource identification and interaction, and HTTP for message transmission The take up of both kinds of services is hampered,
however by the amount of manual effort required when manipulating them. Research on Semantic web services
8 has focused on providing semantic descriptions of services so that tasks such as the discovery, negotiation, composition and invocation of Web services can have a
higher level of automation. These techniques, originally targeted at WSDL services have highlighted a number of advantages
and are currently being adapted towards lighter and more scalable solutions covering Web APIS as well 8 http://backstage. bbc. co. uk
/9 http://news. bbc. co. uk/sport1/hi/football/world cup 2010/default. stm 10 http://www. bbc. co. uk/blogs/bbcinternet/2010/07/bbc world cup 2010 dynamic sem. html
11 http://www. freebase. com /12 http://developers. facebook. com/docs/opengraph 13 http://news. cnet. com/8301-13577 3-20003053-36. html
Fostering a Relationship between Linked Data and the Internet of Services 355 4 Linked Services
The advent of the Web of Data together with the rise of Web 2. 0 technologies and
social principles constitute, in our opinion, the final necessary ingredients that will ultimately lead to a widespread adoption of services on the Web.
The vision toward the next wave of services, first introduced in 9 and depicted in Figure 1,
is based on two simple notions 1. Publishing service annotations within the Web of Data, and
2. Creating services for the Web of Data, i e.,, services that process Linked Data and/or generate Linked Data
We have devoted since then significant effort to refining the vision 10 and imple -menting diverse aspects of it such as the annotation of services and the publication of
services annotations as Linked Data 11,12, as well as on wrapping, and openly exposing, existing RESTFUL services as native Linked Data producers dubbed Linked
Open Services 13,14. It is worth noting in this respect that these approaches and techniques are different means contributing to the same vision
and are not to be con -sidered by any means the only possible approaches. What is essential though is ex
-ploiting the complementarity of services and the Web of Data through their integra -tion based on the two notions highlighted above
As can be seen in Figure 2 there are three main layers that we consider. At the bot
-tom are Legacy Services which are services which may be based WSDL or Web APIS, for which we provide in essence a Linked Data-oriented view over existing
functionality exposed as services. Legacy services could in this way be invoked, either Fig. 2. Services and the Web of Data
356 J. Domingue et al by interpreting their semantic annotations (see Section 4. 1) or by invoking dedi
-cated wrappers (see Section 4. 2) and RDF information could be obtained on de -mand. In this way, data from legacy systems, state of the art Web 2. 0 sites, or sen
-sors, which do not directly conform to Linked Data principles can easily be made available as Linked Data
In the second layer Are linked Service descriptions. These are annotations describ -ing various aspects of the service which may include:
the inputs and outputs, the func -tionality, and the nonfunctional properties. Following Linked Data principles these
are given HTTP URIS, are described in terms of lightweight RDFS vocabularies, and are interlinked with existing Web vocabularies. Note that we have made already our
descriptions available in the Linked Data Cloud through iserve these are described in more detail in Section 4. 1
The final layer in Figure 2 concerns services which are able to consume RDF data
either natively or via lowering mechanisms), carry out the concrete activity they are responsible for, and return the result,
if any, in RDF as well. The invoking system could then store the result obtained or continue with the activity it is carrying out
using these newly obtained RDF triples combined with additional sources of data Such an approach, based on the ideas of semantic spaces, has been sketched for the
manipulation functionality up to highly complex processing beyond data fusion that might even have real-life side-effects.
The use of services as the core abstraction for constructing Linked Data applications is therefore more generally applicable than that
of current data integration oriented mashup solutions We expand on the second and third layers in Figure 2 in more detail below
4. 1 Implementing Linked Services with Linked Data-based Annotations One thread of our work on Linked Services is based on the use of Linked Data-based
descriptions of Linked Services allowing them to be published on the Web of Data and using these annotations for better supporting the discovery, composition and
and SA-REST for Web APIS. To cater for interoperability, MSM represents essentially the intersection of the structural parts of
Additionally, as opposed to most Semantic web services research to date, MSM supports both âoeclassicalâ WSDL Web services, as well as a procedural
view on the increasing number of Web APIS and RESTFUL services, which appear to be preferred on the Web
Fostering a Relationship between Linked Data and the Internet of Services 357 Fig. 3. Conceptual model for services used by iserve
As it can be seen in Figure 3, MSM defines Services, which have a number of Op
-erations. Operations in turn have input, output and fault Messagecontent descrip -tions. Messagecontent may be composed of mandatory or optional Messageparts
language nor does it provide any specific vocabulary that users should adopt WSMO-Lite builds upon SAWSDL by extending it with a model specifying the
to model information particular to Web APIS, such as a method to indicate the HTTP method used for the invocation
The former is based a web tool that assists users in the creation of semantic annotations of Web APIS,
which are described typically solely through an unstructured HTML Web page. SWEET14 can open any web page and directly insert annotations following the hrests/Microwsmo microformat.
It enables the completion of the following key tasks 14 http://sweet. kmi. open. ac. uk
/358 J. Domingue et al â¢Identification of service properties within the HTML documentation with the help
of hrests â¢Integrated ontology search for linking semantic information to service properties â¢Adding of semantic annotations
â¢Saving of semantically annotated HTML service description, which can be repub -lished on the Web
â¢Extraction of RDF service descriptions based on the annotated HTML Similarly, the second tool, SOWER, assists users in the annotation of WSDL services
and is based in this case on SAWSDL for adding links to semantic descriptions as well as lifting and lowering mechanisms.
During the annotation both tools make use of the Web of Data as background knowledge so as to identify
and reuse existing vocabularies. Doing so simplifies the annotation and additionally it also leads to ser
sources of Linked Data The annotation tools are connected both to iserve for one click publication. is
development on the Web and on service discovery algorithms to provide a generic semantic service registry able to support advanced discovery over both Web APIS and
WSDL services described using heterogeneous formalisms. iserve is, to the best of our knowledge, the first system to publish web service descriptions on the Web of
Data, as well as the first to provide advanced discovery over Web APIS comparable to that available for WSDL-based services.
Thanks to its simplicity, the MSM captures the essence of services in a way that can support service matchmaking and invocation
-based descriptions of Web services, with OWL-S services, and with services anno -tated according to WSMO-Lite and Microwsmo
-posed following the Linked Data principles and a range of advanced service analysis and discovery techniques are provided on top.
-cation Is linked based on Data principles, application developers can easily discover services able to process or provide certain types of data,
and other Web systems can seamlessly provide additional data about service descriptions in an incremental and
distributed manner through the use of Linked Data principles. One such example is for instance LUF (Linked User Feedback) 16,
which links service descriptions with users ratings, tags and comments about services in a separate server.
On the basis of these ratings and comments, service recommendation facilities have also been imple
-mented17 15 http://iserve. kmi. open. ac. uk /16 http://soa4all. isoco. net/luf/about
/17 http://technologies. kmi. open. ac. uk/soa4all-studio/consumption-platform/rs4all /Fostering a Relationship between Linked Data and the Internet of Services 359
In summary, the fundamental objective pursued by iserve is to provide a platform able to publish service annotations,
with services and the invocation process itself, via the generation of appropriate user interfaces. Based on the annotations the user is presented with a set of fields, which
must be completed to allow the service to execute, and these fields cover input pa -rameters as well as authentication credentials.
and Consume Linked Data In this section we consider the relationship between service interactions and Linked
Data; that is, how Linked Data can facilitate the interaction with a service and how the result can contribute to Linked Data.
In other words, this section is not about an -notating service descriptions by means of ontologies and Linked Data, but about how
services should be implemented on top of Linked Data in order to become first class citizens of the quickly growing Linking Open Data Cloud.
Note that we take a purist view of the type of services which we consider.
These services should take RDF as input and the results should be available as RDF;
i e.,, service consume Linked Data and service produce Linked Data. Although this could be considered restrictive, one
main benefit is that everything is instantaneously available in a machine-readable form Within existing work on Semantic web Services,
considerable effort is expended often in lifting from a syntactic description to a semantic representation and lowering from a
semantic entity to a syntactic form. Whereas including this information as annotations requires a particular toolset
and platform to interpret them, following Linked Data and 18 http://soa4all. isoco. net/spices/about
only required platform to interact with them is the Web (HTTP) itself As a general motivation for our case, we consider the status quo of the services of
-fered over the geonames data set, a notable and â lifelongâ member of the Linking
Open Data Cloud, which are offered primarily using JSON -and XML-encoded mes -saging. A simple example is given in Table 1,
it conveys neither the resultâ s internal semantics nor its interlinkage with existing data sets.
in Linked Data, on the other hand, geonames itself provides a predicate and values for country codes and the WGS84 vocabulary is used widely for latitude and
Linked Data sets) 20 but the string value does not convey this interlinkage A solution more in keeping with the Linked Data principles,
as seen in our version of these services, 21 uses the same languages and technologies in the implementation
â¢reusing URIS from Linked Data source for representing features in input and output messages
relationship more useful as Linked Data, the approach of Linked Data Services LIDS) 25 is to URL-encode the input.
/Fostering a Relationship between Linked Data and the Internet of Services 361 resource identifier. This URI is used then as the subject of such a triple, encoding
Linked Data and Services mailing list23, a URI representing the input is returned using the standard Content-Location HTTP header field.
whereas a user-encoded input may use variable decimal places for latitude and longi -tude.
-encoded, it can first BE POSTED as a new resource (Linked Data and Linked Data Services so far concentrate on resource retrieval and therefore primarily the HTTP
-sages using SPARQL graph patterns. While this is a design decision, it aims at the greatest familiarity and ease for Linked Data developers.
It is not without precedent in semantic service description 26. The authors of 26 use the SPARQL query lan
-guage to formulate user goals, and to define the pre-and post-conditions of SAWSDL-based service descriptions,
which to some degree, at least conceptually matches the ideas of our approach of using graph patterns for describing inputs (a pre
-though, the use of SPARQL is similar across different proposals, how the patterns are exploited again offers alternative,
On the one hand, atomic user desires can be encoded as a CONSTRUCT query and, under certain restrictions24, query processing techniques can be used to
whose results can be combined to satisfy the initial user request. On the other hand, where more sophisticated control flow is needed, a proc
defining the dataflow between services within a process, defined again as SPARQL CONSTRUCT queries. Work is ongoing on graph pattern-based discovery and proc
In this paper we have outlined how Linked Data provides a mechanism for describing services in a machine readable fashion and enables service descriptions to be seam
-lessly connected to other Linked Data. We have described also a set of principles for how services should consume
and produce Linked Data in order to become first-class Linked Data citizens From our work thus far, we see that integrating services with the Web of Data, as
depicted before, will give birth to a services ecosystem on top of Linked Data whereby developers will be able to collaboratively
and incrementally construct com -plex systems exploiting the Web of Data by reusing the results of others.
The system -atic development of complex applications over Linked Data in a sustainable, efficient and robust manner shall only be achieved through reuse.
We believe that our ap -proach is a particularly suitable abstraction to carry this out at Web scale
We also believe that Linked Data principles and our extensions can be generalized to the Internet of Services.
That is, to scenarios where services sit within a generic Internet platform rather than on the Web.
These principles are Global unique naming and addressing scheme-services and resources con -sumed and produced by services should be subject to a global unique naming and
addressing scheme. This addressing scheme should be easily resolvable such that software clients are able to access easily underlying descriptions
Linking â linking between descriptions should be supported to facilitate the reuse of descriptions and to be able to specify relationships
Service abstraction â building from SOA principles functionality should be en -capsulated within services which should have a distinct endpoint available on the
Internet, through which they can be invoked using standard protocols Machine processability â the descriptions of the services and resources should be
Following from the above we believe that the Future Internet will benefit greatly from a coherent approach which integrates service orientation with the principles
underlying Linked Data. We are also hopeful that our approach provides a viable starting point for this.
the Future Internet work and also note that proposals already exist for integrating Linked Data at the network level25
Acknowledgements. This work was funded partly by the EU project SOA4ALL (FP7 -215219) 26. The authors would like to thank the members of the SOA4ALL project and
/Fostering a Relationship between Linked Data and the Internet of Services 363 Open Access. This article is distributed under the terms of the Creative Commons Attribution
The Semantic web. Scientific American 284 (5 34â 43 (2001 2. Brickley, D.,Guha, D.,,R. V. eds.:
Linking Data from RESTFUL Services. In: Workshop on Linked Data on the Web at WWW 2010 (2010
4. Speiser, S.,Harth, A.:Taking the LIDS off Data Silos. In: 6th International Conference on
Semantic Systems (I-SEMANTICS)( October 2010 5. Cardoso, J.,Barros, A.,May, N.,Kylau, U.:
Towards a Unified Service Description Lan -guage for the Internet of Services: Requirements and First Developments.
In: IEEE Intâ l Conference on Services Computing, July 2010, pp. 602â 609 (2010 6. Berners-Lee, T.:
Linked Data-Design Issues (July 2006), http://www. w3. org /Designissues/Linkeddata. html 7. Fielding, R. T.:
Architectural styles and the Design of Network-based Software Architec -tures. Phd Thesis, University of California (2000
8. Mcilraith, S. A.,Son, T. C.,Zeng, H.:Semantic web Services. IEEE Intelligent Sys -tems 16 (2), 46â 53 (2001
9. Pedrinaci, C.,Domingue, J.,Krummenacher, R.:Services and the Web of Data: An Unex
-ploited Symbiosis. In: AAAI Spring Symposium âoelinked Data Meets Artificial Intelli -genceâ, March 2010, AAAI Press, Menlo Park (2010
10. Pedrinaci, C.,Domingue, J.:Toward The next Wave of Services: Linked Services for the Web of Data.
Journal of Universal Computer science 16 (13), 1694â 1719 (2010 11. Maleshkova, M.,Pedrinaci, C.,Domingue, J.:
Supporting the creation of semantic REST -ful service descriptions. In: Workshop: Service Matchmaking and Resource Retrieval in
the Semantic web at ISWC (November 2009 12. Pedrinaci, C.,Liu, D.,Maleshkova, M.,Lambert, D.,Kopecky, J.,Domingue, J.:
iserve: a Linked Services Publishing Platform. In: Workshop: Ontology Repositories and Editors for the Semantic web at ESWC (June 2010
13. Krummenacher, R.,Norton, B.,Marte, A.:Towards Linked Open Services and Processes In: Future Internet Symposium, October 2010, pp. 68â 77
14. Norton, B.,Krummenacher, R.:Consuming Dynamic Linked Data. In: 1st International Workshop on Consuming Linked Data (November 2010
15. Benslimane, D.,Dustdar, S.,Sheth, A.:Services Mashups: The New Generation of Web Applications.
IEEE Internet Computing 12 (5), 13â 15 (2008 16. Phuoc, D. L.,Polleres, A.,Hauswirth, M.,Tummarello, G.,Morbidoni, C.:
Rapid Prototyp -ing of Semantic Mash-ups Through Semantic web Pipes. In: 18th Intâ l Conference on
World wide web, April 2009, pp. 581â 590 (2009 17. Maleshkova, M.,Kopecky, J.,Pedrinaci, C.:Adapting SAWSDL for Semantic Annota
-tions of RESTFUL Services. In: Workshop: Beyond SAWSDL at OTM, November 2009 pp. 917â 926 (2009
An HTML Microformat for Describing RESTFUL Web Services. In: IEEE/WIC/ACM Intâ l Conference on Web Intelligence and In
-telligent Agent Technology, December 2008, pp. 619â 625 (2008 19. Vitvar, T.,Kopeckã, J.,Viskova, J.,Fensel, D.:
WSMO-lite annotations for web services In: Bechhofer, S.,Hauswirth, M.,Hoffmann, J.,Koubarakis, M. eds.
ESWC 2008 LNCS, vol. 5021, pp. 674â 689. Springer, Heidelberg (2008 20. Martin, D.,Burstein, M.,Hobbs, J.,Lassila, O.,Mcdermott, D.,Mcilraith, S.,Narayanan
Semantic Markup for Web Services. Technical Report, Member Submission, W3c (2004 21. Fensel, D.,Lausen, H.,Polleres, A.,de Bruijn, J.,Stollberg, M.,Roman, D.,Domingue, J
Enabling Semantic web Services-The Web Service Modeling Ontology. Springer, Hei -delberg (2006 22. Farrell, J.,Lausen, H.:
Extended Semantic web Conference Posters (June 2010 25. Speiser, S.,Harth, A.:Towards Linked Data Services.
In: Intâ l Semantic web Conference Posters and Demonstrations (November 2010 26. Iqbal, K.,Sbodio, M. L.,Peristeras, V.,Giuliani, G.:
Semantic Service Discovery using SAWSDL and SPARQL. In: 4th Intâ l Conference on Semantics, Knowledge and Grid, De
-cember 2008, pp. 205â 212 (2008 Part VII Future Internet Areas: Content Part VII: Future Internet Areas:
Content 367 Introduction One of the major enablers for the evolution to the Future Internet will be the huge
volumes of multimedia content. The new, powerful, low-cost and user friendly cap -turing devices (e g. mobile phones, digital cameras, IP networked cameras) supported
by new multimedia authoring tools will significantly increase the user generated con -tent. On the other hand, new media sensor networks and tele-immersion applications
will further increase the use of automatic generated content. As a result, the Internet as we know it today will be challenged
and a r) evolution towards Media Internet will be initiated The Media Internet is defined as the Future Internet variation which supports pro
-fessional and novice content producers and is at the crossroads of digital multimedia content and Internet technologies.
It encompasses two main aspects: Media being delivered through Internet networking technologies (including hybrid technologies
and Media being generated, consumed, shared and experienced on the Web The Media Internet is evolving to support novel user experiences such as immer
-sive environments including sensorial experiences beyond video and audio (engaging all the human senses including smell,
taste and haptics) that are adaptable to the user the networks and the provisioned services
The objective of this section is to offer different views on the processes, techniques and technologies which may pave the way for a Future Media Internet
First of all, the Future Media Internet should be based on network architectures that can deal with content as a native type,
and for this reason the content oriented net -work architectures for multimedia content delivery will produce a major revolution in
the way that content is processed and delivered though the Internet. One particular case concerns content distributed through hybrid and heterogeneous network architec
-tures, e g. hybrid broadcast and Internet delivery enhancing the immersive experience of the user beyond the classical DIGITAL TV interactivity
Second, enhancing media encoding technologies is required for the Internet with the objective to maintain the overall integrity,
and adapt the content to the network delivery device and user, and also optimize the quality of experience over the Internet
Third, one of the areas where high investment in research has taken place in recent years is related to the multimedia and multimodal search and retrieval of multimedia
objects over the Internet Last but not least, collaborative platforms for the experimentation of socially aug -mented and mixed reality applications are needed to produce advanced applications
for the users, and social media including personalization and recommendation, is one of the key orientations of future media technologies.
An increasingly large amount of content on the Web, whether multimedia or text is generated collaboratively user
content, of which the quality is not always controllable In relation to the first point, content oriented network architectures, the paper âoeme
-dia Ecosystems: A Novel Approach for Content-Awareness in Future Networksâ describes a novel architecture for the deployment of a networked âoemedia Ecosystemâ
based on a flexible cooperation between providers, operators, and end-users, finally enabling every user â first â to access the offered multimedia services in various con
-368 Part VII: Future Internet Areas: Content texts, and â second â to share and deliver his/her own audiovisual content dynami
-cally, seamlessly, and transparently to other users. The architecture also relies on autonomous systems to supply users with the necessary infrastructure and a security
framework Concerning the second point, media encoding technologies for the Internet, the ob -jective of the chapter âoescalable and Adaptable Media Coding Techniques for Future
Internetâ discusses SVC (Scalable Video Coding) and MDC (Multiple Description Coding) techniques along with the real experience of the authors of SVC/MDC over
P2p networks and emphasizes their pertinence in Future Media Internet initiatives in order to decipher potential challenges
For the third point, multimodal and multimedia search and retrieval in the future Internet, the chapter âoesemantic Context Inference in Multimedia Searchâ reviews the
latest advances in semantic context inference, in which systems exploit the semantic context embedded in multimedia content and its surroundings in order to build a contex
-tual representation scheme. The authors introduce their ideas on how to enable systems to automatically construct semantic context by learning from the available content
Federico Alvarez, Theodore Zahariadis, Petros Daras, and Henning MÃ ller J. Domingue et al. Eds.):) Future Internet Assembly, LNCS 6656, pp. 369â 380,2011
 The Author (s). This article is published with open access at Springerlink. com Media Ecosystems:
A Novel Approach for Content -Awareness in Future Networks H. Koumaras1, D. Negru1, E. Borcoci2, V. Koumaras5, C. Troulos5, Y. Lapid7
E. Pallis8, M. Sidibã 6, A. Pinto9, G. Gardikis3, G. Xilouris3, and C. Timmerer4 1 CNRS Labri laboratory, University of Bordeaux, France
koumaras@ieee. org, daniel. negru@labri. fr 2 Telecommunication Dept.,University Politehnica of Bucharest (UPB), Romania
eugen. borcoci@elcom. pub. ro 3 Institute of Informatics and Telecommunications, NCSR Demokritos, Greece {gardikis, xilouris}@ iit. demokritos. gr
4 Multimedia Communication, Klagenfurt University, Austria christian. timmerer@itec. uni-klu. ac. at 5 PCN, Greece
vkoumaras@pcngreece. com, ktroulos@pcngreece. com 6 VIOTECH Communications, France msidibe@viotech. net 7 Optibase Technologies Ltd, Israel
Yaell@optibase. com 8 Applied Informatics and Multimedia Dept.,TEI of Crete, Greece pallis@pasiphae. teiher. gr
9 INESC Porto, Portugal apinto@inescporto. pt Abstract. This chapter proposes a novel concept towards the deployment of a
networked â Media Ecosystemâ. The proposed solution is based on a flexible co -operation between providers, operators,
and end-users, finally enabling every user first to access the offered multimedia services in various contexts, and second
to share and deliver his own audiovisual content dynamically, seamlessly, and transparently to other users.
Towards this goal, the proposed concept provides content-awareness to the network environment, network-and user context
-awareness to the service environment, and adapted services/content to the end user for his best service experience possible,
taking the role of a consumer and/or producer Keywords: Future Internet, Multimedia Distribution, Content Awareness, Net
-work Awareness, Content/Service Adaptation, Quality of Experience, Quality of Services, Service Composition, Content-Aware Network
1 Introduction One of the objectives of the future communication networks is the provision of audio
The end user (EU) is interested ultimately in getting a 370 H. Koumaras et al good Quality of Experience (Qoe) at convenient prices.
and react to the Qoe level at user ter -minals, offer to the EU a wide range of potential choices,
and provision of very high-volume video data â¢Second, the development of advanced networking technologies in the access and
core parts, with Qos assurance is seen. A flexible way of usage â based on virtual -ised overlays â can offer a strong support for the transportation of multimedia
flows â¢Third, the todaysâ software technologies support the creation and composition of services while being able to take into account information regarding the trans
-port/terminal contexts and adapt the services accordingly Bringing together in a synergic way all the above factors, a new âoemedia Ecosystemâ
-work neutrality has been the foundational principle of the Internet, albeit today is revisited by service providers,
-ity provision and profit, to allow sustainable new forms of multimedia communica -tions with an increasing importance in the future Internet
This suggests that the emerging approach of Content-Aware Networks (CAN) and Network-Aware services/Applications (NAA) can be a way to overcome the tradi
nodes, can be a foundation for an user-centric approach (i e. satisfying the different Media Ecosystems:
needs of individual users) or service-centric approach (i e. satisfying the different needs of various service types), that is required for the future services and applica
Based on virtualization, the network can offer enhanced transport and adaptation-capable services This chapter will introduce
finally provide the end user with the best and most complete service experience via a Media Ecosystem, aiming to provide content-awareness to the network environment
network-and user context-awareness to the service environment, and adapted ser -vices/content to the end userâ s Environment
which the Future Internet development should follow. Among other issues, a higher coupling between application and network layers are investigated,
performance (for multimedia) but without losing modularity of the architecture. 3 -11. The CAN/NAA approach can naturally lead to a user-centric infrastructure and
telecommunication services as described in 3. The strong orientation of user-centric awareness to services and content is emphasized in 4. The works 5-6 consider that
CAN/NAA can offer a way for evolution of networks beyond IP, while Qoe issues
The virtualisation as a powerful tool to overcome the Internet ossification by creating overlays is discussed in 10-11.
â¢User Environment (UE), to which the end users belong â¢Service Environment (SE), to which the service and content providers belong
The User Environment (UE) includes all functions related to the discovery, sub -scription, consumption of the services by the EUS. At the Service Environment (SE
User and service mobility is targeted also Below the SE there is a new Home-Box (HB) layer to coordinate the actual content
users with advanced context-aware multimedia services in a consistent and interoper -able way. It enables uniform access for heterogeneous terminals and supports en
At the HB layer, the advanced user context management and monitoring functions provides real-time information on user context
and network conditions, allowing better control over multimedia delivery and intelli -gent adaptation. The assembly of HBS is called layer
because the HBS can logically communicate with each other in both client server style but also in peer-to-peer (P2p
single or multiple core network domains having content aware processing capabilities in terms of Qos, monitoring, media flow adaptation, routing/forwarding and security
-enabled routers, which together with the associated managers and the other elements of the ecosystem, offer content-and context-aware Quality of Service/Experience, adapta
user preferences, terminal capabilities Media Ecosystems: A Novel Approach for Content-Awareness in Future Networks 373
dedicated user profile management and/or monitoring entities/subsystems The adaptation deployed at the CAN layer will be performed in the Media-Aware
, service, content, network) to consumers/end users At the border to the user, i e.,, the Home-Box, adaptation modules are deployed
enabling device-independent access to the SVC-encoded content by providing X-to -SVC and SVC-to-X transcoding functions with X={MPEG-2, MPEG-4 Visual
, no duplicates), making it free for (other) data (e g.,, more enhance -ment layers The key innovations of this approach to service/content adaptation are â distrib
This is responsible for the actual routers configuration in its own network, based on cooperation with the CAN Manager
and Data Planes (MPL, CPL, DPL), parallel and cooperating (not represented explicitly in the picture.
The upper data plane interfaces at the CAN layer and transport the packets between the VCAN layer and the Home-Box layer in both directions.
radical approach can also be envisaged towards full virtualization (i e. independent management and control per VCAN
The media data flows, are classified intelligently at ingress MANES, and associated to the appropriate VCANS in order to be processed accordingly based on:(
Figure 2 depicts an example to illustrate the principle of Internet parallelization based on VCANS, with focus on the classification process performed at ingress
-structed how to classify the data packets, based on information as: VCAN IDS, Con -tent description metadata, headers to analyse, Qos class information, policies, PHB â
At its turn, the SM@SP instructs the SP/CP servers how to mark the data packets
The data packets are analysed by the classifier, assigned and forwarded to one of the VCANS for further processing.
Special algorithms are needed to reduce the amount of processing of MANE in the data plane based on deep analysis of the first packets of a
flow and usage of hashing functions thereafter AS2 AS1 AN HB SP/CP server AS3
VCAN1/MQC1 VCAN2/MQC2 VCAN3/MQC3 L2, L3, L4 headers High level headers VCAN ID Content description
avoiding per-flow signalling in the core part of the network. In the new architecture MANE also can act as content âoecachesâ,
1) data confiden -tiality, integrity and authenticity; and 2) intelligent and distributed access control policy-based enforcement
The evaluation algorithm considers the user flow characteristics CAN policies and present network conditions. In order to attain the required flexibil
7 on top of the MANES routers The second objective will pursue a content-aware approach that will be enforced
by MANE routers over data in motion. Such security enforcement will be done ac -cordingly to policies and filtering rules obtained from the CANMGR.
MANE routers will derive filtering rules from packet inspection and will inform the CANMGR about those
inspection of data traversing a security element placed in a specific point in the net
The proposed approach differs by being based on MANE routers, which will be used to construct CANS
multimedia services (e g.,, IPTV) in different modes (e g. P2p Content is offered to the CCS or SPS through quality guarantee schemes such as
-tween CPS and NPS for hosting or co-locating CPÂ s content servers in NPSÂ premises
and ensuring a satisfactory level of Qos for the end users (by appropriating resources to network upgrades etc.
User context is taken not into consideration by the Service or Content Provider (SP/CP) delivering the service (content),
and therefore they are not able to deliver and adapt the service (content) to the capabilities of the end user equip
-ment. Also, current architectures do not include any information exchange between the network and service layers,
Also, users may influence service delivery options by requesting specific content on specific priority conditions for a specific period of time (context-awareness
On the user side, it increases choice and reduces switching costs between content providers (network
) In addition, the end user, as a key business actor, can effectively increase the level of choice in content and services by selecting,
Eventually the end user will have a choice of service access methods: anywhere, any -time and in any context with the appropriate awareness degree 1
user privacy is a major concern since it directly relates to the consolidation of infor -mation sources where user preferences and habits may be retrieved
and exploited by third parties 5 Conclusions This chapter has presented a novel Media-Ecosystem architecture, which introduces
A Novel Architecture for Multimedia Distribution based on Content-Aware Networking. In: CTRQ 2010 Conference Proceedings (2010
User-Centric Future Internet and Telecommunication Services. In: Tselentis G.,et al. eds.)) Towards the Future Internet, pp. 217â 226.
IOS Press, Amsterdam (2009 4. Schã nwã¤lder, J.,et al.:Future Internet=Content+Services+Management.
IEEE Com -munications Magazine 47 (7), 27â 33 (2009 5. Zahariadis, T.,et al.:Content Adaptation Issues in the future Internet.
In: Tselentis, G.,et al. (eds. Towards the Future Internet, pp. 283â 292. IOS Press, Amsterdam (2009
6. Huszã¡k, Ã.,Imre, S.:Content-aware Interface Selection Method for Multi-Path Video
Streaming in Best-effort Networks. In: Proc. of 16th International Conference on Tele -communications, Marrakech, Morocco, Jul. 2009, pp. 196â 201 (2009
7. Liberal, F.,et al.:Qoe and*-awareness in the future Internet. In: Tselentis, G.,et al. eds Towards the Future Internet, pp. 293â 302.
IOS Press, Amsterdam (2009 8. Martini, M. G.,et al.:Content Adaptive Network Aware Joint Optimization of Wireless
Video Transmission. IEEE Communications Magazine 45 (1), 84â 90 (2007 9. Baker, N.:Context-Aware Systems and Implications for Future Internet.
In: Tselentis, G et al. eds.)) Towards the Future Internet, pp. 335â 344. IOS Press, Amsterdam (2009
10. Anderson, T.,et al.:Overcoming the Internet Impasse through Virtualization. Com -puter 38 (4), 34â 41 (2005
11. Chowdhury, N m.,Boutaba, R.:Network Virtualization: State of the art and Research Challenges. IEEE Communications Magazine 47 (7), 20â 26 (2009
12. Levis, P.,et al.:The Meta-Qos-Class Concept: a Step Towards Global Qos Interdomain
Services. Proc. IEEE, Softcom, Oct. 2004 (2004 13. Paris Flegkas, et al. Provisioning for Interdomain Quality of Service:
the MESCAL Ap -proach. IEEE Communications Magazine (June 2005 14. Timmerer, C.,et al.:Scalable Video Coding in Content-Aware Networks:
Research Chal -lenges and Open Issues. In: Proc. International Tyrrhenian Workshop on Digital Commu -nications (ITWDC), Ponza, Italy (September 2010
) Future Internet Assembly, LNCS 6656, pp. 381â 389,2011 Â The Author (s). This article is published with open access at Springerlink. com
Future Internet Naeem Ramzan and Ebroul Izquierdo School of Electronic Engineering and Computer science, Queen Mary University of London
Mile end, London E1 4ns, United kingdom {Naeem. Ramzan, Ebroul. Izquierdo}@ elec. qmul. ac. uk Abstract.
High quality multimedia contents can distribute in a flexible, effi -cient and personalized way through dynamic and heterogeneous environments
in Future Internet. Scalable Video Coding (SVC) and Multiple Description Coding (MDC) fulfill these objective thorough P2p distribution techniques
pertinence in Future Media Internet initiatives in order to decipher potential challenges Keywords: Scalable video coding, multiple description coding, P2p distribution
Future Media Internet will entail to distribute and dispense high quality multimedia contents in an efficient, supple and personalized way through dynamic and heteroge
-neous environments. Multimedia content over internet are becoming a well-liked application due to users'growing demand of multimedia content and extraordinary
growth of network technologies. A broad assortment of such applications can be found in these days, e g. as video streaming, video conferencing, surveillance, broad
-cast, e-learning and storage. In particular for video streaming, over the Internet are becoming popular due to the widespread deployment of broadband access.
In custom -ary video streaming techniques the client-server model and the usage of Content Dis
to support media streaming over internet. However, the conventional client server architecture severely limits the number of simultaneous users for bandwidth intensive
video streaming, due to a bandwidth bottleneck at the server side from which all users request the content.
In contrast, Peer-to-peer (P2p) media streaming protocols, moti -vated by the great success of file sharing applications, have attracted a lot of interest
in academic and industrial environments. With respect to conventional approaches, a major advantage in using P2p is that each peer involved in a content delivery contrib
-taneously to different users according to their capabilities and limitations In order to handle such obscurity, scalability emerged in the field of video coding
user adaptation without using intricate error protection methods. The objective of MDC is to generate numerous independent descriptions that can bestow to one or
which is common in best-effort networks such as the Internet, will not interrupt the reproduction of the stream
MDC combined with path/server diversity offers robust video delivery over unreliable networks and/or in peer-to-peer
The eventual objective of employing SVC/MDC in Future Internet is to maximize the end-users'quality of experience (Qoe) for the delivered multimedia content by
selecting an appropriate combination of the temporal, spatial and quality parameters for each client according to the limitation of network and end user devices
This chapter starts with an overview of SVC and MDC source coding techniques in section 2 and 3. Section 4 describes how to adapt SVC for P2p distribution for Future
Internet. MDC over P2p is explained in section 5. Finally, this chapter concludes in section 6
Scalable and Adaptable Media Coding Techniques for Future Internet 383 wavelet 1 and hybrid video coding 2 techniques.
i e. number of pixels per spatial region in a video frame â¢Quality scalability, or commonly called SNR (Signal-to-noise-Ratio) scalability
pixels from the compressed bit-stream Fig. 1. A typical scalable video coding chain and types of scalabilities by going to lower-rate
distinctive types of data: wavelet coefficients representing of the texture information remaining after the wavelet transform
Finally, the resulting data are mapped into the scalable stream in the Scalable and Adaptable Media Coding Techniques for Future Internet 385
bit-stream organisation module, which creates a layered representation of the com -pressed data. This layered representation provides the basis for low-complexity adap
-tation of the compressed bit-steam 3 Scalable Multiple Description Coding (SMDC SMDC is a source coding technique,
-proaches for generating multiple descriptions include data partitioning (e g.,, even/odd sample or DCT coefficient splitting) 5, multiple description (MD) quantization
-ferent users, as shown in Figure 2 Fig. 2. An example of the proposed system for scalable video coding in P2p network
The proposed solution is a variation of the"Give-To-Get"algorithm 8, already im
Scalable and Adaptable Media Coding Techniques for Future Internet 387 already been downloaded. In the latter case, the piece picking policy will be the same
even if the overall download bandwidth is high This problem is critical if the requested piece belongs to the base layer,
download rates, which alone could provide the current peer with a transfer rate that is above a certain threshold.
However, every time the window shifts, the current download rates of all the neighbours are evaluated and the peers are sorted in descending order
/s) Video Download Rate Received Video Bitrate Fig. 4. Received download rate and received video bitrate for Crew CIF sequence
388 N. Ramzan and E. Izquierdo 5 Multiple Description Coding over P2p Network Most of the work on MDC is proposed for wireless applications in which there are
issues such as hand over of a client to another wireless source is present. However, in IP networks, it may be complicated more to have autonomous links among peers
Thus, additional redundancy introduced by using MDC over internet need to be care -fully evaluated
Scalable and Adaptable Media Coding Techniques for Future Internet 389 MDC over SVC is that the receiver/client can make a reproduction of the video when
content distribution over Future Internet. These coding schemes provide natural ro -bustness and scalability to media streaming over heterogeneous networks.
Internet challenges. Tangibly, SVC/MDC over P2p presumes an excellent approach to facilitate future media applications and services,
Quality of Experience (Qoe) of the users. At last, we persuade Future Internet initia -tives to take into contemplation these techniques when defining new protocols for
ground-breaking services and applications Acknowledgement. This research has been funded partially by the European Com -mission under contract FP7-248474 SARACEN
-dence of software proposal for Wavelet Video Coding Exploration group, ISO/IEC JTC1/SC29/WG11/MPEG2006/M13146, 76th MPEG Meeting, Montreux, Switzerland
Multimedia Search Qianni Zhang and Ebroul Izquierdo School of Electronic Engineering and Computer science Queen Mary University of London, UK
{qianni. zhang, ebroul. izquierdo}@ elec. qmul. ac. uk Abstract. Multimedia content is usually complex and may contain
many semantically meaningful elements interrelated to each other. There -fore to understand the high-level semantic meanings of the content, such
context can be constructed by learning from data. In the target represen -tation scheme, metadata is divided into three levels:
built using from a small amount of training data. Semantic inference and reasoning is performed then based on the model to decide the relevance
Multimedia retrieval, context inference, mid-level features Bayesian network 1 Introduction In realistic multimedia search scenarios, high-level queries are used usually and
search engines are expected to be able to understand underlying semantics in content and match it to the query.
Researchers have started naturally thinking of exploiting context for retrieving semantics. Content is usually complex and
In latest content-based multimedia retrieval approaches, it is often pro -posed to build some forms of contextual representation schemes for exploiting
the semantic context embedded in multimedia content. Such techniques form a key approach to supporting eï cient multimedia content management and search
in the Internet. In the literature, such approaches usually incorporates domain knowledge to assist deï nition of the context representation.
However, this kind J. Domingue et al. Eds.):) Future Internet Assembly, LNCS 6656, pp. 391â 400,2011
câ The Author (s). This article is published with open access at Springerlink. com 392 Q. Zhang and E. Izquierdo
which could be online databases, a representation scheme for its semantic context is learned directly from data
and will not be restricted to the pre-deï ned semantic structures in speciï c application domains
-data extracted from multimedia content into three levels-low, mid and high -according to their levels of semantic abstraction and try to deï ne the mapping
fully understandable by users; while high-level features contains a high degree of semantic reasoning about the meaning or purpose of the content itself.
-tively easy to solve using the well-deï ned algorithms in the state-of-the-art, the mapping between mid-and high-level features are still diï cult.
amount of training data. Semantic inference and reasoning is carried then out based on the learned model to decide
and are extracted using algorithms with reasonable per -formance The rest of this chapter is organised as follows:
state-of-the-art techniques on context reasoning for multimedia retrieval task Section 3 describes the three representation levels of multimedia content and
the implemented mid-level features; Section 4 presents the proposed technique Semantic Context Inference in Multimedia Search 393
for semantic context learning and inference for mid-level to high-level matching Section 5 shows selected experimental results and the chapter is concluded with
to storing and enforcing high-level information include neural networks, expert systems, statistical association, conditional probability distributions, diï erent
function which denotes the presence of a multimedia object is called a multiject The interaction between the multijects is modelled then using a Bayesian net
3 Three-Level Multimedia Representation The aim of multimedia retrieval techniques is to elicit, store and retrieve the
audio-and imagery-based information content in multimedia. Taking images as an example of various digital multimedia content types, the search for a
desired image from a repository might involve many image attributes including a particular combination of colour, texture or shape features, a speciï c type of
object; a particular type of event or scene; named individuals, locations or events subjectively associated emotions;
According to these attributes, the types of query in a multimedia retrieval scenario can be categorised into three levels of increasing complexity
-ios as semantic image retrieval. However, the semantic gap lying between levels 1 and 2 hampers the progress of multimedia retrieval area 19.
The semantic gap is commonly deï ned as âoethe discrepancy between low-level features or con
algorithms, and the richness, and subjectivity of semantics in high-level human interpretations of audiovisual mediaâ.
the most challenging task in semantic multimedia retrieval. Thus in this paper by dividing this task into two steps:
Semantic Context Inference in Multimedia Search 395 Figure 1 shows the work ï ow of this approach.
A subset of the database randomly selected for training purpose is annotated then manually on the high-level query
constructed automatically using a learning approach based on K2 algorithm 8 which is basically a greedy search technique.
algorithm, a Bayesian network is created by starting with an empty network and iteratively adding a directed arc to a given node from each parent node
the data. Due to the scope of this paper, we give only a brief introduction to K2
algorithm here. If the reader is interested in more details about this algorithm please refer to 8
Then in the inference stage, when an un-annotated data item is present, the Bayesian network model derived from the training stage conducts automatic
semantic inferences for the high-level query. The Bayesian network in this case represent the semantic context involving the mid-level features of this video and
exists in a piece of multimedia content considering the semantic context can be calculated as
The experiments were carried out on the good sized unedited video database Videos were segmented into shots
Semantic Context Inference in Multimedia Search 397 multimedia element for analysis and annotation. Several mid-level features were
selected by observing the content and they belong to Level 2 of the three-level representation scheme as described in Section 3. These mid-level features include
those commonly exist in the database with reasonable proportions and have relatively rich connections to the mid-level features:
took only a few seconds on a PC with Pentium D CPU 3. 40ghz and 2. 00gb of
Semantic Context Inference in Multimedia Search 399 between low-level visual features and high-level semantic terms.
out using the K2 algorithm. The proposed approach was tested on a large size video dataset. The obtained results have shown that this approach was capable
database Acknowledgments. The research that leads to this chapter was partially sup -ported by the European commission under the contracts FP6-045189 RUSHES
Beyond pixels: Exploiting camera metadata for photo classi -ï cation. Pattern recognition 38 (6), 935â 946 (2005
-ceedings of the eighth ACM international conference on Multimedia, pp. 167â 176 2000 3. Brand, M.,Oliver, N.,Pentland, A.:
IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pp. 994â 999 (1997 4. Chang, E.,Goh, K.,Sychay, G.,Wu, G.:
Generating semantic visual templates for video databases In: 2000 IEEE International Conference on Multimedia and Expo, 2000.
ICME 2000, vol. 3 (2000 6. De Jong, F. M. G.,Westerveld, T.,De vries, A p.:
Multimedia search without visual analysis: the value of linguistic and contextual information. IEEE Transactions on
Tech. rep.,Institute for Image Data Re -search, University of Northumbria at Newcastle (1999), http://www. jisc. ac. uk
networks from data. Machine learning 9 (4), 309â 347 (1992 400 Q. Zhang and E. Izquierdo
9. Fan, J.,Gao, Y.,Luo, H.,Jain, R.:Mining multilevel image semantics via hierar
IEEE Transactions on Multimedia 10 (2), 167â 187 (2008 10. Fei-Fei, L.,Fergus, R.,Perona, P.:
IEEE Computer Society Conference on Computer Vi -sion and Pattern Recognition, vol. 2 (2003 12.
IEEE Computer Society Con -ference on Computer Vision and Pattern Recognition, vol. 2 (2004 13.
Kherï, M. L.,Ziou, D.:Image collection organization and its application to in -dexing, browsing, summarization,
multimedia 9 (4), 893â 900 (2007 14. Koskela, M.,Smeaton, A f.,Laaksonen, J.:Measuring concept similarities in multi
IEEE Transactions on Multimedia 9 (5 912â 922 (2007 15. Lavrenko, V.,Feng, S.,Manmatha, R.:
Signal Processing ICASSPÂ 04, vol. 3, IEEE Computer Society Press, Los Alamitos 2004 16. Naphade, M. R.,Huang, T s.:
IEEE Transactions on Multimedia 3 (1), 141â 151 2001 17. Naphade, M. R.,Huang, T s.:
ï nal frontier in multimedia retrieval. IEEE Transactions on Neural networks 13 (4 793â 810 (2002
18. Qian, R.,Haering, N.,Sezan, I.:A computational approach to semantic event detection. In:
Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, vol. 1, pp. 200â 206 (1999
and machine intelligence 22 (12), 1349â 1380 (2000 20. Vailaya, A.,Figueiredo, M. A t.,Jain, A k.,Zhang, H. J.:
IEEE Transactions on Image processing 10 (1), 117â 130 2001 21. Zhu, X.,Wu, X.,Elmagarmid, A k.,Feng, Z.,Wu, L.:
Video data mining: Semantic indexing and event detection from the association perspective. IEEE Transactions on Knowledge and Data engineering, 665â 677 (2005
Part VIII Future Internet Applications Part VIII: Future Internet Applications 403 Introduction The Future Internet is grounded in the technological infrastructure for advanced net
-works and applications. It constitutes a complex and dynamic system and societal phenomenon; it comprises the processes of innovation,
shaping and the actual use of these technologies and infrastructures in private and public organisations, in different
sectors of the economy including the service sectors, and in social networks. Research on the Future Internet therefore includes the development, piloting and validation of
high-value applications in domains such as healthcare, energy, transport, utilities, manu -facturing and finance. Increasingly, research and innovation on the Future Internet such
as envisaged in the future Internet PPP programme forms part of a diverse, dynamic and increasingly open Future Internet innovation-ecosystem, where different stake
-holders such as researchers, businesses, government actors and user communities are brought together to interact and engage in networked and collaborative innovation
In the field of Future Internet application areas, several research and innovation topics are emerging for the next years.
In particular, there is a need to explore the opportunities provided by Future Internet technologies in various business and socie
-tal sectors and how these opportunities could be realized through open innovation models One of the key developments is towards smart enterprises
and collaborative enter -prise networks. Enterprises of the future are envisioned to be ever more open, creative
and sustainable; they will become âoesmart enterprisesâ. Innovation lies at the core of smart enterprises and includes not only products, services and processes but also the
organizational model and full set of relations that comprise the enterpriseâ s value network. The Future Internet should provide enterprises a new set of capabilities
enabling them to innovate through flexibility and diversity in experimenting with new business values, models, structures and arrangements.
the federation and integration of appropriate software building blocks. A new genera -tion of enterprise systems comprising applications
emerge, fine-tuned to the needs of enterprise users by leveraging a basic infrastructure of utility-like software services
High-value Future Internet applications are also foreseen in the domain of living healthcare, and energy. âoesmart Livingâ is one of the areas where the focus lies clearly
on the human user, and encompasses the combination of technologies in areas such as smart content, personal networks and ubiquitous services, to provide the user a simpler
easier and enriched life across many domains including home life, education and learn -ing, working,
and assisted living. Much interest is in âoesmart healthâ applications, includ -ing the provision of assisted living services for the elderly and handicapped, and also to
access to and sharing of patient data, secure data exchange between healthcare actors and applications for remote and collaborative diagnosis, cure and care
The first topic concerns the resources of telecom operators and service providers such as networks, switching, computing and data cen
-404 Part VIII: Future Internet Applications ters which are prominent targets for energy efficiency. The second includes solutions
allowing for energy management and reduction of the overall energy consumption One of the key developments in this respect is the use of advanced communication
and computing infrastructure as part of the Smart Grid. Related topics include the cost-effective deployment of supporting infrastructures such as sensors and meters
and facilitated by Internet-based applications and infrastructures based on common platforms. Therefore, cities and urban environments are facing challenges to maintain
mass when it comes to shaping the demand for advanced Internet-based services. The âoeliving labsâ approach which comprises open and user driven innovation in large-scale
real-life settings opens up a promising opportunity to enrich the experimentally-driven research approach as currently adopted in the future Internet community
The four chapters in the Application Areas part of this book illustrate the develop -ments and opportunities mentioned.
The first chapter âoefuture Internet Enterprise Sys -tems: a Flexible Architectural Approach for Innovationâ discusses how emerging
paradigms, such as Cloud computing and Software-as-a-service are opening up a significant transformation process for enterprise systems.
by new and innovative development methods and architectures of Future Internet Enterprise Systems. The chapter foresees a rich, complex, articulated digital world
Internet Enterprise Resources will directly act and evolve according to what exists in the real world The chapter âoerenewable Energy Provisioning for ICT Services in a Future Inter
dynamically transport user services to be processed in data centers built in proximity to green energy sources, thereby reducing greenhouse gas emissions of ICT equip
and focuses on heavy computing services dedicated to data centers powered com -pletely by green energy, from a large abundant reserve of natural resources in Canada
Future Internet Applications 405 The third chapter âoesmart Cities and Future Internet: towards Cooperation Frame
-works for Open Innovationâ elaborates the concept of âoesmart citiesâ as environments of open and user driven innovation for experimenting
and validating Future Internet -enabled services. The chapter describes how the living labs concept has started to
fulfill a role in the development of cities towards becoming âoesmartâ. In order to exploit the opportunities of services enabled by the Future Internet for smart cities,
there is a need to clarify the way how living lab innovation methods, user communities and Fu
-ture Internet experimentation approaches and testbed facilities constitute a common set of resources. These common resources can be made accessible and shared in open inno
-vation environments, to achieve ambitious city development goals. This approach re -quires sustainable partnerships and cooperation strategies among the main stakeholders
example of city-scale platform architecture for utilizing innovative Internet of things technologies to enhance the quality of life of citizens.
-form can be used to interconnect with different Internet of Services testbeds, helping to bridge the existing gap between the two levels
) Future Internet Assembly, LNCS 6656, pp. 407â 418,2011 Â The Author (s). This article is published with open access at Springerlink. com
Future Internet Enterprise Systems A Flexible Architectural Approach for Innovation Daniela Angelucci, Michele Missikoff, and Francesco Taglino
carried out by emerging paradigms, such as Cloud computing, Future Inter -net and Saas (Software-as-a-service), is leading the area of enterprise sys
process will be accelerated by the advent of FINES (Future Internet Enterprise System) research initiatives, where different scientific disciplines converge
-ticulations that Future Internet Systems (FIS) are assuming, to achieve the Future Internet Enterprise Systems (FINES.
In particular, this paper foresees a progressive implementation of a rich, complex, articulated digital world that
FINER (Future Internet Enterprise Resources), will directly act and evolve ac -cording to what exists in the real world
Future Internet, Future Enterprise Systems, component-based soft -ware engineering, COTS, SOA, MAS, smart objects, FINES, FINER
In recent years, software development methods and technologies have markedly evolved, with the advent of SOA 15, MDA 16, Ontologies and Semantic web, to
name a few. But there are still a number of open issues that require further research and yet new solutions.
This paper explores some emerging ideas concerning a new generation of Internet -based enterprise systems, along the line of what has been indicated in the FINES
Future Internet Enterprise Systems) Research Roadmap1, a study carried out in the context of the European commission,
Internet of things and Enterprise Environments (DG Infso. The report claims that we are close to a significant transformation in the enterprise systems, where (i
evolution of infrastructures and technologies, starting from Cloud computing and Future Internet, and, on top of those, the Software-as-a-service (Saas) paradigm that
is progressively providing new ways of conceiving and realising enterprises software applications In essence, while enterprise management and planning services will be increas
-ingly available from the â cloudâ, in a commoditised form, the future business needs and challenges) are progressively shifting towards the support to enterprise innova
Future Internet, Web 2. 0 Semantic web, Cloud computing, Saas, Social media, and similar emerging forms of distributed, open computing will push forward new forms of innovation such as, and
in particular, Open Innovation 3. The quest for continuous, systematic business innovation requires (I ES capable of shifting the focus to ideas generation and inno
-vation support, and (ii) new agile architectures, capable of (instantly) adjusting to the continuous change required to enterprises.
software engineering practices do not seem to meet. Therefore we need to orientate the research towards new ES architectures and development paradigms, when the role
development environments will be based on an evolution of MDA, being able to sepa -rate the specification and development of the (i) strategic business logic from the (ii
and advanced graphical user 1 http://cordis. europa. eu/fp7/ict/enet/documents/task-forces/research-roadmap
/Future Internet Enterprise Systems 409 interfaces will foster new development environments conceived for business experts to directly intervene in the development process
The second grand research challenge concerns the architecture of the Future Internet Enterprise Systems (FINES) that need to deeply change with respect to what
we have today. A new paradigm is somehow already emerging nowadays, pushed by the new solutions offered in the future Internet Systems (FIS) field.
In particular, we may mention: the Internet of Services (Ios), Internet of things (Iot) and smart ob -jects, Internet of Knowledge (Iok), Internet of People (Iop.
But these solutions need to further evolve towards a better characterisation in the business direction, allowing
different aspects of the business reality (functions, objects, actors, etc. to acquire their networked identity, together with a clear and precise definition (i e.,
-prise will have a digital image (a sort of â avatarâ) that has been referred to as Future Internet Enterprise Resource (FINER) in the FINES Research Roadmap.
So, the sec -ond grand research challenge consists in conceiving new, highly modular, flexible FINERS for the FINES architectures to be based on
services, tools, software packages, interfaces and user interaction solutions that are not available at the present time.
of software architectures. This will be possible if such software architectures will correspond to the enterprise architectures,
and will be composed by elements tightly coupled with business entities. The achievement of this objective relies on a number
from Cloud computing to Social media to Service-oriented Computing, from Business Process Engineering to semantic tech
-nologies and mash-up. An exhaustive analysis of the mentioned technologies is out -side the scope of this paper,
based on the notion of a FINER, seen as the new frontier to software components aimed at achieving agile system architectures.
Traditionally, the software engineering community has devoted great attention to design approaches, methods and tools, supporting the idea that large software systems
can be created starting from independent, reusable collections of preexisting software components This technical area is referred often to as Component Based Software engineering
CBSE). ) The basic idea of software componentization is quite the same as software modularization, but mainly focused on reuse.
CBSE distinguishes the process of "component development"from that of"system development with componentsâ 9
CBSE laid the groundwork for the Object oriented Programming (OOP) paradigm that in a short time imposed itself over the preexisting modular software develop
-ment techniques. OOP aims at developing applications and software systems that provide a high level of data abstraction
and modularity (using technologies such as COM,., NET, EJB and J2ee Another approach to componentization is that of the Multi Agent Systems (MAS
which is based on the development of autonomous, heterogeneous, interacting soft -ware agents. Agents mark a fundamental difference from conventional software mod
-ules in that they are inherently autonomous and endowed with advanced communica -tion capability 10 On the other side, the spread of the Internet technologies and the rising of new
communication paradigms, has encouraged the development of loosely coupled and highly interoperable software architectures through the spread of the Service-Oriented
approach, and the consequent proliferation of Service-Oriented Architectures (SOA SOA is an architectural approach
whose goal is to achieve loose coupling among interacting software services, i e.,, units of work performed by software applications
typically communicating over the Internet 11 In general, a SOA will be implemented starting from a collection of components
e-services) of two different sorts. Some services will have a â technicalâ nature, con -ceived to the specific needs of ICT people;
some other will have a â businessâ nature reflecting the needs of the enterprise. Furthermore, the very same notion of an e
given computation to take place; where it is performed or who is taking care of it is
there is an active entity (a person, an organization, a computer, a robot, etc. that provides the services, with a given cost and time (not to mention SLA, etc.
Future Internet Enterprise Systems 411 In summary, Web services were introduced essentially as a computation resource
transforming a given input to produce the desired output, originally without the need to have a persistent memory and an evident state.
upon the spread of the Cloud computing philosophy, but revising and applying it into the specific context of developing new FINESS, where business expert can directly
manage a new generation enterprise software architectures. Cloud computing repre -sents an innovative way to architect and remotely manage computing resources:
this approach aims at delivering scalable IT resources over the Internet, as opposed to hosting and operating those resources (i e. applications, services and the infrastructure
on which they operate) locally. It refers to both the applications delivered as services over the Internet and the hardware and system software in the datacenters that provide
those services 12. Cloud computing may be considered the basic support for a brand new business reality where FINERS can easily be searched,
composed and exe -cuted by a business expert. FINERS will implement a cloud-oriented way of designing
organizing and implementing the enterprises of the future In conclusion, for decades component technologies have been developed with an ICT
approach, to ease software development processes. Conversely, we propose to base a FINES architecture on building blocks based on business components.
-Future Internet Enterprise Systems 413 worked structure, conceived as an evolution of the Linked Open Data2 of today;
, according to IPV6, URI3, or ENS4 GR: Graphical Representation. This can vary from a simple GIF to a 3d model, to a
or responding (as server) to request messages. It is structured according to the grounding of OWL-S
/rfc/rfc3986. html 4 ENS: Entity Name System, proposed by the OKKAM project (www. okkam. org
â¢People, a special class of FINERS for which avatars are mandatory â¢Tangible entity, from computers to aircrafts, to buildings and furniture
â¢Intangible entity, for which a digital image is mandatory Fig. 2. The FINER Pentagone All these FINERS will freely interact
and cooperate, according to what happens for their real world counterparts. A complete interaction scheme is represented sketchily
-stantly connected (transparently, in a wired or wireless mode) to the Internet, to reach other FINERS,
Future Internet Enterprise Systems 415 5. 1 A Business-Driven FINES Develpment Platform In order to put the business experts at the centre of the ES development process, we
and directly manipulated by the user while they reside in the Cloud and are reached through the Internet.
On the FINES development environment (see Fig. 3), FINERS are represented visually in a 3d space that models the enterprise reality (i e.,
, a Virtual Enteprise Reality) where the user can navigate and manage changes. At a lower level, simpler FINERS will be aggregated to
form more complex ones. The composition will take place in a partial automatic and bottom-up way,
-ture Internet will play a central role in supporting the discovery of the needed FINERS
-mitting events and data generated during FINERSÂ operations. There is not a central -ised database, the information will stay by the business entity to
which they pertain or in the Cloud. A similar interface, representing a Virtual Enterprise Reality,
made available to the users during business operations to navigate in the enterprise and see how the operations evolve
The computational resources of a FINES are maintained in the Computing Cloud and are linked recursively to compose complex FINERS starting from simpler ones.
Future Internet Enterprise Systems 417 The runtime architecture of Fig. 4 is described in a sketchy way,
where computation will be performed directly by enterprise com -ponents, mainly positioned in the enterprise itself of in the Cloud (typically, in case of
and maintaining large scale computing solutions simply interacting with a familiar (though technologically enhanced) business reality
, Iot Ios, Multi-Agent Systems, Cloud computing, Autonomic Systems) and, in parallel some key areas of the enterprise that will start to benefit of the FINES approach
Acknowledgment. We acknowledge the FINES Cluster (European commission), and in particular the FINES Research Roadmap Task force for their contribution in pro
-ing Wireless Mesh and Wireless Sensor Networks. Wireless Personal Communica -tions 53 (3)( 2010 2. Buxmann, P.,Hess, T.,Ruggaber, R.:
-Internet of Services. Business & Information Sys -tems Engineering 1 (5), 341â 342 (2009 3. Chesbrough, H.:
eu/fp7/ict/enet/ei-isg en. html 7. Sykes, D.,Heaven, W.,Magee, J.,Kramer, J.:
27th International Conference on Information technology Inter -faces (ITI), Cavtat, Croatia, IEEE, Los Alamitos (2005 10.
Component-oriented software development, Spe -cial issue on alaysis and modeling in software development, pp. 160â 165 (1992
11. Petritsch, H.:Service-Oriented Architecture (SOA) vs. Component Based Architecture white paper, TU Wien (2006), http://whitepapers. techrepublic. com. com
A Berkley View of Cloud computing, EECS -2009-28 (2009 13. Martin, D.,et al.:Bringing Semantics to Web Services with OWL-S. In:
Proc. Of WWW Conference (2007 14. Clark, D.,et al.:Newarch project: Future-generation internet architecture.
Tech Rep. MIT Laboratory for Computer science (2003), http://www. isi. edu/newarch /15. Tselentis, G.,et al.
eds.):) Towards the Future Internet-Emerging Trends from European Research. IOS Press, Amsterdam (2010 16.
Papazoglou, M. P.:Web Services: Principles and Technology. Prentice-hall, Englewood Cliffs (2007 17. Mellor, S. J.,Scott, K.,Uhl, A.,Weise, D.:
Model-driven architecture. In: Bruel, J.-M Bellahsã ne, Z.,et al. eds.)) OOIS 2002. LNCS, vol. 2426, p. 290.
Springer, Heidelberg 2002 J. Domingue et al. Eds.):) Future Internet Assembly, LNCS 6656, pp. 419â 429,2011
 The Author (s). This article is published with open access at Springerlink. com Renewable Energy Provisioning for ICT Services in a
Future Internet Kim Khoa Nguyen1, Mohamed Cheriet1, Mathieu Lemay2, Bill St. Arnaud3 Victor Reijs4, Andrew Mackarel4, Pau Minoves5, Alin Pastrama6, and
user services to be processed in data centers built in proximity to green energy sources, reducing GHG (Greenhouse Gas) emissions of ICT equipments.
from new services and users, resulting in an increase in GHG emissions. Based on the cooperation between Mantychore FP7 and the GSN, our approach is
the heaviest computing services are dedicated to virtual data centers powered completely by green energy from a
large abundant reserve of natural resources, particularly in northern countries Keywords: Green Star Network, Mantychore FP7, green ICT, Future Internet
1 Introduction Nowadays, reducing greenhouse gas (GHG) emissions is becoming one of the most challenging research topics in Information and Communication Technologies (ICT
-cused on microprocessor design, computer design, power-on-demand architectures and virtual machine consolidation techniques. However, a micro-level energy effi
-ciency approach will likely lead to an overall increase in energy consumption due to the Khazzoomâ Brookes postulate (also known as Jevons paradox) 2, which states
Large ICT companies, like Microsoft which consumes up to 27mw of energy at any given time 1,
have built their data centers near green power sources. Unfortunately, many computing centers are not so close to
green energy sources. Thus, green energy distributed network is an emerging technol -ogy, given that losses incurred in energy transmission over power utility infrastruc
-tures are much higher than those caused by data transmission, which makes relocating a data center near a renewable energy source a more efficient solution than trying to
bring the energy to an existing location The Greenstar Network (GSN) project 3 is one of the first worldwide initiatives
can transport user service applications to be processed in data centers built in prox -imity to green energy sources,
such as hand-held devices, home PCS), the heaviest computing services will be dedicated to data centers powered completely by green energy.
This is enabled thanks to a large abundant reserve of natural green energy resources in Canada, Europe and USA.
and in the server farms is not considered since no special equipment is deployed in the GSN
In order to move virtualized data centers towards network nodes powered by green energy sources distributed in such a multi-domain network, particularly between
will be developed to leverage virtualization, which helps to migrate virtual infrastruc -ture resources from one site to another based on power availability.
This will facilitate use of renewable energy within the GSN providing an Infrastructure as a service Iaas) management tool.
Renewable Energy Provisioning for ICT Services in a Future Internet 421 one is powered by a different renewable energy source) could be integrated into an
Core nodes are linked by an underlying high speed optical network having up to 1, 000 Gbit/s bandwidth capacity provided by CANARIE.
new 100gbit/s, in comparison to electronic equipments such as routers and aggrega -tors 4. The migration of virtual data centers over network nodes is indeed a result of
a convergence of server and network virtualizations as virtual infrastructure manage -ment. The GSN as a network architecture is built with multiple layers, resulting in a
large number of resources to be managed. Virtualized management has therefore been proposed for service delivery regardless of the physical location of the infrastructure
to user requirements; hence high utilization and optimization levels can be achieved During the service, the user monitors and controls resources as if he was the owner
allowing the user to run their application in a virtual infrastructure powered by green energy sources
2 Provisioning of ICT Services over Mantychore FP7 and GSN with Renewable Energy In the European NREN community connectivity services are provisioned on a manual
so that users can change some of the service characteristics without having to renegotiate with the service provider
was to implement a proof of concept based on the idea that routers and an IP network
robust software while running trials on a range of network equipment The Mantychore FP7 project allows the NRENS to provide a complete, flexible
Users will be able to get access control over optical de -vices like optical switches, to configure important properties of its cards and ports
b) Layer 2, Ethernet and MPLS. Users will be able to get control over Ethernet and
MPLS (Layer 2. 5) switches to configure different services. In this aspect, Mantychore will integrate the Ether project 6 and its capabilities for the management of Ethernet
and MPLS resources c) Layer 3, Mantychore FP7 suite includes set of features for: i) Configuration and
and firewall services, v) Creation, modification and deletion of resources (interfaces routers) both physical and logical,
and vi) Support of IPV6. It allows the configuration of IPV6 in interfaces, routing protocols, networks
Fig. 1. The Greenstar Nework Figure 1 shows the connection plan of the GSN. The Canadian section of the GSN has
the largest deployment of six GSN nodes powered by sun, wind and hydroelectricity It is connected to the European green nodes in Ireland (HEANET), Iceland (NOR
Renewable Energy Provisioning for ICT Services in a Future Internet 423 using renewable energy resources is vital for any NREN with such an abundance of
houses a GSN Node at a data center in Reykjavã k (Iceland) and also contributes to the
-work is that the former one is able to transport ICT services to data centers powered
PDU Servers (Dell Poweredge R710 To core network Wind power node architecture Spoke Switch Allied Telesis
Raritan UPS (APC PDU Servers (Dell Poweredge R710 Hydroelectricity power node architecture (Hub MUX/DEMUX
To core network Backup Disk Arrays Gbe Tranceiver MUX/DEMUX GSN-Montreal (Canada GSN-Calgary (Canada
Fig. 2. Architecture of green nodes (hydro, wind and solar types 424 K. K. Nguyen et al
by green energy and adjust the network to the needs controlled by software. The cost
of producing and maintaining network elements, such as routers and servers, is not considered, because no special hardware equipment is used in the GSN
Figure 2 illustrates the architectures of a hydroelectricity and two green nodes, one is powered by solar energy
and the other is powered by wind. The solar panels are grouped in bundles of 9 or 10 panels,
each panel generates a power of 220-230w. The wind turbine system is a 15kw generator.
After being accumulated in a battery bank electrical energy is treated by an inverter/charger in order to produce an appropriate
output current for computing and networking devices. User applications are running on multiple Dell Poweredge R710 systems, hosted by a rack mount structure in an
outdoor climate-controlled enclosure. The air conditioning and heating elements are powered by green energy at solar and wind nodes;
servers are linked by a local network, which is connected then to the core network through GE transceivers.
Data flows are transferred among GSN nodes over dedicated circuits (like light paths or P2p links), tunnels over Internet or logical IP networks
The Montreal GSN node plays a role of a manager (hub node) that opportunisti -cally sets up required connectivity for Layer 1 and Layer 2 using dynamic services
then pushes Virtual machines (VMS) or software virtual routers from the hub to a sun or wind node (spoke node) when power is available.
VMS will be pulled back to the hub node when power dwindles. In such a case, the spoke node may switch over to
The VMS are used to run user applications, particu -larly heavy-computing services. Based on this testbed network, experiments and re
-search are performed targeting cloud management algorithms and optimization of the intermittently-available renewable energy sources
The cloud management solution developed in order to run the GSN enables the control of a large number of devices of different layers.
Fig. 3. Layered GSN and Cloud computing Architectures Renewable Energy Provisioning for ICT Services in a Future Internet 425
regardless of the underlying infrastructure. Such a management approach is essential for data center migration across a wide area-network network,
because the migration must be achieved in a timely manner and transparently to service users.
The proposed web -based cloud management solution is based on the Iaas concept, which is a new soft
-ware platform specific for dealing with the delivery of computing infrastructure 5 Figure 3 compares the layered architecture of the GSN with a general architecture
of a cloud comprising four layers. The GSN Data plane corresponds to the System level, including massive physical resources, such as storage servers and application
servers linked by controlled circuits (i e.,, lightpaths. The Platform Control plane corresponds to the Core Middleware layer,
implementing the platform level services that provide running environment enabling cloud computing and networking capabili -ties to GSN services.
The Cloud Middleware plane corresponds to the User-level Middleware, providing Platform as a service capabilities based on Iaas Framework
components 5. The top Management plane or User level focuses on application services by making use of services provided by the lower layer services
4 Virtual Data center Migration In the GSN project, we are interested in moving a virtual data center from one node to
another. Such a migration is required for large-scale applications running on multiple servers with a high density connection local network.
The migration involves four steps i) Setting up a new environment (i e.,, a new data center) for hosting the application with
required configurations, ii) Configuring network connection, iii) Moving VMS and their running state information through this high speed connection to the new location, and
iv) Turning off computing resources at the original node. Indeed, solutions for the mi -gration of simple applications have been provided by many ICT operators in the market
However, large scale data centers require arbitrarily setting their complex working envi -ronments when being moved. This results in a reconfiguration of a large number of
servers and network devices in a multi-domain environment Fig. 4. Iaas Framework Architecture Overview
426 K. K. Nguyen et al In our experiments with an online interactive application like Geochronos 7 each
VM migration requires 32mbps bandwidth in order to keep the service live during the migration, thus a 10 Gbit/s link between two data centers can transport more than 300
VMS in parallel. Given that each VM occupies one processor and that each server has up to 16 processors, 20 servers can be moved in parallel.
If each VM consumes 4gbyte memory space, the time required for such a migration is 1000sec
The migration of data centers among GSN nodes is based on cloud management The whole network is considered as a set of clouds of computing resources,
which is managed using the Iaas Framework 5. The Iaas Framework include four main com
-ponents: i) Iaas Engine used to create model and devices interactions abstractions, ii Iaas Resource used to build web services interfaces for manageable resources, iii
Iaas Service serves as a broker which controls and assigns tasks to each VM, and iv
Iaas Tool provides various tools and utilities that can be used by the three previous components (Figure 4
The Engine component is positioned at the lowest level of the architecture and maintains interfaces with physical devices.
It uses services provided by protocols and transport layers in order to achieve communications. Each engine has a state machine
The engines allow GSN users to quantify the power consumption of their service. Engines notify upper layers by triggering
resources Business, Presentation or Data Access Tier. The Tool component provides additional services, such as persistence,
Open Services Gateway initiative) is a Java framework for remotely deployed service applications, which provides high reliability, collaboration, large scale distribution
Through a Web interface, users may determine GHG emission boundaries based on information providing VM power and their energy sources,
converges server and network virtualizations. Whilst most of cloud management solu -tions in the market focus particularly on computing resources, Iaas Framework compo
-nents can be used to build network virtualized tools 6 10, which provides for a flexi
-ble set of data flows among data centers. The ability of incorporating third-party power control components is also an advantage of the Iaas Framework
Renewable Energy Provisioning for ICT Services in a Future Internet 427 5 Federated Network GSN takes advantage of the virtualization to link virtual resources together to span
multiple cloud and substrate types. The key issue is how to describe, package, and deploy such multi-domain cloud applications.
An orchestration middleware is built to federate clouds across domains, coordinate user registration, resource allocation stitching, launch, monitoring,
and adaptation for multi-domain cloud applications Such a tool also requires solutions for identity, authorization, monitoring, and re
and interoperate with software outside of the GSN Along with the participation of international nodes, there is an increasing need of
client will contact firstly an energy-aware router in order to get an appropriate VM for his service.
The router will look for a VM which is optimal in terms of GHG emis -sion, i e.,, the one which is powered by a green energy source.
in order to move a VM to a greener data center The process is as follows (Figure 5: i) Copy VM memory between old and new loca
iii) Router B receives the ARP and sends the message to the client, iv) New routing entry is installed in router B for the VM,
and v) New rout -ing entry is added in router A 428 K. K. Nguyen et al
In our design, the GSN is provided with a component called the Federation Stitcher which is responsible for establishing connection among domains, and forwarding user
requests to appropriate data centers. The big picture of the GSN network management solution is shown in Figure 6. The heart of the network is the programmable Federa
-tion Stitcher, which accepts connections from service users through Internet. This point is powered by green sustainable energy, i e.,
, hydroelectricity. It links user re -quests to appropriate services provided by data centers distributed across the network
Each data center is represented by a virtual instance, including virtual servers and virtual routers and/or virtual switches interconnecting the servers.
Such a virtual data center can be hosted by any physical network node, according to the power availabil
-ity. There is a domain controller within each data center or a set of data centers shar -ing the same network architecture/policy.
User requests will be forwarded by the Federation Stitcher to the appropriate domain controller. When a VM or a data center
is migrated, the new location will be registered with the Federation Stitcher then user requests are tunneled to the new domain controller
Fig. 6. Overview of GSN network management solution Renewable Energy Provisioning for ICT Services in a Future Internet 429
6 Conclusion In this chapter, we have presented a prototype of a Future Internet powered only by
green energy sources. As a result of the cooperation between Europe and North America researchers, the Greenstar Network is a promising model to deal with GHG
reporting and carbon tax issues for large ICT organizations. Based on the Mantychore FP7 project, a number of techniques have been developed
in order to provision re -newable energy for ICT services worldwide. Virtualization techniques are shown to be the most appropriate solution to manage such a network
and to migrate data cen -ters following green energy source availability, such as solar and wind
Our future work includes research on the quality of services hosted by the GSN and a scalable resource management
Acknowledgments. The authors thank all partners for their contribution in the GSN and Mantychore FP7 projects
Open Access. This article is distributed under the terms of the Creative Commons Attribution Noncommercial License which permits any noncommercial use, distribution, and reproduction
-work Infrastructures in Support of Future Internet and Grid Services Using Iaas to Reduce GHG Emissions.
Providing users with a Logical IP Network Ser -vice. TERENA Networking Conference (5/2008 9. Grasa, E.,et al.:
HEANET website, http://www. heanet. ie /12. NORDUNET website, http://www. nordu. net 13. Moth, J.:
GN3 Study of Environmental Impact Inventory of Greenhouse Gas Emissions and Removals â NORDUNET (9/2010
IBBT Website, http://www. ibbt. be /16. Reservoir FP7, http://www. reservoir-fp7. eu /J. Domingue et al.
) Future Internet Assembly, LNCS 6656, pp. 431â 446,2011 Â The Author (s). This article is published with open access at Springerlink. com
Smart Cities and the Future Internet: Towards Cooperation Frameworks for Open Innovation Hans Schaffers1, Nicos Komninos2, Marc Pallot3, Brigitte Trousse3
and user-driven innovation for experimenting and validat -ing Future Internet-enabled services. Based on an analysis of the current land
-scape of smart city pilot programmes, Future Internet experimentally-driven re -search and projects in the domain of Living Labs, common resources regarding
research and innovation can be identified that can be shared in open innovation environments. Effectively sharing these common resources for the purpose of
Smart Cities, Future Internet, Collaboration, Innovation Ecosys -tems, User Co-Creation, Living Labs, Resource Sharing
1 Introduction The concept of âoesmart citiesâ has attracted considerable attention in the context of urban development policies.
The Internet and broadband network technologies as enablers of e-services become more and more important for urban development while
user-driven innovation ecosystems to boost Future Internet research and experimenta -tion for user-driven services and how they can accelerate the cycle of research, inno
-432 H. Schaffers et al vation and adoption in real-life environments. This paper pays particular attention to
collaboration frameworks which integrate elements such as Future Internet testbeds and Living Lab environments that establish
-passing peripheral and less developed cities. It also emphasises the process of eco -nomic recovery for welfare and well-being purposes.
implicitly builds upon the role of the Internet and Web 2. 0 as potential enablers of
experimentation into the smart cities concept as piloting user-driven open innovation environments. The implicit aim of such initiatives is to mobilise cities and urban areas
collective intelligence and co-creation capabilities of user/citizen communities for designing innovative living and working scenarios
platforms, emerging ICT tools, methodologies and know-how, and user communities Table 1. Three perspectives shaping the landscape of Future Internet and City Development
Future Internet Research Cities and Urban Development User-Driven Innovation Ecosystems Actors Researchers ICT companies
National and EU actors City policy actors Citizen platforms Business associations Living Lab managers citizens, governments
enterprises, researchers as co-creators Priorities Future Internet technical challenges (e g. routing scaling, mobility Urban development
Essential infrastructures Business creation User-driven open innovation Engagement of citizens Resources Experimental facilities Pilot environments
Technologies Urban policy framework Organisational assets Development plans Living lab facilities methodologies & tools physical infrastructures
User-driven innovation projects Open, collaborative innovation Smart Cities and the Future Internet 433 for experimentation on Future Internet technologies and e-service applications
Common, shared research and innovation resources as well as cooperation models providing access to such resources will constitute the future backbone of urban inno
-vation environments for exploiting the opportunities provided by Future Internet technologies. Three perspectives are addressed in this paper
in order to explore the conditions for rising to this challenge (see Table 1 The first perspective of Future Internet research and experimentation represents a
technology-oriented and longer term contribution to urban innovation ecosystems. Cit -ies and urban areas provide a potentially attractive testing and validating environment
However, a wide gap exists between the technology orientation of Future Internet re -search and the needs and ambitions of cities.
third perspective is the concept of open and user-driven innovation ecosystems, which are close to the interests
-ages between Future internet research, urban development policies and open user -driven innovation. Elements of such frameworks include sharing of and access to
open and user-driven innovation looks well positioned to serve as a mediating, ex -ploratory and participative playground combining Future Internet push and urban
policy pull in demand-driven cycles of experimentation and innovation. Living Lab -driven innovation ecosystems may evolve to constitute the core of âoe4pâ (Public
-Private-People-Partnership) ecosystems providing opportunities to citizens and busi -nesses to co-create, explore, experiment and validate innovative scenarios based on
technology platforms such as Future Internet experimental facilities involving SMES and large companies as well as stakeholders from different disciplines
-ploit the opportunities of the Future Internet and of Living Lab-innovation ecosys -tems. How methodologies of Future Internet experimentation and Living Labs could
constitute the innovation ecosystems of smart cities is discussed in section 3. Initial examples of such ecosystems and related collaboration models are presented in sec
-tion 4. Finally, section 5 presents conclusions and an outlook 2 City and Urban Development Challenges
Foundation for Smart Communities advocated the use of information technology to 434 H. Schaffers et al meet the challenges of cities within a global knowledge economy 7. However, the
-ability, and to the rise of new Internet technologies, such as mobile devices (e g. smart phones), the semantic web, cloud computing,
and the Internet of things (Iot) promot -ing real world user interfaces The concept of smart cities seen from the perspective of technologies and compo
-nents has some specific properties within the wider cyber, digital, smart, intelligent cities literatures. It focuses on the latest advancements in mobile and pervasive comput
-ing, wireless networks, middleware and agent technologies as they become embedded into the physical spaces of cities.
The emphasis on smart embedded devices represents a distinctive characteristic of smart cities compared to intelligent cities,
which create territorial innovation systems combining knowledge-intensive activities, institutions for cooperation and learning, and web-based applications of collective intelligence 8, 9
Box: A New Spatiality of Cities-Multiple Concepts Cyber cities, from cyberspace, cybernetics, governance and control spaces based on informa
Digital cities, from digital representation of cities, virtual cities, digital metaphor of cities cities of avatars, second life cities, simulation (sim) city
Intelligent cities, from the new intelligence of cities, collective intelligence of citizens, dis -tributed intelligence, crowdsourcing, online collaboration, broadband for innovation, social
capital of cities, collaborative learning and innovation, people-driven innovation Smart cities, from smart phones, mobile devices, sensors, embedded systems, smart envi
-ronments, smart meters, and instrumentation sustaining the intelligence of cities It is anticipated that smart city solutions, with the help of instrumentation and inter
-connection of mobile devices, sensors and actuators allowing real-world urban data to be collected and analysed, will improve the ability to forecast
Smart Cities and the Future Internet 435 solutions are expected to deal with these challenges, sustain the innovation economy
the development of broadband infrastructure combining cable, optical fibre, and wire -less networks, offering high connectivity and bandwidth to citizens and organisations
cities with embedded systems, smart devices, sensors, and actuators, offering real -time data management, alerts, and information processing,
and (3) the creation of applications enabling data collection and processing, web-based collaboration, and
actualisation of the collective intelligence of citizens. The latest developments in cloud computing and the emerging Internet of things, open data, semantic web, and
future media technologies have much to offer. These technologies can assure econo -mies of scale in infrastructure, standardisation of applications,
for software as a service, which dramatically decrease the development costs while accelerating the learning curve for operating smart cities
in parallel with the Internet of things and embedded systems, providing new oppor -tunities for content management 12,13. Media Internet technologies are at the
crossroads of digital multimedia content and Internet technologies, which encom -passes media being delivered through Internet networking technologies, and media
being generated, consumed, shared and experienced on the web. Technologies, such as content and context fusion, immersive multi-sensory environments, location-based
content dependent on user location and context, augmented reality applications, open and federated platforms for content storage and distribution, provide the ground for
new e-services within the innovation ecosystems of cities (see Table 2 Table 2. Media Internet technologies and components for Smart Cities
Solutions and RTD challenges Short term (2014) Mid term (2018) Longer term (2022 Content management tools
Media Internet technologies Scalable multimedia compression and transmission Immersive multimedia Collaboration tools Crowd-based location
content; augmented reality tools Content and context fusion technologies Intelligent content objects; large scale ontologies and
semantic content Cloud services and software components City-based clouds Open and federated content platforms
Cloud-based fully connected city Smart systems based on Internet of things Smart power management Portable systems
Smart systems enabling integrated solutions e g. health and care Software agents and advanced sensor fusion;
telepresence Demand for e-services in the domains outlined in Fig. 1 is increasing, but not at a
disruptive pace. There is a critical gap between software applications and the provi -sion of e-services in terms of sustainability and financial viability.
Not all applications are turned into e-services. Those that succeed in bridging the gap rely on successful
-tinuous flow of data and information, and offer useful services. It is here that the third
Smart Cities and the Future Internet 437 and sharing of resources among localities. Open source communities may also sub
-stantially contribute to the exchange of good practices and open solutions The current research on smart cities is guided partly by the above priorities of con
such as IBM, Cisco, Microsoft, are involved strongly in and are contributing to shaping the research agenda.
-ies, linking smart cities with user-driven innovation, future Internet technologies, and experimental facilities for exploring new applications and innovative services
and open public data up to developers as well as user communities. As the major challenge facing European cities is to secure high living
3 Future Internet Experimentation and Living Labs Interfaces In exploring the role of Future Internet experimentation facilities in benefiting urban
development as we move towards smart cities, we will succinctly summarise the role of experimental facilities and the experimentation process,
-ture Internet. Within the context of the now emerging FIRE portfolio 15, the poten -tial exists to support new classes of users
and experiments combining heterogeneous technologies that represent key aspects of the Future Internet. The considerable obsta
-cles of complexity and unfamiliarity that are faced when trying to explore the effects of new applications that bring future users the increasing power of the Future Internet
have not yet been overcome. Issues that are being dealt with in the attempt of FIRE projects to move closer to the goal of a federated testbed facility,
The portfolio of FIRE experimentation projects shows that users in such FIRE pro -jects are mostly academic and industry researchers.
user experimentation is beyond the current scope of FIRE, although some interesting initiatives in that respect have started such as the Smart Santander project (services
and applications for Internet of things in the city), the TEFIS project (platform for 438 H. Schaffers et al
co-creation of wellbeing, logistics and environment Iot-based services A comparison of the role of users in FIRE facilities projects compared to Living
Labs is presented in Table 3. Importantly, FIRE projects typically involve users in assessing the impacts of technologies in socioeconomic terms, whereas Living Labs
projects aim to engage users in the innovation process itself. Also, the predominant approach of FIRE facilities is controlled experimentation,
whereas Living Labs en -gage users in the actual innovation process (co-creation. The European commission
has voiced its support for stronger user orientation in the future Internet facilities projects; not only users in terms of academic and industry researchers who will use
these facilities for their research projects, but also end-users. Emphasis is on involv -ing communities of end-users at an early stage of development to assess the impacts
of technological changes, and possibly engage them in co-creative activities Table 3. User Role in FIRE and Living Labs
Future Internet Experiments Living Labs Innovation Approach Controlled experiments Observing large-scale deployment and usage patterns
Federated testbeds Both controlled and natural situation experiments User co-creation via Living Labs methodologies, action research
Open, cooperative innovation Object of testing Technologies, services, architec -tures, platforms, system require -ments; impacts
Validation of user ideas, prototype applications and solutions. Testing as joint validation activity Scale of testing Large-scale mainly From small to large scale
Support the process of user-driven innovation as co-creation In order to explore the opportunities and interfaces,
Living Labs. The Web 2. 0 era has pushed cities to consider the Internet, including mobile networks, as a participative tool for engaging citizens and tourists.
Many ini -tiatives have been launched by cities, such as Wikicity in Rome stemming from MIT's Senseable City Lab which studies the impact of new technologies on cities, Real
-natives of the Internet of tomorrow, it becomes increasingly challenging to design open infrastructures that efficiently support emerging events and citizensâ changing
-Smart Cities and the Future Internet 439 vices based on real-time digital data representing digital traces of human activity and
their context in the urban space. Environmental sensors measure parameters such as air quality, temperature or noise levels;
telecommunication networks reflect connec -tivity and the location of their users; transportation networks digitally manage the
mobility of people and vehicles as well as products in the city, just to give a few ex
data streams can become tools for people taking decisions within the city. Promising applications and services seem to be emerging from user co-creation processes
Recent paradigms, such as open innovation and open business models 16, Web 2. 0 17 as well as Living Labs 18, a concept originating from the work of William
Mitchell at MIT and currently considered as user-driven open innovation ecosystems promote a more proactive and co-creative role of users in the research and innovation
process. Within the territorial context of cities, rural areas and regions, the main goal of Living Labs is to involve communities of users at an early stage of the innovation
process. The confrontation of technology push and application pull in a Living Lab enables the emergence of breakthrough ideas,
concepts and scenarios leading to adoptable innovative solutions. Some of the methodologies used in Living Labs inno
pilots and Living Labs. In 20 a landscape of user engagement approaches is pre -sented.
management integrated with user experiments within an action research setting have been developed and implemented in 21
Altogether, Future Internet experimental facilities, Living Labs and Urban devel -opment programmes form an innovation ecosystem consisting of users and citizens
ICT companies, research scientists and policy-makers. In contrast with a testbed, a Living Lab constitutes a âoe4pâ (Public, Private and People Partnership) ecosystem that
provides opportunities to users/citizens to co-create innovative scenarios based on technology platforms such as Future Internet technology environments involving
large enterprises and SMES as well as academia from different disciplines. It appears that Future Internet testbeds could be enabling the co-creation of innovative scenarios
by users/citizens contributing with their own content or building new applications that would mash-up with the cityâ s open, public data
4 Emerging Smart City Innovation Ecosystems As Table 4 illustrates, several FP7-ICT projects are devoted to research and experi
-mentation on the Future Internet and the Internet of things within cities, such as Smart Santander and, within the Iot cluster, ELLIOT.
The CIP ICT-PSP programme has initiated several pilot projects dedicated to smart cities and Living Labs, some
with a clear Future Internet dimension (Apollon, Periphã ria, and to a less extent too
Open Cities and EPIC. Among the earlier projects with interesting aspects on the interface of Living Labs and Future Internet is C@R (FP6
440 H. Schaffers et al The Smart Santander project proposes an experimental research facility based on sensor networks which will eventually include more than 20,000 sensors, considered
as Iot devices. The architecture supports a secure and open platform of heterogene -ous technologies.
The project is intended to use user-driven innovation methods for designing and implementing â use casesâ.
map of sensor data available on smart phone) as well as urban waste management are two of the use cases from the Smart Santander project
Internet services and sensor network in the city. www. smartsantander. eu â¢ELLIOT (FP7-ICT, 2010.
Experimental Living Lab for Internet of Things. Three Living Labs are involved. http://www. elliot-project. eu
Internet of things in Smart City www. peripheria. eu â¢Open Cities (CIP ICT-PSP, 2010. Public sector services
The ELLIOT project (Experiential Living Lab for the Internet of things) represents a clear example of Living Labs and Future Internet interaction, elaborating three Iot
use cases in three different Living Labs. The first use case is dedicated to co-creation
by users of green services in the areas of air quality and ambient noise pollution with
-opment facilities with professional users. Its goal is to investigate evidence of the social dynamics of the Living Lab approach for the purpose of ensuring a wide and rapid
PACA), the local research institute providing the Iot-based green service portal and managing the experiments (INRIA/Axis), the Internet Foundation for the New Gen
-eration (FING) facilitating user workshops, and a local SME providing data access from electric cars equipped with air quality sensors (VULOG)
and a citizen IT plat -form (a regional Internet space for citizens in the NCA area.
The objectives of the Iot-based green services use case are twofold: to investigate experiential learning of
the Iot in an open and environmental data context, and to facilitate the co-creation of
Smart Cities and the Future Internet 441 green services based on environmental data obtained via sensors.
Various environ -mental sensors will be used, such as fixed sensors from Atmo PACA in the NCA area
fixed Arduino-assembled sensors by citizens, mobile sensors, such as citizen-wired green watches or sensors installed on electric vehicles.
The backbone of the green services use case is based an Iot service portal which addresses three main Iot
-related portal services by allowing the user: 1) to participate in the collection of envi
-ronmental data; 2) to participate in the co-creation of services based on environmental data; and 3) to access services based on environmental data,
such as accessing and/or visualising environmental data in real time. Three complementary approaches have already been identified as relevant for the green services use case:
participatory/user -centred design methods; diary studies for Iot experience analysis, and coupling quan -titative and qualitative approaches for portal usage analysis. In this context of an open
innovation and Living Lab innovation ecosystem, focus groups involving stake -holders and/or citizen may be run either online or face-to-face
The Periphã ria project is among the Smart Cities portfolio of seven projects re -cently launched in the European commission ICT Policy Support Programme.
Their aim is to develop smart cities infrastructures and services in real-life urban environ -ments in Europe.
Actually, the Periphã ria project forms a bridge between the Smart Cities portfolio of projects and the Internet of things European Research Cluster
IERC) and can therefore be taken as a model of Smart Cities and Future Internet integration.
At the core of Periphã ria lies the role of Living Labs in constituting a bridge
between Future Internet technology push and Smart City application pull, refocusing the attention on âoepeople in Placesâ to situate the human-centric approach within physi
-cal urban settings. People In places becomes the context and the situation â including the relational situations between people and between people and spaces, infrastructures
services, etc. â in which the integration of Future Internet infrastructures and services occurs as part of a âoediscovery-drivenâ process.
The Cloud is considered to be a resource environment that is dynamically configured (run-time) to bring together testbeds, ap
Participation is at the heart of this bottom-up approach to Future Internet technol -ogy integration,
whereby Future Internet research adopts a âoecompetitive offerâ stance to prove its added value to users.
Platform and service convergence is promoted by the use of serious games that engage citizens and users in the process of discovering
the potential of Future Internet technologies and the possible sustainable scenarios that can be built upon them.
Serious gaming thus constitutes a mechanism to enhance participation and transform individual and collective behaviour by working directly
the adoption of Future Internet technologies. Periphã ria has identified five archetypal urban settings:(1) the Smart Neighbourhood where media-based social interaction
and integrates Future Internet technologies (such as augmented reality services for the appreciation of cultural heritage) with networks of video-cameras used to monitor
public spaces. In addition, the integration of these services occurs in the Living Lab context where citizens contribute both to the definition and prioritisation of the cul
that are central to the acceptance and success of Future Internet services for the safety
This example illustrates the central role of users and citizens in defining the services that make up a Smart City as well as the new sustainable lifestyles and workstyles
made possible by Future Internet technologies. In addition, it shows how the Future Internet is a mixture of technologies and paradigms with overlapping implementation
time-frames. While the deployment of IPV6 networks may be a medium-term effort other Future Internet paradigms such as cloud services and camera and sensor net
-works can be considered as already operational. The discovery-driven arena settings in Periphã ria are guiding the development of Living Lab-convergent service platforms
that bring these technologies together into integrated, dynamic co-creation environ -ments that make up a Smart City
as testing facilities, user groups and experimentation methodologies. Two different layers of collaboration can be distinguished.
Smart Cities and the Future Internet 443 issues need to be clarified such as how the different research and innovation resources in
such as specific testing facilities, tools, data and user groups, can be made accessible and adaptable to specific demands of any research and innovation projects
Internet research and innovation project embedded in regional and even national in -novation policy. From the perspective of smart cities, managing innovation at the
-sources made available to users and developers 444 H. Schaffers et al 5 Conclusions and Outlook
In this paper we explored the concept of âoesmart citiesâ as environments of open and user driven innovation for experimenting
and validating Future Internet-enabled ser -vices. Smart cities are enabled by advanced ICT infrastructure contributed to by cur
-rent Future Internet research and experimentation. Such infrastructure is one of the key determinants of the welfare of cities.
Other determinants of the welfare of cities will be important as well: the infrastructure for education and innovation, the net
The Living Labs concept represents a powerful view of how user-driven open in -novation ecosystems could be organised.
-jects in the domain of Future Internet research and Living Labs on the other, common
facilities, user communities, technologies and know-how, data, and innovation meth -ods. Such common resources potentially can be shared in open innovation environ
One layer focuses on the actual resources within the Future Internet research and innovation process, the second layer addresses the urban innovation
methods in experimenting on Future Internet technologies, and the use of Living Lab methodologies for implementing innovation policies of cities
user communities available for joint use with Future Internet facilities (e g. the TEFIS project), and in making accessible Future Internet facilities for developing and vali
-dating Iot-based service concepts and applications through Living Labs approaches for smart cities (e g. the Smartsantander and ELLIOT projects
The Future Internet constitutes both a key technology domain and a complex societal phenomenon. Effective, user driven processes of innovation, shaping and application of
Smart Cities and the Future Internet 445 Future Internet technologies in business and society are crucial for achieving socio
-economic benefits. A key requirement emphasised in this paper is how, within an envi -ronment of open innovation in smart cities and governed by cooperation frameworks
the diverse set of resources or assets that constitutes the âoeengineâ of ongoing research and innovation cycles can be made open accessible for users and developers
Open Access. This article is distributed under the terms of the Creative Commons Attribution Noncommercial License which permits any noncommercial use, distribution, and reproduction
in any medium, provided the original author (s) and source are credited References 1. Kroes, N.:
Cities, Fast Systems, Global networks. Rowman & Littlefield, New york (1992 7. WFSC: Smart Communities, http://www. smartcommunities. org/about. htm
IBM Journal of Research & development 53 (3), 338â 353 (2009 11. European commission: Growing Regions, Growing Europe:
Future Media Internet: Research challenges and road ahead. DG In -formation Society and Media, Luxembourg, Publications Office of the European union (2010
Future Internet Research and Experimentation (Sep -tember 2010 16. Chesbrough, H. W.:Open Innovation: The New Imperative for Creating
Web Squared: Web 2. 0 Five Years On. Special report, Web 2. 0 Summit, Co-produced by Oâ Reilly & Techweb (2009
18. European commission, DG INFSO: Advancing and Applying Living Lab Methodologies 2010 19. Ballon, P.,Pierson, J.,Delaere, S.,et al.:
Test and Experimentation Platforms for Broad -band Innovation. IBBT/VUB-SMIT Report (2005 446 H. Schaffers et al
From User Centred Design and User Experience Towards User Co-creation. Position Paper, First Living
Labs Summer School (http://www-sop. inria. fr/llss2010/),Paris (August. 2010 21. Schaffers, H.,Garcia Guzmã¡
) Future Internet Assembly, LNCS 6656, pp. 447â 462,2011 Â The Author (s). This article is published with open access at Springerlink. com
Smart Cities at the Forefront of the Future Internet Josã M. Hernã¡ndez-Muã oz1, Jesã s Bernat Vercher1, Luis Muã oz2, Josã A. Galache2
1 Telefonica I+D, Madrid, Spain {jmhm, bernat}@ tid. es 2 University of Cantabria, Santander, Spain
Smart cities have been pointed recently out by M2m experts as an emerging market with enormous potential,
-cent vision of the Future Internet (FI), and its particular components, Internet of Things (Iot) and Internet of Services (Ios), can become building blocks to pro
-gress towards a unified urban-scale ICT platform transforming a Smart City into an open innovation platform.
Moreover, we present some results of generic implementations based on the ITU-Tâ s Ubiquitous Sensor Network (USN
level (Iot to support the complexity of heterogeneous sensors deployed in ur -ban spaces), and at the service level (Ios as a suit of open and standardized en
-ablers to facilitate the composition of interoperable smart city services. We also discuss the need of infrastructures at the European level for a realistic
Smart Cities, Sensor and Actuator Networks, Internet of things Internet of Services, Ubiquitous Sensor Networks, Open, Federated and Trusted
innovation platforms, Future Internet 1 Introduction At a holistic level, cities are â systems of systemsâ,
and this could stand as the simplest definition for the term. However, one of the most well-known definitions was pro
design of urban-scale ICT platforms, three main core functionalities can be identified â¢Urban Communications Abstraction.
will enable data transfer services agnostic to the underlying connection protocol. Fur -thermore, a major challenge in future urban spaces will be how to manage the in
on top of a unified model so that data and information could be shared among dif -ferent applications and services at global urban levels.
Smart Cities at the Forefront of the Future Internet 449 with and manage all aspects of urban life in a cost-effective way.
-front of the recent vision of the Future Internet (FI. Although there is no universally accepted definition of the Future Internet, it can be approached as âoea socio-technical
system comprising Internet-accessible information and services, coupled to the physi -cal environment and human behavior,
and supporting smart applications of societal importanceâ 4. Thus the FI can transform a Smart City into an open innovation
â¢The Internet of things (Iot: defined as a global network infrastructure based on standard and interoperable communication protocols where physical and virtual
âoethingsâ are integrated seamlessly into the information network 5 â¢The Internet of Services (Ios: flexible, open and standardized enablers that facili
-tate the harmonization of various applications into interoperable services as well as the use of semantics for the understanding, combination and processing of data and
information from different service provides, sources and formats â¢The Internet of People (Iop: envisaged as people becoming part of ubiquitous
intelligent networks having the potential to seamlessly connect, interact and ex -change information about themselves and their social context and environment
At this point, it is important to highlight a bidirectional relationship between the FI and Smart Cities:
stimulate the development of new services and applications by various types of users and to help gathering a more realistic assessment of usersâ perspective by means of
-work 7 based on the user-driven approach is of main relevance, although in this paper we also advocate the need of large,
-nents of the Future Internet, namely Iot and Ios, can be essential building blocks in future Smart Cities open innovation platforms.
development of next generation urban Iot platforms are outlined in Section 3. Sec -tion 4 discusses the need for realistic urban-scale open
2 Iot and Ios as ICT Building blocks for Smart Cities In the analysis from Forrester research 9 on the role that ICT will play in creating
smart meters and monitoring devices can help monitor and manage water consumption, heating, air-conditioning, lighting and physical secu
Advanced location based services, social networking and collaborative crowdsourcing collecting citizensâ generated data By analyzing these different Smart Cities application scenarios, together with the
need of a broadband communication infrastructure that is becoming, or starting to be considered, the 4th utility (after electricity, gas and water), two major ICT building
Smart Cities at the Forefront of the Future Internet 451 â¢Recent advances in Sensors and Actuator Networks (SAN) are stimulating massive
Therefore Iot, essential to the FI, can be invaluable to provide the necessary technological support to manage in a homogeneous and sustainable way
Ios evolution must be correlated undoubtedly with Iot advances. Otherwise, a number of future Smart City services will never have an opportunity to be con
-ing Iot and Ios at the city scale Starting with the benefits of Iot technologies, they are twofold:
on the one hand they can increase the efficiency, accuracy and effectiveness in operation and man -agement of the cityâ s complex ecosystem and, on the other, they can provide the nec
-eration (NG) Iot platforms suitable to different usage areas and open business models to improve market dynamics by involving third parties in the value chain (SMES
Some of the essential functionalities identified as required for NG Iot platforms comprise the support for horizontality, verticality, heterogeneity, mobility, scalability
Cross-domain NG Iot platforms may foster the creation of new services taking advantage of the increasing levels of effi
Considering now the Ios, it must be stressed that it is recognized widely (see for example 12) that the real impact of future Iot developments is tied heavily to the
parallel evolution of the Ios. So, a Smart City could only become a true open innova
-tion platform through the proper harmonization of Ios and Iot. There can be a long
list of potential benefits for Smart Citiesâ services relaying on the same basic sensed information and a suite of application enablers (i e. from sensor data processing appli
-cations, to enablers for accessing multimedia mobile communications or social net -works, etc..Thus the integration of innovative principles and philosophy of Ios will
engage collective end-user intelligence from Web 2. 0 and Telco 2. 0 models that will
drive the next wave of value creation at urban scales, a key aspect typically missing in other technologically-driven initiatives
The technological challenge of developing the Ios has been assumed at EU level, and actions are being initiated to overcome the undesirable dissociation between technologi
-cal and service infrastructures 13. Of particular relevance for Smart Cities scenarios can be the relatively new evolving concept of a Global Service Delivery Platform GSDP
and deployed Iot plat -forms). ) In that way, an increasing number of Smart Citiesâ services could be searched
discovered and composed (following Web 2. 0/Telco2. 0 principles and including Qos trust, security,
IT/Telecom/Content services, Machine to machine-Machine (M2m) services, or entirely new service delivery models simultaneously involving virtual and real worlds
Iot Resources sensor & actuator networks Ios resources Testbed 1 USN-Enabler Service 1 Adaptation &
Homogeneization Testbed Control Layer GSDP SDP Entity exposure Service exposure Ios federation level Iot federation level
NGN /Telco2. 0 Web2. 0 Service 2 Iot Service Service n Domain ntestbed n A&h
Control Layer A&h Control Layer Other Enablers Domain 1 A&h Control Layer Fig. 1. Global Service Delivery Platform (GSDP) integrating Iot/Ios building blocks
3 Developing Urban Iot Platforms At present, some works have been reported of practical implementations in order to develop Iot platforms inspired by the Ubiquitous Sensor Networks concept from the
ITU-T USN Standardization Group 21. Some research teams have initiated already activities in this line, but there are currently very few references to them in the literature
ITUÂ s USN concept envisions a âoetechnological framework for ambient sensor networks not as simple sets of interconnected networks but as intelligent information infrastruc
-turesâ. The concept translates directly into cities, as they can be considered as one multidimensional ecosystem, where data is binding the different dimensions, as most
aspects are related closely (e g. environment and traffic, both of them to health, etc Smart Cities at the Forefront of the Future Internet 453
3. 1 USN Functionalities The main goal of a USN platform is to provide an infrastructure that allows the inte
sensor data (for example for energy monitoring, video surveillance or traffic con -trol). ) This functionality will provide a repository where observations/sensorsâ data
are stored to allow later retrieval or processing, to extract information from data by applying semantic annotation and data linkage techniques
â¢Publish-Subscribe-Notify: in other cases, services rely on some specific events happening in the city (such as traffic jams or extreme pollution situations.
The platform will allow services to subscribe not just to the observations provided by the sensors,
â¢Unified communication protocol: given the extension of an urban area, several standards can coexist to communicate sensors and sensor networks (Zigbee
communication protocol used. The platform should provide access to the informa -tion regardless the particular underlying communication protocol used
454 J. M. Hernã¡ndez-Muã oz et al â¢Horizontally layered approach: The platform should also be built following a lay
This capability will allow a seamless link between Iot and Ios, as discussed in Section 2
3. 2 USN Architecture for Urban Iot Platforms While the new wave of Next Generation Iot platforms are expected to be defined by
initiatives and projects like Iot-A 23, the IERC cluster 24 or the emerging PPP
Iot Core Platform Working group discussion 25, multiple different approaches for First Generation Iot-platforms are currently being implemented.
In essence, many of them are realizations of the described ITU-Tâ s model. For reference on the current
state of the technology, this Section describes a practical USN platform implementa -tion (more details can be found in 22),
advanced Iot platforms. As shown in Figure 2, a functional specialization of the building blocks has been applied in this work
IMS User Equipment USN-Gateway SIP Services Web Services Configuration A A A D evice
M anagem ent Application /Service Layer Control Layer Access Layer Service Protocol Adapter Notification Entity (NE
Messages & Data Format Adapter Communication Protocol Adapter Fig. 2. High-level Architecture of a USN Iot Platform
Smart Cities at the Forefront of the Future Internet 455 As sketched in the figure,
the USN platform is based on two components, the USN -Enabler (that interfaces services) and the USN-Gateways (that interacts with Sensor
Sensor Web Enablement (SWE) activity 26. Its goal is the creation of the founda -tional components to enable the Sensor Web concept,
where services will be capable to access any type of sensors through the web. This has been reflected by a set of
standards used in the platform (Sensorml, Observation & Measurements, Sensor Observation Service, Sensor Planning Service, Sensor Alert Service and Web Notifi
-cation Service 26. Besides the SWE influence, the USN-Enabler relays on existing specifications from the OMA Service Environment (OSE) 27 enablers (such as
The USN-Gateway represents a logical entity acting as data producers to the USN -Enabler that implements two main adaptation procedures to integrate physical or
â¢Communication protocol Adaptation. As a connection point between two networks sensors networks deployed throughout the city and the core IP communication
network), the main responsibility is to provide independence from the communica -tion protocol used by the sensor networks
â¢Sensor Data format Adaptation. This functionality is intended to provide USN -Enabler both Sensorml (meta-information) and O&m (observation & measure
-ments) data from specific SANS data (i e. Zigbee Adaptation and Homogenization are two key requirements for the USN Platform
needed to enable an evolving FI based on the Iot and Ios paradigms Functionalities required to support services are offered both in synchronous and
â¢The Notification Entity (NE) is the interface with any sensor data consumer that require filtering or information processing over urban-generated data.
The main functionalities provided by this entity are the subscription (receive the filter that will be applied), the analysis of the filters (analyze the filter condition) and the no
the sensor network, like for example a request to gather data, without the need to wait for an answer.
desired data gets available it will receive the corresponding alert. This is mainly used for configuration and for calling actuators
Web Services and SIP requests and responses â¢The Catalogue and Location Entity (CLE) provides mechanisms in a distributed
performing the request a user might be interested In for example, in an architec -ture where several Sensor Description Entities (SDES) exist,
-mation about the feasibility of an algorithm or a protocol in the field In many cases, due to practical and outside plant constraints, a number of issues
on technologies of the Iot. The resulting scale and heterogeneity of the environment makes it an ideal environment for enabling the above mentioned broad range of experi
-Smart Cities at the Forefront of the Future Internet 457 mentation needs. Furthermore, a city can serve as an excellent catalyst for Iot research
as it forms a very dense techno-social ecosystem. Cities can act as invaluable source of
required for testing of Iot as well as other Future Internet technologies for market adop -tion. This new smart city model can serve as an excellent incubator for the development
User Developed App Tinyos Contiki Sunspot  Tinyos Contiki Sunspot  Opencom Middleware Mobility support
Horizontal support Federation support S ecurity, Privacy and Trust Fig. 3. Smartsantander: A city-scale platform architecture
services and applications for the Iot. The facility will allow large-scale experimenta -tion and testing in a real-world environment.
-vice design phases, applying user-driven innovation methodologies. Furthermore, it will be used also to provide real services to citizens.
-nities of users, other entities that are willing to use the experimental facility for de
and Internet researchers to vali -date their cutting-edge technologies (protocols, algorithms, radio interfaces, etc Several use cases are currently under detailed analysis for their experimental de
-ployment taking into account relevant criteria from local and regional authorities. An illustrative list of these use cases is
â¢Tourism information in different parts of the city through mobile devices using visual and interactive experiences and in different languages
Smart Cities at the Forefront of the Future Internet 459 â¢Video monitoring for traffic areas, beach areas and specific events in public places
initiatives on both Iot and Ios areas as WISEBED 25, SENSEI 8 and the USN
Iot Platform (presented in Section 3) including Web 2. 0 and Telco 2. 0 design princi
the FIRE testbed user, the service provider, the service consumers (citizens), the Smartsantander facility administrators, and individ
the subsystems (collectively, the Smartsantander middleware) that provide the func -tionality described by these requirements
i) Access control and IOT Node Security subsys -tem, ii) Experiment Support Subsystem, iii) the Facility Management Support Sub
Iot nodes, and component interactions and information models used to fulfill the sub -systemâ s functionality
-tific community, end users and service providers. This will not only reduce the tech -nical and societal barriers that prevent the Iot concept to become an everyday reality
but also will attract the widest interest and demonstrate the usefulness of the Smart -Santander platform
Future Internet potential, through Iot and Ios, for creating new real-life applications and services is huge in the smart city context.
First time success of large Iot deploy -ments is jeopardized seriously by the lack of testbeds of the required scale, and suitable
-tions and, validation of their viability as candidate solutions for real life Iot scenarios At present, some practical implementations of advanced USN platforms 22 have
extending its scope to broader M2m scenarios, and large scale deployments for ex -perimental smart urban spaces.
-twining Iot and Ios worlds. Referred Iot USN platform is currently being evolved with the addition of new capabilities,
and integrated within other components being previously developed by the EU projects SENSEI 8 and WISEBED 33 to imple
-ment a city scale infrastructure for Iot technologies experimentation within the Smartsantander project. In this project, a large infrastructure of about 20,000 Iot
devices is addressed. Currently, the deployment of the first 2, 000 sensors in the urban environment is been carried.
that many nontechnical constraints must be considered (users, public administrations vendors, etc..In this sense, what may be evident from a purely technique perspective
term, the behavior of massive wireless sensor deployments Acknowledgements. Although only a few names appear on this paper, this work
Future Internet applications relevant for smart cities, an ICT application area example: smart & proactive energy management, Open Innovation by FI-enabled services
Smart Cities at the Forefront of the Future Internet 461 4. Position Paper: Research Challenges for the Core Platform for the Future Internet.
In: M Boniface, M. Surridge, C. U (Eds. http://ec. europa. eu/information society /activities/foi/library/docs/fippp-research-challenges-for-core
-platform-issue-1-1. pdf 5. Sundmaeker, H.,Guillemin, P.,Friess, P.,Woelfflã, S. eds.:
Vision and Challenges for Realising the Internet of things, CERP-Iot, March 2010. European commission, Brussels 2010 6. Future Internet Assembly 2009, Stockholm, Sweden (November 2009), http://ec
europa. eu/information society/activities/foi/library/docs/fi-stock -holm-report-v2. pdf 7. The European Network of Living Labs, http://www. openlivinglabs. eu
/8. SENSEI â Integrating the Physical with the Digital World of the Network of the Future
State of the art â Sensor Frameworks and Future Internet (D3. 1). Technical report (2008 9. Belissent, J.:
Getting Clever About Smart Cities: New Opportunities Require New Busi -ness Models, 2 november 2010. Forrester research (2010
Towards a Future Internet Public Private Partnership, Usage Areas Workshop, Brussels 3 march (2010), http://ec. europa. eu/information society/activities/foi
/events/fippp3/fi-ppp-workshop-report-final. pdf 12. Real world Internet (RWI) Session, FIA meeting, Prague (May 2009
http://rwi. future-internet. eu/index. php/RWISESSION PRAGUE 13. COM: A public-private partnership on the Future Internet.
Brussels, 28 october (2009 http://ec. europa. eu/information society/activities/foi/library/docs /fi-communication en. pdf
14. DG INFSO Task force on the Future Internet Content. Draft Report of the Task force on
Interdisciplinaryresearch Activities applicable to the Future Internet, Version 4. 1 of 13.07.2009 (2009), http://forum. future-internet. eu
15. NESSI Strategic Research Agenda, http://www. nessi-europe. com/files/Re -searchpapers/NESSI SRA VOL 3. pdf
16. Gluhak, A.,Bauer, M.,Montagut, F.,Stirbu, V.,Johansson, M.,Bernat-Vercher, J Presser, M.:
Towards an architecture for a Real world Internet. In: Tselentis, G.,et al eds.)) Towards the Future Internet, IOS Press, Amsterdam (2009
17. Fisher, S.:Towards an Open Federation Alliance. The WISEBED Consortium. Lulea, July 2nd, 2009.22.
In: Balazinska, M.,et al. eds.)) Data Management in the Worldwide Sensor Web. IEEE PERVASIVE computing, April-June (2007
18. Panlab Project, Pan European Laboratory Infrastructure Implementation http://www. panlab. net/fire. html 19.
Global service delivery platform (GSDP) for the future internet: What is it and how to use
it for innovation? http://services. future-internet. eu/images/d/d4/Report GSDPPANEL-FISO-FIA-Madrid-draft%2breqs. pdf
20. Future Internet Assembly, Meeting Report, Madrid, Spain, 9thâ 10th december (2008 http://ec. europa. eu/information society/activities/foi/library
/docs/madrid-conference-report-v1-1. pdf 21. ITU TSTAG: A preliminary study on the Ubiquitous Sensor Networks.
TSAG-C 22-E February 2007 22. Bernat, J.,Marã N s.:Gonzã¡lez. A.,Sorribas, R.,Villarrubia, L.,Campoy, L.,Hernã¡
ndez L. Ubiquitous Sensor Networks in IMS: an Ambient Intelligence Telco Platform. ICT Mo -bile Summit, 10-12 june, Stockholm (2008
23. Internet of things Architecture project, http://www. iot-a. eu/public/front-page 462 J. M. Hernã¡
ndez-Muã oz et al 24. Iot European Research Cluster, http://www. internet-of-things-research. eu
/25. White paper on the FI PPP definition (Jan. 2010), http://www. future-internet eu/fileadmin/initiative documents/Publications/White paper/EFII
White paper 2010 public. pdf 26. Botts, M.,Percivall, G.,Reed, C.,Davidson, J.:âoeogc Sensor Web Enablement:
Overview and High Level Architectureâ, Open Geospatial Consortium Inc. White paper Version 3 2007 27. OMA Service Environment Archive, http://www. openmobilealliance. org
/technical/release program/ose archive. aspx 28. Oulu Smart City, http://www. ubiprogram. fi /29. Cambridge (MA) Smart City, http://www. citysense. net
/30. Friedrichshafen Smart City http://www. telekom. com/dtag/cms/content/dt/en/395380 31.
Sense Smart City project, http://sensesmartcity. org /32. Smartsantander project, FP7-ICT-2010-257992, http://www. smartsantander. eu
WISEBED-Wireless Sensor Network Testbeds, http://www. wisebed. eu 34. Onelab2, ONELAB project, http://www. onelab. eu
NGNI, http://www. fokus. fraunhofer. de/en/ngni/index. html Author Index Alonistioti, Nancy 259,277
Future Internet Foundations: Architectural Issues Introduction to Part I Towards a Future Internet Architecture Introduction
Definitions Analysis Approach Design Objectives Conclusions References Towards In-Network Clouds in Future Internet Introduction
Designs for In-Network Clouds Realisation: In-Network Cloud Functionality Conclusion References Flat Architectures: Towards Scalable Future Internet Mobility
Introduction Traffic Evolution Characteristics and Scalability Problems of the Mobile Internet Evolution of Flat Architectures
Distributed Mobility Management in Flat Architectures Conclusion References Review and Designs of Federated Management in Future Internet Architectures
Introduction Challenges for Future Internet Architectures Rationale for Federation in the future Internet Federated Management Activity in the future Internet
Federated Management Architecture End-to-end Federated Service Management Scenarios Summary and Outlook References An Architectural Blueprint for a Real-world Internet
Introduction The Real world Internet Reference Architecture Analysis of Existing Architectures Concluding Remarks References Towards a RESTFUL Architecture for Managing a Global Distributed Interlinked Data-Content-Information Space
Introduction The Interdatanet Content-Centric Approach Conclusion References A Cognitive Future Internet Architecture Introduction Architecture Concept
Cognitive Future Internet Framework Architecture Experimental Results Conclusions References Title Model Ontology for Future Internet Networks
Future Internet Works Some other Future Internet and Ontology Works Ontology at Network Layers Entity Title Model Concepts and Semantics
Cross Layer Ontology for Future Internet Networks Conclusion Part II: Future Internet Foundations: Socioeconomic Issues
Introduction to Part II Assessment of Economic Management of Overlay Traffic: Methodology and Results Introduction
Methodology of Assessment Locality Promotion Insertion of Additional Locality-Promoting Peers/Resources Concluding Remarks References
Deployment and Adoption of Future Internet Protocols Introduction A Framework for the Deployment and Adoption of Future Internet Protocols
Multipath TCP Congestion Exposure Enhancing the Framework Conclusions References An Approach to Investigating Socioeconomic Tussles Arising from Building the Future Internet
Introduction A Methodology for Identifying and Assessing Tussles Taxonomy of Socioeconomic Tussles Survey of Work on Social
and Economic Tussles as Highlighted in FP7 Projects Conclusions and Future Work References Part III:
Future Internet Foundations: Security and Trust Introduction to Part III Security Design for an Inter-Domain Publish/Subscribe Architecture
Introduction Basic Concepts Architecture Phases of Communication Related Work Conclusion and Future Work References Engineering Secure Future Internet Services
Introduction Future Internet Services The Need for Engineering Secure Software Services Research Focus on Developing Secure FI Services
Security Requirements Engineering Secure Service Architecture and Design Security Support in Programming Environments Secure Service Composition
Secure Service Programming Platform Support for Security Enforcement Embedding Security Assurance and Risk management during SDLC
Security Assurance Risk and Cost Aware SDLC Conclusion Towards Formal Validation of Trust and Security in the Internet of Services
Introduction Specification Languages Automated Validation Techniques Orchestration Model Checking of SOAS Channels and Compositional Reasoning
Abstract Interpretation The AVANTSSAR Platform and Library Case studies, Success Stories, and Industry Migration Conclusions and Outlook
Trustworthy Clouds Underpinning the Future Internet Cloud computing and the Future Internet Trust and Security Limitations of Global Cloud Infrastructures
Cloud Security Offerings Today Today's Datacenters as the Benchmark for the Cloud New Security and Privacy Risks and Emerging Security Controls
Isolation Breach between Multiple Customers Insider Attacks by Cloud Administrators Failures of the Cloud Management Systems
Lack of Transparency and Guarantees What about Privacy Risks Open Research Challenges Outlook â The Path Ahead
Data Usage Control in the future Internet Cloud Introduction Primelife Privacy Framework Open Challenges Towards Privacy Policy Enforcement in the Cloud
Conclusions Part IV: Future Internet Foundations: Experiments and Experimental Design Introduction to Part IV A Use-Case on Testing Adaptive Admission Control and Resource Allocation Algorithms on the Federated Environment of Panlab
Introduction Use Case Description Technical Environment, Testbed Implementation and Deployment Running and Operating the Experiment
Conclusions References Multipath Routing Slice Experiments in Federated Testbeds Introduction Experiment Objectives and Requirements for a Concurrent Multipath Transport
Experiment Setup Experimental Results for Multipath Routing Slices Active Measurements with PLE and ETOMIC Passive Measurements with VINI and GLAB
Lessons Learned for the Usage of Federated Experimental Facilities Challenges while Preparing the Experiments Observations on the Single Testbeds
Sharing and Standardizing Measurement and Observation Tools Conclusion Testing End-to-end Self management in a Wireless Future Internet Environment
Introduction Experimental Facilities Decription Mechanism for Service-Aware Network Self management Performance Results Conclusion References Part V:
Future Internet Areas: Networks Introduction to Part V Challenges for Enhanced Network Self-Manageability in the Scope of Future Internet Development
Introduction â Moving Towards the Future Internet Network Management Activities in the Self-NET Scope
Challenges and Benefits for the Market Sector Experimental Results for Network Coverage and Optimization Conclusion
Efficient Opportunistic Network Creation in the Context of Future Internet Introduction Related Work Solution Approach Based on ONS
An Architecture for a Sustainable Future Internet Introduction Challenges Model Virtual Infrastructures A Novel Layered Architecture
Future Internet Areas: Services Introduction to Part VI SLAS Empowering Services in the future Internet Introduction Reference Architecture for SLA Management
Adoption Aspects Use Case â Enterprise IT Use Case â ERP Hosting Use Case â Service Aggregation
Meeting Services and Networks in the future Internet Ontological Approach in FINLAN Ontological Layers Representation FINLAN Ontology Example
Contributions to the Future Internet Works Collaboration to the Autoi Planes Collaboration to the RESERVOIR Service Provider
Collaboration to the Complexity Reduction for {User, Service, Content}- Centric Approaches Integration between Services and Networks
Fostering a Relationship between Linked Data and the Internet of Services Introduction Linked Data Services on the Web
Linked Services Conclusions References Part VII: Future Internet Areas: Content Introduction to Part VII Media Ecosystems:
A Novel Approach for Content-Awareness in Future Networks Introduction Background System Architecture Business Actors and Policy Implications
Conclusions References Scalable and Adaptable Media Coding Techniques for Future Internet Introduction Scalable Video Coding
Scalable Multiple Description Coding (SMDC Scalable Video over P2p Network Multiple Description Coding over P2p Network
Three-Level Multimedia Representation Semantic Inference for Video Annotation and Retrieval Experiments Conclusions Acknowledgments Part VIII:
Future Internet Applications Introduction to Part VIII Future Internet Enterprise Systems: A Flexible Architectural Approach for Innovation
Introduction A Long March towards Component-Based Enterprise Systems Guidelines for a FINES Architecture The New Frontier for ES Components:
Renewable Energy Provisioning for ICT Services in a Future Internet Introduction Provisioning of ICT Services over Mantychore FP7 and GSN with Renewable Energy
Virtual Data center Migration Federated Network Conclusion References Smart Cities and the Future Internet: Towards Cooperation Frameworks for Open Innovation
Introduction City and Urban Development Challenges Future Internet Experimentation and Living Labs Interfaces Emerging Smart City Innovation Ecosystems
Conclusions and Outlook References Smart Cities at the Forefront of the Future Internet Introduction Iot and Ios as ICT Building blocks for Smart Cities
Developing Urban Iot Platforms The Need of Urban Scale Experimental Facilities Conclusions References Author Index
<</ASCII85ENCODEPAGES false /Allowtransparency false /Autopositionepsfiles true /Autorotatepages/None /Binding/Left /Calgrayprofile (Gray Gamma 2. 2
/Calrgbprofile (srgb IEC61966-2. 1 /Calcmykprofile (ISO Coated v2 300%50eci 51 /srgbprofile (srgb IEC61966-2. 1
/Cannotembedfontpolicy/Error /Compatibilitylevel 1. 3 /Compressobjects/Off /Compresspages true /Convertimagestoindexed true /Passthroughjpegimages true /Createjdffile false
>/NLD (Gebruik deze instellingen om Adobe PDF-documenten te maken die zijn geoptimaliseerd voor weergave op een beeldscherm, e-mail en internet.
De gemaakte PDF-documenten kunnen worden geopend met Acrobat en Adobe Reader 5. 0 en hoger
>/ENU (Use these settings to create Adobe PDF documents best suited for on-screen display, e-mail,
and the Internet. Created PDF documents can be opened with Acrobat and Adobe Reader 5. 0 and later
/DEU<FEFF004A006F0062006F007000740069006F006E007300200066006F00720020004100630072006 006200610074002000440069007300740069006c006c0065007200200037000d00500072006f006 00750063006500730020005000440046002000660069006c0065007300200077006800690063006 00200061007200650020007500730065006400200066006f00720020006f006e006c0069006e006 002e000d0028006300290020003200300031003000200053007000720069006e006700650072002 005600650072006c0061006700200047006d006200480020 >>>Namespace Adobe Common 1. 0 /Othernamespaces <</Asreaderspreads false
/Cropimagestoframes true /Errorcontrol/Warnandcontinue /Flattenerignorespreadoverrides false /Includeguidesgrids false /Includenonprinting false /Includeslug false /Namespace Adobe Indesign
4. 0 /Omitplacedbitmaps false /Omitplacedeps false /Omitplacedpdf false /Simulateoverprint/Legacy >><Addbleedmarks false /Addcolorbars false /Addcropmarks false
/Addpageinfo false /Addregmarks false /Convertcolors/Converttorgb /Destinationprofilename (srgb IEC61966-2. 1 /Destinationprofileselector/Usename /Downsample16bitimages true
Adobe Creativesuite 2. 0 /PDFXOUTPUTINTENTPROFILESELECTOR/NA /Preserveediting false /Untaggedcmykhandling/Usedocumentprofile /Untaggedrgbhandling/Usedocumentprofile /Usedocumentbleed false >>>setdistillerparams
Overtext Web Module V3.0 Alpha
Copyright Semantic-Knowledge, 1994-2011