Synopsis: Ict: Computer: Computer program:


Survey on ICT and Electronic Commerce Use in Companies (SPAIN-Year 2013-First quarter 2014).pdf.txt

server (54.7 %53.4%of the companies that used Cloud computing did so by paying any service existing in

servers of shared services suppliers The main reasons that limited the companies using this service were the uncertainty about

Communication Technologies based on Open sources (CENATIC Moreover, there is another partnership agreement with the Ministry of Industry, Tourism and


Survey regarding reistance to change in Romanian Innovative SMEs From IT Sector.pdf.txt

companies NACE code principal-6201 (Activities to develop custom software (software -oriented client), 20.9%CAEN 6202 (consultancy activities information technology), 1. 2


The future internet.pdf.txt

multimedia communications, taking advantage of advanced software services, buying and selling, keeping in touch with family and friends, to name a few.

taking advantage of advanced software services, buying and selling, keeping in touch with family and friends, to name a few.

, terminals, servers, etc. CPUS, etc. and handlers (software pro -grams/routines) that generate and treat as well as query

and access data •Storage of â€oedataâ€: refers to memory, buffers, caches, disks, etc. and associated

-nomenon will still cause thousands of cache servers to request the same docu -ments from the original site of publication

Software & Service Architectures & Infrastruc -tures, D4: Networked Enterprise & Radio frequency identification (RFID) and F5

Foundations for the Study of Software Architecture. ACM SIGSOFT Software engineering Notes 17,4 (1992 17 Papadimitriou, D.,et al.

-mon physical substrate of communication nodes and servers managed by multiple infrastructure providers. By decoupling service providers from infrastructure provid

and execute on network hosts, devices, attachments, and servers Towards In-Network Clouds in Future Internet 21

Together these distributed systems form a software-driven net -work control infrastructure that will run on top of all current networks (i e. fixed

an operating system from its underlying hardware resources; resource virtualisation abstracts physical resources into manageable units of functionality.

physical node or server regardless of location, network, and storage configurations and of administrative domain

The virtualisation plane consists of software mechanisms to abstract physical re -sources into appropriate sets of virtual resources that can be organised by the Orches

and software for their state, present their capabili -ties, or collect configuration parameters. A monitoring mechanism and framework

-erations such as getting the state of a server with its CPU or memory usage, getting

components of a server host, were created. We can also measure the same attributes of virtualised hosts by interacting with a hypervisor to collect these values.

, physical nodes and servers) subject to constraints determined by the Orchestration Plane. The Management Plane is de

-cal nodes and servers) subject to constraints determined by the Orchestration Plane Fig. 5. Autonomic Control Loops

-oped and issued as open source 10, which aims to create a highly open and flexible

Full design and implementation of all software platforms are presented in 10 •vcpi (Virtual Component Programming interface is the VP€ s main component deal

-tual entities, such as servers and routers •RNM (Reasoning and Negotiation Module), a core element of the KP, which me

This work has presented the design of an open software networked infrastructure (In -Network Cloud) that enables the composition of fast and guaranteed services in an

OP). The resulting software-driven control network infrastructure was exercised fully and relevant analysis on network virtualisation and service deployments were carried

Virtualising physical network and server resources has served two purposes: Man -aging the heterogeneity through introduction of homogeneous virtual resources and

Platforms and Software systems for an Autonomic Internet. IEEE Globecom 2010; 6-10 dec.,, Miami, USA (2010

Towards the Future Internet, IOS Press, Amsterdam (2009 5. Chapman, C.,et al.:Software Architecture Definition for On-demand Cloud Provisioning

ACM HPDC, 21-25, Chicago hpdc2010. eecs. northwestern. edu (June 2010 6. Rochwerger, B.,et al.:

IOS Press, Amsterdam (2009), http://www. iospress. nl /16. Berl, A.,Fischer, A.,De Meer, H.:

by allowing the distribution of MIP Home Agent (the normally isolated central server to many and less powerful interworking servers called Mobility Agents (MA.

These new nodes have combined the functionality of a MIP Home Agent and HMIP/PMIP Mobility Anchor Points.

-spondent node, a special information server is required in the network, which can also Flat Architectures:

Telecommunications Software and Systems Group †TSSG, Co. Waterford, Ireland {jmserrano, sdavy, mjohnsson, wdonnelly}@ tssg. org

-placing a plethora of proprietary hardware and software platforms with generic solu -tions supporting standardised development and deployment stacks

and outlook of this research. Finally some bibliography references supporting this research are included 2 Challenges for Future Internet Architectures

resources, the software that manages them, and the actors who direct such manage -ment. In federation management end-to-end communication services involve config

distributed software components that communicate across different networks 27 to satisfy end-to-end services client requests.

middleware and hardware levels (3. Analysis) that can be gathered, processed, aggre -gated and correlated (4. Mapping) to provide knowledge that will support management

Typical large enterprise systems contain thousands of physically distributed software components that communicate across different networks to satisfy client requests

that will enable enterprise application management systems to reconfigure software components to better adapt applications to prevailing network conditions.

7 Summary and Outlook In the future Internet new designs ideas of Federated Management in Future Internet

visualize software components, functionality and performance •Techniques for analysis, filtering, detection and comprehension of monitoring data

reconfigure or redeploy software components realizing autonomic application functionality •Guidelines and exemplars for the exchange of relevant knowledge between net

Software systems for an Autonomic Internet. In: IEEE Globecom 2010, Miami, USA, 6 -10 december (2010 14.

IOS Press, Am -sterdam (2009 24. Feldmann, A.:Internet clean-slate design: what and why? ACM SIGCOM Computer

-teraction capabilities to machines, software artifacts and humans connected to it The RWI assumes that the information flow to

c) Resource Users which represent the physical people or application software that intends to interact with Resources and Eoi

resources and the software components implementing the interaction endpoints from the user perspective (Resource End point †REP). Furthermore, the model distin

A REP is a software component that represents an interaction end-point for a physical resource.

is a device that executes the software process representing the REP As mentioned before, the resources

or an embedded server may act as the REP host for a resource, which is physically hosted on a sensor node connected to it

The system is based on the OSGI service middleware and consists of two main sub systems: the service platform openaal and the

The PECES architecture PECES provides a comprehensive software layer to enable the seamless cooperation of embedded devices across various smart spaces on a

The PECES middleware architecture enables dynamic group-based communication between PECES applications (Resources) by utilizing contextual information based on a flexible context ontology.

-sources are not directly analogous to PECES middleware instances, gateways to these devices are more resource-rich

and can host middleware instances, and can be queried provided that an application-level querying interface is implemented.

must be running the PECES middleware before any interaction may occur. Both one-shot and continuous interactions are supported

ASPIRE Advanced Sensors and lightweight Programmable middleware for Innovative RFID Enterprise applications, FP7, http://www. fp7-aspire. eu

identify the resources within IDN-middleware independent of their physical locations in the lower layer are used Uniform Resource Locators (URL) to identify resource

The implementations of IDN-SA are a set of different software modules, one mod -ule for each layer.

Each module, implemented using an HTTP server, will offers a REST interface. The interaction between IDN-compliant applications and IDN-SA

IOS Press, Amsterdam (2010 2. Ayers, D.:From here to There. IEEE Internet Comput 11 (1), 85†89 (2007

and Encapsulation on Software Development Cost and Quality. IEEE Trans. Softw Eng. 21 (3), 200†208 (1995

middleware functionalities, storage, computational, connectivity and networking capabilities, etc •Applications are utilized by the Actors to fulfill their requirements and needs ex

-tive Framework")adopting a modular design based on middleware"enablers"."The enablers can be grouped into two categories:

-ized through the implementation of appropriate Cognitive Middleware-based Agents in the following referred to as Cognitive Managers)

Indeed the software nature of the Cognitive Manager allows a transparent integration in the network nodes.

5) The transparency and the middleware (firmware based) nature of the proposed Cognitive Manger architecture makes relatively easy its embedding in any

the Cognitive Enabler software) can be added/upgraded/deleted through remote wired and/or wireless) control

The framework has been implemented as a Linux Kernel Module and it has been installed in test-bed machines and in a legacy router1 for performance evaluation.

1 We have modified the firmware of a Netgear router (Gigabit Open source Router with Wireless-N and USB port;

software and network, among others. Some one of them (not all) can be used as resources in others relevant literature

-tation facility in software and hardware. However, in a collaborative eï €ort to others Future Internet works, the Entity Title Model has better contributions

layers running in a Distributed Operating system, without the traditional sock -ets used in TCP IP, is used the Raw Socket to enable the communication 19

use of the Raw Socket to communicate with the Distributed Operating system without the use of IP, TCP, UDP and SCTP

de Gereë ncia e Operacâ¸aëoeo de Redes e Servicâ¸os-WGRS-SBRC (2009 28 Rubio-Loyola, J.,Serrat, J.,Astorga, A.,Chai, W. K.,Galis, A.,Clayman, S

IOS Press, Amsterdam (2009 32 Tselentis, G.,et al.:Towards the Future Internet-Emerging Trends from Euro

IOS Press, Amsterdam (2010 33 Tsiatsis, V.,Gluhak, A.,Bauge, T.,Montagut, F.,Bernat, J.,Bauer, M.,Villa

IOS Press, Ams -terdam (2010 34 Vissers, C.,Logrippo, L.:The Importance of the Service Concept in the Design

decreased traffic volume from its own content servers and reduced load of the servers as well as an improved performance of the application,

Peers and the ETMS servers, providing rating information, are located in these stub-ASES, which are interconnected via a hub-AS containing the

software has already been developed for the initial scenario and it is simply a matter of deploying and adopting it on a wider scale.

use between two servers amongst the many possibilities-MPTCP naturally spreads traffic over the available paths

the two servers (at the bottom) travels over two paths through the switching fabric of the data

involves the OS vendor updating their stack) and adoption (which means that MPTCP is actually being used

and deployment is decided mainly by the OS (Operating system) vendor and not the end user Therefore we believe that a more promising initial scenario is an end user that ac

devices and content servers 26 †for example, Nokia or Apple controls both the device and the content server, Nokia Ovi or Apple App store

•Benefits: MPTCP improves resilience -if one link fails on a multi-homed terminal the connection still works over the other interface.

Both the devices and servers are under the control of one stakeholder so the end user †unconsciously†adopts MPTCP.

to think about the benefits and costs for OS vendors, end users, applications and ISPS (Internet service providers. Here also we see the importance of network ef

server sends â€oepremium†packets (perhaps for IPTV) as Conex-Not-Marked or Conex -Re-echo. Conex traffic is prioritised by the operator (â€oepremium serviceâ€.

and then the host†s software would automatically send the user†s premium traffic (Voip say) as Conex-enabled.

•Roll out of the software should be cheaper, therefore the expected benefits of the deployment can be less

immediately use the new (virtualised) software, so effectively a large number of users can be enabled simultaneously

â€oeroll back†if there is some problem with the new software Virtualisation is not suitable for all types of software, for instance new transport layer

functionality, such as MPTCP and CONEX, needs to be on the actual devices 142 P. Eardley et al

-rors, draft-ford-http-multi-server, work in progress (2009 25. Raiciu, C.,Plunkte, C.,Barre, S.,Greenhalgh, A.,Wishcik, D.,Handley, M.:

-age capabilities of servers and networking infrastructure. For example, routing table memory of core Internet routers can be considered a â€oepublic good†that retail ISPS

when multiple candidate servers are available, a consumer may prefer the one offering better Qos,

the server that minimizes its cost; e g.,, this is possible if the provider operates a local

where most applications run on a remote server, is considered to achieving energy savings but to the disadvantage of the server provider

However under some assumptions, Wifi hotspots can consume much less energy than UMTS (Universal mobile telecommunications system) networks.

software systems, and platforms, however, is to be aware that technology is not value-free, since it can have several consequences.

Internet-Emerging Trends from European Research, IOS Press, Amsterdam (2010 16. Trilogy: D10-Initial Evaluation of Social and Commercial Control Progress, 2009, Public

and provide an outlook to their mitigation, embedded in a system -atic security risk management process.

such as software components, individual nodes, or ASES. An upgraph of a node is the set of potential resources, that can be represented as a network map of domains and their

/Software/PLA/new/doc/PLA HW FINAL REPORT. pdf 25. Lagutin, D.:Securing the Internet with Digital Signatures.

in the scope of secure service engineering into comprehensive software and service life cycle support. Such a life cycle support must deliver

the present know how on building secure software services and systems: more stakeholders with diï €erent trust levels are involved in a typical service com

1. 2 The Need for Engineering Secure Software Services The need to organize, integrate and optimize the research on engineering secure

software services to deal eï €ectively with this increased challenge is pertinent and well recognized by the research community and by the industrial one.

-cesses and tools for secure software development. This typically covers require -ments engineering, architecture creation, design and implementation techniques

developed software is secure. Assurance must be based on justiï able evidence and the whole process designed for assurance.

integrating the former results in (5) a risk-aware and cost-aware software devel -opment life-cycle (SDLC),

software development: from requirements over architecture and design to the composition and/or programming of working solutions.

-age existing mechanisms and methodologies for software construction as well as researching about new ways to take this complexity into account in a holistic

software service and/or system is a timely moment to enforce and reason about these security mechanisms,

The software architecture encompasses the more relevant elements of the ap -plication, providing either a static or/and a dynamic view of the application.

which comprise software elements, the ex -ternally visible properties of those elements, and the relationships among themâ€

early phase in the software development cycle The research topics one must focus on in this subarea relate to model-driven

Until this point in the software and service development process, diï €erent concerns †security among them †of the whole application have been sepa

-curring problem in software design. Design patterns, once identiï ed, allow reuse of design solutions that have proved to be eï €ective in the past, reducing costs

security-critical software systems 4 Security Support in Programming Environments Security Support in Programming Environments is not new;

-ing Future Internet Service is inherently a matter of secure software and systems The context of the future internet services sets the scene in the sense that (1

technologies will be used to develop the actual software and systems The search for security support in programming environments has to take

-ciï c elements of the software design; other may simply be high priority security requirements that have articulated †such as the appropriate treatment of con

Middleware Aspects. The research community should re-investigate ser -vice-oriented middleware for the Future Internet, with a special emphasis on

Engineering Secure Future Internet Services 185 enabling deployment, access, discovery and composition of pervasive services

-gram to well-known programming principles or best-practices in secure software development. Emphasis will be put on language extensions that guarantee adher

central role in the development of software based services to provide conï dence about the desired security level.

giving feedback at each stage of the software life cycle by checking that the related models and artefacts satisfy their functional and security requirements

enables to manage assurance throughout the software and service development life cycle (SDLC. The next section clariï es these issues

The main objective is to enable assurance in the development of software based services to ensure conï dence about their trustworthiness.

the software development life cycle (SDLC. The methodology is based on two strands: A ï rst sub-domain covers early assurance at the level of requirements

of the software life cycle, automated generation in XML-based input data to maximize the eï ciency in the security testing process,

While the software development proceeds through incremental phases, the risk and cost analysis will undergo new iterations for

-gate through the software development phases and become more reï ned. In order to support the propagation of analysis results through the phases of the SDLC

In order to accommodate to a modular software development pro -cess, as well as eï €ectively handling the heterogeneous and compositional nature

Network of Excellence on Engineering Secure Future Internet Software Services and Systems) under the grant agreement n. 256980

Software Architecture In practice, 2nd edn Addison-Wesley, Boston (2003 3. Bauer, L.,Ligatti, J.,Walker, D.:

agent-oriented software development methodology. Autonomous Agents and Multi -Agent Systems 8, 203†236 (2004

SPAQU€ 08 (Int. Workshop on Software Patterns and Quality)( 2008 18. Lazouski, A.,Martinelli, F.,Mori, P.:

The vision of the Internet of Services (Ios) entails a major paradigm shift in the way ICT systems and applications are designed,

In the Ios, services are business functionalities that are designed and implemented by producers, deployed by providers,

However, the new opportunities opened by the Ios will only materialize if concepts, techniques and tools are provided to ensure secu

-sumption time, thereby signiï cantly improving the all-round security of the Ios In this chapter, we give a brief overview of the main scientiï c and industrial chal

thus increase the development and public acceptance of the Ios We proceed as follows. In Sections 2 and 3, we discuss, respectively, some of

layer of software modules that carry out the translation from application-level speciï cation languages (such as BPMN and BPEL,

server to impersonate a user on any Google application. In 2, solutions that can be used to mitigate

6 Conclusions and Outlook As exempliï ed by these case studies and success stories, formal validation tech

-nologies can have a decisive impact for the trust and security of the Ios. The

advances will signiï cantly improve the all-round security of the Ios, and thus boost its development and public acceptance

2007), http://docs. oasis-open. org/wsbpel/2. 0/OS/wsbpel-v2. 0-OS. pdf

from the convergence of computer server power, storage and network bandwidth It is a new business

Following its software-plus-services strategy an -nounced in 2007, Microsoft has developed in the past years several Saas cloud

such as operating systems, middleware, or actual software requires a case-by-case design of isolation mechanisms. In particular the last example of Software-as-a

-Service requires that each data instance is assigned to a customer and that these instances cannot be accessed by other customers.

Note that in practice these mechanisms are mixed often: While an enterprise customer may own a vir

-tual machine (Machine-level isolation), this machine may use a database server Middleware isolation) and provide services to multiple individual departments

Application isolation In order to mitigate this risk in a cloud computing environment, multi-tenant isolation ensures customer isolation.

cloud environment or recover from software and hardware failures For building such resilient systems, important tools are data replication

5 Outlook †The Path Ahead Cloud computing is not new †it constitutes a new outsourcing delivery model

of their data stored in a remote server or in the cloud. We introduce a

, servers services, applications) provided by the cloud, that are provisioned rapidly with a minimal management eï €ort and pay-peruse.

as setting and comparing user preferences with server privacy policies, ex -pressing conditions on complex secondary usage cases, specifying obligations

In fact, this sticky policy will be sent to the server and follow the data in all their lifecycle to specify the usage conditions

-ing the data from the server. This nested policy is applicable when a server storing personal data decides to share the data with a third party

†Obligations: Obligations in sticky policies specify the actions that should be carried out after collecting

data before sending it to any server. For example, we can deï ne black or white lists for websites with whom we do not want to exchange our personal

If a third party requests some data from the server, the latter becomes a data provider and acts as a user-side engine invoking access control and matching

In other words, we suppose that the server enforces correctly the sticky policies, but, actually, nothing prevents him from

Trust and tamper-proof software delivery. In: Proceed -ings of the 2006 international workshop on Software engineering for secure sys

Resource Adapter (a concept similar to device drivers) wraps a domain†s resource API in order to create a homogeneous API defined by Panlab.

server, an application server, a database and a workload generator, which produces the appropriate requests.

using Xen server technology, which allows regulating system resources such as CPU usage and memory, and provides also a monitoring tool, Ganglia, that measures net

using Xen server technology to regulate CPU usage. During this scenario the adaptive admission control and resource allocation algorithm is tested against network metrics

During the setup, the researcher wants to test http proxy software written in C pro

â € Linux machines for the RUBIS based work load generators â € A Linux machine for the hosting the algorithm unit, capable of compiling C and

Java software â € Linux machines for running XEN server where on top will run the RUBIS Web

app and database The final user needs to provide the algorithm under test. He will just login to the

Proxy Unit, compile the software and execute it. The user will not have access to the

RUBIS resources (i e. cannot login) so there is a need to encapsulate the monitoring and provisioning capabilities.

Virtual machines managed by a XEN server. The implemented RAS instantiate all these Virtual machines and configure the internal components according to end-user

displays the RADL definition for the RUBIS application server The Configuration Parameters section describes the exposed parameters to the end

-tion 7 provides a brief summary and outlook to the enhancements of federated facilities 2 Experiment Objectives and Requirements for a

reservation and installation of arbitrary software but is distributed only within Germany, has limited a access, and currently provides no federation method

Booking of Resources With the SFA software it was possible to book nodes in Planetlab, Planetlab Europe and in the VINI Testbed.

arbitrary software on the G-Lab nodes. We assume that such features are of interest for many experimenters,

-erators and developers to oï €er their measurement results and software tools to the public and to share their experience.

-tures by using the Self-NET software for self management over a Wimax network environment. The monitoring and configuration capabilities that differ

which is a software tool that generates traffic at both Uoa end machines. This is a

Fig. 1. Octopus testbed Wimax and Self-NET software federation ITGLOG), printing and plotting specific metrics (ITGDEC, ITGPLOT) and remotely

software and deployment of IP routing and tunneling between Octopus and Self-NET environments We implemented A BS control software (i e.

NECM) to allow dynamically collect Wimax link information from the BS and to control Quality of Service (Qos) set

IOS Press, Amsterdam (2010 7. Airspan homepage, http://www. airspan. com 8. Distributed Internet traffic Generator

http://www. grid. unina. it/software/ITG/index. php 9. Resource Adapter Description Language http://trac. panlab. net/trac/wiki/RADL

of the current network typically resides in client stations and servers, which interact with network elements (NES) via protocols such as SNMP (Simple Network Man

underlying hardware and software resources comprise management issues highly challenging, meaning that currently, a diversity in terms of hardware resources leads

IOS Press, Amsterdam (2009 10. Organization for Economic Co-operation Development (OECD: The Seoul Declaration

open-source multimedia framework, player and server http://www. videolan. org/vlc J. Domingue et al. Eds.):

In 7, the issue of server selection is being investigated by proposing a node selection algorithm with respect to the worst-case link stress (WLS) criterion

-demand access to IT hardware or software resources over the Internet. Clouds are revolutionizing the IT world 11,

and the service middleware layer. Each layer is responsible for implementing diï €erent functionalities covering the full end-to-end

3. Finally, a service middleware layer is introduced to fully decouple the physical infrastructure from the service level.

SML Service Middleware Layer VI Virtual Infrastructure VIO Virtual Infrastructure Operator VIO-IT Virtual IT Infrastructure Operator

Enterprise Information system externally on a Cloud rented from a Software -as-a-Service (Saas) provider.

between the NCP+and the service middleware layer (SML) via a service -to-network interface, named NIPS UNI during the entire VI service life cycle

19 http://www. ens-lyon. fr/LIP/RESO/Software/vxdl/home. html 316 P. Vicat-Blanc et al

-opment activities of the GEYSERS project to achieve the complete software stack and provide the proof of concept of these architectural considerations

of the diï €erent software components creating and managing optical virtual in -frastructures. The other goal is to evaluate the performance and functionality of

motivation for services research both in the software industry and academia The Internet of Services is concerned with the creation of a layer within the Future

software on-demand, from a shared pool, with minimal interaction or knowledge by users. Cloud services can be divided into three target audiences:

⠀ Platform as a service †providing services for software vendors such as a soft -ware development platform or a hosting service

-cally, a service is dependent on many other services, e g. the offering of a software service requires infrastructure resources, software licenses or other software services

We propose an SLA management framework that offers a core element for manag -ing SLAS in the future Internet.

-ness, software, and infrastructure) on the other With a set of four complementary use case studies, we are able to evaluate our ap

2) supports arbitrary service types (business, software, infrastructure) and SLA terms,(3) covers the complete SLA and service lifecycle with consistent interlinking

business, software and infrastruc -ture. The framework communicates to external parties, namely customers who (want

-structure and software), deployed Service Instances with their Manageability Agents and Monitoring Event Channels. The Framework Core encapsulates all functionality

Infrastructure-and Software Service Managers contain all service-specific functionality. The deployed Service Instance is the actual service delivered to the

Software SLA Manager Infrastructure SLA Manager Business Manager Service Evaluation Infrastructure Service Manager Software Service Manager

Customer 3rd Party Manageability Agent Infrastructure Service <<provider relations >><negotiate >><customer relations >>Monitored Event Channel <<control/track

Software Service <<adjust >>deployed infrastructure service deployed software service <<negotiate >>framework core Fig. 1. Overview of the SLA Framework Reference Architecture

While all framework components come with default implementations they can also easily be extended or enhanced for more specific domain needs.

contains many aspects of a software cloud 3. 3 Interlinkage with System Management SLA-driven system management is the primary approach discussed in this paper.

-tion of server capacity, and a broad range of services in terms of relative priority resource requirement and longevity.

Software services could potentially be selected by choosing a virtual machine template which contains pre-loaded applications,

but software layer considerations are considered not core to this Use Case and are dealt more comprehensively with in the ERP Hosting Use Case

a software package (an application) but also some business-level activities, such as a support contract. At the next level, there are the actual software applications, such as for

example a hosted ERP SOFTWARE package. At the next level, there are the required mid -dleware components which are used equally for different applications.

At the lowest layer, there are the infrastructure resources, delivered through an internal or external cloud.

Application SLA is mainly about the throughput capacity of the software solution, its response time, and the provider internal costs required for the offering.

The Middleware SLA specifies the capacity of the middleware components, the response time guarantee of the middleware components and the costs required for the offering.

The Infrastructure SLA specifies the characteristics of the virtual or physical resources (CPU speed, mem

-ory, and storage) and again the costs required for the offering The use case successfully applies the SLA framework by realizing distinct SLA

support department, the application, the middleware, and the infrastructure artefacts From a technical perspective, the most difficult piece in the realization of the

the different components, e g. the performance characteristics of the middleware. We collected a set of model-driven architecture artefacts, measurements,

integrates software layer (from SLA@SOI framework architecture. And finally Bank prototype is implemented using the top layer, business.

wrappers by Software SLA Manager in an application server and also the provision of the infrastructure driven by Infrastructure SLA Manager (using the appropriate ser

SMS wrappers deployed in the application server of the corresponding virtual machine has to connect and execute different tasks with core mobile network

systems that are behind Telefã nica Software Delivery Platform (SDP. The compo -336 J. Butler et al

For example, while typical software/hardware guarantee terms constraint the quality of each single execution of a service, in this use case the guarantee terms constraint

network, software, and business artefacts. Four complementary industrial use cases demonstrated the applicability and relevance of the approach.

-opment activities via an Open source Project. The first framework version fully pub -lished as open source can be found at 5

Open Access. This article is distributed under the terms of the Creative Commons Attribution Noncommercial License which permits any noncommercial use, distribution, and reproduction

5. SLA@SOI Open source Framework. First full release by December 2010 http://sourceforge. net/projects/sla-at-soi

there are some limitations for the software-driven control network infrastruc -ture, formed by the OSKMV,

contribute to the translations of the MBT (Model-based Translator) software package, by the use of the FINLAN formal representation in OWL.

The Autoi open source implements a scal -able and modular architecture to the deployment, control and management of

{private Serversocket server private int port=43702 private Socket s=null public static Knowledgeplane KP=null

+""s1=server. accept With the use of the FINLAN library this communication can be done replacing

the FINLAN ontology in Linux operating system kernel level, allowing the facil -ities in its use in diï €erent programming languages,

would be available at the operating system level 4 Conclusions This paper has presented the FINLAN ontology works in a collaboration per

Future work will implement the FINLAN ontology at the Linux kernel level and run performance and scalability experiments with diï €erent Future Internet

Platforms and Software systems for an Autonomic Internet. In: IEEE Global Communications Conference (2010 14 Rubio-Loyola, J.,Astorga, A.,Serrat, J.,Lefevre, L.,Cheniour, A.,Muldowney

Integracâ¸aëoeo de Servicâ¸os em Ambientes Heterogeë neos: uso de Semaë ntica para Comunicacâ¸aëoeo Entre Entidades em Mudancâ¸as de Contexto.

consuming of functionalities of existing pieces of software. In particular, WSDL is used to provide structured descriptions for services, operations and endpoints, while

users ratings, tags and comments about services in a separate server. On the basis of

software clients are able to access easily underlying descriptions Linking †linking between descriptions should be supported to facilitate the reuse

Architectural styles and the Design of Network-based Software Architec -tures. Phd Thesis, University of California (2000

•Third, the todays†software technologies support the creation and composition of services while being able to take into account information regarding the trans

At its turn, the SM@SP instructs the SP/CP servers how to mark the data packets

server AS3 VCAN1/MQC1 VCAN2/MQC2 VCAN3/MQC3 L2, L3, L4 headers High level headers

-tween CPS and NPS for hosting or co-locating CP€ s content servers in NPS€ premises

IOS Press, Amsterdam (2009 4. Schã nwã¤lder, J.,et al.:Future Internet=Content+Services+Management.

IOS Press, Amsterdam (2009 6. Huszã¡k, Ã.,Imre, S.:Content-aware Interface Selection Method for Multi-Path Video

IOS Press, Amsterdam (2009 8. Martini, M. G.,et al.:Content Adaptive Network Aware Joint Optimization of Wireless

IOS Press, Amsterdam (2009 10. Anderson, T.,et al.:Overcoming the Internet Impasse through Virtualization. Com

video streaming, due to a bandwidth bottleneck at the server side from which all users request the content.

MDC combined with path/server diversity offers robust video delivery over unreliable networks and/or in peer-to-peer

-dence of software proposal for Wavelet Video Coding Exploration group, ISO/IEC JTC1/SC29/WG11/MPEG2006/M13146, 76th MPEG Meeting, Montreux, Switzerland

search engines are expected to be able to understand underlying semantics in content and match it to the query.

-ios as semantic image retrieval. However, the semantic gap lying between levels 1 and 2 hampers the progress of multimedia retrieval area 19.

the federation and integration of appropriate software building blocks. A new genera -tion of enterprise systems comprising applications

of utility-like software services High-value Future Internet applications are also foreseen in the domain of living

In recent years, software development methods and technologies have markedly evolved, with the advent of SOA 15, MDA 16, Ontologies and Semantic web, to

and realising enterprises software applications In essence, while enterprise management and planning services will be increas -ingly available from the †cloudâ€, in a commoditised form, the future business needs

the Internet of Services (Ios), Internet of things (Iot) and smart ob -jects, Internet of Knowledge (Iok), Internet of People (Iop.

services, tools, software packages, interfaces and user interaction solutions that are not available at the present time.

of software architectures. This will be possible if such software architectures will correspond to the enterprise architectures,

and will be composed by elements tightly coupled with business entities. The achievement of this objective relies on a number

based on the notion of a FINER, seen as the new frontier to software components aimed at achieving agile system architectures.

design approaches, methods and tools, supporting the idea that large software systems can be created starting from independent,

reusable collections of preexisting software components This technical area is referred often to as Component Based Software engineering

) The basic idea of software componentization is quite the same as software modularization, but mainly focused on reuse.

that in a short time imposed itself over the preexisting modular software develop -ment techniques.

OOP aims at developing applications and software systems that provide a high level of data abstraction and modularity (using technologies such as

Agents mark a fundamental difference from conventional software mod -ules in that they are inherently autonomous and endowed with advanced communica

highly interoperable software architectures through the spread of the Service-Oriented approach, and the consequent proliferation of Service-Oriented Architectures (SOA

interacting software services, i e.,, units of work performed by software applications typically communicating over the Internet 11

In general, a SOA will be implemented starting from a collection of components e-services) of two different sorts.

manage a new generation enterprise software architectures. Cloud computing repre -sents an innovative way to architect and remotely manage computing resources:

over the Internet and the hardware and system software in the datacenters that provide those services 12.

approach, to ease software development processes. Conversely, we propose to base a FINES architecture on building blocks based on business components.

or responding (as server) to request messages. It is structured according to the grounding of OWL-S

Ios, Multi-Agent Systems, Cloud computing, Autonomic Systems) and, in parallel some key areas of the enterprise that will start to benefit of the FINES approach

Component-oriented software development, Spe -cial issue on alaysis and modeling in software development, pp. 160†165 (1992

11. Petritsch, H.:Service-Oriented Architecture (SOA) vs. Component Based Architecture white paper, TU Wien (2006), http://whitepapers. techrepublic. com. com

IOS Press, Amsterdam (2010 16. Papazoglou, M. P.:Web Services: Principles and Technology. Prentice-hall, Englewood

and in the server farms is not considered since no special equipment is deployed in the GSN

a convergence of server and network virtualizations as virtual infrastructure manage -ment. The GSN as a network architecture is built with multiple layers, resulting in a

robust software while running trials on a range of network equipment The Mantychore FP7 project allows the NRENS to provide a complete, flexible

PDU Servers (Dell Poweredge R710 To core network Wind power node architecture Spoke Switch Allied Telesis

Servers (Dell Poweredge R710 Hydroelectricity power node architecture (Hub MUX/DEMUX To core network Backup Disk

by green energy and adjust the network to the needs controlled by software. The cost

such as routers and servers, is not considered, because no special hardware equipment is used in the GSN

grouped in bundles of 9 or 10 panels, each panel generates a power of 220-230w.

The wind turbine system is a 15kw generator. After being accumulated in a battery bank electrical energy is treated by an inverter/charger in order to produce an appropriate

servers are linked by a local network, which is connected then to the core network through GE transceivers.

then pushes Virtual machines (VMS) or software virtual routers from the hub to a sun or wind node (spoke node) when power is available.

level, including massive physical resources, such as storage servers and application servers linked by controlled circuits (i e.,

, lightpaths. The Platform Control plane corresponds to the Core Middleware layer, implementing the platform level services

that provide running environment enabling cloud computing and networking capabili -ties to GSN services. The Cloud Middleware plane corresponds to the User-level

Middleware, providing Platform as a service capabilities based on Iaas Framework components 5. The top Management plane or User level focuses on application

services by making use of services provided by the lower layer services 4 Virtual Data center Migration

servers with a high density connection local network. The migration involves four steps i) Setting up a new environment (i e.,

servers and network devices in a multi-domain environment Fig. 4. Iaas Framework Architecture Overview

and that each server has up to 16 processors, 20 servers can be moved in parallel. If each VM consumes

4gbyte memory space, the time required for such a migration is 1000sec The migration of data centers among GSN nodes is based on cloud management

converges server and network virtualizations. Whilst most of cloud management solu -tions in the market focus particularly on computing resources, Iaas Framework compo

An orchestration middleware is built to federate clouds across domains, coordinate user registration, resource allocation stitching, launch, monitoring,

and interoperate with software outside of the GSN Along with the participation of international nodes, there is an increasing need of

including virtual servers and virtual routers and/or virtual switches interconnecting the servers. Such a virtual data

center can be hosted by any physical network node, according to the power availabil -ity. There is a domain controller within each data center or a set of data centers shar

-tion 4. Finally, section 5 presents conclusions and an outlook 2 City and Urban Development Challenges

-ing, wireless networks, middleware and agent technologies as they become embedded into the physical spaces of cities.

software components City-based clouds Open and federated content platforms Cloud-based fully connected city

Software agents and advanced sensor fusion; telepresence Demand for e-services in the domains outlined in Fig. 1 is increasing,

There is a critical gap between software applications and the provi -sion of e-services in terms of sustainability and financial viability.

Open source communities may also sub -stantially contribute to the exchange of good practices and open solutions

5 Conclusions and Outlook In this paper we explored the concept of â€oesmart cities†as environments of open and

Things (Iot) and Internet of Services (Ios), can become building blocks to pro -gress towards a unified urban-scale ICT platform transforming a Smart City

and at the service level (Ios as a suit of open and standardized en -ablers to facilitate the composition of interoperable smart city services.

•The Internet of Services (Ios: flexible, open and standardized enablers that facili -tate the harmonization of various applications into interoperable services as well as

-nents of the Future Internet, namely Iot and Ios, can be essential building blocks in future Smart Cities open innovation platforms.

2 Iot and Ios as ICT Building blocks for Smart Cities In the analysis from Forrester research 9 on the role that ICT will play in creating

Ios evolution must be correlated undoubtedly with Iot advances. Otherwise, a number of future Smart City services will never have an opportunity to be con

-ing Iot and Ios at the city scale Starting with the benefits of Iot technologies, they are twofold:

Considering now the Ios, it must be stressed that it is recognized widely (see for example 12) that the real impact of future Iot developments is tied heavily to the

parallel evolution of the Ios. So, a Smart City could only become a true open innova

-tion platform through the proper harmonization of Ios and Iot. There can be a long

Thus the integration of innovative principles and philosophy of Ios will engage collective end-user intelligence from Web 2. 0

The technological challenge of developing the Ios has been assumed at EU level, and actions are being initiated to overcome the undesirable dissociation between technologi

Ios resources Testbed 1 USN-Enabler Service 1 Adaptation & Homogeneization Testbed Control Layer GSDP

Ios federation level Iot federation level NGN /Telco2. 0 Web2. 0 Service 2 Iot Service Service n

Fig. 1. Global Service Delivery Platform (GSDP) integrating Iot/Ios building blocks 3 Developing Urban Iot Platforms

This capability will allow a seamless link between Iot and Ios, as discussed in Section 2

needed to enable an evolving FI based on the Iot and Ios paradigms Functionalities required to support services are offered both in synchronous and

Opencom Middleware Mobility support Horizontal support Federation support S ecurity, Privacy and Trust Fig. 3. Smartsantander:

initiatives on both Iot and Ios areas as WISEBED 25, SENSEI 8 and the USN

the subsystems (collectively, the Smartsantander middleware) that provide the func -tionality described by these requirements

Future Internet potential, through Iot and Ios, for creating new real-life applications and services is huge in the smart city context.

-twining Iot and Ios worlds. Referred Iot USN platform is currently being evolved with the addition of new capabilities,

) Towards the Future Internet, IOS Press, Amsterdam (2009 17. Fisher, S.:Towards an Open Federation Alliance.

Summary and Outlook References An Architectural Blueprint for a Real-world Internet Introduction The Real world Internet

The Need for Engineering Secure Software Services Research Focus on Developing Secure FI Services Security Requirements Engineering

Conclusions and Outlook Trustworthy Clouds Underpinning the Future Internet Cloud computing and the Future Internet Trust and Security Limitations of Global Cloud Infrastructures

Outlook †The Path Ahead Data Usage Control in the future Internet Cloud Introduction Primelife Privacy Framework

Conclusions and Outlook References Smart Cities at the Forefront of the Future Internet Introduction Iot and Ios as ICT Building blocks for Smart Cities

Developing Urban Iot Platforms The Need of Urban Scale Experimental Facilities Conclusions References Author Index

Indesign 4. 0 /Omitplacedbitmaps false /Omitplacedeps false /Omitplacedpdf false /Simulateoverprint/Legacy >><Addbleedmarks false /Addcolorbars false


< Back - Next >


Overtext Web Module V3.0 Alpha
Copyright Semantic-Knowledge, 1994-2011