server (54.7 %53.4%of the companies that used Cloud computing did so by paying any service existing in
servers of shared services suppliers The main reasons that limited the companies using this service were the uncertainty about
Communication Technologies based on Open sources (CENATIC Moreover, there is another partnership agreement with the Ministry of Industry, Tourism and
companies NACE code principal-6201 (Activities to develop custom software (software -oriented client), 20.9%CAEN 6202 (consultancy activities information technology), 1. 2
multimedia communications, taking advantage of advanced software services, buying and selling, keeping in touch with family and friends, to name a few.
taking advantage of advanced software services, buying and selling, keeping in touch with family and friends, to name a few.
, terminals, servers, etc. CPUS, etc. and handlers (software pro -grams/routines) that generate and treat as well as query
and access data â¢Storage of âoedataâ: refers to memory, buffers, caches, disks, etc. and associated
-nomenon will still cause thousands of cache servers to request the same docu -ments from the original site of publication
Software & Service Architectures & Infrastruc -tures, D4: Networked Enterprise & Radio frequency identification (RFID) and F5
Foundations for the Study of Software Architecture. ACM SIGSOFT Software engineering Notes 17,4 (1992 17 Papadimitriou, D.,et al.
-mon physical substrate of communication nodes and servers managed by multiple infrastructure providers. By decoupling service providers from infrastructure provid
and execute on network hosts, devices, attachments, and servers Towards In-Network Clouds in Future Internet 21
Together these distributed systems form a software-driven net -work control infrastructure that will run on top of all current networks (i e. fixed
an operating system from its underlying hardware resources; resource virtualisation abstracts physical resources into manageable units of functionality.
physical node or server regardless of location, network, and storage configurations and of administrative domain
The virtualisation plane consists of software mechanisms to abstract physical re -sources into appropriate sets of virtual resources that can be organised by the Orches
and software for their state, present their capabili -ties, or collect configuration parameters. A monitoring mechanism and framework
-erations such as getting the state of a server with its CPU or memory usage, getting
components of a server host, were created. We can also measure the same attributes of virtualised hosts by interacting with a hypervisor to collect these values.
, physical nodes and servers) subject to constraints determined by the Orchestration Plane. The Management Plane is de
-cal nodes and servers) subject to constraints determined by the Orchestration Plane Fig. 5. Autonomic Control Loops
-oped and issued as open source 10, which aims to create a highly open and flexible
Full design and implementation of all software platforms are presented in 10 â¢vcpi (Virtual Component Programming interface is the VP s main component deal
-tual entities, such as servers and routers â¢RNM (Reasoning and Negotiation Module), a core element of the KP, which me
This work has presented the design of an open software networked infrastructure (In -Network Cloud) that enables the composition of fast and guaranteed services in an
OP). The resulting software-driven control network infrastructure was exercised fully and relevant analysis on network virtualisation and service deployments were carried
Virtualising physical network and server resources has served two purposes: Man -aging the heterogeneity through introduction of homogeneous virtual resources and
Platforms and Software systems for an Autonomic Internet. IEEE Globecom 2010; 6-10 dec.,, Miami, USA (2010
Towards the Future Internet, IOS Press, Amsterdam (2009 5. Chapman, C.,et al.:Software Architecture Definition for On-demand Cloud Provisioning
ACM HPDC, 21-25, Chicago hpdc2010. eecs. northwestern. edu (June 2010 6. Rochwerger, B.,et al.:
IOS Press, Amsterdam (2009), http://www. iospress. nl /16. Berl, A.,Fischer, A.,De Meer, H.:
by allowing the distribution of MIP Home Agent (the normally isolated central server to many and less powerful interworking servers called Mobility Agents (MA.
These new nodes have combined the functionality of a MIP Home Agent and HMIP/PMIP Mobility Anchor Points.
-spondent node, a special information server is required in the network, which can also Flat Architectures:
Telecommunications Software and Systems Group â TSSG, Co. Waterford, Ireland {jmserrano, sdavy, mjohnsson, wdonnelly}@ tssg. org
-placing a plethora of proprietary hardware and software platforms with generic solu -tions supporting standardised development and deployment stacks
and outlook of this research. Finally some bibliography references supporting this research are included 2 Challenges for Future Internet Architectures
resources, the software that manages them, and the actors who direct such manage -ment. In federation management end-to-end communication services involve config
distributed software components that communicate across different networks 27 to satisfy end-to-end services client requests.
middleware and hardware levels (3. Analysis) that can be gathered, processed, aggre -gated and correlated (4. Mapping) to provide knowledge that will support management
Typical large enterprise systems contain thousands of physically distributed software components that communicate across different networks to satisfy client requests
that will enable enterprise application management systems to reconfigure software components to better adapt applications to prevailing network conditions.
7 Summary and Outlook In the future Internet new designs ideas of Federated Management in Future Internet
visualize software components, functionality and performance â¢Techniques for analysis, filtering, detection and comprehension of monitoring data
reconfigure or redeploy software components realizing autonomic application functionality â¢Guidelines and exemplars for the exchange of relevant knowledge between net
Software systems for an Autonomic Internet. In: IEEE Globecom 2010, Miami, USA, 6 -10 december (2010 14.
IOS Press, Am -sterdam (2009 24. Feldmann, A.:Internet clean-slate design: what and why? ACM SIGCOM Computer
-teraction capabilities to machines, software artifacts and humans connected to it The RWI assumes that the information flow to
c) Resource Users which represent the physical people or application software that intends to interact with Resources and Eoi
resources and the software components implementing the interaction endpoints from the user perspective (Resource End point â REP). Furthermore, the model distin
A REP is a software component that represents an interaction end-point for a physical resource.
is a device that executes the software process representing the REP As mentioned before, the resources
or an embedded server may act as the REP host for a resource, which is physically hosted on a sensor node connected to it
The system is based on the OSGI service middleware and consists of two main sub systems: the service platform openaal and the
The PECES architecture PECES provides a comprehensive software layer to enable the seamless cooperation of embedded devices across various smart spaces on a
The PECES middleware architecture enables dynamic group-based communication between PECES applications (Resources) by utilizing contextual information based on a flexible context ontology.
-sources are not directly analogous to PECES middleware instances, gateways to these devices are more resource-rich
and can host middleware instances, and can be queried provided that an application-level querying interface is implemented.
must be running the PECES middleware before any interaction may occur. Both one-shot and continuous interactions are supported
ASPIRE Advanced Sensors and lightweight Programmable middleware for Innovative RFID Enterprise applications, FP7, http://www. fp7-aspire. eu
identify the resources within IDN-middleware independent of their physical locations in the lower layer are used Uniform Resource Locators (URL) to identify resource
The implementations of IDN-SA are a set of different software modules, one mod -ule for each layer.
Each module, implemented using an HTTP server, will offers a REST interface. The interaction between IDN-compliant applications and IDN-SA
IOS Press, Amsterdam (2010 2. Ayers, D.:From here to There. IEEE Internet Comput 11 (1), 85â 89 (2007
and Encapsulation on Software Development Cost and Quality. IEEE Trans. Softw Eng. 21 (3), 200â 208 (1995
middleware functionalities, storage, computational, connectivity and networking capabilities, etc â¢Applications are utilized by the Actors to fulfill their requirements and needs ex
-tive Framework")adopting a modular design based on middleware"enablers"."The enablers can be grouped into two categories:
-ized through the implementation of appropriate Cognitive Middleware-based Agents in the following referred to as Cognitive Managers)
Indeed the software nature of the Cognitive Manager allows a transparent integration in the network nodes.
5) The transparency and the middleware (firmware based) nature of the proposed Cognitive Manger architecture makes relatively easy its embedding in any
the Cognitive Enabler software) can be added/upgraded/deleted through remote wired and/or wireless) control
The framework has been implemented as a Linux Kernel Module and it has been installed in test-bed machines and in a legacy router1 for performance evaluation.
1 We have modified the firmware of a Netgear router (Gigabit Open source Router with Wireless-N and USB port;
software and network, among others. Some one of them (not all) can be used as resources in others relevant literature
-tation facility in software and hardware. However, in a collaborative eï ort to others Future Internet works, the Entity Title Model has better contributions
layers running in a Distributed Operating system, without the traditional sock -ets used in TCP IP, is used the Raw Socket to enable the communication 19
use of the Raw Socket to communicate with the Distributed Operating system without the use of IP, TCP, UDP and SCTP
de Gereë ncia e Operacâ¸aëoeo de Redes e Servicâ¸os-WGRS-SBRC (2009 28 Rubio-Loyola, J.,Serrat, J.,Astorga, A.,Chai, W. K.,Galis, A.,Clayman, S
IOS Press, Amsterdam (2009 32 Tselentis, G.,et al.:Towards the Future Internet-Emerging Trends from Euro
IOS Press, Amsterdam (2010 33 Tsiatsis, V.,Gluhak, A.,Bauge, T.,Montagut, F.,Bernat, J.,Bauer, M.,Villa
IOS Press, Ams -terdam (2010 34 Vissers, C.,Logrippo, L.:The Importance of the Service Concept in the Design
decreased traffic volume from its own content servers and reduced load of the servers as well as an improved performance of the application,
Peers and the ETMS servers, providing rating information, are located in these stub-ASES, which are interconnected via a hub-AS containing the
software has already been developed for the initial scenario and it is simply a matter of deploying and adopting it on a wider scale.
use between two servers amongst the many possibilities-MPTCP naturally spreads traffic over the available paths
the two servers (at the bottom) travels over two paths through the switching fabric of the data
involves the OS vendor updating their stack) and adoption (which means that MPTCP is actually being used
and deployment is decided mainly by the OS (Operating system) vendor and not the end user Therefore we believe that a more promising initial scenario is an end user that ac
devices and content servers 26 â for example, Nokia or Apple controls both the device and the content server, Nokia Ovi or Apple App store
â¢Benefits: MPTCP improves resilience -if one link fails on a multi-homed terminal the connection still works over the other interface.
Both the devices and servers are under the control of one stakeholder so the end user â unconsciouslyâ adopts MPTCP.
to think about the benefits and costs for OS vendors, end users, applications and ISPS (Internet service providers. Here also we see the importance of network ef
server sends âoepremiumâ packets (perhaps for IPTV) as Conex-Not-Marked or Conex -Re-echo. Conex traffic is prioritised by the operator (âoepremium serviceâ.
and then the hostâ s software would automatically send the userâ s premium traffic (Voip say) as Conex-enabled.
â¢Roll out of the software should be cheaper, therefore the expected benefits of the deployment can be less
immediately use the new (virtualised) software, so effectively a large number of users can be enabled simultaneously
âoeroll backâ if there is some problem with the new software Virtualisation is not suitable for all types of software, for instance new transport layer
functionality, such as MPTCP and CONEX, needs to be on the actual devices 142 P. Eardley et al
-rors, draft-ford-http-multi-server, work in progress (2009 25. Raiciu, C.,Plunkte, C.,Barre, S.,Greenhalgh, A.,Wishcik, D.,Handley, M.:
-age capabilities of servers and networking infrastructure. For example, routing table memory of core Internet routers can be considered a âoepublic goodâ that retail ISPS
when multiple candidate servers are available, a consumer may prefer the one offering better Qos,
the server that minimizes its cost; e g.,, this is possible if the provider operates a local
where most applications run on a remote server, is considered to achieving energy savings but to the disadvantage of the server provider
However under some assumptions, Wifi hotspots can consume much less energy than UMTS (Universal mobile telecommunications system) networks.
software systems, and platforms, however, is to be aware that technology is not value-free, since it can have several consequences.
Internet-Emerging Trends from European Research, IOS Press, Amsterdam (2010 16. Trilogy: D10-Initial Evaluation of Social and Commercial Control Progress, 2009, Public
and provide an outlook to their mitigation, embedded in a system -atic security risk management process.
such as software components, individual nodes, or ASES. An upgraph of a node is the set of potential resources, that can be represented as a network map of domains and their
/Software/PLA/new/doc/PLA HW FINAL REPORT. pdf 25. Lagutin, D.:Securing the Internet with Digital Signatures.
in the scope of secure service engineering into comprehensive software and service life cycle support. Such a life cycle support must deliver
the present know how on building secure software services and systems: more stakeholders with diï erent trust levels are involved in a typical service com
1. 2 The Need for Engineering Secure Software Services The need to organize, integrate and optimize the research on engineering secure
software services to deal eï ectively with this increased challenge is pertinent and well recognized by the research community and by the industrial one.
-cesses and tools for secure software development. This typically covers require -ments engineering, architecture creation, design and implementation techniques
developed software is secure. Assurance must be based on justiï able evidence and the whole process designed for assurance.
integrating the former results in (5) a risk-aware and cost-aware software devel -opment life-cycle (SDLC),
software development: from requirements over architecture and design to the composition and/or programming of working solutions.
-age existing mechanisms and methodologies for software construction as well as researching about new ways to take this complexity into account in a holistic
software service and/or system is a timely moment to enforce and reason about these security mechanisms,
The software architecture encompasses the more relevant elements of the ap -plication, providing either a static or/and a dynamic view of the application.
which comprise software elements, the ex -ternally visible properties of those elements, and the relationships among themâ
early phase in the software development cycle The research topics one must focus on in this subarea relate to model-driven
Until this point in the software and service development process, diï erent concerns â security among them â of the whole application have been sepa
-curring problem in software design. Design patterns, once identiï ed, allow reuse of design solutions that have proved to be eï ective in the past, reducing costs
security-critical software systems 4 Security Support in Programming Environments Security Support in Programming Environments is not new;
-ing Future Internet Service is inherently a matter of secure software and systems The context of the future internet services sets the scene in the sense that (1
technologies will be used to develop the actual software and systems The search for security support in programming environments has to take
-ciï c elements of the software design; other may simply be high priority security requirements that have articulated â such as the appropriate treatment of con
Middleware Aspects. The research community should re-investigate ser -vice-oriented middleware for the Future Internet, with a special emphasis on
Engineering Secure Future Internet Services 185 enabling deployment, access, discovery and composition of pervasive services
-gram to well-known programming principles or best-practices in secure software development. Emphasis will be put on language extensions that guarantee adher
central role in the development of software based services to provide conï dence about the desired security level.
giving feedback at each stage of the software life cycle by checking that the related models and artefacts satisfy their functional and security requirements
enables to manage assurance throughout the software and service development life cycle (SDLC. The next section clariï es these issues
The main objective is to enable assurance in the development of software based services to ensure conï dence about their trustworthiness.
the software development life cycle (SDLC. The methodology is based on two strands: A ï rst sub-domain covers early assurance at the level of requirements
of the software life cycle, automated generation in XML-based input data to maximize the eï ciency in the security testing process,
While the software development proceeds through incremental phases, the risk and cost analysis will undergo new iterations for
-gate through the software development phases and become more reï ned. In order to support the propagation of analysis results through the phases of the SDLC
In order to accommodate to a modular software development pro -cess, as well as eï ectively handling the heterogeneous and compositional nature
Network of Excellence on Engineering Secure Future Internet Software Services and Systems) under the grant agreement n. 256980
Software Architecture In practice, 2nd edn Addison-Wesley, Boston (2003 3. Bauer, L.,Ligatti, J.,Walker, D.:
agent-oriented software development methodology. Autonomous Agents and Multi -Agent Systems 8, 203â 236 (2004
SPAQUÂ 08 (Int. Workshop on Software Patterns and Quality)( 2008 18. Lazouski, A.,Martinelli, F.,Mori, P.:
The vision of the Internet of Services (Ios) entails a major paradigm shift in the way ICT systems and applications are designed,
In the Ios, services are business functionalities that are designed and implemented by producers, deployed by providers,
However, the new opportunities opened by the Ios will only materialize if concepts, techniques and tools are provided to ensure secu
-sumption time, thereby signiï cantly improving the all-round security of the Ios In this chapter, we give a brief overview of the main scientiï c and industrial chal
thus increase the development and public acceptance of the Ios We proceed as follows. In Sections 2 and 3, we discuss, respectively, some of
layer of software modules that carry out the translation from application-level speciï cation languages (such as BPMN and BPEL,
server to impersonate a user on any Google application. In 2, solutions that can be used to mitigate
6 Conclusions and Outlook As exempliï ed by these case studies and success stories, formal validation tech
-nologies can have a decisive impact for the trust and security of the Ios. The
advances will signiï cantly improve the all-round security of the Ios, and thus boost its development and public acceptance
2007), http://docs. oasis-open. org/wsbpel/2. 0/OS/wsbpel-v2. 0-OS. pdf
from the convergence of computer server power, storage and network bandwidth It is a new business
Following its software-plus-services strategy an -nounced in 2007, Microsoft has developed in the past years several Saas cloud
such as operating systems, middleware, or actual software requires a case-by-case design of isolation mechanisms. In particular the last example of Software-as-a
-Service requires that each data instance is assigned to a customer and that these instances cannot be accessed by other customers.
Note that in practice these mechanisms are mixed often: While an enterprise customer may own a vir
-tual machine (Machine-level isolation), this machine may use a database server Middleware isolation) and provide services to multiple individual departments
Application isolation In order to mitigate this risk in a cloud computing environment, multi-tenant isolation ensures customer isolation.
cloud environment or recover from software and hardware failures For building such resilient systems, important tools are data replication
5 Outlook â The Path Ahead Cloud computing is not new â it constitutes a new outsourcing delivery model
of their data stored in a remote server or in the cloud. We introduce a
, servers services, applications) provided by the cloud, that are provisioned rapidly with a minimal management eï ort and pay-peruse.
as setting and comparing user preferences with server privacy policies, ex -pressing conditions on complex secondary usage cases, specifying obligations
In fact, this sticky policy will be sent to the server and follow the data in all their lifecycle to specify the usage conditions
-ing the data from the server. This nested policy is applicable when a server storing personal data decides to share the data with a third party
â Obligations: Obligations in sticky policies specify the actions that should be carried out after collecting
data before sending it to any server. For example, we can deï ne black or white lists for websites with whom we do not want to exchange our personal
If a third party requests some data from the server, the latter becomes a data provider and acts as a user-side engine invoking access control and matching
In other words, we suppose that the server enforces correctly the sticky policies, but, actually, nothing prevents him from
Trust and tamper-proof software delivery. In: Proceed -ings of the 2006 international workshop on Software engineering for secure sys
Resource Adapter (a concept similar to device drivers) wraps a domainâ s resource API in order to create a homogeneous API defined by Panlab.
server, an application server, a database and a workload generator, which produces the appropriate requests.
using Xen server technology, which allows regulating system resources such as CPU usage and memory, and provides also a monitoring tool, Ganglia, that measures net
using Xen server technology to regulate CPU usage. During this scenario the adaptive admission control and resource allocation algorithm is tested against network metrics
During the setup, the researcher wants to test http proxy software written in C pro
â Linux machines for the RUBIS based work load generators â A Linux machine for the hosting the algorithm unit, capable of compiling C and
Java software â Linux machines for running XEN server where on top will run the RUBIS Web
app and database The final user needs to provide the algorithm under test. He will just login to the
Proxy Unit, compile the software and execute it. The user will not have access to the
RUBIS resources (i e. cannot login) so there is a need to encapsulate the monitoring and provisioning capabilities.
Virtual machines managed by a XEN server. The implemented RAS instantiate all these Virtual machines and configure the internal components according to end-user
displays the RADL definition for the RUBIS application server The Configuration Parameters section describes the exposed parameters to the end
-tion 7 provides a brief summary and outlook to the enhancements of federated facilities 2 Experiment Objectives and Requirements for a
reservation and installation of arbitrary software but is distributed only within Germany, has limited a access, and currently provides no federation method
Booking of Resources With the SFA software it was possible to book nodes in Planetlab, Planetlab Europe and in the VINI Testbed.
arbitrary software on the G-Lab nodes. We assume that such features are of interest for many experimenters,
-erators and developers to oï er their measurement results and software tools to the public and to share their experience.
-tures by using the Self-NET software for self management over a Wimax network environment. The monitoring and configuration capabilities that differ
which is a software tool that generates traffic at both Uoa end machines. This is a
Fig. 1. Octopus testbed Wimax and Self-NET software federation ITGLOG), printing and plotting specific metrics (ITGDEC, ITGPLOT) and remotely
software and deployment of IP routing and tunneling between Octopus and Self-NET environments We implemented A BS control software (i e.
NECM) to allow dynamically collect Wimax link information from the BS and to control Quality of Service (Qos) set
IOS Press, Amsterdam (2010 7. Airspan homepage, http://www. airspan. com 8. Distributed Internet traffic Generator
http://www. grid. unina. it/software/ITG/index. php 9. Resource Adapter Description Language http://trac. panlab. net/trac/wiki/RADL
of the current network typically resides in client stations and servers, which interact with network elements (NES) via protocols such as SNMP (Simple Network Man
underlying hardware and software resources comprise management issues highly challenging, meaning that currently, a diversity in terms of hardware resources leads
IOS Press, Amsterdam (2009 10. Organization for Economic Co-operation Development (OECD: The Seoul Declaration
open-source multimedia framework, player and server http://www. videolan. org/vlc J. Domingue et al. Eds.):
In 7, the issue of server selection is being investigated by proposing a node selection algorithm with respect to the worst-case link stress (WLS) criterion
-demand access to IT hardware or software resources over the Internet. Clouds are revolutionizing the IT world 11,
and the service middleware layer. Each layer is responsible for implementing diï erent functionalities covering the full end-to-end
3. Finally, a service middleware layer is introduced to fully decouple the physical infrastructure from the service level.
SML Service Middleware Layer VI Virtual Infrastructure VIO Virtual Infrastructure Operator VIO-IT Virtual IT Infrastructure Operator
Enterprise Information system externally on a Cloud rented from a Software -as-a-Service (Saas) provider.
between the NCP+and the service middleware layer (SML) via a service -to-network interface, named NIPS UNI during the entire VI service life cycle
19 http://www. ens-lyon. fr/LIP/RESO/Software/vxdl/home. html 316 P. Vicat-Blanc et al
-opment activities of the GEYSERS project to achieve the complete software stack and provide the proof of concept of these architectural considerations
of the diï erent software components creating and managing optical virtual in -frastructures. The other goal is to evaluate the performance and functionality of
motivation for services research both in the software industry and academia The Internet of Services is concerned with the creation of a layer within the Future
software on-demand, from a shared pool, with minimal interaction or knowledge by users. Cloud services can be divided into three target audiences:
â Platform as a service â providing services for software vendors such as a soft -ware development platform or a hosting service
-cally, a service is dependent on many other services, e g. the offering of a software service requires infrastructure resources, software licenses or other software services
We propose an SLA management framework that offers a core element for manag -ing SLAS in the future Internet.
-ness, software, and infrastructure) on the other With a set of four complementary use case studies, we are able to evaluate our ap
2) supports arbitrary service types (business, software, infrastructure) and SLA terms,(3) covers the complete SLA and service lifecycle with consistent interlinking
business, software and infrastruc -ture. The framework communicates to external parties, namely customers who (want
-structure and software), deployed Service Instances with their Manageability Agents and Monitoring Event Channels. The Framework Core encapsulates all functionality
Infrastructure-and Software Service Managers contain all service-specific functionality. The deployed Service Instance is the actual service delivered to the
Software SLA Manager Infrastructure SLA Manager Business Manager Service Evaluation Infrastructure Service Manager Software Service Manager
Customer 3rd Party Manageability Agent Infrastructure Service <<provider relations >><negotiate >><customer relations >>Monitored Event Channel <<control/track
Software Service <<adjust >>deployed infrastructure service deployed software service <<negotiate >>framework core Fig. 1. Overview of the SLA Framework Reference Architecture
While all framework components come with default implementations they can also easily be extended or enhanced for more specific domain needs.
contains many aspects of a software cloud 3. 3 Interlinkage with System Management SLA-driven system management is the primary approach discussed in this paper.
-tion of server capacity, and a broad range of services in terms of relative priority resource requirement and longevity.
Software services could potentially be selected by choosing a virtual machine template which contains pre-loaded applications,
but software layer considerations are considered not core to this Use Case and are dealt more comprehensively with in the ERP Hosting Use Case
a software package (an application) but also some business-level activities, such as a support contract. At the next level, there are the actual software applications, such as for
example a hosted ERP SOFTWARE package. At the next level, there are the required mid -dleware components which are used equally for different applications.
At the lowest layer, there are the infrastructure resources, delivered through an internal or external cloud.
Application SLA is mainly about the throughput capacity of the software solution, its response time, and the provider internal costs required for the offering.
The Middleware SLA specifies the capacity of the middleware components, the response time guarantee of the middleware components and the costs required for the offering.
The Infrastructure SLA specifies the characteristics of the virtual or physical resources (CPU speed, mem
-ory, and storage) and again the costs required for the offering The use case successfully applies the SLA framework by realizing distinct SLA
support department, the application, the middleware, and the infrastructure artefacts From a technical perspective, the most difficult piece in the realization of the
the different components, e g. the performance characteristics of the middleware. We collected a set of model-driven architecture artefacts, measurements,
integrates software layer (from SLA@SOI framework architecture. And finally Bank prototype is implemented using the top layer, business.
wrappers by Software SLA Manager in an application server and also the provision of the infrastructure driven by Infrastructure SLA Manager (using the appropriate ser
SMS wrappers deployed in the application server of the corresponding virtual machine has to connect and execute different tasks with core mobile network
systems that are behind Telefã nica Software Delivery Platform (SDP. The compo -336 J. Butler et al
For example, while typical software/hardware guarantee terms constraint the quality of each single execution of a service, in this use case the guarantee terms constraint
network, software, and business artefacts. Four complementary industrial use cases demonstrated the applicability and relevance of the approach.
-opment activities via an Open source Project. The first framework version fully pub -lished as open source can be found at 5
Open Access. This article is distributed under the terms of the Creative Commons Attribution Noncommercial License which permits any noncommercial use, distribution, and reproduction
5. SLA@SOI Open source Framework. First full release by December 2010 http://sourceforge. net/projects/sla-at-soi
there are some limitations for the software-driven control network infrastruc -ture, formed by the OSKMV,
contribute to the translations of the MBT (Model-based Translator) software package, by the use of the FINLAN formal representation in OWL.
The Autoi open source implements a scal -able and modular architecture to the deployment, control and management of
{private Serversocket server private int port=43702 private Socket s=null public static Knowledgeplane KP=null
+""s1=server. accept With the use of the FINLAN library this communication can be done replacing
the FINLAN ontology in Linux operating system kernel level, allowing the facil -ities in its use in diï erent programming languages,
would be available at the operating system level 4 Conclusions This paper has presented the FINLAN ontology works in a collaboration per
Future work will implement the FINLAN ontology at the Linux kernel level and run performance and scalability experiments with diï erent Future Internet
Platforms and Software systems for an Autonomic Internet. In: IEEE Global Communications Conference (2010 14 Rubio-Loyola, J.,Astorga, A.,Serrat, J.,Lefevre, L.,Cheniour, A.,Muldowney
Integracâ¸aëoeo de Servicâ¸os em Ambientes Heterogeë neos: uso de Semaë ntica para Comunicacâ¸aëoeo Entre Entidades em Mudancâ¸as de Contexto.
consuming of functionalities of existing pieces of software. In particular, WSDL is used to provide structured descriptions for services, operations and endpoints, while
users ratings, tags and comments about services in a separate server. On the basis of
software clients are able to access easily underlying descriptions Linking â linking between descriptions should be supported to facilitate the reuse
Architectural styles and the Design of Network-based Software Architec -tures. Phd Thesis, University of California (2000
â¢Third, the todaysâ software technologies support the creation and composition of services while being able to take into account information regarding the trans
At its turn, the SM@SP instructs the SP/CP servers how to mark the data packets
server AS3 VCAN1/MQC1 VCAN2/MQC2 VCAN3/MQC3 L2, L3, L4 headers High level headers
-tween CPS and NPS for hosting or co-locating CPÂ s content servers in NPSÂ premises
IOS Press, Amsterdam (2009 4. Schã nwã¤lder, J.,et al.:Future Internet=Content+Services+Management.
IOS Press, Amsterdam (2009 6. Huszã¡k, Ã.,Imre, S.:Content-aware Interface Selection Method for Multi-Path Video
IOS Press, Amsterdam (2009 8. Martini, M. G.,et al.:Content Adaptive Network Aware Joint Optimization of Wireless
IOS Press, Amsterdam (2009 10. Anderson, T.,et al.:Overcoming the Internet Impasse through Virtualization. Com
video streaming, due to a bandwidth bottleneck at the server side from which all users request the content.
MDC combined with path/server diversity offers robust video delivery over unreliable networks and/or in peer-to-peer
-dence of software proposal for Wavelet Video Coding Exploration group, ISO/IEC JTC1/SC29/WG11/MPEG2006/M13146, 76th MPEG Meeting, Montreux, Switzerland
search engines are expected to be able to understand underlying semantics in content and match it to the query.
-ios as semantic image retrieval. However, the semantic gap lying between levels 1 and 2 hampers the progress of multimedia retrieval area 19.
the federation and integration of appropriate software building blocks. A new genera -tion of enterprise systems comprising applications
of utility-like software services High-value Future Internet applications are also foreseen in the domain of living
In recent years, software development methods and technologies have markedly evolved, with the advent of SOA 15, MDA 16, Ontologies and Semantic web, to
and realising enterprises software applications In essence, while enterprise management and planning services will be increas -ingly available from the â cloudâ, in a commoditised form, the future business needs
the Internet of Services (Ios), Internet of things (Iot) and smart ob -jects, Internet of Knowledge (Iok), Internet of People (Iop.
services, tools, software packages, interfaces and user interaction solutions that are not available at the present time.
of software architectures. This will be possible if such software architectures will correspond to the enterprise architectures,
and will be composed by elements tightly coupled with business entities. The achievement of this objective relies on a number
based on the notion of a FINER, seen as the new frontier to software components aimed at achieving agile system architectures.
design approaches, methods and tools, supporting the idea that large software systems can be created starting from independent,
reusable collections of preexisting software components This technical area is referred often to as Component Based Software engineering
) The basic idea of software componentization is quite the same as software modularization, but mainly focused on reuse.
that in a short time imposed itself over the preexisting modular software develop -ment techniques.
OOP aims at developing applications and software systems that provide a high level of data abstraction and modularity (using technologies such as
Agents mark a fundamental difference from conventional software mod -ules in that they are inherently autonomous and endowed with advanced communica
highly interoperable software architectures through the spread of the Service-Oriented approach, and the consequent proliferation of Service-Oriented Architectures (SOA
interacting software services, i e.,, units of work performed by software applications typically communicating over the Internet 11
In general, a SOA will be implemented starting from a collection of components e-services) of two different sorts.
manage a new generation enterprise software architectures. Cloud computing repre -sents an innovative way to architect and remotely manage computing resources:
over the Internet and the hardware and system software in the datacenters that provide those services 12.
approach, to ease software development processes. Conversely, we propose to base a FINES architecture on building blocks based on business components.
or responding (as server) to request messages. It is structured according to the grounding of OWL-S
Ios, Multi-Agent Systems, Cloud computing, Autonomic Systems) and, in parallel some key areas of the enterprise that will start to benefit of the FINES approach
Component-oriented software development, Spe -cial issue on alaysis and modeling in software development, pp. 160â 165 (1992
11. Petritsch, H.:Service-Oriented Architecture (SOA) vs. Component Based Architecture white paper, TU Wien (2006), http://whitepapers. techrepublic. com. com
IOS Press, Amsterdam (2010 16. Papazoglou, M. P.:Web Services: Principles and Technology. Prentice-hall, Englewood
and in the server farms is not considered since no special equipment is deployed in the GSN
a convergence of server and network virtualizations as virtual infrastructure manage -ment. The GSN as a network architecture is built with multiple layers, resulting in a
robust software while running trials on a range of network equipment The Mantychore FP7 project allows the NRENS to provide a complete, flexible
PDU Servers (Dell Poweredge R710 To core network Wind power node architecture Spoke Switch Allied Telesis
Servers (Dell Poweredge R710 Hydroelectricity power node architecture (Hub MUX/DEMUX To core network Backup Disk
by green energy and adjust the network to the needs controlled by software. The cost
such as routers and servers, is not considered, because no special hardware equipment is used in the GSN
grouped in bundles of 9 or 10 panels, each panel generates a power of 220-230w.
The wind turbine system is a 15kw generator. After being accumulated in a battery bank electrical energy is treated by an inverter/charger in order to produce an appropriate
servers are linked by a local network, which is connected then to the core network through GE transceivers.
then pushes Virtual machines (VMS) or software virtual routers from the hub to a sun or wind node (spoke node) when power is available.
level, including massive physical resources, such as storage servers and application servers linked by controlled circuits (i e.,
, lightpaths. The Platform Control plane corresponds to the Core Middleware layer, implementing the platform level services
that provide running environment enabling cloud computing and networking capabili -ties to GSN services. The Cloud Middleware plane corresponds to the User-level
Middleware, providing Platform as a service capabilities based on Iaas Framework components 5. The top Management plane or User level focuses on application
services by making use of services provided by the lower layer services 4 Virtual Data center Migration
servers with a high density connection local network. The migration involves four steps i) Setting up a new environment (i e.,
servers and network devices in a multi-domain environment Fig. 4. Iaas Framework Architecture Overview
and that each server has up to 16 processors, 20 servers can be moved in parallel. If each VM consumes
4gbyte memory space, the time required for such a migration is 1000sec The migration of data centers among GSN nodes is based on cloud management
converges server and network virtualizations. Whilst most of cloud management solu -tions in the market focus particularly on computing resources, Iaas Framework compo
An orchestration middleware is built to federate clouds across domains, coordinate user registration, resource allocation stitching, launch, monitoring,
and interoperate with software outside of the GSN Along with the participation of international nodes, there is an increasing need of
including virtual servers and virtual routers and/or virtual switches interconnecting the servers. Such a virtual data
center can be hosted by any physical network node, according to the power availabil -ity. There is a domain controller within each data center or a set of data centers shar
-tion 4. Finally, section 5 presents conclusions and an outlook 2 City and Urban Development Challenges
-ing, wireless networks, middleware and agent technologies as they become embedded into the physical spaces of cities.
software components City-based clouds Open and federated content platforms Cloud-based fully connected city
Software agents and advanced sensor fusion; telepresence Demand for e-services in the domains outlined in Fig. 1 is increasing,
There is a critical gap between software applications and the provi -sion of e-services in terms of sustainability and financial viability.
Open source communities may also sub -stantially contribute to the exchange of good practices and open solutions
5 Conclusions and Outlook In this paper we explored the concept of âoesmart citiesâ as environments of open and
Things (Iot) and Internet of Services (Ios), can become building blocks to pro -gress towards a unified urban-scale ICT platform transforming a Smart City
and at the service level (Ios as a suit of open and standardized en -ablers to facilitate the composition of interoperable smart city services.
â¢The Internet of Services (Ios: flexible, open and standardized enablers that facili -tate the harmonization of various applications into interoperable services as well as
-nents of the Future Internet, namely Iot and Ios, can be essential building blocks in future Smart Cities open innovation platforms.
2 Iot and Ios as ICT Building blocks for Smart Cities In the analysis from Forrester research 9 on the role that ICT will play in creating
Ios evolution must be correlated undoubtedly with Iot advances. Otherwise, a number of future Smart City services will never have an opportunity to be con
-ing Iot and Ios at the city scale Starting with the benefits of Iot technologies, they are twofold:
Considering now the Ios, it must be stressed that it is recognized widely (see for example 12) that the real impact of future Iot developments is tied heavily to the
parallel evolution of the Ios. So, a Smart City could only become a true open innova
-tion platform through the proper harmonization of Ios and Iot. There can be a long
Thus the integration of innovative principles and philosophy of Ios will engage collective end-user intelligence from Web 2. 0
The technological challenge of developing the Ios has been assumed at EU level, and actions are being initiated to overcome the undesirable dissociation between technologi
Ios resources Testbed 1 USN-Enabler Service 1 Adaptation & Homogeneization Testbed Control Layer GSDP
Ios federation level Iot federation level NGN /Telco2. 0 Web2. 0 Service 2 Iot Service Service n
Fig. 1. Global Service Delivery Platform (GSDP) integrating Iot/Ios building blocks 3 Developing Urban Iot Platforms
This capability will allow a seamless link between Iot and Ios, as discussed in Section 2
needed to enable an evolving FI based on the Iot and Ios paradigms Functionalities required to support services are offered both in synchronous and
Opencom Middleware Mobility support Horizontal support Federation support S ecurity, Privacy and Trust Fig. 3. Smartsantander:
initiatives on both Iot and Ios areas as WISEBED 25, SENSEI 8 and the USN
the subsystems (collectively, the Smartsantander middleware) that provide the func -tionality described by these requirements
Future Internet potential, through Iot and Ios, for creating new real-life applications and services is huge in the smart city context.
-twining Iot and Ios worlds. Referred Iot USN platform is currently being evolved with the addition of new capabilities,
) Towards the Future Internet, IOS Press, Amsterdam (2009 17. Fisher, S.:Towards an Open Federation Alliance.
Summary and Outlook References An Architectural Blueprint for a Real-world Internet Introduction The Real world Internet
The Need for Engineering Secure Software Services Research Focus on Developing Secure FI Services Security Requirements Engineering
Conclusions and Outlook Trustworthy Clouds Underpinning the Future Internet Cloud computing and the Future Internet Trust and Security Limitations of Global Cloud Infrastructures
Outlook â The Path Ahead Data Usage Control in the future Internet Cloud Introduction Primelife Privacy Framework
Conclusions and Outlook References Smart Cities at the Forefront of the Future Internet Introduction Iot and Ios as ICT Building blocks for Smart Cities
Developing Urban Iot Platforms The Need of Urban Scale Experimental Facilities Conclusions References Author Index
Indesign 4. 0 /Omitplacedbitmaps false /Omitplacedeps false /Omitplacedpdf false /Simulateoverprint/Legacy >><Addbleedmarks false /Addcolorbars false
Overtext Web Module V3.0 Alpha
Copyright Semantic-Knowledge, 1994-2011