Synopsis: Ict:


Survey on ICT and Electronic Commerce Use in Companies (SPAIN-Year 2013-First quarter 2014).pdf.txt

Seven out of 10 of them have a website -The percentage of companies with 10 or more employees using mobile broadband

98.3%of Spanish companies with 10 or more employees had an Internet connection in the first quarter 2014.

Moreover, the use of computers has expanded to almost the entirety of these companies (99.2%).%)In turn, 87.3%had a Local area network (LAN) installed, and

61.9%had a Wireless Local area network 95.3%of companies were set up with mobile phones On the other hand, 75.8%of companies with Internet access had a website.

In those with 250 or more employees, this percentage reached 95.7 %Percentage over the total number of companies with 10 or more employees

Number of employees TOTAL 10 to 49 50 to 249 250 or more %of companies with

-Computers 99.2 99.1 99.5 99.8 -Local area network 87.3 85.9 95.0 97.7 -Wireless Local area network 61.9 59.5 74.2 81.1

-Internet connection 98.3 98.2 99.1 99.8 -Mobile telephony 95.3 94.8 97.8 99.4 -Other technologies (for example, GPS, TPV, etc.

38.0 37.5 39.5 47.0 %of companies with an Internet connection and website (1) 75.8 73.4 87.5 95.7

%of companies that provide their employees with portable devices that allow a mobile connection to the Internet for

business purposes (1 54.6 50.1 77.2 90.3 1) Percentage over the total number of companies with an Internet connection

Use of ICT infrastructures by company size First Quarter 2014 2 54.6%of companies issued their employees with portable devices, enabling connection to

the internet for company use. 36.4%of these were laptop computers, and 49%were smartphones or PDA phones

Employment and ICT training 25.1%of companies hired ICT experts and 11.1%hired new experts in 2013

In turn, 22.9%of companies invested in ICT training in 2013. For companies with 250 or

more employees, this figure reached 59.8%,that is, six points over that of the last year

On the one hand, an increase of nearly four points in the use of mobile broadband and in the

possession of a website can be observed. On the other hand, the growth was slighter regarding ICT use for interacting with Public Administrations (from 90.4%to 91.1

Internet connection and Website (1 Mobile telephone broadband connection 1 Use of the Internet to interact with the Public

Administration (1 Fixed broadband connection (1 1) Â Percentageâ overâ theâ totalâ Â numberâ ofâ companiesâ withâ anâ Internetâ connection

2013 2014 3 Types of Internet connection 99.9%of companies with 10 or more employees with an Internet connection accessed it via

a broadband solution (fixed or mobile. The technologies used the most were access via DSL

solutions (90.4%)and 3g or 4g mobile phones (74.2 %Companies with an Internet connection by type of that connection

Percentage out of the total number of companies having 10 or more employees and an Internet connection

First Quarter 2014 Number of empoyees TOTAL 10 to 49 50 to 249 250 or more

Broadband (fixed or mobile) 99.9 99.8 100.0 100.0 Fixed broadband connection 98.1 97.9 99.1 99.7

-By means of 3g or 4g modem 55.0 51.1 73.7 88.6 -By means of Mobile 3g or 4g 74.2 71.7 86.4 92.4

Other mobile connections (GPRS, EDGE, etc. 23.7 21.0 35.8 50.6 Website availability and use The main services offered by companies with 10

or more employees via their website were company introduction (90.5%),privacy policy statement or certification related to website

security (65.2%)and access to catalogues and price lists (52.8 %Services available on the website Percentage over the total number of companies with 10 or more employees and an Internet connection

First Quarter 2014 Company introduction 90.5 Privacy policy statement or certification related to website security 65.2

Access to product catalogues or price lists 52.8 Links or references to the social media profiles of the company 34.7

Possibility of electronic submission of complaint forms 26.4 Posting vacancies or receiving online job applications 21.1

Ordering or booking online 16.9 Online order tracking 11.1 Website customisation for regular users 8. 4

Possibility of customers customising or designing products 7. 38 4 Seven out of 10 companies used digital signatures in some communication with external

agents. Of these, 98.4%used them to deal with the Public Administrations, and 17.2%to do

so with suppliers and clients In the year 2013,91. 1%of companies interacted with the Public Administrations via the

Internet. The main objectives were obtaining information from the websites of the Public Administrations (80%),downloading of forms (78.2),

%and filling tax forms by means of a full electronic management (76.6 %Use of social media by companies with 10 or more employees

36.9%of companies used any social media due to work issues Among them, 92.4%used social networks (Facebook, Linkedin, Tuenti, Google+,Viadeo

Yammer,..,),40.9%used company blogs or microblogs (Twitter, Presently, Blogger Typepad etc. and 39.6%did so with websites that share multimedia content (Youtube

Flickr, Picassa, Slideshare, Instagram The social media least used were based Wiki tools for sharing knowledge (website whose

pages may be edited by multiple volunteers via a web browser), representing 12.9 %The main uses of social media were aimed towards marketing, advertising and image

management (72.1%)and as a user information channel (56.8 %Out of the total number of companies, 87.3%stated that social media was useful, to a higher

or lesser extent, for the development of their business Use of Cloud computing solutions by companies with 10 or more employees

At the beginning of 2014,15%of companies used Cloud computing solutions. Those used the most were information storage (69),

%e-mail service (61.4%)and company database server (54.7 %53.4%of the companies that used Cloud computing did so by paying any service existing in

servers of shared services suppliers The main reasons that limited the companies using this service were the uncertainty about

laws (32.3%),the risk of corporate security holes (31%)and the high price of Could Computing services (27.8

%The companies that did not use this service stated that they did not do so since their

knowledge of this type of technology was advanced not very (46.5) %and/or it was not

necessary for developing their business (45.9 %5 ICT use by Autonomous Community Companies with 10 or more employees whose headquarters are located in Cataluã a

Comunidad de Madrid and Principado de Asturias presented the greatest intensities in their use of ICT in the first quarter 2014

*Conversely, those companies in the Autonomous Cities of Ceuta and Melilla and those companies in the Autonomous Communities of Extremadura and Castilla-La Mancha had the

lowest percentages of use of information technologies *The intensities in the use of Information and Communication Technologies refer to the following indicators

Internet connection, Interaction with the Public Administrations, Mobile broadband, Website, Use of Social media and Cloud computing First quarter 2014

Internet Connection Interaction with the Public Administration (1 Mobile Broadband Connection (1 Internet connection and

Website (1 Use of Social Media (1 Cloud Computing (1 TOTAL 98.3 91.1 78.3 75.8 36.9 15.0

Andalucã a 97.6 94.4 74.9 70.9 40.5 11.2 Aragã n 98.8 91.7 80.8 77.8 32.3 12.1

Asturias, Principado de 98.6 92.4 83.1 80.3 37.2 11.5 Balears, Illes 99.4 89.1 76.5 71.4 35.5 12.1

Canarias 98.9 94.5 72.0 63.4 40.5 15.1 Cantabria 97.8 95.3 79.0 77.1 35.9 7. 2

Castilla y Leã n 98.2 94.2 73.8 72.2 32.2 7. 9 Castilla-La Mancha 96.7 89.3 76.8 68.3 32.3 9. 3

1) Percentage over the total number of companies with an Internet connection Use of ICT by Autonomous Community and Autonomous City in which the company is

Use of Internet, Website and Mobile broadband by Autonomous Community and Autonomous City in which the company is

Mobile broadband Internet and website 7 E-commerce Sales via e-commerce by companies with 10 or more employees

12.2%of companies carried out sales via electronic commerce on a website. The total value of these transactions was 59,315 million euros, 30.3%of the total electronic commerce

68.2%of the sales by e-commerce were to companies (Business to business, B2b. The percentage of sales to final consumers (Business to consumer, B2c) was 29.9%.

%Lastly sales to the Public Administrations (Business to Government, B2g) represented 2. 0 %Purchases via e-commerce by companies with 10 or more employees

26.9%of companies carried out purchases via electronic commerce on a website. The total value of these transactions was 87,517. 9 million euros, 44.8%of the total electronic

72.3%of companies with fewer than 10 employees had computers, and 24.4%had a Local

Area Network (LAN) installed, according to the data from the first quarter 2014 67.7%of micro-companies had Internet access,

28.7%of companies with Internet access had a website. One year prior, this percentage was 29.3

-Computers 71.6 72.3 -Local area network 24.0 24.4 -Wireless Local area network 16.4 17.6 -Internet connection 65.7 67.7 -Broadband (fixed or mobile) Internet connection (1) 98.5 99.0

Mobile telephone 74.6 76.5 Other ICT infrastructures (i e. GPS, TPV, etc. 21.4 21.7 %companies having Internet connection and website/webpage (1) 29.3 28.7

1) Percentage over the total number of companies with less than 10 employees and an Internet connection

Evolution of ICT use in companies with fewer than 10 employees ICT use also had an uneven behaviour in companies with fewer than 10 employees between

the first quarter 2013 and the same period of 2014 Mobile broadband access experienced the most significant increase, from 56.8%to 66.4

%29.3 %56.8%61.4 %94.2 %28.7 %66.4%66.2 %92.8 %0 25 50 75 100 Internet connection and website (1

Mobile broadband connection (1 Interaction with the Public Administration by the Internet (1 Fixed broadband

connection (1 1) Percentage over the total number of companies with an Internet connection 2013 2014

11 Methodological annex The survey on the Use of Information and Communication Technologies (ICT) and Electronic

Commerce in Companies is integrated in the statistics plans of the European union designed to quantify the Information Society.

It is governed by European parliament and Council Regulation No. 808/2004, for carrying out statistics regarding the Information Society.

Communication Technologies based on Open sources (CENATIC Moreover, there is another partnership agreement with the Ministry of Industry, Tourism and

Telephone numbers: 91 583 93 63/94 08 †Fax: 91 583 90 87-gprensa@ine. es

Information Area: Telephone number: 91 583 91 00 †Fax: 91 583 91 58 †www. ine. es/infoine/?

/L=1


Survey regarding reistance to change in Romanian Innovative SMEs From IT Sector.pdf.txt

Quantitative Methods Inquires 105 SURVEY REGARDING RESISTANCE TO CHANGE IN ROMANIAN INNOVATIVE SMES FROM IT SECTOR1

Eduard Gabriel CEPTUREANU Phd, Assistant professor Bucharest University of Economic Studies, Romania E-mail: eduard ceptureanu@yahoo. com

Abstract Unfortunately, few changes predominantly generate positive effects involving major effort and costs are often not far short of expectations.

innovative Romanian SMES, we use a survey database that was collected by Romanian National Trade Registration Office-main legal entity with function of keeping the register of

large companies and was implemented by means of computer-assisted telephone interviewing. Data collection was done over a 2 month period during September-October

2014. To reliably identify trends only respondents with long tenure and representing enterprises that systematically innovate

innovation data, see OECD, 2005. Secondly, respondents had to be involved at least in one implementation of change management process during the last 5 years.

companies NACE code principal-6201 (Activities to develop custom software (software -oriented client), 20.9%CAEN 6202 (consultancy activities information technology), 1. 2

%-0†9â employees 27 %10†249â employees 50 %50†249â employees 19 %overâ 250â employees

%-NACE code 6209 (Other information technology service activities), 10,9%-NACE 6311 data processing, hosting and related activities), 1, 2%-NACE 6312 (activities of web portals

and 6391 and 1%mainly operate on CAEN code 6399 and 6391 (Other information service activities


Tepsie_A-guide_for_researchers_06.01.15_WEB.pdf.txt

WP2 analysed available data to better understand the growth, impact and potential for social innovation in Europe.

require much more broad-scale data WP3: Removing barriers to social innovation The development and growth of social innovation

Data and monitoring Most of the future research questions we identified would benefit greatly from advanced databases

containing information on social innovation social needs, the social economy and its innovative potential, other environments of social innovation

into existing data sources on national technological innovation systems Social movements, power and politics Much of the existing literature on social innovation

enabled new forms of collaboration between users and firms. The concept and practice of †open

or social media platforms such as Facebook and Twitter) and social innovations. According to Hochgerner, what distinguishes innovations from

social innovations are intended the aims and objectives, and not necessarily the outcomes which may overlap. 22 Murdock

core of social innovations is this intention to create something better. But while these motivations might

is no data to be found on employment in the social economy. Thus, we are still lacking more

comprehensive and comparable data on the sector The Third Sector Impact project that started early in

2014 will help to make this data available. 48 Nonetheless, the extent to which social economy

to producing reliable data Concerning metrics for social innovation, we found that there are significant overlaps between

field and tap into existing data sources on national technological innovation systems Examples for such established metrics that

survey-based data related to social innovation are necessary. Considering the importance of entrepreneurial activities as push-factors for

social innovation, we need empirical survey data on organisations that are socially innovative in order to better understand how social innovation

existing knowledge and data sources on national technological innovation systems and make attempts to identify patterns in these systems

Information systems Management 31 (3), S 200†224 Knowing what works at the micro level As social innovation is an area of increasing interest

more homogeneous data about social innovation and opportunities for social innovations in future DEFINING MEASURING

, crowdsourcing), problem solving (e g.,, co -design), and taking and influencing decisions (e g participatory budgeting. Our research further

the participation, co-operation and †buy in†of users Legitimacy of projects And fourth, citizen engagement can have the

the adoption of the core †content†of the innovation. After this initial period, their role is

their role is to allow the core innovation to fit into a new context. But sometimes adaptations

 New flows of information (open data  Developing the knowledge base INTERMEDIARIES  Social innovation networks

 Platforms for open data/exchange of ideas Providing programmes/interventions  Networking opportunities/events

their role is to allow the core innovation to fit into a new context. But sometimes adaptations

 New flows of information (open data  Developing the knowledge base INTERMEDIARIES  Social innovation networks

 Platforms for open data/exchange of ideas Providing programmes/interventions  Networking opportunities/events

like the internet, the world-wide-web, social media and mobile devices, new ways of carrying out social innovation have become possible.

Often this means the barriers to social innovation (e g. connectivity outreach and scaling) have been reduced and

their relationships with offline communities It also enables new network effects at a scale not possible without digital technology which

For example, standard ICT, including web portals, mobile apps and social media, which are widely and inexpensively available, is being used

in the TEM initiative in Greece55 to support a local currency for the exchange of goods and services

public sector who use data to better target pockets of social need and tailor interventions or services

initiative in the UK57 uses the internet and mobile apps for identifying someone†s needs (e g.,

which are data-and analytics-heavy, and where high speed and global reach are important through reductions in

-and offline knowledge communities, and are able to nurture social capital both virtually and physically

Data and monitoring It is clear that we require more and better data on social innovation, social needs, the social economy

and its innovative potential, other environments of social innovation, relevant actors and networks technological innovations, etc.

greatly from advanced databases containing information on these and other variables. For instance, we could learn more about the complex

more advanced and nuanced databases would yield Currently, different approaches to create such databases are on their way:

The research centre CRISES81 in Canada builds a relational database on social innovations; the SI-Drive project82 will

produce a database of around 1000 global social innovations; and the ICSEM project83 based in

Belgium is in the process of building a database on different types of social enterprises all over the world.

develop a standard structure that allows such data to be combined and compared Civil society and the social economy as

data for sound analyses. We need to dig deeper into the numerous variables determining in how far

requires much more empirical data, in particular data separately considering socially innovative organisations 38 SOCIAL INNOVATION THEORY AND RESEARCH

Effective collaborations It is evident that the nature of social innovations requires various actors to collaborate to make them

upon, and tap into existing data sources on national technological innovation systems Social movements, power and politics

•Social Innovation Exchange †the global network of social innovators www. socialinnovationexchange. org •Siresearch. eu †a platform which brings together

users and communities †but equally, some innovation developed by these sectors does not qualify as social innovation

http://ec. europa. eu/bepa/pdf/publications pdf/social innovation. pdf 19. Murray R, Caulier-Grice J, Mulgan G. 2010.

The Open Book of Social Innovation, London: NESTA 20. Committee for Scientific and Technological Policy

/fileadmin/Downloads/Trendstudien/IMO%20 Trendstudie howaldt englisch final%20ds. pdf 23. Nicholls A, Murdock A. 2012. Social Innovation

Blurring Boundaries to Reconfigure Markets, Palgrave Macmillan 24. Ibid 25. Moulaert F.,et al (ed).(2013.

Avelino etal transit workingpaper 2014. pdf 30. Westley F. 2008. The Social Innovation Dynamic Social Innovation Generation, University of Waterloo

http://ec. europa. eu/bepa/pdf /publications pdf/social innovation. pdf 39. Howaldt J, Schwarz M. 2010.

Social Innovation Concepts, Research Fields and International Trends. Available at www. internationalmonitoring. com /fileadmin/Downloads/Trendstudien

/IMO%20trendstudie howaldt englisch final%20 ds. pdf 40. Lindhult, Eric (2008: Are Partnerships Innovative In: Lennart, Svensson/Barbro, Nilsson (eds

Partnership †As a Strategy for Social Innovation and Sustainable Change. Stockholm: Satã runs Academic

/fileadmin/Downloads/Trendstudien/IMO%20 Trendstudie howaldt englisch final%20ds. pdfa 42. Nicholls & A Murdock, Social Innovation:

63. www. emes. net/site/wp-content/uploads/EMES -WP-12-03 defourny-Nyssens. pdf 64.

Defourny J, Nyssens M. 2012. Conceptions of Social Enterprise in Europe: A Comparative Perspective with

-matters-how-it-can-be accelerated-March-2007. pdf 97. BEPA. 2010). ) Empowering people, driving change

http://ec. europa. eu/bepa/pdf /publications pdf/social innovation. pdf Executive summary Introduction Defining social innovation

Measuring social innovation Developing the field and overcoming barriers Financing social innovation An area of debate


The antecedents of SME innovativeness in an emerging transition economy.pdf.txt

fax:++385 1 2335 165 E-mail addresses: sradas@eizg. hr (S. Radas ljbozic@eizg. hr (L. Bozë icâ

Our data come from the Community Inno -vation Study performed in 2004 and covers period from

The data presented in this study were collected as part of Community Innovation Survey conducted on Croatian companies from manufacturing

The data were collected by mail survey followed up by two telephone prompts. This particular survey was the ï rst CIS

performed in Croatia and it refers to innovation activities over the period from the beginning of 2001 to the end of

the data, 448 ï rms were used in this analysis In this study, we deï ne a list of possible factors that have

drivers of innovation, our data interestingly show no evidence that having received municipality or government

for a cross-sectional data model obtained from large-scale surveys of this type Out of the external factors, collaboration with other

Regarding internal factors, data show that the propor -tion of highly educated staff has a positive effect on radical

Data show that there is no difference in process innovation between ï rms that report obstacles and those

More detailed investigation of data shows that sources of ï nancing are indeed lacking: most Croatian SMES ï nanced

) Regardless of problems with ï nancing, data reveal that 85.5%of the ï rms that reported obstacles managed to

-neurs and/or their social networks One thing to consider when devising innovation incen -tives is that SMES traditionally face high transaction costs

multi-site case study of family owned business. Journal of Business and Entrepreneurship 1 (2), 41†58


THE BIG IDEA CREATING SHARED VALUE.pdf.txt

Unable to extract PDF content at org. apache. tika. parser. pdf. PDF2XHTML. process (PDF2XHTML. java:

146 at org. apache. tika. parser. pdf. PDFPARSER. parse (PDFPARSER. java: 159 at org. apache. tika. parser.

Compositeparser. parse (Compositeparser. java: 244 at org. apache. tika. parser. Compositeparser. parse (Compositeparser. java: 244

at org. apache. tika. parser. Autodetectparser. parse (Autodetectparser. java: 121 at org. apache. tika. cli.

Tikacli$outputtype. process (Tikacli. java: 143 at org. apache. tika. cli. Tikacli. process (Tikacli. java: 422

at org. apache. tika. cli. Tikacli. main (Tikacli. java: 113 Caused by: java. io. IOEXCEPTION:

javax. crypto. Illegalblocksizeexception: Input length must be multiple of 16 when decrypting with padded cipher

at javax. crypto. Cipherinputstream. getmoredata (Cipherinputstream. java: 115 at javax. crypto. Cipherinputstream. read (Cipherinputstream. java:

233 at javax. crypto. Cipherinputstream. read (Cipherinputstream. java: 209 at org. apache. pdfbox. pdmodel. encryption.

Securityhandler. encryptdata (Securityhandler. java: 312 at org. apache. pdfbox. pdmodel. encryption. Securityhandler. decryptstream (Securityhandler. java:

413 at org. apache. pdfbox. pdmodel. encryption. Securityhandler. decrypt (Securityhandler. java: 386 at org. apache. pdfbox. pdmodel. encryption.

Securityhandler. decryptobject (Securityhandler. java: 361 at org. apache. pdfbox. pdmodel. encryption. Securityhandler. proceeddecryption (Securityhandler. java:

192 at org. apache. pdfbox. pdmodel. encryption. Standardsecurityhandler. decryptdocument (Standardsecurityhandler. java: 158 at org. apache. pdfbox. pdmodel.

PDDOCUMENT. openprotection (PDDOCUMENT. java: 1597 at org. apache. pdfbox. pdmodel. PDDOCUMENT. decrypt (PDDOCUMENT. java: 943

at org. apache. pdfbox. util. PDFTEXTSTRIPPER. writetext (PDFTEXTSTRIPPER. java: 337 at org. apache. tika. parser. pdf. PDF2XHTML. process (PDF2XHTML. java:

130 7 more Caused by: javax. crypto. Illegalblocksizeexception: Input length must be multiple of 16

when decrypting with padded cipher at com. sun. crypto. provider. Ciphercore. dofinal (Ciphercore. java: 750

at com. sun. crypto. provider. Ciphercore. dofinal (Ciphercore. java: 676 at com. sun. crypto. provider.

AESCIPHER. enginedofinal (AESCIPHER. java: 313 at javax. crypto. Cipher. dofinal (Cipher. java: 1970 at javax. crypto.

Cipherinputstream. getmoredata (Cipherinputstream. java: 112 19 more


THE CULTURE OF INNOVATION AND THE BUILDING OF KNOWLEDGE SOCIETIES.pdf.txt

1 THE CULTURE OF INNOVATION AND THE BUILDING OF KNOWLEDGE SOCIETIES -Issue Paper -UNESCO, Bureau of Strategic Planning

September 2003 2 I. The past and present scope of innovation During the last two decades, the term innovation has emerged as one of the key concepts of

academic, societal and political life. Many different actors, ranging from major regional organizations, various national governments, multinational corporations, and universities

worldwide, have underscored its importance. Major documents, such as the European Union†s Green Book on Innovation, published in 1995 and national strategies,

such as those formulated and implemented in countries like Singapore, Canada, and Australia, have put the innovation issue

relatively high on political agendas. At the same time, we are witnessing a proliferation of committees, institutes and think tanks, both privately and publicly funded, dedicated to the

promotion of the concept of innovation. More recently, the European commission has published a comprehensive study of innovation policies in the six candidate countries and is now in the process

of putting in place a Europe-wide common research framework All of the above described initiatives rest on three basic assumptions

Innovation is a national affair The major driving forces in the formulation of innovation strategies are national governments

knowledge and practices among the core competencies that are crucial in creating A Culture of

increasing importance of Information and Communication Technologies,(ICTS), the digital divide has grown at a rapid pace.

such as the digital divide which increases the development gap, free circulation and equal access to data, information and to good practices and

the knowledge of information societies, and the development of norms and principles based on an international consensus. In a similar vein, UNESCO is encouraging community-based approaches


The future internet.pdf.txt

Lecture Notes in Computer science 6656 Commenced Publication in 1973 Founding and Former Series Editors Gerhard Goos, Juris Hartmanis,

Microsoft Research, Cambridge, MA, USA Demetri Terzopoulos University of California, Los angeles, CA, USA Doug Tygar

Max Planck Institute for Informatics, Saarbruecken, Germany John Domingue Alex Galis Anastasius Gavras Theodore Zahariadis

The Future Internet Future Internet Assembly 2011 Achievements and Technological Promises 13 Volume Editors John Domingue

Alex Galis Anastasius Gavras Theodore Zahariadis Dave Lambert Frances Cleary Petros Daras Srdjan Krco Henning MÃ ller

SL 5 †Computer Communication Networks and Telecommuni -cations  The Editor (s)( if applicable) and the Author (s) 2011.

and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of

Business Information systems, University of Applied sciences Western Switzerland Sierre, Switzerland henning. mueller@hevs. ch VI List of Editors

The Internet will be a catalyst for much of our innovation and prosperity in the future It has enormous potential to underpin the smart, sustainable and inclusive growth

A competitive Europe will require Internet connectivity and services beyond the capabilities offered by current technologies.

Future Internet research is therefore a must Since the signing of the Bled declaration in 2008,

developing new technologies that can be used for the Internet of the Future. At the moment around 128 ongoing projects are being conducted in the field of networks

trustworthy ICT, Future Internet research and experimentation, services and cloud computing, networked media and Internet of things.

In total they represent an invest -ment in research of almost 870 million euro, of which the European commission funds

twice a year during the Future Internet Assembly, where they discuss research issues covering several of the domains mentioned above,

Apart from the Future Internet Assembly, the European commission has also launched a Public Private Partnership program on the Future Internet.

This 300 -million-euro program is focused on short-to middle-term research and runs from 2011 to 2014.

The core of this program will be a platform that implements and inte -grates new generic but fundamental capabilities of the Future Internet, such as interac

-tions with the real world through sensor/actuator networks, network virtualization and cloud computing, enhanced privacy and security features and advanced multimedia

capabilities. This core platform will be based on integration of already existing re -search results developed over the past few years,

and will be tested on large-scale use cases. The use cases that are part of the Public Private Partnership all have the poten

-tial to optimize large-scale business processes, using the properties of the core Future Internet platform.

Examples of these use cases are a smarter electricity grid, a more efficient international logistics chain, a more intelligent food value chain, smart mo

-bility, safer and smarter cities and a smarter content creation system for professional and nonprofessional users

Future Internet research is an important cornerstone for a competitive Europe. We believe that all these efforts will help European organizations to be in the driving seat

of many developments of the Future Internet. This book, already the third in this series, presents some of the results of this endeavor.

The uniqueness of this book lies in the breadth of the topics, all of them of crucial importance for the Future Internet

VIII Foreword We sincerely hope that reading it will provide you with a broader view on the Future

Internet efforts and achievements in Europe Budapest, May 2011 Luis Rodrã guez-Rosellã Mário Campolargo

1 The Internet Today Whether we use economic or societal metrics, the Internet is one of the most impor

-tant technical infrastructures in existence today. One easy measure of the Internet†s impact and importance is the number of Internet users

which as of June 2010 was 2 billion1. But of course, this does not give one the full picture.

viewpoint, in 2010 the revenue of Internet companies in the US alone was over $70

In Europe, IDC estimated that in 2009 the broader Internet revenues (taking business usage into account) amounted to â 159 billion

At the start of the demonstrations in Egypt the Internet was closed down by the ruling government to hinder the activities of opposition groups

in Egypt used social media to support communication and the associated Facebook page had over 80,000 followers at its peak.

talking about the power of the Internet in a country where currently Internet penetra -tion is compared 21%5 to say 79%for Germany6

The Internet has recently been in the news with stories covering two main issues which are known commonly in the Internet research community.

Firstly, recent stories have highlighted the issue of the lack of address space associated with IPV4, which

can cater for 4 billion IP addresses7. Some headlines claim that the IPV4 address space has already run out8.

Technically, the issue has been solved through IPV6 al -though there is still the matter of encouraging take up 1 http://www. internetworldstats. com/stats. htm

2 http://money. cnn. com/magazines/fortune/fortune500/2010/industries/225/index. html 3 http://www. fi3p. eu

4 http://www. mediaite. com/tv/picture-of-the-day-cairo-protester-holds-sign-that-says

-thank-you-facebook /5 http://www. internetworldstats. com/africa. htm#eg 6 http://www. internetworldstats. com/europa. htm#de

7 http://www. bbc. co. uk/news/10105978 8 http://www. ndtv. com/article/technology/internet-will-run out-of-ip-addresses-by-friday

-83244 X Preface A second major news item has been on net neutrality, specifically, on legislation on net neutrality in the US and UK,

on the fact that the Internet was designed originally in a very different context and for

•Volume and nature of data †the sheer volume of Internet traffic and the change

For example, Cisco†s latest forecast predicts that global data traffic on the Internet will exceed 767 Exabytes by 2014.

Online video and high -definition TV services are expected to dominate this growth. Cisco state that the

average monthly traffic in 2014 will be equivalent to 32 million people continu -ously streaming the 2009 Avatar film in 3d12

•Mobile devices †the Internet can now be accessed from a wide variety of mobile devices including smart phones, Internet radios,

and vehicle navigation systems which is a radically different environment from the initial Internet based on physi

-cal links. Data traffic for mobile broadband will double every year until 2014, in -creasing 39 times between 2009 and 201413

•Physical objects on the net †small devices enable the emergence of the â€oeinternet of Things†where practically any physical object can now be on the net sending lo

-cation and local context data when requested •Commercial services †as mentioned above the Internet is now a conduit for a

wide variety of commercial services. These business services rely on platforms which can support a wide variety of business transactions and business processes

•Societal expectations †in moving from an obscure technology to a fundamental part of human communication, societal expectations have grown.

population demand that the Internet is at least: secure, trustworthy, ubiquitous, ro -bust, responsive and also upholds privacy

9 http://online. wsj. com/article/BT-CO-20110217-718244. html 10 http://www. bbc. co. uk/news/uk-politics-11773574

11 See http://googleblog. blogspot. com/2005/11/vint-cerf-speaks-out-on-net-neutrality. html

id=long-live-the-web http://www. theatlantic. com/technology/archive/2010/12/steve-wozniak-to-the-fcc-keep-the

-internet-free/68294 /12 http://www. ispreview. co. uk/story/2010/06/10/cisco-forecasts-quadruple-jump-in-global

-internet traffic-by-2014. html 13 http://www. ispreview. co. uk/story/2010/06/10/cisco-forecasts-quadruple-jump-in-global

-internet traffic-by-2014. html Preface XI 3 FIA Overview This book is based on the research that is carried out within the Future Internet As

-sembly (FIA. FIA is part of the European response to the problems outlined above In short, FIAS bring together over 150 research projects that are part of the FP7 Chal

-lenge 1 ICT Programme to strengthen Europe†s Future Internet research activities and also to maintain the EU€ s global competitiveness in the space.

•Cloud computing, Internet of services and advanced software engineering •Internet-connected objects •Trustworthy ICT

•Networked media and search systems •Socioeconomic considerations for the Future Internet •Application domains for the Future Internet

•Future Internet research and experimentation (FIRE Researchers and practitioners associated with the Future Internet gather at the FIAS

every six months for a dialogue and interaction on topics which cross the above areas

In conjunction with the meetings the FIA Working groups sustain activity throughout the year working toward a common vision for the Future Internet based on scenarios

and roadmaps. Since the opening FIA in the spring of 2008, we have held now FIAS

in the following cities: Bled, Madrid, Prague, Stockholm, Valencia and Ghent, with the next meetings scheduled for Budapest and Poznan.

FIA working groups can be found at the EU Future Internet portal: http://www. future -internet. eu

/4 Book Overview This book, the third in the series, contains a sample of the results from the recent

•Future Internet Areas ⠀ Networks ⠀ Services ⠀ Content •Applications

Future Internet Foundations: Architectural Issues Introduction to Part I...3 Towards a Future Internet Architecture...

7 Theodore Zahariadis, Dimitri Papadimitriou, Hannes Tschofenig Stephan Haller, Petros Daras, George D. Stamoulis, and

Towards In-Network Clouds in Future Internet...19 Alex Galis, Stuart Clayman, Laurent Lefevre, Andreas Fischer

Towards Scalable Future Internet Mobility...35 Laâ'szloâ'Bokor, Zoltaâ'n Faigl, and Saâ'ndor Imre

Review and Designs of Federated Management in Future Internet Architectures. 51 Martä Â'n Serrano, Steven Davy, Martin Johnsson, Willie Donnelly, and

An Architectural Blueprint for a Real-world Internet...67 Alex Gluhak, Manfred Hauswirth, Srdjan Krco, Nenad Stojanovic

Interlinked Data-Content-Information Space...81 Maria Chiara Pettenati, Lucia Ciofi, Franco Pirri, and Dino Giuli

A Cognitive Future Internet Architecture...91 Marco Castrucci, Francesco Delli Priscoli, Antonio Pietrabissa, and Vincenzo Suraci

Title Model Ontology for Future Internet Networks...103 Joao Henrique de Souza Pereira, Flavio de Oliveira Silva

Future Internet Foundations: Socioeconomic Issues Introduction to Part II...117 XIV Table of contents Assessment of Economic Management of Overlay Traffic:

Deployment and Adoption of Future Internet Protocols...133 Philip Eardley, Michalis Kanakakis, Alexandros Kostopoulos, Tapio Levaâ

the Future Internet...145 Costas Kalogiros, Costas Courcoubetis, George D. Stamoulis Michael Boniface, Eric T. Meyer, Martin Waldburger, Daniel Field, and

Future Internet Foundations: Security and Trust Introduction to Part III...163 Security Design for an Inter-Domain Publish/Subscribe Architecture...

Engineering Secure Future Internet Services...177 Wouter Joosen, Javier Lopez, Fabio Martinelli, and Fabio Massacci

Towards Formal Validation of Trust and Security in the Internet of Services...193 Roberto Carbone, Marius Minea, Sebastian Alexander Moâ dersheim

`Trustworthy Clouds Underpinning the Future Internet...209 Ruâ diger Glott, Elmar Husmann, Ahmad-Reza Sadeghi, and

Data Usage Control in the future Internet Cloud...223 Michele Bezzi and Slim Trabelsi Part IV: Future Internet Foundations:

Experiments and Experimental Design Introduction to Part IV...235 A Use-Case on Testing Adaptive Admission Control and Resource Allocation

Algorithms on the Federated Environment of Panlab...237 Christos Tranoris, Pierpaolo Giacomin, and Spyros Denazis

Testing End-to-end Self management in a Wireless Future Internet Environment 259 Apostolos Kousaridas George Katsikas, Nancy Alonistioti, Esa Piri

Future Internet Areas: Network Introduction to Part V...273 Challenges for Enhanced Network Self-Manageability in the Scope of Future

Internet Development...277 Ioannis P. Chochliouros, Anastasia S. Spiliopoulou, and Nancy Alonistioti Efficient Opportunistic Network Creation in the Context of Future Internet...

293 Andreas Georgakopoulos, Kostas Tsagkaris, Vera Stavroulaki, and Panagiotis Demestichas Bringing Optical Networks to the Cloud:

Future Internet...307 Pascale Vicat-Blanc, Sergi Figuerola, Xiaomin Chen, Giada Landi Eduard Escalona, Chris Develder, Anna Tzanakaki, Yuri Demchenko

Future Internet Areas: Services Introduction to Part VI...323 SLAS Empowering Services in the future Internet...327

Joe Butler, Juan Lambea, Michael Nolan, Wolfgang Theilmann Francesco Torelli, Ramin Yahyapour, Annamaria Chiasera, and

Meeting Services and Networks in the future Internet...339 Eduardo Santos, Fabiola Pereira, Joaëoeo Henrique Pereira, Luiz

Fostering a Relationship between Linked Data and the Internet of Services...351 John Domingue, Carlos Pedrinaci, Maria Maleshkova, Barry Norton, and

Future Internet Areas: Content Introduction to Part VII...367 XVI Table of contents Media Ecosystems: A Novel Approach for Content-Awareness in Future

Scalable and Adaptable Media Coding Techniques for Future Internet...381 Naeem Ramzan and Ebroul Izquierdo

Semantic Context Inference in Multimedia Search...391 Qianni Zhang and Ebroul Izquierdo Part VIII: Future Internet Applications

Introduction to Part VIII...403 Future Internet Enterprise Systems: A Flexible Architectural Approach for Innovation...

407 Daniela Angelucci, Michele Missikoff, and Francesco Taglino Renewable Energy Provisioning for ICT Services in a Future Internet...

419 Kim Khoa Nguyen, Mohamed Cheriet, Mathieu Lemay, Bill St. Arnaud Victor Reijs, Andrew Mackarel, Pau Minoves, Alin Pastrama, and

Smart Cities and the Future Internet: Towards Cooperation Frameworks for Open Innovation...431 Hans Schaffers, Nicos Komninos, Marc Pallot, Brigitte Trousse

Smart Cities at the Forefront of the Future Internet...447 Joseâ'M. Hernaâ'ndez-Munëoeoz, Jesuâ's Bernat Vercher, Luis Munëoeoz

Future Internet Foundations: Architectural Issues Part I: Future Internet Foundations: Architectural Issues 3 Introduction The Internet has evolved from a slow, person-to-machine, communication channel to

the most important medium for information exchange. Billions of people all over the world use the Internet for finding,

accessing and exchanging information, enjoying multimedia communications, taking advantage of advanced software services, buying and selling, keeping in touch with family and friends, to name a few.

The success of the Internet has created even higher hopes and expectations for new applications and

services, which the current Internet may not be able to support to a sufficient level On one hand, the increased reliability, availability and interoperability requirements

of the new networked services, and on the other hand the extremely high volumes of multimedia content challenge the today†s Internet.

As a result, the â€oefuture Internet†research and development threads have been gaining momentum all over the world and as such the international race to create a new generation Internet is in full swing

The current Internet has been founded on a basic architectural premise, that is: a simple network service can be used as a universal means to interconnect both dumb

and intelligent end systems. The simplicity of the current Internet has pushed com -plexity into the endpoints,

and has allowed impressive scale in terms of inter -connected devices. However, while the scale has reached not yet its limits, the growth

of functionality and the growth of size have slowed both down and may soon reach both its architectural capability and capacity limits.

The current Internet capability limit will be stressed further by the expected growth, in the next years, in order of

magnitude of more Internet services, the likely increase in the interconnection of smart objects and items (Internet of things) and its integration with enterprise applications

Although the current Internet, as a ubiquitous and universal means for communica -tion and computation, has been extraordinarily successful,

there are still many un -solved problems and challenges some of which have basic aspects. Many of these

aspects could not have been foreseen when the first parts of the Internet were built but these do need to be addressed now.

The very success of the Internet is now creat -ing obstacles to the future innovation of both the networking technology that lies at

the Internet†s core and the services that use it We are faced with an Internet that is good at delivering packets, but shows a level

of inflexibility at the network and service layers and a lack of built-in facilities to

support any nonbasic functionality In order to move forward new architectures that can meet the research and societal

which are enhancing the existing Internet, are also of significant importance. Such new architectures, enhancements related artefacts would be based on

Internet core networking and servicing protocols, components, mechanisms and requirements •Integration models enabling better incorporation and usage of the communication

-centric, information-centric, resource-centric, content-centric, service/computation -centric, context-centric faces and internet of things-centric facets

4 Part I: Future Internet Foundations: Architectural Issues •Structures and infrastructures for control, configuration, integration, composition

organisation and federation •Unification and higher degree of integration of the communication, storage, con

-tent and computation as the means of enabling change from capacity concerns to -wards increased and flexible capability with operation control

•Higher degree of virtualisation for all systems: applications, services, networks storage, content, resources and smart objects

-tural research in Future Internet The â€oetowards a Future Internet Architecture†chapter identifies the fundamental

limitations of Internet, which are isolated not but strongly dependent on each other Increasing the bandwidth would significantly help to address

or mitigate some of these problems, but would not solve their root cause. Other problems would neverthe

The transmission can be improved by utilising better data processing & handling and better data storage, while the overall Internet performance

would be improved significantly by control & self-*functions. As an overall result this chapter proposes the following:

extensions, enhancements and re-engineering of today†s Internet protocols may solve several challenging limitations.

Yet, addressing the fundamental limitations of the Internet architecture is a multidimensional prob -lem. Improvements in each dimension combined with a holistic approach of the prob

-lem space are needed The â€oetowards In-Network Clouds in Future Internet†chapter explores the archi

-tectural co-existence of new and legacy services and networks, via virtualisation of connectivity and computation resources and self management capabilities, by fully

integrating networking with cloud computing in order to create In-Network Clouds. It also presents the designs and experiments with a number of In-Network Clouds plat

-forms, which have the aim to create a flexible environment for autonomic deployment and management of virtual networks and services as experimented with and validated

Towards Scalable Future Internet Mobility†chapter pro -vides a comprehensive overview and review of the scalability problems of mobile

Internet nowadays and to show how the concept of flat and ultra flat architectures emerges due to its suitability and applicability for the future Internet.

It also aims to introduce the basic ideas and the main paradigms behind the different flat networking

-sis of these areas guides the readers from the basics of flat mobile Internet architec

and power creating a novel Internet archi -tecture for future mobile communications The â€oereview and Designs of Federated Management in Future Internet Architec

-tures†chapter analyses issues about federated management targeting information sharing capabilities for heterogeneous infrastructure. An inter-operable, extensible

Future Internet Foundations: Architectural Issues 5 reusable and manageable new Internet reference model is critical for Future Internet

realisation and deployment. The reference model must rely on the fact that high-level applications make use of diverse infrastructure representations and not use of re

under the umbrella of the federated management work in the future Internet The â€oean Architectural Blueprint for a Real-world Internet†chapter reviews a num

-ber of architectures developed in projects in the area of Real-world Internet (RWI Internet of things (Iot),

and Internet Connected Objects. All of these systems are faced with very similar problems in their design with very limited interoperability among

these systems. To address these issues and to speed up development and deployment while at the same time reduce development and maintenance costs, reference architec

-linked Data-Content-Information Space†chapter analyses the concept of â€oecontent -Centric†architecture, lying between the Web of Documents and the generalized Web

of Data, in which explicit data are embedded in structured documents enabling consis -tent support for the direct manipulation of information fragments.

It presents the In -terdatanet (IDN) infrastructure technology designed to allow the RESTFUL manage -ment of interlinked information resources structured around documents.

it provides a simple, uniform Web-based interface to distributed heterogeneous information management; it endows information fragments

The â€oea Cognitive Future Internet Architecture†chapter proposes a novel Cognitive Framework as a reference architecture for the Future Internet (FI), which is based on

so-called Cognitive Managers. The objective of the proposed architecture is twofold On one hand, it aims at achieving a full interoperation among the different entities

Future Internet Foundations: Architectural Issues The â€oetitle Model Ontology for Future Internet Networks†chapter contributes to

the use of ontologies in the future Internet, with the proposal of semantic formaliza -tion of the Entity Title Model.

It is suggested also the use of semantic representation languages in place of protocols Alex Galis and Theodore Zahariadis

) Future Internet Assembly, LNCS 6656, pp. 7†18,2011  The Author (s). This article is published with open access at Springerlink. com

Towards a Future Internet Architecture Theodore Zahariadis1, Dimitri Papadimitriou2, Hannes Tschofenig3, Stephan Haller4 Petros Daras5, George D. Stamoulis6, and Manfred Hauswirth7

2 Alcatel-lucent, Belgium dimitri. papadimitriou@alcatel-lucent. com 3 Nokia Siemens Networks, Germany hannes. tschofenig@nsn. com

4 SAP, Germany stephan. haller@sap. com 5 Center of Research and Technology Hellas/ITI, Greece

daras@iti. gr 6. Athens University of Economics and Business, Greece gstamoul@aueb. gr 7 Digital Enterprise Research Institute, Ireland

emerging and mission critical applications is expected to stress the Internet to such a degree that it will possibly not be able to respond adequately to its new

-wide to search for structural modifications to the Internet architecture in order to be able to face the new requirements.

Future Internet Architecture (FIARCH) group organized and coordinated by the European commission (EC) and aims to capture the group†s view on the Future

Internet Architecture issue Keywords: Internet Architecture, Limitations, Processing, Handling, Storage Transmission, Control, Design Objectives, EC FIARCH group

1 Introduction The Internet has evolved from a remote access to mainframe computers and slow communication channel among scientists to the most important medium for informa

-tion exchange and the dominant communication environment for business relations and social interactions. Billions of people all over the world use the Internet for find

-ing, accessing and exchanging information, enjoying multimedia communications taking advantage of advanced software services, buying and selling, keeping in touch

with family and friends, to name a few. The success of the Internet has created even higher hopes and expectations for new applications and services, which the current

Internet may not be able to support to a sufficient level. It is expected that the number

8 T. Zahariadis et al of nodes (computers, terminals mobile devices, sensors, etc. of the Internet will soon

grow to more than 100 billion 1. Reliability, availability, and interoperability re -quired by new networked services,

and this trend will escalate in the future. There -fore, the requirement of increased robustness, survivability, and collaborative proper

-ties is imposed to the Internet architecture. In parallel, the advances in video capturing and content/media generation have led to very large amounts of multimedia content

and applications offering immersive experiences (e g.,, 3d videos, interactive envi -ronments, network gaming, virtual worlds, etc.

compared to the quantity and type of data currently exchanged over the Internet. Based on 2, out of the 42 Exabytes

1018) of consumer Internet traffic likely to be generated every month in 2014,56 %will be due to Internet video, while the average monthly consumer Internet traffic will

be equivalent to 32 million people streaming Avatar in 3d, continuously, for the en -tire month

All these applications create new demands and requirements, which to a certain ex -tent can be addressed by means of â€oeover-dimensioning†combined with the enhance

-ment of certain Internet capabilities over time. While this can be a satisfactory (al -though sometimes temporary) solution in some cases, analyses have shown 3, 4

that increasing the bandwidth on the backbone network will not suffice due to new qualitative requirements concerning, for example, highly critical services such as e

-health applications, clouds of services and clouds of sensors, new social network applications like collaborative 3d immersive environments, new commercial and

transactional applications, new location-based services and so on In other words, the question is to determine if the architecture and its properties

might become the limiting factor of Internet growth and of the deployment of new applications.

For instance, as stated in 5 â€oethe end-to-end arguments are insufficiently compelling to outweigh other criteria for certain functions such as routing and con

On the other hand, the evolution of the Internet architecture is car -ried out by means of incremental and reactive additions 6, rather than by major and

change define necessary but not sufficient conditions for such change in the Internet architecture and/or its components.

Indeed, the Internet architecture has shown since so far the capability to overcome such limits without requiring radical architectural

or designing a new Internet Architecture (if a new one is needed), it is necessary to demonstrate the fundamental limits of the cur

to progressively determine the principles that will drive the Future Internet architec -ture that will adequately meet at least the abovementioned challenges EIFFEL

The Future Internet as a global and common communication and distributed infor -mation system may be considered from various interrelated perspectives:

Towards a Future Internet Architecture 9 Europe, a significant part of the Information and Communication Technology (ICT

of the Framework Program 7 is devoted to the Future Internet 14. Though many proposals for a Future Internet Architecture have already been developed, no specific

methodology to evaluate the efficiency (and the need) for such architecture proposals exist. The purpose of this paper is to capture the view of the Future Internet Architec

-ture (FIARCH) group organized and coordinated by the European commission Since so far, the FIARCH group has identified

agreement on the different types of limitations of the Internet and its architecture Interested readers may also refer to 15 for more information1

set of components (i e. procedures, data structures, state machines) and the characteri -zation of their interactions (i e. messages, calls, events, etc

We also qualify as a â€oefundamental limitation†of the Internet architecture a func -tional, structural,

Internet architecture (e g. separation of the locator and identifier role of IP ADDRESSES In the following, we use the term â€oedata†to refer to any organized group of bits

a k a. data packets, data traffic, information, content (audio, video, multimedia), etc and the term â€oeservice†to refer to any action performed on data or other services and

the related Application programming interface (API. 2 Note however that this docu -ment does not take position on the localization and distribution of these APIS

3 Analysis Approach Since its creation, the Internet is driven by a small set of fundamental design princi

-ples rather than a formal architecture that is created on a whiteboard by a standardiza -tion or research group.

trade-off between Internet redesign and proposing extensions, enhancements and re -engineering of today†s Internet protocols are debated heavily

1 Interested readers may also search for updated versions at the FIARCH site http://ec. europa. eu/information society/activities/foi/research/fiarch/index en. htm

2 The definition of service does not include the services offered by humans using the Internet

10 T. Zahariadis et al The emergence of new needs at both functional and performance levels, the cost

and complexity of Internet growth, the existing and foreseen functional and perform -ance limitations of the Internet†s architectural principles and design model put the

refers to forwarders (e g. routers, switches, etc computers (e g.,, terminals, servers, etc. CPUS, etc. and handlers (software pro

-grams/routines) that generate and treat as well as query and access data •Storage of â€oedataâ€:

refers to memory, buffers, caches, disks, etc. and associated logical data structures •Transmission of â€oedataâ€:

refers to physical and logical transferring/exchange of data •Control of processing, storage, transmission of systems and functions:

refers to the action of observation (input), analysis, and decision (output) whose execution affects the running conditions of these systems and functions.

Note that by using these base functions, the data communication function can be defined as the com

-bination of processing, storage, transmission and control functions applied to â€oedataâ€. The term control is used here to refer to control functionality but also man

-lyze the presumed problems and limitations of the Internet. This work was carried out by identifying an extensive list of limitations and potentially problematic issues or

i. The Internet does not allow hosts to diagnose potential problems and the network offers little feedback for hosts to perform root cause discovery and analysis. In to

-day's Internet, when a failure occurs it is often impossible for hosts to describe the

-tween Internet users and providers. Non-intrusive and non-discriminatory means to detect misbehavior and mitigate their effects while keeping open and broad ac

-cessibility to the Internet is a limitation that is crucial to overcome 16 ii. Lack of data identity is damaging the utility of the communication system.

As a result, data, as an †economic objectâ€, traverses the communication infrastructure multiple times, limiting its scaling,

while lack of content †property rights†(not only author-but also usage-rights) leads to the absence of a fair charging model

Towards a Future Internet Architecture 11 iv. Real-time processing. Though this is not directly related to the Internet Architec

-ture itself, the limited capability for processing data on a real-time basis poses limitations in terms of the applications that can be deployed over the Internet.

On the other hand, many application areas (e g. sensor networks) require real-time Internet processing at the edges nodes of the network

3. 2 Storage Limitations The fundamental restrictions that have been identified in this category are i. Lack of context/content aware storage management:

Data are not inherently asso -ciated with knowledge of their context. This information may be available at the

communication end-points (applications) but not when data are in transit. So, it is not feasible to make efficient storage decisions that guarantee fast storage man

-agement, fast data mining and retrieval, refreshing and removal optimized for dif -ferent types of data 18

ii. Lack of inherited user and data privacy: In case data protection/encryption meth -ods are employed (even using asymmetric encryption and public key methods

data cannot be stored efficiently/handled. On the other hand, lack of encryption violates the user and data privacy. More investigations into the larger privacy and

data protection ecosystem are required to overcome current limits of how current information systems deal with privacy and protection of information of users, and

develop ways to better respect the needs and expectations 30,31, 32 iii. Lack of data integrity, reliability and trust, targeting the security and protection of

data; this issue covers both unintended disclosure and damage to integrity from defects or failures,

and vulnerabilities to malicious attacks iv. Lack of efficient caching & mirroring: There is no inherited method for on-path

caching along the communication path and mirroring of content compared to off -path caching that is currently widely used (involving e g. connection redirection

Such methods could deal with issues like flash crowding, as the onset of the phe

-nomenon will still cause thousands of cache servers to request the same docu -ments from the original site of publication

3. 3 Transmission Limitations The fundamental restrictions that have been identified in this category are i. Lack of efficient transmission of content-oriented traffic:

Multimedia content -oriented traffic comprises much larger volumes of data as compared to any other

information flow, while its inefficient handling results in retransmission of the same data multiple times.

Content Delivery Networks (CDN) and more generally architectures using distributed caching alleviate the problem under certain condi

-tions but can†t extend to meet the Internet scale 19. Transmission from central -ized locations creates unnecessary overheads

and can be far from optimal when massive amounts of data are exchanged 12 T. Zahariadis et al

ii. Lack of integration of devices with limited resources to the Internet as autono -mous addressable entities.

Devices in environments such as sensor networks or even nano-networks/smart dust as well as in machine to machine-machine (M2m) envi

-ronments operate with such limited processing, storage and transmission capacity that only partly run the protocols necessary

in order to be integrated in the Internet as autonomous addressable entities iii. Security requirements of the transmission links:

Communications privacy does not only mean protecting/encrypting the exchanged data but also not disclosing that

communication took place. It is not sufficient to just protect/encrypt the data (in -cluding encryption of protocols/information/content, tamper-proof applications

etc) but also protect the communication itself, including the relation/interaction between (business or private) parties

In the current Internet model, design of IP (and more generally communication) control components have so far being

and (operational and system) cost of the Internet. Further, to maintain/sustain or even increase its value delivery over time,

the Internet will have to provide flexi -bility in its functional organization, adaptation, and distribution. Flexibility at run

Improper segmentation of data and control. The current Internet model segments horizontally) data and control,

whereas from its inception the control functional -ity has a transversal component. Thus, on one hand, the IP functionality isn't lim

-ited anymore to the â€oenetwork layerâ€, and on the other, IP is not totally decoupled

Towards a Future Internet Architecture 13 share the same control instance. Hence, the hourglass model of the Internet does

not account for this evolution of the control functionality when considered as part of the design model

The IP data plane is itself relatively simple but its associated control components are numerous and sometimes

Certain fundamental limitations of current Internet may fall in more than one category Examples of such limitations include

Internet do not have the possibility to enforce the path followed by their traffic Hence, even if multiple alternatives to reach a given destination would be offered

as the Internet enables any-to-any connectivity, there is no effective means to predict the spatial distribution of the traffic within a timescale that would

-bined with a sudden peak in demand for a particular piece of data may result in

The amount of foreseen data and information5 requires significant processing power/storage/bandwidth for indexing/crawling

and also solutions for large scale/real-time data mining/social network analysis so as to achieve successful retrieval and integration of information from an ex

the fast and scalable identification and discovery of and access to data. The expo -nential growth of information makes it increasingly harder to identify relevant in

v. Security of the whole Internet Architecture. The Internet architecture is not intrin -sically secure and is based on add-ons to, e g. protocols,

to secure itself. The con -sequence is that protocols may be secure but the overall architecture is not self

Support of mobility when using IP ADDRESS as both network and host identifier but also TCP connection identifier results in Transmission control protocol (TCP) con

rate or due to transient wireless link interruption in areas of poor coverage), render -ing the typical reaction of congestion control mechanism of TCP inappropriate.

wired and wireless, yielding a different trade-off between performance, efficiency and cost, and affecting several base functions again

the Internet architecture. We distinguish between â€oehigh-level†and â€oelow-level†design objectives. High-level objectives refer to the cultural, ethical, socioeconomic, but

also technological expectations to be met by the Internet as global and common in -formation communication system.

High-level objectives are documented in 15. By low-level design objectives, we mean here the functional and performance properties

5 Eric Schmidt, the CEO of Google, the world†s largest index of the Internet, estimated the

size at around 5 million terabytes of data (2005. Eric commented that Google has indexed roughly 200 terabytes of that is 0, 004%of the total size

Towards a Future Internet Architecture 15 common information communication system is expected to meet. From the previous

sections, some of low-level objectives are met and others are not by the (present architecture of the Internet.

We also emphasize here that these objectives are com -monly shared by the Internet community at large

The remaining part of this Section translates a first analysis of the properties that should be met by the Internet architecture starting from the initial of objectives as

enumerated in various references (see 27,28, 29. One of the key challenges is thus to determine the necessary addition/improvement of current architecture princi

-ples and the improvement (or even removal of architectural components needed to eliminate or at least tangibly mitigate/avoid the known effects of the fundamental

limitations. It is to be emphasized that a great part of research activities in this domain consists in identifying hidden relationships and effects

the Internet architecture has been structured around eight foundational objectives: i) to connect existing networks, ii) survivability, iii) to sup

1287, published in 1991 by the IAB 36, underlines that the Internet architecture needs to be able to scale to 109 IP networks recognizing the need to add scalability as

existing Internet design objectives compared to the approach that would consist of applying a tabula rasa approach, i e.,

Internet design objectives Based on previous sections, the present section describes the design objectives that are met currently, partly met

•Accessibility (open and by means of various/heterogeneous wireless/radio and wired interfaces) to the communication network but also to heterogeneous data, ap

-plications, and services, nomadicity, and mobility (while providing means to main -tain continuity of application communication exchanges when needed.

and nomadicity are addressed currently by current Internet architecture. On the other hand, mobility is realized still in most cases by means of dedicated/separated archi

•Accountability of resource usage and security without impeding user privacy utility and self-arbitration:

in the current Internet this service is the connectivity even if the notion of â€oeservice†is embedded not in the architectural model of the Internet:

initially addressed but loosing ground •Distribution of processing, storage, and control functionality and autonomy

-gration of distributed but heterogeneous data and processes 16 T. Zahariadis et al •Scalability, including routing

•Reliability, referring here to the capacity of the Internet to perform in accordance to what it is expected to deliver to the end-user/hosts while coping with a growing

number of users with increasing heterogeneity in applicative communication needs •Robustness/stability, resiliency, and survivability:

and associated data traffic such as non/real-time streams, messages, etc. independently of the shared infrastructure par

-forced (migration of mobile network to IPV6 Internet, IPTV moving to Internet TV etc.)) otherwise leading to segmentation and specialization per application/service

In this article we have identified fundamental limitations of Internet architecture fol -lowing a systematic investigation thereof from a variety of different viewpoints

-ing better data processing and handling (e g. network coding, data compression intelligent routing) and better data storage (e g. network/terminals caches, data cen

-ters/mirrors etc. while the overall Internet performance would be significantly im -proved by control and self-*functions.

As an overall finding we may conclude the following: Extensions, enhancements and re-engineering of today†s Internet pro

-tocols may solve several challenging limitations. Yet, addressing the fundamental limitations of the Internet architecture is a multidimensional and challenging

research topic. While improvements are needed in each dimension, these should be combined by undertaking a holistic approach of the problem space

the EC Future Internet Architecture (FIARCH) group (to which the authors belong which is coordinated by the EC FP7 Coordination and Support Actions (CSA) projects

Towards a Future Internet Architecture 17 in the area of Future Internet: Nextmedia, IOT-I, SOFI, EFFECTS+,EIFFEL, Cho

-rus+,SESERV and Paradiso 2, and supported by the EC Units D1: Future Networks D2:

Networked Media Systems, D3: Software & Service Architectures & Infrastruc -tures, D4: Networked Enterprise & Radio frequency identification (RFID) and F5

Trust and Security. The authors would like to acknowledge and thank all members of the group for their significant input and the EC Scientific Officers Isidro Laso Balles

-teros, Jacques Babot, Paulo De Sousa, Peter Friess, Mario Scillia, Arian Zwegers for coordinating the activities

The Internet and its architecture have grown in evolutionary fashion from modest beginnings, rather than from a Grand Plan

Design Goals for Scalable Internet Routing. Work in progress, draft-irtf-rrg -design-goals-02.sep 2010 8 http://www. nsf. gov/pubs/2010/nsf10528/nsf10528. htm

13 http://mmlab. snu. ac. kr/fiw2007/presentations/architecture tschoi. pdf 14 http://www. future-internet. eu

/15 FIARCH Group: Fundamental Limitations of Current Internet and the path to Future Inter -net (December 2010

16 Perry, D.,Wolf, A.:Foundations for the Study of Software Architecture. ACM SIGSOFT Software engineering Notes 17,4 (1992

17 Papadimitriou, D.,et al. eds.):) Open Research Issues in Internet Congestion Control Internet Research Task force (IRTF), RFC 6077 (February 2011

18 Akhlaghi, S.,Kiani, A.,Reza Ghanavati, M.:Cost-bandwidth tradeoff in distributed storage systems (published on-line.

ACM Computer Communications 33 (17), 2105†2115 (2010 19 Freedman, M.:Experiences with Coralcdn: A Five-Year Operational View.

In: Proc. 7th USENIX/ACM Symposium on Networked Systems Design and Implementation (NSDI †10) San jose, CA (May 2010

18 T. Zahariadis et al 20 Dobson, S.,et al.:A survey of autonomic communications. ACM Transactions on

22 Evolving the Internet, Presentation to the OECD (March 2006 http://www. cs. ucl. ac. uk/staff/m. handley/slides

Invigorating the Future Internet Debate. ACM SIGCOMM Computer Com -munication Review 39 (5)( 2009 26 Eggert, L.:

Quality-of-Service: An End System Perspective. In: MIT Communications Futures Program †Workshop on Internet Congestion Management, Qos, and Intercon

-nection, Cambridge, MA, USA, October 21-22 (2008 27 Ratnasamy, S.,Shenker, S.,Mccanne, S.:Towards an evolvable internet architecture

SIGCOMM Comput. Commun. Rev. 35 (4), 313†324 (2005 28 Cross-ETP Vision Document, http://www. future-internet. eu/fileadmin

/documents/reports/Cross-ETPS FI VISION DOCUMENT V1 0. pdf 29 Clark, D d.:The Design Philosophy of the DARPA Internet Protocols, Proc SIGCOMM

88 (reprinted in ACM CCR 25 (1), 102-111,1995. ACM CCR 18 (4), 106†114 (1988

30 Saltzer, J. H.,Reed, D. P.,Clark, D d.:End-to-end Arguments in System Design. ACM

Architectural Principles of the Internet, Internet Engineering Task force IETF), RFC 1958 (July 1996 32 Krishnamurthy, B.:

ACM SIGCOMM Computer Communication Review (Oct. 2010), http://www2. research. att. com/bala /papers/ccr10-priv. pdf

33 W3c Workshop on Privacy for Advanced Web APIS 12/13 July 2010, London (2010 http://www. w3. org/2010/api-privacy-ws/report. html

34 Workshop on Internet Privacy, co-organized by the IAB, W3c, MIT, and ISOC, 8 and 9

December (2010), http://www. iab. org/about/workshops/privacy /35 Clark, D.,et al.:Towards the Future Internet Architecture, Internet Engineering Task

Force (IETF; RFC 1287 (December 1991 36 http://www. iso. org/iso/iso technical committee. html? commid=45072

37 http://www. 4ward-project. eu /Alicante http://www. ict-alicante. eu /ANA http://www. ana-project. org

/COAST http://www. fp7-coast. eu /COMET http://www. comet-project. org /ECODE http://www. ecode-project. eu

/Iot-A http://www. iot-a. eu /nextmedia http://www. fi-nextmedia. eu /OPTIMIX http://www. ict-optimix. eu

) Future Internet Assembly, LNCS 6656, pp. 19†33,2011  The Author (s). This article is published with open access at Springerlink. com

Towards In-Network Clouds in Future Internet Alex Galis1, Stuart Clayman1, Laurent Lefevre2, Andreas Fischer3

which take advantage of flexible sharing of available connectivity, computation and storage resources. This paper aims to explore the architectural co-existence

of new and legacy services and networks, via virtualisation of connectivity and computation resources and self management capabilities, by fully integrating

networking with cloud computing in order to create In-Network Clouds. It also presents the designs and experiments with a number of In-Network Clouds plat

-forms, which have the aim to create a flexible environment for autonomic de -ployment and management of virtual networks and services as experimented

In-Network Clouds, Virtualisation of Resources, Self management Service plane, Orchestration plane and Knowledge plane 1 Introduction

The current Internet has been founded on a basic architectural premise, that is: a sim -ple network service can be used as a universal means to interconnect both dumb and

intelligent end systems. The simplicity of the current Internet has pushed complexity into the endpoints, and has allowed impressive scale in terms of interconnected de

-vices. However, while the scale has reached not yet its limits 1, 2, the growth of functionality and the growth of size have slowed both down

Internet applications increasingly re -quire a combination of capabilities from traditionally separate technology domains to

and dependability demanded by users. Internet use is expected to grow massively over the next few years with an order of magnitude more Internet

services, the interconnection of smart objects from the Internet of things, and the integration of increasingly demanding enterprise and societal applications

The Future Internet research and development trends are covering the main focus of the current Internet, which is connectivity,

routing, and naming as well as defining 20 A. Galis et al and design of all levels of interfaces for Services and for networks†and servicesâ€

resources. As such, the Future Internet covers the complete management and full lifecycle of applications, services, networks and infrastructures that are primarily

constructed by recombining existing elements in new and creative ways The aspects which are fundamentally missing from the current Internet infrastruc

-ture, include the advanced service networking platforms and facilities, which take advantage of flexible sharing of available resources (e g. connectivity, computation

and storage resources This paper aims to explore the architectural co-existence of new and legacy ser

-vices and networks, via virtualisation of resources and self management capabilities by fully integrating networking 4, 8, 10,15 with cloud computing 6, 7, 9 in order

to produce In-Network Clouds. It also presents the designs and experiments with a number of In-Network Clouds platforms 9, 10,

which have the aim to create a flexi -ble environment for autonomic deployment and management of virtual networks and

modifications to the existing Internet are limited now to simple incremental updates and deployment of new technology is next to impossible and very costly.

-Network virtualisation provides flexibility, promotes diversity, and promises security and increased manageability We define In-Network clouds as an integral part of the differentiated Future Inter

which supports multiple computing clouds from different service providers operating on coexisting heterogeneous virtual networks and sharing a com

-mon physical substrate of communication nodes and servers managed by multiple infrastructure providers. By decoupling service providers from infrastructure provid

-ers and by integrating computing clouds with virtual networks the In-Network clouds introduce flexibility for change

used to make the Future Internet of Services more intelligent, with embedded management functionality. At a logical

and execute on network hosts, devices, attachments, and servers Towards In-Network Clouds in Future Internet 21

Fig. 1. In-Network Cloud Resources within the network. Together these distributed systems form a software-driven net

-work control infrastructure that will run on top of all current networks (i e. fixed wireless, and mobile networks) and service physical infrastructures in order to pro

-vide an autonomic virtual resource overlay 2. 1 Service Plane Overview The Service Plane (SP) consists of functions for the automatic (redeployment of

ensuring integrity of the Future Internet management operations. The Orchestration Plane can be thought of as a control framework into which any number of compo

-ponents could have direct interworking with control algorithms, situated in the control plane of the Internet (i e. to provide real time reaction),

and interworking with other management functions (i e. to provide near real time reaction The Orchestration Plane is made up of one or more Autonomic Management Sys

Towards In-Network Clouds in Future Internet 23 administrative policies, a federation function would trigger a negotiation between

The governance functionality of the OP monitors the consistency of the AMSS€ actions, it enforces the high level policies

2. 3 Virtualisation Plane Overview Virtualisation hides the physical characteristics 14,16 of the computing and net

-working resources being used, from its applications and users. This paper uses system virtualisation to provide virtual services and resources.

System virtualisation separates an operating system from its underlying hardware resources; resource virtualisation abstracts physical resources into manageable units of functionality.

For example, a single physical resource can appear as multiple virtual resources (e g.,, the concept of

a virtual router, where a single physical router can support multiple independent rout -ing processes by assigning different internal resources to each routing process;

alter -natively, multiple physical resources can appear as a single physical resource (e g when multiple switches are â€oestacked†so that the number of switch ports increases

but the set of stacked switches appears as a single virtual switch that is managed as a

single unit. Virtualisation enables optimisation of resource utilisation. However, this optimisation is confined to inflexible configurations within a single administrative

domain. This paper extends contemporary virtualisation approaches and aims at build -ing an infrastructure in which virtual machines can be relocated dynamically to any

physical node or server regardless of location, network, and storage configurations and of administrative domain

The virtualisation plane consists of software mechanisms to abstract physical re -sources into appropriate sets of virtual resources that can be organised by the Orches

-tration Plane to form components (e g.,, increased storage or memory devices (e g.,, a switch with more ports),

or even networks. The organisation is done in order to realise a certain business goal or service requirement.

Two dedicated interfaces are needed the vspi and the vcpi (Virtualisation System Programming interface and Virtualisa -tion Component Programming interface, respectively.

A set of control loops is formed using the vspi and the vcpi, as shown in Figure 2

24 A. Galis et al Fig. 2. Virtualisation Control Loop Virtualisation System Programmability Interface (vspi. The vspi is used to

enable the Orchestration Plane (and implicitly the AMS and DOC that are part of a given Orchestration Plane) to govern virtual resources,

and to construct virtual ser -vices and networks that meet stated business goals having specified service require

resources in response to changing user needs, business requirements, and environ -mental conditions. The low-level configuration (i e.,

Virtualisation Component Programming interface (vcpi. Each physical resource has associated an and distinct vcpi. The vcpi is fulfilling two main functions:

physical resource by the vcpi of the Virtualisation Plane. The AMS sends abstract i e.,, device-independent) commands via the vcpi,

Towards In-Network Clouds in Future Internet 25 controls that physical resource. Note that the AMS is responsible for obtaining man

-agement data describing the physical resource. The vcpi is responsible for providing dynamic management data to its governing AMS that states how many virtual re

-sources are currently instantiated, and how many additional virtual resources of what type can be supported 2. 4 Knowledge Plane Overview

-work architecture, contrasting with the data and control planes; its purpose is to pro -vide knowledge and expertise to enable the network to be self-monitoring, self

Plane (KP), consisting of context data structured in information models and ontolo -gies, which provide increased analysis

The KP brings together widely distributed data collection, wide availability of that data, and sophisticated and adaptive processing or KP functions, within a unify

-ing structure. Knowledge extracted from information/data models forms facts Knowledge extracted from ontologies is used to augment the facts,

so that they can be reasoned about. Hence, the combination of model and ontology knowledge forms a

which is used then to transform received data into a common form that enables it to be managed.

-cations and services in the future Internet Context Information Services. The Context Information Service Platform (CISP within the KP, has the role of managing the context information,

user-facing services or network management services, which make use of or/and adapt themselves to context information.

clients,(ii) the Context Processing (CP) Module which implements the core internal operations related to the context processing,(iii) the Context Information Base (CIB

Towards In-Network Clouds in Future Internet 27 applications/components and the CP module for the optimisation of the context in

in support of the Context Executive and Context Processor modules. Context is dis -tributed and replicated within the domain

they monitor hardware and software for their state, present their capabili -ties, or collect configuration parameters.

A monitoring mechanism and framework was developed to gather measurements from relevant physical and virtual resources

, the number of CPUS,(ii) N-time queries, which collect information periodically, and (iii) continuous queries that monitor information in an ongoing

manner. CCPS should be located near the corresponding sources of information in 28 A. Galis et al

-erations such as getting the state of a server with its CPU or memory usage, getting

bytes coming in and out, or getting the state of disks on a system presenting the total

own thread allowing each one to collect data at different rates and also having the

information retrieval is handled by the Virtualisation Plane The reader collects the raw measurement data from all of the sensors of a CCP

The collection can be done at a regular interval or as an event from the sensor itself

The reader collects data from many sensors and converts the raw data into a common measurement object used in the CISP Monitoring framework.

meta-data about the sensor and the time of day, and it contains the retrieved data from

the sensor The filter takes measurements from the reader and can filter them out before they

which they collect data;(ii) the filtering process, by changing the filter or adapting an

IP ADDRESS and port) that the ICP is connected to The vcpi supports the extension with additional functions,

which can measure attributes from CPU, memory, and network components of a server host, were created.

We can also measure the same attributes of virtualised hosts by interacting with a hypervisor to collect these values.

Towards In-Network Clouds in Future Internet 29 2. 5 Management Plane Overview The Management Plane is a basic building block of the infrastructure,

-tinuous migration of virtual routers into hosts (i e.,, physical nodes and servers) subject to constraints determined by the Orchestration Plane.

The Management Plane is de -signed to meet the following functionality •Embedded (Inside) Network functions:

i e. fixed, wireless and mobile networks) and service physical infrastructures •Aware and Self-aware functions:

It monitors the network and operational context as well as internal operational network state in order to assess if the network cur

the optimal placement and continuous migration of virtual routers into hosts (i e. physi -cal nodes and servers) subject to constraints determined by the Orchestration Plane

Fig. 5. Autonomic Control Loops 30 A. Galis et al The Management Plane consists of Autonomic Management Systems (AMS.

Mapping logic enables the data stored in models to be transformed into knowledge and combined with knowledge stored in ontologies

-oped and issued as open source 10, which aims to create a highly open and flexible

environment for In-Network Clouds in Future Internet. They are described briefly here -with. Full design and implementation of all software platforms are presented in 10

•vcpi (Virtual Component Programming interface is the VP€ s main component deal -ing with the heterogeneity of virtual resources and enabling programmability of net

-work elements In each physical node there is an embedded vcpi, which is aware of the structure of the virtual resources,

Towards In-Network Clouds in Future Internet 31 •CISP (Context Information Service Platform) is the KP€ s main component sup

add powerful and flexible monitoring facilities to system clouds (virtualisation of networks and services. Lattice has a minimal runtime footprint

The framework provides data sources, data consumers, and a control strategy. In a large distributed system there may be hundreds or thousands of measurement

probes, which can generate data •APE (Autonomic Policy-based Engine), a component of the MP, supports context

-tual entities, such as servers and routers •RNM (Reasoning and Negotiation Module), a core element of the KP, which me

-diates and negotiates between separate federated domains These In-Network Cloud platforms were integrated and validated on 2 testbeds ena

-bling experimentation with thousands of virtual machines: V3 †UCL€ s Experimental Testbed located in London consisting of 80 cores with a dedicated 10 Gbits/s infra

-structure and Grid5000-an Experimental testbed located in France consisting of 5000 cores and linked by a dedicated 10 Gbits/s infrastructure.

Validation and performance analysis are described fully in 13. Demonstrations are available at: http://clayfour ee. ucl. ac. uk/demos/and they are used for

•Autonomic service provisioning on In-Network Clouds (Service Computing Clouds 4 Conclusion This work has presented the design of an open software networked infrastructure (In

-Network Cloud) that enables the composition of fast and guaranteed services in an efficient manner,

and service resources provided by an virtualisation environment. We have described also the management architectural and system model

for our Future Internet, which were described with the help of five abstractions and distributed systems †the OSKMV planes:

Virtualisation Plane (VP), Management Plane (MP), Knowledge Plane (KP), Service Plane (SP) and Orchestration Plane

OP). The resulting software-driven control network infrastructure was exercised fully and relevant analysis on network virtualisation and service deployments were carried

out on a large-scale testbed Virtualising physical network and server resources has served two purposes: Man

-aging the heterogeneity through introduction of homogeneous virtual resources and enabling programmability of the network elements.

The flexibility gained through this approach helps to adapt the network dynamically to both unforeseen and predictable

A vital component of such a virtualisation approach is a common management and monitoring interface of virtualised resources.

then form the basis for new types of applications and services in the future Internet Acknowledgments. This work was undertaken partially in the context of the FP7-EU

Autonomic Internet 10 and the RESERVOIR 9 research projects, which were funded by the Commission of the European union.

Future Generation Internet Architecture http://www. isi. edu/newarch /2. Galis, A.,et al.:Management and Service-aware Networking Architectures (MANA) for

Future Internet Position Paper: System Functions, Capabilities and Requirements. Invited paper IEEE Chinacom09 26-28, Xi†an, China (August 2009

http://www. chinacom. org/2009/index. html 3. Rubio-Loyola, J.,et al.:Platforms and Software systems for an Autonomic Internet.

IEEE Globecom 2010; 6-10 dec.,, Miami, USA (2010 4. Galis, A.,et al.:Management Architecture and Systems for Future Internet Networks.

In Towards the Future Internet, IOS Press, Amsterdam (2009 5. Chapman, C.,et al.:Software Architecture Definition for On-demand Cloud Provisioning

ACM HPDC, 21-25, Chicago hpdc2010. eecs. northwestern. edu (June 2010 6. Rochwerger, B.,et al.:

An Architecture for Federated Cloud computing. In: Cloud Com -puting, Wiley, Chichester (2010 7. Chapman, C.,et al.:

Elastic Service Management in Computational Clouds. 12th IEEE/IFIP NOMS2010/Cloudman 2010 19-23 april, Osaka (2010

/Towards In-Network Clouds in Future Internet 33 8. Clayman, S.,et al.:Monitoring Virtual Networks with Lattice.

-Management of Future Internet 2010; 19-23 april, Osaka, Japan (2010 http://www. manfi. org/2010

-tures, and Protocols For Computer Communications (Karlsruhe, Germany, SIGCOMM †03 Karlsruhe, Germany, August 25†29,2003, pp. 3†10.

Journal Computer networks: The International Journal of Computer and Tele -communications Networking 54 (5)( 2010 15.

Galis, A.,Denazis, S.,Bassi, A.,Berl, A.,Fischer, A.,de Meer, H.,Strassner, J.,Davy, S.,Ma

-ture and Systems for Future Internet Networks. In: Towards the Future Internet †A European

Research Perspective, p. 350. IOS Press, Amsterdam (2009), http://www. iospress. nl /16. Berl, A.,Fischer, A.,De Meer, H.:

Using System Virtualization to Create Virtualized Net -works. Electronic communications of the EASST 17, 1†12 (2009

http://journal. ub. tu-berl. asst/article/view/218/219 J. Domingue et al. Eds.):) Future Internet Assembly, LNCS 6656, pp. 35†50,2011

 The Author (s). This article is published with open access at Springerlink. com Flat Architectures:

Towards Scalable Future Internet Mobility Lászlã Bokor, Zoltã¡n Faigl, and Sándor Imre

Budapest University of Technology and Economics department of Telecommunications Mobile Communication and Computing Laboratory †Mobile Innovation Centre

Magyar Tudosok krt. 2, H-1117, Budapest Hungary {goodzi, szlaj, imre}@ mcl. hu Abstract. This chapter is committed to give a comprehensive overview of the

scalability problems of mobile Internet nowadays and to show how the concept of flat and ultra flat architectures emerges due to its suitability and applicability

for the future Internet. It also aims to introduce the basic ideas and the main

will guide the readers from the basics of flat mobile Internet architectures to the paradigm†s complex feature set

and power creating a novel Internet architecture for future mobile communications Keywords: mobile traffic evolution, network scalability, flat architectures, mo

-bile Internet, IP mobility, distributed and dynamic mobility management 1 Introduction Mobile Internet has started recently to become a reality for both users and operators

thanks to the success of novel, extremely practical smartphones, portable computers with easy-to-use 3g USB modems and attractive business models.

Based on the cur -rent trends in telecommunications, vendors prognosticate that mobile networks will suffer an immense traffic explosion in the packet switched domain up to year 2020

1†4. In order to accommodate the future Internet to the anticipated traffic demands technologies applied in the radio access

and core networks must become scalable to advanced future use cases There are many existing solutions aiming to handle the capacity problems of cur

-rent mobile Internet architectures caused by the mobile traffic data evolution. Reserv -ing additional spectrum resources is the most straightforward approach for increasing

the throughput of the radio access, and also spectrum efficiency can be enhanced thanks to new wireless techniques (e g.,

, High Speed Packet Access, and Long term Evolution). ) Heterogeneous systems providing densification and offload of the macro

-cellular network throughout pico, femtocells and relays or Wifi/Wimax interfaces also extend the radio range.

Since today†s mobile Internet architectures have been designed originally for voice services and later extended to

customers by balancing user traffic between a large variety of access networks. Scal -ability of traffic, network and mobility management functions has become one of the

most important questions of the future Internet The growing number of mobile users, the increasing traffic volume, the complexity

of mobility scenarios, and the development of new and innovative IP-based applica -tions require network architectures able to deliver all kind of traffic demands seam

nature of current and planned mobile Internet standards (e g.,, the ones maintained by the IETF or by the collaboration of 3gpp) prevents cost effective system scaling for

the novel traffic demands. Aiming to solve the burning problems of scalability from an architectural point of view, flat and fully distributed mobile architectures are gain

-ing more and more attention today The goal of this chapter is to provide a detailed introduction to the nowadays

emerging scalability problems of the mobile Internet and also to present a state of the

art overview of the evolution of flat and ultra flat mobile communication systems. In order to achieve this we first introduce the issues relating to the continuously growing

traffic load inside the networks of mobile Internet providers in Section 2. Then, in Section 3 we present the main evolutionary steps of flat architectures by bringing

the Mobile Internet 2. 1 Traffic Evolution Characteristics of the Mobile Internet One of the most important reasons of the traffic volume increase in mobile telecom

-munications is demographical. According to the current courses, world†s population is growing at a rate of 1. 2%annually,

and the total population is expected to be 7. 6 billion in year 2020. This trend also implies a net addition of 77 million new inhabi

billion people †are using the Internet. Over 60%of the global population †now we

the number of wireless broadband subscriptions is about to exceed the total amount of fixed broadband subscriptions and this development

Towards Scalable Future Internet Mobility 37 becomes even more significant considering that the volume of fixed broadband sub

The expansion of wireless broadband subscribers not only inflates the volume of mobile traffic directly, but also facilitates the growth in broadband wireless enabled

terminals. However, more and more devices enable mobile access to the Internet, only a limited part of users is attracted

or open to pay for the Wireless internet services meaning that voice communication will remain the dominant mobile application also

in the future. Despite this and the assumption of 5 implying that the increase in the number of people potentially using mobile Internet services will likely saturate after

2015 in industrialized countries, the mobile Internet subscription growth potential will be kept high globally by two main factors.

On one hand the growth of subscribers continues unbrokenly in the developing markets: mobile broadband access through

basic handhelds will be the only access to the Internet for many people in Asia/Pacific.

On the other hand access device, application and service evolution is also expected to sustain the capability of subscriber growth

The most prominent effect of services and application evolution is the increase of video traffic:

it is foreseen that due to the development of data-hungry entertainment services like television/radio broadcasting and Vod, 66%of mobile traffic will be

video by 2014 2. A significant amount of this data volume will be produced by mobile Web-browsing which is expected to become the biggest source of mobile

video traffic (e g.,, Youtube. Cisco also forecasts that the total volume of video (in -cluding IPTV, Vod, P2p streaming, interactive video, etc.

will reach almost 90 per -cent of all consumer traffic (fixed and mobile) by the year 2012, producing a substan

-tial increase of the overall mobile traffic of more than 200%each year 7. Video traffic is anticipated also to grow so drastically in the forthcoming years that it could

overstep Peer-to-peer (P2p) traffic 4. Emerging web technologies (such as HTML5), the increasing video quality requirements (HDTV, 3d, SHV) and special

application areas (virtual reality experience sharing and gaming) will further boost this process and set new challenges to mobile networks.

Since video and related enter -tainment services seems to become dominant in terms of bandwidth usage, special

optimization mechanisms focusing on content delivery will also appear in the near future. The supposed evolution of Content Delivery Networking (CDN) and smart

data caching technologies might have further impact on the traffic characteristics and obviously on mobile architectures

Another important segment of mobile application and service evolution is social networking. As devices, networks and modes of communications evolve,

users will choose from a growing scale of services to communicate (e g.,, e-mail, Instant Mes

-saging, blogging, micro-blogging, Voip and video transmissions, etc..In the future social networking might evolve even further,

like to cover broader areas of personal communication in a more integrated way, or to put online gaming on the next level

deeply impregnated with social networking and virtual reality Even though video seems to be a major force behind the current traffic growth of

the mobile Internet, there is another emerging form of communications called M2m Machine to machine-Machine) which has the potential to become the leading traffic contribu

-tor in the future. M2m sessions accommodate end-to-end communicating devices 38 L. Bokor, Z. Faigl, and S. Imre

without human intervention for remote controlling, monitoring and measuring, road safety, security/identity checking, video surveillance, etc.

will be 225 million cellular M2m devices by 2014 with little traffic per node but re

As a summary we can state that the inevitable mobile traffic evolution is foreseen thanks to the following main factors:

mobile networks, devices, applications and services, and significant device increase potential resulted by the tremendous number of novel subscriptions for Machine-to

2. 2 Scalability Problems of the Mobile Internet Existing wireless telecommunication infrastructures are prepared not to handle this

traffic increase, current mobile Internet was designed not with such requirements in mind: mobile architectures under standardization (e g.,

, 3gpp, 3gpp2, Wimax Fo -rum) follow a centralized approach which cannot scale well to the changing traffic

conditions On one hand user plane scalability issues are foreseen for anchor-based mobile Internet architectures, where mechanisms of IP ADDRESS allocation and tunnel estab

-lishment for end devices are managed by high level network elements, called anchor points (GGSN in 3gpp UMTS, PDN GW in SAE,

and CSN for Wimax networks Each anchor point maintains special units of information called contexts,

containing binding identity, tunnel identifier, required Qos, etc. on a per mobile node basis These contexts are updated continuously

and used to filter and route user traffic by the anchor point (s) towards the end terminals and vice versa.

However, network ele -ments (hence anchor points too) are limited in terms of simultaneous active contexts Therefore, in case of traffic increase new equipments should be installed or existing

service convergence in current mobile Internet architectures but introduces additional complexity regarding session establishment procedures.

and Charging Control architecture by 3gpp) to achieve interaction between the two levels during session establishment, modification and release routines.

operator policy and user subscription. Due to the number of standardized interfaces e g.,, towards IP Multimedia Subsystem for delivering IP multimedia services), the

interoperability between the service and the access layer can easily cause scalability and Qos issues even in the control plane

Towards Scalable Future Internet Mobility 39 As a consequence, architectural changes are required for dealing with the ongoing

future mobile networks must specify architecture optimized to maximize the end-user experience, minimize CAPEX/OPEX, energy efficiency, net

and to ensure mobile networks sustainability 3 Evolution of Flat Architectures 3. 1 Evolution of the Architecture of 3gpp Mobile networks

Fixed networks were firstly subject to similar scalability problems. The evolution of DSL access architecture has shown in the past that pushing IP routing and other func

-tions from the core to the edge of the network results in sustainable network infra

-cation and mobile Internet era The 3gpp network architecture specifications having the numbers 03.02 8 and

23.002 9 show the evolution of the 3gpp network from GSM Phase 1 published in

1995 until the Evolved Packet System (EPS) specified in Release 8 in 2010. The core

part of EPS called Evolved Packet Core (EPC) is extended continuously with new features in Release 10 and 11.

The main steps of the architecture evolution are sum -marized in the followings. Fig. 1 illustrates the evolution steps of the packet-switched

domain, including the main user plane anchors in the RAN and the CN In Phase 1 (1995) the basic elements of the GSM architecture have been defined

The reasons behind the hierarchization and centralization of the GSM architecture were both technical and economical.

Primarily it offloaded the switching equipments crossbar switch or MSC. In parallel, existing ISDN switches could be reused as

Fig. 1. The evolution of the packet-switched domain of the 3gpp architecture, including the

main user plane anchors in the RAN and the CN 40 L. Bokor, Z. Faigl, and S. Imre

Release 1999 (2002) describes the well known UMTS architec -ture clearly separating the CS and PS domains.

Seeing that UMTS was designed to be the successor of GSM, it is not strange that the central anchors remained in place in

3g and beyond Progress of mobile and wireless communication systems introduced some funda -mental changes. The most drastic among them is that IP has become the unique access

protocol for data networks and the continuously increasing future wireless traffic is also based on packet data (i e.,

, Internet communication. Due to the collateral effects of this change a convergence procedure started to introduce IP-based transport tech

-nology in the core and backhaul network: Release 4 (2003) specified the Media gate -way function, Release 5 (2003) introduced the IP Multimedia Subsystem (IMS) core

network functions for provision of IP services over the PS domain, while Release 6 standardized WLAN interworking and Multimedia Broadcast Multicast Service

MBMS With the increasing IP-based data traffic flattening hierarchical and centralized functions became the main driving force in the evolution of 3gpp network architec

-tures. Release 7 (also called Internet HSPA, 2008) supports the integration of the RNC with the Nodeb providing a one node based radio access network.

Another architectural enhancement of this release is the elaboration of Direct Tunnel service 10 11.

Direct Tunnel allows to offload user traffic from SGSN by bypassing it. The Direct Tunnel enabled SGSNS can initiate the reactivation of the PDP context to tun

-nel user traffic directly from the RNC to the GGSN or to the Serving GW introduced

in Release 8. This mechanism tries to reduce the number of user-plane traffic anchors

However it also adds complexity in charging inter-PS traffic because SGSNS can not account the traffic passing in direct tunnels.

When Direct Tunnel is enabled, SGSNS still handle signaling traffic, i e.,, keep track of the location of mobile devices and

participate in GTP signaling between the GGSN and RNC Release 8 (2010) introduces a new PS domain, i e.,

, the Evolved Packet Core EPC). ) Compared to four main GPRS PS domain entities of Release 6, i e. the base

station (called Nodeb), RNC, SGSN and GGSN, this architecture has integrated one radio access node, containing the precious base station and the radio network control

functions, and three main functional entities in the core, i e. the Mobility Management Entity (MME), the Serving GW (S-GW) and the Packet data Network GW (PDN GW

Release 9 (2010) introduces the definition of Home (e) Nodeb Subsystem. These systems allow unmanaged deployment of femtocells at indoor sites,

providing almost perfect broadband radio coverage in residential and working areas, and offloading the managed, pre-panned macro-cell network 14

In Release 10 (2010) Selective IP Traffic Offload (SIPTO) and Local IP Access LIPA) services have been published 15.

traffic from the macro-cellular network or the H (e) Nodeb subsystems, in order to offload the network elements in the PS and EPC PS domain.

Towards Scalable Future Internet Mobility 41 entities in the same residential/enterprise IP network without the user plane traversing

the core network entities. SIPTO enables per APN and/or per IP flow class based

traffic offload towards a defined IP network close to the UE's point of attachment to

The above evolutionary steps resulted in that radio access networks of 3gpp be -came flattened to one single serving node (i e.,

However, the flat nature of LTE and LTE-A architectures concerns only the control plane but not the user plane:

LTE is linked to the Evolved Packet Core (EPC) in the 3gpp system evolution, and in EPC

the main packet switched core network functional entities are still remaining central -ized, keeping user IP traffic anchored.

There are several schemes to eliminate the residual centralization and further extend 3gpp 3. 2 Ultra Flat Architecture

One of the most important schemes aiming to further extend 3gpp standards is the Ultra Flat Architecture (UFA) 16†20.

Authors present and evaluate an almost green field approach which is a flat and distributed convergent architecture, with the excep

-tion of certain control functions still provided by the core. UFA represents the ulti -mate step toward flattening IP-based core networks, e g.,

, the EPC in 3gpp. The ob -jective of UFA design is to distribute core functions into single nodes at the edge of

the network, e g.,, the base stations. The intelligent nodes at the edge of the network

are called UFA gateways. Fig. 2 illustrates the UFA with HIP and PMIP-based mobil -ity control

Fig. 2. The Ultra Flat Architecture with HIP and PMIP-based mobility control Since mobility introduces frequent IP-level handovers a Session Initialization Proto

-col (SIP) based handover procedure has been described in 16. It has been shown by a numerical analysis, and in a later publication with measurements on a testbed 17

Back User Agents (B2buas) in UFA GWS can prepare for fast handovers by com -municating the necessary contexts, e g.,

, the new IP ADDRESS before physical handover This scheme supports both mobile node (MN) and network decided handovers

In the PS domain, IP multimedia services require a two-level session establishment procedure. First, the MN and the correspondent node (CN) negotiate the session pa

Interworking with Internet applications based on non SIP control protocol is a technical challenge for mobile operators.

A Mobile IPV6 and a Host Identity Protocol (HIP) based signaling scheme alternative has been introduced for UFA by Z. Faigl et al. 18.

-dures of UFA, to reduce the number of HIP Base Exchanges in the access and core

Flat mobile networks not only require novel architectural design paradigms, special network nodes and proprietary elements with peculiar functions, but also demand

routines of the future mobile Internet designs. The importance of this research area is also emphasized by the creation of a new IETF nonworking group called Distributed

and user traffic forward -ing. In 3g UMTS architectures centralized and hierarchical mobility anchors are

Flat Architectures: Towards Scalable Future Internet Mobility 43 implemented by the RNC, SGSN and GGSN nodes that handle traffic forwarding

tasks using the apparatus of GPRS Tunneling Protocol (GTP. The similar centraliza -tion is noticeable in Mobile IP (MIP) 21 where the Home Agent †an anchor node for

both signaling and user plane traffic†administers mobile terminals†location informa -tion, and tunnels user traffic towards the mobile†s current locations and vice versa

Several enhancements and extensions such as Fast Handoffs for Mobile IPV6 (FMIP 22, Hierarchical Mobile IPV6 (HMIP) 23, Multiple Care-of Addresses Registration

24, Network Mobility (NEMO) Basic Support 25, Dual-Stack Mobile IPV6 26 and Proxy Mobile IPV6 (PMIP) 27, were proposed to optimize the performance and

broaden the capabilities of Mobile IP, but all of them preserve the centralized and anchoring nature of the original scheme

There are also alternate schemes in the literature aiming to integrate IP-based mo -bility protocols into cellular architectures and to effectively manage heterogeneous

networks with special mobility scenarios. Cellular IP 28 introduces a gateway router dealing with local mobility management while also supporting a number of handoff

techniques and paging. A similar approach is the handoff-aware wireless access Inter -net infrastructure (HAWAII) 29,

Some of the above solutions are standardized already 12 13 33 for 3g and be -yond 3g architectures where the introduced architectural evolution is in progress:

E -UTRAN (Evolved Universal Terrestrial Radio Access Network) or LTE (Long term Evolution) base stations (enodebs) became distributed in a flatter scheme allowing

almost complete distribution of radio and handover control mechanisms together with direct logical interfaces for inter-enodeb communications.

mechanisms in current wireless and mobile networks anchor the user traffic relatively far from users†location.

This results in centralized, unscalable data plane and control plane with non-optimal routes, overhead and high end-to-end packet delay even in

case of motionless users, centralized context maintenance and single point of failures Anchor-based traffic forwarding

-ployment issues for caching contents near the user To solve all these problems and questions novel, distributed and dynamic mobility

-main in the core network. A good example is the Global HA to HA protocol 34, which

Link and distribute the Home Agents in Layer 3, at the scale of the Internet.

Distributed IP Mobility Approach) 35 can also be considered as a core-level scheme by allowing the distribution of MIP Home Agent (the normally isolated central server

to many and less powerful interworking servers called Mobility Agents (MA. These new nodes have combined the functionality of a MIP Home Agent and HMIP/PMIP

Mobility Anchor Points. The administration of the system of distributed MAS is done via a distributed Home Agent overlay table structure based on a Distributed Hash Table

The concept of UMTS Base Station Router (BSR) 37 realizes such an access-level mobility management distribution

scheme where a special network element called BSR is used to build flat cellular systems. BSR merges the GGSN, SGSN, RNC and Nodeb entities into a single ele

while a common UMTS network is built from a plethora of network nodes and is maintained in a hierarchical and centralized fashion,

Furthermore, the BSR can be considered a special wireless edge router that bridges between mobile/wireless and IP communication.

In order to achieve this, mobility support in the BSR is handled at three layers: RF channel mo

the access network side and terminals on the user side. Core network nodes are mainly simple IP routers.

The scheme applies DHT and Loc/ID separation: each mo -bile node has a unique identifier (ID) keeping persistent,

and an IP ADDRESS based locator (Loc) changed by every single mobility event. The (Loc, ID) pair of each mo

-bile is stored inside AGW nodes and organized/managed using DHTS A third type of DMM application scenarios is the so-called host-level

-spondent node, a special information server is required in the network, which can also Flat Architectures:

Towards Scalable Future Internet Mobility 45 be centralized or distributed. A good example for host-level schemes in the IP layer is

MIPV6 which is able to bypass the user plane anchor (i e.,, Home Agent) due to its

-ing and user planes based on their differences in traffic volume or end-host behavior i e.,

, only the user plane is distributed), or by granting mobility support only to nodes that actually need it (i e.,

Mobile IP without route optimization) do not separate signaling and user planes which means that all control

and data packets traverse the centralized or hierarchized mobility anchor. Since the volume of user plane traffic is compared much higher to

the signaling traffic, the separation of signaling and user planes together with the distribution of the user plane but without eliminating signaling anchors can still result

in effective and scalable mobility management. This is exploited by the HIP based UFA scheme 18†20 where a relatively simple inter-UFA GW protocol can be used

thanks to the centralized HIP signaling plane, but the user plane is still fully distrib

-uted. Mobile IP based DMM solutions also rely on the advantages of this partial dis -tribution concept when they implement route optimization, hence separate control

packets from data messages after a short period of route optimization procedure The second type of partially distributed mobility management is based on the ca

Integrating this concept with distributed anchors, the algorithms supporting dynamic mobility could also be distributed. Such integration is accomplished in

-ing on the IP ADDRESS used. Based on this behavior, the system is able to avoid execu

deployment scheme of Proxy Mobile IP for flat architecture. This extension allows to dynamically distributing mobility functions among access routers:

the mobility sup -port is restricted to the access level, and adapted dynamically to the needs of mobile

, both data plane and control plane are distributed). This implies the introduc -tion of special mechanisms in order to identify the anchor that manages mobility sig

-naling and data forwarding of a particular mobile node, and in most cases this also

requires the absolute distribution of mobility context database (e g.,, for binding in -formation) between every element of the distributed anchor system.

by using Hi3 50 for core-level distribution of HIP signaling plane) are also feasible

directly connected to the IP core infrastructure. Therefore, they provide convenient and implicit interoperability between heterogeneous wireless technologies, and facili

additional delay that user and signaling plane messages perceive over a hierarchical and multi-element access

Towards Scalable Future Internet Mobility 47 BS nodes also minimizes the feedback time of intermodule communication, i e.,

-nents could be compared much cheaper to HSPA and LTE devices today because of the economy of scale.

tools due to the apparition of tools developed formerly for the Internet era may reduce the operational expenditures as well

due to lack of core controller entities base stations are managed no more centrally; hence failure diagnostics and recovery must be handled in a fully distrib

scalability, fault tolerance and flexibility Optimization of handover performance is another key challenge for flat networks

Since all the BSS are connected directly to the IP core network, hiding mobility events from the IP layer is much harder

tional hierarchical and centralized mobile telecommunication architectures. The IP network that deals with the interconnection of base stations in flat networks must be

mobile Internet architecture for better adaptation to future needs Acknowledgments. This work was made in the frame of Mobile Innovation Centre's

1. UMTS Forum White paper: Recognising the Promise of Mobile Broadband (June 2010 2. Cisco VNI:

Global Mobile Data Traffic Forecast Update, 2009-2014 (Feb. 2010 3. Dohler, M.,Watteyne, T.,Alonso-Zá

rate, J.:Machine to machine-Machine: An Emerging Commu -nication Paradigm, Tutorial. In: Globecom†10.dec 2010 4. Schulze, H.,Mochalski, K.:

Ipoque, Internet Study 2008/2009, Ipoque (Jan. 2011 5. UMTS Forum, REPORT NO 37, Magic Mobile Future 2010-2020 (April 2005

6. International Telecommunication Union, Press release: ITU sees 5 billion mobile sub -scriptions globally in 2010 (February 2010

7. Cisco VNI: Hyperconnectivity and the Approaching Zettabyte Era (June 2010 8. ETSI GTS GSM 03.02-v5. 1. 0:

Digital cellular telecommunications system (Phase 2 +-Network architecture (GSM 03.02)( 1996 9. 3gpp TS 23.002: Network architecture, V10. 1. 1, Release 10.jan 2011

10. 3gpp TR 23.919: Direct Tunnel Deployment Guideline, Release 7, V1. 0. 0 (May 2007

11. 3gpp TS 23.401: General Packet Radio Service (GPRS) enhancements for Evolved Uni -versal Terrestrial Radio Access Network (E-UTRAN) access, Rel. 8, V8. 12.dec 2010

12. 3gpp TS 29.275, Proxy Mobile IPV6 (PMIPV6) based Mobility and Tunneling protocols Stage 3, Release 10, V10. 0. 0 (Dec. 2010

13. 3gpp TS 24.303, Mobility management based on Dual-Stack Mobile IPV6, Stage 3, Re -lease 10, V10. 1. 0 Dec (2010

14. Femtoforum: Femtocells †Natural Solution for Offload †a Femto Forum brief (June 2010

15. 3gpp TR 23.829: Local IP Access and Selected IP Traffic Offload, Release 10, V1. 3 (2010

16. Daoud, K.,Herbelin, P.,Crespi, N.:UFA: Ultra Flat Architecture for high bitrate services

in mobile networks. In: Proc. of PIMRC€ 08, Cannes, France, pp. 1†6 (2008 17. Daoud, K.,Herbelin, P.,Guillouard, K.,Crespi, N.:

Performance and Implementation of UFA: a SIP-based Ultra Flat Mobile network Architecture. In: Proc. of PIMRC (Sep. 2009

18. Faigl, Z.,Bokor, L.,Neves, P.,Pereira, R.,Daoud, K.,Herbelin, P.:Evaluation and compari

-son of signaling protocol alternatives for the Ultra Flat Architecture, ICSNC, pp. 1†9 (2010

Towards Scalable Future Internet Mobility 49 19. Bokor, L.,Faigl, Z.,Imre, S.:A Delegation-based HIP Signaling Scheme for the Ultra Flat

Journal of Computer networks (2011), doi: 10.1016/j. comnet. 2011.02.005 21. Johnson, D.,Perkins, C.,Arkko, J.:

IP Mobility Support in IPV6, IETF RFC 3775 (2004 22. Koodli, R. ed.:Fast Handoffs for Mobile IPV6, IETF RFC 4068 (July 2005

23. Soliman, H.,Castelluccia, C.,El Malki, K.,Bellier, L.:Hierarchical Mobile IPV6 Mobility Management (HMIPV6), IETF RFC 4140 (Aug. 2005

24. Wakikawa, R. ed.:V. Devarapalli, G. Tsirtsis, T. Ernst, K. Nagami: Multiple Care-of

Mobile IPV6 Support for Dual Stack Hosts and Routers, IETF RFC 5555 (June 2009 27.

Proxy Mobile IPV6, IETF RFC 5213 (Aug. 2008 28. Valko: Cellular IP: A New Approach to Internet Host Mobility, ACM SIGCOMM Comp

Commun. Rev. 29 (1), 50-65 (1999 29. Ramjee, R.,Porta, T. L.,Thuel, S.,Varadhan, K.,Wang, S.:

HAWAII: A Domain-Based Approach for Supporting Mobility in Wide-area Wireless Networks. In: IEEE Int. Conf

Network protocols (1999 30. Grilo, A.,Estrela, P.,Nunes, M.:Terminal Independent Mobility for IP (TIMIP.

33. 3gpp TS 23.402, Architecture enhancements for non-3gpp accesses, Rel. 10, V10. 2 (2011

Global HA to HA protocol, IETF Internet -Draft, draft-thubert-nemo-global-haha-02. txt (Sept. 2006

-bility Approach for 3g SAE. In: Proc. of 19th PIMRC, ISBN: 978-1-4244-2643-0 (Sept

The UMTS base station router. Bell labs Tech. Journal, I. 11 (4), 93†111 (2007 38.

Liu Yu, Zhao Zhijun, Lin Tao, Tang Hui: Distributed mobility management based on flat network architecture. In:

IEEE conference on Global telecommunications (GLOBECOM€ 09), Honolulu, HI (2009 46. Kassi-Lahlou, M.,Jacquenet, C.,Beloeil, L.,Brouckaert, X.:

Dynamic Mobile IP (DMI IETF Internet-Draft, draft-kassi-mobileip-dmi-01. txt (Jan. 2003

47. Song, M.,Huang, J.,Feng, R.,Song, J.:A Distributed Dynamic Mobility Management Strategy for Mobile IP Networks.

Dynamic Mobility Anchoring, IETF Internet-Draft (May 2010 49. Yan, Z.,Lei, L.,Chen, M.:

Future Wireless communication Systems, Wireless World Research Forum (Oct. 2008 50. Gurtov, A.,et al.:Hi3: An efficient and secure networking architecture for mobile hosts

Journal of Computer Communications 31 (10), 2457†2467 (2008 J. Domingue et al. Eds.):) Future Internet Assembly, LNCS 6656, pp. 51†66,2011

 The Author (s). This article is published with open access at Springerlink. com Review and Designs of Federated Management in

Future Internet Architectures Martã n Serrano1, Steven Davy1, Martin Johnsson1, Willie Donnelly1, and Alex Galis2

Telecommunications Software and Systems Group †TSSG, Co. Waterford, Ireland {jmserrano, sdavy, mjohnsson, wdonnelly}@ tssg. org

The Future Internet as a design conception is network and service -aware addressing social and economic trends in a service oriented way.

Future Internet, applications transcend disciplinary and technology boundaries following interoperable reference model (s). In this paper we discuss issues

In Future Internet architectures, service and network requirements act as design inputs particularly on information interoperability

and manageable new Internet reference model is critical for Future Internet re -alisation and deployment.

We address challenges for a future Internet Architec -ture perspective using federation. We also provide, in a form of realistic imple

-ity in the future Internet Keywords: Federation, Management, Reference Model, Future Internet, Archi -tectures and Systems, Autonomics, Service Management, Semantic Modelling

and Management, Knowledge Engineering, Networking Data and Ontologies Future Communications and Internet 1 Introduction In recent years convergence on Internet technologies for communication†s, computa

-tion†s and storage†s networks and services has been a clear trend in the Information

and Communications technology (ICT) domain. Although widely discussed and 52 M. Serrano et al researched, this trend has not fully run its course in terms of implementation, due to

many complex issues involving deployment of non-interoperable and management infrastructural aspects and also due to technological, social, economic restrictions and

bottlenecks in the future Internet In the future Internet, services and networks follow a common goal: to provide so

-lutions in a form of implemented interoperable mechanisms. Telecommunications networks have undergone a radical shift from a traditional circuit-switched environ

-ment with heavy/complex signalling focused on applications-oriented perspective towards a converged service-oriented space, mostly Internet interaction by customer

as end-user and network operators as service providers. The benefits of this shift re -flect cost reduction and increase systems flexibility to react to user demands, by re

-placing a plethora of proprietary hardware and software platforms with generic solu -tions supporting standardised development and deployment stacks

The Future Internet as design conception is service-aware of the network infra -structure addressing service-oriented, social trends and economic commitments.

In the Future Internet trans-disciplinary solutions (applications that transcend disciplinary boundaries) following reference model (s) are crucial for a realistic integrated man

-agement realisation. Challenges in the future communications systems mainly de -mand, in terms of end user requirements, personalized provisioning, service-oriented

performance, and service-awareness networking Additionally to those technology requirements, necessities to support information interoperability as result of more service-oriented demands exist.

communication systems supporting end user and network requirements. Demands on data models integration are requirements to be considered during the design and im

-plementation phases of any ICT system The emergence and wide-scale deployment of wireless access network technolo

-gies calls into question the viability of basing the future Internet on IP and TCP â€

Internet, argue that the future lies in layers of overlay networks that can meet various

-ing Internet. Others initiatives such as Clean slate program 2 Stanford university and Architecture Design Project for New Generation Network 3 argue that the im

core Internet Protocols themselves We argue that service agnostic network design are no longer a way to achieve in

that meet the rapidly changing needs of the communities of users for which the hour

Review and Designs of Federated Management in Future Internet Architectures 53 In this paper service and network requirements 4 5 6 7 8 9 acts as inputs par

-ling communication systems for the Future Internet. We support the idea of interoper -able, extensible, reusable, common and manageable new Internet reference model is

critical for Future Internet realization and deployment. The new Internet reference model must rely on the fact that high-level applications make use of diverse infrastruc

-ture representations and not use of resources directly. So when resources are not being required to support

or deploy services they can be used in other tasks or services. As implementation challenge for controlling

We address challenges for a future Internet Architecture perspective using federation. We also provide, in a form of realistic im

-lenges about Future Internet architectures in terms of cross-domain interoperability Section III presents the rationale about federation as crucial concept in the framework

of this Future Internet research. Section IV presents a Federated Management Refer -ence Model and its implications for networks and services.

and outlook of this research. Finally some bibliography references supporting this research are included 2 Challenges for Future Internet Architectures

This section focuses on interdisciplinary approaches to specify data link and cross -domain interoperability to, collectively, constitute a reference model that can guide the

realisation of future communications environments in the future Internet 4 11 12 13. The Future Internet architecture must provide societal services and,

in doing so support and sustain interactions between various communities of users in straight rela

-tion with communication infrastructure mechanisms. Service-awareness 4 has many aspects to consider as challenges,

communication, storage, content and computation substrata Networking-awareness 4 challenges imply the consumer-facing and the resource

The optimization of resources 15 16 17 using federation in the future Internet relies on classify and identify properly what resources need to be used, thus dynami

3 Rationale for Federation in the future Internet Federation is relatively a new paradigm in communications, currently studied as the

-vices in the future Internet. Federation in the future Internet envisions management systems (networks and services) made up of possibly heterogeneous components

each of which has some degree of local autonomy to realize business goals. Such business goals provide services that transcend legal and organizational boundaries in

Future Internet environments consist of heterogeneous administrative domains each providing a set of different services. In such complex environment, there is no

Review and Designs of Federated Management in Future Internet Architectures 55 authorities in which each domain has a set of limited powers regarding their own

4 Federated Management Activity in the future Internet This section references theoretical foundation for the development of interdiscipli

-nary Future Internet visions about a Federated Management and their implications for networks and services.

In future Internet end user, service, application and network requirements act as guidelines to identify study and clarify part of complex requirements.

-ships between Network Virtualisation and Federation 16 21 22 23 and the rela -tionship between Service virtualisation (service clouds) and federation 17 are the

support of a new world of solutions defining the Future Internet Next generation networks and services 3 4 24 can not be conceived without

systems acting and reacting in a dynamic form to the changes in its surrounding (con

of monitoring/fault data is a problem that has not yet been solved completely here is where federation take place

Management refers to the ability of such systems not just to configure, monitor and control a network element or service,

requirements from different information and data domains. This higher level of ab -straction enables business

resources, the software that manages them, and the actors who direct such manage -ment. In federation management end-to-end communication services involve config

data to guide rapid service innovation Concepts related to Federation such as Management Distribution, Management Con -trol and process representation are clear on their implications to the network manage

Future internet design with service systems using heterogeneous network technologies imply. A clear scenario where federation is being identified as useful mechanism is the

Internet service provisioning, in today†s Internet it is observed the growing trend for services to be provided both

Review and Designs of Federated Management in Future Internet Architectures 57 to offer â€oecommon†and â€oeagreed†services even with many technological restrictions

the current Internet typical large enterprise systems contain thousands of physically distributed software components that communicate across different networks 27 to

satisfy end-to-end services client requests. Given the possibility of multiple network connection points for the components cooperating to serve a request (e g.,

-nents may be deployed in different data centres), and the diversity on service demand and network operating conditions, it is very difficult avoid conflicts 14 20 28

the Future Internet. We are exploring how the definition and contractual agreements between different enterprises (1. Definition) establish the process for monitoring

2. Observation) and also identify particular management data at application, service middleware and hardware levels (3. Analysis) that can be gathered, processed, aggre

-gated and correlated (4. Mapping) to provide knowledge that will support management operations of large enterprise applications (5. Federated Agreements) and the network

data at the network and application level can be used to generate knowledge that can be used to support enterprise application management in a form of control loops in the

a feature necessary in the future Internet service provisioning process 7. Federated Decisions. Thus infrastructure can be re-configurable and adaptive to

high level representation and mapping of data and information. Negotiations in form of data representation between different data and information models by

components in the system (s) are associated to this feature •Management Control-Administration functionality for the establishment of

Review and Designs of Federated Management in Future Internet Architectures 59 5 Federated Management Architecture

architectures in the future Internet. These designs about architecture for the federated reference model by functional blocks addresses the specification of mechanisms in

-cluding models, algorithms, processes, methodologies and architectures. The func -tional architecture collectively constitute, in terms of implementation efforts, frame

communities of users (heterogeneous data & infrastructure The federated architecture must be enabled for ensuring the information is avail

formal manner, information and data can be integrated, and the power of machine -based learning and reasoning can be exploited more fully.

and its formalisms 29 30, such as FOCALE 25 and Autoi 21 23 translate data from a device-specific form to a device-and technology-neutral form to facilitate its

architecture, information is used to relate knowledge, rather than only map data, at different abstractions and domain levels corelating independent events each other in

-Review and Designs of Federated Management in Future Internet Architectures 61 agement distribution. Such regulations must be deployed with no further considera

-to end delivery of services to end-users. Furthermore, there are challenges relating to securing the delivery of services across (possible multiple) wireless mesh infrastruc

Typical large enterprise systems contain thousands of physically distributed software components that communicate across different networks to satisfy client requests

The complex nature of user requests can result in numer -ous traffic flows within the networks that can not be correlated with each other, thus

that will enable enterprise application management systems to reconfigure software components to better adapt applications to prevailing network conditions.

applications, to participative applications including blogs, wikis, online social net -works, RSS feeds, Instant Messaging, P2p applications, online gaming and increas

Particularly as users have been empowered to mix and match applications to create customised functionality (e g. mash-ups). Similarly

) Value networks share with Web 2. 0 application users a concern with value of interacting effectively with rest of the network community (federation

-Review and Designs of Federated Management in Future Internet Architectures 63 bers. Value networks of customers can only properly be served by federated service

-tween telecommunications network management systems and devices. In particular, it is important to develop methods (management functions) through which network

correlation techniques that can process relevant data in a timely and decentralised manner and relay it as appropriate to management federated making functions are

7 Summary and Outlook In the future Internet new designs ideas of Federated Management in Future Internet

Architectures must consider high demands of information interoperability to satisfy service composition requirements being controlled by diverse, heterogeneous systems

Future Internet architectures emerges as an alternative to address this complex prob -lem in the future Internet of networks and services

We have studied how federation brings support for realisation on the investigated solution (s) for information interoperability and cross-domain information sharing

controlling communication systems in the future Internet. Additional issues such as service representation and networks information can facilitate service composition

•Algorithms and processes to allow federation in enterprise application systems to visualize software components, functionality and performance

•Techniques for analysis, filtering, detection and comprehension of monitoring data in federated enterprise and networks

•Algorithms and processes to allow federated application management systems reconfigure or redeploy software components realizing autonomic application

functionality •Guidelines and exemplars for the exchange of relevant knowledge between net -work and enterprise application management systems

This paper makes references to design foundations for the development of federated autonomic management in architectures in the future Internet.

Scenarios has been shortlisted to identify challenges and provide research results about what information enterprise application management systems can provide to federate management sys

1. NSF-funded initiative to rebuild the Internet (Online: Oct. 2010 http://www. geni. net

Review and Designs of Federated Management in Future Internet Architectures 65 4. Galis, A.,et al.:

Future Internet Position Paper: System Functions, Capabilities and Requirements (Invited paper). ) In: IEEE 2009 Fourth International Conference on Communications and Network

Future Generation Internet Architecture. Newarch Final Technical Report, http://www. isi. edu/newarch /6. van der Meer, S.,Davy, A.,Davy, S.,Carroll, R.,Jennings, B.,Strassner, J.:

Autonomic Networking and Communication, Birkhã¤user, Basel (2008 8. Raymer, D.,van der Meer, S.,Strassner, J.:

From Autonomic Computing to Autonomic Networking: an Architectural Perspective. In: Proc. of 5th IEEE Workshop on Engineering

Rethinking the design of the Internet: the end to end arguments vs. the brave new world. ACM Transactions on Internet Technology 1 (1)( 2001

11. Subharthi, P.,Jianli, P.,Raj, J.:Architectures for the Future Networks and The next Generation Internet:

A Survey. Computer Communications (July 2010), 63 pp http://www1. cse. wustl. edu/jain/papers/ftp/i3survey. pdf

12. Curran, K.,Mulvenna, M.,Galis, A.,Nugent, C.:Challenges and Research Directions in Autonomic Communications.

International Journal of Internet Protocol Technology IJIPT) 2 (1)( 2006 13. Rubio-Loyola, J.,Astorga, A.,Serrat, J.,Chai, W. K.,Mamatas, L.,Galis, A.,Clayman, S

Cheniour, A.,Lefevre, L.,Fischer, A.,Paler, A.,Al-Hazmi, Y.,de Meer, H.:Platforms and

Software systems for an Autonomic Internet. In: IEEE Globecom 2010, Miami, USA, 6 -10 december (2010 14.

Autonomic Network Management in the future Internet. In: Manfi workshop, June, NY USA (2009 15. Strassner, J. C.,Foghlã, M. Ã.,Donnelly, W.,Serrat, J.,Agoulmine, N.:

Inference Plane to Support The next Generation Internet. In: IEEE GIIS 2007,2-6 july (2007 17. Galis, A.,Denazis, S.,Brou, C.,Klein, C.:

-porting Integrated Management Tasks in the future Internet. In: 1st IFIP/IEEE Manfi Intl Workshop, In conjunction 11th IEEE IM2009, Long island, NY, USA, June 2009, IEEE

Computer Society Press, Los Alamitos (2009 19. Brennan, R.,Feeney, K.,Keeney, J.,O†Sullivan, D.,Fleck II, J.,Foley, S.,van der Meer

of Autonomic Management in the future internet. In: IEEE/IFIP Network Operations & Management Symposium, NOMS 2010, Osaka, Japan, 19-23 april (2010

Autonomic Internet A Perspective for Future Internet Services Based on Autonomic Principles. In: 2007 IEEE Management Week †Manweek 2007 2nd IEEE MACE 2007 Workshop, San Josã, CA

USA, 29 oct. †2 nov (2007 22. Rochwerger, B.,et al.:An Architecture for Federated Cloud computing. In:

Cloud Com -puting: Principles and Paradigms, Wiley, ISBN: 0470887990 (April 2011 23. Galis, A.,et al.:

Management Architecture and Systems for Future Internet Networks. In Towards the Future Internet †A European Research Perspective, p. 350.

IOS Press, Am -sterdam (2009 24. Feldmann, A.:Internet clean-slate design: what and why? ACM SIGCOM Computer

Communication Review 37 (3)( 2007 25. Strassner, J.,Agoulmine, N.,Lehtihet, E.:FOCALE †A Novel Autonomic Networking

Architecture. ITSSA Journal 3 (1), 64†79 (2007 26. Foley, S n.,Zhou, H.:Authorisation Subterfuge by Delegation in Decentralised Networks

In: Proc. of the 13th International security Protocols Workshop, Cambridge, UK (April 2005 27. Jennings, B.,et al.:

Service Operations in Autonomic Communication systems. Phd Thesis, UPC (2008 31. Univerself Project (January 2011), http://www. univerself-project. eu

) Future Internet Assembly, LNCS 6656, pp. 67†80,2011  The Author (s). This article is published with open access at Springerlink. com

An Architectural Blueprint for a Real-world Internet Alex Gluhak1, Manfred Hauswirth2, Srdjan Krco3, Nenad Stojanovic4, Martin Bauer5

Numerous projects in the area of Real-world Internet (RWI), Internet of Things (Iot), and Internet Connected Objects have proposed architectures

for the systems they develop. All of these systems are faced with very similar problems in their architecture and design and interoperability among these sys

-tems is limited. To address these issues and to speed up development and de -ployment while at the same time reduce development and maintenance costs

Real-world Internet, Internet of things, Internet Connected Objects Architecture 1 Introduction Devices and technologies ubiquitously deployed at the edges of the networks will

foundations for the Real-world Internet (RWI Leveraging the collective effort of several projects over the last number of years

SENSEI, ASPIRE, IOT-A, PECES, CONET, SPITFIRE, Semsorgrid4env, this chapter presents the current status of the work aimed at definition of an RWI refer

The core contribution of this paper is the distillation of an initial model for RWI based on an analysis of these state of art architectures and an under

•An identification of a core set of functions and underlying information models operations and interactions that these architecture have in common

2 The Real world Internet Since the introduction of the terminology over a decade ago, the"Internet of things

Iot)" has undergone an evolution of the underlying concepts as more and more rele -vant technologies are maturing.

The initial vision was of a world in which all physical objects are tagged by Radio frequency identification (RFID) transponders in order to

be identified uniquely by information systems. However, the concept has grown into multiple dimensions, encompassing sensor networks able to provide real world intel

-ligence or the goal-oriented autonomous collaboration of distributed objects via local wireless networks or global interconnections such as the Internet

Kevin Ashton, former Director of the Auto-ID Center, once famously formulated â€oeadding radiofrequency identification and other sensors to everyday objects will create

an Internet of things, and lay the foundations of a new age of machine perception†We believe that machine perception of the real world is still at the heart of the

Internet of things, no matter what new technologies have meanwhile become avail -able to enable it. As such, one of the key roles of the Internet of things is to bridge

the physical world and its representation in the digital world of information systems enabling what we refer to in part of the Future Internet Assembly (FIA) community as

the so called Real world Internet (RWI The RWI is the part of a Future Internet that builds upon the resources provided by

the devices HAL of the Internet of things, offering real world information and in -teraction capabilities to machines, software artifacts and humans connected to it

The RWI assumes that the information flow to and from Iot devices is taking place via local wired and wireless communication links between devices in their prox

-imity and/or through global interconnections in the form of the current Internet and mobile networks or future fixed and mobile network infrastructures

One important property of the RWI which distinguishes it from the current Internet is its heterogeneity, both regarding the types of devices as well as communication

protocols used. IPV6 and in particular 6lowpan play an important role, but other proprietary wireless protocols will see continued use as well.

To deal with this het -erogeneity, services †in the form of standard Web Services and DPWS1, but more

likely using RESTFUL approaches and application protocols like Coap †provide a useful abstraction. As services play a pivotal role in the future Internet Architecture

the use of services for integrating the RWI also fits well into the overall architectural

picture. One has to keep in mind though that RWI services have some different prop -erties from common, enterprise-level services:

They are of lower granularity, e g.,, just providing simple sensor readings and, more importantly, they are inherently unreli

-able; such RWI services may suddenly fail and the data they deliver has to be associ

-ated with some quality of information parameters before further processing 1 Device Profile for Web Services

An Architectural Blueprint for a Real-world Internet 69 3 Reference Architecture In this section we present an initial model on which several of the current RWI archi

-tecture approaches are based. While not as comprehensive as a reference architecture it already identifies the major underlying system assumptions and architectural arti

-facts of the current RWI approaches. The model has been developed through a careful analysis of the existing RWI architectures according to the following dimensions

1. Underlying system assumptions 2. functional coverage of the services provided by the architectures 3. underlying information models in the architectures, and

4. operations and interactions supported in these architectures 3. 1 Underlying RWI Architecture Assumptions Common to all RWI architectures is the underlying view of the world,

which is di -vided into a real and a digital world as depicted in Fig. 1. The real world consists of

c) Resource Users which represent the physical people or application software that intends to interact with Resources and Eoi

physical and the digital world by allowing users/applications to interact with the Re -sources and Eoi is the main contribution of the RWI reference architecture towards a

RFID actuator sensor sensor Entity-based Context Model models relevant aspects of Real world Real-world Internet

Association of resources to modelled entities Resources Identify measure, observe or interact Fig. 1. World-view of RWI systems

On the resource level, resource users directly interact with resources. Such interac -tions are suitable for certain types of RWI applications where the provided informa

3. Resource Users who are the main users of the resources or architectural services 3. 1 Functional Coverage of RWI Architectures

resource users and the corresponding business roles inside the RWI ecosystem Resource discovery is one of the basic services RWI architectures provide for re

It allows resource users to lookup and find resources that are made available by resource providers in an RWI community.

Resource users specify characteristics of a resource, e g.,, the identifier or type they are interested in, and

It allows resource users to directly access context information in the RWI concerning Eois or find resources from which such

It allows resource users to declaratively specify simple or complex actuation requests or expected outcomes of actuations on an Eoi

The respective functions ensure that resource users are provided with an adequate set of resources able to achieve the specified objectives

-An Architectural Blueprint for a Real-world Internet 71 namic instantiation of resources (e g.,, processing services) on resource hosts in order

between resources and resource users, in particular if these interactions span multiple resources. Longer lasting interactions may require adaptation of the interactions to

complexity from the resource user Access control functionality is essential to ensure that only authorized resource us

users at request time and subsequent authorization of resource usage. Another aspect of resource access is access arbitration,

-thorized users. This requires mechanisms to resolve contention if multiple conflicting requests are made including preemption and prioritization

Based on the accounting model, resource users can be charged for the access to resources or provided information and actuation services

At its core, the proposed architectural model defines a set of entities and their rela

-tion capabilities comparable to web resources in the current web architecture. In the same way as a web user interacts with a web resource, e g.,

, retrieve a web page, the user can interact with the real-world resources, e g.,, retrieve sensor data from a sen

-sor. However, while the concept of the web resource refers to a virtual resource iden

-tified by a Universal Resource Identifier (URI), a resource in the RWI context is an

abstraction for a specific set of physical and virtual resources The resources in the Smart Object model abstract capabilities offered by real-world

entities such as sensing, actuation, processing of context and sensor data or actuation loops, and management information concerning sensor/actuator nodes, gateway devices

or entire collections of those. Thus a resource has a manifestation in the physical world

resources and the software components implementing the interaction endpoints from the user perspective (Resource End point †REP). Furthermore, the model distin

-guishes between the devices hosting the resources (Resource Host) and the network devices hosting the respective interaction end points (REP Host.

A REP is a software component that represents an interaction end-point for a physical resource.

In comparison to the current web architecture, REPS can be considered equivalent to web resources, which are identified uniquely by a URI

The device hosting a resource is referred to as the Resource Host. Sensor nodes are typical examples for resource hosts,

role, for example, mobile phones or access points that embed resources. A REP Host is a device that executes the software process representing the REP

As mentioned before, the resources and REPS are separated conceptually from their hosts to facilitate different deployment options.

-bile phone. Similarly, there may be cases where the REP is not hosted on the resource

host itself, for example, a computer in the network or an embedded server may act as the REP host for a resource,

which is physically hosted on a sensor node connected to it This distinction is important when mobility, disconnections and other system dynamics

-sor nodes, from attacks by hosting their REPS on more powerful hardware Unlike other models, the Smart Object model considers also real-world entities in

An Architectural Blueprint for a Real-world Internet 73 users or applications. A resource in the Smart Object model thus provides (context

information or interaction capabilities concerning associated real-world entities 3. 3 Interaction Styles The classes of system functions described in Section 2. 1 may be realized through

Interactions among resources and resource users can be 1: 1, 1: n or m: n

In a Radio frequency identification (RFID) based sce -nario, the tags act as hosts for the resources in form of Electronic Product Codes

e g. sensor data. The resource hosts are abstracted through the RFID readers due to the passive communication of the tags.

The Object Naming Service (ONS) corre -sponds to the Entity Directory that returns the URLS of relevant resources for the EPC

logic for interactions using semantics of the specific RFID application. Query plan -ning is done through the definition of an ECSPEC

The system is based on the OSGI service middleware and consists of two main sub systems: the service platform openaal and the

An Architectural Blueprint for a Real-world Internet 75 services like context management for collecting and abstracting data about the envi

-ronment, workflow based specifications of system behaviour and semantically -enabled service discovery. Framework and platform services are coupled loosely by

User and RWI Entities of Interest (Entities of Interest) are analogous to the contextual information provided by AAL contextual manager.

The PECES architecture PECES provides a comprehensive software layer to enable the seamless cooperation of embedded devices across various smart spaces on a

supporting nomadic users and remote collaboration among objects in different smart spaces in a seamless and automatic way.

The PECES middleware architecture enables dynamic group-based communication between PECES applications (Resources) by utilizing contextual information based on a flexible context ontology.

-sources are not directly analogous to PECES middleware instances, gateways to these devices are more resource-rich

and can host middleware instances, and can be queried provided that an application-level querying interface is implemented.

must be running the PECES middleware before any interaction may occur. Both one-shot and continuous interactions are supported

use of sensor-based, streaming and static data sources in manners that were not neces

or the data sources made available. The architecture may be applied to almost any type of real world entity

streaming data sources, normally containing historical information from sensors; and even relational databases, which may contain any type of information from the digital world (hence

resource hosts are multiple. These resources are made available through a number of data-focused services (acting as resource endpoints),

which are based on the WS-DAI specification for data access and integration and which are supported by the Semsor

-Grid4env reference implementation. These services include those focused on data registration and discovery (where a spatiotemporal extension of SPARQL â€

stsparql-,is used to discover data sources from the Semsorgrid4env registry data access and query (where ontology-based and non-ontology-based query lan

-guages are provided to access data: SPARQL-Stream and SNEEQL †a declarative continuous query language over acquisition sensor networks, continuous streaming

data, and traditional stored data), and data integration (where the ontology-based SPARQL-Stream language is used to integrate data from heterogeneous and multi

-modal data sources. Other capabilities offered by the architecture are related to sup -porting synchronous and asynchronous access modes, with subscription/pull and

push-based capabilities, and actuating over sensor networks, by in-network query processing mechanisms that take declarative queries

and transform them into code that changes the behavior of sensor networks. Context information queries are sup

-ported by using ontologies about roles, agents, services and resources 4. 5 SENSEI The SENSEI architecture SENSEI aims at integrating geographically dispersed and

internet interconnected heterogeneous WSAN (Wireless Sensor and Actuator Net -works) systems into a homogeneous fabric for real world information and interaction

It includes various useful services for both providers and users of real world resources to form a global market space for real world information and interaction.

SENSEI takes a resource oriented approach which is inspired strongly by service oriented principles and semantic web technologies.

In the SENSEI architecture each real world resource is described by a uniform resource description, providing basic and semanti

-cally expressed advanced operations of a resource, describing its capabilities and REP information. These uniform descriptions provide the basis for a variety of different

supporting services that operate upon. On top of this unifying framework SENSEI builds a context framework, with a 3 layer information model.

One of the key support services is a rendezvous mechanism that allows resource users to discover and query

resources that fulfill their interaction requirements. At lower level this is realized by a federated resource directory across different administrative domains.

An Architectural Blueprint for a Real-world Internet 77 architecture provides a semantic query support, allowing resource users to declara

-tively express context information or actuation tasks. Using a semantic query resolver and the support of an entity directory (in which bindings of real world resources and

-tecture supports both onetime and longer lasting interactions between resource users and resource providers, that can be streaming

a security token service for resource users and AAA (Authentication, Authorization and Accounting) service to enforce access at the access controlled entities covering

this chapter, the most prominent being SPITFIRE SPITFIRE and Iot-A Iot-A as these projects have started just and have not produced architectures yet,

SPITFIRE aims at extending the Web into the embedded world to form a Web of

Things (Wot), where Web representations of real-world entities offer services to access and modify their physical state

traditional services and data available in the Web. SPITFIRE extends the architectural model of this chapter by its focus on services,

-constrained devices, its extensive use of existing Web standards such as RESTFUL interfaces and Linked Open Data,

along with semantic descriptions throughout the whole architecture The Iot-A project extends the concepts developed in SENSEI further to provide a

unified architecture for an Internet of things. It aims at the creation of a common architectural framework making a diversity of real world information sources such as

wireless sensor networks and heterogeneous identification technologies accessible on a Future Internet. While addressing various challenges ZGL+,it will provide key

building blocks on which a future Iot architecture will be based, such as a global resolution infrastructure that allows Iot resources to be resolved dynamically to enti

-ties of the real world to which they can relate 78 A. Gluhak et al 4. 7 Summary of Project Realizations

Table 2a. Functional coverage of current RWI architecture approaches LL A A L U si

PC IS w hi ch st or es W H A T W H ER

An Architectural Blueprint for a Real-world Internet 79 Table 2b. Functional coverage of current RWI architecture approaches

The work on the Iot reference architecture will continue to be driven by the RWI group of the FIA in collaboration with the FP7 IOT-i coordinated action project

http://www. iot-i. eu) and the IERC, the European Research Cluster on the Internet of

Things (http://www. internet-of-things-research. eu/).The results will be contributed to the FIA Architecture track.

It is expected that the final architecture will be ready by the end of 2011 Open Access.

ASPIRE Advanced Sensors and lightweight Programmable middleware for Innovative RFID Enterprise applications, FP7, http://www. fp7-aspire. eu

/CONET Cooperating Objects Noe, FP7 http://www. cooperating-objects. eu /EPC EPCGLOBAL: The EPCGLOBAL Architecture Framework 1. 3 march 2009

The Things in the Internet of things. Poster at the Internet of Things Conference, Tokyo (Iot, 2010)( 2010), available at http://www

iot-a. eu/public/news/resources/Thethingsintheinternetof Things sh. pdf Accessed Jan 24, 2011 Iot-A EU FP7 Internet of things Architecture project

http://www. iot-a. eu/public LLAAL FZI Living Lab AAL, http://aal. fzi. de

/PECES PERVASIVE Computing in Embedded systems, FP7 http://www. ict-peces. eu /Semsorgrid4env Semantic Sensor Grids for Rapid Application Development for Environ

-mental Management, FP7, http://www. semsorgrid4env. eu /SENSEI Integrating the Physical with the Digital World of the Network of the Fu

-ture, FP7, http://www. ict-sensei. org SPITFIRE Semantic-Service Provisioning for the Internet of things using Future

Internet Research By experimentation, FP7, http://www. spitfire -project. eu /ZGL+Zorzi, M.,Gluhak, A.,Lange, S.,Bassi, A.:

From Today†s INTRANET of Things to a Future INTERNET OF THINGS: A Wireless-and Mobility-Related

View. IEEE Wireless communications 17 (6)( 2010 J. Domingue et al. Eds.):) Future Internet Assembly, LNCS 6656, pp. 81†90,2011

 The Author (s). This article is published with open access at Springerlink. com Towards a RESTFUL Architecture for Managing a Global

Distributed Interlinked Data-Content-Information Space Maria Chiara Pettenati, Lucia Ciofi, Franco Pirri, and Dino Giuli

Electronics and Telecommunications Department, University of Florence, Via Santa marta, 3 50139 Florence, Italy {mariachiara. pettenati, lucia. ciofi, franco. pirri

dino. giuli}@ unifi. it Abstract. The current debate around the future of the Internet has brought to

front the concept of â€oecontent-Centric†architecture, lying between the Web of Documents and the generalized Web of Data, in which explicit data are embed

-ded in structured documents enabling the consistent support for the direct ma -nipulation of information fragments.

In this paper we present the Interdatanet IDN) infrastructure technology designed to allow the RESTFUL management of

interlinked information resources structured around documents. IDN deals with globally identified, addressable and reusable information fragments;

it adopts an URI-based addressing scheme; it provides a simple, uniform Web-based in

-terface to distributed heterogeneous information management; it endows infor -mation fragments with collaboration-oriented properties, namely:

privacy, li -censing, security, provenance, consistency, versioning and availability; it glues together reusable information fragments into meaningful structured and inte

-grated documents without the need of a predefined schema Keywords: Web of Data; future Web;

Linked Data; RESTFUL; read-write Web collaboration 1 Introduction There are many evolutionary approaches of the Internet architecture

which are at the heart of the discussions both in the scientific and industrial contexts:

Web of Data/Linked Data, Semantic web, REST architecture, Internet of Services, SOA and Web Services and Internet of things approaches.

Each of these approaches focus on specific aspects and objectives which underlie the high level requirements of being a

driver towards â€oea better Internet†or â€oea better Web†Three powerful concepts present themselves as main drivers of the Future Internet

1 2. They are: a user-centric perspective, a service-centric perspective and a content

-centric perspective. The user-centric perspective emphasizes the end-user experience as the driving force for all technological innovation;

the service-centric perspective is currently influenced in enterprise IT environment and in the Web2. 0 mashup culture

showing the importance of flexibly reusing service components to build efficient appli -cations. The Content-Centric perspective leverages on the importance of creating, pub

-82 M. C. Pettenati et al lishing and interlinking content on the Web and providing content-specific infrastruc

-tural services for (rich media) content production, publication, interlinking and con -sumption. Even if it is very difficult to provide a strict separation of approaches because

either they are positioned often or have evolved touching blurred areas between Con -tent, Services and User perspectives, a rough schema in Table 1 can provide highlights

the main, original, driving forces of such approaches Table 1. Rough classification of main driving forces in current Future Network evolutionary

Content-centric Service-centric Users-centric Approaches Web of Data /Linked Data REST Internet of

Services WS -*SOA Web 2. 0 Web 3. 0 Semantic web Internet of things The three views can be interpreted as emphasizing different aspect rather than ex

-pressing opposing statements. Hence, merging and homogenizing towards an encom -passing perspective may help towards the right decision choice for the Future Internet

Such an encompassing perspective has been discussed in terms of high-level general architecture in 1 and has been named â€oecontent-Centric Internetâ€.

At the heart of this architecture is the notion of Content, defined as â€oeany type and volume of raw infor

-mation that can be combined, mixed or aggregated to generate new content and me -dia†which is embedded in the Content Object, â€oethe smallest addressable unit man

-aged by the architecture, regardless of its physical locationâ€. In such an high-level platform, Content and Information are separate concepts 3

and Services are built as a result of a set of functions applied to the content, to pieces of information or ser

-vices. As a consequence of merging the three views (user, content, service-oriented the Future Internet Architecture herewith described essentially proposes a Virtual

Resources abstraction required for the Content-Centric approach. Another view of â€oecontent-centric Internet architecture†is elaborated in 2 by Danny Ayers, based on

the assumption that â€oewhat is missing is the ability to join information pieces together and work more on the level of knowledge representationâ€.

Ayers†proposal is there -fore a â€oetransitional Web†lying between the Web of Documents and the generalized

Web of Data in which explicit data are embedded in documents enabling the consis -tent support for the direct manipulation of information as data without the limitation

of current data manipulation approaches. To this end, Ayers identifies the need to find and develop technologies allowing the management of â€oemicro-content†i e. sub

-document-sized chunks (information/document fragments), in which content being managed and delivered is associated with descriptive metadata

Abstracting from the different use of terms related to the concepts â€oedataâ€, â€oecon -tent†and â€oeinformation†which can be found in literature with different meanings 4

small, Web-wide addressable data/content/information unit which should be organ -ized according a specific model and handled by the network architecture so as to

Managing a Global Distributed Interlinked Data-Content-Information Space 83 provide basic Services at an â€oeinfrastructural level†which in turn will ground the de

-velopment of Applications fulfilling the user-centric needs and perspectives. Among the different paths to the Web of Data the one most explored is adding explicit data to

content. Directly treating content as data has had instead little analysis In this paper we discuss evolution of Interdatanet (IDN) an high-level Resource

Oriented Architecture proposed to enable the Future Internet approaches (see 5 6 and references therein

Interdatanet is composed of two main elements: the IDN-Information Model and the IDN-Service Architecture.

4. the Web-wide scalability of the approach The purpose of this paper is to show that Interdatanet can provide a high-level model

of the Content-Centric Virtualized Network grounding the Future Internet Architec -ture. For such a purpose Interdatanet can provide a Content-Centric abstraction level

Fig. 1. Interdatanet architecture situated with respect to the Future Internet architecture envis -aged in 7 84 M. C. Pettenati et al

though aiming at dealing with distributed granular content over the Web, suffer from a main limitation:

the more we get away from the data and move into the direction of information, the fewer available solutions are there capable of covering the following

â € the Web-wide scalability of the approach This consolidates the need to look for

as in Web of Data 2. IDN adopts an URI-based addressing scheme (as in Linked Data

3. IDN provides simple a uniform Web-based interface to distributed heterogeneous data management (REST approach

4. IDN provides-at an infrastructural level-collaboration-oriented basic services namely: privacy, licensing, security, provenance, consistency, versioning and

availability 5. IDN glues together reusable information fragments into meaningful structured and integrated documents without the need of a predefined schema

such as Linked Data, RESTFUL Web Services, Internet of Service, Internet of things 2. 1 The Interdatanet Information Model and Service Architecture

Managing a Global Distributed Interlinked Data-Content-Information Space 85 IDN-SA (Interdatanet Service Architecture.

users to â€oeact†on pieces of information and documents. The IDN-SA implements the reference functionalities defining subsystems, protocols and interfaces for IDN docu

data model (see Figure 3) to describe interlinked data representing a generic docu -ment model in IDN and is the starting point from

Generic information modeled in IDN-IM is formalized as an aggregation of data units. Each data unit is assigned at least with a global identifier

and contains generic data and metadata; at a formal level, such data unit is a node in a Directed Acyclic

Graph (DAG. The abstract data structure is named IDN-Node. An IDN-Node is the â€oecontent-item†handled by the â€oecontent-centric†IDN-Service Architecture.

The de -gree of atomicity of the IDN Nodes is related to the most elementary information

fragment whose management is needed in a given application. The information frag -ment to be handled in IDN-IM compliant documents,

data units is composed of nodes related to each other through directed â€oelinksâ€. Three main link types are defined in the Information Model

-pressed by the â€oehref†attribute in HTML tags inherently incorporate different â€oemean -ings†of the link:

Managing a Global Distributed Interlinked Data-Content-Information Space 87 Replica Management (RM) provides a delocalized view of the resources to the upper

identify the resources within IDN-middleware independent of their physical locations in the lower layer are used Uniform Resource Locators (URL) to identify resource

The implementations of IDN-SA are a set of different software modules, one mod -ule for each layer.

Each module, implemented using an HTTP server, will offers a REST interface. The interaction between IDN-compliant applications and IDN-SA

therefore be enabled to the manipulation of data on a global scale within the Web REST interface has been adopted in IDN-SA implementation as the actions al

-lowed on IDN-IM can be translated in CRUD style operations over IDN-Nodes with the assumption that an IDN-document can be thought as an IDN-Node resources

which are coded in an â€oeidn/XML format†(data format defined with XML language Every resource in such format must be well formed with respect to XML syntax, and

Managing a Global Distributed Interlinked Data-Content-Information Space 89 without the need to achieve the complete development of the architecture before its

The presented approach is not an alternative to current Web of Data and Linked Data

approaches rather it aims at viewing the same data handled by the current Web of

Data from a different perspective, where a simplified information model, representing only information resources, is adopted

naming convention or suggesting new methods of handling data, relying on standard Web techniques Interdatanet could be considered to enable a step ahead from the Web of Docu

-ment and possibly grounding the Web of Data, where an automated mapping of IDN -IM serialization into RDF world is made possible using the Named Graph approach

9. Details on this issue are beyond the scope of the present paper The authors are aware that the IDN vision must be confronted with the evaluation

of the proposed approach. Providing demonstrable contribution to such a high level goal is not an easy task,

Web 11; c) the adoption of a RESTFUL Web Services, also known as ROA †Re -source Oriented Architecture to leverage on REST simplicity (use of well-known

standards i e. HTTP, XML, URI, MIME), pervasive infrastructure and scalability The current state of Interdatanet implementation and deployment, is evolving along

The implemented Web application allows Public Officers to assess current citizens†official residence address requesting certificates to the entitled body, i e. the

the Application level because it offers infrastructural enablers to Web-based interop -eration without requiring major preliminary agreements between interoperating par

-ties thus providing a contribution in the direction of taking full advantage of the Web

of Data potential Acknowledgments. We would like to acknowledge the precious work of Davide Chini, Riccardo Billero, Mirco Soderi, Umberto Monile, Stefano Turchi, Matteo

Towards a Content-Centric Internet. In: Tselentis, G.,Galis, A.,Gavras, A.,Krco, S.,Lotz

Towards the Future Internet-Emerging Trends from European Research, pp. 227†236. IOS Press, Amsterdam (2010

2. Ayers, D.:From here to There. IEEE Internet Comput 11 (1), 85†89 (2007 3. European commission Information Society and Media.

Future Networks The way ahead European communities: Belgium (2009 4. Melnik, S.,Decker, S.:A Layered Approach to Information Modeling and Interoperability

on the Web. In: Proceedings ECDL€ 00 Workshop on the Semantic web, Lisbon (September 2000 5. Pettenati, M. C.,Innocenti, S.,Chini, D.,Parlanti, D.,Pirri, F. 2008) Interdatanet:

A Data Web Foundation For The Semantic web Vision. Iadis International Journal On Www /Internet 6 (2 december 2008

6. Pirri, F.,Pettenati, M. C.,Innocenti, S.,Chini, D.,Ciofi, L.:Interdatanet: a Scalable Mid

-dleware Infrastructure for Smart Data Integration, in D. In: Giusto, D.,et al. eds.)) The Internet of things:

20th Tyrrhenian Workshop on Digital communications, Springer, Hei -delberg (2009), doi: 10.1007/978-1-4419-1674-7 12

7. Zahariadis, T.,Daras, P.,Bouwen, J.,Niebert, N.,Griffin, D.,Alvarez, F.,Camarillo, G

Towards a Content-Centric Internet Plenary Keynote address. Presented at Future Internet Assembly (FIA) Valencia, SP, 15-16 april (2010

8. Richardson, L.,Ruby, S.:RESTFUL Web Services; O†Reilly Media, Inc.:Sebastopol, CA USA (2007

9. Carroll, J. J.,Bizer, C.,Hayes, P.,Stickler, P.:Named graphs, provenance and trust.

In Proceedings of the 14th international conference on World wide web-WWW †05. Pre -sented at the 14th international conference, Chiba, Japan, p. 613.

Chiba, Japan (2005 doi: 10.1145/1060745.1060835 10. Zweben, S. H.,Edwards, S. H.,Weide, B. W.,Hollingsworth, J. E.:

and Encapsulation on Software Development Cost and Quality. IEEE Trans. Softw Eng. 21 (3), 200†208 (1995

Web of Data. â€oeoh †it is data on the Web†posted on April 14, 2010;

-it-is-data-on-the-web /J. Domingue et al. Eds.):) Future Internet Assembly, LNCS 6656, pp. 91†102,2011

 The Author (s). This article is published with open access at Springerlink. com A Cognitive Future Internet Architecture

Marco Castrucci1, Francesco Delli Priscoli1, Antonio Pietrabissa1, and Vincenzo Suraci2 1 University of Rome â€oela Sapienzaâ€, Computer and System Sciences Department

Via Ariosto 25,00185 Rome, Italy {castrucci, dellipriscoli, pietrabissa}@ dis. uniroma1. it 2 Universitã degli studi e-Campus

-chitecture for the Future Internet (FI), which is based on so-called Cognitive Managers. The objective of the proposed architecture is twofold.

Future Internet architecture, Cognitive networks, Virtualization, In -teroperation 1 Introduction Already in 2005, there was the feeling that the architecture and protocols of the Inter

-net needed to be rethought to avoid Internet collapse 1. However, the research on Future Internet became a priority only in the last five years, when the exponential

growth of small and/or mobile devices and sensors, of services and of security re -quirements began to show that current Internet is becoming itself a bottleneck.

Two main approach have been suggested and investigated: the radical approach 2, aimed at completely redesign the Internet architecture,

and the evolutionary approach 3 trying to smoothly add new functionalities to the current Internet towards

Right now, the technology evolution managed to cover the lacks of current Internet architecture, but, probably, the growth in Internet-aware devices and the always more

demanding requirements of new services and applications will require radical archi -tecture enhancements very soon.

This statement is proved by the number of financed projects both in the USA and in Europe

92 M. Castrucci et al In the USA, there are significant initiatives. Nets 4 (Networking Technology and Systems) was a program of the National Science Foundation (NSF) on network

-ratory for at scale experimentation of network science, based on a 40 Gbps real infra -structure.

platforms available to the research and user communities In Europe, Future Internet research has been included as one of the topics in FP6

and FP7. European initiatives appear less prone to a completely clean-state approach with respect of USA ones,

applications by utilizing the current Internet infrastructure. For instance, G-Lab 8 Design and experiment the network of the future,

platform for Future Internet studies, includes both research studies of Future Internet technologies and the design and setup of experimental facilities.

Group for the Future Internet, France) and Internet del Futuro 10 (Spain) promotes cooperation based on several application areas (e g.,

testbeds for Future Internet technologies The contribution of this Chapter is the proposal of a Future Internet architecture

which seamlessly cope with the evolutionary approach but is also open to innovative technologies and services. The main idea is to collect

, users, contents, services, network re -sources, computing resources, device characteristics) via virtualization and data min

-ing functionalities; the metadata produced in this way are then input of intelligent cognitive modules which provide the applications/services with the required function

-alities in order to maximize the user Quality of Experience with the available re -sources The Chapter is organized as follows:

Section 3 describes the Future Internet platform in detail; experimental results showing the potential of the platform are de

A more specific definition of the entities involved in the future Internet, as well as of the Future Internet target, can be as follows

•Actors represent the entities whose requirement fulfillment is the goal of the Future Internet;

for instance, Actors include users, developers, network providers, service providers, content providers, etc A Cognitive Future Internet Architecture 93

•Resources represent the entities that can be exploited for fulfilling the Actors†requirements; example of Resources include services, contents, terminals, devices

middleware functionalities, storage, computational, connectivity and networking capabilities, etc •Applications are utilized by the Actors to fulfill their requirements and needs ex

-ploiting the available resources In the authors†vision, the Future Internet target is to allow Applications to transpar

-ently, efficiently and flexibly exploit the available Resources, thus allowing the Actors by using such Applications,

this target, the Future Internet should overcome the following main limitations i) A first limitation is inherent in the traditional layering architecture which forces to

keep algorithms and procedures, laying at different layers, independent one another In addition, even in the framework of a given layer, algorithms and procedures deal

-ing with different tasks are designed often independently one another. These issues greatly simplify the overall design of the telecommunication networks and greatly

reduce processing capabilities, since the overall problem of controlling the telecom -munication network is decoupled in a certain number of much simpler sub-problems

Nevertheless, a major limitation of this approach derives from the fact that algorithms and procedures are poorly coordinated one another,

impairing the efficiency of the overall telecommunication network control. The issues above claim for a stronger

coordination between algorithms and procedures dealing with different tasks ii) A second limitation derives from the fact that, at present, most of the algorithms

and procedures embedded in the telecommunication networks are open-loop, i e. they are based on off-line"reasonable"estimation of network variables (e g. offered traf

-fic), rather than on real-time measurements of such variables. This limitation is be -coming harder and harder,

since the telecommunication network behaviours, due to the large variety of supported services and the rapid evolution of the service charac

-teristics, are becoming more and more unpredictable. This claims for an evolution towards closed-loop algorithms and procedures which are able to properly exploit

appropriate real-time network measurements. In this respect, the current technology developments, which assure cheap and powerful sensing capabilities, favours this

and hence embedding technology-dependent algorithms and procedures, as well as from the large variety of heterogeneous Actors who are playing in the ICT arena.

framework, on the one hand, is expected to embed algorithms and procedures which leaving out of consideration the specificity of the various networks,

The concept behind the proposed Future Internet architecture, which aims at over -coming the three above-mentioned limitations, is sketched in Fig. 1. As shown in the

figure, the proposed architecture is based on a so-called"Cognitive Future Internet Framework"(in the following, for the sake of brevity, simply referred to as"Cogni

-tive Framework")adopting a modular design based on middleware"enablers"."The enablers can be grouped into two categories:

the Semantic Virtualization Enablers and the Cognitive Enablers. The Cognitive Enablers represent the core of the Cognitive

Framework and are in charge of providing the Future Internet control and manage -ment functionalities. They interact with Actors, Resources and Applications through

Semantic Virtualization Enablers The Semantic Virtualization Enablers are in charge of virtualizing the heterogene -ous Actors, Resources and Applications by describing them by means of properly

selected, dynamic, homogeneous, context-aware and semantic aggregated metadata The Cognitive Enablers consist of a set of modular, technology-independent, interop

-erating enablers which, on the basis of the aggregated metadata provided by the Seman -tic Virtualization Enablers, take consistent control and management decisions concern

-ing the best way to exploit and configure the available Resources in order to efficiently and flexibly satisfy Application requirements and, consequently, the Actors†needs.

reliable connection, satisfy the user perceived quality of experience and so on The control and management decisions taken by the Cognitive Enablers are han

-dled by the Semantic Virtualization Enablers, in order to be actuated involving the proper Resources, Applications and Actors

Cognitive Future Internet Framework Actors Users Network Providers Prosumer Developers Content Providers Service Providers A

pplications Semantic Virtualization Enablers Cognitive Enablers Identity, Privacy Confidentiality Preferences, Profiling, Context Multimedia Content Analysis and Delivery

Connectivity Resource Adaptation & Composition Generic Enabler X Generic Enabler Y Generic Enabler Z Resources

Services Networks Contents Devices Cloud storage Terminals Computational Fig. 1. Proposed Cognitive Future Internet Framework conceptual architecture

A Cognitive Future Internet Architecture 95 Note that, thanks to the aggregated semantic metadata provided by the Semantic Vir

-tualization Enablers, the control and management functionalities included in the Cog -nitive Enablers have a technology-neutral, multi-layer, multi-network vision of the

surrounding Actors, Resources and Applications. Therefore, the information enriched fully cognitive) nature of the aggregated metadata,

input, coupled with a proper design of Cognitive Enabler algorithms (e g.,, multi -objective advanced control and optimization algorithms), lead to cross-layer and

cross-network optimization The Cognitive Framework can exploit one or more of the Cognitive Enablers in a

-minals, Base Stations, Backhaul network entities, Core network entities. The selec -tion and the mapping of the Cognitive Framework functionalities in the network enti

adoption of algorithms and procedures coordinated one another and even jointly ad -dressing in a one-shot way,

3 Cognitive Future Internet Framework Architecture The Cognitive Framework introduced in the previous section consists of a conceptual

-ized through the implementation of appropriate Cognitive Middleware-based Agents in the following referred to as Cognitive Managers)

-haul Network entities, Core Network entities. There not exist a unique mapping be -tween the proposed conceptual framework over an existing telecommunication net

-work. However we proposed a proof-of-concept concrete scenario in section 4, where the conceptual framework has been deployed in a real home area network test case

Indeed the software nature of the Cognitive Manager allows a transparent integration in the network nodes.

is enhanced with the Future Internet functionalities and become part of the Future Internet assets Fig. 2 outlines the high-level architecture of a generic Cognitive Manager, showing

its interfacing with Resources, Actors and Applications Fig. 2 highlights that a Cognitive Manager will encompass five high-level modular

data/servicse/contents Monitored Actor related information Aggregated metadata present context Exchanged metadata TO /FR

A Cognitive Future Internet Architecture 97 The Metadata Handling functionalities are embedded in the so-called Metadata Han

in particular, the Cognitive Enablers which are the core of the proposed architecture are independent of the peculiarities of the surrounding Resources, Actors and Appli

-tionalities are embedded in the Semantic Virtualization Enablers, while the Elabora -tion functionalities are embedded in the Cognitive Enablers.

above-mentioned heterogeneous parameters/data/services/contents in homogeneous metadata according to proper ontology based languages (such as OWL †Web Ontol

-ogy Language Metadata Handling functionalities are in charge of the storing, discovery and com -position of the metadata coming from the sensing functionalities and/or from meta

-data exchanged among peer Cognitive Managers, in order to dynamically derive the aggregated metadata which can serve as inputs for the Cognitive Enablers;

(ii) providing enriched data/services/contents to the Actors In addition, these enablers control the sensing, metadata handling, actuation and API

data/contents/services produced by the Cognitive Enablers (Provisioning functional -ities embedded in the Actor Interface;

AAA) at user and device level, Service Security, Intrusion Detection, etc..Another key role of this module is to dynamically decide, consistently with the application

adoption of multi-object algorithms and procedures which jointly address prob -lems traditionally dealt with in a separate and uncoordinated fashion at different

data mining, adaptive control, robust control, game theory, operation research etc.)) for the algorithms and rules embedded in the Cognitive Enablers,

which are expected to remarkably improve efficiency Advantages Related to Flexibility 4) Thanks to the fact that the Cognitive Managers have the same architecture and

5) The transparency and the middleware (firmware based) nature of the proposed Cognitive Manger architecture makes relatively easy its embedding in any

fixed/mobile network entity (e g. Mobile Terminals, Base Station, Backhaul network entities, Core network entities: the most appropriate network entities

for hosting the Cognitive Managers have to be selected environment by envi -ronment. Moreover, the Cognitive Managers functionalities (and, in particular

the Cognitive Enabler software) can be added/upgraded/deleted through remote wired and/or wireless) control

from very simple SW/HW/computing implementations, even specialized on a single-layer/single-network specific monitoring/elaboration/actuation task, to

A Cognitive Future Internet Architecture 99 complex multi-layer/multi-network/multi-task implementations. In particular

entailed additional SW/HW/computation complexity 7) Thanks to the flexibility degrees offered by issues (4)-(6), the Cognitive Manag

Internet of things 8) The above-mentioned flexibility issues favours a smooth migration towards the proposed approach. As a matter of fact, it is expected that Cognitive Manager

we propose to achieve Future Internet revolution through a smooth evolution. In this evolution, Cognitive Managers pro

respect to the increased SW/HW/computing complexity The following section shows an example of application of the above-mentioned

-work, where connectivity among devices is provided using heterogeneous wireless e g.,, Wifi, UWB) and wired (e g.,

, Ethernet, PLC) communication technologies. For 100 M. Castrucci et al testing purposes, only a simplified version of the Cognitive Manager has been imple

-mented in each node of the network, which includes the following functionalities •the Service and Content adapter:

and stored in proper database ready to be used by elaboration functionalities •a Cognitive connectivity enabler:

independent resource management algorithms (e g.,, layer 2 path selection), in order to guarantee that flow†s Qos requirements are satisfied during the transmission of

-rithm, a Path selection algorithm and a Load Balancing algorithm has been consid -ered in our tests

The framework has been implemented as a Linux Kernel Module and it has been installed in test-bed machines and in a legacy router1 for performance evaluation.

1 We have modified the firmware of a Netgear router (Gigabit Open source Router with Wireless-N and USB port;

453 MHZ Broadcom Processor with 8 MB Flash memory and 64 MB RAM; a WAN port and four LAN up to 1 Gigabit/s) and â€oecross-compiled†the code, to

run the framework on the Router A Cognitive Future Internet Architecture 101 To test the technology handover performances a FTP download session (file size 175

MB) has been conducted on the Ethernet link. After approximately 10s, one extremity of the Ethernet cable has been disconnected physically from its socket and the flow

has been redirected automatically onto the wireless link thanks a context-aware deci -sion taken by the Cognitive connectivity enabler.

Switching on the Wi-fi link causes more TCP retransmissions and an increased transfer time. This is natural, since

Ethernet and Wi-fi have different throughputs. Without the cognitive framework, it is evident that the FTP session would not be terminated at all.

As shown in Fig. 4, the experimented handover time is around 240 ms, during which no packet is received

The delay is influenced by the processing time that the framework module spends in triggering and enforcing the solutions evaluated by the path selection routines im

-plemented in the cognitive connection enabler Fig. 4. Technology handover 5 Conclusions This paper proposes a novel reference architecture for the Future Internet, with the aim

to provide a solution to overcome current Internet limitations. The proposed architecture is based on Cognitive Modules

which can be embedded transparently in selected net -work entities. These Cognitive Modules have a modular organization

which is claimed to be flexible and scalable, thus allowing a smooth migration towards the Future Inter

their virtualization, obtained thanks to the introduction of Semantic Virtualization En -ablers. At the same time, the Cognitive Enablers,

which are the core of the Cognitive Managers, can potentially benefit from information coming from all layers of all net

the algorithms the Cognitive Enabler will be based on, have all to be selected carefully case by case;

The Internet is broken, Technology Review, December 2005-January 2006 2006), http://www. technologyreview. com/article/16356

-FISS09. pdf 3. Miller. R.:Vint Cerf on the Future of the Internet. The Internet Today, The Singularity

University (2009), http://www. datacenterknowledge. com/archives/2009/10 /12/vint-cerf-on-the-future-of-the-internet

/4. National Science Foundation: Networking Technology and Systems, Nets (2008 http://www. nsf. gov/pubs/2008/nsf08524/nsf08524. htm

5. National Science Foundation: Network Science and Engineering, Netse (2010 http://www. nsf. gov/funding/pgm summ. jsp?

National Future Internet Initiatives-GRIF (France http://www. francenumerique2012. fr/(2010 10. AETIC: Internet del Futuro, http://www. idi. aetic. es/esinternet/(2008

11. ICT FP7 Research: Future Internet Research & Experimentation (FIRE http://cordis. europa. eu/fp7/ict/fire/(2010

Title Model Ontology for Future Internet Networks Joao Henrique de Souza Pereira1, Flavio de Oliveira Silva1

Edmo Lopes Filho2, Sergio Takeo Kofuji1, and Pedro Frosi Rosa3 1 University of Sao paulo, Brazil

2 Algar Telecom, Brazil edmo@algartelecom. com. br 3 Federal University of Uberlandia, Brazil pedro@facom. ufu. br

The currently Internet foundation is characterized on the in -terconnection of end-hosts exchanging information through its network

Internet of active social, mobile and voracious content producers and con -sumers. Considering the limitations of the current Internet architecture

the envisaged scenarios and work eï €orts for Future Internet, this paper presents a contribution for the interaction between entities through the

formalization of the Entity Title Model Keywords: Entity, Future Internet, Ontology, Title Model Introduction The Internet of today has diï culties to support the increasing demand for re

-sources and one of the reasons is restricted related to the evolution of the TCP IP architecture since the 80s.

More speciï cally, the evolution of the layers 3 and 4, as discussed in 23.

The commercial usage of Internet and IP networks was a considerable obstacle to the improvements in the intermediate layers in this

The challenges to Future Internet Networks are the primary motivation to this paper and the cooperation in the evolution of computer networks, speciï cally

in the TCP IP intermediate layers, is another one. The purpose is to present the Entity Title Model formalization, using the OWL (Web Ontology Language), to

collaborate with one integrated reference model for the Future Internet, including others projects eï €orts

This paper is organized as follows: Section 1 presents works in the area of Fu -ture Internet and ontology in computer systems.

Section 2 describes the concepts of the Entity Title Model and the ontology at network layers.

) Future Internet Assembly, LNCS 6656, pp. 103†114,2011 câ The Author (s). This article is published with open access at Springerlink. com

1 Future Internet Works A Future Internet full of services requirements demands networks where the necessary resources to service delivery are orchestrated

and optimized eï ciently In this research area there are extensive number of works and projects for the

Future Internet and some of these are being discussed in collaboration groups like FIA, FIND, FIRE, GENI and others 10,11, 14,31, 32

the concept of addressing by use of a Title is suitable for real world Internet and

providing new important inputs to the content-centric view of Future Internet 1. 1 Some other Future Internet and Ontology Works

Studies and proposals for development of the intermediate layers of the TCP IP architecture are being discussed since the 80s,

-tives to contribute to the evolution of computer networks. In the proposed imple -mentation of LISP there is low impact on existing infrastructure of the Internet

since it can use the structure of IP and TCP, with the separation of Internet

addresses into Endpoint Identiï ers (EID) and Routing Locators (RLOC) 9 In the area of next generation Internet there is also the works of Landmark

developed by Tsuchiya, that proposed hierarchical routing in large networks and Krioukov work on compact routing for the Internet.

Pasquini proposes changes in the use of Landmark with Rofl (Routing on Flat Labels), and ï at routing

next-generation Internet architecture 21 22 Previous studies in Rofl were presented by Caesar who also made proposals

area of mobility on a next-generation Internet Wong proposes solutions that include support for multi-homing 36.

Title Model Ontology for Future Internet Networks 105 by Ford, who speciï es the UIP/UIA (Unmanaged Internet Protocol) and UIA

Unmanaged Internet Architecture) 12 Related to ontology, there are extensive studies in philosophy, whose concept of this term is assigned to Aristotle,

who deï nes it as the study of â€oebeing as be -ingâ€. However, the name ontology was used ï rst only in the seventeenth century

database, information systems, software engineering and semantic web. In the technology area one of the most commonly used deï nitions is from Tom Gruber

-lus of First order, Propositional logic, Ontolingua, Loom, and Semantic web languages (RDF, RDFS, DAML+OIL, OWL SPARQL, GRDDL, RDFA, SHOE

AND SKOS), among others 13 For communication between network elements, ontology is used usually in the

application layer, without extending to the middle and lower layers of computer networks. In this research area, this paper aims to contribute to advancing the

Future Internet 2 Ontology at Network Layers Ontologies can use layer model or distinct architectures, however, in general

of the Web Ontology Language deï ned by W3c, presented in Fig. 1 extracted from 17, is conï ned in the application layer of the TCP IP architecture

Fig. 1. Architecture of Web Ontology Language 17 106 J. H. de Souza Pereira et al

content, host, user, cloud computing and sensor networks. The notion of entity in the Title Model diï €ers from the notion of resources in some relevant litera

For example, one user, that demands resources, is one communication entity in the Title Model. Also, applications

host, user. Also can be created other kinds of classiï cation, such as hardware software and network, among others.

Some one of them (not all) can be used as resources in others relevant literature As the root superclass of one ontology is â€oeentity†or â€oething†the Entity

Title Model ontology designates a conceptually diï €erent â€oeentity†of this model which in turn is an communication element that have its communication needs

understood and supported by computer networks. For example, in this taxonomy the class â€oelayer†is a subclass of â€oething†and neither this class nor its subclasses

Title Model Ontology for Future Internet Networks 107 Title: It is the only designation to ensure an unambiguous identiï cation

the other communication entities of the computer networks. According to this recommendation, the ASO-title (Application Service Object-title), which are

improving the addressing of internet architecture by horizontal addressing and facilitate communication among the entities and with the other layers 24.

It is a tangible material in a computer network, such as: cables connectors, general optical distributor, antenna, base station and air interface

-cation element, based on â€oeservice concept†presented by Vissers, where users communicate with each other through a â€oeservice Providerâ€,

For example, to transfer data from a ï le, or content of email/instant message, it is necessary to have delivery guarantee in commu

-nication. On the other hand, for an audio or video communication in real time it will not necessarily be important the delivery guarantee,

physical or logical location of entities in computer networks, without the need of reserved bandwidth, networks segmentation, speciï c physical connections or

and translate them into functionality in computer networks Link Layer: This is the layer that has the responsibility to establish the link

between two or more entities and ensure that data exchange occurs at the link level and takes place according to the understanding made by the service layer

2. 2 Cross Layer Ontology for Future Internet Networks For intermediate semantic layer, this work did the creation of an ontology for

Internet, as 4ward, Content-Centric, User-Centric, Service-Centric and Autoi Title Model Ontology for Future Internet Networks 109

Source Service Content User DTS NE1 NE2 NE NE3 Destination Service Content User Network Elements (NE

Fig. 2. Entities Communication Orchestrated by the DTS 4 28. This ontology also supports the proposal of Horizontal Addressing by

Entity Title, presented in 26, as well as the semantic approaching cross layers for the Future Internet

The Horizontal Addressing by Entity Title has related limitations with the communications needs formalization and standardization,

-tions with the collaboration with others Future Internet projects eï €orts. The rea -son is because the solution for horizontal addressing and communication needs

-tation facility in software and hardware. However, in a collaborative eï €ort to others Future Internet works, the Entity Title Model has better contributions

by the use of a more expressive and standardized representation language Also, this Model is more complete than the solution for just the horizontal

support to approaches like the Content, Service and User Centric. In addition it permits semantic communication cross layers to contribute with, for example

layers running in a Distributed Operating system, without the traditional sock -ets used in TCP IP, is used the Raw Socket to enable the communication 19

Payload Size Control equal to 84 Bytes; and; Delivery Guarantee re -quest. In this context, this need is informed, to the Service Layer, by the direct

use of the Raw Socket to communicate with the Distributed Operating system without the use of IP, TCP, UDP and SCTP

><Payload size control>84 Bytes</Packet size control ><Deliveryguarantee rdf: datatype="&xsd; boolean">Yes </Deliveryguarantee ><rdfs: comment>Example of the Entity Title Model to support

distributed programming needs </rdfs: comment ><Has need rdf: resource="&titlemodel Distributed programming lam mpi "/>owl: Thing >By this semantic information, the Service and Data link layers can support the

distributed programming communication using diï €erent approaches, as the ad -dressing proposal presented in 25.

Title Model Ontology for Future Internet Networks 111 them, as Rofl and LISP, should change their structure to semantically support

one user may need the Content directly from Services or from other Users (thoughts. In this

perspective, the Entity Title Model and its ontology can contribute to converge some Future Internet projects,

as the Content, Service and User Centric works monitored and managed by the OSKMV planes using semantics cross layers

and not only in the application layer as happen in the TCP IP architecture In this example for the contribution with the Content, Service and User

Centric works, in the Title Model it is possible the uniï cation of the diï €erent

entities address in the future Internet. This means that application, content host and user can have supported its needs

and can be located by its title By this possibilities, this work aims to contribute with the discussions for

a collaborative reference model in the future Internet, that includes diï €erent categories of communication entities, and its needs.

the Web Ontology Language, so that the Entity layer can communicate semanti -cally with the Service layer,

addresses the entities horizontally, the mobility on the Internet becomes natural since there is no longer the hierarchy of segments of the network and sub network

that occurs in the IP ADDRESS with the use of masks. By this, the coupling between

ontology in the middle layers of the Internet, with the proposal of semantic formalization, in computer networks, for the Entity Title Model

Therefore, it is possible the approaching between the upper and lower lay -ers. As a result there is improvement in the exchange of meanings between the

-bution to the Future Internet eï €orts and projects like Autoi, Content-Centric User-Centric, Service-Centric, 4ward and others.

Also, is a possibility for the collaborative discussions about the reference model related to these, and others

Future Internet eï €orts As future work there will be continued the development of this ontology and

its collaborative perspective with others Future Internet eï €orts and projects. It is suggested to extend discussions

layers of computer networks, thereby deï ning the communication architecture whose study go over the deï nitions in the area of protocols architecture

Title Model Ontology for Future Internet Networks 113 Open Access. This article is distributed under the terms of the Creative Commons

Autonomic Internet Project. European union IST 7th Framework Pro -gramme (2011 5 Baioë co, G.,Costa, A.,Calvi, C.,Garcia, A.:

International Conference on Ultra Modern Telecommunications, IEEE Xplore, Print ISBN: 978-1-4244-3942-3 (2009

Future Internet Design Program. National Science Foundation http://www. nets-find. net (2011 11 FIRE:

Future Internet Research and Experimentation (2009 12 Ford, B.:UIA: A Global Connectivity Architecture for Mobile Personal Devices

International Journal of Human and Computer Studies, 43 (5†6: 907†928 (1995 16 ITU-T:

Information technology-Open Systems Interconnection-Application Layer Structure. Recommendation X. 207-ISO/IEC 9545: 1993 (1993

Representing Information Using the Web Ontology Language Traï €ord (2005 18 Lesniewski, S.:Comptes rendus des seâ'ances de la Socieâ'teâ'des Sciences et des

Telecommunication Technologies Symposium (2009 114 J. H. de Souza Pereira et al 20 Mealy, G.:Another look at data.

In: Proceedings of the Fall Joint Computer Conference. AFIPS November 14-16, Volume 31, pp. 525†534.

Thompson Books Washington and Academic Press, London (1967 21 Pasquini, R.,Paula, L.,Verdi, F.,Magalhaëoees, M.:

Generation Internet Architecture. In: IEEE Wireless communications and Net -working Conference-WCNC (2009 22 Pasquini, R.,Verdi, F.,Magalhaëoees, M.:

Towards a Landmark-based Flat Routing In: 27th Brazilian Symposium on Computer networks and Distributed systems -SBRC (2009

23 Pereira, J. H. S.,Kofuji, S. T.,Rosa, P. F.:Distributed systems Ontology. In IEEE/IFIP New Technologies, Mobility and Security Conference (2009

24 Pereira, J. H. S.,Kofuji, S. T.,Rosa, P. F.:Horizontal Address Ontology in In

Distributed Programming. In: 9th International Information and Telecommuni -cation Technologies Symposium (2010 26 Pereira, J. H. S.,Kofuji, S. T.,Rosa, P. F.:

Next Generation Internet. In: IEEE International Conference on Networking and Services p. 7 (2010 27 Prudeë ncio, A.,Willrich, R.,Diaz, M.,Tazi, S.:

de Gereë ncia e Operacâ¸aëoeo de Redes e Servicâ¸os-WGRS-SBRC (2009 28 Rubio-Loyola, J.,Serrat, J.,Astorga, A.,Chai, W. K.,Galis, A.,Clayman, S

Autonomic Internet Framework Deliverable D6. 3. Final Results of the Autonomici Approach. Autoi Project 2010

Publish Subscribe Internet Routing Paradigm-PSIRP. Final Updated Architecture, Deliverable D2. 5 (2010 31 Tselentis, G.,et al.:

Towards the Future Internet-A European Research Per -spective. IOS Press, Amsterdam (2009 32 Tselentis, G.,et al.:

Towards the Future Internet-Emerging Trends from Euro -pean Research. IOS Press, Amsterdam (2010 33 Tsiatsis, V.,Gluhak, A.,Bauge, T.,Montagut, F.,Bernat, J.,Bauer, M.,Villa

-longa, C.,Barnaghi, P.,Krco, S.:The SENSEI architecture-Enabling the Real World Internet. In:

Towards the Future Internet, pp. 247†256. IOS Press, Ams -terdam (2010 34 Vissers, C.,Logrippo, L.:

The Importance of the Service Concept in the Design of Data communications Protocols. In: Proceedings of the IFIP WG6 1, 3 (1986

35 Wang, J.,Guo, M.,Camargo, J.:An Ontological Approach to Computer system Security. Information security Journal:

A Global Perspective (2010 36 Wong, W.:et al.:An Architecture for Mobility Support in a Next Generation

Internet. In: The 22nd IEEE International Conference on Advanced Information Networking and Applications-AINA (2008

Part II Future Internet Foundations: Socioeconomic Issues Part II: Future Internet Foundations: Socioeconomic Issues 117

Introduction Information and Communication Technologies (ICT) provide in recent years solutions to the sustainability challenge by, e g.,

, measuring impacts and benefits of economic activity via integrated environmental monitoring and modeling, by managing conse

technology of the Internet, is particularly responsible for this accelerating trend Particularly, controlling and monetizing the evolution of the Internet and its vast

application range is seen as a critical goal for most economic regions. Therefore socioeconomic aspects determine a highly important set of influencing factors, which

decades, the combination of the two and its application to the new Internet †the one

which is rooted in the commercialization of the native research Internet of the early 90†s †becomes an important element in investigating,

As collected by the FISE (Future Internet Socioeconomics) working group within the FIA on its wiki, the following general aspects of socioeconomics, particularly in

any sort of economic activity (here networking in the areas of Internet-based and telecommunications-based communications for a variety of lower-level network/tele

-communication as well as application-based services) and the social life of user (here mainly addressing private customers of such services

and providers offering such services);()( 2) Markets of Internet service providers (ISP) and Telecommunication Providers;( (3) ISPS peering agreements and/or transit contracts;(

4) Customer usage behavior and selections of content;(5) The investigation of emerging technologies and disruptive technologies,

which effect the user/customer-to-provider relation;(6 The investigation of (European) regulation for e-services markets and security regula

social and economic viewpoints on pure Internet-based networking is essential Thus, the full understanding and modeling of these socioeconomic impacts on

Internet communications particularly and the Internet architecture generally chal -lenges networking research and development today. Economic effects of technical

Future Internet Foundations: Socioeconomic Issues effective approaches. Furthermore, the users†perspectives need to be taken into close

-of-operations of a variety of Internet-based services In this emerging area of research the specific view on the networking and transmis

-sion domain of the Internet had been taken as one starting point of socioeconomic research for this FIA book.

the Future Internet contains three views, where the decision of inclusion was based on two rounds of abstract reviews and on subsequent reviews of complete chapter pro

applications as of today still generate large volumes of data, Internet Service Provid -ers (ISP) need to address the problem of expensive interconnection-charges.

mutually beneficial situation for all stakeholders in a Future Internet scenario, the â€oetri -plewin†investigations determine the key goal of Economic Traffic Management

Adoption of Future Internet Protocolsâ€. Based on the assumption that many well -designed protocols designed for the Future Internet will fail †as it happened for the

traditional Internet â€, however, badly-designed ones are successful. Thus, the problem of protocols†deployability is addressed.

In order to do so, a framework had been devel -oped, which includes the investigation possibilities for deployment effects, adoption

protocol, as it happens currently for the Future Internet, can get adopted Finally, the third chapter by C. Kalgoris et al. is on â€oean Approach to Investigating

assumption that the Internet has evolved into a worldwide social and economic plat -form with a variety of stakeholders involved, the key motivations of each of them and

Future Internet Foundations: Socioeconomic Issues 119 investigate, classify, and develop an analysis framework for such tussles in the socio

-economic domain of Internet stakeholders. In turn, the chapter outlines a new meth -odology, with which tussles are analyzed.

) Future Internet Assembly, LNCS 6656, pp. 121†131,2011  The Author (s). This article is published with open access at Springerlink. com

Overlay applications generate huge amounts of traffic in the Internet which determines a problem for Internet service providers,

Future Internet. This"Triplewin"situation is the target of Economic Traffic Management (ETM. A wide variety of techniques are employed by ETM for

Applications such as peer-to-peer (P2p) file sharing and video-streaming generate huge volumes of traffic in the Internet due to their high popularity and large size of

the files exchanged. This typically underlay-agnostic overlay traffic results in high inter-domain traffic,

which implies significant charges for the Internet Service Pro -viders (ISP. Individual optimization in the overlay (decisions made either at ran

traffic oscillations and degraded Quality-of-Experience (Qoe) for the end users 1 Therefore, an incentive-based approach is required that employs economic concepts

beneficial for all end users, overlay providers and ISPS. The so-called"Triplewin "situation is the main target of Economic Traffic Management (ETM) 2 proposed by

providing effective solutions for Internet at present ETM is deemed as applicable to the Future Internet, both conceptually and concerning specific ideas and mechanisms

All approaches proposed within ETMS are classified in three main categories •Locality Promotion enables peers of an ISP domain to receive ratings of their over

An example is locality promotion based on BGP routing data •Insertion of Additional Locality-Promoting Peers/Resources involves (a) the inser

stakeholders (end users, service providers, and ISP) would benefit thereby and under which circumstances â€oetriplewin†arises.

ETM deployment degree, popularity of ETM among end users, various swarm sizes, peer distribution among network domains, network topologies etc

-actions by taking into account the end user benefit as well From the ISP point of view, the ultimate confirmation of â€oewin†is a monetary benefit

This metric is used in an ongoing external trial with real users As a measure of â€oewin†for end users Qoe metrics are used.

For file sharing P2p applications the most important perceivable parameter is download time (or download speed).

) It can be influenced strongly by ETM mechanisms, both favorably and ad -versely. Users will use a given mechanism

if this improves or, at least, preserves their download time. Ideally, this should be guaranteed on a per individual user basis

However, it is analyzed most often by comparing the average values of the metrics with and without an ETM mechanism.

Such averages are taken over all peers in a swarm, or over subsets (e g.,, those that belong to the same AS.

Main Qoe metrics associated with video streaming applications taken into account in assessment of â€oewin†are the probability of playback stalling, stalling time,

decreased traffic volume from its own content servers and reduced load of the servers as well as an improved performance of the application,

objectives of the end users and possibly of the ISPS. Thus, this paper focuses hereafter on assessing win-win for the ISP and end users

To obtain a reliable assessment of ETM mechanisms several evaluation scenarios have been defined •Various network topologies:

-flecting a part of the real Internet topology, with a subset of ASES and inter-domain

•Varied end user interest in and adoption of ETM: coexistence of users employing ETM and ones declining support, even within a single swarm

•Different swarm sizes; and •Various type of content: files and video of different sizes

-awareness on each of the different user groups separately. This is a new methodology in contrast to related work, where average results or a cumulative density function for

Peers and the ETMS servers, providing rating information, are located in these stub-ASES, which are interconnected via a hub-AS containing the

the overlay performance from the user's point of view. Here, download times of all peers are averaged in one AS in one simulation Run for each parameter setting 20

Fig. 1. Mean Inter-AS Bandwidth Fig. 2. Download Times On the other hand, the situation is not as simple when considering end users, cf.

Fig. 2 Typically no-lose situations are the result in related work. However, this is true only

-spective, it is given not that users would accept such a mechanism, since they cannot be sure not to lose from it.

no reduction in the performance for the user, even if considering a more realistic sce -nario than typically used in related studies

links, and to improve performance experienced by the users of peer-to-peer applica -tions. Two approaches, the insertion of ISP-owned Peers (Iops),

does not have end users. The tracker and an original seeder are connected to the hub AS, while the Iop is inserted always in AS 1. Values for access bandwidth are similar

but an increase of the outgoing traffic due to the data exchange also with remote peers;

verified (by running couples simulations) that users benefit with respect to perform -ance not just on the average but 95%of them on an individual basis too

Fig. 3. Mean Inter-AS Bandwidth Fig. 4. Download Times Swarm Selection. In the underlay considered the same setup was applied;

Fig. 5. Mean Inter-AS Bandwidth Fig. 6. Download Times 128 I. Papafili et al Table 1. Evaluation Scenarios for the Swarm Selection

'download times, respectively. It can be observed that the impact on inbound inter-AS traffic of AS1 is higher

Due to the additional upload capacity in the swarm, users benefit from this ETM mechanism, while the inter-AS traffic of the ISP employing the Iop is

download times of peers that want to become HAPS (due to the extra download bandwidth offered to them.

locality promotion mechanism, the mean download time decreases significantly (see difference between †No SIS€ and †0 HAPS€;

Afterwards, the download time can be further reduced by increasing the number of active HAPS.

the former case, the mean download time is reduced more than in the latter. This is due to the fact that the injection of, say,

-cant when less peers are present in the AS, hence the difference in download time

download bandwidth, but also, with their extra upload bandwidth HAPS lead to the significant reduction of the average download time too

Fig. 7. Mean Download Times for Peers in AS1 With respect to the Number of HAPS When an HAP is implemented along with locality-awareness mechanisms, the opera

-tor benefits from reduced inter-domain traffic 17. It allows for reducing costs for ISPS and confirms the advantages of the HAP ETM mechanism and the fact that it

more specifically, ISP and end users interrelations in the context of such mechanisms The application of this methodology has been outlined and related evaluation results

SIS) has been designed as a Web-based tool for the ISP to administrate, monitor, and fine-tune the operation of the entire ETMS

not only P2p) generated according to trends in the future Internet is an interesting and promising direction for future research

org/html/draft-ietf-alto-reqs-06 (work in progress)( October 2010 5. Papafili, I.,Stamoulis, G. D.:

-Peer Computing P2p 2010, Delft, The netherlands (August 2010 7. Bindal, R.,Cao, P.,Chan, W.,Medval, J.,Suwala, G.,Bates, T.,Zhang, A.:

Conference on Distributed computing Systems, Montreal, Canada (June 2006 Assessment of Economic Management of Overlay Traffic:

-tional Conference on Peer-to-peer Computing (P2p†09), Seattle, USA (September 2009 9. The Smoothit Project:

19th IEEE International Conference on Computer Communications and Net -works (ICCCN 2010), ZÃ rich, Switzerland (August 2010

Characterization of Bittorrent Swarms and their Distribution in the Internet, to appear in the Computer networks (2011

13. Cohen, B.:Incentives Built Robustness in Bittorrent. In: Kaashoek, M. F.,Stoica, I. eds

) Future Internet Assembly, LNCS 6656, pp. 133†144,2011  The Author (s). This article is published with open access at Springerlink. com

Deployment and Adoption of Future Internet Protocols Philip Eardley1, Michalis Kanakakis2, Alexandros Kostopoulos2, Tapio Levã¤3

Many, if not most, well-designed Future Internet protocols fail, and some badly-designed protocols are very successful.

increase the chances that a future Internet protocol is adopted widely Keywords: Protocol Deployment, Adoption Framework, Multipath TCP, Con

GSM but there are many more examples of protocols that are designed well techni -cally but where deployment has failed

and new Internet protocols, including 2, 3, 4, 5, 6 and 7, which we build on

The adoption of Internet protocols is tricky because the Internet is a complex system with diverse end-systems, routers and other network elements, not all of whose aspects

are under the direct control of the respective end users or service providers In this Chapter we propose a new framework for a successful adoption process

Section 2), and apply it to two emerging protocols, Multipath TCP (Section 3) and Congestion Exposure (Section 4

134 P. Eardley et al The framework is not a â€oeblack box†where candidate protocols are the inputs and

Future Internet Protocols We propose a new framework (Figure 1) for a successful adoption process, with sev

Deployment and Adoption of Future Internet Protocols 135 A version of the framework has been applied in two papers, 8 and 9. The frame

-work is intended to be generally applicable to Internet protocols The first key question is: what are the benefits (and costs) of the protocol?

browsers and the underlying http/html protocols give a significant benefit to both the end users (a nice user interface for easy access to the web) and to the content provid

-ers (their content is accessed more; new opportunities through forms etc. As another example, a NAT (Network Address Translator) allows an operator to support more

users with a limited supply of addresses, and has some security benefit. As a counter

-example, IPV6 deployment has a cost to the end host to support the dual stack, but the

-example, IPV6 requires at least both ends and preferably the network to change Combining these two key factors leads to the idea of an incremental process, where

to distribute TV online Hence the framework distinguishes initial scenarios from a widespread one At each step of the framework careful consideration is needed of benefits and in

software has already been developed for the initial scenario and it is simply a matter of deploying and adopting it on a wider scale.

and users will complain if they adopt it and it breaks something Note that it is not possible to prove that the framework is necessary or sufficient to

Deployment and Adoption of Future Internet Protocols 137 extensions to support MPTCP. This allows endpoints to negotiate additional features

persuade the IETF that it is safe to deploy on the internet. Also an operator might

-put of its â€oelegacy†users •It is designed to be application-friendly: it just uses TCP€ s API

user can still communicate with legacy TCP users and can still communicate if the signalling is corrupted by a middlebox

•It is designed to be middlebox-friendly (be it a NAT, firewall, proxy or whatever

a NAT survey to probe random paths across the Internet to test how operational NATS impact MPTCP€ s signalling messages 21

For MPTCP, our current belief is that a data centre is the most promising initial sce

-nario (Figure 2). Within a data centre, one issue today is how to choose what path to

use between two servers amongst the many possibilities-MPTCP naturally spreads traffic over the available paths

Simulations show there are significant gains in typical data centre to -pologies 25, perhaps increasing the throughput from 40%to 80%of the theoreti

However, the protocol implementation should not impact hardware offloading of segmentation and check-summing. One reason that MPTCP uses

MPTCP€ s signalling and data •Incremental: the story is good, as only one stakeholder is involved viz the data centre

operator Fig. 2. Potential MPTCP deployment scenario, in a data centre. In this example, traffic between the two servers (at the bottom) travels over two paths through the switching fabric of the data

centre (there are four possible paths Another potential initial scenario would be a mobile user using MPTCP over multiple

interfaces. The scenario reveals a potential distinction between deployment (which involves the OS vendor updating their stack) and adoption

(which means that MPTCP is actually being used and requires the consumer to have multiple links) †so in theory

it would be possible for MPTCP to be deployed fully but zero adopted. Note there†s

and deployment is decided mainly by the OS (Operating system) vendor and not the end user Therefore we believe that a more promising initial scenario is an end user that ac

-cesses content, via wireless LAN and 3g, from a provider that controls both end user devices and content servers 26 †for example, Nokia or Apple controls both the

device and the content server, Nokia Ovi or Apple App store •Benefits: MPTCP improves resilience

-if one link fails on a multi-homed terminal the connection still works over the other interface.

But it is a prerequisite, and cost that devices are multihomed •Incremental: Both the devices and servers are under the control of one stakeholder

so the end user †unconsciously†adopts MPTCP. However, there may be NATS on the data path,

and MPTCP€ s signalling messages must get through them Deployment and Adoption of Future Internet Protocols 139

The wider scenario of widespread deployment and adoption is again worth thinking about this even during the design of the protocol

•Benefits: Several stakeholders may now be involved. For instance, it is necessary to think about the benefits and costs for OS vendors, end users, applications and

ISPS (Internet service providers. Here also we see the importance of network ef -fects. For instance, as soon as a major content provider, such as Google, deploys

MPTCP †perhaps as part of a new application with better Qos-then there is a much stronger incentive for OSS to deploy it as well as the network externality has

suddenly increased •Incremental: Existing applications can use MPTCP as though it was TCP, ie the

) MPTCP is an extension for end-hosts †it doesn†t require an upgrade to the routing system;

The main intention of Congestion Exposure (Conex) is to make users and network nodes accountable for any congestion that is caused by the traffic they send or forward

In today†s internet this information is only visible at the transport layer, and hence

Secondly, a policer to enforce policy specifically related to the user being served. A user pays, as part of its contract, to be allowed to cause a certain

amount of congestion. The policer checks the user is within its allowance by counting the Conex-Re-echo signals.

Similarly, a policer at a network†s border gateway checks that a neighbouring ISP is within its contractual allowance

and to decrease the latency of data delivery. The CDN server sends â€oepremium†packets (perhaps for IPTV) as Conex-Not-Marked or Conex

-Re-echo. Conex traffic is prioritised by the operator (â€oepremium serviceâ€. To a first order of approximation, the only point of contention is the backhaul †where the op

typically doing per end user (consumer volume caps and maybe deep packet inspection, to provide all users with a â€oefair

shareâ€. The operator upgrades its traffic management box so that it drops Conex traf -fic with a lower probability.

However, the operator does need not to deploy a policer or auditor, since it is also running the CDN

Conex (premium) traffic is not subject to per end user caps or rate limits by the ISP

Only one party has to upgrade, ie the combined CDN-ISP. The Con -tent providers and consumers don†t know about Conex.

Deployment and Adoption of Future Internet Protocols 141 One way this scenario could widen out is that the content provider is informed now

-effectively it can choose different Qos classes for different users Another way this scenario could develop is that the operator offers the service to

Therefore the ISP needs to upgrade two things. Firstly its traffic man -agement box: it needs to do occasional auditing spot-checks,

and then the host†s software would automatically send the user†s premium traffic (Voip say) as Conex-enabled.

-effectively Qos is controlled by the CDN or end user, so that they choose which of their traffic is within which class of Qos,

Conex capability is added a CDN or end user at a time 5 Enhancing the Framework One important development in telecoms is virtualisation.

Although the basic idea is longstanding, it has recently come to much greater practical importance with the rise

users use a virtualised instance of the new application. Although our adoption frame -work is still valid,

•Roll out of the software should be cheaper, therefore the expected benefits of the deployment can be less

•There is no need to coordinate end users all having to upgrade. Every user can immediately use the new (virtualised) software, so effectively a large number of

users can be enabled simultaneously •These factors reduce the deployment risk, especially as it should also be easier to

â€oeroll back†if there is some problem with the new software Virtualisation is not suitable for all types of software, for instance new transport layer

functionality, such as MPTCP and CONEX, needs to be on the actual devices 142 P. Eardley et al

There is an analogy with the digitalisation of content, which has lowered greatly the costs of distribution.

Virtualisation should similarly lower the cost of distribution †in other words, it eases deployment Another aspect is the interaction of a new protocol with existing protocols.

It is important that the design minimises negative interactions, and to test for this. For

One set of examples is the various IPV4 -IPV6 transition mechanisms that try to release the (currently hidden) benefits of IPV6

Another example is a protocol â€oebundleâ€, for instance telepresence offerings now wrap together several services that separately had less market traction

-works, whilst bringing benefits to MPTCP-enabled end users. For Congestion Expo -sure (Conex), a reasonable initial deployment scenario is combined a CDN-ISP that

Deployment and Adoption of Future Internet Protocols 143 3. Burness, L.,Eardley, P.,Akhtar, N.,Callejo, M. A.,Colas, J. A.:

key requirement for systems beyond 3g. In: VTC 2005-Spring, IEEE 61st Vehicular Technology Conference (2005

A model of Internet Standards Adoption: the Case of IPV6. Information systems Journal 14 (3), 265†294 (2004

5. Katz, M.,Shapiro, C.:Technology Adoption in the Presence of Network Externalities Journal of Political Economics 94, 822†841 (1986

6. Joseph, D.,Shetty, N.,Chuang, J.,Stoica, I.:Modeling the Adoption of New Network Ar

ACM SIGCOMM Computer Communications Review 40 (2)( 2010 8. Kostopoulos, A.,Warma, H.,Leva, T.,Heinrich, B.,Ford, A.,Eggert, L.:

on Next Generation Internet, Paris (2010 9. Kostopoulos, A.,Richardson, K.,Kanakakis, M.:Investigating the Deployment and Adop

IEEE International Conference on Network protocols, ICNP (2002 http://www. ece. gatech. edu/research/GNAN/work/ptcp/ptcp. html

14. Rojviboonchai, K.,Aida, H.:An Evaluation of Multi-path Transmission control protocol M/TCP) with Robust Acknowledgement Schemes.

Internet Conference IC (2002 15. Zhang, M.,Lai, J.,Krishnamurthy, A.,Peterson, L.,Wang, R.:

Adding concurrent data transfer to transport layer, Proquest ETD Collection for FIU, Paper AAI3279221 (2007), http://digitalcommons. fiu. edu/dissertations

Improved data dis -tribution for multipath TCP communication. In: IEEE GLOBECOM (2005 19. Kelly, F.,Voice, T.:

Stability of end-to-end algorithms for joint routing and rate control Computer Communication Review 35,2 (2005

20. Key, P.,Massoulie, P.,Towsley, D.:Combined Multipath Routing and Congestion Con -trol: a Robust Internet Architecture, no.

MSR-TR-2005-111 (2005), http://research microsoft. com/pubs/70208/tr-2005-111. pdf

21. Honda, M.:Call for contribution to middlebox survey (2010), http://www. ietf org/mail-archive/web/multipathtcp/current/msg01150. html

22. Becke, M.,Dreibholz, T.,Iyengar, J.,Natarajan, P.,Tuexen, M.:Load Sharing for the

HTTP Extensions for Simultaneous Download from Multiple Mir -rors, draft-ford-http-multi-server, work in progress (2009

25. Raiciu, C.,Plunkte, C.,Barre, S.,Greenhalgh, A.,Wishcik, D.,Handley, M.:Data center Networking with Multipath TCP.

ACM Sigcomm Hotnets (2010 26. Warma, H.,Levã¤,T.,Eggert, L.,Hämmã¤inen, H.,Manner, J.:

Mobile Internet In Stereo: an End-to-end Scenario. In: 3rd Workshop on Economic Traffic Management, ETM (2010

) Future Internet Assembly, LNCS 6656, pp. 145†159,2011  The Author (s). This article is published with open access at Springerlink. com

Arising from Building the Future Internet Costas Kalogiros1, Costas Courcoubetis1, George D. Stamoulis1, Michael Boniface2

3 Oxford Internet Institute, University of Oxford, United kingdom eric. meyer@oii. ox. ac. uk 4 University of ZÃ rich, Switzerland

With the evolution of the Internet from a controlled research network to a worldwide social and economic platform, the initial assumptions regarding

Future Internet Socioeconomics, Incentives, Design Principles Tussles, Methodology 1 Introduction The Internet has moved already long since from the original research-driven network

of networks into a highly innovative, highly competitive marketplace for applications services, and content. Accordingly, different stakeholders in the Internet space have

developed a wide range of on-line business models to enable sustainable electronic business. Furthermore, the Internet is increasingly pervading society 3. Widespread

access to the Internet via mobile devices, an ever-growing number of broadband users worldwide, lower entry barriers for nontechnical users to become content and ser

-vice providers, and trends like the Internet-of-Things or the success of Cloud services

all provide indicators of the high significance of the Internet today. Hence, social and economic impacts of innovations in the future Internet space can be reasonably ex

-146 C. Kalogiros et al pected to increase in importance. Thus, since the future Internet can be expected to be

characterized by an ever larger socioeconomic impact, a thorough investigation into socioeconomic tussle analysis becomes highly critical 9

The term tussle was introduced by Clark et al. 5 as a process reflecting the com -petitive behavior of different stakeholders involved in building

and using the Internet That is, a tussle is a process in which each stakeholder has particular self-interests, but

which are in conflict with the self-interests of other stakeholders. Following these interests results in actions †and inter-actions between and among stakeholders.

-tween autonomous systems 11 and mobile network convergence 10 constitute only two representative examples for typical tussle spaces

the future Internet is in the number of observed stakeholders in the current Internet and their interests.

Clark et al. speak of tussles on the Internet as of today. They argue 5 that â€oe t here are,

that make up the Internet milieu with interests directly at odds with each other. †With the ongoing success of the Internet and with the assumption of a future Internet being

a competitive marketplace with a growing number of both users and service provid -ers, tussle analysis becomes an important approach to assess the impact of stakeholder

behavior This paper proposes a generic methodology for identifying and assessing socio -economic tussles in highly-dynamic and large systems,

Internet. In order to help an analyst during the tussle identification task, the approach presented here provides several examples of tussles, together with their mappings to

Future Internet. In Section 3 we provide a classification of tussles according to stake -holders†interests into social and economic ones,

The Design for Tussle goal is considered to be a normal evolution of Internet design goals to reflect the changes in Internet usage.

This paradigm shift should be reflected in new attempts for building the Future Internet. However, identifying both existing

and future socioeconomic tussles, understanding their relationship, assessing their importance and making informed technical decisions can be complicated very and

Internet researchers. Such a methodology should be a step-by-step procedure that can be applied to any Internet functionality,

acting as a guide for making sure that all important factors are considered when making technology decisions.

-tive and negative ones, for the Future Internet The proposed methodology is composed of three steps

In the first iteration, congestion control mainly affects heavy users (HUS), interac -tive users (IUS) and ISPS.

Two tussles have been identified, which are related closely a) contention among HUS and IUS for bandwidth on congested links and (b) conten

since there is no API (Application Programming Inter -face) for ASPS to affect how their traffic will be handled.

-acteristics of each pattern can be seen in many current and future Internet scenarios Each pattern looks at relationships between consumers and suppliers and how con

For instance, while individual Internet users are typically con -sumers, when they are creating data that a business would like to sell, with or without

their knowledge and consent, they are †providers†of the resource in such a scenario

-tions in the Internet space have involved repurposing of resources, so identifying this sort of tussle also represents a way to find potential areas of growth and innovation

A popular example is bandwidth of bottleneck links and radio frequencies shared between users and wireless devices.

In the former case, modern transport con -trol protocols perform congestion control without considering the utility of the sender

with the prevalence of flat pricing schemes, has led to a contention tussle among user types, which economists identify as a â€oetragedy of the commonsâ€.

-age capabilities of servers and networking infrastructure. For example, routing table memory of core Internet routers can be considered a â€oepublic good†that retail ISPS

have an incentive to over-consume by performing prefix de-aggregation with Border Gateway Protocol (BGP.

Another type of scarce Internet resources is network identi -fiers, like IPV4 addresses and especially â€oeprovider Independent†ones that ease net

-An Approach to Investigating Socioeconomic Tussles 153 work management and avoid ISP lock in. Sometimes a contention tussle between

allocated across users and services The remaining tussle patterns are seen mostly in bilateral or multilateral transac

-rate during service provision with strict requirements, like long-distance phone con -versations taking place over Internet.

Each provider has partial private information about the problem and no one is willing to take responsibility and the resulting cost

example of file sharing applications, if an ISP deployed middle-boxes and performed traffic shaping then it may have negative impact on the services,

for example ISPS selecting the next hop of user traffic while users selecting the traffic source in their requests.

redundancy and reliability asking for a backup path towards a destination, or prefer 154 C. Kalogiros et al

when multiple candidate servers are available, a consumer may prefer the one offering better Qos,

the server that minimizes its cost; e g.,, this is possible if the provider operates a local

Repurposing tussles occur in regards to the privacy of user communication data be -tween users, ISPS, service providers and regulators.

The users are social actors who have a desire, generally speaking, that networks are trustworthy and private 2. The

privacy of communications is based on democratic ideals, that persons should be secure from unwarranted surveillance.

may be warranted in ways that individual users are willing to forego their privacy concerns in the interest of broader societal concerns.

-munication data. Furthermore, ISPS and other companies such as Google and Amazon have increasingly been able to monetize their user transaction data and personal data

Google is feed able to advertisements based on past searching and browsing habits and Amazon is able to make recommendations based on viewing and purchasing

habits. These applications of user data as marketing tools are largely unregulated. And in many cases, users have proved willing to give up some of their privacy in exchange

for the economic benefit of better deals that can come from targeted advertising However, for users who wish to opt out of such systems,

the mechanisms for doing so are often less than clear, since the owners of the system prefer to keep people in

rather than easily let them out Responsibility tussles occur with ISPS that often inhabit a middle ground †they are

the bodies with direct access to the data, but are simply businesses, trying to make a

profit. ISPS, however, are placed often in the uncomfortable position of trying to negoti -An Approach to Investigating Socioeconomic Tussles 155

monitoring and monetizing the communication of their users, and the demands of gov -ernment bodies to be able to monitor the networks for illegal or unwanted activities

change in many technological systems such as the Future Internet. In practice, tech -nology that upsets the balance of control is released often and the debates over control

-nical designs can protect such sites from being attacked by entities inconvenienced or embarrassed by their revelations?

The Internet makes this a particularly contentious issue because with the global nature of the Internet one can't just assume Western values

as if it were possible even within Europe to agree to what that means. Where does

The Trilogy project 16 studied extensively the contention tussle among users as well as among an ISP and its customers, due to the aggressive behavior of popular

file sharing applications. On the one hand it proposed two protocols and a novel con -156 C. Kalogiros et al

gestion control algorithm that gives the right incentives to users of bandwidth inten -sive applications.

are shared between users in a fairer manner. This is achieved by configuring MPTCP so that it acts less aggressively than TCP when the latter flows experience congestion

-tempt to acquire sensitive personal data of end-users by masquerading as a trustwor -thy entity, as a reverse contention tussle among two website owners (the †consum

-ersâ€). ) The tussle is being played out in the routing domain: the fraudulent one adver -tises more specific BGP prefixes so that ISPS update the entries in their routing tables

the resource) and route end-user requests to the fake website instead of the real one This situation has been shown to be a real problem due to the incentives of ISPS to

Traffic in Heterogeneous Internet Topologies) studies the control tussle that arises between ISPS and ASPS with respect to the routing decisions of each party.

based on a lean architecture to operate new services in the future Internet, the discovery of capabilities and the adaptation of many management operations to current working

arises, where embedded capabilities of networking devices and elements see â€oedefault -on†management functionality, which consist out of autonomous components interact

The MOBITHIN project 13 is related to a responsibility tussle between users of wireless services, mobile operators and regulators that has arisen from the social in

where most applications run on a remote server, is considered to achieving energy savings but to the disadvantage of the server provider

However under some assumptions, Wifi hotspots can consume much less energy than UMTS (Universal mobile telecommunications system) networks.

Thus, responsibil -ity cannot be checked easily. Furthermore, this situation triggers a control tussle be -tween wireless network operators and users of dual-band devices (e g.

Wifi and UMTS) on the technology used to communicate. Next generation networks, where a provider can control

which access technology is used by its end-users, could affect the user†s ability to derive maximum value from the service

The SENDORA project 14 identifies a contention tussle based on their own eco -system design for Sensor Network aided Cognitive Radio technology that utilizes

wireless sensor networks to support the coexistence of licensed and unlicensed wire -less users in an area.

In this case, the spectrum is the resource in contention and the â€oeprovider†is the regulator,

Existing mobile operators, TV broadcasters and new operators are the †con -sumers†of the resource in contention.

mobile operators and TV broadcasters) such as reduced operating costs, superior technology and potentially lucrative spectrum trading.

the Future Internet. One challenge for the technologists designing new hardware software systems, and platforms, however, is to be aware that technology is not

value-free, since it can have several consequences. To some extent, this message has already been taken on board by many policy makers, computer scientists, and systems

designers. The recognition that technology-in use frequently differs from technology -158 C. Kalogiros et al during-design is growing.

Thus technology will have socioeconomic consequences when released, and the challenge is to take steps to anticipate those consequences

-tween socioeconomic priorities and the Future Internet research community by offering selected services to FP7 projects in Challenge 1. SESERV provides access to socioeco

-sles that are present in the Internet, or may arise after a protocol or service has been

-cal solutions that achieve efficient spectrum usage for mobile devices. Following the increasing consensus on benefits of incorporating economic incentive mechanisms in

difficulty of addressing socioeconomic issues in the Internet when such challenges still exist in the real world

Towards a Future Internet: Interrelation between Technological, Social and Economic Trends, Final Report for DG Information Society and Media, European Com

The Future of the Internet: Tussles and Challenges in the Evolution Path as Iden -tified.

Tomorrow†s Internet. IEEE/ACM Transactions on Networking 13 (3), 462†475 (2005 6. Courcoubetis, C.,Weber, R.:

New Design Principles for the Internet. In: IEEE International Conference on Communications Workshops, June 2009, pp. 1†5 (2009

Theoretical Aspects of Computer science 1999, pp. 404†413 (1999 13. MOBITHIN project: D2. 5 Business models, Public Deliverable

Internet-Emerging Trends from European Research, IOS Press, Amsterdam (2010 16. Trilogy: D10-Initial Evaluation of Social and Commercial Control Progress, 2009, Public

Future Internet Foundations: Security and Trust Part III: Future Internet Foundations: Security and Trust 163

Introduction If you are asking for the major guiding principles of Future Internet technology and applications, the answer is likely to include â€oesharing and collaborationâ€.

Cloud com -puting, for instance, is built on shared resources and computing environments, offer -ing virtualized environments to individual tenants or groups of tenants, while execut

-ing them on shared physical storage and computation resources. The concept of Plat -form-as-a-Service provides joint development and execution environments for soft

-ware and services, with common framework features and easy integration of func -tionality offered by third parties.

The Internet of Services allows the forming of value networks through on-demand service coalitions, built upon service offerings of differ

reaches to the applications and business models, ranging from the exchange of data of physical objects for the optimization of business scenarios in, e g.,

management or manufacturing, †the Internet of things †to social networks While it is evident that sharing

and collaboration brings the Internet, its technolo -gies, applications and users to the next level of evolution, it also raises security and

privacy concerns and introduces additional protection needs. The Future Internet is characterized by deliberate exposure of precious information and resources on one

hand and a number of likely previously unknown interacting entities on the other hand, including service and platform providers as well as service brokers and aggre

or personal data, should however, only be exposed to known and trusted entities and in a controlled way, al

-lowing the owner of the data to decide and control how, when, and where it is going

but the Future Internet adds new dimensions of scale and complexity. The number of participating and collaborating

Data travel through a multitude of different domains, contexts and locations while being processed by a large number of entities with different owner

and treated according to the data owner†s policy in balance with the processing entities†policies

Future Internet entity, while distribution and exchange of data serve for additional entry points that can potentially be exploited to penetrate a system.

The challenge is to design security and trust solutions that scale to Future Internet complexity and keep

the information and resource owner in control, balancing potentially conflicting re -quirements while still supporting flexibility and adaptation.

Future Internet Foundations: Security and Trust The chapters presented in the Security and Trust section of this volume look at the

First, Future Internet princi -ples are supported by revised communication paradigms, which address potential security issues from the beginning,

data-centric approach for the Future Internet, replacing point-to-point communication by a publish/subscribe approach.

that ensure the availability of data and maintains their integrity. It is a good example of how clean-slate approaches to the Future Internet can support security needs by

design, rather than provided as an add-on to an existing approach, as has been the case

for the current Internet The second group of chapters investigates the provision of assurance of the secu

-rity properties of services and infrastructures in the future Internet. The provision of evidence and a systematic approach to ensure that best security practices are applied

in the design and operation of Future Internet components are essential to provide the needed level of trustworthiness of these components.

â€oeengineering Secure Future Internet Services†by W. Joosen et al. makes a point for establishing an engineering discipline for secure services,

the Future Internet into account. Such a discipline is required to particularly empha -size multilateral security requirements, the composability of secure services, the pro

-rity support in programming and execution environments for services, and suggest using rigorous models through all phases of the SDLC, from requirements engineer

of Future Internet specific security engineering research strands. One of the major ingredients of this program, the provision of security assurance through formal valida

Formal Validation of Trust and Security in the Internet of Services†by R. Carbone et

the feasibility of the approach to Future Internet scenarios and the scalability to its complexity:

-strate the way towards rigorous security and trust assurance in the future Internet addressing one of the major obstacles preventing businesses and users to fully exploit

the Future Internet opportunities today While engineering and validation approaches provide a framework for the secure

design of Future Internet artifacts adapted to its characteristics, the third group of Part III:

Future Internet Foundations: Security and Trust 165 chapters looks into specific instances of the information sharing and collaboration

principle and introduces novel means to establish their security. The chapter â€oetrust -worthy Clouds underpinning the Future Internet†of R. Glott et al. discusses latest

trends in cloud computing and related security issues. The vision of clouds-of-clouds describes collaboration and federation of independent cloud providers to provide

seamless access to end users, as if they were working within a single cloud environ -ment. This advanced level of distribution offers increased economic benefits, but also

and provide an outlook to their mitigation, embedded in a system -atic security risk management process.

In cloud computing, but also in most other Future Internet scenarios like the Internet of Services, the need for data exchange

leads to sensitive data, e g.,, personally identifiable information, travelling across a number of processes, components, and domains.

All these entities have the means to collect and exploit these data, posing a challenge to the enforcement of the usersâ€

protection needs and privacy regulations. This is amplified by the dynamic nature of the Future Internet,

which does not allow one to predict by whom data will be proc -essed or stored.

To provide transparency and control of data usage, the chapter â€oedata Usage Control in the future Internet Cloud†proposes a policy-based framework for

expressing data handling conditions and enforcing them. Policies relating events and obligations are coupled with data (â€oesticky policiesâ€) and,

hence, cannot get lost in transition. A common policy framework based on tamper-proof event handlers and

obligation engines allows for the evaluation of user-defined policies and their execu -tion, leaving control to the user

With the three groups of chapters, this section of the book provides directions on how security and trust risks emerging from the increased level of sharing and collabo

-ration in the future Internet can be mitigated, removing a major hurdle for using its exciting opportunities in sensitive scenarios of both the business and societal worlds

Volkmar Lotz and Frances Cleary J. Domingue et al. Eds.):) Future Internet Assembly, LNCS 6656, pp. 167†176,2011

 The Author (s). This article is published with open access at Springerlink. com Security Design for an Inter-Domain Publish/Subscribe

Architecture Kari Visala1, Dmitrij Lagutin1, and Sasu Tarkoma2 1 Helsinki Institute for Information technology HIIT /Aalto University School of Science and Technology, Espoo, Finland

{Kari. Visala, Dmitrij. Lagutin}@ hiit. fi 2 Department of computer science, University of Helsinki, Helsinki, Finland Sasu. Tarkoma@cs. helsinki. fi

Internet Protocol Suite with a data-centric or publish/subscribe (pub/sub) net -work layer waist for the Internet.

The clean-slate design makes it possible to take into account issues in the current Internet, such as unwanted traffic, from

the start. If these new proposals are deployed ever as part of the public Internet as an essential building block of the infrastructure, they must be able to operate

in a hostile environment, where a large number of users are assumed to collude against the network and other users.

In this paper we present a security design through the network stack for a data-centric pub/sub architecture that achieves

availability, information integrity, and allows application-specific security poli -cies while remaining scalable. We analyse the solution

and examine the mini -mal trust assumptions between the stakeholders in the system to guarantee the

Future Internet, publish/subscribe networking, network security 1 Introduction Data-centric pub/sub as a communication abstraction 2, 3,

4 reverses the control between the sender and the receiver. Publication in the middle decouples the publisher

whole Internet protocol suite with a clean-slate data-centric pub/sub network waist 14. This enables new ways to secure the architecture in a much more fundamental

For example, it must be assumed that the core routers forward packets at line-speeds of tens of Gigabits per second, which requires ex

-pensive, high speed memory for the routing tables. In the inter-domain setting, we have to take into account the various stakeholders such as ISPS, end-users, and

Data-or content-centric networking can be seen as the inversion of control between the sender and the receiver compared to message passing:

-fied data that the network then returns when it becomes available taking advantage of multicast and caching 2,

-tion pattern to emphasize that the data items can link to other named data and that the

data has structure An immutable association can be created between a rendezvous identifier (Rid) and a data value by a publisher

and we call this association a publication. At some point in time, a data source may then publish the publication inside a set of scopes that

determine the distribution policies such as access control, routing algorithm, reach -ability, and Qos for the publication and may support transport abstraction specific

policies such as replication and persistence for data-centric communication. The Security Design for an Inter-Domain Publish/Subscribe Architecture 169

scope must be trusted by the communicating nodes to function as promised and much of the security of our architecture is based on this assumption as we explain in 5

function, operates solely using data-centric pub/sub model, it can be used to set up communication using any kind of transport abstraction on the data plane fast path

that is used for the payload communication. The data-centric paradigm is a natural match with the communication of topology information that needs to be distributed

typically to multiple parties and the ubiquitous caching considerably reduces the ini -tial latency for the payload communication as popular operations can be completed

locally based on cached data Below the control plane, t he network is composed of domains, that encapsulate re

-sources such as links, storage space, processing power in routers, and information. The concept of domain is here very general,

such as software components, individual nodes, or ASES. An upgraph of a node is the set of potential resources, that can be represented as a network map of domains and their

endpoints are a source and a destination or for data-centric transport: a data source

and a subscriber. The topic is identified with an Rid and is used to match the end

For example, for data-centric communication, the topic identifies the requested publication A graphlet defines the network resources used for the payload communication and

the identifier and L is a variable length label of binary data. Only fixed length hash of

variable length names are needed for dynamically generated content, where the data source uses the label as an argument to produce the publication on the fly.

where PN is the public key of the user's own namespace. The contents of this publication point to another â€oemovie frame dataâ€

hardware accelerator has been developed for PLA 24 accelerating cryptographic operations Security Design for an Inter-Domain Publish/Subscribe Architecture 171

scopes, where publications are made available are orthogonal to the structure of the data In Fig. 1, the publication on the left is published inside â€oemy home scope†that is fully

controlled by the local user. On the other hand, the movie frame publication on the right is stored inside movies studio's localized scope,

easy to see that the logical structure of the data, e g. the link between the two publica

-tions, is orthogonal to the scoping of the data that determines the communication aspects for each publication

In the current Internet, most policy compliant paths have the so-called valley-free property 16,

a data-centric pub/sub primitive as a recursive, hierarchical structure, which first joins node local rendezvous implementations into rendezvous networks (RN) and then RNS

-dezvous core and scope-specific implementations of scope home nodes that imple -ment the functionality for a set of scopes

-end path between the service container (e g. a data source) and the client (e g. a subscriber) and

tion data or pending subscription alive. This pub/sub primitive is the only functional -ity implemented by the rendezvous core.

We refer to our work in 5 for a detailed description of the rendezvous security mechanisms

be found in the rendezvous core, the subscription reaches the scope, which can then dynamically generate the response

should be supported by adding a data-centric transport to the data plane as we did

Each scope also publishes a meta-data publication inside itself named DKX, â€oescope meta-dataâ€) describing which transports the scope supports, among

The upgraph data itself is published by the provider domain of the node Because many nodes share the same upgraph, the data-centric rendezvous system

caches them orthogonally close to the scope homes that are nodes implementing the scope in question. Similarly, the result of the rendezvous is cached automatically and

If the transport in question is multicast data dissemination then a separate resource allocation protocol could be coupled with the protocol as we

used to hide the location of the service from its users. We refer to our work in 2 for

A data-oriented network architecture DONA 4 replaces a tradi -tional DNS-based namespace with self-certifying flat labels,

which owns the data and L is a label. DONA utilizes an IP header extension mechanism to add a DONA header to the IP header, and sepa

Consumers of data send interest packets to the network, and a nodes possessing the data reply with the corresponding

data packet. Since packets are named independently, a separate interest packet must be sent for each required data packet.

In CCN data packets are signed by the original publisher allowing independent verification, however interest packet's are not always

protected by signatures Security issues of the content-based pub/sub system have been explored in 7. The

work proposes secure event types, where the publication's user friendly name is tied to the publisher's cryptographic key

Security Design for an Inter-Domain Publish/Subscribe Architecture 175 5. 1 Security Mechanisms Most of existing network layer security proposals utilize hash chains or Merkle trees

8. Examples of hash chain based solutions include TESLA 9, which is based time hash chain scheme,

Accountable Internet Protocol (AIP) 11 aims to improve security by providing accountability on the network layer.

If the router receives a packet from the unknown EID the router will send a verification message back

and the node will reply with a mes -sage signed by its private key. Since EID is hash of node's public key,

user's e-mail address to be used as user's public key, simplifying the key distribution

PKG), which knows all private keys of its users 6 Conclusion and Future Work In this paper we introduced a data-centric inter-domain pub/sub architecture addressing

availability and data integrity. We used the concept of scope to separate the logical structure of linked data from the orthogonal distribution strategies used to determine

how the data is communicated in the network. This is still ongoing work and, for exam -ple, the ANDL language and quantitative analysis will be covered in our future work

Open Access. This article is distributed under the terms of the Creative Commons Attribution Noncommercial License which permits any noncommercial use, distribution, and reproduction

in any medium, provided the original author (s) and source are credited References 1. Wang, C.,Carzaniga, A.,Evans, D.,Wolf, A l.:

Internet-scale publish-subscribe systems. In: HICSS †02, Hawaii, USA (2002 2. Visala, K.,Lagutin, D.,Tarkoma, S.:

An Inter-Domain Data-Oriented Routing Architecture. In: Rearch†09, Rome, Italy (2009 3. Jacobson, V.,Smetters, D. K.,Thornton, J. D.,Plass, M.,Briggs, N.,Braynard, R. L.:

A Data-Oriented (and Beyond) Network architecture. In: ACM SIGCOMM 2007 Kyoto, Japan (2007 176 K. Visala, D. Lagutin, and S. Tarkoma

-row†s Internet. IEEE/ACM Transactions on Networking 13 (3), 462†475 (2005 7. Pesonen, L. I.,Bacon, J.:

5th international workshop on Software engineering and mid -dleware, pp. 98†105 (2005 8. Merkle, R.:

-countable internet protocol (AIP. In: Proceedings of the ACM SIGCOMM 2008, pp. 339†350 (2007

-tions on Computer systems 2 (4), 277†288 (1984 14. Lagutin, D.,Visala, K.,Tarkoma, S.:

Publish/Subscribe for Internet: PSIRP Perspective Valencia FIA book (2010 15. Tarkoma, S.,Antikainen, M.:

13th IEEE Global Internet Symposium 2010 (2010 16. Gao, L.:On Inferring Autonomous System Relationships in the Internet.

IEEE/ACM Transactions on Networking 9 (6), 733†745 (2001 17. Yang, X.,Clark, D.,Berger, A w.:

IEEE Computer Society Press, Los Alamitos (2004 20. Carpenter, B.:rfc1958: Architectural Principles of the Internet.

IETF (June 1996 21. Jokela, P.,Zahemszky, A.,Esteve, C.,Arianfar, S.,Nikander, P.:LIPSIN:

European Conference on Computer Net -work Defence, EC2ND (2009 23. Miller, V. S.:Use of elliptic curves in cryptography.

In: Williams, H. C. ed.)CRYPTO 1985. LNCS, vol. 218, pp. 417†426. Springer, Heidelberg (1986

Hardware subtask final report. Helsinki University of Technology, Tech. Rep (2008), http://www. tcs. hut. fi

/Software/PLA/new/doc/PLA HW FINAL REPORT. pdf 25. Lagutin, D.:Securing the Internet with Digital Signatures.

Doctoral dissertation, Depart -ment of Computer science and Engineering, Aalto University, School of Science and Technology (2010

Engineering Secure Future Internet Services Wouter Joosen1, Javier Lopez2, Fabio Martinelli3, and Fabio Massacci4 1 Katholieke Universiteit Leuven

wouter. joosen@cs. kuleuven. be 2 University of Malaga jlm@lcc. uma. es 3 National Research Council of Italy

establishing a discipline for engineering secure Future Internet Services typically based on research in the areas of software engineering, of service

engineering and security engineering. Generic solutions that ignore the characteristics of Future Internet services will fail,

yet it seems obvious to build on best practices and results that have emerged from various research communities

in the scope of secure service engineering into comprehensive software and service life cycle support. Such a life cycle support must deliver

order to jointly enable the security and trustworthiness of Future Internet services 1 Introduction 1. 1 Future Internet Services

The concept named Future Internet (FI) aggregates many facets of technology and its practical use, often illustrated by a set of usage scenarios and typical

applications. The Future Internet may evolve to use new infrastructures, net -work technologies and protocols in support of a growing scale and a converging

world, especially in light of smaller, portable, ubiquitous and pervasive devices Besides such a network-level evolution, the Future Internet will manifest itself to

the broad mass of end users through a new generation of services (e g. a hybrid aggregation of content and functionality), service factories (e g.,

, personal and enterprise mash-ups), and service warehouses (e g.,, platform as a service. One speciï c service instance may

) Future Internet Assembly, LNCS 6656, pp. 177†191,2011 câ The Author (s). This article is published with open access at Springerlink. com

In addition, the user community of such FI services evolves and widens rapidly, including masses of typical end users in the role

of prosumers (producing and consuming services. This phenomenon increases the scale, the heterogeneity and the performance challenges that come with FI

Multiparty service systems are not entirely new, yet the Future Internet stretches the present know how on building secure software services and systems:

more stakeholders with diï €erent trust levels are involved in a typical service com -position and a variety of potentially harmful content sources are leveraged to

provide value to the end user. This is attractive in terms of degrees of freedom in the creation of service oï €erings and businesses.

Furthermore, the Future Internet will be an intrinsically dynamic and evolv -ing paradigm where, for instance, end users are empowered more and more and

therefore decide (often on the spot) on how content and services are shared and composed. This adds an extra level of complexity,

1. 2 The Need for Engineering Secure Software Services The need to organize, integrate and optimize the research on engineering secure

software services to deal eï €ectively with this increased challenge is pertinent and well recognized by the research community and by the industrial one.

Internet services and causes signiï cant monetary losses in recovering from those attacks. In addition, this induces users at several levels to lose conï dence in the

adoption of ICT-services From a business perspective, however, we are now witnessing the emergence

of new and unprecedented models for service-oriented computing for the Future Internet: Infrastructure as a service (Iaas), Platform as a service (Paas) and

Software as a service (Saas). These models have the potential to better adhere to an economy of scale

and have shown already their commercial value fostered by key players in the ï eld. Nevertheless, those new models present change of control

New Internet services will have to be Engineering Secure Future Internet Services 179 provided in the near future,

and security breaches in these services may lead to large ï nancial loss and damaged reputation

-cesses and tools for secure software development. This typically covers require -ments engineering, architecture creation, design and implementation techniques

developed software is secure. Assurance must be based on justiï able evidence and the whole process designed for assurance.

ICT-services according to the latest Future Internet paradigms, where services are composed by simpler services (provided by separate administrative domains

service architectures and secure service design,(3) supporting programming en -vironments for secure and compose-able services,(4) enabling security assurance

integrating the former results in (5) a risk-aware and cost-aware software devel -opment life-cycle (SDLC),

and (6) the delivery of case studies of future internet application scenarios The ï rst three activities represent major and traditional stages of (secure

software development: from requirements over architecture and design to the composition and/or programming of working solutions.

These three activities interact to ensure the integration between the methods and techniques that are

techniques that we consider useful for engineering secure Future internet services 2 Security Requirements Engineering

The need for assurance in the future Internet demands a set of novel engi -neering methodologies to guarantee secure system behavior and provide credible

The security requirements of Future Internet applica -tions will diï €er considerably from those of traditional applications.

is that Future Internet applications will not only be distributed geographically as are traditional applications, but they will also involve multiple autonomous

stakeholders, and may involve an array of physical devices such as smart cards phones, RFID sensors and so on that are connected perpetually and transmit

a variety of information including identity, bank accounts, location, and so on Some of these transactions might even happen transparently to the user;

for example, a person†s identity could be communicated seamlessly by a personal device to the store she is entering to do the shopping.

Engineering Secure Future Internet Services 181 This picture is complicated further by the vast number and the geographical

Sensor networks, RFID tags, smart appliances that communicate not only with the user but with their manufacturers, are examples of such devices.

Such de -ployments inherit security risks from the classical Internet and, at the same time create new and more complex security challenges.

Examples include illicit track -ing of RFID tags (privacy violation) and cloning of data on RFID tags (identity

theft). ) Applications that involve such deployments typically cross organization boundaries In light of the challenges and principles highlighted above,

-neous users and a high level of composition and adaptation is required. These factors increase the complexity of applications

-age existing mechanisms and methodologies for software construction as well as researching about new ways to take this complexity into account in a holistic

-ple users, devices, third-party components interact continuously and seamlessly so security enforcement mechanisms are indispensable.

software service and/or system is a timely moment to enforce and reason about these security mechanisms,

The software architecture encompasses the more relevant elements of the ap -plication, providing either a static or/and a dynamic view of the application.

which comprise software elements, the ex -ternally visible properties of those elements, and the relationships among themâ€

early phase in the software development cycle The research topics one must focus on in this subarea relate to model-driven

Until this point in the software and service development process, diï €erent concerns †security among them †of the whole application have been sepa

Engineering Secure Future Internet Services 183 in order to grasp a comprehensive understanding of the application as a whole

limiting the propagation of design ï aws through the models Second, given that diï €erent sub-architectures may exist, each addressing dif

-curring problem in software design. Design patterns, once identiï ed, allow reuse of design solutions that have proved to be eï €ective in the past, reducing costs

security-critical software systems 4 Security Support in Programming Environments Security Support in Programming Environments is not new;

still it remains a grand challenge, especially in the context of Future Internet (FI) Services.

Secur -ing Future Internet Service is inherently a matter of secure software and systems The context of the future internet services sets the scene in the sense that (1

speciï c service architectures will be used, that (2) new types of environments will be exploited, ranging from small embedded devices (â€oethingsâ€) to service in

-frastructures and platform in the cloud, and (3) a broad range of programming technologies will be used to develop the actual software and systems

The search for security support in programming environments has to take this context in account.

The requirements and architectural blueprints that will be produced in earlier stages of the software engineering process cannot deliver

the expected security value unless the programs (code) respect these security artefacts that have been produced in the preceding stages.

This sets the stage for model driven security in which transformations of architecture and design

artefacts is essential, as well as the veriï cation of code compliance with various 184 W. Joosen et al

-ciï c elements of the software design; other may simply be high priority security requirements that have articulated †such as the appropriate treatment of con

Supporting security requirements in the programming †code †level requires a comprehensive approach. The service creation means must be improved and

as well as programming new services from scratch using a state-of-the-art programming language. The service creation context will typ

-ically aim for techniques and technologies that support compile and build-time feedback. One could argue that security support for service creation must focus

Future Internet services and applications will be composed of several services created and hosted by various organizations and providers), each with its own

Middleware Aspects. The research community should re-investigate ser -vice-oriented middleware for the Future Internet, with a special emphasis on

Engineering Secure Future Internet Services 185 enabling deployment, access, discovery and composition of pervasive services

oï €ered by resource-constrained nodes 4. 2 Secure Service Programming Many security vulnerabilities arise from programming errors that allow an ex

-ploit. Future Internet will further reinforce the prominence of highly distributed and concurrent applications, making it important to develop methodologies that

ensure that no security hole arises from implementations that exploit the com -putational infrastructure of the Future Internet.

The research community must further investigate advances over state-of-the-art in ï ne-grained concurrency to

enable highly concurrent services of the Future Internet, and will improve anal -ysis and veriï cation techniques to verify, among others, adherence to program

-ming principles and best-practices 10 Veriï able Concurrency. Lock-free wait-free algorithms for common soft

-ware abstractions (queues, bags, etc. are one of the most eï €ective approaches to exploit multi-core parallelism.

These algorithms are hard to design and prove correct, error-prone to program, and challenging to debug.

Adherence to Programming Principles and Best-Practices. Program -ming support must include methods to ensure the adherence of a particular pro

-gram to well-known programming principles or best-practices in secure software development. Emphasis will be put on language extensions that guarantee adher

currently used in order to prevent cross-site scripting attacks and similar vul -nerabilities associated with web-based distributed applications.

Obviously, the logical rationales underlying such best-practises must be articulated, enabling he development of type systems enforcing these practises directly †thus allowing

users to deviate from rigid best-practices while still maintaining security 4. 3 Platform Support for Security Enforcement

Future Internet applications span multiple trust domains, and the hybrid aggre -gation of content and functionality from diï €erent trust domains requires com

Web technology inherently embeds the concept of cross-domain references, and applications are isolated via the

run-time execution monitors that can provably enforce advanced security policies 19,3 including ï ned-grained access control policies usage control policies and

central role in the development of software based services to provide conï dence about the desired security level.

giving feedback at each stage of the software life cycle by checking that the related models and artefacts satisfy their functional and security requirements

Obviously the security support in programming environments that must be delivered will be essential to incept a transverse methodology that

enables to manage assurance throughout the software and service development life cycle (SDLC. The next section clariï es these issues

Engineering secure Future Internet services demands for at least two traversal issues, security assurance and risk and cost management during SDLC

The main objective is to enable assurance in the development of software based services to ensure conï dence about their trustworthiness.

Our core goal is to incept a transverse methodology that enables to manage assurance throughout

the software development life cycle (SDLC. The methodology is based on two strands: A ï rst sub-domain covers early assurance at the level of requirements

failures in Future Internet applications reduces development costs and improves assurance in the ï nal system.

Engineering Secure Future Internet Services 187 secure protocols, services, and systems. This involves the deï nition of suitable

-ï cation of Future Internet protocols. The planned extensions require not only signiï cant eï ciency improvements,

programming discipline. Internet applications can be validated through testing In that case, it is possible to develop test data generation that speciï cally targets

the integration of services, access control policies or speciï c attacks. Moreover implementations can be monitored at run-time to ensure that they satisfy the

required security properties Complementing activities are related to secure programming. This strand addresses a comprehensive solution for program veriï cation,

while adding a par -ticular focus on session management in concurrent and distributed service com -positions

characteristic for service-oriented applications in the future Internet: penetration testing that leverages on the high-level models that are generated in early stages

of the software life cycle, automated generation in XML-based input data to maximize the eï ciency in the security testing process,

-tion must complement programming-level veriï cation and testing in order to provide the ï nal assurance that the latter cannot deliver,

-positions in Future Internet. We will study approaches for run-time monitoring of data ï ow,

as well as technologies for privacy-preserving usage control Towards a Traverse Methodology. Security concerns are speciï ed at the

Metrics can be used directly for computing risks (e g.,, probability of threat occurrence) or indirectly (e g.,

-curity metrics in the future Internet applications become increasingly impor -tant. Service-oriented architectures demand for assurance indicators that can

Clients want to be sure that their data outsourced to other domains, which the clients cannot control,

While the software development proceeds through incremental phases, the risk and cost analysis will undergo new iterations for

-gate through the software development phases and become more reï ned. In order to support the propagation of analysis results through the phases of the SDLC

Engineering Secure Future Internet Services 189 one needs to develop methods and techniques for the reï nement of risk analysis

In order to accommodate to a modular software development pro -cess, as well as eï €ectively handling the heterogeneous and compositional nature

of Future Internet services, one needs to focus on a modular approach to the analysis of risks and costs.

-tablishing a discipline for engineering secure Future Internet Services, typically based on research in the areas of software engineering, security engineering and

of service engineering. We have clariï ed why generic solutions that ignore the characteristics of Future Internet services will fail:

the peculiarities of FI services must be reï ected upon and be addressed in the proposed and validated solution

Network of Excellence on Engineering Secure Future Internet Software Services and Systems) under the grant agreement n. 256980

Software Architecture In practice, 2nd edn Addison-Wesley, Boston (2003 3. Bauer, L.,Ligatti, J.,Walker, D.:

agent-oriented software development methodology. Autonomous Agents and Multi -Agent Systems 8, 203†236 (2004

Engineering Secure Future Internet Services 191 8. Dardenne, A.,van Lamsweerde, A.,Fickas, S.:Goal-directed requirements acqui

of the 22nd Annual Symposium on Foundations of Computer science, Washing -ton, DC, USA, pp. 350†357.

IEEE Computer Society Press, Los Alamitos (1981 doi: 10.1109/SFCS. 1981.32 10. Erlingsson, U.,Schneider, F. B.:

Irm enforcement of java stack inspection. In: Pro -ceedings of the 2000 IEEE Symposium on Security and Privacy, WASHINGTON DC

IEEE Computer Society Press, Los Alamitos (2000 11. France, R.,Fleurey, F.,Reddy, R.,Baudry, B.,Ghosh, S.:

Enterprise Distributed Object Computing Conference, WASHINGTON DC, USA, p 253. IEEE Computer Society Press, Los Alamitos (2007

12. Giorgini, P.,Mouratidis, H.,Zannone, N.:Modelling security and trust with secure tropos. In:

Integrating Security and Software engineering: Advances and Future Vision, IDEA (2006 13. Group, O.:Security design pattern technical guide

Ubiquitous Knowledge Discovery for Users at ECML/PKDD, pp. 51†64 (2006 15. Hamlen, K. W.,Morrisett, G.,Schneider, F. B.:

SPAQU€ 08 (Int. Workshop on Software Patterns and Quality)( 2008 18. Lazouski, A.,Martinelli, F.,Mori, P.:

Computer science Review 4 (2), 81†99 (2010 19. Le Guernic, G.,Banerjee, A.,Jensen, T.,Schmidt, D. A.:

secure mobile grid systems. Journal of Systems Architecture. In Press (2010 24. Sabelfeld, A.,Myers, A c.:

Progress in Informatics 5, 35†47 (2008 Towards Formal Validation of Trust and Security in the Internet of Services

Roberto Carbone1, Marius Minea2, Sebastian Alexander Moâ dersheim3 Serena Elisa Ponta4, 5, Mathieu Turuani6, and Luca Vigano`7

in the release of ï awed products to end-users. This issue can be sig -niï cantly mitigated by empowering designers and developers with tools

The formal veriï cation of trust and security of the Internet of Services will signiï cantly boost its development and public acceptance

The vision of the Internet of Services (Ios) entails a major paradigm shift in the way ICT systems and applications are designed,

they are no longer the result of programming components in the tra -ditional meaning but are built by composing services that are distributed over

In the Ios, services are business functionalities that are designed and implemented by producers, deployed by providers,

However, the new opportunities opened by the Ios will only materialize if concepts, techniques and tools are provided to ensure secu

) Future Internet Assembly, LNCS 6656, pp. 193†207,2011 câ The Author (s). This article is published with open access at Springerlink. com

are already plaguing complex web-based security-sensitive applications, and thus severely aï €ect the development of the future internet.

Moreover, security vali -dation should be carried out at all phases of the service development process in particular during the design phase by the service designers themselves or by

-sumption time, thereby signiï cantly improving the all-round security of the Ios In this chapter, we give a brief overview of the main scientiï c and industrial chal

thus increase the development and public acceptance of the Ios We proceed as follows. In Sections 2 and 3, we discuss, respectively, some of

Towards Formal Validation of Trust and Security in the Internet of Services 195 Second, SOAS are also distributed systems, with functionality and resources

distributed over several machines or processes. The resulting exponential state -space complexity makes their design and eï cient validation diï cult, even more

of the communicated data. More elaborate goals are structural properties (which can sometimes be reduced to conï dentiality and authentication goals) such as

, for a given web service for online shopping one may require that every order will eventually be processed

9 The AVANTSSAR Platform allows users also to input their services by specifying them using the high-level formal speciï cation language ASLAN,

-sider the policies that a user U has access to a ï le F if U belongs to a group G

or U is the deputy of a user that has access to F access (U, F) â member (U, G) â§owner (G, F

For instance, if user Alice changes to another group within the organization, she will immediately obtain all access

except for those that she maintains due to her being a deputy for other users We consider transition systems in which a state is a set of facts like member

Towards Formal Validation of Trust and Security in the Internet of Services 197 purposes, no agent can access both ï les f1 and f2.

the Internet of Services, the challenge of validating services and service-oriented applications cannot be addressed simply by scaling up the current generation of

composing web services have been considered, which diï €er by their architecture orchestration is centralized and all traï c is routed through a mediator, whereas

and all web services can communicate directly 198 R. Carbone et al Several â€oeorchestration†notions have been advocated (see, e g.,

data of each organization; and our main motivation is to take into account the se -curity policies while computing an orchestration.

The AVANTSSAR Platform for example, implements an idea presented in 11 to automatically generate a mediator.

We specify a web service proï le from its XML Schema and WS -Securitypolicy using ï rst-order terms (including cryptographic functions.

mediator is able to use cryptography to produce new messages, and is con -structed with respect to security goals using the techniques we developed for the

Towards Formal Validation of Trust and Security in the Internet of Services 199 of course, undesirable to verify the entire system as a whole:

For instance, Tulafale 6, a tool by Microsoft Research based on Proverif 7, exploits abstract interpretation for veriï cation of web services

that use SOAP messaging, using logical predicates to relate the concrete SOAP messages to a less technical representation that is easier to reason about

representing, for instance, agents, request numbers, or cryptographic keys) into ï nitely many equivalence classes and to compute on those equivalence classes

ï xed-point computations of static analysis. Thanks to the over-approximation these systems completely avoid the state-explosion problems of model checking

is to organize data by means of sets and to abstract data by set membership.

the example of Section 2, we may consider the set Ug of users that are currently

members of a group g. We can then identify all users that belong to the same set

, if a user changes from one group to another. Here, the set-abstraction method deï nes a mechanism to reason about

user would not delete any information that he has learned in the old group, but he

layer of software modules that carry out the translation from application-level speciï cation languages (such as BPMN and BPEL,

Towards Formal Validation of Trust and Security in the Internet of Services 201 Vu ln

-quired to determine the access to private data and to the meta-policies that control them.

data available anywhere and anytime in a health care organization, while lower -ing infrastructure costs. Clearly, privacy requirements will be much more diï cult

the detection of a serious ï aw in the SAML-based SSO solution for Google

Towards Formal Validation of Trust and Security in the Internet of Services 203 proï le and which are not.

Still, when Google de -veloped their SAML-based SSO solution for Google Apps they released a ï awed

product, which allowed a dishonest service provider to impersonate the victim user on Google Apps, granting unauthorized access to private data and services

email, docs, etc..The vulnerability was detected by the SATMC backend of the AVANTSSAR Platform and the attack was reproduced in an actual deployment

of SAML-based SSO for Google Apps. Google and the US Computer Emergency Readiness Team (US-CERT) were informed

and the vulnerability was kept con -ï dential until Google developed a new version of the authentication service and

Google†s customers updated their applications accordingly. The severity of the vulnerability has been rated High in a note issued by the National Institute of

Standard and Technology (NIST Moreover, as shown in 2, the SATMC backend of the AVANTSSAR Plat

It also allows an attacker to launch Cross-Site Scripting (XSS and Cross-Site Request Forgery attacks (XSRF.

This last type of attack is even more pernicious than classic XSS, because XSRF requires the client to have

SAML-based SSO for Google Apps and that could have allowed a malicious web server to impersonate a user on any Google application.

In 2, solutions that can be used to mitigate and even solve the problem are described. These possible

, USB tokens or smart cards Sensitive cryptographic keys, stored inside the token, should not be revealed to the outside and it should be impossible for an attacker to change those keys

The attacks found show that in many implementations this is not the case: the compromise of a key allows an attacker to clone the token and, more generally

to perform the same security-critical operations as the legitimate token user Formal validation of trust and security will become a reality in the Internet

of Services only if and when the available technologies will have migrated to in -dustry, as well as to standardization bodies (which are driven mostly by industry

FM would promote a more secure development environment, a variety of prac -tical and cultural reasons lead the industrial world to perceive FM approaches

and (iii) the diï €erences between formal languages and models and those used in industrial design and development environments (e g.,

, BPMN, Java, ABAP The problem is how to make new, eï cient methodologies and technologies

accessible and readily exploitable, beneï tting industry designers and develop -ers. This amounts to migrating the research outcomes of the logical level into

with easy-to-use GUIS and translators to and from the core formal models should be devised and migrated to the selected development environments

A concrete example is the industry migration of the AVANTSSAR Platform to the SAP environment.

out by building contacts with core business units. First, in the trail of the suc

Management (SAP NW SIM) with the objective of exploiting the AVANTSSAR technology to initiate a deep formal analysis of the SAP Netweaver SAML Next

SAP have been identiï ed. All discovered risks and ï aws in the SAML protocol have been addressed in NW-NGSSO implementation

Towards Formal Validation of Trust and Security in the Internet of Services 205 there and helped SAP Research to better understand the vulnerability itself and

-complished by means of the Need-to-Know principle (giving to the users enough rights to perform their job,

6 Conclusions and Outlook As exempliï ed by these case studies and success stories, formal validation tech

-nologies can have a decisive impact for the trust and security of the Ios. The

advances will signiï cantly improve the all-round security of the Ios, and thus boost its development and public acceptance

Analysis of SAML 2. 0 Web browser Single Sign-on: Breaking the SAML-based Single Sign-on for Google Apps.

In: Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering (FMSE 2008), pp. 1†10.

for web services. In: de Boer, F. S.,Bonsangue, M m.,, Graf, S.,de Roever, W.-P

IEEE Computer Society Press, Los Alamitos (2001 8. Bodei, C.,Buchholtz, M.,Degano, P.,Nielson, F.,Nielson, H r.:

Boichut/ta4sp. html 10. Bortolozzo, M.,Centenaro, M.,Focardi, R.,Steel, G.:Attacking and Fixing

Proceedings of Web Service Composition and Adaptation Workshop (held in conjunction with SCC/SERVICES-2008), pp. 529†537.

Computer Society Press, Los Alamitos (2008 12. Ciobaë ca, S.,Cortier, V.:Protocol composition for arbitrary primitives.

IEEE Computer Society Press, Los Alamitos (2010 13. Clarke, E. M.,Grumberg, O.,Peled, D. A.:

Towards Formal Validation of Trust and Security in the Internet of Services 207 17. Dolev, D.,Yao, A.:

on Information theory 2 (29)( 1983 18. Hodkinson, I.,Reynolds, M.:Temporal Logic. In: Blackburn, P.,van Benthem, J

Logic and Algebraic Programming 70 (1), 96†118 (2007 20. Marconi, A.,Pistore, M.:Synthesis and Composition of Web Services.

In: Bernardo M.,Padovani, L.,Zavattaro, G. eds. SFM 2009. LNCS, vol. 5569, pp. 89†157

and Web Services with Databases. In: Proceedings of 17th ACM conference on Computer and Communications security (CCS 2010), pp. 351†360.

ACM Press New york (2010 22. Moâ dersheim, S.,Vigano`,L.:Secure Pseudonymous Channels. In: Backes, M.,Ning

Web Services Business Process Execution Language vers. 2. 0 2007), http://docs. oasis-open. org/wsbpel/2. 0/OS/wsbpel-v2. 0-OS. pdf

25. Pnueli, A.:The Temporal Logic of Programs. In: Proceedings of the 18th IEEE Symposium on Foundations of Computer science, pp. 46†57.

IEEE Computer So -ciety Press, Los Alamitos (1977 26. T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol, Version

1. 2. IETF RFC 5246 (Aug. 2008 27. Turuani, M.:The CL-Atse Protocol Analyser.

Internet Ruâ diger Glott1, Elmar Husmann2, Ahmad-Reza Sadeghi3, and Matthias Schunter2 1 Maastricht University, The netherlands

2 IBM Research †Zuâ rich, Ruâ schlikon, Switzerland huselmar@de. ibm. com, mts@zurich. ibm. com

3 TU Darmstadt, Germany ahmad. sadeghi@trust. rub. de Abstract. Cloud computing is a new service delivery paradigm that

aims to provide standardized services with self-service, pay-peruse, and seemingly unlimited scalability. This paradigm can be implemented on

in the future Internet This article introduces upcoming security challenges for cloud services such as multi-tenancy, transparency and establishing trust into correct

1 Cloud computing and the Future Internet Cloud computing is expected to become a backbone technology of the Future

Internet that provides Internet-scale and service-oriented access to virtualized computing, data storage and network resources as well as higher level services

In contrast to the current cloud market that is mainly characterized by isolated providers, cloud computing in the future Internet is expected to be character

-ized by a seamless cloud capacity federation of independent providers-similar to the network peering

and IP transit purchasing of ISPS in today†s Internet For an end-user this means that via interacting with one cloud provider, re

-sources and services provided by multiple similar providers are seamlessly ac -cessed. Cloud computing goes beyond technological infrastructure that derives

from the convergence of computer server power, storage and network bandwidth It is a new business

and distribution model for computing that establishes a new relationship between the end user and the data center, which â€oe...

gives the user †programmatic control†over a part of the data center†1, pp. 8-9

For this cloud-of-clouds vision4this article will investigate the related chal -lenges for trust and security architectures and mechanisms

4 For which the Internet pioneer Vint Cerf has suggested recently the term â€oeinter -cloud†J. Domingue et al.

Eds.):) Future Internet Assembly, LNCS 6656, pp. 209†221,2011 câ The Author (s). This article is published with open access at Springerlink. com

210 R. Glott et al FIA projects like RESERVOIR or VISION are conducting research on core

technological foundations of the cloud-of-clouds such as federation technologies interoperability standards or placement policies for virtual images or data across

providers. Many of these developments can be expected to be transferred into the Future Internet Core Platform project that will launch in 2011.

This goes along with increased collaboration on open cloud standards under developments by groups such as the DMTF Open Clouds Standards Incubator, the SNIA

Cloud storage Technical Working group or the OGF Open Clouds Computing Interface Working group Trust and security are regarded often as an afterthought in this context, but

computing, data protection and privacy issues as well as liability and compliance problems may hinder to tap the full potential of cloud computing 22,8, 26.

By clouds becoming regulation-aware, in the sense that it will ensure that data mobility is limited to ensure compliance with a wide range of diï €erent national

legislation including privacy legislation such as the EU Data protection Directive 95/46/EC As of today, cloud computing is facing signiï cant acceptance hurdles when it

comes to hosting important business applications or critical infrastructures such as those of the usage domains addressed by FIA.

This article will illustrate the reasons for this, and discuss the complex trust and security requirements.

Trustworthy Clouds Underpinning the Future Internet 211 An example for the ï rst category is the Google gov. app cloud launched in

September 2009 that oï €ers a completely segregated cloud targeted exclusively at US government customers.

Similarly, IBM has launched a FISMA compliant Federal Community Cloud in 2010 Other cloud providers also adapt basic service security to the needs of spe

Following its software-plus-services strategy an -nounced in 2007, Microsoft has developed in the past years several Saas cloud

services such as the Business Productivity Online Suite (BPOS. While all of them may be delivered from a multi-tenant public cloud for the entry level

user, Microsoft oï €ers dedicated private cloud hosting and supports third-party or customer-site hosting. This allows tailor made solutions to speciï c security

the base security of Microsoft public cloud services is adapted to the targeted market. Whereas Microsoft uses, e g.,

, for the Oï ce Live Workspace-in analogy to what Google does with Gmail-unencrypted data transfer between the cloud

and the user, cloud services for more sensitive markets (such as Microsoft Health Vault) use SSL encryption by default

On the other hand commodity public cloud services such as the Amazon EC2 are still growing even though they oï €er only limited base security and largely

, Novell, IBM), virtual private network -ing (e g.,, Amazon Virtual Private cloud), encryption (e g.,, Amazon managed encryption services) and web traï c ï ltering services (e g.,

, Zscaler, Scansafe 2. 2 Today†s Datacenters as the Benchmark for the Cloud Using technology always constitutes a certain risk.

allows transfer into systems that are connected not to the Internet 5 Cloudsourcing 15 follows more or less the same economic rationale as tra

upgrades and patches, quick procurement services, avoidance of vendor lock ins and legacy modernization 18. Many cloudsourcers oï €er bundles of consulting

Rather than that, cloud computing might be hindered signiï cantly by the legal problems that remain to be solved

Cloud computing being a novel technology introduces new security risks 7 that need to be mitigated. As a consequence, cautious monitoring and management

Trustworthy Clouds Underpinning the Future Internet 213 3. 1 Isolation Breach between Multiple Customers Cloud environments aim at eï ciencies of scale by increased sharing resources

As a consequence, data leakage and service disrup -tions gain importance and may propagate through such shared resources.

important requirement is that data cannot leak between customers and that malfunction or misbehavior by one customer must not lead to violations of the

through dedicated infrastructure for each individual customer and data wiping before reuse. Sharing of resources and multi-tenant isolation can be implemented

such as virtual machines, vlans, or SANS provide isolation. Sharing resources such as operating systems, middleware, or actual software requires a case-by-case

design of isolation mechanisms. In particular the last example of Software-as-a -Service requires that each data instance is assigned to a customer and that

these instances cannot be accessed by other customers. Note that in practice these mechanisms are mixed often: While an enterprise customer may own a vir

-tual machine (Machine-level isolation), this machine may use a database server Middleware isolation) and provide services to multiple individual departments

Application isolation In order to mitigate this risk in a cloud computing environment, multi-tenant isolation ensures customer isolation.

A principle to structure isolation manage -ment is One way to implement such isolation is labeling and ï ow control

Labeling: By default all resources are assigned to a customer and labeled with a corresponding label

Flow control: Shared resources must moderate potential data ï ow and ensure that no unauthorized data ï ow occurs between customers.

To limit ï ow control, mechanisms such as access control that ensures that machines and applications of one customer cannot access data or resources from other

customers can be used Actual systems then need to implement this principle for all shared resources 4

see, e g.,, 2, 3 for network isolation. An important challenge in practice is to identify and moderate all undesired information ï ows 19

may include a network administrator impacting database operations or admin -istrators stealing and disclosing data.

This risk is hard to mitigate since security controls need to strike a balance between the power needed to administrate and

or transported data †Security administrators can design and deï ne policies but cannot play any

†Customer employees can access their respective data and systems (or parts thereof) but cannot access infrastructure

or data owned by diï €erent cus -tomers This so-called privileged identity management system is starting to be imple

For instance, a database ad -ministrator may only obtain administrative privileges over the tables owned by its employer

a database administrator asks for privileges to modify a given database schema 3. The administrator performs the desired task

4. The administrator returns the privileges Due to the corresponding logging, the security auditors can later determine which

, trusted computing 21 or computations on out -sourced data 20 Trustworthy Clouds Underpinning the Future Internet 215

3. 3 Failures of the Cloud Management Systems Due to the highly automated nature of the cloud management systems and the

high complexity of the managed systems software quality plays an important role in avoiding disruptions and service outages:

Another source of failure stems from the fact that large-scale computing clouds are built often using low-cost commodity hardware that fails (relatively

often. This leads to frequent failures of machines that may also include a subset of the management infrastructure

The consequence of these facts is automated that fault tolerance, problem -determination, and (self-)repair mechanisms will be needed commonly in the

cloud environment or recover from software and hardware failures For building such resilient systems, important tools are data replication

atomic updates of replicated management data, and integrity checking of all data received (see, e g.,

, 24. In the longer run, usage of multiple clouds may further improve resiliency (e g.,, as pursued by the TCLOUDS project www. tclouds-pro

ject. eu or proposed in 11 3. 4 Lack of Transparency and Guarantees While the proposed mechanisms to mitigate the identiï ed risks are important

Data corruption may not be detected for a long time. Data leakage by skilled insiders is unlikely to be detected.

Furthermore, the operational state and potential problems are usually not communicated to the customer except after an outage has occurred

â€oeblack-box†approach to cloud computing where customers cannot obtain in -sight on or evidence of correct cloud operations.

and no data is corrupted or leaked. In practice, these problems are unsolved largely. Cryptographers have designed schemes such as homomorphic encryption 9 that allow veriï able com

-putation on encrypted data. However, the proposed schemes are too ineï cient and do not meet the complete range of privacy requirements 23.

A more practi -cal solution is to use Trusted Computing to verify correct policy enforcement 6

Trusted computing instantiation as proposed by the Trusted Computing Group TCG) uses secure hardware to allow a stakeholder to perform attestation, i e.,

, to obtain proof of the executables and conï guration that were loaded at boot-time However, run-time attestation solution still remains an open and challenging

problem 3. 5 What about Privacy Risks To enable trusted cloud computing, privacy protection is an essential require

-ment 26. In simple terms, data privacy aims at protecting personally iden -tiï able data (PID.

In Europe, Article 8 of the European Convention on Hu -man Rights (ECHR) provides a right to respect for ones â€oeprivate and family

life, his home and his correspondenceâ€. The European Court of Human rights states in several decisions that this article also safeguards the protection of an

individual†s PID. Furthermore, the European Data protection Directive (Direc -tive 95/46/EC) substantiates this right

in order to establish a comprehensive data protection system throughout Europe. This directive takes into account the OECD privacy principles 16 which mandate several principles such as, e g

limited collection of data, the authorization to collect data either by law or by informed consent of the individual whose data are processed (â€oedata subjectâ€

the right to correction and deletion as well as the necessity of reasonable security safeguards for the collected data

Since cloud computing often means outsourcing data processing, the user as well as the data subject might face risks of data loss, corruption or wiretap

-ping due to the transfer to an external cloud provider. Related to these de facto obstructions in regard to the legal requirements, there are three particular chal

-lenges that need to be addressed by all cloud solutions: Transparency, technical and organizational security safeguards and contractual commitments (e g.,

, Ser -vice Level Agreements, Binding Corporate Rules According to European law, the user who processes PID in the cloud or else

-where remains responsible for the compliance with the aforementioned principles of data privacy. Outsourcing data processing does not absolve the user from his

responsibilities and liabilities concerning the data. This means that the user must be able to control

and comprehend what happens to the data in the cloud and which security measures are deployed. Therefore, the utmost transparency

Trustworthy Clouds Underpinning the Future Internet 217 regarding the processes within the cloud is required to enable the user to carry

out his legal obligations. This might be realized technically by, e g.,, installing informative event and access logs which enable the user to retrace in detail what

happens to his data, where they are stored and who accesses them. Also, the cloud service provider could prove to have an appropriate level of security mea

-surements by undergoing acknowledged auditing and certiï cation processes on a regular basis. Legally, the compliance of the cloud service providers with the

European law may be ensured by a commitment to Binding Corporate Rules BCR). ) Another method is the implementation of Service Level Agreements

SLAS) into the contracts, which guarantee the adherence to the spelled out pri -vacy requirements.

These SLAS could, for example, stipulate an enforcement of privacy via contractual penalties in case of the breach of the agreement

This applies all the more in cases of cross-border cloud computing with vari -ous subcontracting cloud service providers.

practiced in the cloud computing ï eld. Cloud services commonly rely on each other, since their structures may be based consecutively upon each other.

a computing cloud may use the services of a storage cloud. Unlike local data centers residing in a single country,

such cloud infrastructures often extend over multiple legislation and countries. Therefore, the question of applicable law and

safeguarding the user†s responsibilities regarding data privacy in cross-border cloud scenarios is a matter of consequences for the use of these cloud services

So to avoid unwanted disclosure of data, suï cient protection mechanisms need to be established. These may also extend to the level of technical solutions

such as encryption, data minimization or enforcement of processing according to predeï ned policies 4 Open Research Challenges

the foundation for cloud computing. Nevertheless, due to its global scale and the need for full automation, there are still open research challenges that need

Furthermore, data generated by systems need to be assigned to one or more customers to enable access to critical data such as logs and monitoring data

A particularly hard challenge will be to reduce the amount of covert and side channels. Today, such channels are frozen often in hardware

and thus cannot easily be reduced 218 R. Glott et al Insider Attacks. The second area of research are practical and cost-eï cient

Today, regulations often mandate that data needs to be processed in a particular country. This does not align well with today†s cloud architectures

Trustworthy Clouds Underpinning the Future Internet 219 5 Outlook †The Path Ahead Cloud computing is not new †it constitutes a new outsourcing delivery model

that aims to be closer to the vision of true utility computing. As such, it can rely

on security and privacy mechanisms that were developed for service-oriented ar -chitectures and outsourcing. Unlike outsourcing, clouds are deployed on a global

scale where many customers share one cloud and multiple clouds are networked and layered on top of each other.

and data integrity through authen -tication. However, we expect that they will then move on to the harder problems

of the 2010 IEEE 30th International Conference on Distributed computing Systems Workshops, WASHINGTON DC, USA. ICDCSW †10, pp. 77†81.

IEEE Computer Society Press, Los Alamitos (2010), doi: 10.1109/ICDCSW. 2010.39 4. Cabuk, S.,Dalton, C i.,Eriksson, K.,Kuhlmann, D.,Ramasamy, H. V.,Ramunno

enforcement in multi-tenant virtual data centers. J. Comput. Secur. 18, 89†121 2010 220 R. Glott et al

//www. symantec. com/connect/blogs/w32stuxnet-dossier 6. Chow, R.,Golle, P.,Jakobsson, M.,Shi, E.,Staddon, J.,Masuoka, R.,Molina

Controlling data in the cloud: outsourcing computation without outsourcing control. In: ACM Workshop on Cloud computing Security (CCSW€ 09), pp. 85†90

ACM Press, New york (2009 7. Cloud Security Alliance (CSA: Top threats to cloud computing, ver -sion 1. 0. March 2010), http://www. cloudsecurityalliance. org/topthreats

/csathreats. v1. 0. pdf 8. Computer and Communication Industry Association (CCIA: Cloud comput -ing (2009), http://www. ccianet. org/CCIA/files/cclibraryfiles/Filename

/000000000151/Cloud computing. pdf 9. Gentry, C.:Fully homomorphic encryption using ideal lattices. In: Pro -ceedings of the 41st annual ACM symposium on Theory of computing

Bethesda, MD, USA. STOC †09, pp. 169†178. ACM Press, New york (2009 doi: 10.1145/1536414.1536440

10. Grobauer, B.,Schreck, T.:Towards incident handling in the cloud: challenges and approaches. In:

Proceedings of the 2010 ACM workshop on Cloud computing se -curity workshop, Chicago, Illinois, USA. CCSW †10, pp. 77†86.

ACM Press, New York (2010), doi: 10.1145/1866835.1866850 11. Guerraoui, R.,Yabandeh, M.:Independent faults in the cloud.

In: Proceedings of the 4th International Workshop on Large scale Distributed systems and Middle -ware, Zuâ rich, Switzerland.

LADIS †10, pp. 12†17. ACM Press, New york (2010 doi: 10.1145/1859184.1859188 12. International organization for Standardization (ISO:

ISO27001: Information se -curity management system (ISMS) standard (Oct 2005), http://www. 27000. org /iso-27001. htm

& service brokers (2010), http://www. processor. com/editorial/article. asp article=articles%2fp3203%2f39p03%2f39p03. asp

Why not cloudsourcing for enterprise app user adoption/train -ing?( (2009), http://velocitymg. com/explorations/why-not-cloudsourcing

-for-enterprise-app-user-adoptiontraining /16. Organization for Economic Co-Operation and Development (OECD: Guidelines

on the protection of privacy and transborder ï ows of personal data. From http //www. oecd. org/document/18/0, 2340, en 2649 34255 1815186 1 1 1 1, 00. html

last modiï ed January 5 1999), the OECD Privacy Principles 17. Penn, J.:Security and the cloud:

-ings of the 16th ACM conference on Computer and communications security Chicago, Illinois, USA. CCS †09, pp. 199†212.

Trustworthy Clouds Underpinning the Future Internet 221 20. Sadeghi, A r.,Schneider, T.,Winandy, M.:Token-Based Cloud computing Se

-cure Outsourcing of Data and Arbitrary Computations with Lower Latency. In Acquisti, A.,Smith, S.,Sadeghi, A r. eds.

Proceedings of the 3rd international conference on Trust and trustworthy computing, Berlin, Germany, June 21-23

2010. LNCS, vol. 6101, pp. 417†429. Springer, Heidelberg (2010 21. Santos, N.,Gummadi, K. P.,Rodrigues, R.:

Towards trusted cloud computing. In Proceedings of the 2009 conference on Hot topics in cloud computing. pp. 3†3

Hotcloud†09, USENIX Association, Berkeley, CA, USA (2009), http://portal acm. org/citation. cfm? id=1855533.1855536

On the Impossibility of Cryptography Alone for Privacy -Preserving Cloud computing. IACR eprint 305 (2010 24.

Vukolicâ',M.:The byzantine empire in the intercloud. SIGACT News 41, 105†111 2010), doi: 10.1145/1855118.1855137

Cloud computing and security. Lecture Univ. Stuttgart (November 2009 26. Weichert, T.:Cloud computing und Datenschutz (2009

http://www. datenschutzzentrum. de/cloud-computing /Data Usage Control in the future Internet Cloud Michele Bezzi and Slim Trabelsi

SAP Labs 06253, Mougins, France Abstract. The increasing collection of private information from indi -viduals is becoming a very sensitive issue for citizens, organizations, and

collected data, but generally not providing a real eï cient solution. Tech -nical solutions are missing to help

and support the legislator, the data owners and the data collectors to verify the compliance of the data usage

conditions with the regulations. Recent studies address these issues by proposing a policy-based framework to express data handling conditions

and enforce the restrictions and obligations related to the data usage. In this paper, we ï rst review recent research ï ndings in this area, outlin

-ing the current challenges. In the second part of the paper, we propose a new perspective on how the users can control

and visualize the use of their data stored in a remote server or in the cloud.

We introduce a trusted event handler and a trusted obligation engine, which monitors and informs the user on the compliance with a previously agreed privacy

policy Keywords: Privacy, Usage control, Privacy Policy 1 Introduction The vision of the Future Internet heralds a new environment where users, services

and devices transparently and seamlessly exchange and combine information giving rise to new capabilities. In order for it to materialize,

this vision needs a mix of adaptation of existing technologies and business models, such as ï exible

In the cloud users and businesses can buy computing resources (e g.,, servers services, applications) provided by the cloud,

that are provisioned rapidly with a minimal management eï €ort and pay-peruse. In the cloud, data may ï ow around

the world, ignoring borders, across multiple services, all in total transparency for the user However, this ideal cloud world raises concerns about privacy for individu

-als, organizations, and society in general. In fact, when data cross borders, they have to comply with privacy laws in every jurisdiction,

and every jurisdiction has its own data protection laws. In addition, the risk, for personal data to travel

across boundaries and business domains, is that the usage conditions agreed J. Domingue et al. Eds.):

) Future Internet Assembly, LNCS 6656, pp. 223†231,2011 câ The Author (s). This article is published with open access at Springerlink. com

224 M. Bezzi and S. Trabelsi upon collection are lost, and, as a consequence, users cannot control their per

-sonal information any more, as well as, honest businesses may lose conï dence in handling data, when usage conditions are uncertain

To face these challenges, the concept of sticky policy has been introduced 5 Personal information is associated with a machine-readable policy (sticky policy

-pressing that the data should be used for speciï c purposes only, or the retention period should not exceed 6 months,

the user when data are transfered to a third party. The sticky policy is prop -agated with the information throughout its lifetime, and data processors along

the supply chain of the cloud have to handle the data in accordance with their

as setting and comparing user preferences with server privacy policies, ex -pressing conditions on complex secondary usage cases, specifying obligations

†Providing the data owner with a user friendly way to express their prefer -ences, as well as to verify the privacy policy the data are collected with

†Develop mechanisms to enforce these sticky policies in ways that can be veriï ed and audited

which combines access and data handling policies; we then describe the corresponding policy engine, enabling the deploy

particular, the current framework lacks mechanisms to provide the data owner with the guarantee that policy and obligations are enforced actually.

In many web applications, users are asked to provide various kinds of personal in -formation, starting from basic contact information (addresses, telephone, email

to more complex data such as preferences, friends†list, photos. Service providers Data Usage Control in the future Internet Cloud 225

Fig. 1. PPL high level architecture describe how the users†data are handled using privacy policy,

which is, more or less explicitly, presented to users during the data collection phase. Privacy

policies are composed typically of a long text written in legal terms that are rarely fully understood,

or even read, by the users. As a result, most of the users creating accounts on web 2. 0 applications are not aware of the conditions under

which their data are handled Therefore, there is need to support the user in this process, providing an

as-automatic-as-possible means to handle privacy policies. In this context, the European FP7 project Primelife1 developed a novel privacy policy framework

able to express and automatically process privacy policies in web interactions This approach enables applications, like web browsers,

to automate the inter -pretation of the content of a privacy policy and to compare the service privacy

policy with user privacy preferences The Primelife project introduced the Primelife Policy Language (PPL, herein

10,4, which allows to describe in an XML machine-readable format the condi -tions of access and usage of the data.

A PPL policy can be used by a service provider to describe his privacy policies (how the data collected will be treated

and with whom they will be shared), or by a user to specify his preferences about the use of his data (who can use it

and how it should be treated). Before disclos -ing his personal information, the user can automatically match his preferences

with the privacy policy of the website and the result of the matching generates an agreed policy,

which is bound to the data (sticky policy) and travels with them. In fact, this sticky policy will be sent to the server

and follow the data in all their lifecycle to specify the usage conditions The PPL sticky policy deï nes the following conditions

1 www. primelife. eu 226 M. Bezzi and S. Trabelsi †Access control: PPL inherits from the XACML 8 language the access control

capabilities that express how access to which resource under which condition can be achieved †Data Handling:

the data handling part of the language deï nes two condi -tions •Purpose: expressing the purpose of usage of the data.

Purpose can be for example marketing, research, payment, delivery, etc •Downstream usage: supporting a multilevel nested policy describing the

data handling conditions that are applicable for any third party collect -ing the data from the server.

This nested policy is applicable when a server storing personal data decides to share the data with a third party

†Obligations: Obligations in sticky policies specify the actions that should be carried out after collecting

or storing a data. For example, notiï cation to the user whenever his data are shared with a third party,

or deleting the credit card number after the payment transaction is ï nished, etc Introducing PPL policies requires the design of a new framework for the process

-ing of such privacy rules. In particular, it is important to stress that during the lifecyle of personal data, the same actor may play the role of both data collector

and data provider. For this reason, Primelife proposed the PPL engine based on a symmetric architecture, where any data collector can become a data provider

if a third party requests some data (see Figure 1). According to the role played by an entity (data provider or data collector) the engine behaves diï €erently by

invoking the appropriate modules In more detail, on the data provider side (user) the modules invoked are

†The access control engine: it checks if there is any access restriction for the data before sending it to any server.

For example, we can deï ne black or white lists for websites with whom we do not want to exchange our personal

information †Policy matching engine: after verifying that a data collector is in the white

list, a data provider recovers the server†s privacy policy in order to compare it to its preferences and verify

whether they are compatible in terms of data handling and obligation conditions. The result of this matching may be

displayed through a graphical interface, where a user can clearly understand how the information is handled

if he accepts to continue the transaction with the data collector. The result of the matching conditions,

as agreed by the user, is transformed into a sticky policy On the data collector side, after recovering the personal information with its

sticky policy the invoked modules are †Event handler: it monitors all the events related to the usage of the collected

data. These event notiï cations are handled by the obligation engine in order to check if there is any trigger that is related to an event.

For example, if a sticky policy provides for the logging of any information related to the usage

of a data, the event handler will notify the obligation engine whenever an Data Usage Control in the future Internet Cloud 227

access (read, write, modiï cation, deletion etc.)to data is detected in order to keep track of this access

†Obligation engine: it triggers all the obligations required by the sticky policy If a third party requests some data from the server,

the latter becomes a data provider and acts as a user-side engine invoking access control and matching

modules, and the third party plays the role of data collector invoking the obli -gation engine and the event handler

3 Open Challenges Although the PPL framework represents an important advancement in fulï lling many privacy requirements of the cloud scenario, there are still some issues

which are addressed not by the PPL framework Firstly, in the current PPL framework, the data owner has no guarantee of

actual enforcement of the data handling policies and obligations. Indeed, the data collector may implement the PPL framework,

thus having the technical capacity of processing the data according to the attached policies, but it could

always tamper with this system, which controls, or simply access directly the data without using the PPL engine.

In practice, the data owner should trust the data collector to behave honestly A second problem relates to the scalability of the sticky policy approach

Clearly, the policy processing adds a relevant computational overhead. Its appli -cability to realistic scenarios, where large amounts of data have to be transmitted

and processed, has to be investigated A last issue relates to the privacy business model. The main question is:

What should motivate the data collectors/processors to implement such technology Actually, in many cases, their business model relies on the as-less-restricted-as

-possible use of private data. On the user side, a related question is, are the data

owners ready to pay for privacy 9? Both questions are diï cult to address, es -pecially when dealing with such a loosely deï ned concept as privacy.

Although studies exist (see 11,3, and references therein), mainly in the context of the web

2. 0, we should notice that the advent of cloud changes the business relevance of

privacy. In fact, in a typical web 2. 0 application the user is disclosing his own

data, balancing the value of his personal data with the services obtained. As a matter of fact, users have diï culties to monetize the value of their personal

information, and they tend to disclose their data quite easily. In the cloud world organizations store the data they have collected (under speciï c restrictions) with

the cloud provider. These data have a clear business value, and typically com -panies can evaluate the amount of money they are risking

if such data are lost or made public. For these reasons, it is likely that they are ready to pay for a

stronger privacy protection All these issues need further research work to be addressed. In the next section, we present our initial thoughts on how we may extend the Primelife

framework to address the ï rst problem we mentioned above, i e.,, how to provide a secure enforcement for privacy policy

228 M. Bezzi and S. Trabelsi Fig. 2. The key elements of the extension of the PPL framework to guarantee the

enforcement of privacy policy 4 Towards Privacy Policy Enforcement in the Cloud In the current PPL framework, there is no guarantee of enforcement of the data

handling policies and obligations. In other words, we suppose that the server enforces correctly the sticky policies,

but, actually, nothing prevents him from creating a back door in his database in order to get unauthorized access to the

collected information For this reason, we propose in the rest of the paper a secure architecture

for the enforcement of the sticky policies and facilitating the task of external auditors to verify the compliance with the privacy requirements, as well as giving

the user control on the released data. The main idea is to introduce tamper -proof 6 obligation engine and event handler, certiï ed by a trusted third party

which mediate the communication and the handling of private data in the cloud platform. The schedule of the events,

as well as the logs of these components can also be accessed (partly by the users to monitor the handling of their personal

information. Lastly, the trusted-third party can ensure the auditing of the whole system Let us sketch how our proposal can work in a simple cloud scenario.

Let us consider a cloud platform provider, which hosts one or more services/applications provided by external parties that deal with personal data (e g.,

, a human resource management application, a remote storage service. Say, these services handle personal data using a PPL framework (as described in Sect. 2). In order to

guarantee enforcement of the privacy policies and corresponding obligations by the service, we replace the service provider obligation engine and event handler

Data Usage Control in the future Internet Cloud 229 with a tamper-proof event handler and a tamper-proof obligation engine certiï ed

by a trusted third party (e g.,, governmental oï ce), see Fig. 2. For instance, the cloud provider may provide these certiï ed components as premium service

In fact, trust is an essential part of the cloud paradigm. If the data owner has the guarantee from a trusted authority (governmental oï ce, EU commission

etc.)) that the application hosted in the cloud is compliant with his privacy requirements, he will tend to transfer his data to the certiï ed host.

In order to certify the compliance of an application, the trusted authority has, ï rst, to

certify the secure privacy components in charge of enforcing sticky policies, then to perform audits to check

if the stored data are handled correctly The diï culty comes for the access to the database by the service provider

One solution would be to use a speciï c tamper-proof database, but this can be

technically complex, and impact the business eï ciency of the service provider A possible solution is to specify an API to access the database that is compatible

with the event handler. This API should be deï ned as a standard interface to

communicate with the event handler and access to the database. The service has to exclusively use an interface compatible with the standardized API, and this

Fig. 3. A sketch of data track administration console The particularity of this API is that all the methods to access the data can be

detected by the event handler. For example, if the service adds a new element data and sticky policy) this action should be detected,

managed and logged by the event handler. If there is any method (like table dump) to access the

database that cannot be recognized by the event handler, the service will not be certiï ed by the trusted authority

-sibility of providing a monitoring console. The monitoring can be accessible by any data owner, who, once authenticated, can list all the data (or set of data

with their related events and pending or enforced obligations. The data owner can at any time control how his data are handled, under

which conditions the information is accessed, and compare them with the corresponding stored sticky policy. Fig. 3 shows a very simple example of how the remote administrative

console could be structured, this monitoring console could of course be more complex. The remote monitoring console adds more transparency and more con

-trol to the data hosted within the cloud. It also allows the user to detect any

improper usage of his data, and, in this case, notify the host or the trusted authority

230 M. Bezzi and S. Trabelsi The advantages of the proposed solution are twofold. First, from the data

owner perspective, there is a guarantee that actual enforcement has taken place and that he can monitor the status of his data and corresponding policies.

Second from the auditors†point of view, it limits the perimeter of their analysis, since the conï dence zone provided by the tamper proof elements and the standardized API

facilitate the distinction between authorized and non authorized actions 5 Conclusions Cloud computing and the SOA paradigm are fundamental building blocks for the

Future Internet, enabling the seamless combination of services across platforms geographies, businesses and transparently from the user point of view.

However these new capabilities may entail privacy risks. From the user perspective, the risk is that of losing control of his personal information once they are released in

the cloud. In particular, when personal data are consumed by multiple services possibly owned by diï €erent entities in diï €erent locations, the conditions of the

data usage, agreed upon collection, may be lost in the lifecycle of the personal data. From the data consumer point of view, businesses and organizations seek to

ensure compliance with the plethora of data protection regulations, and minimize the risk of violating the agreed privacy policy

The concept of sticky policy may be used to address some of the privacy requirements of the cloud scenario.

In this paper we reviewed the recently in -troduced PPL framework, which provides a ï exible language to express privacy

policy as well as the necessary mechanisms to process and compare sticky poli -cies. The current PPL framework presents some limitations;

it notably requires a high level of trust in the data collector/processor. We presented some initial

thoughts about how this problem can be mitigated through the usage of a tam -per proof implementation of the architecture.

authorization language (EPAL 1. 1). IBM Research Report (2003 Data Usage Control in the future Internet Cloud 231

3. Bonneau, J.,Preibusch, S.:The privacy jungle: on the market for data protection in social networks.

In: Moore, T.,Pym, D.,Ioannidis, C. eds. Economics of In -formation Security and Privacy, pp. 121†167.

Springer, New york (2010 4. Bussard, L.,Neven, G.,Preiss, F. S.:Downstream usage control. In:

-national Workshop on Policies for Distributed systems and Networks, pp. 22†29 2010 5. Karjoth, G.,Schunter, M.,Waidner, M.:

Privacy-enabled management of customer data. In: Dingledine, R.,Syverson, P. F eds.)) PET 2002.

Trust and tamper-proof software delivery. In: Proceed -ings of the 2006 international workshop on Software engineering for secure sys

-tems. SESS †06, New york, NY, USA, pp. 51†58. ACM Press, New york (2006 doi:

extensible access control markup language (xacml) version 3. 0, ex -tensible access control markup language (xacml) version 3. 0, oasis (August 2008

9. Shostack, A.,Syverson, P.:What price privacy? In: Camp, L.,Lewis, S. eds Economics of Information security, Advances in Information security, vol. 12, pp

W3c Workshop on Privacy and data usage control p. 5 october 2010), http://www. w3. org/2010/policy-ws

Future Internet Foundations Experiments and Experimental Design Part IV: Future Internet Foundations: Experiments and Experimental Design 235

Introduction Research into new paradigms and the comprehensive test facilities upon which the ideas are experimented upon together build a key resource for driving European re

It provides a core infrastructure, and also a playground for future discoveries and innovations, combin

The heterogeneous and modular field of Future Internet Research and Experimen -tation with its national and international stakeholder groups requires community and

Adaptive Admission Control and Resource Allocation Algorithms on the Federated Environment of Panlab†reports on experiments needing to directly interact with the

-strates the practical usefulness of federation and virtualisation in heterogeneous testbeds These multipath routing slice experiments were performed over multiple federated

â€oetesting End-to-end Self management in a Wireless Future Internet Environment†reports on the network management protocol test that exploited the availability of dif

) Future Internet Assembly, LNCS 6656, pp. 237†245,2011  The Author (s). This article is published with open access at Springerlink. com

Resource Allocation Algorithms on the Federated Environment of Panlab Christos Tranoris, Pierpaolo Giacomin, and Spyros Denazis

Electrical and Computer engineering department, University of Patras Rio, Patras 26500, Greece tranoris@ece. upatras. gr, yrz@anche. no, sdena@upatras. gr

Panlab is a Future Internet initiative which integrates distributed fa -cilities in a federated manner.

where an adaptive resource allocation algorithm was tested utilizing Panlab†s infrastructure. Implementation details are given in terms of building a RUBIS

called Federation Computing Interface (FCI) API which enables applications to access resources during an experiment

Panlab, experimental testing, resource federation, Future Internet 1 Introduction Future Internet research results in new experimental infrastructures for supporting

approaches that exploit extend or redesign current Internet architecture and protocols The Pan-European laboratory 1, Panlab, is a FIRE 2 initiative and builds on a fed

-eration of interconnected and distributed facilities allowing third parties to access a wide variety of resources like platforms, networks,

Architecture Elements to be used for experimentation in the future Internet The Panlab infrastructure manages interconnections of different geographically

A Web portal is available where customers and providers can access ser -vices, a visual Creation Environment which is called â€oevirtual Customer Testbed

Resource Adapter (a concept similar to device drivers) wraps a domain†s resource API in order to create a homogeneous API defined by Panlab.

moving a designed algorithm from a simulating environment to near production best -effort environment and ii) to exploit the framework in such a way that will allow the

by means of Federation Computing Interface API to managed resource. We finally conclude this paper

-rithm, it is necessary to set up an appropriate testbed of a distributed web application like RUBIS benchmark 3, an auction site prototype modeled after ebay. com. It

provides a virtualized distributed application that consists of three components, a web server, an application server, a database and a workload generator, which produces

the appropriate requests. Furthermore it can be deployed in a virtualized environment using Xen server technology,

which allows regulating system resources such as CPU usage and memory, and provides also a monitoring tool, Ganglia, that measures net

-work metrics, such as round trip time and other statistics, and resource usage in vir -tual machines

Fig. 1. The setup for testing the algorithm The adaptive admission control and resource allocation algorithm is applied to suc

-ceed in specific target of network metrics, like round trip time and throughput. This will be done by deploying a proxy-like control component for admission control and

using Xen server technology to regulate CPU usage. During this scenario the adaptive admission control and resource allocation algorithm is tested against network metrics

like round trip time and throughput. RUBIS clients will produce requests so that push RUBIS components to their limits,

so that resource like CPU usage and network throughput get high values During the setup, the researcher wants to test http proxy software written in C pro

-gramming language that implements an admission algorithm. Figure 1 displays the 240 C. Tranoris, P. Giacomin, and S. Denazis

setup for the discussed scenario. The setup consists of 3 work load http traffic genera

-tors, making requests through a hosting unit. The algorithm, which is located at the proxy unit, needs to monitor the CPU usage of the Web application and Database

machines. Then the algorithm should be able to set new CPU capacity limits on both

resources. Additionally the algorithm should be able to start and stop the work load generators on demand

3 Technical Environment, Testbed Implementation and Deployment From the requirements of the use case, it is evident that it would benefit from a test

-bed offering RUBIS resources. Moreover, the experiment needs to manage and moni -tor resources within the C algorithm.

So the resources need to provide monitoring and provisioning mechanisms To support such an experiment and similar ones, a required infrastructure needed

to be built. The equipment used is as follows â € Linux machines for the RUBIS based work load generators

â € A Linux machine for the hosting the algorithm unit, capable of compiling C and

Java software â € Linux machines for running XEN server where on top will run the RUBIS Web

app and database The final user needs to provide the algorithm under test. He will just login to the

Proxy Unit, compile the software and execute it. The user will not have access to the

RUBIS resources (i e. cannot login) so there is a need to encapsulate the monitoring and provisioning capabilities.

For this requirement and to make available the RUBIS resources for future testing within the Panlab federation, the so called Resource

Adapters (RA) where built For each resource there is a corresponding RA which exposes configuration pa

-rameters to the end user. As displayed in Figure 2, all the components are based on Virtual machines managed by a XEN server.

The implemented RAS instantiate all these Virtual machines and configure the internal components according to end-user needs.

The work load generator exposes parameters such as: used IP for the testbed memory, hard disk size, number of clients, ramp up time for the requests and a pa

-rameter used during the execution of the experiment called Action which accepts the values start and stop.

The Proxy Unit exposes parameters such as used IP for the test -bed, memory, hard disk size, username,

password and IP to connect to the RUBIS application resource. The RUBIS application and the RUBIS database have similar

parameters to the above and additionally a MON CPU UTILIZATION parameter which is used to monitor the resource

cpu capacity of the resource A Use-Case on Testing Adaptive Admission Control 241 Fig. 2. The Resource adapters of the available testbed resources

Java or other target language. RADL is useful in cases when there is a need to config

The user can configure the re -source through some Configuration Parameters. The RA â€oewraps†the parameters and

displays the RADL definition for the RUBIS application server The Configuration Parameters section describes the exposed parameters to the end

user. The Binding Parameters are used for internal purposes of the local testbed con -figuration. The On Update section describes what the rubis app RA does when it

Figure 4 displays the use case setup as can be done inside the VCT tool of Panlab.

rubis database. Interconnections where made also between these components in order to assign reference values to all resources.

know about the IP of the proxy which hosts the algorithm. The proxy needs to know

the IP of the RUBIS application which also needs a reference to the RUBIS database 4 Running and Operating the Experiment

The scenario during the experiment utilizes the Federation Computing Interface (FCI API that Panlab provides 5. Federation Computing Interface (FCI) is an API for

accessing resources of the federation. It is an SDK for developing applications that access VCT requested resources through the Panlab office services during operation

This allows the User -Application/SUT to access the testbed resources during execution of the experiment

Fig. 5. Designing the algorithm to operate resources during execution In our testing scenario there is a need to configure resources

status data properly after the VCT is provisioned and while the testing is in progress Figure 5 displays this condition where the System Under Test (SUT) is our algorithm

FCI automatically creates all the necessary code that the end user can then inject in -side the algorithm†s code.

The end-user needs just to ender his credentials in order 244 C. Tranoris, P. Giacomin, and S. Denazis

code listing in Java //an example Java federation program public class Main {public static void main (String args

{//An example for VCT: academic07 academic07 myvct=new academic07 myvct. getuop rubis cl 91(.setramp up time("55000 "myvct. getuop rubis cl 91(.

Assuming that we have given the name academic07 for our VCT definition, the java listing displays how we can access the resources of this VCT.

FCI creates a java class called academic07()that we can instantiate in order to get access to the resources

Additionally, for each resource that participates in the VCT java classes are able to provide access.

For example the command myvct. getuop rubis cl 91(.set -ACTION("start";"starts the RUBIS client of the rubis cl 91 resource.

back the CPU usage of the database resource 5 Conclusions The results of running an experiment in Panlab are encouraging in terms of moving

the designed algorithms from simulating environments to near production environ -ments. What is really attractive is that such algorithms can be tested in a best-effort

environment with real connectivity issues that cannot be performed easily in simula -tion environments. The presented use case example demonstrated the usage of exist

similar approaches are really encouraging in terms of moving the designed algorithms from simulating environments to near production environments.

What is really attractive is that such algorithms can be tested in a best-effort environ

The scenario presented can be scaled easily up with many clients and web applications. Also, the proxy under test can be replaced by one or more load balancers

1. Website of Panlab and PII European projects, supported by the European commission in its both framework programmes FP6 (2001-2006) and FP7 (2007-2013:

2. European commission, FIRE website: Last cited: November 21, 2010, http://cordis europa. eu/fp7/ict/fire

5. Federation Computing Interface (FCI), http://trac. panlab. net/trac/wiki/FCI Multipath Routing Slice Experiments in

1 FOKUS-Fraunhofer Institute for Open Communication systems, Berlin, Germany tanja. zseby carsten. schmoll@fokus. fraunhofer. de

2 University of Wuerzburg, Institute of Computer science, Wuerzburg, Germany thomas. zinner christian. schwartz phuoc. trangia@informatik. uni-wuerzburg. de

The Internet today consist of many heterogeneous infras -tructures, owned and maintained by separate and potentially competing

-verse demands, are likely to stay or even increase in the Internet of the future.

In such an environment federation and virtualization of resources are key features that should be supported in a future Internet.

The ability to form slices across domains that meet application speciï c requirements enables many of the desired features in future networks

example use case for the future Internet itself because we assume that the Internet will consist of multiple diï €erent infrastructures that have to be

combined in application speciï c overlays or routing slices, very much like the experimental facilities we used in this experiment.

instrumentation of the future Internet. The tools used in our experiment can provide a starting point for this

) Future Internet Assembly, LNCS 6656, pp. 247†258,2011 câ The Author (s). This article is published with open access at Springerlink. com

Network Virtualization (NV) techniques 5, 17 allow the establishment of such separate slices on top of a joint physical infrastructure (substrate.

networks (e g. for banking, gaming, web) with their own virtual topology, nam -ing, routing and resource management on top of a shared physical infrastructure

to a single application and that implement a general data transport service are designated as routing slices 13.

known as Transport Virtualization (TV) 23,24. These concepts have roots in the work on active networks, where the control plane of a router enabled applica

-tions ï ne-grained control of their own routing 6, 11 and sharing of the resources at the routers using either constant or ad hoc slices 16

Slices, and routing slices in particular, are made up of shared resources that can be contributed by diï €erent administrative authorities.

of fractions of (virtual) links and (virtual) routers Due to the ï ne grained granularity of networking resources,

they permit data transport resource to be accessed without knowledge of their physical or network location

testbeds as well as in the real Internet. Measurement functions can help to sup -port this. Inter-domain SLA validation would proï t from common data formats

and data exchange among providers (e g. 8). Intrusion detection systems can increase situation awareness (and with this overall security) by sharing infor

-mation. Nevertheless, the operators of the testbeds we considered in our setup are willing to cooperate.

to the high costs of such hardware. In short, as network scientists, we need larger testbeds in order to supplement theoretical analysis and validate theoretical re

typically customized to particular user groups and oï €er diï €erent capabilities and interfaces. The federation of them still requires research on how these facilities

-tion 7 provides a brief summary and outlook to the enhancements of federated facilities 2 Experiment Objectives and Requirements for a

reservation and installation of arbitrary software but is distributed only within Germany, has limited a access, and currently provides no federation method

Booking of Resources With the SFA software it was possible to book nodes in Planetlab, Planetlab Europe and in the VINI Testbed.

a website dedicated to information about Free Tools for Future Internet Research and Experimentation. The Ad

-vanced Network Monitoring Equipment (ANME) deployed by the Onelab project within Planetlab Europe includes precise network cards for active

arbitrary software on the G-Lab nodes. We assume that such features are of interest for many experimenters,

experiments that require real Internet conditions with regard to scale, delay values, and geographical distribution of nodes

Free T-REX 2 provides a platform for testbed users, testbed op -erators and developers to oï €er their measurement results and software tools to

the public and to share their experience. Further, free T-Rex seeks to employ standardized instruments to improve the comparability and openness of scientiï c

results in the ï eld of future Internet research. The platform gives an overview of available tools in future Internet experimental facilities and, based on user

feedback, the tools†feasibility for experiment requirements can be assessed. An -other objective is to create links to relevant groups and support standardization

and tool database and measurement services, the employed packet tracking ser -vice 18, Tophat 9,

-ties can contribute to an improved design of future, federated Internet archi -tectures. We described how federated transmission resources can be exploited

1. FIRE-Future Internet Research & Experimentation (2010), Information available at http://ict-fire. eu

Free Tools for Future Internet Tools and Experimentation (2010 Information available at http://www. free-t-rex. net

/3. Onelab-Future Internet Testbeds (2010), Information available at http://onelab eu /4. VINI-A Virtual Network Infrastructure (2010), Information available at http

Overcoming the internet im -passe through virtualization. IEEE Computer, 34†41 (April 2005 6. Anerousis, N.,Hjlmtysson, G.:

Service level routing on the Internet. In: IEEE GLOBECOM€ 99, vol. 1, pp. 553†559 (2002

7. Becke, M.,Dreibholz, T.,Yyengar, J.,Natarajan, P.,Tuexen, M.:Load Sharing for the Stream Control Transmission Protocol (SCTP), Internet-Draft (2010), http

//tools. ietf. org/html/draft-tuexen-tsvwg-sctp-multipath-00 8. Boschi, E.,Denazis, S.,Zseby, T.:

A measurement framework for inter-domain sla validation. Comput. Commun. 29, 703†716 (2006), doi:

10.1016/j. comcom. 2005 07.026 9. Bourgeau, T.,Augeâ',J.,Friedman, T.:Tophat: supporting experiments through

Computer networks 36 (1), 21†34 (2001 12. Mome. Cluster of European Projects aimed at Monitoring and Measurement

/sfa. pdf 16. Psounis, K.:Active Networks: Applications, Security, Safety, and Architec -tures. IEEE Communications Surveys 2 (1)( 1999), http://www. comsoc. org/pubs

/surveys/1q99issue/psounis. html 17. Scott Rixner. Network virtualization: Breaking the performance barrier. ACM Queue,(Jan./Feb. 2008

18. Santos, T.,Henke, C.,Schmoll, C.,Zseby. T.:Multi-Hop Packet Tracking for Experimental Facilities.

Let the internet measure itself. ACM SIGCOMM Computer Communication Review 35 (5), 71†74 (2005

20. Phuoc Tran-Gia. G-Lab: A Future Generation Internet Research Platform (2008 Information available at http://www. future-internet. eu

/21. Trilogy. Trilogy: Architecting the Future Internet (2010), Information available at http://www. trilogy-project. org

/22. Wischik, D.,Handley, M.,Braun, M. B.:The Resource Pooling Principle. SIG -COMM Comput.

Commun. Rev. 38, 47†52 (2008), doi: 10.1145/1452335.1452342 23. Zinner, T.,Tutschku, K.,Nakao, A.,Tran-Gia, P.:

Virtualization. In: Proc. of the 16. Kivs 2009, Kassel, Germany (Mar. 2009 24. Zinner, T.,Tutschku, K.,Nakao, A.,Tran-Gia, P.:

Transmission for Transport Virtualization: Analyzing Path Selection. In: Proceed -ings of the 22nd International Teletraï c Congress (ITC), Amsterdam, Netherlands

) Future Internet Assembly, LNCS 6656, pp. 259†270,2011  The Author (s). This article is published with open access at Springerlink. com

Testing End-to-end Self management in a Wireless Future Internet Environment Apostolos Kousaridas1, George Katsikas1, Nancy Alonistioti1, Esa Piri2

Marko Palola2, and Jussi Makinen3 1 University of Athens Athens, Greece scan. di. uoa. gr

-complishing tests and experiments for future Internet new paradigms. In this work the Panlab experimental facilities and specifically the Octopus network

-tures by using the Self-NET software for self management over a Wimax network environment. The monitoring and configuration capabilities that differ

Internet, Wimax, Quality of Service 1 Introduction Several network management frameworks have been specified during the last two

decades by various standardization bodies and forums, like IETF, 3gpp, DMTF, ITU all trying to specify interfaces,

telecom world, the Internet and cellular communications. The current challenge for the network management systems

the development of the mechanisms that will render the Future Internet network capa -ble of autonomously configuring,

router, access point), is considered potentially as an autonomic element which is capable of monitoring its network-related state

the so called closed control loop or Monitor-Decide-Execute Cycle (MDE) and con -sists of the Network Element Cognitive Manager (NECM) and the Network Domain

The testing facility connecting a fixed Wimax network to the service-aware network is shown in Fig. 1. The Wimax network environment consists of Airspan Micro

-MAX base station (BS) 7 and Airspan Prost subscriber station (SS) located on the Octopus testbed at Oulu 4. The BS and SS operate in a laboratory environment with

-sion side at Greece Distributed Internet traffic Generator (D-ITG) 8 has been used which is a software tool that generates traffic at both Uoa end machines.

This is a Java based platform that manipulates two independent entities, the first is ITGSEND process that undertakes the traffic generation

and the latter is ITGRECV process that captures the packets to the receiver. Traffic sender can concurrently generate multiple

flows with user-defined parameters that can be analyzed from the receiver to extract traffic Qos features (e g. packet loss, delay, jitter.

Testing End-to-end Self management in a Wireless Future Internet Environment 261 Fig. 1. Octopus testbed Wimax and Self-NET software federation

ITGLOG), printing and plotting specific metrics (ITGDEC, ITGPLOT) and remotely controlling the traffic generation (ITGAPI.

ICMP, DNS, Telnet, and Voip (G. 711, G. 723, G. 729, Voice Activity Detection and

The Self-NET project carries out experiments over the Wimax testbed, remotely via the Internet.

The experiment required development of an additional BS control software and deployment of IP routing

and tunneling between Octopus and Self-NET environments We implemented A BS control software (i e. NECM) to allow dynamically collect

Wimax link information from the BS and to control Quality of Service (Qos) set -tings on the fly.

The NECM changes Qos service classes by setting a new configura -tion to the BS using Simple Network Management Protocol (SNMP

real-time multimedia streaming are much stricter than that of bulk data transfer. IEEE 802. 16d 5, the employed Wimax testbed is based on,

specifies four different scheduling types, namely Unsolicited Grant Service (UGS), Real-time Polling Service rtps), Non-real-time Polling Service (nrtps),

-tolerant data transmission. However, nrtps provides assured bandwidth for the traffic flow whereas BE does guarantee nothing for the traffic flow

source and/or destination MAC address, IP ADDRESS, or port number. In our experi -ments, we used port numbers to classify the IP traffic flows.

-ing from and to the Wimax link. Two routers are dedicated on the Octopus testbed for tunneling and routing IP traffic.

The user traffic from the Self-NET experimenta -tion is tunneled by using two IP tunnels over the Internet

and rerouted over the Wi -MAX air interface at the Octopus testbed. For the test environment provisioning, the

IP tunneling (IPIP) and routing was setup at both ends, which requires two routers at

the user premises †one for sending data to the uplink and receiving the downlink

flows and one for sending to the downlink and receiving from the uplink As depicted in Fig. 3,

Wimax BS with the Uoa BS Connector (10.1.3.3 †10.1.3.1) while the second one connects the Wimax SS with the Uoa SS Connector (10.1.3.4 †10.1.3.2),

creating an internal 10.1.3.0/24 network between these network entities. The traffic sent from the Uoa BS Connector (10.1.1.1) is routed over the IPIP tunnel to the Wimax BS

Testing End-to-end Self management in a Wireless Future Internet Environment 263 Fig. 3. Network topology and IPIP tunneling

and after the Wireless transmission (DL) to the Wimax SS, the Uoa SS Connector 10.1.2.1) receives the packets via the second tunnel.

The respective procedure occurs for the UL, while the Uoa SS Connector traffic is tunneled to the Wimax SS, trans

-mitted to the Wimax BS and routed again through IPIP tunnel to the Uoa BS Con

-nector. During the traffic exchange, the public IPS€ are opaque, as the routing proce -dure explicitly uses the private addresses

Adapter Description Language (RADL) 9 was used to generate source code for each Resource Adaptor (RA), where, for example, the Wimax network elements can be

considered as available and configurable resources. We decided to use a separate RA for each IP tunneling machine, BS and SS.

-fault values are stored in each RA and the user of the VCT tool needs to input only

public IP ADDRESSES and user credentials for the two external tunneling machines in order to setup the IP tunnels and routes

monitoring data and the usage of service-level adaptation actions for efficient network adaptation The NECM of the Wimax BS constantly monitors network device statistics (e g

UL/DL used capacity, TCP/UDP parameters, service flows), which are periodically transmitted to the corresponding NDCM.

The Service-level NECM undertakes to collect service-level data. The Service-level NECM could be placed at the service provider†s side, even at premises

The decision making engine of the NDCM filters the collected monitoring data from the network and the service level

•Change the priority of 2k â â oe flows at the Wimax BS •Change the priority of 3k â â oe flows at the Wimax BS and the codec of 4k â â oe

flows Two schemes for the selection of the optimal action have been proposed and they are described below (Fig. 4 and Fig. 5

-ther to the Wimax BS NECM in order to execute the change priority action via SNMP set command

Testing End-to-end Self management in a Wireless Future Internet Environment 265 Fig. 4. Decision-making algorithm for configuration action selection †Simple

Fig. 4 presents the simple version of the decision taking scheme Firstly, the PER value is checked

change all flows from low priority to high priority service class at the WIMAX BS

that achieves higher data compression, resulting in less data rate requirements; thus reducing packet error rate value.

Fig. 5. Decision making algorithm for configuration action selection †Advanced 266 A. Kousaridas et al The above figure (Fig. 5) illustrates the advanced version of the scheme presented

•The change of the prioritization scheme at the Wimax BS side (e g.,, from low

•The change of the Voip codec between the service provider and the end user (ser

â € G. 711.1: 48 kbps â € G. 711.2: 40 kbps â € G. 729.3: 8 kbps

â € G. 729.2: 7 kbps â € G. 723.1: 5 kbps Table 1. Critical thresholds of Packet Loss sharp increment

Codec Type Threshold of Flows Number G. 711.1-(fl1. 1) 29 G. 711.2-(fl1. 2) 46

G. 729.2-(fl1. 3) 63 G. 729.3-(fl1. 4) 97 G. 723.1-(fl1. 5) 120

As it is described in Section 3, the decision making schemes that have been proposed for the selection of the appropriate action use a list of thresholds (i e.

Testing End-to-end Self management in a Wireless Future Internet Environment 267 increase rate is not linear

from low priority to high priority service class) at the Wimax BS of the 28 Voip

G. 711.1 Voip flows that traverse the Wimax BS and face high packet error rate.

the end user, selecting the G. 711.2 codec, reduces the number of the dropped packets Since the total codec change may be a simple but greedy solution, an advanced ad

Testing End-to-end Self management in a Wireless Future Internet Environment 269 Table 6. Qos features improvement after partial (70%)Voip codec change from G. 711.1 to

Different wireless links and networks have different capabilities and often service implementers and providers do not have a possibility to test their service over various

remote wireless link such as Wimax can be used remotely. However, in order to provide a wireless link as a bookable resource for a large set of customers, the estab

-lishment of the tunnels between the wireless link and the remote user of the link and a

An experimental path towards Self management for Future Internet Environments. In Tselentis, G.,Galis, A.,Gavras, A.,Krco, S.,Lotz, V.,Simperl, E.,Stiller, B. eds.

-wards the Future Internet-Emerging Trends from European Research, pp. 95†104 (2010 270 A. Kousaridas et al

3. Website of Panlab and PII European projects, supported by the European commission in its both framework programmes FP6 (2001-2006) and FP7 (2007-2013:

Air Interface for Fixed Broadband Wireless Access Systems. IEEE Std 802.16-2004 (October 2004 6. Wahle, S.,Magedanz, T.,Gavras, A.:

Towards the Future Internet-Emerging Trends from European Research, pp. 51†62. IOS Press, Amsterdam (2010

7. Airspan homepage, http://www. airspan. com 8. Distributed Internet traffic Generator http://www. grid. unina. it/software/ITG/index. php

9. Resource Adapter Description Language http://trac. panlab. net/trac/wiki/RADL Part V Future Internet Areas:

Networks Part V: Future Internet Areas: Networks 273 Introduction Although the current Internet has been extraordinarily successful as a ubiquitous and

universal means for communication and computation, there are still many unsolved problems and challenges some of which have basic aspects.

Many of these aspects could not have been foreseen when the first parts of the Internet were built, but they

do need to be addressed now. The very success of the Internet is creating obstacles to the future innovation of both the networking technology that lies at the Internet†s core

and the services that use it. In addition, the ossification of the Internet makes the in

-troduction and deployment of new network technologies and services very difficult and very costly The aspects,

which are considered to be fundamentally missing, are •Mobility of networks, services, and devices •Guaranteeing availability of services according to Service Level Agreements (SLAS

and high-level objectives •Facilities to support Quality of Service (Qos) and Service Level Agreements (SLAS

•Trust Management and Security, privacy and data protection mechanisms of dis -tributed data •An addressing scheme, where identity and location are embedded not in the same

address •Inherent network management functionality, specifically self management func -tionality •Cost considerations, whereby the overhead of management should be kept under

control since this is a critical part of life-cycle costs •Facilities for the large scale provisioning and deployment of both services and

challenges in Future Internet. It also includes a tie to a paper from the Socioeconomics

Internet Development†chapter examines perspectives from the inclusion of the autonomicity and self-manageability features in the scope of Future Internet†s (FI

Future Internet Areas: Networks management (NM), as FI should possess a considerably enhanced network manage

In the future Internet era, mechanisms for extending the coverage of the wireless access infrastructure and service provisioning to locations that cannot be served otherwise or for engineering

Cloud technology in order to achieve the challenges of Future Internet. The extent of Internet growth and usage raises critical issues associated with its design principles

that need to be addressed before it reaches its limits. Many emerging applications have increasing requirements in terms of bandwidth, Qos and manageability.

-over, applications such as Cloud computing and 3d-video streaming require optimi -zation and combined provisioning of different infrastructure resources and services

As a huge energy consumer, the Internet also needs to have energy-saving func -tions.

and secure Internet. Finally, the Future Internet needs to support sustainable business models, in order to drive innovation, competi

-tion, and research. Combining optical network technology with Cloud technology is key to addressing these challenges.

advanced networks and IT managed services integrated with the vanilla Internet will ensure a sustainable Future Internet,

which enables demanding and ubiquitous appli -cations to coexist Part V: Future Internet Areas: Networks 275

The â€oedeployment and Adoption of Future Internet Protocols†chapter from the Socioeconomics Area addresses the deployability of network protocols.

The main message of this chapter is that implementation, deployment, and adoption need to be

thought about carefully during the design of the protocol, as even the best technically designed protocol can fail to get deployed.

benefits to end users. For Congestion Exposure (Conex), a reasonable initial deploy -ment scenario is combined a CDN-ISP that offers a premium service using Conex, as

) Future Internet Assembly, LNCS 6656, pp. 277†292,2011  The Author (s). This article is published with open access at Springerlink. com

the Scope of Future Internet Development Ioannis P. Chochliouros1,,*Anastasia S. Spiliopoulou2, and Nancy Alonistioti3

Hellenic Telecommunications Organization S. A. OTE 99 Kifissias Avenue, 15124 Maroussi, Athens, Greece ichochliouros@oteresearch. gr

Hellenic Telecommunications Organization S. A. OTE 99 Kifissias Avenue, 15124 Maroussi, Athens, Greece aspiliopoul@ote. gr

Dept. of Informatics and Communications, 15784, Panepistimiopolis, Ilissia, Athens, Greece nancy@di. uoa. gr Abstract.

Autonomicity, cognitive networks, Future Internet (FI), network manageability, Network Management (NM), self-configuration, self-manage

1 Introduction †Moving Towards the Future Internet There is an extensive consensus that the Internet,

as one of the most critical infra -structures of the 21st century, can critically affect traditional regulatory theories as

as the future of the Internet comes into consideration, in parallel with the appearance and/or the development of modern

Future related facilities will â€oeattract†more users to innovative services requiring greater mobility and bandwidth, higher speeds and

scalable and easily manageable Internet architecture. If well deployed, the Internet of the future can bring novelty, productivity gains, new markets and growth

In fact, innovative functionalities with more enhanced performance levels are nec -essary to sustain the real-time requirements of a multitude of novel applications.

-thermore, the Internet underpins the whole global economy. The diversity and sheer number of applications and business models supported by the Internet have also

largely affected its nature and structure (3, 4 The Future Internet (FI) will not be â€oemore of the sameâ€, but rather â€oeappropriate

entities†incorporating new technologies on a large scale that can unleash novel classes of applications and related business models 5. If today†s Internet is a crucial

element of our economy, FI will play an even more vital role in every conceivable business process.

defining and implementing a new architecture for the Internet intended to overcome existing limitations mostly in the area of networking (6, 7). The complexity of the

and Internet services 8. The European union (EU) is actually a potential leader in the FI sector 9. Leveraging FI technologies through their use in â€oesmart infrastruc

data protection with transparent and democratic governance and control of offered services as guiding principles (10,11

The face of the Internet is continually changing, as new services appear and become globally noteworthy,

The current Internet has been founded on a basic archi -tectural premise, that is: a simple network service can be used as a â€oeuniversal meansâ€

Enhanced Network Self-Manageability in the Scope of Future Internet Development 279 to interconnect intelligent end systems 13.

end-points, thus allowing Internet to reach an impressive scale in terms of inter -connected devices. However, while the scale has reached not yet its limits, the growth

belief that current Internet is reaching both its architectural capability and its capacity limits (i e.:

providing a natural complement to the virtualization of resources -by setting up and tearing down composed services, based on negotiated SLAS.

of the current network typically resides in client stations and servers, which interact with network elements (NES) via protocols such as SNMP (Simple Network Man

underlying hardware and software resources comprise management issues highly challenging, meaning that currently, a diversity in terms of hardware resources leads

to a diversity of management tools (distinguished per vendor. In addition, security risks currently present in network environments request for immediate attention.

Enhanced Network Self-Manageability in the Scope of Future Internet Development 281 objectives of minimizing system life-cycle costs and energy footprints;(

Furthermore, new wireless sensor network technologies pro -vide options for inclusion of additional intelligence and the capability, for the network

Internet, providing an accurate reflection of the real world, delivering fine-grained information and enabling almost real-time interaction between the virtual world and

real world. In particular, autonomous self-organizing systems are beginning to emerge and to be established widely 17.

Internet model is based on clear separation of concerns between protocol layers, with intelligence moved to the edges,

and with the existent protocol pool targeting user and control plane operations with less emphasis on management tasks 18.

without neglecting the advantages of current Internet. Among the core drivers for the FI are increased reliability, enhanced services, more flexibility, and simplified opera

-tion. The latter calls for including Network Management (NM) issues into the design process for FI principles.

support interoperability between heterogeneous, complex and distributed systems while it should remain open for further and continuous improvement without the

Enhanced Network Self-Manageability in the Scope of Future Internet Development 283 robustness. Self-NET principle design is based on high autonomy of NES in order to

that characterizes the daily operation of FI users 21. Among the main Self-NET€ s

allowing an ever-evolving Internet. Towards realizing this aim, Self-NET considers that a DC-SNM along with a hierarchical distribution over

Enhanced Network Self-Manageability in the Scope of Future Internet Development 285 3 Challenges and Benefits for the Market Sector

benefits for all relevant â€oeactors†(i e. for both operators and users), as follows Automatic network planning and reduction of management time of complex net

-ers the desired services to its users. In many cases, the network operator is obliged to

search through vast amounts of monitoring data to find any â€oeinconveniences†to his network behaviour and to ensure a proper services†delivery.

Traffic management configuration of large wireless networks consist -ing of multiple, distributed NES of varying technologies, is challenging, time

high quality, on a real-time basis. Self management can offer decentralized monitor -ing and proper decision-making techniques so that appropriate optimization hints can

failures and to ensure continuity of service delivery is a critical matter for the user and

Enhanced Network Self-Manageability in the Scope of Future Internet Development 287 4 Experimental Results for Network Coverage and

In the proposed test-bed, a heterogeneous wireless network environment has been deployed, consisting of several IEEE 802.11 Soekris access points (AP) 33 and an

Wi-fi) and multi-RATS (i e. Wifi, Wimax were located in the corresponding area, consuming a video service delivered by VLC

video LAN client)- based service provider 35. For the management of the NECMS a NDCM has been deployed.

of a new Wifi AP;(ii) the self-optimization of the network topology through the

Enhanced Network Self-Manageability in the Scope of Future Internet Development 289 0. 000 5. 000

Monitor Phase 2. 760 2. 561 3. 137 2. 547 Tim e se c Fig. 4. Channel Selection Duration

-gies (Wifi, Wimax), especially in cases where there is â€oeextreme†network traffic and/or overload, affecting the network functionality

-ment, virtualization of systems and network resources, advanced and cognitive net -working of information objects), have to â€oere-define†the overall FI network architec

fixed and IP networks), taking into consideration the next generation Internet envi -ronment and the convergence perspective.

-NET (â€oeself-Management of Cognitive Future Internet Elementsâ€) European Research Project and has been supported by the Commission of the European communities, in

4. Future Internet Assembly (FIA: Position Paper: Real world Internet (2009 http://rwi. future-internet. eu/index. php/Position paper

5. Afuah, A.,Tucci, C. L.:Internet Business models and Strategies: Text and Cases Mcgraw-hill, New york (2000

6. European Future Internet portal (2010), http://www. future-internet. eu /Enhanced Network Self-Manageability in the Scope of Future Internet Development 291

7. Blumenthal, M. S.,Clark, D d.:Rethinking the Design of the Internet: The End-to-end Ar

-guments vs. the Brave New world. ACM Trans. on Internet Techn. 1 (1), 70†109 (2001

8. Commission of the European communities: Communication on â€oethe Future EU 2020 Strategyâ€. European commission, Brussels (2009

9. Tselentis, G.,Domingue, L.,Galis, A.,Gavras, A.,et al.:Towards the Future Internet-A

European Research Perspective. IOS Press, Amsterdam (2009 10. Organization for Economic Co-operation Development (OECD:

The Seoul Declaration for the Future of the Internet Economy. OECD, Paris, France (2008 11.

Chochliouros, I. P.,Spiliopoulou, A s.:Innovative Horizons for Europe: The New Euro -pean Telecom Framework for the Development of Modern Electronic Networks and Ser

-vices. The Journal of the Communications network (TCN) 2 (4), 53†62 (2003 12. Commission of the European communities:

Communication on â€oefuture Networks and the Internetâ€. European commission, Brussels (2008 13. Galis, A.,Brunner, M.,Abramowitz, H.:

-vice-Aware Networking Architecture (MANA) for Future Internet/Draft 5. 0 (2008 14. International Telecommunication Union-Telecommunication Standardization Sector:

Rec M. 3400: TMN Management Functions. ITU-T, Geneva, Switzerland (2000 15. Pastor-Satorras, R.,Vespignani, A.:

Evolution and Structure of the Internet: A Statistical Physics Approach. Cambridge university Press, Cambridge (2004 16.

Autonomic Network Management in the Scope of the Future Internet. In: Proceedings of the 48th FITCE International Congress, FITCE, Prague, Czech republic, pp. 102†106 (2009

Future Internet Elements Cognition and Self management Design Issues. In: Proceedings of the 2nd International Conference on Autonomic Computing and Communication systems, pp. 1†6 (2008

21. Raptis, T.,Polychronopoulos, C.,et al.:Technological Enablers of Cognition in Self -Manageable Future Internet Elements.

In: Proceedings of The First International Confer -ence on Advanced Cognitive Technologies and Applications COGNITIVE 2009, pp. 499â€

Principles for Synergy of Self management and Future internet Evolutions. In: Proceed -ings of the ICT Mobile Summit 2009, pp. 1†8. IMC Ltd, Dublin (2009

23. Self-NET Project: Deliverable D1. 1: System Deployment Scenarios and Use Cases for Cognitive Management of Future Internet Elements (2008), https://www. ict-selfnet

eu /24. Agoulmine, N.,Balasubramaniam, S.,Botvitch, D.,Strassner, J.,et al.:Challenges for Autonomic Network Management.

IEEE International Conference on Personal Wireless communications, pp. 355†362 (2000 292 I. P. Chochliouros, A s. Spiliopoulou, and N. Alonistioti

Internet Wireless Networks: Dynamic Resource Allocation and Traffic Routing for Multi -Service Provisioning. In: Proceedings of MOBILIGHT-2009, pp. 1†12.

The autonomic computing edge: Can you CHOP UP autonomic computing IBM Corporation (2008 30. Prehofer, C.,Bettstetter, C.:

Self-organization in Communication Networks: Principles and Design Paradigms. IEEE Communications Magazine 43 (7), 78†85 (2005

31. Mihailovic, A.,Chochliouros, I. P.,Georgiadou, E.,Spiliopoulou, A s.,et al.:Situation Aware Mechanisms for Cognitive Networks.

-ence on Ultra Modern Telecommunications (ICUMT-2009), pp. 1†6. IEEE Computer So -ciety Press, Los Alamitos (2009

AN-100u/UX Single Sector Wireless Access Base Station User Manual (2008 35. C.:open-source multimedia framework, player and server

http://www. videolan. org/vlc J. Domingue et al. Eds.):) Future Internet Assembly, LNCS 6656, pp. 293†306,2011

 The Author (s). This article is published with open access at Springerlink. com Efficient Opportunistic Network Creation in the Context

of Future Internet Andreas Georgakopoulos, Kostas Tsagkaris, Vera Stavroulaki, and Panagiotis Demestichas University of Piraeus, Department of Digital Systems

80, Karaoli and Dimitriou Street, 18534 Piraeus, Greece {andgeorg, ktsagk, veras, pdemest}@ unipi. gr Abstract.

In the future internet era, mechanisms for extending the coverage of the wireless access infrastructure and service provisioning to locations that can

-pacity Extension, Future Internet 1 Introduction The emerging wireless world will be part of the Future Internet (FI.

All kinds of devices and networks will have the interconnection potential. Thus, any object or network element will have embedded communication capabilities and several objects

algorithm and strengthen the proof of concept. Finally, the article concludes with key findings and future work

Efficient Opportunistic Network Creation in the Context of Future Internet 295 ZÄ Ä Å Å ï¿

In 7, the issue of server selection is being investigated by proposing a node selection algorithm with respect to the worst-case link stress (WLS) criterion

secure, remote access to users of e g. an office network. Also, Virtual LANS (VLANS which are another type of VNS are logical networks

the application provisioning via the use of various kinds of nodes (e g. cell phones PDAS, laptops and other network-enabled devices.

Thus, a fitness function is pre -sented which is able to evaluate the eligibility of each candidate node

the user profiles, the outcome of this phase will be to decide whether it is suitable to

Efficient Opportunistic Network Creation in the Context of Future Internet 297 3. 2 ON Creation

lifetime to changing environment conditions (e g. context, operator†s policies, user profiles). ) In order to achieve this, after the successful completion of the creation

and enable service provisioning to end-users it is needed to gain awareness of the status of candidate,

can be used as routers, even when they do need not to use an application) and the

According to this scenario, a node which acts as a traffic source like a laptop or a camera is out of the coverage of the infrastructure.

the end user gets access to the infrastructure in situations where it nor -mally would not be possible,

cashflow as more users are being supported Another indicative scenario would comprise the notion of the opportunistic capac

Efficient Opportunistic Network Creation in the Context of Future Internet 299 Access providers are benefited from the fact that more users can be supported since

new incoming users that otherwise would be blocked can now be served, while end users experience improved Qos since congestion situations can be resolved as illus

-trated in Fig. 4 ZÄ Å Ä Ç ï Å Ä Ä ae Å ae aeoeä Ä ï

Å Ä Ä 'Ä ae Ä Ç Ä Ç ï Å Ä Ä DÄ Ä aeoeå ï¿

Efficient Opportunistic Network Creation in the Context of Future Internet 301 matrix contains the three factors (i e. energy, availability and delivery probability

In order to obtain some proof of concept for our network creation solution, a Java -based prototype has been developed

-trated in Fig. 6. Each node features 2 interfaces, a Bluetooth (IEEE 802.15.1) 16 and

interface, each node has a transmission data rate of 15 Mbps. On the other hand, the Bluetooth interface has a transmission data rate of 1 Mbps

but it is used for a rather short-range coverage (e g. 10 meters. Also, every new message is created at a 30

Efficient Opportunistic Network Creation in the Context of Future Internet 303 of significantly lower delivery rates as the message size increases to 1000 and 1500

Efficient Opportunistic Network Creation in the Context of Future Internet 305 0 0. 5 1

This work presents the efficient ON creation in the context of Future Internet. Opera -tor-governed ONS are a promising solution for the coverage or capacity extension of

1. European Telecommunications Standards Institute (ETSI), Reconfigurable Radio Systems RRS), â€oesummary of feasibility studies and potential standardization topicsâ€, TR 102.838

-tional Conference on Computer Communications (2006 3. Rong, B.,Hafid, A.:A Distributed Relay Selection algorithm for Cooperative Multicast in

5th International Conference on Mobile Ad hoc and Sensor Networks, Fujian (2009 4. Bouabdallah, F.,Bouabdallah, N.:

Computer Communications 31, 1763†1776 (2008 5. Verma, A.,Sawant, H.,Tan, J.:Selection and navigation of mobile sensor nodes using a

Pervasive and Mobile Computing 2, 65†84 (2006 6. Chen, H.,Wu, H.,Tzeng, N.:

Optimal node-selection algorithm for parallel download in overlay con -tent-distribution networks. Computer networks 53, 1480†1496 (2009

8. Akyildiz, I.,Wang, X.,Wang, W.:Wireless mesh networks: a survey. Computer Net -works 47, 445†487 (2005

9. Akyildiz, I.,Lee, W.,Chowdhury, K.:CRAHNS: Cognitive radio ad hoc networks. Ad Hoc Networks 7, 810†836 (2009

Computer networks 36, 137†151 (2009 11. Rossberg, M.,Schaefer, G.:A survey on automatic configuration of virtual private net

Computer networks (2011 12. Houidi, I.,Louati, W.,Ameur, W.,Zeghlache, D.:Virtual network provisioning across

Computer networks 55, 1011†1023 (2011 13. Saaty, T. L.:The Analytic Hierarchy Process. Mcgraw-hill, New york (1980

http://www. ieee802. org/15/pub/TG1. html 17. IEEE 802.11 Wireless Local area networks, http://ieee802. org/11

/18. Spyropoulos, T.,Psounis, K.,Raghavendra, C.:Spray and Wait: An Efficient Routing Scheme for Intermittently Connected Mobile networks.

In: ACM SIGCOMM Workshop on Delay-Tolerant Networking, WDTN (2005 Bringing Optical Networks to the Cloud:

Architecture for a Sustainable Future Internet Pascale Vicat-Blanc1, Sergi Figuerola2, Xiaomin Chen4, Giada Landi5

6 Athens Information technology 7 SAP Research 8 Poznan Supercomputing and Networking Center 9 INRIA 10 University of Essex

14 Alcatel-lucent 15 Telefoâ'nica I+D 16 Telekomunikacja Polska 17 Indian Institute of technology, Bombay Abstract.

Over the years, the Internet has become a central tool for society. The extent of its growth and usage raises critical issues associ

as Cloud computing and 3d-video streaming require optimization and combined provisioning of diï €erent infrastructure resources and services

As a huge energy consumer, the Internet also needs to be energy -conscious. Applications critical for society and business (e g.,

and secure Internet. Finally, the future Internet needs to support sus -tainable business models, in order to drive innovation, competition, and

research. Combining optical network technology with Cloud technology is key to addressing the future Internet/Cloud challenges.

In this con -J. Domingue et al. Eds.):) Future Internet Assembly, LNCS 6656, pp. 307†320,2011 câ The Author (s). This article is published with open access at Springerlink. com

308 P. Vicat-Blanc et al text, we propose an integrated approach: realizing the convergence of the

and IT managed services integrated with the vanilla Internet will ensure a sustainable future Internet/Cloud enabling demanding and ubiquitous

applications to coexist Keywords: Future Internet, Virtualization, Dynamic Provisioning, Vir -tual Infrastructures, Convergence, Iaas, Optical Network, Cloud

1 Introduction Over the years, the Internet has become a central tool for society. Its large

adoption and strength originates from its architectural, technological and opera -tional foundation: a layered architecture and an agreed upon set of protocols for

the sharing and transmission of data over practically any medium. The Inter -net†s infrastructure is essentially an interconnection of several heterogeneous net

-ment called gateways or routers. Routers are interconnected together through links, which in the core-network segment are mostly based on optical transmis

-sion technology, but also in the access segments gradual migration to optical technologies occurs. The current Internet has become an ubiquitous commod

-ity to provide communication services to the ultimate consumers: enterprises or home/residential users. The Internet†s architecture assumes that routers are

stateless and the entire network is neutral. There is no control over the content and the network resources consumed by each user.

It is assumed that users are well-behaving and have homogeneous requirements and consumption After having dramatically enhanced our interpersonal and business commu

-nications as well as general information exchange†thanks to emails, the web Voip, triple play service, etc. †the Internet is currently providing a rich envi

-ronment for social networking and collaboration and for emerging Cloud-based applications such as Amazon†s EC2, Azure, Google apps and others.

The Cloud technologies are emerging as a new provisioning model 2. Cloud stands for on

-demand access to IT hardware or software resources over the Internet. Clouds are revolutionizing the IT world 11,

but treat the Internet as always available without constraints and absolutely reliable, which is yet to be achieved.

Ana -lysts predict that in 2020, more than 80%of the IT will be outsourced within the Cloud 9!

With the increase in bandwidth-hungry applications, it is just a matter of time before the Internet†s architecture reaches its limits

The new Internet†s architecture should propose solutions for Qos provision -ing, management and control, enabling a highly ï exible usage of the Internet re

-sources to meet bursty demands. If the Internet†s architecture is redesigned not not only mission-critical or business applications in the Cloud will suï €er, but

even conventional Internet†s users will be aï €ected by the uncontrolled traï c or business activity over it

Bringing Optical Networks to the Cloud 309 Today, it is impossible to throw away what has made the enormous success

of the Internet: the robustness brought by the datagram building block and the end-to-end principle which are of critical importance for all applications.

-sioning and the virtualization paradigm with dynamic network provisioning as a way towards such a sustainable future Internet.

The proposed architecture for the future Internet will provide a basis for the convergence of networks†optical

networks in particular†with the Clouds while respecting the basic operational principles of today†s Internet.

It is important to note that for several years, to serve the new generation of applications in the commercial and scientiï c sec

-tors, telecom operators have considered methods for dynamic provisioning of high-capacity network-connectivity services tightly bundled with IT resources

There are various challenges that are driving today†s Internet to the limit, which in turn have to be addressed by the future Internet†s architecture.

As of today, the users /applications that require bandwidth beyond 1 Gbps are rather common

with a growing tendency towards applications requiring a 10 Gbps or even 100 Gbps connectivity.

Examples include networked data storage, high-deï -nition (HD) and ultra-HD multimedia-content distribution, large remote in

-strumentation applications, to name a few. But today, these applications cannot use the Internet because of the fair-sharing principle and the basic

routing approach. As TCP, referred to as the one-size-ï ts-all protocol, has

reached its limits in controlling†alone†the bandwidth, other mechanisms must be introduced to enable a ï exible access to the huge available band

-width 18 http://www. geysers. eu 310 P. Vicat-Blanc et al 2. Coordinate IT and network service provisioning:

Indeed, IT resources are processing data that should be transferred from the user†s premises or from the data repository to the computing resources

When the Cloud will be adopted largely and the data deluge will fall in it the communication model oï €ered by the Internet may break the hope for

fully-transparent remote access and outsourcing. The interconnection of IT resources over networks requires well-managed,

dynamically invoked, consis -tent services. IT and network should be provisioned in a coordinated way in

the future Internet 3. Deal with the unpredictability and burstiness of traï c: The increas

-ing popularity of video applications over the Internet causes the traï c to be unpredictable in the networks.

-plications on the Internet will be more and more sporadic: the network eï €ect ampliï es reactions. Therefore, the future Internet needs to provide mecha

-nisms that facilitate elasticity of resources provisioning with the aim to face sporadic, seasonal or unpredictable demands

few years following the growth of the Internet. Therefore, as a signiï cant contributor to the overall energy consumption of the planet, the Internet

needs to be energy-conscious. In the context of the proposed approach, this should involve energy awareness both in the provisioning of network and IT

dependency on information systems. The current Internet†s service paradigm allows service providers to authenticate resources in provider domains but

end users to resources is a challenge. This issue is even more signiï cant in the emerging systems with the provisioning of integrated resources provided

business models deployed by telecom operators are focused on selling services on top of their infrastructures. In addition, operators cannot oï €er dynamic

Internet †The Virtual Infrastructure concept and its operational model as a funda -mental approach to enable the on-demand infrastructure services provision

This concept has little to do with the way data is processed or trans -mitted internally, while enabling the creation of containers with associated non

-nents for the future Internet. They inherently provide plenty of bandwidth and in particular, the emerging ï exible technology supported by the required con

-sources comprise another important category of future Internet shared resources aggregated in large-scale data centers and providing high computational and

storage capacities. In order to build VIS, these resources are abstracted, parti -tioned or grouped into Virtual Resources (VRS),

of conï guration, accessibility and availability for the end users, as well as a sep -aration of the functional aspects of the entities involved in the converged service

-virtualization layer, the enhanced control plane, that corresponds to the network management layer, and the service middleware layer.

Each layer is responsible for implementing diï €erent functionalities covering the full end-to-end service delivery from the service layer to the physical substrate

Central to this novel architecture is the infrastructure virtualization layer which abstracts, partitions and interconnects infrastructure resources

-acting with the virtualization layer 3. Finally, a service middleware layer is introduced to fully decouple the

physical infrastructure from the service level. It is an intermediate layer between applications running at the service consumer†s premises and the

-virtualization layer is implemented as the Logical Infrastructure Composition Layer (LICL) and the enhanced control plane as the NCP+.

SML Service Middleware Layer VI Virtual Infrastructure VIO Virtual Infrastructure Operator VIO-IT Virtual IT Infrastructure Operator

Enterprise Information system externally on a Cloud rented from a Software -as-a-Service (Saas) provider.

It also connects heterogeneous data resources in an isolated virtual infrastructure. Furthermore, it supports scaling

role for telecom operators that own their infrastructure to oï €er their optical network integrated with IT infrastructures (either owned by them or by third

resilience) can be oï €ered economically and eï ciently to users and applications 4 Virtual Infrastructures in Action

terms of provisioning of IT resources, where distributed computing and storage resources are scaled automatically up and down, with guaranteed high-capacity

between the NCP+and the service middleware layer (SML) via a service -to-network interface, named NIPS UNI during the entire VI service life cycle

19 http://www. ens-lyon. fr/LIP/RESO/Software/vxdl/home. html 316 P. Vicat-Blanc et al

of amount of CPU), while the NCP+computes the most eï cient combination of end-points and network path to be used for the speciï c service.

path computation is performed by dedicated PCES that implements enhanced computation algorithms able to combine both network and IT parameters with

energy-consumption information in order to select the most suitable resources and ï nd an end-to-end path consuming the minimum total energy (see Sec. 5

the infrastructure-virtualization layer, in order to trigger the procedures for the Virtual Infrastructure†s dynamic replanning on the network side, besides the IT

plane is able to request the upgrade or downgrade of the virtual resources, in order to automatically optimize the VI€ s size to the current traï c load

eï cient routing algorithm (due to space limitations, the detailed algorithm is not 318 P. Vicat-Blanc et al

Fig. 6. Number of activated ï bers Fig. 7. Number of activated data centers shown here) from a networked IT use case:

each source site has certain processing demands which need to be satisï ed by suitable IT resources (in a data center

Note that we assume anycast routing, implying that the destination IT resource can be chosen freely among the available ones,

4-6) indicate that our proposed algorithm can decrease the energy consumption by 10%compared to schemes where only IT infrastructure is considered and

the Internet has to face urgently to support emerging disruptive applications and continue to grow safely.

-opment activities of the GEYSERS project to achieve the complete software stack and provide the proof of concept of these architectural considerations

of the diï €erent software components creating and managing optical virtual in -frastructures. The other goal is to evaluate the performance and functionality of

Market-Oriented Cloud computing: Vision, Hype, and Reality of De -livering Computing as the 5th Utility.

In: Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, WASHINGTON DC

USA. CCGRID †09, p. 1. IEEE Computer Society Press, Los Alamitos (2009 doi: 10.1109/CCGRID. 2009.97

20 Mintotalpower: minimizing both network -and IT power; Minnetworkpower only minimizing the network power; Minnetcapacity:

-mizing the energy consumed by the data centers 320 P. Vicat-Blanc et al 3. Clark, D.:

The design philosophy of the DARPA internet protocols. SIGCOMM Comput. Commun. Rev. 18, 106†114 (1988), doi:

A Novel Architecture for Virtualization and Co-Provisioning of Dynamic Optical Networks and IT Services.

ICT Future Network and Mobile Summit 2011 Santander, Spain (June 2011 5. Farrel, A.,Vasseur, J. P.,Ash, J.:

A Path Computation Element (PCE)- Based Architecture. RFC 4655 (Informational)( Aug 2006), http://www. ietf. org/rfc

Why the Internet only just works. BT Technology Journal 24, 119†129 2006), doi: 10.1007/s10550-006-0084-z

The next Generation Internet, E-business, and E-everything http://www. aaas. org/spp/rd/ch20. pdf

10. Pickavet, M.,Vereecken, W.,Demeyer, S.,Audenaert, P.,Vermeulen, B.,Develder C.,Colle, D.,Dhoedt, B.,Demeester, P.:

Advanced Networks and Telecommunication Systems, 2008. ANTS †08. 2nd International Symposium on. pp. 1†3 (2008

Future Internet Areas: Services Part VI: Future Internet Areas: Services 323 Introduction The global economy can be characterised under three main sectors.

The primary sec -tor involves transforming natural resources into primary products which then form the raw materials for other industries1.

motivation for services research both in the software industry and academia The Internet of Services is concerned with the creation of a layer within the Future

Internet which can support the service economy. Two overarching requirements influ -ence the scope and technical solutions created under the Internet of Services umbrella

Firstly, there is a need to support the needs of businesses in the area. Service oriented

solutions can enable new delivery channels and new business models for the services industrial sector The Future Internet will be comprised of a large number of heterogeneous compo

-nents and systems which need to be linked and integrated. For example, sensor net -works will be composed on adhoc collections of devices with low-level interfaces for

accessing their status and data online. Mobile platforms will need to access to external data and functionality in order to meet consumer expectations for rich interactive

seamless experiences. Thus, a second driving requirement for the Internet of Services is to provide a uniform conduit between the Future Internet architectural elements

through service-based interfaces Under the above broad requirements a number of research themes arise

•Architectural †within a new global communications infrastructure there is a need to determine how a service layer would fit into an overall Future Internet architecture

For example, the boundary between the network and service layers and also how ser -vices would operate over connected objects

1 http://en. wikipedia. org/wiki/Primary sector of the economy 2 http://en. wikipedia. org/wiki/Secondary sector of the economy 3 http://en. wikipedia. org/wiki/Tertiary sector of the economy

4 http://www. eurofound. europa. eu/emire/GREECE/TERTIARIZATION-GR. htm 5 http://en. wikipedia. org/wiki/List of countries by gdp sector composition

324 Part VI: Future Internet Areas: Services and semi-automated approaches to service discovery, composition, mediation and

invocation •Cloud computing †definitions vary but cloud computing is generally acknowl -edged to be the provision of IT capabilities, such as computation, data storage and

software on-demand, from a shared pool, with minimal interaction or knowledge by users. Cloud services can be divided into three target audiences:

service providers software developers and users as follows6 ⠀ Infrastructure as a service †offering resources such as a virtual machine or

storage services ⠀ Platform as a service †providing services for software vendors such as a soft -ware development platform or a hosting service

⠀ Software as a service †offering applications, such as document processing or email to end-users Within this section we have three chapters

which cover several of the issues outlined above. The ability to trade IT-services as an economic good is seen as a core feature of

the Internet of Services. In the chapter Butler et al. â€oeslas Empowering Services in the Future Internet†the authors discuss this in relation to Service Level Agreements

SLAS). ) In particular they claim a requirement for a holistic view of SLAS enabling their management through the whole service lifecycle:

from engineering to decommission -ing. An SLA management framework is outlined as a proposal for handling SLAS in the

Future Internet. Evidence supporting the claims is provided through experiences in four industrial case studies in the areas of:

Enterprise IT; ERP Hosting; Telco Service Ag -gregation; and egovernment Ontologies are shared formal descriptions of a shared viewpoint over a domain

which have attracted attention in recent years within the context of the Web. This work has led to the Semantic web,

and extension of the Web which is machine read -able. Ontologies and semantics form a part of the next two chapters in this section

As mentioned above there is an open question on how best to connect the network and service layers in a new communications infrastructure.

Within the chapter Santos et al. â€oemeeting Services and Networks in the future Internet†an ontology based ap

-proach is taken combined with a simplification of the network layer structure in order to facilitate network-service integration.

More specifically, the approach, called FINLAN Fast Integration of Network Layers), is a model which replaces several network layers

with ontologies providing the foundations for an â€oeautonomic Internet†Linked Data is the Semantic web in its simplest form

and is based on four principles •Use URIS (Uniform Resource Identifiers) as names for things

using Semantic web standards •Include links to other URIS, so that other resources can be discovered 6 See http://www. internet-of-services. com/index. php?

id=274&l=0 Part VI: Future Internet Areas: Services 325 Given the growing take-up of Linked Data for sharing information on the Web at

large scale there has begun a discussion on the relationship between this technology and the Future Internet.

In particular, the Future Internet Assemblies in Ghent and Budapest both contained sessions on Linked Data.

The final chapter in this section Domingue et al. â€oefostering a Relationship Between Linked Data and the Internet of

Services†discusses the relationship between Linked Data and the Internet of Services Specifically, the chapter outlines an approach which includes a lightweight ontology

and a set of supporting tools John Domingue J. Domingue et al. Eds.):) Future Internet Assembly, LNCS 6656, pp. 327†338,2011

 The Author (s). This article is published with open access at Springerlink. com SLAS Empowering Services in the future Internet1

Joe Butler1, Juan Lambea2, Michael Nolan1, Wolfgang Theilmann3 Francesco Torelli4, Ramin Yahyapour5, Annamaria Chiasera6, and Marco Pistore7

1 Intel, Ireland, {joe. m. butler, michael. nolan}@ intel. com 2 Telefã nica Investigaciã n y Desarrollo, Spain, juanlr@tid. com

3 SAP AG, Germany, wolfgang. theilmann@sap. com 4 ENG, Italy, francesco. torelli@eng. com

5 Technische Universitã¤t Dortmund, Germany, ramin-yahyapour@udo. edu 6 GPI, Italy, achiasera@gpi. it

propose an SLA management framework that can become a core element for managing SLAS in the future Internet.

Last, we present early results and ex -periences gained in four different industrial use cases,

The service paradigm is a core principle for the Future Internet which supports integration, interrelation and inter-working of its architectural

elements. Besides being the constituting building block of the so-called Internet of Services, the paradigm equally applies to the Internet of things and the underlying

technology cloud platform below. Cloud computing gained significant attention and commercial uptake in many business scenarios. This rapidly growing service-oriented

economy has highlighted key challenges and opportunities in IT-supported service provisioning. With more companies incorporating cloud based IT services as part of

1 The research leading to these results is supported partially by the European community's Seventh Framework Programme (FP7/2001-2013) under grant agreement nâ°216556

-cally, a service is dependent on many other services, e g. the offering of a software service requires infrastructure resources, software licenses or other software services

We propose an SLA management framework that offers a core element for manag -ing SLAS in the future Internet.

The framework supports the configuration of com -plex service hierarchies with arbitrary layers. This allows end to end management of

resources and services for the business value chain. The scientific challenges include the understanding and modelling of the relationships between SLA properties.

-ness, software, and infrastructure) on the other With a set of four complementary use case studies, we are able to evaluate our ap

-cation and third party web services: how multi-party, multi-domain SLAS for aggre -gated services can best be offered to customers. egovernment validates the integra

SLAS Empowering Services in the future Internet 329 The remainder of this paper is organized as follows. Chapter 2 introduces our ref

adoption of the framework, within the Future Internet but also in general System Management environments. Chapters 4-7 cover the respective use cases and evalua

2) supports arbitrary service types (business, software, infrastructure) and SLA terms,(3) covers the complete SLA and service lifecycle with consistent interlinking

business, software and infrastruc -ture. The framework communicates to external parties, namely customers who (want

On the highest level, we distinguish the Framework Core, Service Managers (infra -structure and software), deployed Service Instances with their Manageability Agents

and Monitoring Event Channels. The Framework Core encapsulates all functionality related to SLA management, business management,

and the evaluation of service setups. Infrastructure-and Software Service Managers contain all service-specific

functionality. The deployed Service Instance is the actual service delivered to the customer and managed by the framework via Manageability Agents.

Software SLA Manager Infrastructure SLA Manager Business Manager Service Evaluation Infrastructure Service Manager Software Service Manager

Customer 3rd Party Manageability Agent Infrastructure Service <<provider relations >><negotiate >><customer relations >>Monitored Event Channel <<control/track

Software Service <<adjust >>deployed infrastructure service deployed software service <<negotiate >>framework core Fig. 1. Overview of the SLA Framework Reference Architecture

While all framework components come with default implementations they can also easily be extended or enhanced for more specific domain needs.

Similarly, the pro -vided meta-models come with clear extension mechanisms, e g. to specify additional service level terms

Internet. Second, we give an overview how SLA management relates to other man -agement functions.

SLAS Empowering Services in the future Internet 331 3. 1 Adoption Considerations for the Future Internet The SLA management framework architecture can easily be applied to different Fu

-ture Internet scenarios. The SLA model is rich and extensible enough to be applied to e g. infrastructure and networking resources, to sensor-like resources in the Internet of

Things, to services in the Internet of Services, but also to describe people, knowledge and other resources.

Similarly, the service construction model can be adopted, which allows specification of arbitrary internal resource/service aspects

Based on this model foundation, the framework components can be flexibly instan -tiated. Assuming to have Manageability Agents for the relevant artefacts in the future

Internet, a management environment consisting of SLA and Service Managers can be set up in different flavours.

respective Future Internet scenario. In the following use-case chapters we also pro -vide additional configuration examples of the framework

3. 2 Adoption Considerations for Cloud computing The SLA@SOI framework should become an intrinsic part of each cloud environ

contains many aspects of a software cloud 3. 3 Interlinkage with System Management SLA-driven system management is the primary approach discussed in this paper.

We assume a virtualisation-enabled data centre style configura -tion of server capacity, and a broad range of services in terms of relative priority

resource requirement and longevity. As a support service in most enterprises, IT is expected to deliver application

and data service support to other enterprise services and lines of business. This brings varied expectations of availability, mean-time-to

SLAS Empowering Services in the future Internet 333 for efficiency, and longer term strategic issues such as infrastructure refresh (in the

Taking a holistic cost view, it provides fine grained SLA based data to influence future investment decisions based on capital, security, compute power and

From an implementation perspective, user interaction is via a web based UI, used by both IT customers and administrators.

Software services could potentially be selected by choosing a virtual machine template which contains pre-loaded applications,

but software layer considerations are considered not core to this Use Case and are dealt more comprehensively with in the ERP Hosting Use Case

The Business SLA Manager passes service provisioning requests to the Infrastructure SLA Manager whose role is to carry out the creation of the new virtual machines

which constitute the service along with monitoring and reporting for that service Evaluation of the framework is carried out with reference to parameters which

a software package (an application) but also some business-level activities, such as a support contract. At the next level, there are the actual software applications, such as for

example a hosted ERP SOFTWARE package. At the next level, there are the required mid -dleware components which are used equally for different applications.

At the lowest layer, there are the infrastructure resources, delivered through an internal or external cloud.

Application SLA is mainly about the throughput capacity of the software solution, its response time, and the provider internal costs required for the offering.

The Middleware SLA specifies the capacity of the middleware components, the response time guarantee of the middleware components and the costs required for the offering.

The Infrastructure SLA specifies the characteristics of the virtual or physical resources (CPU speed, mem

-ory, and storage) and again the costs required for the offering The use case successfully applies the SLA framework by realizing distinct SLA

Managers for the 4 layers and also 4 distinct Service Managers that bridge to the actual

support department, the application, the middleware, and the infrastructure artefacts From a technical perspective, the most difficult piece in the realization of the

the different components, e g. the performance characteristics of the middleware. We collected a set of model-driven architecture artefacts, measurements,

SLAS Empowering Services in the future Internet 335 6 Use Case †Service Aggregation The main aim of the Service Aggregation use case is the service-enabling of core

Telco services and their addition with services from third parties (as Internet, infra -structure, media or content services.

From the provider†s point of view, they will be able to publish their services in the Service Aggregator

integrates software layer (from SLA@SOI framework architecture. And finally Bank prototype is implemented using the top layer, business.

way it is necessary to outline also is executed the provision of Telco web service wrappers by Software SLA Manager in an application server and also the provision of

the infrastructure driven by Infrastructure SLA Manager (using the appropriate ser -vice manager. SMS wrappers deployed in the application server of the corresponding

virtual machine has to connect and execute different tasks with core mobile network systems that are behind Telefã nica Software Delivery Platform (SDP.

The compo -336 J. Butler et al nents that can be connected also in the use case are the monitors of the services (SMS

and Infrastructure services. To take care about the violations, track interfaces are used to connect the adjustment components in each SLA Manager.

Finally, Service Aggregator converts violations in penalties, and takes actions to adjust these viola -tions and reports the situation to the customer

Technical evaluation about SLA@SOI framework can be seen in a very positive way in terms of the functionality of the components and the outcome obtained by the

In the new ecosystems of Future internet of services the key will be the exporting and interconnection of services between different parties.

SLA-aware aggregation of telecommunications services introduces a business opportunity for the agile and efficient co-creation of new service offerings and sig

Such a Health & Mobile Service is provided by a so called â€oecitizen Service Center†(CSC) and is composed of:

health, mobile and contact services, as well as the expected overall satisfaction of the citizen. The SLA@SOI framework automates activities of the CSC that are usually

SLAS Empowering Services in the future Internet 337 From the technical point of view, one of the main challenges of this use case has

For example, while typical software/hardware guarantee terms constraint the quality of each single execution of a service, in this use case the guarantee terms constraint

to sensitive data on the health status of the citizens and quite challenging for the key

system from the users, effectiveness of monitoring and adjustment functionalities The results obtained from this evaluation is integrated further

trends in the real data extracted from the past behaviours of the systems at the service

Service level agreements are a crucial element to support the emerging Future Internet so that eventual services become a tradable, dependable good.

-purpose SLA management framework that can become a core element for managing SLAS in the future Internet.

The framework allows the systematic grounding of SLA requirements and capabilities on arbitrary service artefacts, including infrastructure

network, software, and business artefacts. Four complementary industrial use cases demonstrated the applicability and relevance of the approach.

-narios, especially relevant for the Future Internet. Last, we plan to open up our devel -opment activities via an Open source Project.

The first framework version fully pub -lished as open source can be found at 5 Open Access.

This article is distributed under the terms of the Creative Commons Attribution Noncommercial License which permits any noncommercial use, distribution, and reproduction

Journal of Internet Engineering 4 (1 2010), http://www. jie-online. org/ojs/index. php/jie/issue/view/8

3. Miller, B.:The autonomic computing edge: Can you CHOP UP autonomic computing Whitepaper IBM developerworks (March 2008), http://www. ibm. com/developer

works/autonomic/library/ac-edge4 /4. Theilmann, W.,Winkler, U.,Happe, J.,Magrans de Abril, I.:

Managing on-demand busi -ness applications with hierarchical service level agreements. In: Berre, A j.,GÃ mez-PÃ rez

A.,Tutschku, K. eds. FIS 2010. LNCS, vol. 6369, Springer, Heidelberg (2010 5. SLA@SOI Open source Framework.

First full release by December 2010 http://sourceforge. net/projects/sla-at-soi 6. SLA@SOI project:

Internet Eduardo Santos1, Fabiola Pereira1, Joaëoeo Henrique Pereira2 Luiz Claâ'udio Theodoro1, Pedro Rosa1, and Sergio Takeo Kofuji2

and collaborate with Future Internet researches, like the Autonomic Internet Keywords: Future Internet, Network Ontology, Post TCP IP, Services

Introduction In recent years it has been remarkable the Internet advancement in throughput and the development of diï €erent services and application features.

Many of these are supported by the TCP IP protocols architecture, however, the intermediate layers based on the protocols IP, TCP, UDP and SCTP were developed more

than 30 years ago, when the Internet was used just for a limited number of hosts

and with a few services support. Despite the development of the Internet and its wonderful ï exibility and adaptability, there were no signiï cant improvements

in its Network and Transport layers, resulting in a communication gap between layers 7, 8

Internet and there are a lot of studies, proposals and discussions over questions related to a network able of supporting the current and Future Internet commu

-nication challenges. Some of these studies are related to: EFII, FIA, FIRE, FIND GENI and other groups.

) Future Internet Assembly, LNCS 6656, pp. 339†350,2011 câ The Author (s). This article is published with open access at Springerlink. com

-tecture with collaboration for the Future Internet, this work is focused in one alternative to the TCP IP protocols, at layers 3 and 4, in one perspective to meet

-ogy in computer networks to support the communication needs in a better way Another aspect that can be placed in the context of the Future Internet is the

use of ontology in networks. In current networks, the semantic communication generally is limited to the Application layer

The use of ontology at the intermediate layers permits the Internet Applica -tion layer better inform its needs to the intermediate layers.

has semantic communication, in OWL (Web Ontology Language), with its su -perior layer and the DL-Ontology layer.

Meeting Services and Networks in the future Internet 341 of data transfer between links. The main diï €erence between these two layers

is that the Net-Ontology layer is responsible to support service needs beyond simple data transfers.

These layers, compared with the TCP IP layers, are rep -resented in Fig. 1, with examples of some Future Internet works that can be

integrated with this approach at the intermediate layers Fig. 1. TCP IP and FINLAN Layers Comparison

in heterogeneous environment to the devices mobility in 4g networks handovers using the DOHAND (Domain Ontology for Handover.

for the handover in 4g networks In another application example, the FINLAN ontology can be used by the

Management and Virtualisation planes), presented in 3, to better monitor the networks, as the semantic information can directly be handled by the Net

there are some limitations for the software-driven control network infrastruc -ture, formed by the OSKMV,

protocols generally just can send information at the data ï eld and do not support

contribute to the translations of the MBT (Model-based Translator) software package, by the use of the FINLAN formal representation in OWL.

-siderations about contributions can be done at the Service, Content and User Centric approaches, when using the current TCP IP layers 3 and 4, and not

represented in OWL, the OSKMV planes and the Service, Content and User Centric works can have the beneï t to inform their needs to the Net-Ontology

Internet proposals by the separation of the internal complexities of each layer and exposing only the interfaces between them.

This work uses OWL as formal language for this communication, as the OWL was adopted by a considerable number of initiatives

One example of the FINLAN ontology use in the future Internet research area is the possibility to support the AUTOI Functional Components commu

>Meeting Services and Networks in the future Internet 343 This work shows how FINLAN can contribute with Future Internet researches

using Autoi as integration example) and it is not scope to describe the ontology foundation concepts and the implementations to enable the network communi

2 Contributions to the Future Internet Works The FINLAN project has adherence with some current eï €orts in the future

Internet research area, and the representation example above shows that the on -tology cross layers can,

Attempting to the alignment with some Future Internet groups proposals, the next section extends possible collaborations that may be

a service, a content, a network element and even a cloud computing †ID: the unique identiï er of each entity

One of the Autonomic Internet project expectations is to support the needs of virtual infrastructure management to obtain self management of virtual re

-work communication used by the Autoi vcpi (Virtual Component Programming Interface) 13, allowing a localized monitoring and management of the virtual

use of the CPU memory assignment, packets lost and others. The invocation of the methods can

two network elements, like virtual routers, can interact between them through the property hasvirtuallink Collect, Dissemination and Context Information Processing:

Meeting Services and Networks in the future Internet 345 the number of interactions between the context sources and the context clients

The Autoi open source implements a scal -able and modular architecture to the deployment, control and management of

forwarding engine like a router 15 Its integration with FINLAN can act in some components, like the Diverter

the Session Broker and the Virtualisation Broker. There are many others but these are essentials. As the communication between the Autoi modules is done

-sites for an instance (memory size, storage pool size, number of virtual CPUS 346 E. Santos et al

>2. 3 Collaboration to the Complexity Reduction for {User, Service Content}- Centric Approaches This work can collaborate to reduce the complexity of the network use by the

user, service and content centric projects, as the ontology can oï €er better com -prehension for the networks.

Meeting Services and Networks in the future Internet 347 In this proposal, the objects Media, Rules, Behaviour, Relations and Charac

making the {user, service, content -centric approaches simpler, as shown in the sample code below

-ers Future Internet works, continuing the examples with the Autoi integration As the Autoi project has been fulï lling its purposes,

and can not be disregarded to the future of the Internet infrastructure Autoi modules connections are performed in well deï ned form using connec

Based on the Autoi Java open source, in the ANPI demo, the ANPISDD class is prepared to use the IP and

from the ANPISDD. java code 348 E. Santos et al public class ANPISDD extends Thread {private Serversocket server

private int port=43702 private Socket s=null public static Knowledgeplane KP=null private ANPICONNECTIONHANDLER HD=null

+""s1=server. accept With the use of the FINLAN library this communication can be done replacing

layers of the networks in the future Internet, for the communication between the Service Enabler plane and the Management/Knowledge plane implemented

the needs of the data ï ow that will start. With the understanding of application

Meeting Services and Networks in the future Internet 349 is ready to be established, and the data is sent through the layers also using raw

sockets At the current stage of development the implementation of FINLAN library is made in application level.

the FINLAN ontology in Linux operating system kernel level, allowing the facil -ities in its use in diï €erent programming languages,

since the methods proposed would be available at the operating system level 4 Conclusions This paper has presented the FINLAN ontology works in a collaboration per

-spective with some Future Internet projects. We have proposed to better meet -ing of services and networks by approaching services semantically to the network

structure. It was showed how to integrate FINLAN with Future Internet projects taking Autoi as example,

and how the ontological approach can be applied to Future Internet works like monitoring and content-centric Internet

Future work will implement the FINLAN ontology at the Linux kernel level and run performance and scalability experiments with diï €erent Future Internet

projects open implementations. Further work also will do the extension of the scope of the ontological representation, by modeling the behavior of FINLAN to

support requirements in contribution with diï €erent Future Internet projects We strongly believe that meeting services and networks through the reduction

of network layers and, consequently, through the decreasing of users, services and content complexity is a possible way to achieve ï exibility in future networks

Moreover, we expect that ontological approaches can help to build a Future Internet with its real challenges, requirements and new paradigms

Acknowledgment. This work is a result of conceptual discussions and re -searches of all members of the FINLAN group.

The authors would like to ac -knowledge the implementations and philosophical talks with this group. Also to

thank the eï €orts to gather on the state-of-the-art of the Future Internet Open Access.

Monitoring Service Clouds in the future Internet. In: Towards the Future Internet-Emerging Trends from European Research, p. 115 (2010

2 FIRE: FIRE White paper (Aug. 2009), http://www. ict-fireworks. eu /fileadmin/documents/FIRE WHITE PAPER 2009 V3. 1. pdf

350 E. Santos et al 3 Galis, A.,Denazis, S.,Bassi, A.,Giacomin, P.,Berl, A a.,Fischer, o.:

-agement Architecture and Systems for Future Internet. In: Towards the Future Internet-A European Research Perspective, p. 112 (2009

4 Malva, G r.,Dias, E. C.,Oliveira, B c.,Pereira, J. H. S.,Kofuji, S. T.,Rosa, P. F

Telecommunication Technologies Symposium (2009 5 Pereira, F. S f.,Santos, E s.,Pereira, J. H. S.,Rosa, P. F.,Kofuji, S. T.:

and Telecommunication Technologies Symposium (2009 6 Pereira, F. S f.,Santos, E s.,Pereira, J. H. S.,Rosa, P. F.,Kofuji, S. T.:

Packet Delivery Proposal in a Next Generation Internet. In: IEEE International Conference on Networking and Services, p. 32 (2010

Distributed systems Ontology. In IEEE/IFIP New Technologies, Mobility and Security Conference (2009 8 Pereira, J. H. S.,Kofuji, S. T.,Rosa, P. F.:

Horizontal Address Ontology in Internet Architecture. In: IEEE/IFIP New Technologies, Mobility and Security Conference

Generation Internet. In: IEEE International Conference on Networking and Ser -vices, p. 7 (2010 10 Pereira, J. H. S.,Pereira, F. S f.,Santos, E s.,Rosa, P. F.,Kofuji, S. T.:

Address by Title in the Internet Architecture. In: 8th International Information and Telecommunication Technologies Symposium (2009

11 Pereira, J. H. S.,Santos, E s.,Pereira, F. S f.,Rosa, P. F.,Kofuji, S. T.:

Design for Future Internet Service Infrastructures. In: Towards the Future Internet-A European Research Perspective, p. 227 (2009

13 Rubio-Loyola, J.,Astorga, A.,Serrat, J.,Chai, W. K.,Mamatas, L.,Galis, A

Platforms and Software systems for an Autonomic Internet. In: IEEE Global Communications Conference (2010 14 Rubio-Loyola, J.,Astorga, A.,Serrat, J.,Lefevre, L.,Cheniour, A.,Muldowney

D.,Davy, S.,Galis, A.,Mamatas, L.,Clayman, S.,Macedo, D.,et al.:Manageabil -ity of Future Internet Virtual Networks from a Practical Viewpoint.

In: Towards the Future Internet-Emerging Trends from European Research, p. 105 (2010 15 Rubio-Loyola, J.,Serrat, J.,Astorga, A.,Chai, W. K.,Galis, A.,Clayman, S

Mamatas, L.,Abid, M.,Koumoutsos, G.:et al.:Autonomic Internet Framework Deliverable D6. 3. Final Results of the Autonomici Approach.

Autoi Project (2010 16 Santos, E s.,Pereira, F. S f.,Pereira, J. H. S.,Rosa, P. F.,Kofuji, S. T.:

Integracâ¸aëoeo de Servicâ¸os em Ambientes Heterogeë neos: uso de Semaë ntica para Comunicacâ¸aëoeo Entre Entidades em Mudancâ¸as de Contexto.

Towards a Content-Centric Internet. In: Towards the Future Internet -Emerging Trends from European Research, p. 227 (2010

J. Domingue et al. Eds.):) Future Internet Assembly, LNCS 6656, pp. 351†364,2011  The Author (s). This article is published with open access at Springerlink. com

Fostering a Relationship between Linked Data and the Internet of Services John Domingue1, Carlos Pedrinaci1, Maria Maleshkova1, Barry Norton2, and

Reto Krummenacher3 1 Knowledge Media Institute, The Open university, Walton Hall, Milton Keynes MK6 7aa UK

{j. b. domingue, c. pedrinaci, m. maleshkova}@ open. ac. uk 2 Karlsruhe Institute of technology, Karlsruhe, Germany

We outline a relationship between Linked Data and the Internet of Services which we have been exploring recently.

The Internet of Services pro -vides a mechanism for combining elements of a Future Internet through stan

-dardized service interfaces at multiple levels of granularity. Linked Data is a lightweight mechanism for sharing data at web-scale which we believe can fa

-cilitate the management and use of service-based components within global networks Keywords: Linked Data, Internet of Services, Linked Services

1 Introduction The Future Internet is a fairly recent EU initiative which aims to investigate scientific

and technical areas related to the design and creation of a new global infrastructure An overarching goal of the Future Internet is that the new platform should meet

Europe†s economic and societal needs. The Internet of Services is seen as a core com

-ponent of the Future Internet â€oethe Future Internet is polymorphic infrastructure, where the bounda -ries between silo systems are changing

and blending and where the em -phasis is on the integration, interrelationships and interworking of the

architectural elements through new service-based interfacesâ€. Frederic Gittler, FIA Stockholm The Web of Data is a relatively recent effort derived from research on the Semantic

Web 1, whose main objective is to generate a Web exposing and interlinking data previously enclosed within silos.

Like the Semantic web the Web of Data aims to extend the current human-readable Web with data formally represented so that soft

-ware agents are able to process and reason with the information in an automatic and

352 J. Domingue et al flexible way. This effort, however, is based on the simplest form of semantics

RDF (S) 2, and has focused thus far on promoting the publication, sharing and link -ing of data on the Web

From a Future Internet perspective a combination of service-orientation and Linked Data provides possibilities for supporting the integration, interrelationship and inter

-working of Future Internet components in a partially automated fashion through the extensive use of machine-processable descriptions.

From an Internet of Services per -spective, Linked Data with its relatively simple formal representations and inbuilt

support for easy access and connectivity provides a set of mechanisms supporting interoperability between services.

In fact, the integration between services and Linked Data is increasingly gaining interest within industry and academia.

Examples include for instance, research on linking data from RESTFUL services by Alarcon et al. 3 work on exposing datasets behind Web APIS as Linked Data by Speiser et al. 4, and

Web APIS providing results from the Web of Data like Zemanta1 We see that there are possibilities for Linked Data to provide a common †glue†as

services descriptions are shared amongst the different roles involved in the provision aggregation, hosting and brokering of services.

In some sense service descriptions as and interlinked with, Linked Data is complementary to SAP€ s Unified Service De

-scription Language2 5, within their proposed Internet of Services framework3, as it provides appropriate means for exposing services and their relationships with provid

-ers, products and customers in a rich, yet simple manner which is tailored to its use at

Web scale In this paper we discuss the relationship between Linked Data and services based on our experiences in a number of projects.

Using what we have learnt thus far, at the end of the paper we propose a generalization of Linked Data and service principles

for the Future Internet 2 Linked Data The Web of Data is based upon four simple principles, known as the Linked Data

principles 6, which are 1. Use URIS (Uniform Resource Identifiers) as names for things 2. Use HTTP URIS so that people can look up those names

3. When someone looks up a URI, provide useful information, using standards RDF*,SPARQL 4. Include links to other URIS,

so that they can discover more things 1 http://developer. zemanta. com /2 http://www. internet-of-services. com/index. php?

id=288&l=0 3 http://www. internet-of-services. com/index. php? id=260&l=0

Fostering a Relationship between Linked Data and the Internet of Services 353 RDF (Resource Description Framework) is a simple data model for semantically

describing resources on the Web. Binary properties interlink terms forming a directed graph. These terms as well as the properties are described by using URIS.

Since a property can be a URI, it can again be used as a term interlinked to another property

SPARQL is a query language for RDF data which supports querying diverse data sources, with the results returned in the form of a variable-binding table, or an RDF

graph Since the Linked Data principles were outlined in 2006, there has been a large up -take impelled most notably by the Linking Open Data project4 supported by the W3c

Semantic web Education and Outreach Group As of September 2010, the coverage of the domains in the Linked Open Data

Cloud is diverse (Figure 1). The cloud now has nearly 25 billion RDF statements and

over 400 million links between data sets that cover media, geography, academia, life -sciences and government data sets

Fig. 1. Linking Open Data cloud diagram as of September 2010, by Richard Cyganiak and Anja

Jentzsch5 From a government perspective significant impetus to this followed Gordon Brown†s announcement when he was UK Prime Minister6 on making Government data freely

available to citizens through a specific Web of Data portal7 facilitating the creation of a diverse set of citizen-friendly applications

4 http://esw. w3. org/Sweoig/Taskforces/Communityprojects/Linkingopendata 5 http://lod-cloud. net /6 http://www. silicon. com/management/public-sector/2010/03/22/gordon-brown-spends-30m

-to-plug-britain-into-semantic web-39745620 /7 http://data. gov. uk /354 J. Domingue et al

On the corporate side, the BBC has been making use of RDF descriptions for some time.

BBC Backstage8 allows developers to make use of BBC programme data avail -able as RDF.

The BBC also made use of scalable RDF repositories for the back-end of the BBC world cup website9 to facilitate â€oeagile modeling†10.

This site was very popular during the event receiving over 2 million queries per day

Other examples of commercial interest include: the acquisition of Metaweb11 by Google to enhance search,

and the release of the Opengraph12 API by Facebook Mark Zuckerberg, Facebook†s CEO claimed recently that Open Graph was the â€oethe

most transformative thing we†ve ever done for the Web†13 3 Services on the Web

Currently the world of services on the Web is marked by the formation of two main

groups of services. On the one hand, â€oeclassical†Web services, based on WSDL and SOAP, play a major role in the interoperability within and among enterprises.

Web services provide means for the development of open distributed systems, based on decoupled components, by overcoming heterogeneity

and enabling the publishing and consuming of functionalities of existing pieces of software. In particular, WSDL is

used to provide structured descriptions for services, operations and endpoints, while SOAP is used to wrap the XML messages exchanged between the service consumer

and provider. A large number of additional specifications such as WS-Addressing WS-Messaging and WS-Security complement the stack of technologies

On the other hand, an increasing number of popular Web and Web 2. 0 applications as offered by Facebook, Google,

Flickr and Twitter offer easy-to-use, publicly avail -able Web APIS, also referred to as RESTFUL services (properly

when conforming to the REST architectural principles 7). RESTFUL services are centred around re -sources, which are interconnected by hyperlinks

and grouped into collections, whose retrieval and manipulation is enabled through a fixed set of operations commonly

implemented by using HTTP. In contrast to WSDL-based services, Web APIS build upon a light technology stack relying almost entirely on the use of URIS, for both

resource identification and interaction, and HTTP for message transmission The take up of both kinds of services is hampered,

however by the amount of manual effort required when manipulating them. Research on Semantic web services

8 has focused on providing semantic descriptions of services so that tasks such as the discovery, negotiation, composition and invocation of Web services can have a

higher level of automation. These techniques, originally targeted at WSDL services have highlighted a number of advantages

and are currently being adapted towards lighter and more scalable solutions covering Web APIS as well 8 http://backstage. bbc. co. uk

/9 http://news. bbc. co. uk/sport1/hi/football/world cup 2010/default. stm 10 http://www. bbc. co. uk/blogs/bbcinternet/2010/07/bbc world cup 2010 dynamic sem. html

11 http://www. freebase. com /12 http://developers. facebook. com/docs/opengraph 13 http://news. cnet. com/8301-13577 3-20003053-36. html

Fostering a Relationship between Linked Data and the Internet of Services 355 4 Linked Services

The advent of the Web of Data together with the rise of Web 2. 0 technologies and

social principles constitute, in our opinion, the final necessary ingredients that will ultimately lead to a widespread adoption of services on the Web.

The vision toward the next wave of services, first introduced in 9 and depicted in Figure 1,

is based on two simple notions 1. Publishing service annotations within the Web of Data, and

2. Creating services for the Web of Data, i e.,, services that process Linked Data and/or generate Linked Data

We have devoted since then significant effort to refining the vision 10 and imple -menting diverse aspects of it such as the annotation of services and the publication of

services annotations as Linked Data 11,12, as well as on wrapping, and openly exposing, existing RESTFUL services as native Linked Data producers dubbed Linked

Open Services 13,14. It is worth noting in this respect that these approaches and techniques are different means contributing to the same vision

and are not to be con -sidered by any means the only possible approaches. What is essential though is ex

-ploiting the complementarity of services and the Web of Data through their integra -tion based on the two notions highlighted above

As can be seen in Figure 2 there are three main layers that we consider. At the bot

-tom are Legacy Services which are services which may be based WSDL or Web APIS, for which we provide in essence a Linked Data-oriented view over existing

functionality exposed as services. Legacy services could in this way be invoked, either Fig. 2. Services and the Web of Data

356 J. Domingue et al by interpreting their semantic annotations (see Section 4. 1) or by invoking dedi

-cated wrappers (see Section 4. 2) and RDF information could be obtained on de -mand. In this way, data from legacy systems, state of the art Web 2. 0 sites, or sen

-sors, which do not directly conform to Linked Data principles can easily be made available as Linked Data

In the second layer Are linked Service descriptions. These are annotations describ -ing various aspects of the service which may include:

the inputs and outputs, the func -tionality, and the nonfunctional properties. Following Linked Data principles these

are given HTTP URIS, are described in terms of lightweight RDFS vocabularies, and are interlinked with existing Web vocabularies. Note that we have made already our

descriptions available in the Linked Data Cloud through iserve these are described in more detail in Section 4. 1

The final layer in Figure 2 concerns services which are able to consume RDF data

either natively or via lowering mechanisms), carry out the concrete activity they are responsible for, and return the result,

if any, in RDF as well. The invoking system could then store the result obtained or continue with the activity it is carrying out

using these newly obtained RDF triples combined with additional sources of data Such an approach, based on the ideas of semantic spaces, has been sketched for the

manipulation functionality up to highly complex processing beyond data fusion that might even have real-life side-effects.

The use of services as the core abstraction for constructing Linked Data applications is therefore more generally applicable than that

of current data integration oriented mashup solutions We expand on the second and third layers in Figure 2 in more detail below

4. 1 Implementing Linked Services with Linked Data-based Annotations One thread of our work on Linked Services is based on the use of Linked Data-based

descriptions of Linked Services allowing them to be published on the Web of Data and using these annotations for better supporting the discovery, composition and

and SA-REST for Web APIS. To cater for interoperability, MSM represents essentially the intersection of the structural parts of

Additionally, as opposed to most Semantic web services research to date, MSM supports both â€oeclassical†WSDL Web services, as well as a procedural

view on the increasing number of Web APIS and RESTFUL services, which appear to be preferred on the Web

Fostering a Relationship between Linked Data and the Internet of Services 357 Fig. 3. Conceptual model for services used by iserve

As it can be seen in Figure 3, MSM defines Services, which have a number of Op

-erations. Operations in turn have input, output and fault Messagecontent descrip -tions. Messagecontent may be composed of mandatory or optional Messageparts

language nor does it provide any specific vocabulary that users should adopt WSMO-Lite builds upon SAWSDL by extending it with a model specifying the

to model information particular to Web APIS, such as a method to indicate the HTTP method used for the invocation

The former is based a web tool that assists users in the creation of semantic annotations of Web APIS,

which are described typically solely through an unstructured HTML Web page. SWEET14 can open any web page and directly insert annotations following the hrests/Microwsmo microformat.

It enables the completion of the following key tasks 14 http://sweet. kmi. open. ac. uk

/358 J. Domingue et al •Identification of service properties within the HTML documentation with the help

of hrests •Integrated ontology search for linking semantic information to service properties •Adding of semantic annotations

•Saving of semantically annotated HTML service description, which can be repub -lished on the Web

•Extraction of RDF service descriptions based on the annotated HTML Similarly, the second tool, SOWER, assists users in the annotation of WSDL services

and is based in this case on SAWSDL for adding links to semantic descriptions as well as lifting and lowering mechanisms.

During the annotation both tools make use of the Web of Data as background knowledge so as to identify

and reuse existing vocabularies. Doing so simplifies the annotation and additionally it also leads to ser

sources of Linked Data The annotation tools are connected both to iserve for one click publication. is

development on the Web and on service discovery algorithms to provide a generic semantic service registry able to support advanced discovery over both Web APIS and

WSDL services described using heterogeneous formalisms. iserve is, to the best of our knowledge, the first system to publish web service descriptions on the Web of

Data, as well as the first to provide advanced discovery over Web APIS comparable to that available for WSDL-based services.

Thanks to its simplicity, the MSM captures the essence of services in a way that can support service matchmaking and invocation

-based descriptions of Web services, with OWL-S services, and with services anno -tated according to WSMO-Lite and Microwsmo

-posed following the Linked Data principles and a range of advanced service analysis and discovery techniques are provided on top.

-cation Is linked based on Data principles, application developers can easily discover services able to process or provide certain types of data,

and other Web systems can seamlessly provide additional data about service descriptions in an incremental and

distributed manner through the use of Linked Data principles. One such example is for instance LUF (Linked User Feedback) 16,

which links service descriptions with users ratings, tags and comments about services in a separate server.

On the basis of these ratings and comments, service recommendation facilities have also been imple

-mented17 15 http://iserve. kmi. open. ac. uk /16 http://soa4all. isoco. net/luf/about

/17 http://technologies. kmi. open. ac. uk/soa4all-studio/consumption-platform/rs4all /Fostering a Relationship between Linked Data and the Internet of Services 359

In summary, the fundamental objective pursued by iserve is to provide a platform able to publish service annotations,

with services and the invocation process itself, via the generation of appropriate user interfaces. Based on the annotations the user is presented with a set of fields, which

must be completed to allow the service to execute, and these fields cover input pa -rameters as well as authentication credentials.

and Consume Linked Data In this section we consider the relationship between service interactions and Linked

Data; that is, how Linked Data can facilitate the interaction with a service and how the result can contribute to Linked Data.

In other words, this section is not about an -notating service descriptions by means of ontologies and Linked Data, but about how

services should be implemented on top of Linked Data in order to become first class citizens of the quickly growing Linking Open Data Cloud.

Note that we take a purist view of the type of services which we consider.

These services should take RDF as input and the results should be available as RDF;

i e.,, service consume Linked Data and service produce Linked Data. Although this could be considered restrictive, one

main benefit is that everything is instantaneously available in a machine-readable form Within existing work on Semantic web Services,

considerable effort is expended often in lifting from a syntactic description to a semantic representation and lowering from a

semantic entity to a syntactic form. Whereas including this information as annotations requires a particular toolset

and platform to interpret them, following Linked Data and 18 http://soa4all. isoco. net/spices/about

only required platform to interact with them is the Web (HTTP) itself As a general motivation for our case, we consider the status quo of the services of

-fered over the geonames data set, a notable and †lifelong†member of the Linking

Open Data Cloud, which are offered primarily using JSON -and XML-encoded mes -saging. A simple example is given in Table 1,

it conveys neither the result†s internal semantics nor its interlinkage with existing data sets.

in Linked Data, on the other hand, geonames itself provides a predicate and values for country codes and the WGS84 vocabulary is used widely for latitude and

Linked Data sets) 20 but the string value does not convey this interlinkage A solution more in keeping with the Linked Data principles,

as seen in our version of these services, 21 uses the same languages and technologies in the implementation

•reusing URIS from Linked Data source for representing features in input and output messages

relationship more useful as Linked Data, the approach of Linked Data Services LIDS) 25 is to URL-encode the input.

/Fostering a Relationship between Linked Data and the Internet of Services 361 resource identifier. This URI is used then as the subject of such a triple, encoding

Linked Data and Services mailing list23, a URI representing the input is returned using the standard Content-Location HTTP header field.

whereas a user-encoded input may use variable decimal places for latitude and longi -tude.

-encoded, it can first BE POSTED as a new resource (Linked Data and Linked Data Services so far concentrate on resource retrieval and therefore primarily the HTTP

-sages using SPARQL graph patterns. While this is a design decision, it aims at the greatest familiarity and ease for Linked Data developers.

It is not without precedent in semantic service description 26. The authors of 26 use the SPARQL query lan

-guage to formulate user goals, and to define the pre-and post-conditions of SAWSDL-based service descriptions,

which to some degree, at least conceptually matches the ideas of our approach of using graph patterns for describing inputs (a pre

-though, the use of SPARQL is similar across different proposals, how the patterns are exploited again offers alternative,

On the one hand, atomic user desires can be encoded as a CONSTRUCT query and, under certain restrictions24, query processing techniques can be used to

whose results can be combined to satisfy the initial user request. On the other hand, where more sophisticated control flow is needed, a proc

defining the dataflow between services within a process, defined again as SPARQL CONSTRUCT queries. Work is ongoing on graph pattern-based discovery and proc

In this paper we have outlined how Linked Data provides a mechanism for describing services in a machine readable fashion and enables service descriptions to be seam

-lessly connected to other Linked Data. We have described also a set of principles for how services should consume

and produce Linked Data in order to become first-class Linked Data citizens From our work thus far, we see that integrating services with the Web of Data, as

depicted before, will give birth to a services ecosystem on top of Linked Data whereby developers will be able to collaboratively

and incrementally construct com -plex systems exploiting the Web of Data by reusing the results of others.

The system -atic development of complex applications over Linked Data in a sustainable, efficient and robust manner shall only be achieved through reuse.

We believe that our ap -proach is a particularly suitable abstraction to carry this out at Web scale

We also believe that Linked Data principles and our extensions can be generalized to the Internet of Services.

That is, to scenarios where services sit within a generic Internet platform rather than on the Web.

These principles are Global unique naming and addressing scheme-services and resources con -sumed and produced by services should be subject to a global unique naming and

addressing scheme. This addressing scheme should be easily resolvable such that software clients are able to access easily underlying descriptions

Linking †linking between descriptions should be supported to facilitate the reuse of descriptions and to be able to specify relationships

Service abstraction †building from SOA principles functionality should be en -capsulated within services which should have a distinct endpoint available on the

Internet, through which they can be invoked using standard protocols Machine processability †the descriptions of the services and resources should be

Following from the above we believe that the Future Internet will benefit greatly from a coherent approach which integrates service orientation with the principles

underlying Linked Data. We are also hopeful that our approach provides a viable starting point for this.

the Future Internet work and also note that proposals already exist for integrating Linked Data at the network level25

Acknowledgements. This work was funded partly by the EU project SOA4ALL (FP7 -215219) 26. The authors would like to thank the members of the SOA4ALL project and

/Fostering a Relationship between Linked Data and the Internet of Services 363 Open Access. This article is distributed under the terms of the Creative Commons Attribution

The Semantic web. Scientific American 284 (5 34†43 (2001 2. Brickley, D.,Guha, D.,,R. V. eds.:

Linking Data from RESTFUL Services. In: Workshop on Linked Data on the Web at WWW 2010 (2010

4. Speiser, S.,Harth, A.:Taking the LIDS off Data Silos. In: 6th International Conference on

Semantic Systems (I-SEMANTICS)( October 2010 5. Cardoso, J.,Barros, A.,May, N.,Kylau, U.:

Towards a Unified Service Description Lan -guage for the Internet of Services: Requirements and First Developments.

In: IEEE Int†l Conference on Services Computing, July 2010, pp. 602†609 (2010 6. Berners-Lee, T.:

Linked Data-Design Issues (July 2006), http://www. w3. org /Designissues/Linkeddata. html 7. Fielding, R. T.:

Architectural styles and the Design of Network-based Software Architec -tures. Phd Thesis, University of California (2000

8. Mcilraith, S. A.,Son, T. C.,Zeng, H.:Semantic web Services. IEEE Intelligent Sys -tems 16 (2), 46†53 (2001

9. Pedrinaci, C.,Domingue, J.,Krummenacher, R.:Services and the Web of Data: An Unex

-ploited Symbiosis. In: AAAI Spring Symposium â€oelinked Data Meets Artificial Intelli -genceâ€, March 2010, AAAI Press, Menlo Park (2010

10. Pedrinaci, C.,Domingue, J.:Toward The next Wave of Services: Linked Services for the Web of Data.

Journal of Universal Computer science 16 (13), 1694†1719 (2010 11. Maleshkova, M.,Pedrinaci, C.,Domingue, J.:

Supporting the creation of semantic REST -ful service descriptions. In: Workshop: Service Matchmaking and Resource Retrieval in

the Semantic web at ISWC (November 2009 12. Pedrinaci, C.,Liu, D.,Maleshkova, M.,Lambert, D.,Kopecky, J.,Domingue, J.:

iserve: a Linked Services Publishing Platform. In: Workshop: Ontology Repositories and Editors for the Semantic web at ESWC (June 2010

13. Krummenacher, R.,Norton, B.,Marte, A.:Towards Linked Open Services and Processes In: Future Internet Symposium, October 2010, pp. 68†77

14. Norton, B.,Krummenacher, R.:Consuming Dynamic Linked Data. In: 1st International Workshop on Consuming Linked Data (November 2010

15. Benslimane, D.,Dustdar, S.,Sheth, A.:Services Mashups: The New Generation of Web Applications.

IEEE Internet Computing 12 (5), 13†15 (2008 16. Phuoc, D. L.,Polleres, A.,Hauswirth, M.,Tummarello, G.,Morbidoni, C.:

Rapid Prototyp -ing of Semantic Mash-ups Through Semantic web Pipes. In: 18th Int†l Conference on

World wide web, April 2009, pp. 581†590 (2009 17. Maleshkova, M.,Kopecky, J.,Pedrinaci, C.:Adapting SAWSDL for Semantic Annota

-tions of RESTFUL Services. In: Workshop: Beyond SAWSDL at OTM, November 2009 pp. 917†926 (2009

An HTML Microformat for Describing RESTFUL Web Services. In: IEEE/WIC/ACM Int†l Conference on Web Intelligence and In

-telligent Agent Technology, December 2008, pp. 619†625 (2008 19. Vitvar, T.,Kopeckã, J.,Viskova, J.,Fensel, D.:

WSMO-lite annotations for web services In: Bechhofer, S.,Hauswirth, M.,Hoffmann, J.,Koubarakis, M. eds.

ESWC 2008 LNCS, vol. 5021, pp. 674†689. Springer, Heidelberg (2008 20. Martin, D.,Burstein, M.,Hobbs, J.,Lassila, O.,Mcdermott, D.,Mcilraith, S.,Narayanan

Semantic Markup for Web Services. Technical Report, Member Submission, W3c (2004 21. Fensel, D.,Lausen, H.,Polleres, A.,de Bruijn, J.,Stollberg, M.,Roman, D.,Domingue, J

Enabling Semantic web Services-The Web Service Modeling Ontology. Springer, Hei -delberg (2006 22. Farrell, J.,Lausen, H.:

Extended Semantic web Conference Posters (June 2010 25. Speiser, S.,Harth, A.:Towards Linked Data Services.

In: Int†l Semantic web Conference Posters and Demonstrations (November 2010 26. Iqbal, K.,Sbodio, M. L.,Peristeras, V.,Giuliani, G.:

Semantic Service Discovery using SAWSDL and SPARQL. In: 4th Int†l Conference on Semantics, Knowledge and Grid, De

-cember 2008, pp. 205†212 (2008 Part VII Future Internet Areas: Content Part VII: Future Internet Areas:

Content 367 Introduction One of the major enablers for the evolution to the Future Internet will be the huge

volumes of multimedia content. The new, powerful, low-cost and user friendly cap -turing devices (e g. mobile phones, digital cameras, IP networked cameras) supported

by new multimedia authoring tools will significantly increase the user generated con -tent. On the other hand, new media sensor networks and tele-immersion applications

will further increase the use of automatic generated content. As a result, the Internet as we know it today will be challenged

and a r) evolution towards Media Internet will be initiated The Media Internet is defined as the Future Internet variation which supports pro

-fessional and novice content producers and is at the crossroads of digital multimedia content and Internet technologies.

It encompasses two main aspects: Media being delivered through Internet networking technologies (including hybrid technologies

and Media being generated, consumed, shared and experienced on the Web The Media Internet is evolving to support novel user experiences such as immer

-sive environments including sensorial experiences beyond video and audio (engaging all the human senses including smell,

taste and haptics) that are adaptable to the user the networks and the provisioned services

The objective of this section is to offer different views on the processes, techniques and technologies which may pave the way for a Future Media Internet

First of all, the Future Media Internet should be based on network architectures that can deal with content as a native type,

and for this reason the content oriented net -work architectures for multimedia content delivery will produce a major revolution in

the way that content is processed and delivered though the Internet. One particular case concerns content distributed through hybrid and heterogeneous network architec

-tures, e g. hybrid broadcast and Internet delivery enhancing the immersive experience of the user beyond the classical DIGITAL TV interactivity

Second, enhancing media encoding technologies is required for the Internet with the objective to maintain the overall integrity,

and adapt the content to the network delivery device and user, and also optimize the quality of experience over the Internet

Third, one of the areas where high investment in research has taken place in recent years is related to the multimedia and multimodal search and retrieval of multimedia

objects over the Internet Last but not least, collaborative platforms for the experimentation of socially aug -mented and mixed reality applications are needed to produce advanced applications

for the users, and social media including personalization and recommendation, is one of the key orientations of future media technologies.

An increasingly large amount of content on the Web, whether multimedia or text is generated collaboratively user

content, of which the quality is not always controllable In relation to the first point, content oriented network architectures, the paper â€oeme

-dia Ecosystems: A Novel Approach for Content-Awareness in Future Networks†describes a novel architecture for the deployment of a networked â€oemedia Ecosystemâ€

based on a flexible cooperation between providers, operators, and end-users, finally enabling every user †first †to access the offered multimedia services in various con

-368 Part VII: Future Internet Areas: Content texts, and †second †to share and deliver his/her own audiovisual content dynami

-cally, seamlessly, and transparently to other users. The architecture also relies on autonomous systems to supply users with the necessary infrastructure and a security

framework Concerning the second point, media encoding technologies for the Internet, the ob -jective of the chapter â€oescalable and Adaptable Media Coding Techniques for Future

Internet†discusses SVC (Scalable Video Coding) and MDC (Multiple Description Coding) techniques along with the real experience of the authors of SVC/MDC over

P2p networks and emphasizes their pertinence in Future Media Internet initiatives in order to decipher potential challenges

For the third point, multimodal and multimedia search and retrieval in the future Internet, the chapter â€oesemantic Context Inference in Multimedia Search†reviews the

latest advances in semantic context inference, in which systems exploit the semantic context embedded in multimedia content and its surroundings in order to build a contex

-tual representation scheme. The authors introduce their ideas on how to enable systems to automatically construct semantic context by learning from the available content

Federico Alvarez, Theodore Zahariadis, Petros Daras, and Henning Mà ller J. Domingue et al. Eds.):) Future Internet Assembly, LNCS 6656, pp. 369†380,2011

 The Author (s). This article is published with open access at Springerlink. com Media Ecosystems:

A Novel Approach for Content -Awareness in Future Networks H. Koumaras1, D. Negru1, E. Borcoci2, V. Koumaras5, C. Troulos5, Y. Lapid7

E. Pallis8, M. Sidibã 6, A. Pinto9, G. Gardikis3, G. Xilouris3, and C. Timmerer4 1 CNRS Labri laboratory, University of Bordeaux, France

koumaras@ieee. org, daniel. negru@labri. fr 2 Telecommunication Dept.,University Politehnica of Bucharest (UPB), Romania

eugen. borcoci@elcom. pub. ro 3 Institute of Informatics and Telecommunications, NCSR Demokritos, Greece {gardikis, xilouris}@ iit. demokritos. gr

4 Multimedia Communication, Klagenfurt University, Austria christian. timmerer@itec. uni-klu. ac. at 5 PCN, Greece

vkoumaras@pcngreece. com, ktroulos@pcngreece. com 6 VIOTECH Communications, France msidibe@viotech. net 7 Optibase Technologies Ltd, Israel

Yaell@optibase. com 8 Applied Informatics and Multimedia Dept.,TEI of Crete, Greece pallis@pasiphae. teiher. gr

9 INESC Porto, Portugal apinto@inescporto. pt Abstract. This chapter proposes a novel concept towards the deployment of a

networked †Media Ecosystemâ€. The proposed solution is based on a flexible co -operation between providers, operators,

and end-users, finally enabling every user first to access the offered multimedia services in various contexts, and second

to share and deliver his own audiovisual content dynamically, seamlessly, and transparently to other users.

Towards this goal, the proposed concept provides content-awareness to the network environment, network-and user context

-awareness to the service environment, and adapted services/content to the end user for his best service experience possible,

taking the role of a consumer and/or producer Keywords: Future Internet, Multimedia Distribution, Content Awareness, Net

-work Awareness, Content/Service Adaptation, Quality of Experience, Quality of Services, Service Composition, Content-Aware Network

1 Introduction One of the objectives of the future communication networks is the provision of audio

The end user (EU) is interested ultimately in getting a 370 H. Koumaras et al good Quality of Experience (Qoe) at convenient prices.

and react to the Qoe level at user ter -minals, offer to the EU a wide range of potential choices,

and provision of very high-volume video data •Second, the development of advanced networking technologies in the access and

core parts, with Qos assurance is seen. A flexible way of usage †based on virtual -ised overlays †can offer a strong support for the transportation of multimedia

flows •Third, the todays†software technologies support the creation and composition of services while being able to take into account information regarding the trans

-port/terminal contexts and adapt the services accordingly Bringing together in a synergic way all the above factors, a new â€oemedia Ecosystemâ€

-work neutrality has been the foundational principle of the Internet, albeit today is revisited by service providers,

-ity provision and profit, to allow sustainable new forms of multimedia communica -tions with an increasing importance in the future Internet

This suggests that the emerging approach of Content-Aware Networks (CAN) and Network-Aware services/Applications (NAA) can be a way to overcome the tradi

nodes, can be a foundation for an user-centric approach (i e. satisfying the different Media Ecosystems:

needs of individual users) or service-centric approach (i e. satisfying the different needs of various service types), that is required for the future services and applica

Based on virtualization, the network can offer enhanced transport and adaptation-capable services This chapter will introduce

finally provide the end user with the best and most complete service experience via a Media Ecosystem, aiming to provide content-awareness to the network environment

network-and user context-awareness to the service environment, and adapted ser -vices/content to the end user†s Environment

which the Future Internet development should follow. Among other issues, a higher coupling between application and network layers are investigated,

performance (for multimedia) but without losing modularity of the architecture. 3 -11. The CAN/NAA approach can naturally lead to a user-centric infrastructure and

telecommunication services as described in 3. The strong orientation of user-centric awareness to services and content is emphasized in 4. The works 5-6 consider that

CAN/NAA can offer a way for evolution of networks beyond IP, while Qoe issues

The virtualisation as a powerful tool to overcome the Internet ossification by creating overlays is discussed in 10-11.

•User Environment (UE), to which the end users belong •Service Environment (SE), to which the service and content providers belong

The User Environment (UE) includes all functions related to the discovery, sub -scription, consumption of the services by the EUS. At the Service Environment (SE

User and service mobility is targeted also Below the SE there is a new Home-Box (HB) layer to coordinate the actual content

users with advanced context-aware multimedia services in a consistent and interoper -able way. It enables uniform access for heterogeneous terminals and supports en

At the HB layer, the advanced user context management and monitoring functions provides real-time information on user context

and network conditions, allowing better control over multimedia delivery and intelli -gent adaptation. The assembly of HBS is called layer

because the HBS can logically communicate with each other in both client server style but also in peer-to-peer (P2p

single or multiple core network domains having content aware processing capabilities in terms of Qos, monitoring, media flow adaptation, routing/forwarding and security

-enabled routers, which together with the associated managers and the other elements of the ecosystem, offer content-and context-aware Quality of Service/Experience, adapta

user preferences, terminal capabilities Media Ecosystems: A Novel Approach for Content-Awareness in Future Networks 373

dedicated user profile management and/or monitoring entities/subsystems The adaptation deployed at the CAN layer will be performed in the Media-Aware

, service, content, network) to consumers/end users At the border to the user, i e.,, the Home-Box, adaptation modules are deployed

enabling device-independent access to the SVC-encoded content by providing X-to -SVC and SVC-to-X transcoding functions with X={MPEG-2, MPEG-4 Visual

, no duplicates), making it free for (other) data (e g.,, more enhance -ment layers The key innovations of this approach to service/content adaptation are †distrib

This is responsible for the actual routers configuration in its own network, based on cooperation with the CAN Manager

and Data Planes (MPL, CPL, DPL), parallel and cooperating (not represented explicitly in the picture.

The upper data plane interfaces at the CAN layer and transport the packets between the VCAN layer and the Home-Box layer in both directions.

radical approach can also be envisaged towards full virtualization (i e. independent management and control per VCAN

The media data flows, are classified intelligently at ingress MANES, and associated to the appropriate VCANS in order to be processed accordingly based on:(

Figure 2 depicts an example to illustrate the principle of Internet parallelization based on VCANS, with focus on the classification process performed at ingress

-structed how to classify the data packets, based on information as: VCAN IDS, Con -tent description metadata, headers to analyse, Qos class information, policies, PHB â€

At its turn, the SM@SP instructs the SP/CP servers how to mark the data packets

The data packets are analysed by the classifier, assigned and forwarded to one of the VCANS for further processing.

Special algorithms are needed to reduce the amount of processing of MANE in the data plane based on deep analysis of the first packets of a

flow and usage of hashing functions thereafter AS2 AS1 AN HB SP/CP server AS3

VCAN1/MQC1 VCAN2/MQC2 VCAN3/MQC3 L2, L3, L4 headers High level headers VCAN ID Content description

avoiding per-flow signalling in the core part of the network. In the new architecture MANE also can act as content â€oecachesâ€,

1) data confiden -tiality, integrity and authenticity; and 2) intelligent and distributed access control policy-based enforcement

The evaluation algorithm considers the user flow characteristics CAN policies and present network conditions. In order to attain the required flexibil

7 on top of the MANES routers The second objective will pursue a content-aware approach that will be enforced

by MANE routers over data in motion. Such security enforcement will be done ac -cordingly to policies and filtering rules obtained from the CANMGR.

MANE routers will derive filtering rules from packet inspection and will inform the CANMGR about those

inspection of data traversing a security element placed in a specific point in the net

The proposed approach differs by being based on MANE routers, which will be used to construct CANS

multimedia services (e g.,, IPTV) in different modes (e g. P2p Content is offered to the CCS or SPS through quality guarantee schemes such as

-tween CPS and NPS for hosting or co-locating CP€ s content servers in NPS€ premises

and ensuring a satisfactory level of Qos for the end users (by appropriating resources to network upgrades etc.

User context is taken not into consideration by the Service or Content Provider (SP/CP) delivering the service (content),

and therefore they are not able to deliver and adapt the service (content) to the capabilities of the end user equip

-ment. Also, current architectures do not include any information exchange between the network and service layers,

Also, users may influence service delivery options by requesting specific content on specific priority conditions for a specific period of time (context-awareness

On the user side, it increases choice and reduces switching costs between content providers (network

) In addition, the end user, as a key business actor, can effectively increase the level of choice in content and services by selecting,

Eventually the end user will have a choice of service access methods: anywhere, any -time and in any context with the appropriate awareness degree 1

user privacy is a major concern since it directly relates to the consolidation of infor -mation sources where user preferences and habits may be retrieved

and exploited by third parties 5 Conclusions This chapter has presented a novel Media-Ecosystem architecture, which introduces

A Novel Architecture for Multimedia Distribution based on Content-Aware Networking. In: CTRQ 2010 Conference Proceedings (2010

User-Centric Future Internet and Telecommunication Services. In: Tselentis G.,et al. eds.)) Towards the Future Internet, pp. 217†226.

IOS Press, Amsterdam (2009 4. Schã nwã¤lder, J.,et al.:Future Internet=Content+Services+Management.

IEEE Com -munications Magazine 47 (7), 27†33 (2009 5. Zahariadis, T.,et al.:Content Adaptation Issues in the future Internet.

In: Tselentis, G.,et al. (eds. Towards the Future Internet, pp. 283†292. IOS Press, Amsterdam (2009

6. Huszã¡k, Ã.,Imre, S.:Content-aware Interface Selection Method for Multi-Path Video

Streaming in Best-effort Networks. In: Proc. of 16th International Conference on Tele -communications, Marrakech, Morocco, Jul. 2009, pp. 196†201 (2009

7. Liberal, F.,et al.:Qoe and*-awareness in the future Internet. In: Tselentis, G.,et al. eds Towards the Future Internet, pp. 293†302.

IOS Press, Amsterdam (2009 8. Martini, M. G.,et al.:Content Adaptive Network Aware Joint Optimization of Wireless

Video Transmission. IEEE Communications Magazine 45 (1), 84†90 (2007 9. Baker, N.:Context-Aware Systems and Implications for Future Internet.

In: Tselentis, G et al. eds.)) Towards the Future Internet, pp. 335†344. IOS Press, Amsterdam (2009

10. Anderson, T.,et al.:Overcoming the Internet Impasse through Virtualization. Com -puter 38 (4), 34†41 (2005

11. Chowdhury, N m.,Boutaba, R.:Network Virtualization: State of the art and Research Challenges. IEEE Communications Magazine 47 (7), 20†26 (2009

12. Levis, P.,et al.:The Meta-Qos-Class Concept: a Step Towards Global Qos Interdomain

Services. Proc. IEEE, Softcom, Oct. 2004 (2004 13. Paris Flegkas, et al. Provisioning for Interdomain Quality of Service:

the MESCAL Ap -proach. IEEE Communications Magazine (June 2005 14. Timmerer, C.,et al.:Scalable Video Coding in Content-Aware Networks:

Research Chal -lenges and Open Issues. In: Proc. International Tyrrhenian Workshop on Digital Commu -nications (ITWDC), Ponza, Italy (September 2010

) Future Internet Assembly, LNCS 6656, pp. 381†389,2011  The Author (s). This article is published with open access at Springerlink. com

Future Internet Naeem Ramzan and Ebroul Izquierdo School of Electronic Engineering and Computer science, Queen Mary University of London

Mile end, London E1 4ns, United kingdom {Naeem. Ramzan, Ebroul. Izquierdo}@ elec. qmul. ac. uk Abstract.

High quality multimedia contents can distribute in a flexible, effi -cient and personalized way through dynamic and heterogeneous environments

in Future Internet. Scalable Video Coding (SVC) and Multiple Description Coding (MDC) fulfill these objective thorough P2p distribution techniques

pertinence in Future Media Internet initiatives in order to decipher potential challenges Keywords: Scalable video coding, multiple description coding, P2p distribution

Future Media Internet will entail to distribute and dispense high quality multimedia contents in an efficient, supple and personalized way through dynamic and heteroge

-neous environments. Multimedia content over internet are becoming a well-liked application due to users'growing demand of multimedia content and extraordinary

growth of network technologies. A broad assortment of such applications can be found in these days, e g. as video streaming, video conferencing, surveillance, broad

-cast, e-learning and storage. In particular for video streaming, over the Internet are becoming popular due to the widespread deployment of broadband access.

In custom -ary video streaming techniques the client-server model and the usage of Content Dis

to support media streaming over internet. However, the conventional client server architecture severely limits the number of simultaneous users for bandwidth intensive

video streaming, due to a bandwidth bottleneck at the server side from which all users request the content.

In contrast, Peer-to-peer (P2p) media streaming protocols, moti -vated by the great success of file sharing applications, have attracted a lot of interest

in academic and industrial environments. With respect to conventional approaches, a major advantage in using P2p is that each peer involved in a content delivery contrib

-taneously to different users according to their capabilities and limitations In order to handle such obscurity, scalability emerged in the field of video coding

user adaptation without using intricate error protection methods. The objective of MDC is to generate numerous independent descriptions that can bestow to one or

which is common in best-effort networks such as the Internet, will not interrupt the reproduction of the stream

MDC combined with path/server diversity offers robust video delivery over unreliable networks and/or in peer-to-peer

The eventual objective of employing SVC/MDC in Future Internet is to maximize the end-users'quality of experience (Qoe) for the delivered multimedia content by

selecting an appropriate combination of the temporal, spatial and quality parameters for each client according to the limitation of network and end user devices

This chapter starts with an overview of SVC and MDC source coding techniques in section 2 and 3. Section 4 describes how to adapt SVC for P2p distribution for Future

Internet. MDC over P2p is explained in section 5. Finally, this chapter concludes in section 6

Scalable and Adaptable Media Coding Techniques for Future Internet 383 wavelet 1 and hybrid video coding 2 techniques.

i e. number of pixels per spatial region in a video frame •Quality scalability, or commonly called SNR (Signal-to-noise-Ratio) scalability

pixels from the compressed bit-stream Fig. 1. A typical scalable video coding chain and types of scalabilities by going to lower-rate

distinctive types of data: wavelet coefficients representing of the texture information remaining after the wavelet transform

Finally, the resulting data are mapped into the scalable stream in the Scalable and Adaptable Media Coding Techniques for Future Internet 385

bit-stream organisation module, which creates a layered representation of the com -pressed data. This layered representation provides the basis for low-complexity adap

-tation of the compressed bit-steam 3 Scalable Multiple Description Coding (SMDC SMDC is a source coding technique,

-proaches for generating multiple descriptions include data partitioning (e g.,, even/odd sample or DCT coefficient splitting) 5, multiple description (MD) quantization

-ferent users, as shown in Figure 2 Fig. 2. An example of the proposed system for scalable video coding in P2p network

The proposed solution is a variation of the"Give-To-Get"algorithm 8, already im

Scalable and Adaptable Media Coding Techniques for Future Internet 387 already been downloaded. In the latter case, the piece picking policy will be the same

even if the overall download bandwidth is high This problem is critical if the requested piece belongs to the base layer,

download rates, which alone could provide the current peer with a transfer rate that is above a certain threshold.

However, every time the window shifts, the current download rates of all the neighbours are evaluated and the peers are sorted in descending order

/s) Video Download Rate Received Video Bitrate Fig. 4. Received download rate and received video bitrate for Crew CIF sequence

388 N. Ramzan and E. Izquierdo 5 Multiple Description Coding over P2p Network Most of the work on MDC is proposed for wireless applications in which there are

issues such as hand over of a client to another wireless source is present. However, in IP networks, it may be complicated more to have autonomous links among peers

Thus, additional redundancy introduced by using MDC over internet need to be care -fully evaluated

Scalable and Adaptable Media Coding Techniques for Future Internet 389 MDC over SVC is that the receiver/client can make a reproduction of the video when

content distribution over Future Internet. These coding schemes provide natural ro -bustness and scalability to media streaming over heterogeneous networks.

Internet challenges. Tangibly, SVC/MDC over P2p presumes an excellent approach to facilitate future media applications and services,

Quality of Experience (Qoe) of the users. At last, we persuade Future Internet initia -tives to take into contemplation these techniques when defining new protocols for

ground-breaking services and applications Acknowledgement. This research has been funded partially by the European Com -mission under contract FP7-248474 SARACEN

-dence of software proposal for Wavelet Video Coding Exploration group, ISO/IEC JTC1/SC29/WG11/MPEG2006/M13146, 76th MPEG Meeting, Montreux, Switzerland

Multimedia Search Qianni Zhang and Ebroul Izquierdo School of Electronic Engineering and Computer science Queen Mary University of London, UK

{qianni. zhang, ebroul. izquierdo}@ elec. qmul. ac. uk Abstract. Multimedia content is usually complex and may contain

many semantically meaningful elements interrelated to each other. There -fore to understand the high-level semantic meanings of the content, such

context can be constructed by learning from data. In the target represen -tation scheme, metadata is divided into three levels:

built using from a small amount of training data. Semantic inference and reasoning is performed then based on the model to decide the relevance

Multimedia retrieval, context inference, mid-level features Bayesian network 1 Introduction In realistic multimedia search scenarios, high-level queries are used usually and

search engines are expected to be able to understand underlying semantics in content and match it to the query.

Researchers have started naturally thinking of exploiting context for retrieving semantics. Content is usually complex and

In latest content-based multimedia retrieval approaches, it is often pro -posed to build some forms of contextual representation schemes for exploiting

the semantic context embedded in multimedia content. Such techniques form a key approach to supporting eï cient multimedia content management and search

in the Internet. In the literature, such approaches usually incorporates domain knowledge to assist deï nition of the context representation.

However, this kind J. Domingue et al. Eds.):) Future Internet Assembly, LNCS 6656, pp. 391†400,2011

câ The Author (s). This article is published with open access at Springerlink. com 392 Q. Zhang and E. Izquierdo

which could be online databases, a representation scheme for its semantic context is learned directly from data

and will not be restricted to the pre-deï ned semantic structures in speciï c application domains

-data extracted from multimedia content into three levels-low, mid and high -according to their levels of semantic abstraction and try to deï ne the mapping

fully understandable by users; while high-level features contains a high degree of semantic reasoning about the meaning or purpose of the content itself.

-tively easy to solve using the well-deï ned algorithms in the state-of-the-art, the mapping between mid-and high-level features are still diï cult.

amount of training data. Semantic inference and reasoning is carried then out based on the learned model to decide

and are extracted using algorithms with reasonable per -formance The rest of this chapter is organised as follows:

state-of-the-art techniques on context reasoning for multimedia retrieval task Section 3 describes the three representation levels of multimedia content and

the implemented mid-level features; Section 4 presents the proposed technique Semantic Context Inference in Multimedia Search 393

for semantic context learning and inference for mid-level to high-level matching Section 5 shows selected experimental results and the chapter is concluded with

to storing and enforcing high-level information include neural networks, expert systems, statistical association, conditional probability distributions, diï €erent

function which denotes the presence of a multimedia object is called a multiject The interaction between the multijects is modelled then using a Bayesian net

3 Three-Level Multimedia Representation The aim of multimedia retrieval techniques is to elicit, store and retrieve the

audio-and imagery-based information content in multimedia. Taking images as an example of various digital multimedia content types, the search for a

desired image from a repository might involve many image attributes including a particular combination of colour, texture or shape features, a speciï c type of

object; a particular type of event or scene; named individuals, locations or events subjectively associated emotions;

According to these attributes, the types of query in a multimedia retrieval scenario can be categorised into three levels of increasing complexity

-ios as semantic image retrieval. However, the semantic gap lying between levels 1 and 2 hampers the progress of multimedia retrieval area 19.

The semantic gap is commonly deï ned as â€oethe discrepancy between low-level features or con

algorithms, and the richness, and subjectivity of semantics in high-level human interpretations of audiovisual mediaâ€.

the most challenging task in semantic multimedia retrieval. Thus in this paper by dividing this task into two steps:

Semantic Context Inference in Multimedia Search 395 Figure 1 shows the work ï ow of this approach.

A subset of the database randomly selected for training purpose is annotated then manually on the high-level query

constructed automatically using a learning approach based on K2 algorithm 8 which is basically a greedy search technique.

algorithm, a Bayesian network is created by starting with an empty network and iteratively adding a directed arc to a given node from each parent node

the data. Due to the scope of this paper, we give only a brief introduction to K2

algorithm here. If the reader is interested in more details about this algorithm please refer to 8

Then in the inference stage, when an un-annotated data item is present, the Bayesian network model derived from the training stage conducts automatic

semantic inferences for the high-level query. The Bayesian network in this case represent the semantic context involving the mid-level features of this video and

exists in a piece of multimedia content considering the semantic context can be calculated as

The experiments were carried out on the good sized unedited video database Videos were segmented into shots

Semantic Context Inference in Multimedia Search 397 multimedia element for analysis and annotation. Several mid-level features were

selected by observing the content and they belong to Level 2 of the three-level representation scheme as described in Section 3. These mid-level features include

those commonly exist in the database with reasonable proportions and have relatively rich connections to the mid-level features:

took only a few seconds on a PC with Pentium D CPU 3. 40ghz and 2. 00gb of

Semantic Context Inference in Multimedia Search 399 between low-level visual features and high-level semantic terms.

out using the K2 algorithm. The proposed approach was tested on a large size video dataset. The obtained results have shown that this approach was capable

database Acknowledgments. The research that leads to this chapter was partially sup -ported by the European commission under the contracts FP6-045189 RUSHES

Beyond pixels: Exploiting camera metadata for photo classi -ï cation. Pattern recognition 38 (6), 935†946 (2005

-ceedings of the eighth ACM international conference on Multimedia, pp. 167†176 2000 3. Brand, M.,Oliver, N.,Pentland, A.:

IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pp. 994†999 (1997 4. Chang, E.,Goh, K.,Sychay, G.,Wu, G.:

Generating semantic visual templates for video databases In: 2000 IEEE International Conference on Multimedia and Expo, 2000.

ICME 2000, vol. 3 (2000 6. De Jong, F. M. G.,Westerveld, T.,De vries, A p.:

Multimedia search without visual analysis: the value of linguistic and contextual information. IEEE Transactions on

Tech. rep.,Institute for Image Data Re -search, University of Northumbria at Newcastle (1999), http://www. jisc. ac. uk

networks from data. Machine learning 9 (4), 309†347 (1992 400 Q. Zhang and E. Izquierdo

9. Fan, J.,Gao, Y.,Luo, H.,Jain, R.:Mining multilevel image semantics via hierar

IEEE Transactions on Multimedia 10 (2), 167†187 (2008 10. Fei-Fei, L.,Fergus, R.,Perona, P.:

IEEE Computer Society Conference on Computer Vi -sion and Pattern Recognition, vol. 2 (2003 12.

IEEE Computer Society Con -ference on Computer Vision and Pattern Recognition, vol. 2 (2004 13.

Kherï, M. L.,Ziou, D.:Image collection organization and its application to in -dexing, browsing, summarization,

multimedia 9 (4), 893†900 (2007 14. Koskela, M.,Smeaton, A f.,Laaksonen, J.:Measuring concept similarities in multi

IEEE Transactions on Multimedia 9 (5 912†922 (2007 15. Lavrenko, V.,Feng, S.,Manmatha, R.:

Signal Processing ICASSP€ 04, vol. 3, IEEE Computer Society Press, Los Alamitos 2004 16. Naphade, M. R.,Huang, T s.:

IEEE Transactions on Multimedia 3 (1), 141†151 2001 17. Naphade, M. R.,Huang, T s.:

ï nal frontier in multimedia retrieval. IEEE Transactions on Neural networks 13 (4 793†810 (2002

18. Qian, R.,Haering, N.,Sezan, I.:A computational approach to semantic event detection. In:

Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, vol. 1, pp. 200†206 (1999

and machine intelligence 22 (12), 1349†1380 (2000 20. Vailaya, A.,Figueiredo, M. A t.,Jain, A k.,Zhang, H. J.:

IEEE Transactions on Image processing 10 (1), 117†130 2001 21. Zhu, X.,Wu, X.,Elmagarmid, A k.,Feng, Z.,Wu, L.:

Video data mining: Semantic indexing and event detection from the association perspective. IEEE Transactions on Knowledge and Data engineering, 665†677 (2005

Part VIII Future Internet Applications Part VIII: Future Internet Applications 403 Introduction The Future Internet is grounded in the technological infrastructure for advanced net

-works and applications. It constitutes a complex and dynamic system and societal phenomenon; it comprises the processes of innovation,

shaping and the actual use of these technologies and infrastructures in private and public organisations, in different

sectors of the economy including the service sectors, and in social networks. Research on the Future Internet therefore includes the development, piloting and validation of

high-value applications in domains such as healthcare, energy, transport, utilities, manu -facturing and finance. Increasingly, research and innovation on the Future Internet such

as envisaged in the future Internet PPP programme forms part of a diverse, dynamic and increasingly open Future Internet innovation-ecosystem, where different stake

-holders such as researchers, businesses, government actors and user communities are brought together to interact and engage in networked and collaborative innovation

In the field of Future Internet application areas, several research and innovation topics are emerging for the next years.

In particular, there is a need to explore the opportunities provided by Future Internet technologies in various business and socie

-tal sectors and how these opportunities could be realized through open innovation models One of the key developments is towards smart enterprises

and collaborative enter -prise networks. Enterprises of the future are envisioned to be ever more open, creative

and sustainable; they will become â€oesmart enterprisesâ€. Innovation lies at the core of smart enterprises and includes not only products, services and processes but also the

organizational model and full set of relations that comprise the enterprise†s value network. The Future Internet should provide enterprises a new set of capabilities

enabling them to innovate through flexibility and diversity in experimenting with new business values, models, structures and arrangements.

the federation and integration of appropriate software building blocks. A new genera -tion of enterprise systems comprising applications

emerge, fine-tuned to the needs of enterprise users by leveraging a basic infrastructure of utility-like software services

High-value Future Internet applications are also foreseen in the domain of living healthcare, and energy. â€oesmart Living†is one of the areas where the focus lies clearly

on the human user, and encompasses the combination of technologies in areas such as smart content, personal networks and ubiquitous services, to provide the user a simpler

easier and enriched life across many domains including home life, education and learn -ing, working,

and assisted living. Much interest is in â€oesmart health†applications, includ -ing the provision of assisted living services for the elderly and handicapped, and also to

access to and sharing of patient data, secure data exchange between healthcare actors and applications for remote and collaborative diagnosis, cure and care

The first topic concerns the resources of telecom operators and service providers such as networks, switching, computing and data cen

-404 Part VIII: Future Internet Applications ters which are prominent targets for energy efficiency. The second includes solutions

allowing for energy management and reduction of the overall energy consumption One of the key developments in this respect is the use of advanced communication

and computing infrastructure as part of the Smart Grid. Related topics include the cost-effective deployment of supporting infrastructures such as sensors and meters

and facilitated by Internet-based applications and infrastructures based on common platforms. Therefore, cities and urban environments are facing challenges to maintain

mass when it comes to shaping the demand for advanced Internet-based services. The â€oeliving labs†approach which comprises open and user driven innovation in large-scale

real-life settings opens up a promising opportunity to enrich the experimentally-driven research approach as currently adopted in the future Internet community

The four chapters in the Application Areas part of this book illustrate the develop -ments and opportunities mentioned.

The first chapter â€oefuture Internet Enterprise Sys -tems: a Flexible Architectural Approach for Innovation†discusses how emerging

paradigms, such as Cloud computing and Software-as-a-service are opening up a significant transformation process for enterprise systems.

by new and innovative development methods and architectures of Future Internet Enterprise Systems. The chapter foresees a rich, complex, articulated digital world

Internet Enterprise Resources will directly act and evolve according to what exists in the real world The chapter â€oerenewable Energy Provisioning for ICT Services in a Future Inter

dynamically transport user services to be processed in data centers built in proximity to green energy sources, thereby reducing greenhouse gas emissions of ICT equip

and focuses on heavy computing services dedicated to data centers powered com -pletely by green energy, from a large abundant reserve of natural resources in Canada

Future Internet Applications 405 The third chapter â€oesmart Cities and Future Internet: towards Cooperation Frame

-works for Open Innovation†elaborates the concept of â€oesmart cities†as environments of open and user driven innovation for experimenting

and validating Future Internet -enabled services. The chapter describes how the living labs concept has started to

fulfill a role in the development of cities towards becoming â€oesmartâ€. In order to exploit the opportunities of services enabled by the Future Internet for smart cities,

there is a need to clarify the way how living lab innovation methods, user communities and Fu

-ture Internet experimentation approaches and testbed facilities constitute a common set of resources. These common resources can be made accessible and shared in open inno

-vation environments, to achieve ambitious city development goals. This approach re -quires sustainable partnerships and cooperation strategies among the main stakeholders

example of city-scale platform architecture for utilizing innovative Internet of things technologies to enhance the quality of life of citizens.

-form can be used to interconnect with different Internet of Services testbeds, helping to bridge the existing gap between the two levels

) Future Internet Assembly, LNCS 6656, pp. 407†418,2011  The Author (s). This article is published with open access at Springerlink. com

Future Internet Enterprise Systems A Flexible Architectural Approach for Innovation Daniela Angelucci, Michele Missikoff, and Francesco Taglino

carried out by emerging paradigms, such as Cloud computing, Future Inter -net and Saas (Software-as-a-service), is leading the area of enterprise sys

process will be accelerated by the advent of FINES (Future Internet Enterprise System) research initiatives, where different scientific disciplines converge

-ticulations that Future Internet Systems (FIS) are assuming, to achieve the Future Internet Enterprise Systems (FINES.

In particular, this paper foresees a progressive implementation of a rich, complex, articulated digital world that

FINER (Future Internet Enterprise Resources), will directly act and evolve ac -cording to what exists in the real world

Future Internet, Future Enterprise Systems, component-based soft -ware engineering, COTS, SOA, MAS, smart objects, FINES, FINER

In recent years, software development methods and technologies have markedly evolved, with the advent of SOA 15, MDA 16, Ontologies and Semantic web, to

name a few. But there are still a number of open issues that require further research and yet new solutions.

This paper explores some emerging ideas concerning a new generation of Internet -based enterprise systems, along the line of what has been indicated in the FINES

Future Internet Enterprise Systems) Research Roadmap1, a study carried out in the context of the European commission,

Internet of things and Enterprise Environments (DG Infso. The report claims that we are close to a significant transformation in the enterprise systems, where (i

evolution of infrastructures and technologies, starting from Cloud computing and Future Internet, and, on top of those, the Software-as-a-service (Saas) paradigm that

is progressively providing new ways of conceiving and realising enterprises software applications In essence, while enterprise management and planning services will be increas

-ingly available from the †cloudâ€, in a commoditised form, the future business needs and challenges) are progressively shifting towards the support to enterprise innova

Future Internet, Web 2. 0 Semantic web, Cloud computing, Saas, Social media, and similar emerging forms of distributed, open computing will push forward new forms of innovation such as, and

in particular, Open Innovation 3. The quest for continuous, systematic business innovation requires (I ES capable of shifting the focus to ideas generation and inno

-vation support, and (ii) new agile architectures, capable of (instantly) adjusting to the continuous change required to enterprises.

software engineering practices do not seem to meet. Therefore we need to orientate the research towards new ES architectures and development paradigms, when the role

development environments will be based on an evolution of MDA, being able to sepa -rate the specification and development of the (i) strategic business logic from the (ii

and advanced graphical user 1 http://cordis. europa. eu/fp7/ict/enet/documents/task-forces/research-roadmap

/Future Internet Enterprise Systems 409 interfaces will foster new development environments conceived for business experts to directly intervene in the development process

The second grand research challenge concerns the architecture of the Future Internet Enterprise Systems (FINES) that need to deeply change with respect to what

we have today. A new paradigm is somehow already emerging nowadays, pushed by the new solutions offered in the future Internet Systems (FIS) field.

In particular, we may mention: the Internet of Services (Ios), Internet of things (Iot) and smart ob -jects, Internet of Knowledge (Iok), Internet of People (Iop.

But these solutions need to further evolve towards a better characterisation in the business direction, allowing

different aspects of the business reality (functions, objects, actors, etc. to acquire their networked identity, together with a clear and precise definition (i e.,

-prise will have a digital image (a sort of †avatarâ€) that has been referred to as Future Internet Enterprise Resource (FINER) in the FINES Research Roadmap.

So, the sec -ond grand research challenge consists in conceiving new, highly modular, flexible FINERS for the FINES architectures to be based on

services, tools, software packages, interfaces and user interaction solutions that are not available at the present time.

of software architectures. This will be possible if such software architectures will correspond to the enterprise architectures,

and will be composed by elements tightly coupled with business entities. The achievement of this objective relies on a number

from Cloud computing to Social media to Service-oriented Computing, from Business Process Engineering to semantic tech

-nologies and mash-up. An exhaustive analysis of the mentioned technologies is out -side the scope of this paper,

based on the notion of a FINER, seen as the new frontier to software components aimed at achieving agile system architectures.

Traditionally, the software engineering community has devoted great attention to design approaches, methods and tools, supporting the idea that large software systems

can be created starting from independent, reusable collections of preexisting software components This technical area is referred often to as Component Based Software engineering

CBSE). ) The basic idea of software componentization is quite the same as software modularization, but mainly focused on reuse.

CBSE distinguishes the process of "component development"from that of"system development with components†9

CBSE laid the groundwork for the Object oriented Programming (OOP) paradigm that in a short time imposed itself over the preexisting modular software develop

-ment techniques. OOP aims at developing applications and software systems that provide a high level of data abstraction

and modularity (using technologies such as COM,., NET, EJB and J2ee Another approach to componentization is that of the Multi Agent Systems (MAS

which is based on the development of autonomous, heterogeneous, interacting soft -ware agents. Agents mark a fundamental difference from conventional software mod

-ules in that they are inherently autonomous and endowed with advanced communica -tion capability 10 On the other side, the spread of the Internet technologies and the rising of new

communication paradigms, has encouraged the development of loosely coupled and highly interoperable software architectures through the spread of the Service-Oriented

approach, and the consequent proliferation of Service-Oriented Architectures (SOA SOA is an architectural approach

whose goal is to achieve loose coupling among interacting software services, i e.,, units of work performed by software applications

typically communicating over the Internet 11 In general, a SOA will be implemented starting from a collection of components

e-services) of two different sorts. Some services will have a †technical†nature, con -ceived to the specific needs of ICT people;

some other will have a †business†nature reflecting the needs of the enterprise. Furthermore, the very same notion of an e

given computation to take place; where it is performed or who is taking care of it is

there is an active entity (a person, an organization, a computer, a robot, etc. that provides the services, with a given cost and time (not to mention SLA, etc.

Future Internet Enterprise Systems 411 In summary, Web services were introduced essentially as a computation resource

transforming a given input to produce the desired output, originally without the need to have a persistent memory and an evident state.

upon the spread of the Cloud computing philosophy, but revising and applying it into the specific context of developing new FINESS, where business expert can directly

manage a new generation enterprise software architectures. Cloud computing repre -sents an innovative way to architect and remotely manage computing resources:

this approach aims at delivering scalable IT resources over the Internet, as opposed to hosting and operating those resources (i e. applications, services and the infrastructure

on which they operate) locally. It refers to both the applications delivered as services over the Internet and the hardware and system software in the datacenters that provide

those services 12. Cloud computing may be considered the basic support for a brand new business reality where FINERS can easily be searched,

composed and exe -cuted by a business expert. FINERS will implement a cloud-oriented way of designing

organizing and implementing the enterprises of the future In conclusion, for decades component technologies have been developed with an ICT

approach, to ease software development processes. Conversely, we propose to base a FINES architecture on building blocks based on business components.

-Future Internet Enterprise Systems 413 worked structure, conceived as an evolution of the Linked Open Data2 of today;

, according to IPV6, URI3, or ENS4 GR: Graphical Representation. This can vary from a simple GIF to a 3d model, to a

or responding (as server) to request messages. It is structured according to the grounding of OWL-S

/rfc/rfc3986. html 4 ENS: Entity Name System, proposed by the OKKAM project (www. okkam. org

•People, a special class of FINERS for which avatars are mandatory •Tangible entity, from computers to aircrafts, to buildings and furniture

•Intangible entity, for which a digital image is mandatory Fig. 2. The FINER Pentagone All these FINERS will freely interact

and cooperate, according to what happens for their real world counterparts. A complete interaction scheme is represented sketchily

-stantly connected (transparently, in a wired or wireless mode) to the Internet, to reach other FINERS,

Future Internet Enterprise Systems 415 5. 1 A Business-Driven FINES Develpment Platform In order to put the business experts at the centre of the ES development process, we

and directly manipulated by the user while they reside in the Cloud and are reached through the Internet.

On the FINES development environment (see Fig. 3), FINERS are represented visually in a 3d space that models the enterprise reality (i e.,

, a Virtual Enteprise Reality) where the user can navigate and manage changes. At a lower level, simpler FINERS will be aggregated to

form more complex ones. The composition will take place in a partial automatic and bottom-up way,

-ture Internet will play a central role in supporting the discovery of the needed FINERS

-mitting events and data generated during FINERS€ operations. There is not a central -ised database, the information will stay by the business entity to

which they pertain or in the Cloud. A similar interface, representing a Virtual Enterprise Reality,

made available to the users during business operations to navigate in the enterprise and see how the operations evolve

The computational resources of a FINES are maintained in the Computing Cloud and are linked recursively to compose complex FINERS starting from simpler ones.

Future Internet Enterprise Systems 417 The runtime architecture of Fig. 4 is described in a sketchy way,

where computation will be performed directly by enterprise com -ponents, mainly positioned in the enterprise itself of in the Cloud (typically, in case of

and maintaining large scale computing solutions simply interacting with a familiar (though technologically enhanced) business reality

, Iot Ios, Multi-Agent Systems, Cloud computing, Autonomic Systems) and, in parallel some key areas of the enterprise that will start to benefit of the FINES approach

Acknowledgment. We acknowledge the FINES Cluster (European commission), and in particular the FINES Research Roadmap Task force for their contribution in pro

-ing Wireless Mesh and Wireless Sensor Networks. Wireless Personal Communica -tions 53 (3)( 2010 2. Buxmann, P.,Hess, T.,Ruggaber, R.:

-Internet of Services. Business & Information Sys -tems Engineering 1 (5), 341†342 (2009 3. Chesbrough, H.:

eu/fp7/ict/enet/ei-isg en. html 7. Sykes, D.,Heaven, W.,Magee, J.,Kramer, J.:

27th International Conference on Information technology Inter -faces (ITI), Cavtat, Croatia, IEEE, Los Alamitos (2005 10.

Component-oriented software development, Spe -cial issue on alaysis and modeling in software development, pp. 160†165 (1992

11. Petritsch, H.:Service-Oriented Architecture (SOA) vs. Component Based Architecture white paper, TU Wien (2006), http://whitepapers. techrepublic. com. com

A Berkley View of Cloud computing, EECS -2009-28 (2009 13. Martin, D.,et al.:Bringing Semantics to Web Services with OWL-S. In:

Proc. Of WWW Conference (2007 14. Clark, D.,et al.:Newarch project: Future-generation internet architecture.

Tech Rep. MIT Laboratory for Computer science (2003), http://www. isi. edu/newarch /15. Tselentis, G.,et al.

eds.):) Towards the Future Internet-Emerging Trends from European Research. IOS Press, Amsterdam (2010 16.

Papazoglou, M. P.:Web Services: Principles and Technology. Prentice-hall, Englewood Cliffs (2007 17. Mellor, S. J.,Scott, K.,Uhl, A.,Weise, D.:

Model-driven architecture. In: Bruel, J.-M Bellahsã ne, Z.,et al. eds.)) OOIS 2002. LNCS, vol. 2426, p. 290.

Springer, Heidelberg 2002 J. Domingue et al. Eds.):) Future Internet Assembly, LNCS 6656, pp. 419†429,2011

 The Author (s). This article is published with open access at Springerlink. com Renewable Energy Provisioning for ICT Services in a

Future Internet Kim Khoa Nguyen1, Mohamed Cheriet1, Mathieu Lemay2, Bill St. Arnaud3 Victor Reijs4, Andrew Mackarel4, Pau Minoves5, Alin Pastrama6, and

user services to be processed in data centers built in proximity to green energy sources, reducing GHG (Greenhouse Gas) emissions of ICT equipments.

from new services and users, resulting in an increase in GHG emissions. Based on the cooperation between Mantychore FP7 and the GSN, our approach is

the heaviest computing services are dedicated to virtual data centers powered completely by green energy from a

large abundant reserve of natural resources, particularly in northern countries Keywords: Green Star Network, Mantychore FP7, green ICT, Future Internet

1 Introduction Nowadays, reducing greenhouse gas (GHG) emissions is becoming one of the most challenging research topics in Information and Communication Technologies (ICT

-cused on microprocessor design, computer design, power-on-demand architectures and virtual machine consolidation techniques. However, a micro-level energy effi

-ciency approach will likely lead to an overall increase in energy consumption due to the Khazzoom†Brookes postulate (also known as Jevons paradox) 2, which states

Large ICT companies, like Microsoft which consumes up to 27mw of energy at any given time 1,

have built their data centers near green power sources. Unfortunately, many computing centers are not so close to

green energy sources. Thus, green energy distributed network is an emerging technol -ogy, given that losses incurred in energy transmission over power utility infrastruc

-tures are much higher than those caused by data transmission, which makes relocating a data center near a renewable energy source a more efficient solution than trying to

bring the energy to an existing location The Greenstar Network (GSN) project 3 is one of the first worldwide initiatives

can transport user service applications to be processed in data centers built in prox -imity to green energy sources,

such as hand-held devices, home PCS), the heaviest computing services will be dedicated to data centers powered completely by green energy.

This is enabled thanks to a large abundant reserve of natural green energy resources in Canada, Europe and USA.

and in the server farms is not considered since no special equipment is deployed in the GSN

In order to move virtualized data centers towards network nodes powered by green energy sources distributed in such a multi-domain network, particularly between

will be developed to leverage virtualization, which helps to migrate virtual infrastruc -ture resources from one site to another based on power availability.

This will facilitate use of renewable energy within the GSN providing an Infrastructure as a service Iaas) management tool.

Renewable Energy Provisioning for ICT Services in a Future Internet 421 one is powered by a different renewable energy source) could be integrated into an

Core nodes are linked by an underlying high speed optical network having up to 1, 000 Gbit/s bandwidth capacity provided by CANARIE.

new 100gbit/s, in comparison to electronic equipments such as routers and aggrega -tors 4. The migration of virtual data centers over network nodes is indeed a result of

a convergence of server and network virtualizations as virtual infrastructure manage -ment. The GSN as a network architecture is built with multiple layers, resulting in a

large number of resources to be managed. Virtualized management has therefore been proposed for service delivery regardless of the physical location of the infrastructure

to user requirements; hence high utilization and optimization levels can be achieved During the service, the user monitors and controls resources as if he was the owner

allowing the user to run their application in a virtual infrastructure powered by green energy sources

2 Provisioning of ICT Services over Mantychore FP7 and GSN with Renewable Energy In the European NREN community connectivity services are provisioned on a manual

so that users can change some of the service characteristics without having to renegotiate with the service provider

was to implement a proof of concept based on the idea that routers and an IP network

robust software while running trials on a range of network equipment The Mantychore FP7 project allows the NRENS to provide a complete, flexible

Users will be able to get access control over optical de -vices like optical switches, to configure important properties of its cards and ports

b) Layer 2, Ethernet and MPLS. Users will be able to get control over Ethernet and

MPLS (Layer 2. 5) switches to configure different services. In this aspect, Mantychore will integrate the Ether project 6 and its capabilities for the management of Ethernet

and MPLS resources c) Layer 3, Mantychore FP7 suite includes set of features for: i) Configuration and

and firewall services, v) Creation, modification and deletion of resources (interfaces routers) both physical and logical,

and vi) Support of IPV6. It allows the configuration of IPV6 in interfaces, routing protocols, networks

Fig. 1. The Greenstar Nework Figure 1 shows the connection plan of the GSN. The Canadian section of the GSN has

the largest deployment of six GSN nodes powered by sun, wind and hydroelectricity It is connected to the European green nodes in Ireland (HEANET), Iceland (NOR

Renewable Energy Provisioning for ICT Services in a Future Internet 423 using renewable energy resources is vital for any NREN with such an abundance of

houses a GSN Node at a data center in Reykjavã k (Iceland) and also contributes to the

-work is that the former one is able to transport ICT services to data centers powered

PDU Servers (Dell Poweredge R710 To core network Wind power node architecture Spoke Switch Allied Telesis

Raritan UPS (APC PDU Servers (Dell Poweredge R710 Hydroelectricity power node architecture (Hub MUX/DEMUX

To core network Backup Disk Arrays Gbe Tranceiver MUX/DEMUX GSN-Montreal (Canada GSN-Calgary (Canada

Fig. 2. Architecture of green nodes (hydro, wind and solar types 424 K. K. Nguyen et al

by green energy and adjust the network to the needs controlled by software. The cost

of producing and maintaining network elements, such as routers and servers, is not considered, because no special hardware equipment is used in the GSN

Figure 2 illustrates the architectures of a hydroelectricity and two green nodes, one is powered by solar energy

and the other is powered by wind. The solar panels are grouped in bundles of 9 or 10 panels,

each panel generates a power of 220-230w. The wind turbine system is a 15kw generator.

After being accumulated in a battery bank electrical energy is treated by an inverter/charger in order to produce an appropriate

output current for computing and networking devices. User applications are running on multiple Dell Poweredge R710 systems, hosted by a rack mount structure in an

outdoor climate-controlled enclosure. The air conditioning and heating elements are powered by green energy at solar and wind nodes;

servers are linked by a local network, which is connected then to the core network through GE transceivers.

Data flows are transferred among GSN nodes over dedicated circuits (like light paths or P2p links), tunnels over Internet or logical IP networks

The Montreal GSN node plays a role of a manager (hub node) that opportunisti -cally sets up required connectivity for Layer 1 and Layer 2 using dynamic services

then pushes Virtual machines (VMS) or software virtual routers from the hub to a sun or wind node (spoke node) when power is available.

VMS will be pulled back to the hub node when power dwindles. In such a case, the spoke node may switch over to

The VMS are used to run user applications, particu -larly heavy-computing services. Based on this testbed network, experiments and re

-search are performed targeting cloud management algorithms and optimization of the intermittently-available renewable energy sources

The cloud management solution developed in order to run the GSN enables the control of a large number of devices of different layers.

Fig. 3. Layered GSN and Cloud computing Architectures Renewable Energy Provisioning for ICT Services in a Future Internet 425

regardless of the underlying infrastructure. Such a management approach is essential for data center migration across a wide area-network network,

because the migration must be achieved in a timely manner and transparently to service users.

The proposed web -based cloud management solution is based on the Iaas concept, which is a new soft

-ware platform specific for dealing with the delivery of computing infrastructure 5 Figure 3 compares the layered architecture of the GSN with a general architecture

of a cloud comprising four layers. The GSN Data plane corresponds to the System level, including massive physical resources, such as storage servers and application

servers linked by controlled circuits (i e.,, lightpaths. The Platform Control plane corresponds to the Core Middleware layer,

implementing the platform level services that provide running environment enabling cloud computing and networking capabili -ties to GSN services.

The Cloud Middleware plane corresponds to the User-level Middleware, providing Platform as a service capabilities based on Iaas Framework

components 5. The top Management plane or User level focuses on application services by making use of services provided by the lower layer services

4 Virtual Data center Migration In the GSN project, we are interested in moving a virtual data center from one node to

another. Such a migration is required for large-scale applications running on multiple servers with a high density connection local network.

The migration involves four steps i) Setting up a new environment (i e.,, a new data center) for hosting the application with

required configurations, ii) Configuring network connection, iii) Moving VMS and their running state information through this high speed connection to the new location, and

iv) Turning off computing resources at the original node. Indeed, solutions for the mi -gration of simple applications have been provided by many ICT operators in the market

However, large scale data centers require arbitrarily setting their complex working envi -ronments when being moved. This results in a reconfiguration of a large number of

servers and network devices in a multi-domain environment Fig. 4. Iaas Framework Architecture Overview

426 K. K. Nguyen et al In our experiments with an online interactive application like Geochronos 7 each

VM migration requires 32mbps bandwidth in order to keep the service live during the migration, thus a 10 Gbit/s link between two data centers can transport more than 300

VMS in parallel. Given that each VM occupies one processor and that each server has up to 16 processors, 20 servers can be moved in parallel.

If each VM consumes 4gbyte memory space, the time required for such a migration is 1000sec

The migration of data centers among GSN nodes is based on cloud management The whole network is considered as a set of clouds of computing resources,

which is managed using the Iaas Framework 5. The Iaas Framework include four main com

-ponents: i) Iaas Engine used to create model and devices interactions abstractions, ii Iaas Resource used to build web services interfaces for manageable resources, iii

Iaas Service serves as a broker which controls and assigns tasks to each VM, and iv

Iaas Tool provides various tools and utilities that can be used by the three previous components (Figure 4

The Engine component is positioned at the lowest level of the architecture and maintains interfaces with physical devices.

It uses services provided by protocols and transport layers in order to achieve communications. Each engine has a state machine

The engines allow GSN users to quantify the power consumption of their service. Engines notify upper layers by triggering

resources Business, Presentation or Data Access Tier. The Tool component provides additional services, such as persistence,

Open Services Gateway initiative) is a Java framework for remotely deployed service applications, which provides high reliability, collaboration, large scale distribution

Through a Web interface, users may determine GHG emission boundaries based on information providing VM power and their energy sources,

converges server and network virtualizations. Whilst most of cloud management solu -tions in the market focus particularly on computing resources, Iaas Framework compo

-nents can be used to build network virtualized tools 6 10, which provides for a flexi

-ble set of data flows among data centers. The ability of incorporating third-party power control components is also an advantage of the Iaas Framework

Renewable Energy Provisioning for ICT Services in a Future Internet 427 5 Federated Network GSN takes advantage of the virtualization to link virtual resources together to span

multiple cloud and substrate types. The key issue is how to describe, package, and deploy such multi-domain cloud applications.

An orchestration middleware is built to federate clouds across domains, coordinate user registration, resource allocation stitching, launch, monitoring,

and adaptation for multi-domain cloud applications Such a tool also requires solutions for identity, authorization, monitoring, and re

and interoperate with software outside of the GSN Along with the participation of international nodes, there is an increasing need of

client will contact firstly an energy-aware router in order to get an appropriate VM for his service.

The router will look for a VM which is optimal in terms of GHG emis -sion, i e.,, the one which is powered by a green energy source.

in order to move a VM to a greener data center The process is as follows (Figure 5: i) Copy VM memory between old and new loca

iii) Router B receives the ARP and sends the message to the client, iv) New routing entry is installed in router B for the VM,

and v) New rout -ing entry is added in router A 428 K. K. Nguyen et al

In our design, the GSN is provided with a component called the Federation Stitcher which is responsible for establishing connection among domains, and forwarding user

requests to appropriate data centers. The big picture of the GSN network management solution is shown in Figure 6. The heart of the network is the programmable Federa

-tion Stitcher, which accepts connections from service users through Internet. This point is powered by green sustainable energy, i e.,

, hydroelectricity. It links user re -quests to appropriate services provided by data centers distributed across the network

Each data center is represented by a virtual instance, including virtual servers and virtual routers and/or virtual switches interconnecting the servers.

Such a virtual data center can be hosted by any physical network node, according to the power availabil

-ity. There is a domain controller within each data center or a set of data centers shar -ing the same network architecture/policy.

User requests will be forwarded by the Federation Stitcher to the appropriate domain controller. When a VM or a data center

is migrated, the new location will be registered with the Federation Stitcher then user requests are tunneled to the new domain controller

Fig. 6. Overview of GSN network management solution Renewable Energy Provisioning for ICT Services in a Future Internet 429

6 Conclusion In this chapter, we have presented a prototype of a Future Internet powered only by

green energy sources. As a result of the cooperation between Europe and North America researchers, the Greenstar Network is a promising model to deal with GHG

reporting and carbon tax issues for large ICT organizations. Based on the Mantychore FP7 project, a number of techniques have been developed

in order to provision re -newable energy for ICT services worldwide. Virtualization techniques are shown to be the most appropriate solution to manage such a network

and to migrate data cen -ters following green energy source availability, such as solar and wind

Our future work includes research on the quality of services hosted by the GSN and a scalable resource management

Acknowledgments. The authors thank all partners for their contribution in the GSN and Mantychore FP7 projects

Open Access. This article is distributed under the terms of the Creative Commons Attribution Noncommercial License which permits any noncommercial use, distribution, and reproduction

-work Infrastructures in Support of Future Internet and Grid Services Using Iaas to Reduce GHG Emissions.

Providing users with a Logical IP Network Ser -vice. TERENA Networking Conference (5/2008 9. Grasa, E.,et al.:

HEANET website, http://www. heanet. ie /12. NORDUNET website, http://www. nordu. net 13. Moth, J.:

GN3 Study of Environmental Impact Inventory of Greenhouse Gas Emissions and Removals †NORDUNET (9/2010

IBBT Website, http://www. ibbt. be /16. Reservoir FP7, http://www. reservoir-fp7. eu /J. Domingue et al.

) Future Internet Assembly, LNCS 6656, pp. 431†446,2011  The Author (s). This article is published with open access at Springerlink. com

Smart Cities and the Future Internet: Towards Cooperation Frameworks for Open Innovation Hans Schaffers1, Nicos Komninos2, Marc Pallot3, Brigitte Trousse3

and user-driven innovation for experimenting and validat -ing Future Internet-enabled services. Based on an analysis of the current land

-scape of smart city pilot programmes, Future Internet experimentally-driven re -search and projects in the domain of Living Labs, common resources regarding

research and innovation can be identified that can be shared in open innovation environments. Effectively sharing these common resources for the purpose of

Smart Cities, Future Internet, Collaboration, Innovation Ecosys -tems, User Co-Creation, Living Labs, Resource Sharing

1 Introduction The concept of â€oesmart cities†has attracted considerable attention in the context of urban development policies.

The Internet and broadband network technologies as enablers of e-services become more and more important for urban development while

user-driven innovation ecosystems to boost Future Internet research and experimenta -tion for user-driven services and how they can accelerate the cycle of research, inno

-432 H. Schaffers et al vation and adoption in real-life environments. This paper pays particular attention to

collaboration frameworks which integrate elements such as Future Internet testbeds and Living Lab environments that establish

-passing peripheral and less developed cities. It also emphasises the process of eco -nomic recovery for welfare and well-being purposes.

implicitly builds upon the role of the Internet and Web 2. 0 as potential enablers of

experimentation into the smart cities concept as piloting user-driven open innovation environments. The implicit aim of such initiatives is to mobilise cities and urban areas

collective intelligence and co-creation capabilities of user/citizen communities for designing innovative living and working scenarios

platforms, emerging ICT tools, methodologies and know-how, and user communities Table 1. Three perspectives shaping the landscape of Future Internet and City Development

Future Internet Research Cities and Urban Development User-Driven Innovation Ecosystems Actors Researchers ICT companies

National and EU actors City policy actors Citizen platforms Business associations Living Lab managers citizens, governments

enterprises, researchers as co-creators Priorities Future Internet technical challenges (e g. routing scaling, mobility Urban development

Essential infrastructures Business creation User-driven open innovation Engagement of citizens Resources Experimental facilities Pilot environments

Technologies Urban policy framework Organisational assets Development plans Living lab facilities methodologies & tools physical infrastructures

User-driven innovation projects Open, collaborative innovation Smart Cities and the Future Internet 433 for experimentation on Future Internet technologies and e-service applications

Common, shared research and innovation resources as well as cooperation models providing access to such resources will constitute the future backbone of urban inno

-vation environments for exploiting the opportunities provided by Future Internet technologies. Three perspectives are addressed in this paper

in order to explore the conditions for rising to this challenge (see Table 1 The first perspective of Future Internet research and experimentation represents a

technology-oriented and longer term contribution to urban innovation ecosystems. Cit -ies and urban areas provide a potentially attractive testing and validating environment

However, a wide gap exists between the technology orientation of Future Internet re -search and the needs and ambitions of cities.

third perspective is the concept of open and user-driven innovation ecosystems, which are close to the interests

-ages between Future internet research, urban development policies and open user -driven innovation. Elements of such frameworks include sharing of and access to

open and user-driven innovation looks well positioned to serve as a mediating, ex -ploratory and participative playground combining Future Internet push and urban

policy pull in demand-driven cycles of experimentation and innovation. Living Lab -driven innovation ecosystems may evolve to constitute the core of â€oe4p†(Public

-Private-People-Partnership) ecosystems providing opportunities to citizens and busi -nesses to co-create, explore, experiment and validate innovative scenarios based on

technology platforms such as Future Internet experimental facilities involving SMES and large companies as well as stakeholders from different disciplines

-ploit the opportunities of the Future Internet and of Living Lab-innovation ecosys -tems. How methodologies of Future Internet experimentation and Living Labs could

constitute the innovation ecosystems of smart cities is discussed in section 3. Initial examples of such ecosystems and related collaboration models are presented in sec

-tion 4. Finally, section 5 presents conclusions and an outlook 2 City and Urban Development Challenges

Foundation for Smart Communities advocated the use of information technology to 434 H. Schaffers et al meet the challenges of cities within a global knowledge economy 7. However, the

-ability, and to the rise of new Internet technologies, such as mobile devices (e g. smart phones), the semantic web, cloud computing,

and the Internet of things (Iot) promot -ing real world user interfaces The concept of smart cities seen from the perspective of technologies and compo

-nents has some specific properties within the wider cyber, digital, smart, intelligent cities literatures. It focuses on the latest advancements in mobile and pervasive comput

-ing, wireless networks, middleware and agent technologies as they become embedded into the physical spaces of cities.

The emphasis on smart embedded devices represents a distinctive characteristic of smart cities compared to intelligent cities,

which create territorial innovation systems combining knowledge-intensive activities, institutions for cooperation and learning, and web-based applications of collective intelligence 8, 9

Box: A New Spatiality of Cities-Multiple Concepts Cyber cities, from cyberspace, cybernetics, governance and control spaces based on informa

Digital cities, from digital representation of cities, virtual cities, digital metaphor of cities cities of avatars, second life cities, simulation (sim) city

Intelligent cities, from the new intelligence of cities, collective intelligence of citizens, dis -tributed intelligence, crowdsourcing, online collaboration, broadband for innovation, social

capital of cities, collaborative learning and innovation, people-driven innovation Smart cities, from smart phones, mobile devices, sensors, embedded systems, smart envi

-ronments, smart meters, and instrumentation sustaining the intelligence of cities It is anticipated that smart city solutions, with the help of instrumentation and inter

-connection of mobile devices, sensors and actuators allowing real-world urban data to be collected and analysed, will improve the ability to forecast

Smart Cities and the Future Internet 435 solutions are expected to deal with these challenges, sustain the innovation economy

the development of broadband infrastructure combining cable, optical fibre, and wire -less networks, offering high connectivity and bandwidth to citizens and organisations

cities with embedded systems, smart devices, sensors, and actuators, offering real -time data management, alerts, and information processing,

and (3) the creation of applications enabling data collection and processing, web-based collaboration, and

actualisation of the collective intelligence of citizens. The latest developments in cloud computing and the emerging Internet of things, open data, semantic web, and

future media technologies have much to offer. These technologies can assure econo -mies of scale in infrastructure, standardisation of applications,

for software as a service, which dramatically decrease the development costs while accelerating the learning curve for operating smart cities

in parallel with the Internet of things and embedded systems, providing new oppor -tunities for content management 12,13. Media Internet technologies are at the

crossroads of digital multimedia content and Internet technologies, which encom -passes media being delivered through Internet networking technologies, and media

being generated, consumed, shared and experienced on the web. Technologies, such as content and context fusion, immersive multi-sensory environments, location-based

content dependent on user location and context, augmented reality applications, open and federated platforms for content storage and distribution, provide the ground for

new e-services within the innovation ecosystems of cities (see Table 2 Table 2. Media Internet technologies and components for Smart Cities

Solutions and RTD challenges Short term (2014) Mid term (2018) Longer term (2022 Content management tools

Media Internet technologies Scalable multimedia compression and transmission Immersive multimedia Collaboration tools Crowd-based location

content; augmented reality tools Content and context fusion technologies Intelligent content objects; large scale ontologies and

semantic content Cloud services and software components City-based clouds Open and federated content platforms

Cloud-based fully connected city Smart systems based on Internet of things Smart power management Portable systems

Smart systems enabling integrated solutions e g. health and care Software agents and advanced sensor fusion;

telepresence Demand for e-services in the domains outlined in Fig. 1 is increasing, but not at a

disruptive pace. There is a critical gap between software applications and the provi -sion of e-services in terms of sustainability and financial viability.

Not all applications are turned into e-services. Those that succeed in bridging the gap rely on successful

-tinuous flow of data and information, and offer useful services. It is here that the third

Smart Cities and the Future Internet 437 and sharing of resources among localities. Open source communities may also sub

-stantially contribute to the exchange of good practices and open solutions The current research on smart cities is guided partly by the above priorities of con

such as IBM, Cisco, Microsoft, are involved strongly in and are contributing to shaping the research agenda.

-ies, linking smart cities with user-driven innovation, future Internet technologies, and experimental facilities for exploring new applications and innovative services

and open public data up to developers as well as user communities. As the major challenge facing European cities is to secure high living

3 Future Internet Experimentation and Living Labs Interfaces In exploring the role of Future Internet experimentation facilities in benefiting urban

development as we move towards smart cities, we will succinctly summarise the role of experimental facilities and the experimentation process,

-ture Internet. Within the context of the now emerging FIRE portfolio 15, the poten -tial exists to support new classes of users

and experiments combining heterogeneous technologies that represent key aspects of the Future Internet. The considerable obsta

-cles of complexity and unfamiliarity that are faced when trying to explore the effects of new applications that bring future users the increasing power of the Future Internet

have not yet been overcome. Issues that are being dealt with in the attempt of FIRE projects to move closer to the goal of a federated testbed facility,

The portfolio of FIRE experimentation projects shows that users in such FIRE pro -jects are mostly academic and industry researchers.

user experimentation is beyond the current scope of FIRE, although some interesting initiatives in that respect have started such as the Smart Santander project (services

and applications for Internet of things in the city), the TEFIS project (platform for 438 H. Schaffers et al

co-creation of wellbeing, logistics and environment Iot-based services A comparison of the role of users in FIRE facilities projects compared to Living

Labs is presented in Table 3. Importantly, FIRE projects typically involve users in assessing the impacts of technologies in socioeconomic terms, whereas Living Labs

projects aim to engage users in the innovation process itself. Also, the predominant approach of FIRE facilities is controlled experimentation,

whereas Living Labs en -gage users in the actual innovation process (co-creation. The European commission

has voiced its support for stronger user orientation in the future Internet facilities projects; not only users in terms of academic and industry researchers who will use

these facilities for their research projects, but also end-users. Emphasis is on involv -ing communities of end-users at an early stage of development to assess the impacts

of technological changes, and possibly engage them in co-creative activities Table 3. User Role in FIRE and Living Labs

Future Internet Experiments Living Labs Innovation Approach Controlled experiments Observing large-scale deployment and usage patterns

Federated testbeds Both controlled and natural situation experiments User co-creation via Living Labs methodologies, action research

Open, cooperative innovation Object of testing Technologies, services, architec -tures, platforms, system require -ments; impacts

Validation of user ideas, prototype applications and solutions. Testing as joint validation activity Scale of testing Large-scale mainly From small to large scale

Support the process of user-driven innovation as co-creation In order to explore the opportunities and interfaces,

Living Labs. The Web 2. 0 era has pushed cities to consider the Internet, including mobile networks, as a participative tool for engaging citizens and tourists.

Many ini -tiatives have been launched by cities, such as Wikicity in Rome stemming from MIT's Senseable City Lab which studies the impact of new technologies on cities, Real

-natives of the Internet of tomorrow, it becomes increasingly challenging to design open infrastructures that efficiently support emerging events and citizens†changing

-Smart Cities and the Future Internet 439 vices based on real-time digital data representing digital traces of human activity and

their context in the urban space. Environmental sensors measure parameters such as air quality, temperature or noise levels;

telecommunication networks reflect connec -tivity and the location of their users; transportation networks digitally manage the

mobility of people and vehicles as well as products in the city, just to give a few ex

data streams can become tools for people taking decisions within the city. Promising applications and services seem to be emerging from user co-creation processes

Recent paradigms, such as open innovation and open business models 16, Web 2. 0 17 as well as Living Labs 18, a concept originating from the work of William

Mitchell at MIT and currently considered as user-driven open innovation ecosystems promote a more proactive and co-creative role of users in the research and innovation

process. Within the territorial context of cities, rural areas and regions, the main goal of Living Labs is to involve communities of users at an early stage of the innovation

process. The confrontation of technology push and application pull in a Living Lab enables the emergence of breakthrough ideas,

concepts and scenarios leading to adoptable innovative solutions. Some of the methodologies used in Living Labs inno

pilots and Living Labs. In 20 a landscape of user engagement approaches is pre -sented.

management integrated with user experiments within an action research setting have been developed and implemented in 21

Altogether, Future Internet experimental facilities, Living Labs and Urban devel -opment programmes form an innovation ecosystem consisting of users and citizens

ICT companies, research scientists and policy-makers. In contrast with a testbed, a Living Lab constitutes a â€oe4p†(Public, Private and People Partnership) ecosystem that

provides opportunities to users/citizens to co-create innovative scenarios based on technology platforms such as Future Internet technology environments involving

large enterprises and SMES as well as academia from different disciplines. It appears that Future Internet testbeds could be enabling the co-creation of innovative scenarios

by users/citizens contributing with their own content or building new applications that would mash-up with the city†s open, public data

4 Emerging Smart City Innovation Ecosystems As Table 4 illustrates, several FP7-ICT projects are devoted to research and experi

-mentation on the Future Internet and the Internet of things within cities, such as Smart Santander and, within the Iot cluster, ELLIOT.

The CIP ICT-PSP programme has initiated several pilot projects dedicated to smart cities and Living Labs, some

with a clear Future Internet dimension (Apollon, Periphã ria, and to a less extent too

Open Cities and EPIC. Among the earlier projects with interesting aspects on the interface of Living Labs and Future Internet is C@R (FP6

440 H. Schaffers et al The Smart Santander project proposes an experimental research facility based on sensor networks which will eventually include more than 20,000 sensors, considered

as Iot devices. The architecture supports a secure and open platform of heterogene -ous technologies.

The project is intended to use user-driven innovation methods for designing and implementing †use casesâ€.

map of sensor data available on smart phone) as well as urban waste management are two of the use cases from the Smart Santander project

Internet services and sensor network in the city. www. smartsantander. eu •ELLIOT (FP7-ICT, 2010.

Experimental Living Lab for Internet of Things. Three Living Labs are involved. http://www. elliot-project. eu

Internet of things in Smart City www. peripheria. eu •Open Cities (CIP ICT-PSP, 2010. Public sector services

The ELLIOT project (Experiential Living Lab for the Internet of things) represents a clear example of Living Labs and Future Internet interaction, elaborating three Iot

use cases in three different Living Labs. The first use case is dedicated to co-creation

by users of green services in the areas of air quality and ambient noise pollution with

-opment facilities with professional users. Its goal is to investigate evidence of the social dynamics of the Living Lab approach for the purpose of ensuring a wide and rapid

PACA), the local research institute providing the Iot-based green service portal and managing the experiments (INRIA/Axis), the Internet Foundation for the New Gen

-eration (FING) facilitating user workshops, and a local SME providing data access from electric cars equipped with air quality sensors (VULOG)

and a citizen IT plat -form (a regional Internet space for citizens in the NCA area.

The objectives of the Iot-based green services use case are twofold: to investigate experiential learning of

the Iot in an open and environmental data context, and to facilitate the co-creation of

Smart Cities and the Future Internet 441 green services based on environmental data obtained via sensors.

Various environ -mental sensors will be used, such as fixed sensors from Atmo PACA in the NCA area

fixed Arduino-assembled sensors by citizens, mobile sensors, such as citizen-wired green watches or sensors installed on electric vehicles.

The backbone of the green services use case is based an Iot service portal which addresses three main Iot

-related portal services by allowing the user: 1) to participate in the collection of envi

-ronmental data; 2) to participate in the co-creation of services based on environmental data; and 3) to access services based on environmental data,

such as accessing and/or visualising environmental data in real time. Three complementary approaches have already been identified as relevant for the green services use case:

participatory/user -centred design methods; diary studies for Iot experience analysis, and coupling quan -titative and qualitative approaches for portal usage analysis. In this context of an open

innovation and Living Lab innovation ecosystem, focus groups involving stake -holders and/or citizen may be run either online or face-to-face

The Periphã ria project is among the Smart Cities portfolio of seven projects re -cently launched in the European commission ICT Policy Support Programme.

Their aim is to develop smart cities infrastructures and services in real-life urban environ -ments in Europe.

Actually, the Periphã ria project forms a bridge between the Smart Cities portfolio of projects and the Internet of things European Research Cluster

IERC) and can therefore be taken as a model of Smart Cities and Future Internet integration.

At the core of Periphã ria lies the role of Living Labs in constituting a bridge

between Future Internet technology push and Smart City application pull, refocusing the attention on â€oepeople in Places†to situate the human-centric approach within physi

-cal urban settings. People In places becomes the context and the situation †including the relational situations between people and between people and spaces, infrastructures

services, etc. †in which the integration of Future Internet infrastructures and services occurs as part of a â€oediscovery-driven†process.

The Cloud is considered to be a resource environment that is dynamically configured (run-time) to bring together testbeds, ap

Participation is at the heart of this bottom-up approach to Future Internet technol -ogy integration,

whereby Future Internet research adopts a â€oecompetitive offer†stance to prove its added value to users.

Platform and service convergence is promoted by the use of serious games that engage citizens and users in the process of discovering

the potential of Future Internet technologies and the possible sustainable scenarios that can be built upon them.

Serious gaming thus constitutes a mechanism to enhance participation and transform individual and collective behaviour by working directly

the adoption of Future Internet technologies. Periphã ria has identified five archetypal urban settings:(1) the Smart Neighbourhood where media-based social interaction

and integrates Future Internet technologies (such as augmented reality services for the appreciation of cultural heritage) with networks of video-cameras used to monitor

public spaces. In addition, the integration of these services occurs in the Living Lab context where citizens contribute both to the definition and prioritisation of the cul

that are central to the acceptance and success of Future Internet services for the safety

This example illustrates the central role of users and citizens in defining the services that make up a Smart City as well as the new sustainable lifestyles and workstyles

made possible by Future Internet technologies. In addition, it shows how the Future Internet is a mixture of technologies and paradigms with overlapping implementation

time-frames. While the deployment of IPV6 networks may be a medium-term effort other Future Internet paradigms such as cloud services and camera and sensor net

-works can be considered as already operational. The discovery-driven arena settings in Periphã ria are guiding the development of Living Lab-convergent service platforms

that bring these technologies together into integrated, dynamic co-creation environ -ments that make up a Smart City

as testing facilities, user groups and experimentation methodologies. Two different layers of collaboration can be distinguished.

Smart Cities and the Future Internet 443 issues need to be clarified such as how the different research and innovation resources in

such as specific testing facilities, tools, data and user groups, can be made accessible and adaptable to specific demands of any research and innovation projects

Internet research and innovation project embedded in regional and even national in -novation policy. From the perspective of smart cities, managing innovation at the

-sources made available to users and developers 444 H. Schaffers et al 5 Conclusions and Outlook

In this paper we explored the concept of â€oesmart cities†as environments of open and user driven innovation for experimenting

and validating Future Internet-enabled ser -vices. Smart cities are enabled by advanced ICT infrastructure contributed to by cur

-rent Future Internet research and experimentation. Such infrastructure is one of the key determinants of the welfare of cities.

Other determinants of the welfare of cities will be important as well: the infrastructure for education and innovation, the net

The Living Labs concept represents a powerful view of how user-driven open in -novation ecosystems could be organised.

-jects in the domain of Future Internet research and Living Labs on the other, common

facilities, user communities, technologies and know-how, data, and innovation meth -ods. Such common resources potentially can be shared in open innovation environ

One layer focuses on the actual resources within the Future Internet research and innovation process, the second layer addresses the urban innovation

methods in experimenting on Future Internet technologies, and the use of Living Lab methodologies for implementing innovation policies of cities

user communities available for joint use with Future Internet facilities (e g. the TEFIS project), and in making accessible Future Internet facilities for developing and vali

-dating Iot-based service concepts and applications through Living Labs approaches for smart cities (e g. the Smartsantander and ELLIOT projects

The Future Internet constitutes both a key technology domain and a complex societal phenomenon. Effective, user driven processes of innovation, shaping and application of

Smart Cities and the Future Internet 445 Future Internet technologies in business and society are crucial for achieving socio

-economic benefits. A key requirement emphasised in this paper is how, within an envi -ronment of open innovation in smart cities and governed by cooperation frameworks

the diverse set of resources or assets that constitutes the â€oeengine†of ongoing research and innovation cycles can be made open accessible for users and developers

Open Access. This article is distributed under the terms of the Creative Commons Attribution Noncommercial License which permits any noncommercial use, distribution, and reproduction

in any medium, provided the original author (s) and source are credited References 1. Kroes, N.:

Cities, Fast Systems, Global networks. Rowman & Littlefield, New york (1992 7. WFSC: Smart Communities, http://www. smartcommunities. org/about. htm

IBM Journal of Research & development 53 (3), 338†353 (2009 11. European commission: Growing Regions, Growing Europe:

Future Media Internet: Research challenges and road ahead. DG In -formation Society and Media, Luxembourg, Publications Office of the European union (2010

Future Internet Research and Experimentation (Sep -tember 2010 16. Chesbrough, H. W.:Open Innovation: The New Imperative for Creating

Web Squared: Web 2. 0 Five Years On. Special report, Web 2. 0 Summit, Co-produced by O†Reilly & Techweb (2009

18. European commission, DG INFSO: Advancing and Applying Living Lab Methodologies 2010 19. Ballon, P.,Pierson, J.,Delaere, S.,et al.:

Test and Experimentation Platforms for Broad -band Innovation. IBBT/VUB-SMIT Report (2005 446 H. Schaffers et al

From User Centred Design and User Experience Towards User Co-creation. Position Paper, First Living

Labs Summer School (http://www-sop. inria. fr/llss2010/),Paris (August. 2010 21. Schaffers, H.,Garcia Guzmã¡

) Future Internet Assembly, LNCS 6656, pp. 447†462,2011  The Author (s). This article is published with open access at Springerlink. com

Smart Cities at the Forefront of the Future Internet Josã M. Hernã¡ndez-Muã oz1, Jesã s Bernat Vercher1, Luis Muã oz2, Josã A. Galache2

1 Telefonica I+D, Madrid, Spain {jmhm, bernat}@ tid. es 2 University of Cantabria, Santander, Spain

Smart cities have been pointed recently out by M2m experts as an emerging market with enormous potential,

-cent vision of the Future Internet (FI), and its particular components, Internet of Things (Iot) and Internet of Services (Ios), can become building blocks to pro

-gress towards a unified urban-scale ICT platform transforming a Smart City into an open innovation platform.

Moreover, we present some results of generic implementations based on the ITU-T†s Ubiquitous Sensor Network (USN

level (Iot to support the complexity of heterogeneous sensors deployed in ur -ban spaces), and at the service level (Ios as a suit of open and standardized en

-ablers to facilitate the composition of interoperable smart city services. We also discuss the need of infrastructures at the European level for a realistic

Smart Cities, Sensor and Actuator Networks, Internet of things Internet of Services, Ubiquitous Sensor Networks, Open, Federated and Trusted

innovation platforms, Future Internet 1 Introduction At a holistic level, cities are †systems of systemsâ€,

and this could stand as the simplest definition for the term. However, one of the most well-known definitions was pro

design of urban-scale ICT platforms, three main core functionalities can be identified •Urban Communications Abstraction.

will enable data transfer services agnostic to the underlying connection protocol. Fur -thermore, a major challenge in future urban spaces will be how to manage the in

on top of a unified model so that data and information could be shared among dif -ferent applications and services at global urban levels.

Smart Cities at the Forefront of the Future Internet 449 with and manage all aspects of urban life in a cost-effective way.

-front of the recent vision of the Future Internet (FI. Although there is no universally accepted definition of the Future Internet, it can be approached as â€oea socio-technical

system comprising Internet-accessible information and services, coupled to the physi -cal environment and human behavior,

and supporting smart applications of societal importance†4. Thus the FI can transform a Smart City into an open innovation

•The Internet of things (Iot: defined as a global network infrastructure based on standard and interoperable communication protocols where physical and virtual

â€oethings†are integrated seamlessly into the information network 5 •The Internet of Services (Ios: flexible, open and standardized enablers that facili

-tate the harmonization of various applications into interoperable services as well as the use of semantics for the understanding, combination and processing of data and

information from different service provides, sources and formats •The Internet of People (Iop: envisaged as people becoming part of ubiquitous

intelligent networks having the potential to seamlessly connect, interact and ex -change information about themselves and their social context and environment

At this point, it is important to highlight a bidirectional relationship between the FI and Smart Cities:

stimulate the development of new services and applications by various types of users and to help gathering a more realistic assessment of users†perspective by means of

-work 7 based on the user-driven approach is of main relevance, although in this paper we also advocate the need of large,

-nents of the Future Internet, namely Iot and Ios, can be essential building blocks in future Smart Cities open innovation platforms.

development of next generation urban Iot platforms are outlined in Section 3. Sec -tion 4 discusses the need for realistic urban-scale open

2 Iot and Ios as ICT Building blocks for Smart Cities In the analysis from Forrester research 9 on the role that ICT will play in creating

smart meters and monitoring devices can help monitor and manage water consumption, heating, air-conditioning, lighting and physical secu

Advanced location based services, social networking and collaborative crowdsourcing collecting citizens†generated data By analyzing these different Smart Cities application scenarios, together with the

need of a broadband communication infrastructure that is becoming, or starting to be considered, the 4th utility (after electricity, gas and water), two major ICT building

Smart Cities at the Forefront of the Future Internet 451 •Recent advances in Sensors and Actuator Networks (SAN) are stimulating massive

Therefore Iot, essential to the FI, can be invaluable to provide the necessary technological support to manage in a homogeneous and sustainable way

Ios evolution must be correlated undoubtedly with Iot advances. Otherwise, a number of future Smart City services will never have an opportunity to be con

-ing Iot and Ios at the city scale Starting with the benefits of Iot technologies, they are twofold:

on the one hand they can increase the efficiency, accuracy and effectiveness in operation and man -agement of the city†s complex ecosystem and, on the other, they can provide the nec

-eration (NG) Iot platforms suitable to different usage areas and open business models to improve market dynamics by involving third parties in the value chain (SMES

Some of the essential functionalities identified as required for NG Iot platforms comprise the support for horizontality, verticality, heterogeneity, mobility, scalability

Cross-domain NG Iot platforms may foster the creation of new services taking advantage of the increasing levels of effi

Considering now the Ios, it must be stressed that it is recognized widely (see for example 12) that the real impact of future Iot developments is tied heavily to the

parallel evolution of the Ios. So, a Smart City could only become a true open innova

-tion platform through the proper harmonization of Ios and Iot. There can be a long

list of potential benefits for Smart Cities†services relaying on the same basic sensed information and a suite of application enablers (i e. from sensor data processing appli

-cations, to enablers for accessing multimedia mobile communications or social net -works, etc..Thus the integration of innovative principles and philosophy of Ios will

engage collective end-user intelligence from Web 2. 0 and Telco 2. 0 models that will

drive the next wave of value creation at urban scales, a key aspect typically missing in other technologically-driven initiatives

The technological challenge of developing the Ios has been assumed at EU level, and actions are being initiated to overcome the undesirable dissociation between technologi

-cal and service infrastructures 13. Of particular relevance for Smart Cities scenarios can be the relatively new evolving concept of a Global Service Delivery Platform GSDP

and deployed Iot plat -forms). ) In that way, an increasing number of Smart Cities†services could be searched

discovered and composed (following Web 2. 0/Telco2. 0 principles and including Qos trust, security,

IT/Telecom/Content services, Machine to machine-Machine (M2m) services, or entirely new service delivery models simultaneously involving virtual and real worlds

Iot Resources sensor & actuator networks Ios resources Testbed 1 USN-Enabler Service 1 Adaptation &

Homogeneization Testbed Control Layer GSDP SDP Entity exposure Service exposure Ios federation level Iot federation level

NGN /Telco2. 0 Web2. 0 Service 2 Iot Service Service n Domain ntestbed n A&h

Control Layer A&h Control Layer Other Enablers Domain 1 A&h Control Layer Fig. 1. Global Service Delivery Platform (GSDP) integrating Iot/Ios building blocks

3 Developing Urban Iot Platforms At present, some works have been reported of practical implementations in order to develop Iot platforms inspired by the Ubiquitous Sensor Networks concept from the

ITU-T USN Standardization Group 21. Some research teams have initiated already activities in this line, but there are currently very few references to them in the literature

ITU€ s USN concept envisions a â€oetechnological framework for ambient sensor networks not as simple sets of interconnected networks but as intelligent information infrastruc

-turesâ€. The concept translates directly into cities, as they can be considered as one multidimensional ecosystem, where data is binding the different dimensions, as most

aspects are related closely (e g. environment and traffic, both of them to health, etc Smart Cities at the Forefront of the Future Internet 453

3. 1 USN Functionalities The main goal of a USN platform is to provide an infrastructure that allows the inte

sensor data (for example for energy monitoring, video surveillance or traffic con -trol). ) This functionality will provide a repository where observations/sensors†data

are stored to allow later retrieval or processing, to extract information from data by applying semantic annotation and data linkage techniques

•Publish-Subscribe-Notify: in other cases, services rely on some specific events happening in the city (such as traffic jams or extreme pollution situations.

The platform will allow services to subscribe not just to the observations provided by the sensors,

•Unified communication protocol: given the extension of an urban area, several standards can coexist to communicate sensors and sensor networks (Zigbee

communication protocol used. The platform should provide access to the informa -tion regardless the particular underlying communication protocol used

454 J. M. Hernã¡ndez-Muã oz et al •Horizontally layered approach: The platform should also be built following a lay

This capability will allow a seamless link between Iot and Ios, as discussed in Section 2

3. 2 USN Architecture for Urban Iot Platforms While the new wave of Next Generation Iot platforms are expected to be defined by

initiatives and projects like Iot-A 23, the IERC cluster 24 or the emerging PPP

Iot Core Platform Working group discussion 25, multiple different approaches for First Generation Iot-platforms are currently being implemented.

In essence, many of them are realizations of the described ITU-T†s model. For reference on the current

state of the technology, this Section describes a practical USN platform implementa -tion (more details can be found in 22),

advanced Iot platforms. As shown in Figure 2, a functional specialization of the building blocks has been applied in this work

IMS User Equipment USN-Gateway SIP Services Web Services Configuration A A A D evice

M anagem ent Application /Service Layer Control Layer Access Layer Service Protocol Adapter Notification Entity (NE

Messages & Data Format Adapter Communication Protocol Adapter Fig. 2. High-level Architecture of a USN Iot Platform

Smart Cities at the Forefront of the Future Internet 455 As sketched in the figure,

the USN platform is based on two components, the USN -Enabler (that interfaces services) and the USN-Gateways (that interacts with Sensor

Sensor Web Enablement (SWE) activity 26. Its goal is the creation of the founda -tional components to enable the Sensor Web concept,

where services will be capable to access any type of sensors through the web. This has been reflected by a set of

standards used in the platform (Sensorml, Observation & Measurements, Sensor Observation Service, Sensor Planning Service, Sensor Alert Service and Web Notifi

-cation Service 26. Besides the SWE influence, the USN-Enabler relays on existing specifications from the OMA Service Environment (OSE) 27 enablers (such as

The USN-Gateway represents a logical entity acting as data producers to the USN -Enabler that implements two main adaptation procedures to integrate physical or

•Communication protocol Adaptation. As a connection point between two networks sensors networks deployed throughout the city and the core IP communication

network), the main responsibility is to provide independence from the communica -tion protocol used by the sensor networks

•Sensor Data format Adaptation. This functionality is intended to provide USN -Enabler both Sensorml (meta-information) and O&m (observation & measure

-ments) data from specific SANS data (i e. Zigbee Adaptation and Homogenization are two key requirements for the USN Platform

needed to enable an evolving FI based on the Iot and Ios paradigms Functionalities required to support services are offered both in synchronous and

•The Notification Entity (NE) is the interface with any sensor data consumer that require filtering or information processing over urban-generated data.

The main functionalities provided by this entity are the subscription (receive the filter that will be applied), the analysis of the filters (analyze the filter condition) and the no

the sensor network, like for example a request to gather data, without the need to wait for an answer.

desired data gets available it will receive the corresponding alert. This is mainly used for configuration and for calling actuators

Web Services and SIP requests and responses •The Catalogue and Location Entity (CLE) provides mechanisms in a distributed

performing the request a user might be interested In for example, in an architec -ture where several Sensor Description Entities (SDES) exist,

-mation about the feasibility of an algorithm or a protocol in the field In many cases, due to practical and outside plant constraints, a number of issues

on technologies of the Iot. The resulting scale and heterogeneity of the environment makes it an ideal environment for enabling the above mentioned broad range of experi

-Smart Cities at the Forefront of the Future Internet 457 mentation needs. Furthermore, a city can serve as an excellent catalyst for Iot research

as it forms a very dense techno-social ecosystem. Cities can act as invaluable source of

required for testing of Iot as well as other Future Internet technologies for market adop -tion. This new smart city model can serve as an excellent incubator for the development

User Developed App Tinyos Contiki Sunspot  Tinyos Contiki Sunspot  Opencom Middleware Mobility support

Horizontal support Federation support S ecurity, Privacy and Trust Fig. 3. Smartsantander: A city-scale platform architecture

services and applications for the Iot. The facility will allow large-scale experimenta -tion and testing in a real-world environment.

-vice design phases, applying user-driven innovation methodologies. Furthermore, it will be used also to provide real services to citizens.

-nities of users, other entities that are willing to use the experimental facility for de

and Internet researchers to vali -date their cutting-edge technologies (protocols, algorithms, radio interfaces, etc Several use cases are currently under detailed analysis for their experimental de

-ployment taking into account relevant criteria from local and regional authorities. An illustrative list of these use cases is

•Tourism information in different parts of the city through mobile devices using visual and interactive experiences and in different languages

Smart Cities at the Forefront of the Future Internet 459 •Video monitoring for traffic areas, beach areas and specific events in public places

initiatives on both Iot and Ios areas as WISEBED 25, SENSEI 8 and the USN

Iot Platform (presented in Section 3) including Web 2. 0 and Telco 2. 0 design princi

the FIRE testbed user, the service provider, the service consumers (citizens), the Smartsantander facility administrators, and individ

the subsystems (collectively, the Smartsantander middleware) that provide the func -tionality described by these requirements

i) Access control and IOT Node Security subsys -tem, ii) Experiment Support Subsystem, iii) the Facility Management Support Sub

Iot nodes, and component interactions and information models used to fulfill the sub -system†s functionality

-tific community, end users and service providers. This will not only reduce the tech -nical and societal barriers that prevent the Iot concept to become an everyday reality

but also will attract the widest interest and demonstrate the usefulness of the Smart -Santander platform

Future Internet potential, through Iot and Ios, for creating new real-life applications and services is huge in the smart city context.

First time success of large Iot deploy -ments is jeopardized seriously by the lack of testbeds of the required scale, and suitable

-tions and, validation of their viability as candidate solutions for real life Iot scenarios At present, some practical implementations of advanced USN platforms 22 have

extending its scope to broader M2m scenarios, and large scale deployments for ex -perimental smart urban spaces.

-twining Iot and Ios worlds. Referred Iot USN platform is currently being evolved with the addition of new capabilities,

and integrated within other components being previously developed by the EU projects SENSEI 8 and WISEBED 33 to imple

-ment a city scale infrastructure for Iot technologies experimentation within the Smartsantander project. In this project, a large infrastructure of about 20,000 Iot

devices is addressed. Currently, the deployment of the first 2, 000 sensors in the urban environment is been carried.

that many nontechnical constraints must be considered (users, public administrations vendors, etc..In this sense, what may be evident from a purely technique perspective

term, the behavior of massive wireless sensor deployments Acknowledgements. Although only a few names appear on this paper, this work

Future Internet applications relevant for smart cities, an ICT application area example: smart & proactive energy management, Open Innovation by FI-enabled services

Smart Cities at the Forefront of the Future Internet 461 4. Position Paper: Research Challenges for the Core Platform for the Future Internet.

In: M Boniface, M. Surridge, C. U (Eds. http://ec. europa. eu/information society /activities/foi/library/docs/fippp-research-challenges-for-core

-platform-issue-1-1. pdf 5. Sundmaeker, H.,Guillemin, P.,Friess, P.,Woelfflã, S. eds.:

Vision and Challenges for Realising the Internet of things, CERP-Iot, March 2010. European commission, Brussels 2010 6. Future Internet Assembly 2009, Stockholm, Sweden (November 2009), http://ec

europa. eu/information society/activities/foi/library/docs/fi-stock -holm-report-v2. pdf 7. The European Network of Living Labs, http://www. openlivinglabs. eu

/8. SENSEI †Integrating the Physical with the Digital World of the Network of the Future

State of the art †Sensor Frameworks and Future Internet (D3. 1). Technical report (2008 9. Belissent, J.:

Getting Clever About Smart Cities: New Opportunities Require New Busi -ness Models, 2 november 2010. Forrester research (2010

Towards a Future Internet Public Private Partnership, Usage Areas Workshop, Brussels 3 march (2010), http://ec. europa. eu/information society/activities/foi

/events/fippp3/fi-ppp-workshop-report-final. pdf 12. Real world Internet (RWI) Session, FIA meeting, Prague (May 2009

http://rwi. future-internet. eu/index. php/RWISESSION PRAGUE 13. COM: A public-private partnership on the Future Internet.

Brussels, 28 october (2009 http://ec. europa. eu/information society/activities/foi/library/docs /fi-communication en. pdf

14. DG INFSO Task force on the Future Internet Content. Draft Report of the Task force on

Interdisciplinaryresearch Activities applicable to the Future Internet, Version 4. 1 of 13.07.2009 (2009), http://forum. future-internet. eu

15. NESSI Strategic Research Agenda, http://www. nessi-europe. com/files/Re -searchpapers/NESSI SRA VOL 3. pdf

16. Gluhak, A.,Bauer, M.,Montagut, F.,Stirbu, V.,Johansson, M.,Bernat-Vercher, J Presser, M.:

Towards an architecture for a Real world Internet. In: Tselentis, G.,et al eds.)) Towards the Future Internet, IOS Press, Amsterdam (2009

17. Fisher, S.:Towards an Open Federation Alliance. The WISEBED Consortium. Lulea, July 2nd, 2009.22.

In: Balazinska, M.,et al. eds.)) Data Management in the Worldwide Sensor Web. IEEE PERVASIVE computing, April-June (2007

18. Panlab Project, Pan European Laboratory Infrastructure Implementation http://www. panlab. net/fire. html 19.

Global service delivery platform (GSDP) for the future internet: What is it and how to use

it for innovation? http://services. future-internet. eu/images/d/d4/Report GSDPPANEL-FISO-FIA-Madrid-draft%2breqs. pdf

20. Future Internet Assembly, Meeting Report, Madrid, Spain, 9th†10th december (2008 http://ec. europa. eu/information society/activities/foi/library

/docs/madrid-conference-report-v1-1. pdf 21. ITU TSTAG: A preliminary study on the Ubiquitous Sensor Networks.

TSAG-C 22-E February 2007 22. Bernat, J.,Marã N s.:Gonzã¡lez. A.,Sorribas, R.,Villarrubia, L.,Campoy, L.,Hernã¡

ndez L. Ubiquitous Sensor Networks in IMS: an Ambient Intelligence Telco Platform. ICT Mo -bile Summit, 10-12 june, Stockholm (2008

23. Internet of things Architecture project, http://www. iot-a. eu/public/front-page 462 J. M. Hernã¡

ndez-Muã oz et al 24. Iot European Research Cluster, http://www. internet-of-things-research. eu

/25. White paper on the FI PPP definition (Jan. 2010), http://www. future-internet eu/fileadmin/initiative documents/Publications/White paper/EFII

White paper 2010 public. pdf 26. Botts, M.,Percivall, G.,Reed, C.,Davidson, J.:â€oeogc Sensor Web Enablement:

Overview and High Level Architectureâ€, Open Geospatial Consortium Inc. White paper Version 3 2007 27. OMA Service Environment Archive, http://www. openmobilealliance. org

/technical/release program/ose archive. aspx 28. Oulu Smart City, http://www. ubiprogram. fi /29. Cambridge (MA) Smart City, http://www. citysense. net

/30. Friedrichshafen Smart City http://www. telekom. com/dtag/cms/content/dt/en/395380 31.

Sense Smart City project, http://sensesmartcity. org /32. Smartsantander project, FP7-ICT-2010-257992, http://www. smartsantander. eu

WISEBED-Wireless Sensor Network Testbeds, http://www. wisebed. eu 34. Onelab2, ONELAB project, http://www. onelab. eu

NGNI, http://www. fokus. fraunhofer. de/en/ngni/index. html Author Index Alonistioti, Nancy 259,277

Future Internet Foundations: Architectural Issues Introduction to Part I Towards a Future Internet Architecture Introduction

Definitions Analysis Approach Design Objectives Conclusions References Towards In-Network Clouds in Future Internet Introduction

Designs for In-Network Clouds Realisation: In-Network Cloud Functionality Conclusion References Flat Architectures: Towards Scalable Future Internet Mobility

Introduction Traffic Evolution Characteristics and Scalability Problems of the Mobile Internet Evolution of Flat Architectures

Distributed Mobility Management in Flat Architectures Conclusion References Review and Designs of Federated Management in Future Internet Architectures

Introduction Challenges for Future Internet Architectures Rationale for Federation in the future Internet Federated Management Activity in the future Internet

Federated Management Architecture End-to-end Federated Service Management Scenarios Summary and Outlook References An Architectural Blueprint for a Real-world Internet

Introduction The Real world Internet Reference Architecture Analysis of Existing Architectures Concluding Remarks References Towards a RESTFUL Architecture for Managing a Global Distributed Interlinked Data-Content-Information Space

Introduction The Interdatanet Content-Centric Approach Conclusion References A Cognitive Future Internet Architecture Introduction Architecture Concept

Cognitive Future Internet Framework Architecture Experimental Results Conclusions References Title Model Ontology for Future Internet Networks

Future Internet Works Some other Future Internet and Ontology Works Ontology at Network Layers Entity Title Model Concepts and Semantics

Cross Layer Ontology for Future Internet Networks Conclusion Part II: Future Internet Foundations: Socioeconomic Issues

Introduction to Part II Assessment of Economic Management of Overlay Traffic: Methodology and Results Introduction

Methodology of Assessment Locality Promotion Insertion of Additional Locality-Promoting Peers/Resources Concluding Remarks References

Deployment and Adoption of Future Internet Protocols Introduction A Framework for the Deployment and Adoption of Future Internet Protocols

Multipath TCP Congestion Exposure Enhancing the Framework Conclusions References An Approach to Investigating Socioeconomic Tussles Arising from Building the Future Internet

Introduction A Methodology for Identifying and Assessing Tussles Taxonomy of Socioeconomic Tussles Survey of Work on Social

and Economic Tussles as Highlighted in FP7 Projects Conclusions and Future Work References Part III:

Future Internet Foundations: Security and Trust Introduction to Part III Security Design for an Inter-Domain Publish/Subscribe Architecture

Introduction Basic Concepts Architecture Phases of Communication Related Work Conclusion and Future Work References Engineering Secure Future Internet Services

Introduction Future Internet Services The Need for Engineering Secure Software Services Research Focus on Developing Secure FI Services

Security Requirements Engineering Secure Service Architecture and Design Security Support in Programming Environments Secure Service Composition

Secure Service Programming Platform Support for Security Enforcement Embedding Security Assurance and Risk management during SDLC

Security Assurance Risk and Cost Aware SDLC Conclusion Towards Formal Validation of Trust and Security in the Internet of Services

Introduction Specification Languages Automated Validation Techniques Orchestration Model Checking of SOAS Channels and Compositional Reasoning

Abstract Interpretation The AVANTSSAR Platform and Library Case studies, Success Stories, and Industry Migration Conclusions and Outlook

Trustworthy Clouds Underpinning the Future Internet Cloud computing and the Future Internet Trust and Security Limitations of Global Cloud Infrastructures

Cloud Security Offerings Today Today's Datacenters as the Benchmark for the Cloud New Security and Privacy Risks and Emerging Security Controls

Isolation Breach between Multiple Customers Insider Attacks by Cloud Administrators Failures of the Cloud Management Systems

Lack of Transparency and Guarantees What about Privacy Risks Open Research Challenges Outlook †The Path Ahead

Data Usage Control in the future Internet Cloud Introduction Primelife Privacy Framework Open Challenges Towards Privacy Policy Enforcement in the Cloud

Conclusions Part IV: Future Internet Foundations: Experiments and Experimental Design Introduction to Part IV A Use-Case on Testing Adaptive Admission Control and Resource Allocation Algorithms on the Federated Environment of Panlab

Introduction Use Case Description Technical Environment, Testbed Implementation and Deployment Running and Operating the Experiment

Conclusions References Multipath Routing Slice Experiments in Federated Testbeds Introduction Experiment Objectives and Requirements for a Concurrent Multipath Transport

Experiment Setup Experimental Results for Multipath Routing Slices Active Measurements with PLE and ETOMIC Passive Measurements with VINI and GLAB

Lessons Learned for the Usage of Federated Experimental Facilities Challenges while Preparing the Experiments Observations on the Single Testbeds

Sharing and Standardizing Measurement and Observation Tools Conclusion Testing End-to-end Self management in a Wireless Future Internet Environment

Introduction Experimental Facilities Decription Mechanism for Service-Aware Network Self management Performance Results Conclusion References Part V:

Future Internet Areas: Networks Introduction to Part V Challenges for Enhanced Network Self-Manageability in the Scope of Future Internet Development

Introduction †Moving Towards the Future Internet Network Management Activities in the Self-NET Scope

Challenges and Benefits for the Market Sector Experimental Results for Network Coverage and Optimization Conclusion

Efficient Opportunistic Network Creation in the Context of Future Internet Introduction Related Work Solution Approach Based on ONS

An Architecture for a Sustainable Future Internet Introduction Challenges Model Virtual Infrastructures A Novel Layered Architecture

Future Internet Areas: Services Introduction to Part VI SLAS Empowering Services in the future Internet Introduction Reference Architecture for SLA Management

Adoption Aspects Use Case †Enterprise IT Use Case †ERP Hosting Use Case †Service Aggregation

Meeting Services and Networks in the future Internet Ontological Approach in FINLAN Ontological Layers Representation FINLAN Ontology Example

Contributions to the Future Internet Works Collaboration to the Autoi Planes Collaboration to the RESERVOIR Service Provider

Collaboration to the Complexity Reduction for {User, Service, Content}- Centric Approaches Integration between Services and Networks

Fostering a Relationship between Linked Data and the Internet of Services Introduction Linked Data Services on the Web

Linked Services Conclusions References Part VII: Future Internet Areas: Content Introduction to Part VII Media Ecosystems:

A Novel Approach for Content-Awareness in Future Networks Introduction Background System Architecture Business Actors and Policy Implications

Conclusions References Scalable and Adaptable Media Coding Techniques for Future Internet Introduction Scalable Video Coding

Scalable Multiple Description Coding (SMDC Scalable Video over P2p Network Multiple Description Coding over P2p Network

Three-Level Multimedia Representation Semantic Inference for Video Annotation and Retrieval Experiments Conclusions Acknowledgments Part VIII:

Future Internet Applications Introduction to Part VIII Future Internet Enterprise Systems: A Flexible Architectural Approach for Innovation

Introduction A Long March towards Component-Based Enterprise Systems Guidelines for a FINES Architecture The New Frontier for ES Components:

Renewable Energy Provisioning for ICT Services in a Future Internet Introduction Provisioning of ICT Services over Mantychore FP7 and GSN with Renewable Energy

Virtual Data center Migration Federated Network Conclusion References Smart Cities and the Future Internet: Towards Cooperation Frameworks for Open Innovation

Introduction City and Urban Development Challenges Future Internet Experimentation and Living Labs Interfaces Emerging Smart City Innovation Ecosystems

Conclusions and Outlook References Smart Cities at the Forefront of the Future Internet Introduction Iot and Ios as ICT Building blocks for Smart Cities

Developing Urban Iot Platforms The Need of Urban Scale Experimental Facilities Conclusions References Author Index

<</ASCII85ENCODEPAGES false /Allowtransparency false /Autopositionepsfiles true /Autorotatepages/None /Binding/Left /Calgrayprofile (Gray Gamma 2. 2

/Calrgbprofile (srgb IEC61966-2. 1 /Calcmykprofile (ISO Coated v2 300%50eci 51 /srgbprofile (srgb IEC61966-2. 1

/Cannotembedfontpolicy/Error /Compatibilitylevel 1. 3 /Compressobjects/Off /Compresspages true /Convertimagestoindexed true /Passthroughjpegimages true /Createjdffile false

>/NLD (Gebruik deze instellingen om Adobe PDF-documenten te maken die zijn geoptimaliseerd voor weergave op een beeldscherm, e-mail en internet.

De gemaakte PDF-documenten kunnen worden geopend met Acrobat en Adobe Reader 5. 0 en hoger

>/ENU (Use these settings to create Adobe PDF documents best suited for on-screen display, e-mail,

and the Internet. Created PDF documents can be opened with Acrobat and Adobe Reader 5. 0 and later

/DEU<FEFF004A006F0062006F007000740069006F006E007300200066006F00720020004100630072006 006200610074002000440069007300740069006c006c0065007200200037000d00500072006f006 00750063006500730020005000440046002000660069006c0065007300200077006800690063006 00200061007200650020007500730065006400200066006f00720020006f006e006c0069006e006 002e000d0028006300290020003200300031003000200053007000720069006e006700650072002 005600650072006c0061006700200047006d006200480020 >>>Namespace Adobe Common 1. 0 /Othernamespaces <</Asreaderspreads false

/Cropimagestoframes true /Errorcontrol/Warnandcontinue /Flattenerignorespreadoverrides false /Includeguidesgrids false /Includenonprinting false /Includeslug false /Namespace Adobe Indesign

4. 0 /Omitplacedbitmaps false /Omitplacedeps false /Omitplacedpdf false /Simulateoverprint/Legacy >><Addbleedmarks false /Addcolorbars false /Addcropmarks false

/Addpageinfo false /Addregmarks false /Convertcolors/Converttorgb /Destinationprofilename (srgb IEC61966-2. 1 /Destinationprofileselector/Usename /Downsample16bitimages true

Adobe Creativesuite 2. 0 /PDFXOUTPUTINTENTPROFILESELECTOR/NA /Preserveediting false /Untaggedcmykhandling/Usedocumentprofile /Untaggedrgbhandling/Usedocumentprofile /Usedocumentbleed false >>>setdistillerparams


< Back - Next >


Overtext Web Module V3.0 Alpha
Copyright Semantic-Knowledge, 1994-2011