Synopsis: Entrepreneurship:


The antecedents of SME innovativeness in an emerging transition economy.pdf.txt

economic growth, both developed and developing coun -tries are interested very in ï nding ways to stimulate SMES

'Small and medium enterprises (SMES in further text) are considered to be the engine of economic growth and

employment. One of the primary means through which SMES are expected to accomplish this task is by developing

introduced within the enterprise. We investigate both incremental and radical product innovations. Incremental innovation refers to product line extensions or modiï ca

Understanding forces that contribute to the success of small and medium enterprises (SMES) is very important,

as these enterprises are vital for both developed and developing economies. Since innovativeness is among the most important means through which such

businesses contribute to economic growth, numerous research studies were conducted to determine which factors positively impact SME€ s innovative efforts.

This is an even more important issue for developing economies, where SMES are faced often with inadequate infrastructure.

Since there is a lack of studies on SME innovation in developing economies, often policy in such countries is based on

ï ndings from developed countries In this paper, we explore factors that drive innovation activities in SMES in a small emerging transition economy (Croatia), and

compare it with ï ndings from developed economies. In addition to factors used in most previous studies,

we consider market scope ï rm†s market orientation and presence of strategic, managerial and marketing changes.

important in developed economies are important in developing economies as well. In addition to that, market scope was discovered to be

Institute of Economics, Trg J †450 ovativeness in an emerging conomy jiljana Bozë icâ

another region and another economy. For example Kaufmann and Todtling (2002) in their investigation of SMES in Upper Austria show that support measures that

from developed economies. As noted in Hadjimanolis 1999) ††The study of innovation, including the obstacles to

generalized to developing economies. For example, in the context of technology management, Cetindamar et al 2009) show the importance of questioning the appropri

developed economies. So an important issue for policy makers would be to ï nd out to

economy. In investigating these factors, we build upon the existing ï eld of research about innovation determinants

in developing economies which need to improve in order to compete and survive. As Hadjimanolis (1999) points out

were operating within a relatively protected environment they must now face the global forces of competition.

The globalization of the markets requires the adaptation of ï rms in order to survive. ††We also investigate the effect of

as this is an important issue for a small economy. Since innovating with incremental innovations is different than

knowledge about what propels an enterprise to innovate This picture is not complete without the investigation of

matter for an economy; a number of studies were conducted recently with the goal to discover which factors

opportunities that SME can seize from its environment 2. 1. Internal factors bearing impact on innovation

investments in R&d (Birchall et al. 1996; Oerlemans et al 1998). ) Among other internal factors that were found to be

and customers may be performed for the purpose of co -design (Birchall et al. 1996; Meer et al. 1996;

-tion with customers can be a source of improved technology (Le Blanc et al. 1997). ) Strategic alliances are

2005) show that human capital is one of the crucial factors in innovative activities, and that absence of necessary skills

we also expect to ï nd that for a transition economy the proportion of highly qualiï ed employees in SMES has

create greater value for customers 5. We measure customer satisfaction systematically and frequently 6. We give close attention to after sales service

use of human capital and other resources available to the ï rm, the ï rm has to have a suitable organizational

4. We target customers where we have an opportunity for competitive advantage Inter-functional coordination index

prospective customers 4. We freely communicate information about our successful and unsuccessful customer experiences across all business functions

environment related. Internal obstacles have to do with difï culties that are related to resources within the ï rm or

human capital. In this study, we look at the mixture of internal and external obstacles, seeking to identify the most

demand for ï rm†s products, ï nancing issues, state support business environment, organizational issues, and availabil

-ity of information about markets and technology. We ask ï rms (1) if they encountered obstacles in their innovation

investment in innovation activities Subsidies, ï rm age and proportion of full-time equiva -lent employees engaged in intramural R&d are omitted

Croatian economy), where process innovation is of relatively low novelty. Being of low novelty, it does not

at the lowest cost and deliver it to customers in the shortest time, and this is where good organizational structures

However, as few studies in developing economies were performed on this topic, it is known not to which

of SMES in developed economies are also conï rmed to be important in this study, such as having external links

developed economies about the positive impact that proportion of highly educated staff has on product

Unlikely developed economies (Keizer et al. 2002), we found that innovation subsides are linked not to innova

very important for a small open developing economy like Croatia, because it suggests that by encouraging

which corresponds to ï ndings from developed economies Hadjimanolis, 1999; Bertlett and Bukvicë, 2006. This

recognized as a problem in developed economies. Interest -ingly, we ï nd that ï rms that report facing obstacles are not

another developing economy All in all, our ï ndings show that there may be many similarities between developed and developing economies

In other words, if Croatian case is indicative of other developing countries, ï ndings from developed economies may travel across geographic and economic boundaries

better than could be expected. However, there may be some particularities that policy makers in developing countries should address.

programs run with the purpose to help enterprises assess what is right for them and assists them in making necessary

economies) should be encouraging SMES to become exporters. First step would be to determine what possible obstacles to exporting there are and then

and enterprise-friendly. In addition, we have shown that radical and incremental innovation have different ante -cedents, so policy makers can devise different incentive

Opportunity Discovery mini-conference at the Olin School of Business, Washington University in St louis for helpful

investment, and the failure of leading ï rms. Strategic Management Journal 17 (3), 197†218

Small ï rms, social capital and the enhancement of business performance through innovation pro -grammes.

Small Business Economics 13 (3), 219†234 Davenport, S.,Bibby, D.,1999. Rethinking a national innovation system

Technology†Economics, 31 march 1988, The hague Forrest, J. E.,1990. Strategic alliances and the small technology-based

Entrepreneurship 1 (2), 41†58 Hoffman, K.,Parejo, M.,Bessant, J.,Perren, L.,1998. Small ï rms, R&d

Market orientation in the transition economies of Central Europe: test of the Narver and Slater market orientation scales

evolution in a complex environment. Research Policy 24, 521†542 Iyer, G r.,Laplaca, P. J.,Sharma, A.,2006.

enterprises (SMES) of the metal-mechanic sector from Saëoeo Paulo Brazil. Technovation 28 (1†2), 29†36

management by small business to develop new products and services Journal of Small Business Management 29 (2), 31†41

Does competitive environment moderate the market orientation†performance relationship. Journal of Marketing 57, 46†55

-vations in small enterprises: a comparative perspective of Bangalore India) and Northeast England (UK). ) Technovation 25 (3

New Entrepreneurship and the Smaller Firm Campus, Frankfurt, New york Tomala, F.,Seâ'neâ'chal, O.,2004.

Chinese business environment. Journal of Business Research 56 227†239 ARTICLE IN PRESS S. Radas, L. Bozë icâ'/Technovation 29 (2009) 438†450450

The antecedents of SME innovativeness in an emerging transition economy Introduction Theoretical background and literature review


THE CULTURE OF INNOVATION AND THE BUILDING OF KNOWLEDGE SOCIETIES.pdf.txt

ensuring systemic and reinforced competitiveness in a global economic environment An interesting trend is that a vast majority of highly industrialised countries have set up so-called

long-term economic growth and prosperity. Some of these arguments can be traced back to economists like Joseph A. Schumpeter (1883-1950) and Karl Marx (1818-1883.

Countries like India, South africa, and Brazil have joined in, increasingly recognising that the establishment of a

innovative environment is a prerequisite of development. The aims of such innovation policies are to create jobs,

Our environment-including our belief and value systems-shapes the way we view the world around us and determines how we react to ongoing changes.

global competition. A Culture of Innovation, with the features of a knowledge society, can only be

Research has shown that increased investment in human capital can determine competitive advantage and indeed success in the development of Least Developed Countries (LDCS.

increasing importance of Information and Communication Technologies,(ICTS), the digital divide has grown at a rapid pace.

development of sustainable knowledge societies, identifying potential threats to, and opportunities for, their implementation. Indeed, one of the crosscutting themes in UNESCO€ s Medium Term


The future internet.pdf.txt

SL 5 †Computer Communication Networks and Telecommuni -cations  The Editor (s)( if applicable) and the Author (s) 2011.

A competitive Europe will require Internet connectivity and services beyond the capabilities offered by current technologies.

trustworthy ICT, Future Internet research and experimentation, services and cloud computing, networked media and Internet of things.

in Egypt used social media to support communication and the associated Facebook page had over 80,000 followers at its peak.

from simple text characters to audio and video and also the demand for very im

-definition TV services are expected to dominate this growth. Cisco state that the average monthly traffic in 2014 will be equivalent to 32 million people continu

which is a radically different environment from the initial Internet based on physi -cal links. Data traffic for mobile broadband will double every year until 2014, in

•Commercial services †as mentioned above the Internet is now a conduit for a

wide variety of commercial services. These business services rely on platforms which can support a wide variety of business transactions and business processes

•Societal expectations †in moving from an obscure technology to a fundamental part of human communication, societal expectations have grown.

The general population demand that the Internet is at least: secure, trustworthy, ubiquitous, ro -bust, responsive and also upholds privacy

•Cloud computing, Internet of services and advanced software engineering •Internet-connected objects •Trustworthy ICT

⠀ Services ⠀ Content •Applications FIA Budapest will be the seventh FIA since the kickoff in Bled and in that time a

global communications platform within a European context. This text holds a sample of the latest results of these endeavors.

Engineering Secure Future Internet Services...177 Wouter Joosen, Javier Lopez, Fabio Martinelli, and Fabio Massacci

Towards Formal Validation of Trust and Security in the Internet of Services...193 Roberto Carbone, Marius Minea, Sebastian Alexander Moâ dersheim

Algorithms on the Federated Environment of Panlab...237 Christos Tranoris, Pierpaolo Giacomin, and Spyros Denazis

Testing End-to-end Self management in a Wireless Future Internet Environment 259 Apostolos Kousaridas George Katsikas, Nancy Alonistioti, Esa Piri

Services Introduction to Part VI...323 SLAS Empowering Services in the future Internet...327 Joe Butler, Juan Lambea, Michael Nolan, Wolfgang Theilmann

Francesco Torelli, Ramin Yahyapour, Annamaria Chiasera, and Marco Pistore Meeting Services and Networks in the future Internet...

339 Eduardo Santos, Fabiola Pereira, Joaëoeo Henrique Pereira, Luiz Claâ'udio Theodoro, Pedro Rosa, and Sergio Takeo Kofuji

Fostering a Relationship between Linked Data and the Internet of Services...351 John Domingue, Carlos Pedrinaci, Maria Maleshkova, Barry Norton, and

Future Internet Enterprise Systems: A Flexible Architectural Approach for Innovation...407 Daniela Angelucci, Michele Missikoff, and Francesco Taglino

Renewable Energy Provisioning for ICT Services in a Future Internet...419 Kim Khoa Nguyen, Mohamed Cheriet, Mathieu Lemay, Bill St. Arnaud

multimedia communications, taking advantage of advanced software services, buying and selling, keeping in touch with family and friends, to name a few.

services, which the current Internet may not be able to support to a sufficient level On one hand, the increased reliability, availability and interoperability requirements

of the new networked services, and on the other hand the extremely high volumes of multimedia content challenge the today†s Internet.

magnitude of more Internet services, the likely increase in the interconnection of smart objects and items (Internet of things) and its integration with enterprise applications

Although the current Internet, as a ubiquitous and universal means for communica -tion and computation, has been extraordinarily successful,

the Internet†s core and the services that use it We are faced with an Internet that is good at delivering packets, but shows a level

challenges and opportunities of Digital Society are needed. Incremental changes to existing architectures, which are enhancing the existing Internet,

•Integration models enabling better incorporation and usage of the communication -centric, information-centric, resource-centric, content-centric, service/computation

•Unification and higher degree of integration of the communication, storage, con -tent and computation as the means of enabling change from capacity concerns to

applications, services, networks storage, content, resources and smart objects •Fusion of diverse design requirements,

fairness, scalability, manageability, evolvability and programmability, autonomicity mobility, ubiquitous access, usage, security including trust and privacy

-tectural co-existence of new and legacy services and networks, via virtualisation of connectivity and computation resources and self management capabilities, by fully

-forms, which have the aim to create a flexible environment for autonomic deployment and management of virtual networks and services as experimented with and validated

on large-scale testbeds The â€oeflat Architectures: Towards Scalable Future Internet Mobility†chapter pro -vides a comprehensive overview and review of the scalability problems of mobile

Internet nowadays and to show how the concept of flat and ultra flat architectures emerges due to its suitability and applicability for the future Internet.

approaches trying to cope with the continuously growing traffic demands. The analy -sis of these areas guides the readers from the basics of flat mobile Internet architec

-tecture for future mobile communications The â€oereview and Designs of Federated Management in Future Internet Architec

-vices they can be used in other tasks or services. As an implementation challenge for controlling and harmonising these entire resource management requirements, the

stakeholders, they are developed usually through an incremental process. This chapter presents the current status of the development of a reference architecture for the RWI as

constituting the ICT environment, by means of the introduction of Semantic Virtual -ization Enablers. On the other hand, it aims at achieving an internetwork and inter

Preliminary test studies, realized in a home environment, confirm the potentialities of the proposed solution

6. Athens University of Economics and Business, Greece gstamoul@aueb. gr 7 Digital Enterprise Research Institute, Ireland

manfred. hauswirth@deri. org Abstract. In the near future, the high volume of content together with new

-tion exchange and the dominant communication environment for business relations and social interactions. Billions of people all over the world use the Internet for find

enjoying multimedia communications taking advantage of advanced software services, buying and selling, keeping in touch

with family and friends, to name a few. The success of the Internet has created even higher hopes and expectations for new applications and services, which the current

Internet may not be able to support to a sufficient level. It is expected that the number

-quired by new networked services, and this trend will escalate in the future. There -fore, the requirement of increased robustness, survivability, and collaborative proper

All these applications create new demands and requirements, which to a certain ex -tent can be addressed by means of â€oeover-dimensioning†combined with the enhance

qualitative requirements concerning, for example, highly critical services such as e -health applications, clouds of services and clouds of sensors, new social network

applications like collaborative 3d immersive environments, new commercial and transactional applications, new location-based services and so on

In other words, the question is to determine if the architecture and its properties might become the limiting factor of Internet growth and of the deployment of new

applications. For instance, as stated in 5 â€oethe end-to-end arguments are insufficiently compelling to outweigh other criteria for certain functions such as routing and con

The Future Internet as a global and common communication and distributed infor -mation system may be considered from various interrelated perspectives:

-works and shared infrastructure perspective, the services and application perspective as well as the media and content perspective.

Europe, a significant part of the Information and Communication Technology (ICT of the Framework Program 7 is devoted to the Future Internet 14.

and the term â€oeservice†to refer to any action performed on data or other services and

2 The definition of service does not include the services offered by humans using the Internet

-agement functionality, e g. systems, networks, services, etc For each of the above functionalities, the FIARCH group has tried to identify and ana

as an †economic objectâ€, traverses the communication infrastructure multiple times, limiting its scaling, while lack of content †property rights†(not

and systems infrastructure and essential services in many critical environments such as healthcare, transportation, compliance with legal regulations, etc

communication end-points (applications) but not when data are in transit. So, it is not feasible to make efficient storage decisions that guarantee fast storage man

caching along the communication path and mirroring of content compared to off -path caching that is currently widely used (involving e g. connection redirection

Devices in environments such as sensor networks or even nano-networks/smart dust as well as in machine to machine-machine (M2m) envi

Communications privacy does not only mean protecting/encrypting the exchanged data but also not disclosing that

communication took place. It is not sufficient to just protect/encrypt the data (in -cluding encryption of protocols/information/content, tamper-proof applications

etc) but also protect the communication itself, including the relation/interaction between (business or private) parties

IP (and more generally communication) control components have so far being driven exclusively by i) cost/performance ratio considerations

-ity/behavior as well as the environment/external conditions ii. Improper segmentation of data and control. The current Internet model segments

a shared communication infrastructure. Hence, substantial benefit could be expected by further assistance from the network,

of routing table scalability but also adaptation to topology and policy dynamics perform efficiently under dynamic network conditions) that in turn impact its

-port multiple types of services, iv) to accommodate a variety of physical networks, v to allow distributed management,

needs to be able to scale to 109 IP networks recognizing the need to add scalability as

wired interfaces) to the communication network but also to heterogeneous data, ap -plications, and services, nomadicity,

and mobility (while providing means to main -tain continuity of application communication exchanges when needed.

Accessibility and nomadicity are addressed currently by current Internet architecture. On the other hand, mobility is realized still in most cases by means of dedicated/separated archi

•Scalability, including routing and addressing system in terms of number of hosts/terminals, number of shared infrastructure nodes, etc. and management sys

number of users with increasing heterogeneity in applicative communication needs •Robustness/stability, resiliency, and survivability:

Networked Enterprise & Radio frequency identification (RFID) and F5 Trust and Security. The authors would like to acknowledge

of IEEE International Conference on Communications (ICC) 2002, New-york City (New Jersey), USA (April/May 2002

ACM Computer Communications 33 (17), 2105†2115 (2010 19 Freedman, M.:Experiences with Coralcdn: A Five-Year Operational View.

A survey of autonomic communications. ACM Transactions on Autonomous and Adaptive Systems (TAAS) 1 (2), 223†259 (2006

ACM Communications 52 (7), 66†75 (2009 22 Evolving the Internet, Presentation to the OECD (March 2006

MIT Communications Futures Program †Workshop on Internet Congestion Management, Qos, and Intercon -nection, Cambridge, MA, USA, October 21-22 (2008

Communication Review (Oct. 2010), http://www2. research. att. com/bala /papers/ccr10-priv. pdf 33 W3c Workshop on Privacy for Advanced Web APIS 12/13 July 2010, London (2010

of new and legacy services and networks, via virtualisation of connectivity and computation resources and self management capabilities, by fully integrating

-forms, which have the aim to create a flexible environment for autonomic de -ployment and management of virtual networks and services as experimented

with and validated on large-scale testbeds Keywords: In-Network Clouds, Virtualisation of Resources, Self management Service plane, Orchestration plane and Knowledge plane

services, the interconnection of smart objects from the Internet of things, and the integration of increasingly demanding enterprise and societal applications

The Future Internet research and development trends are covering the main focus of the current Internet, which is connectivity,

and design of all levels of interfaces for Services and for networks†and services†resources.

lifecycle of applications, services, networks and infrastructures that are primarily constructed by recombining existing elements in new and creative ways

-ble environment for autonomic deployment and management of virtual networks and services as experimented with

and validated on large-scale testbeds 3 2 Designs for In-Network Clouds Due to the existence of multiple stakeholders with conflicting goals and policies

modifications to the existing Internet are limited now to simple incremental updates and deployment of new technology is next to impossible and very costly.

-mon physical substrate of communication nodes and servers managed by multiple infrastructure providers. By decoupling service providers from infrastructure provid

Services more intelligent, with embedded management functionality. At a logical level, the VMKSO planes gather observations, constraints and assertions,

new management services, protocols, as well as resource-facing and end-user facing services. It includes the enablers that allow code to be executed on the network enti

-ties. The safe and controlled deployment of new code enables new services to be activated on-demand.

This approach has the following advantages •Service deployment takes place automatically and allows a significant number of

new services to be offered on demand •It offers new, flexible ways to configure network entities that are not based on

strict configuration sets •Services that are used not can be disabled automatically. These services can be

enabled again on-demand, in case they are needed •It eases the deployment of network-wide protocol stacks and management services

•It enables secure but controlled execution environments •It allows an infrastructure that is aware of the impact on the existing services of a

new deployment •It allows optimal resource utilization for the new services and the system

22 A. Galis et al 2. 2 Orchestration Plane Overview The purpose of the Orchestration Plane is to coordinate the actions of multiple auto

-nomic management systems in order to ensure their convergence to fulfil applicable business goals and policies. It supervises and it integrates all other planes†behaviour

ensuring integrity of the Future Internet management operations. The Orchestration Plane can be thought of as a control framework into which any number of compo

-nents can be plugged into, in order to achieve the required functionality. These com -ponents could have direct interworking with control algorithms, situated in the control

and services that it is managing, and makes appropriate decisions for the resources and services that it gov

-erns, either by itself (if its governance mode is individual) or in collaboration with other AMS (if its governance mode is distributed or collaborative),

•Virtual resources and services are used •Service Lifecycle management is introduced •The traditional management plane is augmented with a narrow knowledge plane

and other key framework services are pack -aged in a distributed component that simplifies and directs the application of those

framework services to the system The Distributed Orchestration Component (DOC) provides a set of framework net

-work services. Framework services provide a common infrastructure that enables all components in the system under the scope of the Orchestration Plane to have

plug and play and unplug and play behaviour. Applications compliant with these framework services share common security, metadata, administration, and manage

-ment services. The DOC enables the following functions across the orchestration plane: federation, negotiation, distribution and governance.

The federation functional -ity of the OP is represented by the composition/decomposition of networks & services

under different domains. Since each domain may have different SLAS, security and Towards In-Network Clouds in Future Internet 23

services. The negotiation functionality of the OP enables separate domains to reach composition/decomposition agreements and to form SLAS for deployable services

The distribution functionality of the OP provides communication and control services that enable management tasks to be split into parts that run on multiple AMSS within

the same domain. The distribution function controls the deployment of AMSS and their components. The governance functionality of the OP monitors the consistency of

virtualisation to provide virtual services and resources. System virtualisation separates an operating system from its underlying hardware resources;

The KP provides information and context services as follows •information-life cycle management, which includes storage, aggregation, transfor

supporting context-aware communications that efficiently exploit the available net -work resources. Furthermore, context-aware networking enables new types of appli

-cations and services in the future Internet Context Information Services. The Context Information Service Platform (CISP within the KP, has the role of managing the context information,

including its distri -bution to context clients/consumers. Context clients are context-aware services, either

user-facing services or network management services, which make use of or/and adapt themselves to context information.

Network services are described as the ser -vices provided by a number of functional entities (FES),

and one of the objectives of 26 A. Galis et al this description is to investigate how the different FES can be made context-aware, i e

usage for scalability purposes. In practice, the CP creates meta-context from context using mechanisms that exploit the business requirements, other forms of context and

module is responsible for the communication of the CISP with the other management Towards In-Network Clouds in Future Internet 27

such the Management Plane components will run on execution environments sup -ported by the virtual networks and systems,

-agement functions & services •System functions: Minimise life-cycle network operations†costs and minimise energy footprint

and services, to be combined. In order to support this, each AMS uses the models and ontologies to provide a standard set of capabili

appropriate decisions for the resources and management services that it governs, ei -ther by itself (if its governance mode is individual) or in collaboration with other

environment for In-Network Clouds in Future Internet. They are described briefly here -with. Full design and implementation of all software platforms are presented in 10

that enables large-scale autonomic services deployment on virtual networks •MBT (Model-Based Translator) platform, part of the KP, which takes configura

networks and services. Lattice has a minimal runtime footprint and is not intru -sive, so as not to adversely affect the performance of the system itself or any run

-Network Cloud) that enables the composition of fast and guaranteed services in an efficient manner,

and the execution of these services in an adaptive way taking into 32 A. Galis et al

environment. We have described also the management architectural and system model for our Future Internet, which were described with the help of five abstractions and

then form the basis for new types of applications and services in the future Internet Acknowledgments. This work was undertaken partially in the context of the FP7-EU

Software Architecture Definition for On-demand Cloud Provisioning ACM HPDC, 21-25, Chicago hpdc2010. eecs. northwestern. edu (June 2010

-tures, and Protocols For Computer Communications (Karlsruhe, Germany, SIGCOMM †03 Karlsruhe, Germany, August 25†29,2003, pp. 3†10.

Communications Magazine 45 (10), 112†121 (2007 13. Deliverable D6. 3 Final Results Autoi Approach http://ist-autoi. eu

-communications Networking 54 (5)( 2010 15. Galis, A.,Denazis, S.,Bassi, A.,Berl, A.,Fischer, A.,de Meer, H.,Strassner, J.,Davy, S.,Ma

Mobile Communication and Computing Laboratory †Mobile Innovation Centre Magyar Tudosok krt. 2, H-1117, Budapest Hungary

scalability problems of mobile Internet nowadays and to show how the concept of flat and ultra flat architectures emerges due to its suitability and applicability

the continuously growing traffic demands. The discussion of the above areas will guide the readers from the basics of flat mobile Internet architectures to the

for future mobile communications Keywords: mobile traffic evolution, network scalability, flat architectures, mo -bile Internet, IP mobility, distributed and dynamic mobility management

1 Introduction Mobile Internet has started recently to become a reality for both users and operators

with easy-to-use 3g USB modems and attractive business models. Based on the cur -rent trends in telecommunications, vendors prognosticate that mobile networks will

1†4. In order to accommodate the future Internet to the anticipated traffic demands technologies applied in the radio access

architectures have been designed originally for voice services and later extended to support packet switched services only in a very centralized manner, the management

of this ever growing traffic demand is quite hard task to deal with. The challenge is

customers by balancing user traffic between a large variety of access networks. Scal -ability of traffic, network and mobility management functions has become one of the

-tions require network architectures able to deliver all kind of traffic demands seam -lessly assuring high end-to-end quality of service.

the novel traffic demands. Aiming to solve the burning problems of scalability from an architectural point of view, flat and fully distributed mobile architectures are gain

-ing more and more attention today The goal of this chapter is to provide a detailed introduction to the nowadays

emerging scalability problems of the mobile Internet and also to present a state of the

block of flat mobile communications. As a conclusion we summarize the benefits and challenges concerning flat and distributed architectures in Section 5

2 Traffic Evolution Characteristics and Scalability Problems of the Mobile Internet 2. 1 Traffic Evolution Characteristics of the Mobile Internet

are talking about five billion people †are subscribers of some mobile communication service 1 6. Additionally,

or open to pay for the Wireless internet services meaning that voice communication will remain the dominant mobile application also

in the future. Despite this and the assumption of 5 implying that the increase in the number of people potentially using mobile Internet services will likely saturate after

2015 in industrialized countries, the mobile Internet subscription growth potential will be kept high globally by two main factors.

The most prominent effect of services and application evolution is the increase of video traffic:

services like television/radio broadcasting and Vod, 66%of mobile traffic will be video by 2014 2. A significant amount of this data volume will be produced by

-tainment services seems to become dominant in terms of bandwidth usage, special optimization mechanisms focusing on content delivery will also appear in the near

As devices, networks and modes of communications evolve, users will choose from a growing scale of services to communicate (e g.,

, e-mail, Instant Mes -saging, blogging, micro-blogging, Voip and video transmissions, etc..In the future social networking might evolve even further,

communication in a more integrated way, or to put online gaming on the next level deeply impregnated with social networking and virtual reality

the mobile Internet, there is another emerging form of communications called M2m Machine to machine-Machine) which has the potential to become the leading traffic contribu

mobile networks, devices, applications and services, and significant device increase potential resulted by the tremendous number of novel subscriptions for Machine-to

-Machine communications 2. 2 Scalability Problems of the Mobile Internet Existing wireless telecommunication infrastructures are prepared not to handle this

traffic increase, current mobile Internet was designed not with such requirements in mind: mobile architectures under standardization (e g.,

On one hand user plane scalability issues are foreseen for anchor-based mobile Internet architectures, where mechanisms of IP ADDRESS allocation and tunnel estab

On the other hand, scalability issues are also foreseen on the control plane. The well established approach of separating service layer

, towards IP Multimedia Subsystem for delivering IP multimedia services), the interoperability between the service and the access layer can easily cause scalability

and Qos issues even in the control plane Flat Architectures: Towards Scalable Future Internet Mobility 39

Fixed networks were firstly subject to similar scalability problems. The evolution of DSL access architecture has shown in the past that pushing IP routing and other func

, Internet communication. Due to the collateral effects of this change a convergence procedure started to introduce IP-based transport tech

network functions for provision of IP services over the PS domain, while Release 6 standardized WLAN interworking and Multimedia Broadcast Multicast Service

LIPA) services have been published 15. These enable local breakout of certain IP traffic from the macro-cellular network or the H (e) Nodeb subsystems, in order to

entities in the same residential/enterprise IP network without the user plane traversing the core network entities.

In the PS domain, IP multimedia services require a two-level session establishment procedure. First, the MN and the correspondent node (CN) negotiate the session pa

network nodes and proprietary elements with peculiar functions, but also demand certain, distinctive mobility management schemes sufficiently adapted to the distrib

command and event services form the key routines of the future mobile Internet designs. The importance of this research area is

direct logical interfaces for inter-enodeb communications. Here, traffic forwarding between neighboring enodebs is allowed temporarily during handover events provid

edge router that bridges between mobile/wireless and IP communication. In order to achieve this, mobility support in the BSR is handled at three layers:

therefore providing a host-to-host communication method. End-to-end mobility management protocols working in higher layers of the

only for the ongoing communications while the mobile node is in motion between different IP sub-networks.

Table or anycast/broadcast/multicast communication can be used for the above pur -poses. In such schemes, usually all routing

Flat architectures infer high scalability because centralized anchors †the main per -formance bottlenecks †are removed,

BS nodes also minimizes the feedback time of intermodule communication, i e.,, sig -naling is handled as soon as it is received locally, on the edge of the operator†s net

the economy of scale. Also operational costs can be reduced as a flat network has fewer integrated components,

The higher competition of network management tools due to the apparition of tools developed formerly for the Internet era may reduce

scalability, fault tolerance and flexibility Optimization of handover performance is another key challenge for flat networks

Ultra Flat Architecture for high bitrate services in mobile networks. In: Proc. of PIMRC€ 08, Cannes, France, pp. 1†6 (2008

Communications Magazine 39 (12), 34†41 (2001 31. Melia, T.,de la Oliva, A.,Vidal, A.,Soto,

Journal of Computer Communications 31 (10), 2457†2467 (2008 J. Domingue et al. Eds.):) Future Internet Assembly, LNCS 6656, pp. 51†66,2011

deploy services they can be used in other tasks or services. As implementation challenge for controlling and harmonising these entire resource management

Future Communications and Internet 1 Introduction In recent years convergence on Internet technologies for communication†s, computa

-tion†s and storage†s networks and services has been a clear trend in the Information

In the future Internet, services and networks follow a common goal: to provide so -lutions in a form of implemented interoperable mechanisms.

-flect cost reduction and increase systems flexibility to react to user demands, by re -placing a plethora of proprietary hardware and software platforms with generic solu

interoperability as result of more service-oriented demands exist. Reliable services and network performance act as technology requirements for more secure and reliable

communication systems supporting end user and network requirements. Demands on data models integration are requirements to be considered during the design and im

-plementation phases of any ICT system The emergence and wide-scale deployment of wireless access network technolo

on the supporting role various protocols play in delivering communications services that meet the rapidly changing needs of the communities of users for which the hour

or deploy services they can be used in other tasks or services. As implementation challenge for controlling

robustly and efficiently allocate network services This paper is organized as follows: Section II presents a brief review of the chal

-ence Model and its implications for networks and services. Section V describes what we consider as critical functional blocks for an Interdisciplinary approach towards

enterprise application management systems can provide to federated management systems allowing network and services allocation.

Section VII presents the summary and outlook of this research. Finally some bibliography references supporting this

realisation of future communications environments in the future Internet 4 11 12 13. The Future Internet architecture must provide societal services and,

in doing so support and sustain interactions between various communities of users in straight rela

-tion with communication infrastructure mechanisms. Service-awareness 4 has many aspects to consider as challenges,

-tion on demand of control and network domains; interrelation and unification of the communication, storage, content and computation substrata

Networking-awareness 4 challenges imply the consumer-facing and the resource -facing services are aware of the properties, the requirements,

and the state of the net -54 M. Serrano et al work environment, which enable services to self-adapt according the changes in the

network context and environment. It also means that services are executed both and managed within network execution environments and that both the services and the

network resources can be managed uniformly in an integrated way. Uniform man -agement allows services and networks to harmonize their decisions and actions 14

The design of both networks and services is moving forward to include higher levels of automation,

and autonomicity, which includes self management The optimization of resources 15 16 17 using federation in the future Internet

relies on classify and identify properly what resources need to be used, thus dynami -cally the service composition and service deployed can be executed by result of well

known analysis on network and services 3 Rationale for Federation in the future Internet Federation is relatively a new paradigm in communications,

currently studied as the alternative to solve interoperability problems promoting scalability issues and explor -ing towards solving complexity

when multiple applications/systems need to interact with a common goal. In this paper federation is handled as the mechanism used by

communications management systems providing autonomic control loops In this section, the rationale for federated, autonomic management of communica

-tions services is addressed from the perspective of end-to-end applications and ser -vices in the future Internet. Federation in the future Internet envisions management

systems (networks and services) made up of possibly heterogeneous components each of which has some degree of local autonomy to realize business goals.

Such business goals provide services that transcend legal and organizational boundaries in dynamic networks of consumers and providers.

All the management systems with their own autonomy level contribute to satisfy more complex business goals, a single

entity would not be able to achieve A visionary perspective for what federation can offer in communications systems

-tion in future communications is, or which advantages it can offer either basics defini -tion (s) in communications,

but rather to provide a realistic approach in form of func -tional architecture, research results

Future Internet environments consist of heterogeneous administrative domains each providing a set of different services. In such complex environment, there is no

single central authority; rather, each provider has at least one (and usually multiple separate resources and/or services that must be shared

and/or negotiated The term Federation in communications was discussed in a previous work 20 and

currently many definitions have been proposed. We particularly follow a federated management definition as â€oea federation is a set of domains that are governed by

either a single central authority or a set of distributed collaborating governing Review and Designs of Federated Management in Future Internet Architectures 55

for networks and services. These principles can be validated via direct industrial investment, and roll out real integrated test beds to trial new network and service

infrastructures In future Internet end user, service, application and network requirements act as guidelines to identify study

Next generation networks and services 3 4 24 can not be conceived without systems acting and reacting in a dynamic form to the changes in its surrounding (con

autonomous forms offering added value services (Autonomics) 6 7 25 where tra -ditional definitions describing self management emerged.

both themselves and their environment, so that they can self-govern their behaviour within the constraints of the business goals that they collectively seek to achieve

exchange relevant information facilitating services and network operations. These cross-domain interactions demand certain level of abstraction to deal with mapping

requirements from different information and data domains. This higher level of ab -straction enables business

emphasizes offering federated services in a portable manner that is independent of the utilized networks. The objective is to effectively deliver

communications services over an interconnected, but heterogeneous infrastructure and establishes communication foundations Fig. 1. Federated Autonomic Management Reference Representation

A greater degree of coordination and cooperation is required between communication resources, the software that manages them,

and the actors who direct such manage -ment. In federation management end-to-end communication services involve config

-uring service and network resources in accordance to the policies of the actors in -volved in the management process.

in communications either what federation to the next generation networks and in the Future internet design with service systems using heterogeneous network technologies

services to be provided both and consumed by loosely coupled value networks of con -sumers, providers and combined consumer and providers.

to offer â€oecommon†and â€oeagreed†services even with many technological restrictions and conflicts blocking such activity.

enterprise and networks applications 26 is everyday increasingly in complexity. In the current Internet typical large enterprise systems contain thousands of physically

distributed software components that communicate across different networks 27 to satisfy end-to-end services client requests.

Given the possibility of multiple network connection points for the components cooperating to serve a request (e g.,

and the diversity on service demand and network operating conditions, it is very difficult avoid conflicts 14 20 28

between different enterprises (1. Definition) establish the process for monitoring 2. Observation) and also identify particular management data at application, service

operations of large enterprise applications (5. Federated Agreements) and the network services they require (6. Federated Regulations.

We support the idea that monitoring data at the network and application level can be used to generate knowledge that can

be used to support enterprise application management in a form of control loops in the information;

We also consider appropriate ways on how information from enterprise applications and from management systems can be provided to federate management systems

allocate new federated network services (11. Enforcement In a federated system the interaction between domains and the operations in be

-munications environments to effectively provide complex services (interoperable boundaries) and, in doing so, support and sustain service offering between various

and configurations for managing services and networks are used to ensure transfer -ence of results to other systems as result of sensitivity analysis. Simulation studies

technological dependencies for services support and increasing the interoperability between heterogeneous service and network management systems.

federated autonomic management for end-to-end communications services orchestrate federated service management where management systems should semantically inter

-operate to support evolving value chains and the end-to-end delivery of services At the middle level, coordination & cooperation and decision-making where mul

agreements necessaries to satisfy in one hand the enterprise requirements and in the other hand the management system requirement as result of events coming from the

enterprise processes and the heterogeneous infrastructure. The federation also acts as mediator between autonomic and/or non-autonomic management sub-systems when

about what information enterprise application management systems can provide to federate management systems to allow the latter to more robustly and efficiently allo

-cate network services. Brief scenario descriptions illustrate the possible challenges are necessaries to tackle around the term federation and particularly on federated systems

generates more demand on management systems to be implemented satisfying diver -sity, capacity and service demand.

Given the fact that in urban areas (shopping cen -tres, apartment buildings, offices) generates more demand in deploying wireless

802.11-based mesh networks this expansion will be a patchwork of mesh networks challenges arise relating to how services can be delivered efficiently over these over

-lapping infrastructures. Challenges in wireless mesh networks relate to both resource management within the network infrastructure itself and the way in which manage

-to end delivery of services to end-users. Furthermore, there are challenges relating to securing the delivery of services across (possible multiple) wireless mesh infrastruc

-ture domains This research scenario opens work mainly for focusing on the specifics of resource

6. 2 Federation of Network and Enterprise Management Systems Typical large enterprise systems contain thousands of physically distributed software

components that communicate across different networks to satisfy client requests Management and configuration is increasingly complex at both the network and en

that will enable enterprise application management systems to reconfigure software components to better adapt applications to prevailing network conditions.

-tion enterprise application management systems can provide to network management systems allowing a more efficient

-agement systems and enterprise application management systems, in a manner such that a coherent view of the communication needs

and profile of different transaction types can be built. Enterprise application management systems must be specified to

provide relevant application descriptions and behaviours (e g.,, traffic profiles and Qos levels) to network management system allowing shared knowledge to be opti

at a business or organisational level, the knowledge sector of modern economies is increasingly focussed on value networks rather than on value chains.

-teraction breakdowns between the various communication services providers, applica -tion service hosts, or value network members themselves.

Value networks of customers can only properly be served by federated service providers, henceforth termed Service Provider Federation (SPF

6. 4 Federation of Home Area Networks Services and Applications An emerging trend in communications networks is the growing complexity and het

-eration and integrated management of outer edge network environments; delegation of management authority to network management systems and decentralised assur

Architectures must consider high demands of information interoperability to satisfy service composition requirements being controlled by diverse, heterogeneous systems

-lem in the future Internet of networks and services We have studied how federation brings support for realisation on the investigated

experiments composing services in some of the scenarios described in this paper 64 M. Serrano et al

•Algorithms and processes to allow federation in enterprise application systems to visualize software components, functionality and performance

in federated enterprise and networks •Algorithms and processes to allow federated application management systems

-work and enterprise application management systems This paper makes references to design foundations for the development of federated

enterprise application management systems can provide to federate management sys -tems by using an interoperability of information as final objective

FAME-SRC (Federated, Autonomic Management of End-to-end Communications Services-Scientific research Cluster. Activities are funded partially by Science

Foundation Ireland (SFI) via grant 08/SRC/I1403 FAME-SRC (Federated, Autonomic Management of End-to-end Communications Services-Scientific research Cluster

and by the Univerself EU project 31, grant agreement nâ°257513, partially funded by the Commission of the European union

IEEE 2009 Fourth International Conference on Communications and Network -ing in China (Chinacom09) 26-28 august, Xi†an, China (2009

Prototype Implementation of the Policy Continuum. In: Proc. of 1st IEEE In -ternational Workshop on Broadband Convergence Networks (Bcn 2006), in conjunction

Autonomic Networking and Communication, Birkhã¤user, Basel (2008 8. Raymer, D.,van der Meer, S.,Strassner, J.:

Computer Communications (July 2010), 63 pp http://www1. cse. wustl. edu/jain/papers/ftp/i3survey. pdf

Autonomic Communications. International Journal of Internet Protocol Technology IJIPT) 2 (1)( 2006 13. Rubio-Loyola, J.,Astorga, A.,Serrat, J.,Chai, W. K.,Mamatas, L.,Galis, A.,Clayman, S

Multi-Domain IT Architectures for Next Generation Communications Service Provid -ers. IEEE Communications Magazine 48, 110†117 (2010

66 M. Serrano et al 20. Serrano, J. M.,van der Meer, S.,Holum, V.,Murphy, J.,Strassner, J.:

A Perspective for Future Internet Services Based on Autonomic Principles. In: 2007 IEEE Management Week †Manweek 2007 2nd IEEE MACE 2007 Workshop, San Josã, CA

Communication Review 37 (3)( 2007 25. Strassner, J.,Agoulmine, N.,Lehtihet, E.:FOCALE †A Novel Autonomic Networking

-quire agreement among all stakeholders, they are developed usually in an in -cremental process. This paper presents the current status of our work on a refer

is its heterogeneity, both regarding the types of devices as well as communication protocols used. IPV6 and in particular 6lowpan play an important role, but other

-erogeneity, services †in the form of standard Web Services and DPWS1, but more likely using RESTFUL approaches

As services play a pivotal role in the future Internet Architecture the use of services for integrating the RWI also fits well into the overall architectural

picture. One has to keep in mind though that RWI services have some different prop -erties from common, enterprise-level services:

They are of lower granularity, e g.,, just providing simple sensor readings and, more importantly, they are inherently unreli

-able; such RWI services may suddenly fail and the data they deliver has to be associ

-ated with some quality of information parameters before further processing 1 Device Profile for Web Services

An Architectural Blueprint for a Real-world Internet 69 3 Reference Architecture In this section we present an initial model on which several of the current RWI archi

2. functional coverage of the services provided by the architectures 3. underlying information models in the architectures, and

the physical environment that is instrumented with machine readable identification tags, sensors, actuators and processing elements organized in domain specific islands

Providing the services and corresponding underlying information models to bridge the physical and the digital world by allowing users/applications to interact with the Re

so that the services offered by the RWI architectures can find the required resources for the entity-level requests.

3. Resource Users who are the main users of the resources or architectural services 3. 1 Functional Coverage of RWI Architectures

Resource discovery is one of the basic services RWI architectures provide for re -source-level access.

, processing services) on resource hosts in order to satisfy context information requests and actuation requests Session management functionality is provided to support longer lasting interactions

charged for the access to resources or provided information and actuation services Accountability and traceability can be achieved by recording transactions and interac

not only the resource consumption and communication stress on the underlying infra -structure but also the flexibility, extensibility, dependability, determinism, etc. of the

Also, the interaction patterns manifest themselves in communication flows of dif -ferent characteristics. In order to effectively support these flows, different types of

communication services may be required from the underlying communication service layer. Table 1 shows a simple way to assess

the passive communication of the tags. The Object Naming Service (ONS) corre -sponds to the Entity Directory that returns the URLS of relevant resources for the EPC

service-oriented provision of AAL services and event-driven communication between them, in order to enable a proactive reaction on some emergent situations in the living

environment of elderly people. The system is based on the OSGI service middleware and consists of two main sub systems:

services like context management for collecting and abstracting data about the envi -ronment, workflow based specifications of system behaviour and semantically

Framework and platform services are coupled loosely by operating and communicating on shared vocabulary (most important ontologies:

dynamic group-based communication between PECES applications (Resources) by utilizing contextual information based on a flexible context ontology.

, services are described through attributes, modeled as contextual information, and a range of services (resources). Any service (resource

matching that description may be returned by the registry. Although no â€oesession con -text†is required, a pre-requirement exists that interacting PECES applications

group-based communication scenarios 76 A. Gluhak et al 4. 4 Semsorgrid4env The Semsorgrid4env architecture SSG4ENV provides support for the discovery and

data-focused services (acting as resource endpoints), which are based on the WS-DAI specification for data access and integration and which are supported by the Semsor

These services include those focused on data registration and discovery (where a spatiotemporal extension of SPARQL â€

-ported by using ontologies about roles, agents, services and resources 4. 5 SENSEI The SENSEI architecture SENSEI aims at integrating geographically dispersed and

It includes various useful services for both providers and users of real world resources to form a global market space for real world information and interaction.

supporting services that operate upon. On top of this unifying framework SENSEI builds a context framework, with a 3 layer information model.

services is a rendezvous mechanism that allows resource users to discover and query resources that fulfill their interaction requirements.

actuator and processing services can be iden -tified and dynamically combined in order to provide request context information or

Furthermore AAA services perform accounting and auditing for authorized use of real world resources 4. 6 Other Architectures

Things (Wot), where Web representations of real-world entities offer services to access and modify their physical state

and to mash up these real-world services with traditional services and data available in the Web.

SPITFIRE extends the architectural model of this chapter by its focus on services, supporting heterogeneous and resource

-constrained devices, its extensive use of existing Web standards such as RESTFUL interfaces and Linked Open Data,

RFID Enterprise applications, FP7, http://www. fp7-aspire. eu /CONET Cooperating Objects Noe, FP7 http://www. cooperating-objects. eu

Data/Linked Data, Semantic web, REST architecture, Internet of Services, SOA and Web Services and Internet of things approaches.

Each of these approaches focus on specific aspects and objectives which underlie the high level requirements of being a

currently influenced in enterprise IT environment and in the Web2. 0 mashup culture showing the importance of flexibly reusing service components to build efficient appli

-tural services for (rich media) content production, publication, interlinking and con -sumption. Even if it is very difficult to provide a strict separation of approaches because

-tent, Services and User perspectives, a rough schema in Table 1 can provide highlights the main, original, driving forces of such approaches

Services WS -*SOA Web 2. 0 Web 3. 0 Semantic web Internet of things The three views can be interpreted as emphasizing different aspect rather than ex

and Services are built as a result of a set of functions applied to the content, to pieces of information or ser

provide basic Services at an â€oeinfrastructural level†which in turn will ground the de -velopment of Applications fulfilling the user-centric needs and perspectives.

4. the Web-wide scalability of the approach The purpose of this paper is to show that Interdatanet can provide a high-level model

-ture), to support enhanced content/information-centric services for Applications, as highlighted in Figure 1

â € the Web-wide scalability of the approach This consolidates the need to look for

4. IDN provides-at an infrastructural level-collaboration-oriented basic services namely: privacy, licensing, security, provenance, consistency, versioning and

such as Linked Data, RESTFUL Web Services, Internet of Service, Internet of things 2. 1 The Interdatanet Information Model and Service Architecture

the services offered by IDN naming system. IDN-Nodes are the information that the layers exchange in their communications.

In each layer a different type of IDN-Node is used: SI-Node, RM-Node, IH-Node and VR-Node.

Storage Interface (SI) provides the services related to the physical storage of informa -tion and an interface towards legacy systems.

The communications between IDN-SA layers follows the REST 8 paradigm through the exchange of common HTTP messages containing a generic IDN-Node in

-herent scalability also in the deployment of its functions. According to the envisaged steps the architecture can offer

Fig. 5. Interdatanet Service Architecture scalability features Managing a Global Distributed Interlinked Data-Content-Information Space 89

c) the adoption of a RESTFUL Web Services, also known as ROA †Re -source Oriented Architecture to leverage on REST simplicity (use of well-known

HTTP, XML, URI, MIME), pervasive infrastructure and scalability The current state of Interdatanet implementation and deployment, is evolving along

implementation IDN-Service Architecture prototypes Open Access. This article is distributed under the terms of the Creative Commons Attribution

RESTFUL Web Services; O†Reilly Media, Inc.:Sebastopol, CA USA (2007 9. Carroll, J. J.,Bizer, C.,Hayes, P.,Stickler, P.:

-ing the ICT environment, by means of the introduction of Semantic Virtualiza -tion Enablers, in charge of virtualizing the heterogeneous entities interfacing

studies, realized in a home environment, confirm the potentialities of the pro -posed solution Keywords:

growth of small and/or mobile devices and sensors, of services and of security re -quirements began to show that current Internet is becoming itself a bottleneck.

demanding requirements of new services and applications will require radical archi -tecture enhancements very soon.

GENI 6 (Global Environment for Network Innovations) is a virtual labo -ratory for at scale experimentation of network science, based on a 40 Gbps real infra

which support services and applications by utilizing the current Internet infrastructure. For instance, G-Lab 8

technologies and services. The main idea is to collect and elaborate all the informa -tion coming from the whole environment (i e.,

, users, contents, services, network re -sources, computing resources, device characteristics) via virtualization and data min

-ing functionalities; the metadata produced in this way are then input of intelligent cognitive modules which provide the applications/services with the required function

-alities in order to maximize the user Quality of Experience with the available re -sources The Chapter is organized as follows:

example of Resources include services, contents, terminals, devices middleware functionalities, storage, computational, connectivity and networking

the large variety of supported services and the rapid evolution of the service charac -teristics, are becoming more and more unpredictable.

Services Networks Contents Devices Cloud storage Terminals Computational Fig. 1. Proposed Cognitive Future Internet Framework conceptual architecture

Furthermore, in each specific environment, the Cognitive Framework functional -ities have to be distributed properly in the various network entities (e g.

above-mentioned heterogeneous parameters/data/services/contents in homogeneous metadata according to proper ontology based languages (such as OWL †Web Ontol

(ii) providing enriched data/services/contents to the Actors In addition, these enablers control the sensing, metadata handling, actuation and API

data/contents/services produced by the Cognitive Enablers (Provisioning functional -ities embedded in the Actor Interface;

for hosting the Cognitive Managers have to be selected environment by envi -ronment. Moreover, the Cognitive Managers functionalities (and, in particular

Elaboration functionalities have to be selected carefully environment-by -environment, trading-off the advantages achieved in terms of efficiency with the

entailed additional SW/HW/computation complexity 7) Thanks to the flexibility degrees offered by issues (4)-(6), the Cognitive Manag

-sidered environment is performed, the proposed architecture can actually scale from environments characterized by few network entities provided with high

processing capabilities, to ones with plenty of network entities provided with low processing (e g. Internet of things 8) The above-mentioned flexibility issues favours a smooth migration towards the

Of course, careful, environment-by -environment selection of the Cognitive Manager functionalities and of the network

entities in which such functionalities have to be embedded, is essential in order to allow scalability and to achieve efficiency advantages

which are worthwhile with respect to the increased SW/HW/computing complexity The following section shows an example of application of the above-mentioned

approach to different environments aiming at assessing, in a quantitative way, the actual achieved advantages in terms of flexibilty (scalability) and efficiency;

never -theless, in the authors†vision such advantages are already evident, in a qualitative way, in the concepts and discussions presented in this section

, Ethernet, PLC) communication technologies. For 100 M. Castrucci et al testing purposes, only a simplified version of the Cognitive Manager has been imple

The Internet of today has diï culties to support the increasing demand for re -sources and one of the reasons is restricted related to the evolution of the TCP IP

A Future Internet full of services requirements demands networks where the necessary resources to service delivery are orchestrated

the context of the consumers taking into account their communication needs at each context, supporting their change over time

The Entity Title Model concepts can be used at the communications layer to the real world architecture envisaged by SENSEI 33 project, besides that

For communication between network elements, ontology is used usually in the application layer, without extending to the middle and lower layers of computer

-work layers protocols to establish communication among the network elements For example, the applications can select the protocol UDP or TCP, according

It is possible to change the paradigm of client-server communication and the structure of the intermediate layers of the TCP IP, so that the communication

networks have expansion possibilities to support the needs of the upper layer For so, one solution is to use an intermediate layer conceptually capable of

the communication with and between the lower layers. A possibility proposed by the Entity Title Model

Element whose communication needs can be semantically under -stood and supported by the service layer and subsequent lower Link and Phys

-ture, as the entity here is a communication element and not one resource in a

For example, one user, that demands resources, is one communication entity in the Title Model. Also, applications

that do not oï €er resources, but demand some ones, are entities However, for an ontology there is correlation of the terms â€oeentity†and

which in turn is an communication element that have its communication needs understood and supported by computer networks.

the other communication entities of the computer networks. According to this recommendation, the ASO-title (Application Service Object-title), which are

used to identify with no ambiguity the ASO in an OSI environment, consists of AP-title (Application Process title) which, by nature, addresses the applications

facilitate communication among the entities and with the other layers 24. Not to use a separate classiï cation for â€oeuser titleâ€, â€oehost title†and â€oeapplication ti

-cation of a communication element whose needs may be understood semantically and supported by the service layer and subsequent lower link and physical layers

whose communication needs are understood semantically and supported by the service layer (intermediate layer) that has the physical and

-ments, essential or indispensable for the communication elements whose needs 108 J. H. de Souza Pereira et al

entities in communication, and also the context of communication itself. The con -texts can be inï uenced by space time, speciï c characteristics of entities, among

other forms of inï uence. Discussion on the changing needs are presented in 24 where associations between elements of communication may vary according to

their desired needs and their variation in time Regardless of the time, the nature of communication can also inï uence the

desired values for the facets. For example, to transfer data from a ï le, or content

On the other hand, for an audio or video communication in real time it will not necessarily be important the delivery guarantee,

the problem corresponding to the elements of communication, whose needs can be understood and semantically supported by the service layer and subsequent

-nication services among them. This domain has worldwide coverage and hierar -chical scalability formed by elements of local communication, masters and slaves

similar to DNS (Domain name System. The DTS does the orchestration of the entities communication, as showed in Fig. 2

2. 2 Cross Layer Ontology for Future Internet Networks For intermediate semantic layer, this work did the creation of an ontology for

Fig. 2. Entities Communication Orchestrated by the DTS 4 28. This ontology also supports the proposal of Horizontal Addressing by

communications needs formalization and standardization, and also has limita -tions with the collaboration with others Future Internet projects eï €orts.

-son is because the solution for horizontal addressing and communication needs was represented and supported using the Lesniewski Logic 18 29.

it permits semantic communication cross layers to contribute with, for example the autonomic management, as the Autoi works.

Ontology for management and governance of services 5. However, these studies does not use the ontology to the formalization of concepts for replacement

-ported by a layer of services. It is very important to highlight that the name

meaning of â€oeservice concept†as, in general, the layers also expose services to other layers. In its concept, the service layer is able to understand

The relationship between Entity, Services and Data link layers are made by the use of concepts directly represented in OWL.

For the communication between the layers running in a Distributed Operating system, without the traditional sock

is used the Raw Socket to enable the communication 19 The following OWL sample code shows one use case example for distributed

Communication with Slave -USP-A; Payload Size Control equal to 84 Bytes; and; Delivery Guarantee re

distributed programming communication using diï €erent approaches, as the ad -dressing proposal presented in 25.

need the Content directly from Services or from other Users (thoughts. In this perspective, the Entity Title Model and its ontology can contribute to converge

categories of communication entities, and its needs. One basic sample of the taxonomy for this â€oeentity†concept is showed in the Fig. 4,

which translates this communication in functionality Fig. 4. Entity Taxonomy in the Title Model 112 J. H. de Souza Pereira et al

Also, the interoperability, scalability and stability test cases for this model It is suggested also the continuity of studies and discussions on the use of

layers of computer networks, thereby deï ning the communication architecture whose study go over the deï nitions in the area of protocols architecture

Global Environment for Network Innovation Program. National Science Foundation, http://www. geni. net (2011 15 Gruber, T.:

and Services p. 7 (2010 27 Prudeë ncio, A.,Willrich, R.,Diaz, M.,Tazi, S.:

Information and Communication Technologies (ICT) provide in recent years solutions to the sustainability challenge by, e g.,

-quences, and by enabling novel low-impact economic activities, such as virtual indus -tries or digital assets.

any sort of economic activity (here networking in the areas of Internet-based and telecommunications-based communications for a variety of lower-level network/tele

-communication as well as application-based services) and the social life of user (here mainly addressing private customers of such services

and providers offering such services);()( 2) Markets of Internet service providers (ISP) and Telecommunication Providers;( (3) ISPS peering agreements and/or transit contracts;(

4) Customer usage behavior and selections of content;(5) The investigation of emerging technologies and disruptive technologies,

which effect the user/customer-to-provider relation;(6 The investigation of (European) regulation for e-services markets and security regula

-tions;( (7) The investigation of the physical environment of e-services in terms of availability, worldwide vs. highly focused (cities),

and dependability for commercial services; and (8) The determination (if possible) of the growth of the Gross Domestic

Product (GDP), providers†revenue maximization, and customers†benefits. While this collection cannot be considered complete, it clearly outlines that a combination of

Internet communications particularly and the Internet architecture generally chal -lenges networking research and development today. Economic effects of technical

consideration, since detailed and specific security demands, electronic identities, or Quality-of-Experience (Qoe) will outline societal requirements to be met by techno

-of-operations of a variety of Internet-based services In this emerging area of research the specific view on the networking and transmis

-economics domain, has shown that the interest of such cross-disciplinary work and its relevance increases slowly.

mutually beneficial situation for all stakeholders in a Future Internet scenario, the â€oetri -plewin†investigations determine the key goal of Economic Traffic Management

-form with a variety of stakeholders involved, the key motivations of each of them and

-economic domain of Internet stakeholders. In turn, the chapter outlines a new meth -odology, with which tussles are analyzed.

1 Athens University of Economics and Business, Athens, Greece 2 AGH University of Science and Technology, Krakow, Poland

the overlay traffic in a way that is mutually beneficial for all stakeholders of the Future Internet. This"Triplewin"situation is the target of Economic Traffic

and scalability properties. Here, the focus is laid on the first two categories; note that mechanisms

stakeholders (end users, service providers, and ISP) would benefit thereby and under which circumstances â€oetriplewin†arises.

-ture of interconnection tariffs, business models, marketing factors. Thus, the assessment methodology focused on another quantifiable metric, namely the inter-domain traffic

-rately) or assessed by a metric called Missed Local Opportunities (MLO. It is a meas

with higher capacity demand. Performance is improved always since no policy is employed; in each case, higher improvement is observed for the peers of the swarm

leechers and their bandwidth demand, thus, making it important to take this additional metric into account

in a peer-assisted video-on-demand scenario as described in 12 The main assumption of the HAP ETM mechanism is that by promoting locality

operational prototype, the Admin component of the Smoothit Information Service SIS) has been designed as a Web-based tool for the ISP to administrate,

19th IEEE International Conference on Computer Communications and Net -works (ICCCN 2010), ZÃ rich, Switzerland (August 2010

Deliverable 2. 4 †Performance, Reliability, and Scalability Investiga -tions of ETM Mechanisms (August 2010

2 Athens University of Economics and Business, Greece {kanakakis, alexkosto}@ aueb. gr 3 Aalto University, School of Electrical engineering, Finland

Stakeholders Incremental Implement Wider scenario Deployment Adoption Implement Network effect Network effect Testing Testing Testing

new opportunities through forms etc. As another example, a NAT (Network Address Translator) allows an operator to support more

sufficient functionality to meet a specific business opportunity. If each step is the same, this is equivalent to saying that there should be a benefit for earlier adopters

Then each step may involve different stakeholders, for example Bittorrent was ini -tially adopted by application developers (and their end-users) to transfer large files

particularly important because different stakeholders are involved †equipment ven -dors implement, whilst network operators deploy;

and TCP restricts communications to a single path per transport connection. But hosts are connected often by multiple paths, for example mobile

as only one stakeholder is involved viz the data centre operator Fig. 2. Potential MPTCP deployment scenario, in a data centre.

Both the devices and servers are under the control of one stakeholder so the end user †unconsciously†adopts MPTCP.

Several stakeholders may now be involved. For instance, it is necessary to think about the benefits and costs for OS vendors, end users, applications and

sender, is problematic as it requires several stakeholders to coordinate their deploy -ment 9. Since this is likely to be difficult,

together several services that separately had less market traction 6 Conclusions The main message of this Chapter is that implementation, deployment and adoption

Journal of Political Economics 94, 822†841 (1986 6. Joseph, D.,Shetty, N.,Chuang, J.,Stoica, I.:

ACM SIGCOMM Computer Communications Review 40 (2)( 2010 8. Kostopoulos, A.,Warma, H.,Leva, T.,Heinrich, B.,Ford, A.,Eggert, L.:

Conference on Communications, ICC (2006 18. Hasegawa, Y.,Yamaguchi, I.,Hama, T.,Shimonishi, H.,Murase, T.:

-tribution for multipath TCP communication. In: IEEE GLOBECOM (2005 19. Kelly, F.,Voice, T.:Stability of end-to-end algorithms for joint routing

Computer Communication Review 35,2 (2005 20. Key, P.,Massoulie, P.,Towsley, D.:Combined Multipath Routing and Congestion Con

1 Athens University of Economics and Business, Greece ckalog@aueb. gr, courcou@aueb. gr, gstamoul@aueb. gr

stakeholder cooperative behavior are no longer valid. Conflicts have emerged in situations where there are opposing interests. Previous work in the literature has

services, and content. Accordingly, different stakeholders in the Internet space have developed a wide range of on-line business models to enable sustainable electronic

business. Furthermore, the Internet is increasingly pervading society 3. Widespread access to the Internet via mobile devices, an ever-growing number of broadband users

worldwide, lower entry barriers for nontechnical users to become content and ser -vice providers, and trends like the Internet-of-Things or the success of Cloud services

all provide indicators of the high significance of the Internet today. Hence, social and economic impacts of innovations in the future Internet space can be reasonably ex

-petitive behavior of different stakeholders involved in building and using the Internet That is, a tussle is a process in

which each stakeholder has particular self-interests, but which are in conflict with the self-interests of other stakeholders.

Following these interests results in actions †and inter-actions between and among stakeholders. When

stakeholder interests conflict, inter-actions usually lead to contention. Reasons for tussles to arise are manifold.

Overlay traffic management and routing decisions be -tween autonomous systems 11 and mobile network convergence 10 constitute only

the future Internet is in the number of observed stakeholders in the current Internet and their interests.

-ers, tussle analysis becomes an important approach to assess the impact of stakeholder behavior This paper proposes a generic methodology for identifying

well-being, subject to restrictions imposed by the environment and the actions of others 6. Similarly, game-theoretic models that aim at finding

-sively, allowing for more stakeholders, tussles, etc. to be included in the analysis. It is out of the article†s scope to suggest where the borderline for the analysis should be

multidisciplinary team, composed of engineers, economists and social scientists would allow for suggesting candidate techniques and incorporating useful insights

1. Identify all primary stakeholders and their properties for the functionality under investigation 2. Identify tussles among identified stakeholders and their relationship

148 C. Kalogiros et al 3. For each tussle a. Assess the impact to each stakeholder

b. Identify potential ways to circumvent and resulting spill overs. For each new circumventing technique, apply the methodology again

all important stakeholders affected by a functionality related to a protocol, a service or an application instance.

The outcome of this step is a set of stakeholders and attrib -utes such as their population, social context (age, entity type, etc.

as well as the relative influence across stakeholders change over time The next step aims at identifying conflicts among the set of stakeholders and their re

-lationship. In performing the first part of this step the analyst could find particularly useful to check

from the perspective of each stakeholder. In the ideal scenario a tussle outcome will affect all stakeholders in a nonnegative way and no one will seek to deviate;

thus an equilibrium point has been reached. Usually this is a result of balanced control across stakeholders, which means that the protocols implementing this functionality follow

the Design for Choice design principle 5. Such protocols allow for conflict resolu -tion at run-time,

or all †stakeholders are satisfied not by the tussle outcome and have the incentive to take advantage of the functionality provided, or

-dence from which one can draw inferences about stakeholders and tussles. For all steps of this methodology except for 3a,

systems with multiple stakeholders, multiple quantitative and qualitative sources of evidence may be required to better understand the actual and potential tussles.

utility, as well as providing benchmarks like the price of anarchy ratio. Ideally a single metric should be used

effect on IUS and provision of other services. Assuming that the ISP€ s network re

high congestion can have an impact on ISP€ s plans to offer other real-time services

set of stakeholders is extended to include ASPS as well. The new tussle involves ISPS and ASPS (e g.

In the third iteration it will be assumed that the policy-maker (a new stakeholder decides to intervene, with the important advantage of proactively seeking the socially

lead to new tussles (spill over) that may involve new stakeholders as well. For example the Tussle I among Actor A and Actor B may trigger the Tussle II involving the same

stakeholders, or a Tussle III among Actor B and Actor C. This basic model is extended

-nomic tussles refer to conflicts between stakeholders, motivated from an expected reward gained (or cost avoided)

tussles refer to conflicts between stakeholders that do not share the same social inter -ests, or that have repercussions into broader society as a result of changes in the tech

set of stakeholders follow economic objectives and their actions affect the social in -terests of other stakeholders

3. 1 Tussle Patterns We have identified an initial set of four tussle patterns that include contention, repur

represent a conflict among two stakeholders, while a dotted rectangle shows the se -lected set of resources when at least one stakeholder has the ability to influence the

outcome. Based on the context, a reverse tussle pattern may also be present. The char -acteristics of each pattern can be seen in many current and future Internet scenarios

an individual stakeholder can be a resource consumer in one tussle, but a provider of a

exists either between consumer interests due to the scarcity of resource, or among a consumer and the provider due to the impact on a provider†s ability to exploit the

that receives services at the wholesale level (we refer to this case as the reverse con

Instances of this tussle pattern have their roots in economics and thus are resolved typically through the process of economic equilibrium or

packet inspection and throttling so that quality of other services is acceptable 3. 2 Economic Tussles

Economic tussles refer to conflicts between stakeholders, motivated from an expected reward gained (or cost avoided)

to the scarcity of certain resources that need to be shared. Furthermore, such tussles can occur between collaborating stakeholders due to different policies or, in economic

terms, different valuations of the outcome. Tussles can also appear when a stake -holder is being bypassed

of services. A popular example is bandwidth of bottleneck links and radio frequencies shared between users and wireless devices.

types, which economists identify as a â€oetragedy of the commonsâ€. Similar contention tussles can take place for other cloud resources as well, such as processing and stor

economic entity and must protect its investments. Examples include the deployment of Deep Packet Inspection techniques by ISPS in order to control how bandwidth is

allocated across users and services The remaining tussle patterns are seen mostly in bilateral or multilateral transac

â€oeinformation asymmetry†in the economic theory literature. This imbalance of power can sometimes lead to â€oemarket failuresâ€,

But, this lower price would lead some sellers of higher quality services to stop selling (since they do not cover their costs anymore) and thus, in the long term

only low quality services will be available. Similarly, if a service provider were the less informed party, then setting-for example-a low price would increase his risk of

being selected by the least profitable customers. This would increase his costs and trigger a rise in prices,

customers. Eventually this â€oeadverse selection spiral†might, in theory, lead to the collapse of the market.

traffic shaping then it may have negative impact on the services, and thus, on the viability of new ASPS, who however cannot safely attribute these effects to the ISP

Repurposing tussles occur in regards to the privacy of user communication data be -tween users, ISPS, service providers and regulators.

privacy of communications is based on democratic ideals, that persons should be secure from unwarranted surveillance.

the potential profits to be made from monitoring and monetizing the communication of their users, and the demands of gov

-ernment bodies to be able to monitor the networks for illegal or unwanted activities Control tussles in a social context relate, for instance, to digital citizenship and un

-derstanding the balance between individual and corporate rights and responsibilities and how such a balance can be achieved through accountability and enforceable con

wishing to maintain confidential communication For instance, is Wikileaks right or wrong to distribute leaked documents containing

the details of government and corporate communications? Until Wikileaks started re -leasing real documents of widespread interest,

have in supplying services to controversial online bodies come to the forefront. If Wikileaks is wrong,

well as among an ISP and its customers, due to the aggressive behavior of popular file sharing applications.

The ETICS project (Economics and Technologies for Inter-Carrier Services) 8 studies a repurposing tussle arising

an ASP€ s revenues (the â€oeconsumerâ€) due to its higher investment risks and opera -tional costs.

based on a lean architecture to operate new services in the future Internet, the discovery of capabilities and the adaptation of many management operations to current working

wireless services, mobile operators and regulators that has arisen from the social in -terest to reducing carbon footprint of the ICT sector and the economic incentive to

Due to economies of scale the thin-client paradigm, where most applications run on a remote server,

selected services to FP7 projects in Challenge 1. SESERV provides access to socioeco -nomic experts investigating the relationship between FI technology, society, and the

economy through white papers, workshops, FIA sessions, and research consultancy In this paper SESERV proposes a methodology for identifying

-fied, we believe it can capture the evolving relationships among stakeholders, and thus tussles, across time.

Pricing Communication Networks: Economics, Technology and Modeling. Wiley, Chichester (2003 7. CRAMM: http://www. cramm. com (accessed December 1, 2010

8. ETICS: https://www. ict-etics. eu (accessed December 1, 2010 9. Ford, A.,Eardley, P.,van Schewick, B.:

International Conference on Communications Workshops, June 2009, pp. 1†5 (2009 10. Herzhoff, J. D.,Elaluf-Calderwood, S m.,Sørensen, C.:

D2. 5 Business models, Public Deliverable http://www. mobithin. eu (accessed December 1, 2010 14. SENDORA project:

-puting, for instance, is built on shared resources and computing environments, offer -ing virtualized environments to individual tenants or groups of tenants, while execut

-ing them on shared physical storage and computation resources. The concept of Plat -form-as-a-Service provides joint development and execution environments for soft

-ware and services, with common framework features and easy integration of func -tionality offered by third parties.

The Internet of Services allows the forming of value networks through on-demand service coalitions, built upon service offerings of differ

-ent provenance and ownership. And, finally, the principle of sharing and collaboration reaches to the applications and business models, ranging from the exchange of data of

physical objects for the optimization of business scenarios in, e g.,, retail, supply chain management or manufacturing, †the Internet of things †to social networks

While it is evident that sharing and collaboration brings the Internet, its technolo -gies, applications and users to the next level of evolution, it also raises security and

about security properties of exposed services and information 164 Part III: Future Internet Foundations: Security and Trust

-ples are supported by revised communication paradigms, which address potential security issues from the beginning, but also imply the need for novel solutions like

data-centric approach for the Future Internet, replacing point-to-point communication by a publish/subscribe approach.

-rity properties of services and infrastructures in the future Internet. The provision of evidence and a systematic approach to ensure that best security practices are applied

-nents, the opportunities of sharing and collaboration cannot be leveraged. The chapter â€oeengineering Secure Future Internet Services†by W. Joosen et al. makes a point for

establishing an engineering discipline for secure services, taking the characteristics of the Future Internet into account.

-size multilateral security requirements, the composability of secure services, the pro -vision of assurance through formal evidence and the consideration of risk and cost

-rity support in programming and execution environments for services, and suggest using rigorous models through all phases of the SDLC, from requirements engineer

-tion of security properties of services, is investigated in detail in the chapter †Towards Formal Validation of Trust and Security in the Internet of Services†by R. Carbone et

They introduce a language to specify the security aspects of services and a valida -tion platform based on model-checking.

the feasibility of the approach to Future Internet scenarios and the scalability to its complexity:

-trial-scale process modeling and execution environments. The two chapters demon -strate the way towards rigorous security and trust assurance in the future Internet

the Future Internet opportunities today While engineering and validation approaches provide a framework for the secure

Future Internet scenarios like the Internet of Services, the need for data exchange leads to sensitive data, e g.,

exciting opportunities in sensitive scenarios of both the business and societal worlds Volkmar Lotz and Frances Cleary

in a hostile environment, where a large number of users are assumed to collude against the network and other users.

-mal trust assumptions between the stakeholders in the system to guarantee the security properties advertised

Data-centric pub/sub as a communication abstraction 2, 3, 4 reverses the control between the sender and the receiver.

which means that the attackers cannot prevent communication be -tween a legitimate publisher and a subscriber inside a trusted scope

scalability and efficiency. For example, it must be assumed that the core routers forward packets at line-speeds of tens of Gigabits per second, which requires ex

have to take into account the various stakeholders such as ISPS, end-users, and governments, and tussles 6 between their goals.

-tween stakeholders to decide the stable configuration. The design should also ad -here to architectural constraints such as the end-to-end principle (E2e) 13 by

trust assumptions between stakeholders 2 Basic Concepts Data-or content-centric networking can be seen as the inversion of control between

policies such as replication and persistence for data-centric communication. The Security Design for an Inter-Domain Publish/Subscribe Architecture 169

communication using any kind of transport abstraction on the data plane fast path that is used for the payload communication.

The data-centric paradigm is a natural match with the communication of topology information that needs to be distributed

typically to multiple parties and the ubiquitous caching considerably reduces the ini -tial latency for the payload communication as popular operations can be completed

locally based on cached data Below the control plane, t he network is composed of domains, that encapsulate re

network description language (ANDL) for the communication of network topology information in control plane publications,

transport protocol implements a specific communication abstraction and every actual -ized instance of interaction or communication event consuming the resources of the

network has associated an transport, topic, a graphlet and a set of roles. For example when IP is seen as a transport protocol in our network architecture, the roles for the

communication, the topic identifies the requested publication A graphlet defines the network resources used for the payload communication and

it can be anything from the path of an IP packet to private virtual circuits.

payload communication. A graphlet adheres to a set of scopes that are responsible for policy-compliant matching of nodes to interaction instances, collecting the needed

be divided into aspects of communication handled modularly by different scopes implemented by different entities. Scopes are responsible for combining upgraph

on a per-segment basis in the payload communication, we use packet level authentica -tion (PLA) 25 that uses elliptic curve cryptography (ECC) 23.

hardware accelerator has been developed for PLA 24 accelerating cryptographic operations Security Design for an Inter-Domain Publish/Subscribe Architecture 171

the access to the scope only to the customers of the company. In this example, it is

-tions, is orthogonal to the scoping of the data that determines the communication aspects for each publication

which the communication takes place. The scope joins the upgraphs and produces an end-to

delivery tree) that can then be used for the fast-path payload communication At every level of the hierarchy, the rendezvous core provides an anycast routing to the

4 Phases of Communication Each node wishing to communicate first requests the description of end-to-end fast

publications, which minimizes the amount of communication as only relevant infor -mation needs to be transfered.

which would hide the destination of the communication from the transit domains and thus guarantee some level of network neutrality.

Engineering Secure Future Internet Services Wouter Joosen1, Javier Lopez2, Fabio Martinelli3, and Fabio Massacci4 1 Katholieke Universiteit Leuven

In this paper we analyze the need and the opportunity for establishing a discipline for engineering secure Future Internet Services

typically based on research in the areas of software engineering, of service engineering and security engineering. Generic solutions that ignore the

characteristics of Future Internet services will fail, yet it seems obvious to build on best practices

assurance to the stakeholders and enable risk and cost management for the business stakeholders in particular.

The paper should be considered a call for contribution to any researcher in the related sub domains in

services 1 Introduction 1. 1 Future Internet Services The concept named Future Internet (FI) aggregates many facets of technology

and its practical use, often illustrated by a set of usage scenarios and typical applications.

the broad mass of end users through a new generation of services (e g. a hybrid aggregation of content and functionality), service factories (e g.,

enterprise mash-ups), and service warehouses (e g.,, platform as a service. One speciï c service instance may thus be created by multiple service development

be operated and used by a virtual consortium of business stakeholders. While the creative space of services composition is unlimited in principle,

so is the fragmentation of ownership of both services and content, as well as the complex -ity of implicit and explicit relations among participants in each business value

chain that is generated. In addition, the user community of such FI services evolves and widens rapidly, including masses of typical end users in the role

of prosumers (producing and consuming services. This phenomenon increases the scale, the heterogeneity and the performance challenges that come with FI

service systems This evolution obviously puts the focus on the trustworthiness of services Multiparty service systems are not entirely new, yet the Future Internet stretches

the present know how on building secure software services and systems: more stakeholders with diï €erent trust levels are involved in a typical service com

-position and a variety of potentially harmful content sources are leveraged to provide value to the end user.

This is attractive in terms of degrees of freedom in the creation of service oï €erings and businesses.

and services are shared and composed. This adds an extra level of complexity, as both risks and assumptions

1. 2 The Need for Engineering Secure Software Services The need to organize, integrate and optimize the research on engineering secure

software services to deal eï €ectively with this increased challenge is pertinent and well recognized by the research community and by the industrial one.

Internet services and causes signiï cant monetary losses in recovering from those attacks. In addition, this induces users at several levels to lose conï dence in the

adoption of ICT-services From a business perspective, however, we are now witnessing the emergence

an economy of scale and have shown already their commercial value fostered by key players in the ï eld.

New Internet services will have to be Engineering Secure Future Internet Services 179 provided in the near future,

and security breaches in these services may lead to large ï nancial loss and damaged reputation

1. 3 Research Focus on Developing Secure FI Services Our focus is on the creation and correct execution of a set of methodologies, pro

-cesses and tools for secure software development. This typically covers require -ments engineering, architecture creation, design and implementation techniques

ICT-services according to the latest Future Internet paradigms, where services are composed by simpler services (provided by separate administrative domains

integrated using third parties infrastructures and platforms. The need of man -aging the intrinsic modularity and compose-ability of these architectures

in order to improve their return of investments (ROI Thus, embedding risk/cost analysis in the SDLC is currently one of the key

1) security requirements for FI services,(2) creating secure service architectures and secure service design,(3) supporting programming en

and compose-able services,(4) enabling security assurance integrating the former results in (5) a risk-aware and cost-aware software devel

techniques that we consider useful for engineering secure Future internet services 2 Security Requirements Engineering

speciï c requirements that refer to devices and to speciï c services. A key chal

stakeholders and devices †probably one of the most distinguishing characteris -tics of the FI

The need for assurance in the future Internet demands a set of novel engi -neering methodologies to guarantee secure system behavior and provide credible

of view of all stakeholders. The security requirements of Future Internet applica -tions will diï €er considerably from those of traditional applications.

stakeholders, and may involve an array of physical devices such as smart cards phones, RFID sensors and so on that are connected perpetually and transmit

Service-orientation and the fragmentation of services (both key characteris -tics of FI applications) imply that a multitude of stakeholders will be involved

in a service composition and each one will have his own security requirements Hence, eliciting, reconciling,

Engineering Secure Future Internet Services 181 This picture is complicated further by the vast number and the geographical

spread of smart devices stakeholders would deploy to meet their requirements Sensor networks, RFID tags, smart appliances that communicate not only with

†The deï nition of techniques for the identiï cation of all stakeholders (includ -ing attackers), the elicitation of high-level security goals for all stakeholders

and the identiï cation and resolution of conï icts among diï €erent stakeholder security goals

†The reï nement of security goals into more detailed security requirements for speciï c services and devices

†The identiï cation and resolution of conï icts between security requirements and other requirements (functional and other quality requirements

to a versatile set of services, devices and stakeholder concerns 3 Secure Service Architecture and Design

of design patterns for FI services and applications. The three share the common ambition to maximize reuse and automation while designing secure FI services

and systems As for the ï rst element the aim is to support methodologies that utilize

note that FI scenarios include Cloud and GRID services and although some work has already been made in the area 23,

nonfunctional concerns that diï €erent stakeholder may have about it. However Engineering Secure Future Internet Services 183

in order to grasp a comprehensive understanding of the application as a whole it is required to integrate all these views into a uniï ed one.

Finally, adaptation of composite services is a key area of interest. FI scenarios are very dynamic,

so threats in the environment may change along the time and some reconï guration may be required to adapt to that changes

4 Security Support in Programming Environments Security Support in Programming Environments is not new; still it remains a

grand challenge, especially in the context of Future Internet (FI) Services. Secur -ing Future Internet Service is inherently a matter of secure software and systems

The context of the future internet services sets the scene in the sense that (1

speciï c service architectures will be used, that (2) new types of environments will be exploited, ranging from small embedded devices (â€oethingsâ€) to service in

-frastructures and platform in the cloud, and (3) a broad range of programming technologies will be used to develop the actual software and systems

The search for security support in programming environments has to take this context in account.

and composing services from preexisting building blocks (services and more tra -ditional components), as well as programming new services from scratch using

a state-of-the-art programming language. The service creation context will typ -ically aim for techniques and technologies that support compile

-nisms such as authentication or audit services. Otherwise, the provisioning of the underpinning security mechanisms and services (e g. supporting mutual non

repudiation, attribute based authorization in a cloud platform etc. will be re -quired as well for many of the typical FI service environments.

Next we further elaborate on the needs and the objectives of community wide research activities

Future Internet services and applications will be composed of several services created and hosted by various organizations and providers), each with its own

both services and content, and a complexity of implicit and explicit relations among the participants

fulï l these requirements based on the available services. In addition to complying with the requested functional and quality-of-service-related characteristics, com

of those services being composed. The research community needs to consider the cases where only partial or inadequate information on the services is available

so that the composition will have to ï nd compliant candidates or uncover the underspeciï ed functionality

Engineering Secure Future Internet Services 185 enabling deployment, access, discovery and composition of pervasive services

oï €ered by resource-constrained nodes 4. 2 Secure Service Programming Many security vulnerabilities arise from programming errors that allow an ex

enable highly concurrent services of the Future Internet, and will improve anal -ysis and veriï cation techniques to verify, among others, adherence to program

enforcement techniques that are triggered by built-in security services and by realistic in the FI setting, must address the challenge of complex interactions and

Supporting Security Assurance for FI Services. Assurance will play a central role in the development of software based services to provide conï dence

about the desired security level. Assurance must be treated in a holistic manner as an integral constituent of the development process, seamlessly informing and

Obviously the security support in programming environments that must be delivered will be essential to incept a transverse methodology that

Engineering secure Future Internet services demands for at least two traversal issues, security assurance and risk and cost management during SDLC

services to ensure conï dence about their trustworthiness. Our core goal is to incept a transverse methodology that enables to manage assurance throughout

Engineering Secure Future Internet Services 187 secure protocols, services, and systems. This involves the deï nition of suitable

service and component abstractions (e g.,, secure channels) and the setup of the corresponding reasoning infrastructure (e g.,

-mand of models and techniques to allow the formal analysis of secure services The objective is to develop methodologies, based on formal mappings from the

the integration of services, access control policies or speciï c attacks. Moreover implementations can be monitored at run-time to ensure that they satisfy the

systems of FI services. We need comprehensive assurance techniques in order to guarantee that security concerns are taken correctly into account through the

Service-oriented architectures demand for assurance indicators that can explicitly indicate the quality of protection of a service,

aware SDLC for secure FI services. Such a life cycle model aims to ensure the stakeholders†return of investment when implementing security measures during

various stages of the SDLC. We can envision several aspects of this kind of SDLC support (see also 4

Engineering Secure Future Internet Services 189 one needs to develop methods and techniques for the reï nement of risk analysis

of Future Internet services, one needs to focus on a modular approach to the analysis of risks and costs.

to service or component substitution, evolving environments, evolving security requirements, etc. both during system development and operation.

We have advocated in this paper the need and the opportunity for ï rmly es -tablishing a discipline for engineering secure Future Internet Services, typically

based on research in the areas of software engineering, security engineering and of service engineering. We have clariï ed why generic solutions that ignore the

characteristics of Future Internet services will fail: the peculiarities of FI services must be reï ected upon

and be addressed in the proposed and validated solution The various lines of research and the strands within each of research line have

Network of Excellence on Engineering Secure Future Internet Software Services and Systems) under the grant agreement n. 256980

Engineering Secure Future Internet Services 191 8. Dardenne, A.,van Lamsweerde, A.,Fickas, S.:Goal-directed requirements acqui

Enterprise Distributed Object Computing Conference, WASHINGTON DC, USA, p 253. IEEE Computer Society Press, Los Alamitos (2007

for preserving privacy in ubiquitous environments. In: Proc. of the Workshop on Ubiquitous Knowledge Discovery for Users at ECML/PKDD, pp. 51†64 (2006

Security services architecture for secure mobile grid systems. Journal of Systems Architecture. In Press (2010

-nal on Selected Areas in Communications 21 (1), 2003 (2003 25. Whittle, J.,Moreira, A.,Arauâ'jo, J.,Jayaraman, P.,Elkhodary, A m.,Rabbi, R

in the Internet of Services Roberto Carbone1, Marius Minea2, Sebastian Alexander Moâ dersheim3 Serena Elisa Ponta4, 5, Mathieu Turuani6,

Services will signiï cantly boost its development and public acceptance 1 Introduction The vision of the Internet of Services (Ios) entails a major paradigm shift in

the way ICT systems and applications are designed, implemented, deployed and consumed: they are no longer the result of programming components in the tra

-ditional meaning but are built by composing services that are distributed over the network and aggregated and consumed at run-time in a demand-driven, ï ex

-ible way. In the Ios, services are business functionalities that are designed and implemented by producers,

deployed by providers, aggregated by intermediaries and used by consumers. However, the new opportunities opened by the Ios will

only materialize if concepts, techniques and tools are provided to ensure secu -rity. Deploying services in future network infrastructures entails a wide range

of trust and security issues, but solving them is extremely hard since making the service components trustworthy is not suï cient:

composing services leads to new, subtle and dangerous, vulnerabilities due to interference between com -ponent services and policies, the shared communication layer, and application

functionality. Thus, one needs validation of both the service components and their composition into secure service architectures

production and consumption of already ï awed services Fortunately, a new generation of analyzers for automated security validation

that have been developed for the veriï cation of trust and security of services. In Section 4,

technology and run in diï €erent environments, yet interact and may interfere with each other 8 Such as model checking with constraints, approaches based on SAT (i e.,

Towards Formal Validation of Trust and Security in the Internet of Services 195 Second, SOAS are also distributed systems, with functionality and resources

and processed by services The security properties of SOAS are, moreover, very diverse. The classical

if the intruder cannot block the communication indeï nitely. This diversity of goals cannot be formulated with a ï xed repertoire of generic properties (like

-cated to specifying trust and security aspects of services, their composition, the properties that they should satisfy

context) with services that can be added and composed dynamically themselves As a concrete solution, in the AVANTSSAR project, we have deï ned a lan

9 The AVANTSSAR Platform allows users also to input their services by specifying them using the high-level formal speciï cation language ASLAN,

deï ned to be close to speciï cation languages for security protocols/services and to procedural and object-oriented programming languages.

Towards Formal Validation of Trust and Security in the Internet of Services 197 purposes, no agent can access both ï les f1 and f2.

the Internet of Services, the challenge of validating services and service-oriented applications cannot be addressed simply by scaling up the current generation of

-niques are required to automatically reason about services, their composition their required security properties and associated policies.

to consider the various ways in which component services can be coordinated and develop new techniques,

-presses the need for providing simple scenarios where already available services can be reused to derive new added-value services.

In their SOAP incarnation based on XML messaging and relying on a rich stack of related standards, SOAS

of automated solutions to scalable services composition. Two key approaches for composing web services have been considered, which diï €er by their architecture

orchestration is centralized and all traï c is routed through a mediator, whereas choreography is distributed and all web services can communicate directly

198 R. Carbone et al Several â€oeorchestration†notions have been advocated (see, e g.,, 20. How -ever, in inter-organizational business processes it is crucial to protect sensitive

representing the execution of the service under scrutiny in a hostile environment †enjoys the security properties speciï ed by a given formula.

-ing assumptions on the service and/or on its execution environment that prevent their applicability in some important cases.

that communication between honest principals is controlled by a Dolev-Yao in -truder 17, i e. a malicious agent capable to overhear,

In fact, services often rely on transport protocols enjoying some given security properties (e g. TLS is used often as a unilateral or

a bilateral communication authentic and/or conï dential channel), and it is thus important to develop model-checking techniques that support reasoning about

express complex security goals that services are expected to meet as well as assumptions on the security oï €ered by the communication channels

that provides a secure communication infrastructure between participants, e g. a virtual private network or a TLS 26 channel,

Towards Formal Validation of Trust and Security in the Internet of Services 199 of course, undesirable to verify the entire system as a whole:

over the same communication medium. Moreover, there are ï rst results for the layered compositional reasoning needed for SOAS,

if its communication is routed over a secure channel, and (iii) both satisfy certain suï cient conditions (their message formats do not interfere.

on Proverif 7, exploits abstract interpretation for veriï cation of web services that use SOAP messaging, using logical predicates to relate the concrete SOAP

-ments of a goal service and a description of the available services (including a speciï cation of their security-relevant behavior, possibly including the local

build an orchestration of the available services that meets the security require -ments stated in the policy.

available services in a way that is expected (but not yet guaranteed) to satisfy the input policy. It takes as input an ASLAN ï le with a speciï cation

of the available services and either a speciï cation of the client or a partial

speciï cation of the available services, a full speciï cation of the goal, and a

Towards Formal Validation of Trust and Security in the Internet of Services 201 Vu ln

services and provide the required corrections. Moreover, the formal modeling of case studies has allowed us to consolidate our speciï cation languages and has

The landscape of services that require validation of their security is very broad The validation is made more diï cult by the tension between the need for ï exibil

to implement and assess in such environments. To ease the analysis, it is neces -sary to factor out the access control policies and meta-policies from the possible

Within the AVANTSSAR project, services from a wide variety of applica -tion areas have been modeled: banking (loan origination), electronic commerce

Towards Formal Validation of Trust and Security in the Internet of Services 203 proï le and which are not.

user on Google Apps, granting unauthorized access to private data and services email, docs, etc..

Google†s customers updated their applications accordingly. The severity of the vulnerability has been rated High in a note issued by the National Institute of

of Services only if and when the available technologies will have migrated to in -dustry, as well as to standardization bodies (which are driven mostly by industry

to the SAP environment. Two valuable migration activities have been carried out by building contacts with core business units.

provider services fulï ll expected the security desiderata in the considered SAP relevant scenarios. This has included the evaluation of those conï gurations of the

in setting-up the NW-NGSSO services on customer production systems Besides this, the results triggered very valuable discussions in the steering

Towards Formal Validation of Trust and Security in the Internet of Services 205 there and helped SAP Research to better understand the vulnerability itself and

consumption of remote services. A scalability study has also been conducted on a loan origination process case study with a few security goals and on a more

complex aviation maintenance process (designed with 70 human activities. The performance analysis helped us to devise a number of optimizations (up to three

of dynamically composed services and their integration into complex SOAS by developing an integrated platform of automated reasoning techniques and tools

for web services. In: de Boer, F. S.,Bonsangue, M m.,, Graf, S.,de Roever, W.-P

Automatic Composition of Services with Security policies. In: Proceedings of Web Service Composition and Adaptation Workshop (held in conjunction with SCC/SERVICES-2008), pp. 529†537.

IEEE Computer Society Press, Los Alamitos (2008 12. Ciobaë ca, S.,Cortier, V.:Protocol composition for arbitrary primitives.

Towards Formal Validation of Trust and Security in the Internet of Services 207 17. Dolev, D.,Yao, A.:

Synthesis and Composition of Web Services. In: Bernardo M.,Padovani, L.,Zavattaro, G. eds. SFM 2009.

and Web Services with Databases. In: Proceedings of 17th ACM conference on Computer and Communications security (CCS 2010), pp. 351†360.

Web Services Business Process Execution Language vers. 2. 0 2007), http://docs. oasis-open. org/wsbpel/2. 0/OS/wsbpel-v2. 0-OS. pdf

aims to provide standardized services with self-service, pay-peruse, and seemingly unlimited scalability. This paradigm can be implemented on

multiple service levels (infrastructures, run-time platform, or actual Soft -ware as a Service. They are are expected to be an important component

This article introduces upcoming security challenges for cloud services such as multi-tenancy, transparency and establishing trust into correct

computing, data storage and network resources as well as higher level services In contrast to the current cloud market that is mainly characterized by isolated

-sources and services provided by multiple similar providers are seamlessly ac -cessed. Cloud computing goes beyond technological infrastructure that derives

by groups such as the DMTF Open Clouds Standards Incubator, the SNIA Cloud storage Technical Working group or the OGF Open Clouds Computing

According to the analyst enterprise Forrester research and their study â€oesecurity and the Cloud†17 the cloud security market is expected to grow to 1. 5 billion

3. a new range of providers oï €ering cloud security services to add external security to public clouds

at US government customers. Similarly, IBM has launched a FISMA compliant Federal Community Cloud in 2010

Following its software-plus-services strategy an -nounced in 2007, Microsoft has developed in the past years several Saas cloud

services such as the Business Productivity Online Suite (BPOS. While all of them may be delivered from a multi-tenant public cloud for the entry level

concerns-in particular in view of the needs of larger customers. In the same way the base security of Microsoft public cloud services is adapted to the targeted

market. Whereas Microsoft uses, e g.,, for the Oï ce Live Workspace-in analogy to what Google does with Gmail-unencrypted data transfer between the cloud

and the user, cloud services for more sensitive markets (such as Microsoft Health Vault) use SSL encryption by default

On the other hand commodity public cloud services such as the Amazon EC2 are still growing even though they oï €er only limited base security and largely

Here a prime target is the small to mid-size enterprise market Examples for supplementary services are threat surveillance (e g,.

, Alertlogic access-and identity management (e g.,, Novell, IBM), virtual private network -ing (e g.,, Amazon Virtual Private cloud), encryption (e g.,

encryption services) and web traï c ï ltering services (e g.,, Zscaler, Scansafe 2. 2 Today†s Datacenters as the Benchmark for the Cloud

Using technology always constitutes a certain risk. If the IT of any given business failed, the consequences for most of today†s enterprises would be severe.

Even if multiple lines of defense are used (e g.,, ï rewalls, intrusion defense, and protection of each host), all systems usually contain errors that can be exploited found and

upgrades and patches, quick procurement services, avoidance of vendor lock ins and legacy modernization 18. Many cloudsourcers oï €er bundles of consulting

services, application development, migration, and management 14. A problem that remains with this new stage of IT-outsourcing strategies is that the client

emergence of new business opportunities and business models will fail on this 212 R. Glott et al

we believe that today†s datacenters are the benchmark for new cloud deploy -ments. Overall, the beneï ts need to outweigh the potential disadvantages and

such as 98%availability) will allow enterprises to pick workloads that do not require higher guarantees.

not allow enterprises to make such risk management decisions and thus will only allow hosting of uncritical workloads on the cloud

enterprises: The ï rst is that with respect to security and trust, new solutions such as the cloud or cloud-of-clouds will be compared

existing solutions such as enterprise or outsourced datacenters. The second is that in order to allow migration of critical workloads to the cloud, cloud providers

must enable enterprises to integrate cloud infrastructures into their overall risk management. We will use these requirements in our subsequent arguments

3. 1 Isolation Breach between Multiple Customers Cloud environments aim at eï ciencies of scale by increased sharing resources

between multiple customers. As a consequence, data leakage and service disrup -tions gain importance and may propagate through such shared resources.

An important requirement is that data cannot leak between customers and that malfunction or misbehavior by one customer must not lead to violations of the

service-level agreement of other customers Fig. 2. Multi-tenancy at Multiple Levels 25 Traditional enterprise outsourcing ensures the so-called â€oemulti-tenant isolationâ€

through dedicated infrastructure for each individual customer and data wiping before reuse. Sharing of resources and multi-tenant isolation can be implemented

on diï €erent levels of abstraction (see Figure 2). Coarse-grained mechanisms such as shared datacenters, hosts,

these instances cannot be accessed by other customers. Note that in practice these mechanisms are mixed often: While an enterprise customer may own a vir

-tual machine (Machine-level isolation), this machine may use a database server Middleware isolation) and provide services to multiple individual departments

Application isolation In order to mitigate this risk in a cloud computing environment, multi-tenant isolation ensures customer isolation.

A principle to structure isolation manage -ment is One way to implement such isolation is labeling and ï ow control

that no unauthorized data ï ow occurs between customers. To limit ï ow control, mechanisms such as access control that ensures that machines and

customers can be used Actual systems then need to implement this principle for all shared resources 4

-trializing the production of IT services through complete end-to-end automation This means that once errors occur in such complex and automated systems, man

clouds are built often using low-cost commodity hardware that fails (relatively often. This leads to frequent failures of machines that may also include a subset

cloud environment or recover from software and hardware failures For building such resilient systems, important tools are data replication

â€oeblack-box†approach to cloud computing where customers cannot obtain in -sight on or evidence of correct cloud operations.

best foster trust of customers into correct operation of the cloud infrastructure While partial solutions exist as outlined below,

This is common for free services today. An improvement to this approach is third-party audits. This approach

Customers can then be sure that the organization followed these standards at the time of certiï cation.

This will allow customers to automatically identify incidents and to analyze and react to such incidents

TCG) uses secure hardware to allow a stakeholder to perform attestation, i e.,, to obtain proof of the executables

Cloud services commonly rely on each other, since their structures may be based consecutively upon each other. Hence a computing cloud may use the services of a storage cloud.

Unlike local data centers residing in a single country, such cloud infrastructures often extend over

cloud scenarios is a matter of consequences for the use of these cloud services So to avoid unwanted disclosure of data, suï cient protection mechanisms need

in order to enable hosting of enterprise-class and critical systems on a cloud Customer Isolation and Information Flow.

A single notion of customers needs to be implemented across diï €erent systems Furthermore, data generated by systems need to be assigned to one or more

customers to enable access to critical data such as logs and monitoring data A particularly hard challenge will be to reduce the amount of covert and side

The third challenge is to allow customers to continue operating a secure environment. This means that security infrastruc

-ture and systems within the cloud such as intrusion detection, event handling and logging, virus scans,

-all security landscape for each individual customers. Depending on the type of systems, this can be achieved by providing more transparency (e g.,

In order to allow customers to †see†intrusions on the network within the cloud and correlate these intrusions with patterns in the

on an individual cloud, services will be obtained from and load balanced over multiple clouds. If this is done properly, services will no longer depend on the

availability of any individual cloud From a security perspective, this will raise new challenges. Customers need

to provide a consistent security state over multiple clouds and provide means to securely fail-over across multiple clouds.

Similarly, services will be composed from underlying services from other clouds. Without an accepted way to compose

services securely, such compositions would require validation of each individual service based on ï xed sub-services

Trustworthy Clouds Underpinning the Future Internet 219 5 Outlook †The Path Ahead Cloud computing is not new †it constitutes a new outsourcing delivery model

that aims to be closer to the vision of true utility computing. As such, it can rely

scale where many customers share one cloud and multiple clouds are networked and layered on top of each other.

Today, demand for cloud security has increased but the oï €ered security is still limited. We expect this to change

systems of the customers, and to limit the risks imposed by misbehaving cloud providers and their employees

8. Computer and Communication Industry Association (CCIA: Cloud comput -ing (2009), http://www. ccianet. org/CCIA/files/cclibraryfiles/Filename

Why not cloudsourcing for enterprise app user adoption/train -ing?( (2009), http://velocitymg. com/explorations/why-not-cloudsourcing

-for-enterprise-app-user-adoptiontraining /16. Organization for Economic Co-Operation and Development (OECD: Guidelines

Looking at the opportunity beyond the obstacle Forrester research (October 2010 18. Rajan, S. S.:Cloudsourcing vs outsourcing (2010), http://cloudcomputing

The vision of the Future Internet heralds a new environment where users, services and devices transparently and seamlessly exchange

mix of adaptation of existing technologies and business models, such as ï exible infrastructures and service compositions, distributed ownerships, and large-scale

services, applications) provided by the cloud, that are provisioned rapidly with a minimal management eï €ort and pay-peruse.

the world, ignoring borders, across multiple services, all in total transparency for the user However, this ideal cloud world raises concerns about privacy for individu

A second problem relates to the scalability of the sticky policy approach Clearly, the policy processing adds a relevant computational overhead.

A last issue relates to the privacy business model. The main question is: What should motivate the data collectors/processors to implement such technology

Actually, in many cases, their business model relies on the as-less-restricted-as -possible use of private data.

data, balancing the value of his personal data with the services obtained. As a matter of fact, users have diï culties to monetize the value of their personal

which mediate the communication and the handling of private data in the cloud platform. The schedule of the events,

which hosts one or more services/applications provided by external parties that deal with personal data (e g.,

Say, these services handle personal data using a PPL framework (as described in Sect. 2). In order to

Future Internet, enabling the seamless combination of services across platforms geographies, businesses and transparently from the user point of view.

In particular, when personal data are consumed by multiple services possibly owned by diï €erent entities in diï €erent locations, the conditions of the

Enterprise privacy authorization language (EPAL 1. 1). IBM Research Report (2003 Data Usage Control in the future Internet Cloud 231

Economics of In -formation Security and Privacy, pp. 121†167. Springer, New york (2010 4. Bussard, L.,Neven, G.,Preiss, F. S.:

Platform for enterprise privacy practices Privacy-enabled management of customer data. In: Dingledine, R.,Syverson, P. F

Economics of Information security, Advances in Information security, vol. 12, pp 129†142. Springer, New york (2004 10.

-search into future networks and services. This environment enables both incremental and disruptive approaches, supports multi-disciplinary research that goes beyond

network layers, scholastic dogmas and public-private discussions. It provides a core infrastructure, and also a playground for future discoveries and innovations, combin

-tation with its national and international stakeholder groups requires community and cohesion building, information sharing,

and common efforts in order to offer customers the best possible service and en -sure their sustainability beyond project lifetimes

Environment of Panlab†reports on experiments needing to directly interact with the environment during runtime,

and introduced requirements and solutions for a signifi -cant upgrade of the federated testbed environment that was used.

The chapter by Zseby et al. entitled â€oemultipath Routing Experiments in Federated Testbeds†demon -strates the practical usefulness of federation and virtualisation in heterogeneous testbeds

they would be not have been possible without the ability to create environments across multiple administrative domains using the concepts of federation, in particular their

Environment of Panlab Christos Tranoris, Pierpaolo Giacomin, and Spyros Denazis Electrical and Computer engineering department, University of Patras

and services for broad testing and experimentation purposes. In this context, Panlab defines a provisioning framework

distributed testbeds to provide services to customers for various kinds of testing sce -narios which in Panlab terminology are called Virtual Customer Testbeds or simply

testing specifications of new technologies, products, services, ii) execution of network 238 C. Tranoris, P. Giacomin, and S. Denazis

A Web portal is available where customers and providers can access ser -vices, a visual Creation Environment which is called â€oevirtual Customer Testbed

VCT) tool†where a customer can define requested services, a repository which keeps all persistent information like resources, partners, defined VCTS, etc.

Experi -menters can browse through the resource registry content and can select, configure deploy and access reserved resources.

for orchestrating the provisioning of the requested services. The above components interact with each other in order to offer a service called â€oeteagleâ€.

moving a designed algorithm from a simulating environment to near production best -effort environment and ii) to exploit the framework in such a way that will allow the

system under test to directly request or release resources that it uses. The latter indi -cates that the experiment needs access to the whole framework after the provisioning

like RUBIS benchmark 3, an auction site prototype modeled after ebay. com. It provides a virtualized distributed application that consists of three components, a web

Furthermore it can be deployed in a virtualized environment using Xen server technology, which allows regulating system resources such as CPU

generators on demand 3 Technical Environment, Testbed Implementation and Deployment From the requirements of the use case, it is evident that it would benefit from a test

-bed offering RUBIS resources. Moreover, the experiment needs to manage and moni -tor resources within the C algorithm.

access VCT requested resources through the Panlab office services during operation of testing. It is quite easy to embed it into your application/SUT in order to gain con

in order to manage and configure various environment parameters or to get status of the resources Fig. 5. Designing the algorithm to operate resources during execution

the designed algorithms from simulating environments to near production environ -ments. What is really attractive is that such algorithms can be tested in a best-effort

environment with real connectivity issues that cannot be performed easily in simula -tion environments. The presented use case example demonstrated the usage of exist

-ing experimental facilities in this case by exploiting the Panlab framework. The inter -esting of this experiment is that it extends the framework to allow the system under

from simulating environments to near production environments. Using the existing deployed RUBIS facility makes the setup and scaling up of such a testbed much easier

hosting the RUBIS environment. We expect to make more resources available as demand increases Acknowledgments.

The work presented in this paper has been performed during PII a Seventh Framework Program (FP7) project funded by EU

The number of stakeholders who partici -pate in provisioning of network and services is growing.

More demanding applications (like egovernment, ehealth, critical and emergency infras -tructures) are on the rise.

-verse demands, are likely to stay or even increase in the Internet of the future.

In such an environment federation and virtualization of resources are key features that should be supported in a future Internet.

that the growing demands will push towards a much better measurement instrumentation of the future Internet.

-erated environments with measurement functions, federation has also further challenges. The control and veriï cation of service level agreements (SLAS) be

stakeholders can help to provide incentives for cooperation Although the concepts of Routing Slices and multipath routing slices are

Tests in labs suï €er from scalability limits since physical distances and the number of resources are limited.

-sults by experiments in large-scale highly distributed environments and under real network conditions The experimental facilities as provide by the the European FIRE program 1

scalability features (e g. large distances between entities) and allows the use of special equipment and features that are only available in speciï c testbeds.

Alternative multipath transport services in future federated networks might em -ploy concurrent or consecutive packet transmission.

generate a much better controllable environment. We can install and use arbitrary software on the G-Lab nodes.

and tool database and measurement services, the employed packet tracking ser -vice 18, Tophat 9,

GENI-Global Environment for Network Innovations (2006 Information available at http://www. geni. net /11.

IEEE Communications Surveys 2 (1)( 1999), http://www. comsoc. org/pubs /surveys/1q99issue/psounis. html

Computer Communication Review 35 (5), 71†74 (2005 20. Phuoc Tran-Gia. G-Lab: A Future Generation Internet Research Platform (2008

Future Internet Environment Apostolos Kousaridas1, George Katsikas1, Nancy Alonistioti1, Esa Piri2 Marko Palola2, and Jussi Makinen3

network environment. The monitoring and configuration capabilities that differ -ent administrative domains provide has been exploited in order to test network

cellular communications. The current challenge for the network management systems 260 A. Kousaridas et al is the reduction of human intervention in the fundamental management functions and

environment and exploiting monitoring and configuration capabilities that different administrative domains provide (i e. access network and service layer).

is shown in Fig. 1. The Wimax network environment consists of Airspan Micro -MAX base station (BS) 7

Octopus testbed at Oulu 4. The BS and SS operate in a laboratory environment with

Testing End-to-end Self management in a Wireless Future Internet Environment 261 Fig. 1. Octopus testbed Wimax and Self-NET software federation

environments We implemented A BS control software (i e. NECM) to allow dynamically collect Wimax link information from the BS

For the test environment provisioning, the IP tunneling (IPIP) and routing was setup at both ends,

Testing End-to-end Self management in a Wireless Future Internet Environment 263 Fig. 3. Network topology and IPIP tunneling

Testing End-to-end Self management in a Wireless Future Internet Environment 265 Fig. 4. Decision-making algorithm for configuration action selection †Simple

Testing End-to-end Self management in a Wireless Future Internet Environment 267 increase rate is not linear

Testing End-to-end Self management in a Wireless Future Internet Environment 269 Table 6. Qos features improvement after partial (70%)Voip codec change from G. 711.1 to

the Octopus wireless network environment prove both the feasibility of the proposed architecture and the Qos improvement (e g.,

provide a wireless link as a bookable resource for a large set of customers, the estab

Scalability issues and interac -tions with other network management tasks is part of our future work

An experimental path towards Self management for Future Internet Environments. In Tselentis, G.,Galis, A.,Gavras, A.,Krco, S.,Lotz, V.,Simperl, E.,Stiller, B. eds.

universal means for communication and computation, there are still many unsolved problems and challenges some of which have basic aspects.

and the services that use it. In addition, the ossification of the Internet makes the in

-troduction and deployment of new network technologies and services very difficult and very costly The aspects,

•Mobility of networks, services, and devices •Guaranteeing availability of services according to Service Level Agreements (SLAS

and high-level objectives •Facilities to support Quality of Service (Qos) and Service Level Agreements (SLAS

•Facilities for the large scale provisioning and deployment of both services and management, with support for higher integration between services and networks

•Facilities for the addition of new functionality, including the capability for activat -ing a new service on-demand, network functionality,

or protocol (i e. addressing the ossification bottleneck •Support of security, reliability, robustness, mobility, context, service support, or

-chestration and management for both the communication resources and the ser -vices†resources •Support of socioeconomic aspects including the need for appropriate incentives

diverse business models, legal, regulative and governance issues •Energy awareness The content of this book includes three chapters covering some of the above research

adapted to changing environments, and; learn the desired behaviour over time. As self-organizing and self-managing systems have a considerable market impact, we

-zation and combined provisioning of different infrastructure resources and services that include both network and IT resources.

Demands become more and more spo -radic and variable, making dynamic provisioning highly needed As a huge energy consumer, the Internet also needs to have energy-saving func

Applications critical for society and business or for real-time communication demand a highly reliable, robust,

needs to support sustainable business models, in order to drive innovation, competi -tion, and research. Combining optical network technology with Cloud technology is

advanced networks and IT managed services integrated with the vanilla Internet will ensure a sustainable Future Internet,

Dept. of Informatics and Communications, 15784, Panepistimiopolis, Ilissia, Athens, Greece nancy@di. uoa. gr Abstract.

be adapted dynamically to changing environments, and; learn the desired behaviour over time, based on the original context of the Self-NET

to innovative services requiring greater mobility and bandwidth, higher speeds and improved interactivity through the launch of many interactive media-and content

-thermore, the Internet underpins the whole global economy. The diversity and sheer number of applications and business models supported by the Internet have also

largely affected its nature and structure (3, 4 The Future Internet (FI) will not be â€oemore of the sameâ€, but rather â€oeappropriate

classes of applications and related business models 5. If today†s Internet is a crucial element of our economy, FI will play an even more vital role in every conceivable

business process. It will become the productivity tool â€oepar excellenceâ€. At present there are many so called â€oefuture Internet†initiatives around the world working on

FI, bringing together large communities of stakeholders and expertise, requires a structured mechanism to avoid fragmentation of efforts

initiatives, in order to provide more potential options and/or opportunities for the market players involved. Europe remains an international force in advanced informa

-tion and communication technologies (ICT) and has adopted massively broadband and Internet services 8. The European union (EU) is actually a potential leader in

the FI sector 9. Leveraging FI technologies through their use in â€oesmart infrastruc -tures†offer the opportunity to boost European competitiveness in emerging technolo

-gies and systems, and will make it possible to measure, monitor and process huge volumes of information.

and to construct a related critical mass at European level, while fostering competition openness and standardisation, involving consumer/citizen,

services as guiding principles (10,11 1. 1 Autonomicity and Self management Features in Modern Network Design

as new services appear and become globally noteworthy, while market actors are adapting to these challenges through

suitable business models 12. The current Internet has been founded on a basic archi -tectural premise, that is: a simple network service can be used as a â€oeuniversal meansâ€

addressing, reachability, new demands on quality of service (Qos), ser -vice/application provisioning, etc..The next generation network architecture will be

-munication services will open many possibilities for innovative applications that are not even envisioned today.

services (i e.:cost, service-driven configuration, simplified services composi -tion over heterogeneous networks, large scale and dynamic multi-service coexistence

exposable service offerings/catalogues; monitoring; Service Level Agreements SLAS) and protocol support for bandwidth (dynamic resource allocation), latency

-by setting up and tearing down composed services, based on negotiated SLAS. This also involves benefits for service providers/consumers, in terms of:

reduced cost and time-to-market for services scalability of composed services, and; flexibility and independence from the underly

-ing network details In addition, a current trend for networks is that they are becoming service-aware

the design of networks and services is moving forward to include higher levels of automation, autonomicity, including self management.

Conversely, services them -selves are becoming network-aware. Networking-awareness means that services are executed and managed within network execution environments and that both services

and network resources can be managed uniformly in an integrated way. It is com -monly acknowledged that the FI should have enhanced a considerably network man

-ageability capability, and be an inseparable part of the network itself. Manageability of the current network typically resides in client stations and servers,

adapts dynamically to changing environments, and; learns the desired behaviour over time. The effective design of monitoring protocols so as to

Furthermore, the diversity of services as well as the underlying hardware and software resources comprise management issues highly

risks currently present in network environments request for immediate attention. This could be achieved by building trustworthy network environments to assure security

levels and manage threats in interoperable frameworks for autonomous monitoring 1. 2 The Vision of a Modern Self-Managing Network

i) Cross-domain management functions, for networks, services, content together with the design of cooperative systems providing integrated management

In such an evolving environment, it is required the network itself to help detect, di -agnose and repair failures,

-ing requirements and reduce the reliance on centrally planned services, especially if they are joined effectively with new network management techniques.

use these tools to guarantee Qos service in a period of exploding demand and rising

promising features and capabilities such as modularity and scalability, low cost, ro -bustness and adaptability. Some of the challenges for operators/service providers

include management (especially in self-organized wireless environments), resilience and robustness, automated re-allocation of resources, operations†abstractions in the

underlying infrastructure, Qos guarantees for bundled services and optimization of operational expenditures (OPEX Ubiquitous and self-organizing systems are not only disruptive technologies that

FI are increased reliability, enhanced services, more flexibility, and simplified opera -tion. The latter calls for including Network Management (NM) issues into the design

and ensure seamless service provisioning †even in case of services with high band -width requirements.

service capability across heterogeneous environments. Besides, the introduction of cognition in networks can contribute towards overcoming structural limitations of

-worked applications, business models, edge devices and infrastructures-so as to guarantee higher levels of scalability, mobility, flexibility, security, reliability and

Enhanced Network Self-Manageability in the Scope of Future Internet Development 283 robustness. Self-NET principle design is based on high autonomy of NES in order to

Cognitive capabilities can enable the perception of the NES environment and the decision upon the necessary action (e g. configuration, healing, protection measures

having as a main goal the efficient handling of complexity towards FI environments This, combined with the introduction of cognitive functionalities at all layers, can

-eration of different services that a communications network should offer and support this imposes a decisive challenge for any network operator involved, while implicat

-ers the desired services to its users. In many cases, the network operator is obliged to

network environment can ease network composition and network planning procedures and can ensure the automatic adaptation of networks/services to capabilities of the

network components Options for reduction of network operational cost: Any infrastructure that can per -form automated operational tasks to optimize its network efficiency and the quality of

service environment, to sustain high Qos, to recover from faults and to maximize the overall network performance, especially when congestion phenomena appear

end-users wish to have access to a network offering adequate coverage and services of high quality, on a real-time basis. Self management can offer decentralized monitor

management and support of an increased set of services/facilities offered Enabling effective networking under highly demanding conditions:

iv) Scalability in terms of features-functions;(v) Balance between cost network-related benefits (OPEX

complexity of communication networks, to reduce human intervention, and to pro -mote localized resource management.

In the proposed test-bed, a heterogeneous wireless network environment has been deployed, consisting of several IEEE 802.11 Soekris access points (AP) 33 and an

The NECM periodically monitored its internal state and local environment by measur -ing specific parameters,

are common to corporate environments and, especially to those that can occasionally host numerous nomadic end-users

The communication phase is responsible for Soekris 1 and Soekris 4 high delay. Specifically, both Soekris interact

The communication between NECMS increases the duration of the communication phase, while the duration of the execution phase is increased

due to technical and implementation reasons Fig. 5 presents the duration of the mobile terminal re-allocation function (vertical

communication phase takes again the majority of time The proposed test-bed has demonstrated that the inclusion of the MDE cognitive

Communication Phase 22.192 1. 711 2. 601 22.405 Monitor Phase 2. 760 2. 561 3. 137 2. 547

Decision Phase Communication Phase NDCM 0. 061 0. 733 Ti m e s ec Fig. 4. Vertical Assisted Handover Duration

for the disposal of a multiplicity of services-facilities with optimized quality levels intending to attract/satisfy end-users.

at a more distributed environment both in terms of management and operational ac -tivities. To this aim, cognitive networks with self-aware functionalities introduce a

Communication on â€oea Public-Private Partner -ship on the Future Internetâ€. European commission, Brussels (2009 2. Chochliouros,

Business models for Electronic Markets. The International Journal on Elec -tronic Markets and Business Media 8 (2), 3†8 (1998

Internet Business models and Strategies: Text and Cases Mcgraw-hill, New york (2000 6. European Future Internet portal (2010), http://www. future-internet. eu

Communication on â€oethe Future EU 2020 Strategyâ€. European commission, Brussels (2009 9. Tselentis, G.,Domingue, L.,Galis, A.,Gavras, A.,et al.:

for the Future of the Internet Economy. OECD, Paris, France (2008 11. Chochliouros, I. P.,Spiliopoulou, A s.:

Communication on â€oefuture Networks and the Internetâ€. European commission, Brussels (2008 13. Galis, A.,Brunner, M.,Abramowitz, H.:

A survey of autonomic communications ACM Trans. on Autonomous and Adaptive Systems (TAAS) 1 (2), 223†259 (2006

-shop on Modelling Autonomic Communications Environments (2006 25. Strassner, J.:Policy-Based Network Management. Morgan Kaufmann Publishers, San

First Report on Business Opportunities (2009 29. Miller, B.:The autonomic computing edge: Can you CHOP UP autonomic computing

Self-organization in Communication Networks: Principles and Design Paradigms. IEEE Communications Magazine 43 (7), 78†85 (2005

31. Mihailovic, A.,Chochliouros, I. P.,Georgiadou, E.,Spiliopoulou, A s.,et al.:Situation Aware Mechanisms for Cognitive Networks.

Redmax, Redline Communications: AN-100u/UX Single Sector Wireless Access Base Station User Manual (2008

network element will have embedded communication capabilities and several objects in a certain environment will be able to create a communication network.

Challenges such as the infrastructure coverage extension or the infrastructure capacity extension arise Opportunistic networking seems a promising solution to the problem of coverage

particular network services and accommodate new FI-enabled applications (requested in a specific location and time.

-tor designates the spectrum that will be used for the communication of the nodes of the ON (i e.,

or communication demand rises instantly and support is needed for successful handling Also, authors in 10 propose

observed radio environment, the node capabilities, the network operator policies and the user profiles, the outcome of this phase will be to decide

-ate the suitability, the detection of opportunities for ON establishment with respect to total nodes and potential radio paths should be taken into consideration as main in

lifetime to changing environment conditions (e g. context, operator†s policies, user profiles). ) In order to achieve this, after the successful completion of the creation

that will be designated by the network operator, for the communication of the nodes of the ON.

-Monitoring of radio environment parameters prior the creation of the ON Creation Maintenance -ON monitoring and

-based prototype has been developed which calculates the fitness function and informs 302 A. Georgakopoulos et al the system on the accepted and rejected nodes.

Network Environment (ONE) 14,15 An indicative network topology of 60 total participant nonmoving nodes is illus

-tional Conference on Computer Communications (2006 3. Rong, B.,Hafid, A.:A Distributed Relay Selection algorithm for Cooperative Multicast in

Computer Communications 31, 1763†1776 (2008 5. Verma, A.,Sawant, H.,Tan, J.:Selection and navigation of mobile sensor nodes using a

IEEE International Conference on Communication (2004 7. Han, S.,Xia, Y.:Optimal node-selection algorithm for parallel download in overlay con

combined provisioning of diï €erent infrastructure resources and services that include both network and IT resources.

Demands become more and more sporadic and variable, making dynamic provisioning highly needed. As a huge energy consumer, the Internet also needs to be energy

-nance) or for real-time communication demand a highly reliable, robust and secure Internet. Finally, the future Internet needs to support sus

-tainable business models, in order to drive innovation, competition, and research. Combining optical network technology with Cloud technology

is key to addressing the future Internet/Cloud challenges. In this con -J. Domingue et al. Eds.):

and IT managed services integrated with the vanilla Internet will ensure a sustainable future Internet/Cloud enabling demanding and ubiquitous

-ity to provide communication services to the ultimate consumers: enterprises or home/residential users. The Internet†s architecture assumes that routers are

stateless and the entire network is neutral. There is no control over the content and the network resources consumed by each user.

-sources to meet bursty demands. If the Internet†s architecture is redesigned not not only mission-critical or business applications in the Cloud will suï €er, but

services and application that require better control over the networking infras -tructure and its Qos properties

high-capacity network-connectivity services tightly bundled with IT resources The requirements for resource availability, Qos guarantee and energy eï ciency

the communication model oï €ered by the Internet may break the hope for fully-transparent remote access and outsourcing.

-tent services. IT and network should be provisioned in a coordinated way in the future Internet

-anisms to support the dynamic behavior of the services and applications Moreover, another important issue is that the popularity of content and ap

sporadic, seasonal or unpredictable demands 4. Make the network energy-aware: It is reported in the literature 10

5. Enable secured and reliable services: The network†s service outages and hostile hacks have received signiï cant attention lately due to society†s high

6. Develop a sustainable and strategic business model: Currently, the business models deployed by telecom operators are focused on selling services

on top of their infrastructures. In addition, operators cannot oï €er dynamic and smooth integration of diversiï ed resources and services (both IT and

network) at the provisioning phase. Network-infrastructure resources are not understood as a service within the value chain of IT service providers.

believe that a novel business model is necessary, which can fully integrate the network substrate with the IT resources into a single infrastructure.

addition, such business model will let operators oï €er their infrastructures as a service to third-party entities

In order to address the aforementioned challenges and opportunities, the pro -posed architecture introduces the three basic concepts featured by the future

-mental approach to enable the on-demand infrastructure services provision -ing with guaranteed performance and Qos, including manageable security

services †A new layered architecture for the Control and Management Plane that allows dynamic services composition and orchestration in the virtual infras

-tructures that can consistently address the manageability, energy-eï ciency and traï c-unpredictability issues

on-demand ï exible bandwidth allocation, hence addressing challenge#1. IT re -sources comprise another important category of future Internet shared resources

and enable advanced services including the concepts of Infrastructure-as-a-service (Iaas) and service-oriented network -ing 4. We aim to enable a ï exible infrastructure provisioning paradigm in terms

and provisioning dynamic security services to address challenge#5. Fig. 1 shows the reference model of our architecture as it

NIPS Network+IT Provisioning Services PIP Physical Infrastructure Provider SML Service Middleware Layer VI Virtual Infrastructure

3. 3 New Roles and Strategic Business model Given this virtualized network and IT architecture, new actors are emerging

-ing on-demand network services bundled with IT resources to meet challenge#2 New business relationships can be developed between Virtual IT Infrastructure

opportunities for all the diï €erent actors addressing challenge#6: infrastructure providers, infrastructure operators and application providers cooperate in a busi

-ness model where on-demand services are eï ciently oï €ered through the seamless provisioning of network and IT virtual resources

Enterprise Information system externally on a Cloud rented from a Software -as-a-Service (Saas) provider.

up and down) of services and load. It provides means to continuously moni -tor what the eï €ect of scaling will be on response time, performance, quality of

to contribute in a business model where complex services (e g.,, Cloud comput -ing) with complex attributes (e g.,

workï ow and all involved actors and services integration The VI life cycle starts with a VI request from the VIO,

-sioning Services (NIPS) through the on-demand and seamless provisioning of op -tical and IT resources.

enhanced transport network services (optionally combined with advance reser -vations), monitoring and cross-layer recovery.

-tivity services are tailored automatically to the cloud dynamics, allowing for an eï cient utilization of the underlying infrastructure.

+In anycast services the SML provides just a description of the required IT resources (e g. in terms

demands which need to be satisï ed by suitable IT resources (in a data center Note that we assume anycast routing,

random demand vectors for each demand size going from 5-up to 100 connections Bringing Optical Networks to the Cloud 319

and evaluate prototypes of the diï €erent software components creating and managing optical virtual in

Networks and IT Services. In: ICT Future Network and Mobile Summit 2011 Santander, Spain (June 2011

Services Part VI: Future Internet Areas: Services 323 Introduction The global economy can be characterised under three main sectors.

The primary sec -tor involves transforming natural resources into primary products which then form the raw materials for other industries1.

Examples of business in this area includes agricul -ture, fishing and mining. The secondary or industrial sector takes the output of the

The final sector is the tertiary or services sector where â€oein -tangible goods†or services are produced,

bought and consumed3. Service provision is seen as an economic activity where generally no transfer of ownership is associated

with the service itself and the benefits are associated with the buyers†willingness to pay. Public services are those where society pays through taxes and other means

motivation for services research both in the software industry and academia The Internet of Services is concerned with the creation of a layer within the Future

Internet which can support the service economy. Two overarching requirements influ -ence the scope and technical solutions created under the Internet of Services umbrella

Firstly, there is a need to support the needs of businesses in the area. Service oriented

solutions can enable new delivery channels and new business models for the services industrial sector The Future Internet will be comprised of a large number of heterogeneous compo

-nents and systems which need to be linked and integrated. For example, sensor net -works will be composed on adhoc collections of devices with low-level interfaces for

Thus, a second driving requirement for the Internet of Services is to provide a uniform conduit between the Future Internet architectural elements

•Architectural †within a new global communications infrastructure there is a need to determine how a service layer would fit into an overall Future Internet architecture

Here research focuses on describing services enabling automated 1 http://en. wikipedia. org/wiki/Primary sector of the economy

Services and semi-automated approaches to service discovery, composition, mediation and invocation •Cloud computing †definitions vary

software on-demand, from a shared pool, with minimal interaction or knowledge by users. Cloud services can be divided into three target audiences:

service providers software developers and users as follows6 ⠀ Infrastructure as a service †offering resources such as a virtual machine or

storage services ⠀ Platform as a service †providing services for software vendors such as a soft -ware development platform or a hosting service

⠀ Software as a service †offering applications, such as document processing or email to end-users Within this section we have three chapters

The ability to trade IT-services as an economic good is seen as a core feature of

the Internet of Services. In the chapter Butler et al. â€oeslas Empowering Services in the Future Internet†the authors discuss this in relation to Service Level Agreements

SLAS). ) In particular they claim a requirement for a holistic view of SLAS enabling their management through the whole service lifecycle:

Enterprise IT; ERP Hosting; Telco Service Ag -gregation; and egovernment Ontologies are shared formal descriptions of a shared viewpoint over a domain

and service layers in a new communications infrastructure. Within the chapter Santos et al. â€oemeeting Services and Networks in the future Internet†an ontology based ap

-proach is taken combined with a simplification of the network layer structure in order to facilitate network-service integration.

6 See http://www. internet-of-services. com/index. php? id=274&l=0 Part VI:

Services 325 Given the growing take-up of Linked Data for sharing information on the Web at

Services†discusses the relationship between Linked Data and the Internet of Services Specifically, the chapter outlines an approach which includes a lightweight ontology

SLAS Empowering Services in the future Internet1 Joe Butler1, Juan Lambea2, Michael Nolan1, Wolfgang Theilmann3 Francesco Torelli4, Ramin Yahyapour5, Annamaria Chiasera6, and Marco Pistore7

-oriented economy would require that IT-based services can be traded flexibly as economic good, i e. under well defined and dependable conditions and with

-dresses the management of services and their related SLAS through the com -plete service lifecycle, from engineering to decommissioning.

Especially IT supported services have become of major relevance in all industries and domains. The service paradigm is a core principle for the Future

Services, the paradigm equally applies to the Internet of things and the underlying technology cloud platform below. Cloud computing gained significant attention and

economy has highlighted key challenges and opportunities in IT-supported service provisioning. With more companies incorporating cloud based IT services as part of

1 The research leading to these results is supported partially by the European community's Seventh Framework Programme (FP7/2001-2013) under grant agreement nâ°216556

For a vivid IT service economy, better tools are necessary to support end-to-end SLA management for the complete service lifecy

We provide an approach that allows services to be described by service providers through formal template SLAS.

-cally, a service is dependent on many other services, e g. the offering of a software service requires infrastructure resources, software licenses or other software services

We propose an SLA management framework that offers a core element for manag -ing SLAS in the future Internet.

resources and services for the business value chain. The scientific challenges include the understanding and modelling of the relationships between SLA properties.

related to SLAS and services on the one hand, and to the specific domain (e g.,, busi -ness, software, and infrastructure) on the other

-proach in a variety of domains, namely ERP hosting, Enterprise IT, Service Aggrega -tion and egovernment.

Enterprise IT focuses on SLA-aware provisioning of compute platforms, man -aging decisions at provisioning time and runtime, as well as informing business plan

-ning. Service Aggregation demonstrates the aggregation of SLA-aware telecommuni -cation and third party web services:

how multi-party, multi-domain SLAS for aggre -gated services can best be offered to customers. egovernment validates the integra

-tion of human-based services with those that are based technology, showcasing the automated, dynamic SLA-driven selection, monitoring and adjustment of third-party

provisioned services SLAS Empowering Services in the future Internet 329 The remainder of this paper is organized as follows.

Chapter 2 introduces our ref -erence architecture for an SLA management framework. Chapter 3 discusses the

adoption of the framework, within the Future Internet but also in general System Management environments. Chapters 4-7 cover the respective use cases and evalua

-tion results and Chapter 8 concludes the overall discussion 2 Reference Architecture for SLA Management

The framework communicates to external parties, namely customers who (want to) consume services and 3rd party providers which the actual service provider might

rely upon. Relationships are defined by stereotyped dependencies that translate to specific sets of provided and required interfaces

Event Channels serve as a flexible communication infrastructure that allows the framework to collect information about the service instance status

SLAS Empowering Services in the future Internet 331 3. 1 Adoption Considerations for the Future Internet The SLA management framework architecture can easily be applied to different Fu

Things, to services in the Internet of Services, but also to describe people, knowledge and other resources.

Internet, a management environment consisting of SLA and Service Managers can be set up in different flavours.

needed according to the requirements of the involved value chain stakeholders in the respective Future Internet scenario.

The Enterprise IT use-case (Section 3) is basically an infrastructure cloud use case that features SLA enabling.

-agement (how fine-grained the decomposition of an IT stack into services and SLAS is done) and the requested accuracy of the monitoring (significantly impacts on the

-nents in multiple instances), the actual scalability in a target environment depends on the number of interrelations between different artefacts.

4 Use Case †Enterprise IT The Enterprise IT Use Case focuses on compute infrastructure provisioning in support

of Enterprise services. We assume a virtualisation-enabled data centre style configura -tion of server capacity,

and a broad range of services in terms of relative priority resource requirement and longevity. As a support service in most enterprises, IT is

expected to deliver application and data service support to other enterprise services and lines of business.

This brings varied expectations of availability, mean-time-to -recover, Quality of Service, transaction throughput capacity, etc.

A challenge for IT organisations in response to this is how to deliver a range of service levels at the most

SLAS Empowering Services in the future Internet 333 for efficiency, and longer term strategic issues such as infrastructure refresh (in the

titled â€oeprovisioningâ€, responds to the issue of efficient allocation of new services on IT infrastructure, SLA negotiation and provisioning of new services in the environ

-ment. The second scenario, â€oerun Timeâ€, deals with day-to-day, point in time opera -tional efficiency decisions within the environment.

These decisions maximise the value from the infrastructure investment. The final scenario, â€oeinvestment Govern -ance†builds on the first two to demonstrate how they feed back into future business

decisions. Taking a holistic cost view, it provides fine grained SLA based data to influence future investment decisions based on capital, security, compute power and

energy efficiency In order to enable realistic and effective reasoning at provisioning and run time, a reference is included differentiates each of the supported Enterprise services in terms

of their priority and criticality. This is the Enterprise Capability Framework or ECF From an implementation perspective, user interaction is via a web based UI, used

by both IT customers and administrators. The Enterprise IT SLAT defines use case specific agreement terms which are loaded by the Business SLA manager to provide

the inputs to provisioning requests in the form of Paas services. Software services could potentially be selected by choosing a virtual machine template

which contains pre-loaded applications, but software layer considerations are considered not core to this Use Case and are dealt more comprehensively with in the ERP Hosting Use Case

The Business SLA Manager passes service provisioning requests to the Infrastructure SLA Manager whose role is to carry out the creation of the new virtual machines

which constitute the service along with monitoring and reporting for that service Evaluation of the framework is carried out with reference to parameters which

objectives of an Enterprise IT function. Using Key Performance Indicators (KPIS) we evaluate the performance of the lab demonstrator in the areas of

•IT enabling the Enterprise •IT Efficiency •IT Investment/Technology adoption The Use Case identifies a hierarchy of KPIS

which are established measurable against baseline and therefore result in a credible assessment of the impact of the SLA Man

-agement Framework in an Enterprise IT context Further details on this use case are available at 6

The ERP Hosting use case is about the dynamic provisioning of hosted Enterprise Resource Planning solutions.

to providers and customers: Providers are enabled to offer hosted solutions in a very 334 J. Butler et al

-wards small and medium sized customers. Customers are enabled to steer their busi -ness in a more service-oriented and flexible manner that meets their business needs

without spending too much consideration ON IT matters. Furthermore, customers can flexibly negotiate the exact service details, in particular its service levels, so that they

can eventually get the best fitting service for their needs The actual use case realizes a scenario with 4 layers of services.

The top-level ser -vice considered is the so-called business solution. Such a solution typically consists of

-ing support conditions (standard or enterprise support), quality characteristics (usage profile and system responsiveness), and the final price for the end customer.

of requested services can be reduced significantly. The dependability of provided services is increased proportional to the number of formally managed service level

terms. The efficiency of service provisioning can be improved in the dimensions of environmental efficiency, resource efficiency,

SLAS Empowering Services in the future Internet 335 6 Use Case †Service Aggregation The main aim of the Service Aggregation use case is the service-enabling of core

Telco services and their addition with services from third parties (as Internet, infra -structure, media or content services.

From the provider†s point of view, they will be able to publish their services in the Service Aggregator

and will be benefited in terms of reach new markets in which their services can be consumed and to be sold to the

customers joined with reliable communication services offered by Telco providers Customers can find the services

and negotiate flexibly the terms of the consumption of the services included in the product.

It is necessary to point out that negotiation takes place in three faces: Bank Customer service Aggregator and Infrastructure

provider. This implies the negotiation of the SLAS with quality of service aspects and the final price

Bank customer prototype uses several framework components mainly interfaces with Business Manager and Busi -ness SLA Manager.

Service Aggregator and Infrastructure prototype have been im -plemented using business and infrastructure layers; additionally Service Aggregator

prototype is implemented using the top layer, business. Both providers utilize SLAT registries in their SLA Managers to publish the SLA templates of his services hierar

-chy. Business SLA template for SMS service includes some business terms like sup -port, termination or price and other guarantee terms like availability, throughput, and

Communication of SLA templates between third party and Service Aggregator use advertising bus to share infrastructure templates.

Customer prototype is connected with Busi -ness Manager of the Service Aggregator to find and discover products;

found the †Communications and Infrastructure bundle†product. Customer retrieves the different SLA templates available for the product and the negotiation starts.

nents that can be connected also in the use case are the monitors of the services (SMS

and Infrastructure services. To take care about the violations, track interfaces are used to connect the adjustment components in each SLA Manager.

In the new ecosystems of Future internet of services the key will be the exporting and interconnection of services between different parties.

It is necessary to care the service level agreements and the quality of the services guaranteed on those

SLAS. SLA-aware aggregation of telecommunications services introduces a business opportunity for the agile and efficient co-creation of new service offerings and sig

-nificant competitive advantages to all Further details on this use case including a demo video are available at 8

7 Use Case †egovernment Public administrations often outsource human based services to 3rd party organiza

-tions. Such relationships are regulated currently with legal documents and human readable SLAS. The egovernment use case aims at showing that the adoption of ma

several management activities also if the services are performed by humans In our proof of concept we considered a composed service allowing citizens to

health, mobile and contact services, as well as the expected overall satisfaction of the citizen. The SLA@SOI framework automates activities of the CSC that are usually

SLAS Empowering Services in the future Internet 337 From the technical point of view, one of the main challenges of this use case has

been the modelling of human-provided services, and the formalization of the strate -gies for handling human resources during negotiation and adjustment.

and winter in the delivery of the services considered in this use case. Extensions of the prediction model are under evaluation in order to cover new kinds of KPIS and

-vided services Further details on this use case are available at 9 8 Conclusions Service level agreements are a crucial element to support the emerging Future Internet

so that eventual services become a tradable, dependable good. The interdependencies of service level characteristics across layers and artefacts require a holistic view for

Managing on-demand busi -ness applications with hierarchical service level agreements. In: Berre, A j.,GÃ mez-PÃ rez

Enterprise IT Use Case http://sla-at-soi. eu/research/focus-areas/use-case-enterprise-it

/7. SLA@SOI project: ERP Hosting Use Case http://sla-at-soi. eu/research/focus-areas/use-case-erp-hosting

/Meeting Services and Networks in the future Internet Eduardo Santos1, Fabiola Pereira1, Joaëoeo Henrique Pereira2 Luiz Claâ'udio Theodoro1, Pedro Rosa1,

-tween services and networks by simplifying the network layers struc -ture and extending the ontology use.

to deal with semantics in the network communication, cross-layers, as alternative to the TCP IP protocol architecture.

Future Internet, Network Ontology, Post TCP IP, Services Introduction In recent years it has been remarkable the Internet advancement in throughput

and the development of diï €erent services and application features. Many of these are supported by the TCP IP protocols architecture, however, the intermediate

and with a few services support. Despite the development of the Internet and its wonderful ï exibility and adaptability, there were no signiï cant improvements

in its Network and Transport layers, resulting in a communication gap between layers 7, 8

Integration of services and networks is an emerging key feature in the future Internet and there are a lot of studies, proposals and discussions over questions

the communication between services and networks with semantics, disseminating the power of the meaning across the network layers

research which eliminates the Network and Transport layers, meeting services directly to the network lower layers.

meet the requirements of services in a ï exible and optimized way. For example the work in 6 shows how FINLAN can deal with the requirement of delivery

-ogy in computer networks to support the communication needs in a better way Another aspect that can be placed in the context of the Future Internet is the

In current networks, the semantic communication generally is limited to the Application layer and this layer is restricted to send

of the communication needs that the lower layers can better support, by the ontology use in this work,

has semantic communication, in OWL (Web Ontology Language), with its su -perior layer and the DL-Ontology layer.

It is responsible to support the services needs of the superior layer. The DL-Ontology layer has semantic communication

also using OWL, with the superior and the Net-Ontology layers. It is responsi -ble to support the Data link communication to guarantee the correct delivery

Meeting Services and Networks in the future Internet 341 of data transfer between links. The main diï €erence between these two layers

is that the Net-Ontology layer is responsible to support service needs beyond simple data transfers.

One application example is the services integration in heterogeneous environment to the devices mobility in 4g networks handovers

using the DOHAND (Domain Ontology for Handover. In the experimental use of the DOHAND, by Vanni in 17, the semantic possibilities for handover are reduced

the semantic communication between the DOHAND and the DL-Ontology layer for the handover in 4g networks

This work uses OWL as formal language for this communication, as the OWL was adopted by a considerable number of initiatives

these components and their communication with the network intermediate lay -ers can use OWL, instead of IP, UDP and TCP protocols.

>Meeting Services and Networks in the future Internet 343 This work shows how FINLAN can contribute with Future Internet researches

the class that represents all that can establish communication. For example: a service, a content, a network element and even a cloud computing

-sources which can cover heterogeneous networks and services like mobility, reli -ability, security and Qos.

-work communication used by the Autoi vcpi (Virtual Component Programming Interface) 13, allowing a localized monitoring and management of the virtual

By this, the FINLAN ontology layers can comprehend communication needs as the instantiation, remotion and modiï cation of virtual resources

this communication is showed bellow <owl: Individual rdf: about="&service; Component-1 "><rdf: type rdf: resource="&service;

Context Information Services Platform) needs. The context information in the FINLAN layers can act as an intermediate unity with its own semantic to reduce

Meeting Services and Networks in the future Internet 345 the number of interactions between the context sources and the context clients

services according to the ontology concepts in the following code, where the context Netcontext-1 is in the network element Virtualrouter-2 and the service

As the communication between the Autoi modules is done through UDP transactions or TCP connections, FINLAN can collaborate in

services that communicates with the Servicecloud Entity, which has need the of the information stored in the manifest requirement.

-work layers and the cross layers communication In the researches of service-centric, the FINLAN is placed to the level of

For example, to handle requests for services related to bandwidth storage, encryption, location, indexing and others Related to the content-centric it is presented in 19 the diï culties of the cur

Meeting Services and Networks in the future Internet 347 In this proposal, the objects Media, Rules, Behaviour, Relations and Charac

the communication process with the lower layers Through the FINLAN Net-Ontology layer, requirements such as Qos and

>3 Integration between Services and Networks This section describes how to integrate this project in collaboration with oth

evolution of TCP IP layers to increase the networks communication possibili -ties, is need a growing and can not be disregarded to the future of the Internet

needs for establishing communication through the ontological model adopted For the example described in 1. 2, to the service migration,

With the use of the FINLAN library this communication can be done replacing the IP and TCP protocols with the FINLAN representation using OWL over raw

layers of the networks in the future Internet, for the communication between the Service Enabler plane and the Management/Knowledge plane implemented

developed ontology, Services and Physical layers of the network. These layers are based on the formalization of the FINLAN concepts.

into Net-Ontology and DL-Ontology layers allowing the semantic communication and network behavior control

After the deï nitions of application requirements, the communication Fig. 4. Overview of FINLAN Library Implementation

Meeting Services and Networks in the future Internet 349 is ready to be established, and the data is sent through the layers also using raw

-ing of services and networks by approaching services semantically to the network structure. It was showed how to integrate FINLAN with Future Internet projects

and run performance and scalability experiments with diï €erent Future Internet projects open implementations. Further work also will do the extension of the

We strongly believe that meeting services and networks through the reduction of network layers and, consequently, through the decreasing of users, services and

content complexity is a possible way to achieve ï exibility in future networks Moreover, we expect that ontological approaches can help to build a Future

for Hybrid Communication in Local Networks. In: 8th International Information and Telecommunication Technologies Symposium (2009

Conference on Networking and Services, p. 32 (2010 7 Pereira, J. H. S.,Kofuji, S. T.,Rosa, P. F.:

in Networks and Services, in Press (2011 12 Rochwerger, B.,Galis, A.,Breitgand, D.,Levy, E.,Caâ'ceres, J.,Llorente, I.,Wolf

IEEE Global Communications Conference (2010 14 Rubio-Loyola, J.,Astorga, A.,Serrat, J.,Lefevre, L.,Cheniour, A.,Muldowney

-tion Proposal for Communication Structure in Local Networks. In: IEEE Inter -national Conference on Networking and Services, p. 18 (2010

17 Vanni, R. M. P.:Integracâ¸aëoeo de Servicâ¸os em Ambientes Heterogeë neos: uso de

Internet of Services John Domingue1, Carlos Pedrinaci1, Maria Maleshkova1, Barry Norton2, and Reto Krummenacher3 1 Knowledge Media Institute, The Open university, Walton Hall, Milton Keynes

Services which we have been exploring recently. The Internet of Services pro -vides a mechanism for combining elements of a Future Internet through stan

-dardized service interfaces at multiple levels of granularity. Linked Data is a lightweight mechanism for sharing data at web-scale which we believe can fa

Linked Data, Internet of Services, Linked Services 1 Introduction The Future Internet is a fairly recent EU initiative

The Internet of Services is seen as a core com -ponent of the Future Internet â€oethe Future Internet is polymorphic infrastructure, where the bounda

From an Internet of Services per -spective, Linked Data with its relatively simple formal representations and inbuilt

interoperability between services. In fact, the integration between services and Linked Data is increasingly gaining interest within industry and academia.

Examples include for instance, research on linking data from RESTFUL services by Alarcon et al. 3 work on exposing datasets behind Web APIS as Linked Data by Speiser et al. 4, and

Web APIS providing results from the Web of Data like Zemanta1 We see that there are possibilities for Linked Data to provide a common †glue†as

services descriptions are shared amongst the different roles involved in the provision aggregation, hosting and brokering of services.

In some sense service descriptions as and interlinked with, Linked Data is complementary to SAP€ s Unified Service De

-scription Language2 5, within their proposed Internet of Services framework3, as it provides appropriate means for exposing services and their relationships with provid

-ers, products and customers in a rich, yet simple manner which is tailored to its use at

Web scale In this paper we discuss the relationship between Linked Data and services based on our experiences in a number of projects.

Using what we have learnt thus far, at the end of the paper we propose a generalization of Linked Data and service principles

/2 http://www. internet-of-services. com/index. php? id=288&l=0 3 http://www. internet-of-services. com/index. php?

id=260&l=0 Fostering a Relationship between Linked Data and the Internet of Services 353

RDF (Resource Description Framework) is a simple data model for semantically describing resources on the Web.

3 Services on the Web Currently the world of services on the Web is marked by the formation of two main

groups of services. On the one hand, â€oeclassical†Web services, based on WSDL and SOAP, play a major role in the interoperability within and among enterprises.

Web services provide means for the development of open distributed systems, based on decoupled components, by overcoming heterogeneity

and enabling the publishing and consuming of functionalities of existing pieces of software. In particular, WSDL is

used to provide structured descriptions for services, operations and endpoints, while SOAP is used to wrap the XML messages exchanged between the service consumer

and provider. A large number of additional specifications such as WS-Addressing WS-Messaging and WS-Security complement the stack of technologies

On the other hand, an increasing number of popular Web and Web 2. 0 applications as offered by Facebook, Google,

-able Web APIS, also referred to as RESTFUL services (properly when conforming to the REST architectural principles 7). RESTFUL services are centred around re

-sources, which are interconnected by hyperlinks and grouped into collections, whose retrieval and manipulation is enabled through a fixed set of operations commonly

In contrast to WSDL-based services, Web APIS build upon a light technology stack relying almost entirely on the use of URIS, for both

The take up of both kinds of services is hampered, however by the amount of manual effort required

Research on Semantic web services 8 has focused on providing semantic descriptions of services so that tasks such as

the discovery, negotiation, composition and invocation of Web services can have a higher level of automation.

These techniques, originally targeted at WSDL services have highlighted a number of advantages and are currently being adapted towards

lighter and more scalable solutions covering Web APIS as well 8 http://backstage. bbc. co. uk

Fostering a Relationship between Linked Data and the Internet of Services 355 4 Linked Services

The advent of the Web of Data together with the rise of Web 2. 0 technologies and

ultimately lead to a widespread adoption of services on the Web. The vision toward the next wave of services, first introduced in 9 and depicted in Figure 1,

is based on two simple notions 1. Publishing service annotations within the Web of Data, and

2. Creating services for the Web of Data, i e.,, services that process Linked Data and/or generate Linked Data

We have devoted since then significant effort to refining the vision 10 and imple -menting diverse aspects of it such as the annotation of services and the publication of

services annotations as Linked Data 11,12, as well as on wrapping, and openly exposing, existing RESTFUL services as native Linked Data producers dubbed Linked

Open Services 13,14. It is worth noting in this respect that these approaches and techniques are different means contributing to the same vision

and are not to be con -sidered by any means the only possible approaches. What is essential though is ex

-ploiting the complementarity of services and the Web of Data through their integra -tion based on the two notions highlighted above

As can be seen in Figure 2 there are three main layers that we consider. At the bot

-tom are Legacy Services which are services which may be based WSDL or Web APIS, for which we provide in essence a Linked Data-oriented view over existing

functionality exposed as services. Legacy services could in this way be invoked, either Fig. 2. Services and the Web of Data

356 J. Domingue et al by interpreting their semantic annotations (see Section 4. 1) or by invoking dedi

-cated wrappers (see Section 4. 2) and RDF information could be obtained on de -mand. In this way, data from legacy systems, state of the art Web 2. 0 sites, or sen

-sors, which do not directly conform to Linked Data principles can easily be made available as Linked Data

The final layer in Figure 2 concerns services which are able to consume RDF data

-vice mashups 15 and RDF mash-ups 16 with the important difference that services are, in this case,

The use of services as the core abstraction for constructing Linked Data applications is therefore more generally applicable than that

4. 1 Implementing Linked Services with Linked Data-based Annotations One thread of our work on Linked Services is based on the use of Linked Data-based

descriptions of Linked Services allowing them to be published on the Web of Data and using these annotations for better supporting the discovery, composition and

invocation of Linked Services Our research there is based on the Minimal Service Model (MSM) 17, originally

introduced together with hrests 18 and WSMO-Lite 19, and slightly modified for the purposes of this work 12.

-ceptual models for services. The best-known approaches to annotating services se -mantically are OWL-S 20, WSMO 21, SAWSDL 22,

and WSMO-Lite for WSDL services, and Microwsmo 23, and SA-REST for Web APIS.

To cater for interoperability, MSM represents essentially the intersection of the structural parts of these formalisms.

Additionally, as opposed to most Semantic web services research to date, MSM supports both â€oeclassical†WSDL Web services, as well as a procedural

view on the increasing number of Web APIS and RESTFUL services, which appear to be preferred on the Web

Fostering a Relationship between Linked Data and the Internet of Services 357 Fig. 3. Conceptual model for services used by iserve

As it can be seen in Figure 3, MSM defines Services, which have a number of Op

-erations. Operations in turn have input, output and fault Messagecontent descrip -tions. Messagecontent may be composed of mandatory or optional Messageparts

The addition of message parts extends the earlier definition of the MSM as de -scribed in 18.

Similarly, the second tool, SOWER, assists users in the annotation of WSDL services and is based in this case on SAWSDL for adding links to semantic descriptions as

WSDL services described using heterogeneous formalisms. iserve is, to the best of our knowledge, the first system to publish web service descriptions on the Web of

that available for WSDL-based services. Thanks to its simplicity, the MSM captures the essence of services in a way that can support service matchmaking and invocation

and still remains largely compatible with the RDF mapping of WSDL, with WSMO -based descriptions of Web services, with OWL-S services,

and with services anno -tated according to WSMO-Lite and Microwsmo The essence of the approach followed by iserve is the use of import mechanisms

for a wide range of existing service description formalisms to automatically transform them into the MSM.

Once the services are transformed, service descriptions are ex -posed following the Linked Data principles and a range of advanced service analysis

services able to process or provide certain types of data, and other Web systems can

users ratings, tags and comments about services in a separate server. On the basis of

/Fostering a Relationship between Linked Data and the Internet of Services 359 In summary, the fundamental objective pursued by iserve is to provide a platform

-riched Services) is a platform for the easy consumption of services based on their semantic descriptions.

with services and the invocation process itself, via the generation of appropriate user interfaces. Based on the annotations the user is presented with a set of fields, which

Further tooling covering the composition of services as well as analysis of the exe -cution are also being developed as part of an integrated tool suite called SOA4ALL

-port for completing different tasks along the lifecycle of services, enabling the crea -tion of semantic service description, their discovery, composition, invocation and

4. 2 Services Which Produce and Consume Linked Data In this section we consider the relationship between service interactions and Linked

services should be implemented on top of Linked Data in order to become first class citizens of the quickly growing Linking Open Data Cloud.

view of the type of services which we consider. These services should take RDF as

input and the results should be available as RDF; i e.,, service consume Linked Data and

Within existing work on Semantic web Services, considerable effort is expended often in lifting from a syntactic description to a semantic representation and lowering from a

REST principles allows for re-exposing the wrappers as RESTFUL services so that the only required platform to interact with them is the Web (HTTP) itself

As a general motivation for our case, we consider the status quo of the services of

of these services, 21 uses the same languages and technologies in the implementation and description of services, communicated as the Linked Open Service (LOS) princi

-ples 14 encouraging the following •allowing RDF-encoded messages for input/output •reusing URIS from Linked Data source for representing features in input and output

relationship more useful as Linked Data, the approach of Linked Data Services LIDS) 25 is to URL-encode the input.

21 http://www. linkedopenservices. org/services/geo/geonames/weather /Fostering a Relationship between Linked Data and the Internet of Services 361

resource identifier. This URI is used then as the subject of such a triple, encoding the relationship to the output

In aligning LOS and LIDS principles, pursued via a Linked Services Wiki22 and a Linked Data and Services mailing list23,

a URI representing the input is returned using the standard Content-Location HTTP header field. Even in the case of a URL

Services so far concentrate on resource retrieval and therefore primarily the HTTP GET verb), in the standard REST style,

and query services offered at http://www. linkedopenservices. org/services LOS and LIDS also coincide on the idea of refining the general principles of

Linked Services communicated in Section 4, of describing accepted/expected mes -sages using SPARQL graph patterns.

While this is a design decision, it aims at the greatest familiarity and ease for Linked Data developers.

assemble a set of services whose results can be combined to satisfy the initial user request.

graph patterns are used for both the discovery of services, and then also reused in defining the dataflow between services within a process, defined again as SPARQL

CONSTRUCT queries. Work is ongoing on graph pattern-based discovery and proc -ess definition and execution

services in a machine readable fashion and enables service descriptions to be seam -lessly connected to other Linked Data.

how services should consume and produce Linked Data in order to become first-class Linked Data citizens From our work thus far, we see that integrating services with the Web of Data, as

depicted before, will give birth to a services ecosystem on top of Linked Data whereby developers will be able to collaboratively

and incrementally construct com -plex systems exploiting the Web of Data by reusing the results of others.

to the Internet of Services. That is, to scenarios where services sit within a generic Internet platform rather than on the Web.

These principles are Global unique naming and addressing scheme-services and resources con -sumed and produced by services should be subject to a global unique naming and

addressing scheme. This addressing scheme should be easily resolvable such that software clients are able to access easily underlying descriptions

Linking †linking between descriptions should be supported to facilitate the reuse of descriptions and to be able to specify relationships

-capsulated within services which should have a distinct endpoint available on the Internet, through which they can be invoked using standard protocols

Machine processability †the descriptions of the services and resources should be machine-processable. RDF (S) achieves this by having an underlying semantics and

Ideally, the inputs and outputs for services should be machine-processable as well Following from the above we believe that the Future Internet will benefit greatly

-ing throughout the new global communications platform which is emerging through the Future Internet work and also note that proposals already exist for integrating

the members of the STI Conceptual Models for Services Working group for their interesting feedback on this work

/Fostering a Relationship between Linked Data and the Internet of Services 363 Open Access. This article is distributed under the terms of the Creative Commons Attribution

Linking Data from RESTFUL Services. In: Workshop on Linked Data on the Web at WWW 2010 (2010

-guage for the Internet of Services: Requirements and First Developments. In: IEEE Int†l Conference on Services Computing, July 2010, pp. 602†609 (2010

6. Berners-Lee, T.:Linked Data-Design Issues (July 2006), http://www. w3. org /Designissues/Linkeddata. html

Semantic web Services. IEEE Intelligent Sys -tems 16 (2), 46†53 (2001 9. Pedrinaci, C.,Domingue, J.,Krummenacher, R.:

Services and the Web of Data: An Unex -ploited Symbiosis. In: AAAI Spring Symposium â€oelinked Data Meets Artificial Intelli

Toward The next Wave of Services: Linked Services for the Web of Data. Journal of Universal Computer science 16 (13), 1694†1719 (2010

11. Maleshkova, M.,Pedrinaci, C.,Domingue, J.:Supporting the creation of semantic REST -ful service descriptions.

Linked Services Publishing Platform. In: Workshop: Ontology Repositories and Editors for the Semantic web at ESWC (June 2010

Towards Linked Open Services and Processes In: Future Internet Symposium, October 2010, pp. 68†77

Services Mashups: The New Generation of Web Applications. IEEE Internet Computing 12 (5), 13†15 (2008

-tions of RESTFUL Services. In: Workshop: Beyond SAWSDL at OTM, November 2009 pp. 917†926 (2009

RESTFUL Web Services. In: IEEE/WIC/ACM Int†l Conference on Web Intelligence and In

WSMO-lite annotations for web services In: Bechhofer, S.,Hauswirth, M.,Hoffmann, J.,Koubarakis, M. eds.

Semantic Markup for Web Services. Technical Report, Member Submission, W3c (2004 21. Fensel, D.,Lausen, H.,Polleres, A.,de Bruijn, J.,Stollberg, M.,Roman, D.,Domingue, J

Enabling Semantic web Services-The Web Service Modeling Ontology. Springer, Hei -delberg (2006 22. Farrell, J.,Lausen, H.:

-tions of RESTFUL Services. In: Meersman, R.,Herrero, P.,Dillon, T. eds. OTM 2009 Workshops.

Towards Linked Data Services. In: Int†l Semantic web Conference Posters and Demonstrations (November 2010 26.

-sive environments including sensorial experiences beyond video and audio (engaging all the human senses including smell,

the networks and the provisioned services The objective of this section is to offer different views on the processes, techniques

Third, one of the areas where high investment in research has taken place in recent years is related to the multimedia and multimodal search and retrieval of multimedia

enabling every user †first †to access the offered multimedia services in various con

4 Multimedia Communication, Klagenfurt University, Austria christian. timmerer@itec. uni-klu. ac. at 5 PCN, Greece

6 VIOTECH Communications, France msidibe@viotech. net 7 Optibase Technologies Ltd, Israel Yaell@optibase. com

user first to access the offered multimedia services in various contexts, and second to share and deliver his own audiovisual content dynamically, seamlessly, and

content-awareness to the network environment, network-and user context -awareness to the service environment,

and adapted services/content to the end user for his best service experience possible, taking the role of a consumer

and/or producer Keywords: Future Internet, Multimedia Distribution, Content Awareness, Net -work Awareness, Content/Service Adaptation, Quality of Experience, Quality

of Services, Service Composition, Content-Aware Network 1 Introduction One of the objectives of the future communication networks is the provision of audio

-visual content in flexible ways and for different contexts, at various quality standards and associated price levels.

-to end Quality of Services, (i e. including content production, transport and distribu -tion) together with the possibility to evaluate

services while being able to take into account information regarding the trans -port/terminal contexts and adapt the services accordingly

Bringing together in a synergic way all the above factors, a new â€oemedia Ecosystem†is hence foreseen to arise, gathering a mass of not only existing but also new potential

new flexible business models have to be supported by the Media Ecosystem. Finally such a system can bring breakthrough opportunities in various domains such as com

-munication industry, education, culture and entertainment However, the traditional and current layered architectures do not include exchanges

-ity provision and profit, to allow sustainable new forms of multimedia communica -tions with an increasing importance in the future Internet

Network-Aware services/Applications (NAA) can be a way to overcome the tradi -tional architectures limitations.

needs of various service types), that is required for the future services and applica -tions 1-2. The new CAN/NAA concept no more supposes network neutrality, but

and adaptation-capable services This chapter will introduce and describe an advanced architecture and new func

-tionalities for efficient cooperation between entities of various environments so as to finally provide the end user with the best and most complete service experience via a

Media Ecosystem, aiming to provide content-awareness to the network environment network-and user context-awareness to the service environment, and adapted ser

-vices/content to the end user†s Environment 2 Background Numerous events and studies are dedicated currently to (re) define the directions

which the Future Internet development should follow. Among other issues, a higher coupling between application and network layers are investigated,

telecommunication services as described in 3. The strong orientation of user-centric awareness to services and content is emphasized in 4. The works 5-6 consider that

CAN/NAA can offer a way for evolution of networks beyond IP, while Qoe issues

These environments are •User Environment (UE), to which the end users belong •Service Environment (SE), to which the service and content providers belong

•Network Environment (NE), to which the network providers belong By Environment, it is understood a generic and comprehensive name to emphasize a

grouping of functions defined around the same functional goal and possibly spanning vertically, one or more several architectural (sub-)layers.

It characterizes a broader scope with respect to the term layer. By Service, if not specified differently, we un

-derstand here high level services, as seen at application/service layer 372 H. Koumaras et al

3. 1 Layered Architectural Model The ALICANTE architecture contains vertically several environments/layers and can

be spanned horizontally over multiple network domains The User Environment (UE) includes all functions related to the discovery, sub

-scription, consumption of the services by the EUS. At the Service Environment (SE the Service Provider (SP) entity is the main coordinator.

The architecture can support both synchronous communications or publish/subscribed ones. A novel type of ser

-vice registry with enhanced functionalities allows new services supporting a variety of use case scenarios.

Rich service composition in various ways is offered to EUS, open -ing them the role of SP/CP and manager.

users with advanced context-aware multimedia services in a consistent and interoper -able way. It enables uniform access for heterogeneous terminals and supports en

The Network Environment (NE) comprises the virtual CAN layer (on top) and the traditional network infrastructure layer (at the bottom.

services, based on advanced capabilities (1) for network level provisioning of re -sources in a content-aware fashion and (2) for applying reactive adaptation measures

ALICANTE€ s advanced concept provides adapted services/content to the end-user for her/his best service experience possible.

These parameters are gathered from every environment using dedicated user profile management and/or monitoring entities/subsystems

of services 12-13 Media Ecosystems: A Novel Approach for Content-Awareness in Future Networks 375

Scalability is achieved by largely avoiding per-flow signalling in the core part of the network. In the new architecture

the client-server communication style and also P2p (between HBS) style 376 H. Koumaras et al Additionally, powerful per-flow solutions (adaptation) can be applied in MANES

communications. In public traffic no security or privacy guarantees are enforced Secret content addresses content confidentiality and authentication by applying com

Private communications is to be adopted when the confidentiality and authenticity of the entire packets, includ

In this environment, the main business actors/entities envis -aged (as shown in Figure 3) are the following

-tent-aware services across a larger geographical span Content Provider (CP) gathers/creates, maintains and releases digital content by

by The CANP offers content-aware network services to the upper layer entities Service Provider (SP) is the ultimately ALICANTE business entity

-sponsible for the services offered to the end-user and may interact with NPS, and/or

multimedia services (e g.,, IPTV) in different modes (e g. P2p Content is offered to the CCS or SPS through quality guarantee schemes such as

multiple CPS and deliver services to CCS with higher quality. SPS may not own a transport infrastructure,

but rely on the connectivity services offered by Network Providers (NPS), or CAN Providers (CANP). The SPS are ultimately responsible for

service base and use the services of NPS, or CANPS, via appropriate SLAS. In ALI

Each of the previously described environments is present in today actual deploy -ments, but there is a profound limitation of collaboration among them.

-tion between entities of the various environments to provide the end-user with the best service experience while preserving the fundamental principle of network neutrality

-tion with their customers, etc..On the user side, it increases choice and reduces switching costs between content providers (network

level of choice in content and services by selecting, deploying, controlling and man -aging easy-to-use, affordable services and applications on service-enabled networks

Eventually the end user will have a choice of service access methods: anywhere, any -time and in any context with the appropriate awareness degree 1

i e. multiple NPS) could help distinguish competition in the service and network layers. Content and, most importantly, context awareness presents a possible option to

management of special services and best-effort services separately. Last and not least user privacy is a major concern

Network Environments. ALICANTE, No248652 (last accessed: March 2011)( 2011 http://www. ict-alicante. eu /2. Borcoci, E.,Negru, D.,Timmerer, C.:

User-Centric Future Internet and Telecommunication Services. In: Tselentis G.,et al. eds.)) Towards the Future Internet, pp. 217†226.

Future Internet=Content+Services+Management. IEEE Com -munications Magazine 47 (7), 27†33 (2009 5. Zahariadis, T.,et al.:

-communications, Marrakech, Morocco, Jul. 2009, pp. 196†201 (2009 7. Liberal, F.,et al.:Qoe and*-awareness in the future Internet.

IEEE Communications Magazine 45 (1), 84†90 (2007 9. Baker, N.:Context-Aware Systems and Implications for Future Internet.

IEEE Communications Magazine 47 (7), 20†26 (2009 12. Levis, P.,et al.:The Meta-Qos-Class Concept:

Services. Proc. IEEE, Softcom, Oct. 2004 (2004 13. Paris Flegkas, et al. Provisioning for Interdomain Quality of Service:

IEEE Communications Magazine (June 2005 14. Timmerer, C.,et al.:Scalable Video Coding in Content-Aware Networks:

-cient and personalized way through dynamic and heterogeneous environments in Future Internet. Scalable Video Coding (SVC) and Multiple Description

-neous environments. Multimedia content over internet are becoming a well-liked application due to users'growing demand of multimedia content and extraordinary

growth of network technologies. A broad assortment of such applications can be found in these days, e g. as video streaming, video conferencing, surveillance, broad

in academic and industrial environments. With respect to conventional approaches, a major advantage in using P2p is that each peer involved in a content delivery contrib

In order to handle such obscurity, scalability emerged in the field of video coding in the form of Scalable Video Coding (SVC) 1†4 and Multiple Description Coding

of the scalability options, the SVC scheme allows flexibility and adaptability of video transmission over resource-constrained networks

limited support for scalability, the use of scalability in these solutions came at the significant increase in the decoder complexity and/or loss in coding efficiency.

-tion when scalability is sought, compared to the previous video coding standards The scalability is required usually in three different directions (and their combina

-tions). ) We define these directions of scalability as follows •Temporal scalability refers to the possibility of reducing the temporal resolution of

encoded video directly from the compressed bit-stream, i e. number of frames con -tained in one second of the video

•Spatial scalability refers to the possibility of reducing the spatial resolution of the encoded video directly from the compressed bit-stream,

i e. number of pixels per spatial region in a video frame •Quality scalability, or commonly called SNR (Signal-to-noise-Ratio) scalability

or fidelity scalability, refers to the possibility of reducing the quality of the en -coded video.

This is achieved by extraction and decoding of coarsely quantised pixels from the compressed bit-stream

Fig. 1. A typical scalable video coding chain and types of scalabilities by going to lower-rate

decoding An example of basic scalabilities is illustrated in Figure 1, which shows a typical SVC

encoding, extraction and decoding chain. The video is encoded at the highest spatio -temporal resolution and quality.

reduction when scalability is sought, compared to the previous video coding standards 4. According to evaluations done by MPEG, SVC based on H. 264/MPEG-4 AVC

H. 264/AVC and also employs some other new techniques to provide scalability and to improve coding efficiency.

It provides temporal, spatial and quality scalability with a low increase of bit-rate relative to the single layer H. 264/MPEG-4 AVC

Temporal scalability can be activated by using hierarchical prediction structures. Spatial scalability is obtained using the multi-layer coding approach

Within each spatial layer, single-layer coding techniques are employed. Moreover inter-layer prediction mechanisms are utilized to further improve the coding effi

Quality scalability is provided using the coarse-grain quality scalability (CGS and medium-grain quality scalability (MGS.

CGS is achieved by requantization of the residual signal in the enhancement layer, while MGS is enabled by distributing the

All these three scalabilities can be combined into one scalable bit-stream that allows for extraction of different operation points of the video

the basis for spatial and temporal scalability. The ST decomposition results in two distinctive types of data:

-ity scalability. Finally, the resulting data are mapped into the scalable stream in the Scalable and Adaptable Media Coding Techniques for Future Internet 385

-pendent decodable sub-bitstreams by exploiting the scalability features of SVC. Each sub-bitstream is called â€oedescriptionâ€.

-bustness and scalability to media streaming over heterogeneous networks. The amal -gamation of SVC/MDC and P2p are likely to accomplish some of the Future Media

to facilitate future media applications and services, functioning under assorted and vibrant environments while maximizing not only Quality of Service (Qos) but also

Quality of Experience (Qoe) of the users. At last, we persuade Future Internet initia -tives to take into contemplation these techniques when defining new protocols for

ground-breaking services and applications Acknowledgement. This research has been funded partially by the European Com -mission under contract FP7-248474 SARACEN

Advanced video coding for generic audiovisual services, ITU -T Recommendation H. 264 and ISO/IEC 14496-10 (MPEG-4 AVC

sectors of the economy including the service sectors, and in social networks. Research on the Future Internet therefore includes the development, piloting and validation of

opportunities provided by Future Internet technologies in various business and socie -tal sectors and how these opportunities could be realized through open innovation

models One of the key developments is towards smart enterprises and collaborative enter -prise networks.

Enterprises of the future are envisioned to be ever more open, creative and sustainable; they will become â€oesmart enterprisesâ€.

Innovation lies at the core of smart enterprises and includes not only products, services and processes but also the

organizational model and full set of relations that comprise the enterprise†s value network. The Future Internet should provide enterprises a new set of capabilities

enabling them to innovate through flexibility and diversity in experimenting with new business values, models, structures and arrangements.

-tion of enterprise systems comprising applications and services are expected to emerge, fine-tuned to the needs of enterprise users by leveraging a basic infrastructure

of utility-like software services High-value Future Internet applications are also foreseen in the domain of living

healthcare, and energy. â€oesmart Living†is one of the areas where the focus lies clearly

on the human user, and encompasses the combination of technologies in areas such as smart content, personal networks and ubiquitous services, to provide the user a simpler

easier and enriched life across many domains including home life, education and learn -ing, working,

-ing the provision of assisted living services for the elderly and handicapped, and also to

One of the key developments in this respect is the use of advanced communication and computing infrastructure as part of the Smart Grid.

In such urban environments, people, companies and public authorities experience specific needs and demands regarding domains such as healthcare, media, energy and

the environment, safety, and public services. These domains are enabled increasingly and facilitated by Internet-based applications and infrastructures based on common

platforms. Therefore, cities and urban environments are facing challenges to maintain and upgrade the required infrastructures

and establish efficient, effective, open and participative innovation processes to jointly create the innovative applications that meet

the demands of their citizens. In this context, cities and urban areas represent a critical mass when it comes to shaping the demand for advanced Internet-based services.

The â€oeliving labs†approach which comprises open and user driven innovation in large-scale real-life settings opens up a promising opportunity to enrich the experimentally-driven

research approach as currently adopted in the future Internet community The four chapters in the Application Areas part of this book illustrate the develop

-ments and opportunities mentioned. The first chapter â€oefuture Internet Enterprise Sys -tems: a Flexible Architectural Approach for Innovation†discusses how emerging

paradigms, such as Cloud computing and Software-as-a-service are opening up a significant transformation process for enterprise systems.

This transformation arises from commoditization of the traditional enterprise system functions and is accelerated by new and innovative development methods and architectures of Future Internet

Enterprise Systems. The chapter foresees a rich, complex, articulated digital world reflecting the real business world,

where computational elements referred to as Future Internet Enterprise Resources will directly act and evolve according to what exists in

the real world The chapter â€oerenewable Energy Provisioning for ICT Services in a Future Inter -net†discusses the Greenstar Network (GSN), of the first worldwide initiatives for

provisioning ICT services that are entirely based on renewable energy such as solar wind and hydroelectricity across Canada and around the world.

GSN is developed to dynamically transport user services to be processed in data centers built in proximity to green energy sources, thereby reducing greenhouse gas emissions of ICT equip

-ments. While current approaches mainly focus on reducing energy consumption at the micro-level through energy efficiency improvements, the proposed approach is much

and focuses on heavy computing services dedicated to data centers powered com -pletely by green energy, from a large abundant reserve of natural resources in Canada

-works for Open Innovation†elaborates the concept of â€oesmart cities†as environments of open and user driven innovation for experimenting

-enabled services. The chapter describes how the living labs concept has started to fulfill a role in the development of cities towards becoming â€oesmartâ€.

the opportunities of services enabled by the Future Internet for smart cities, there is a need to clarify the way how living lab innovation methods, user communities and Fu

-vation environments, to achieve ambitious city development goals. This approach re -quires sustainable partnerships and cooperation strategies among the main stakeholders

The fourth chapter â€oesmart Cities at the forefront of the Future Internet†presents an example of city-scale platform architecture for utilizing innovative Internet of things

-form can be used to interconnect with different Internet of Services testbeds, helping to bridge the existing gap between the two levels

Future Internet Enterprise Systems A Flexible Architectural Approach for Innovation Daniela Angelucci, Michele Missikoff, and Francesco Taglino

-net and Saas (Software-as-a-service), is leading the area of enterprise sys -tems to a progressive, significant transformation process.

the challenge is shifted toward the support to enterprise innovation. This process will be accelerated by the advent of FINES (Future Internet Enterprise

System) research initiatives, where different scientific disciplines converge together with empirical practices, engineering techniques and technological

architectures of the Future Enterprise Systems, according to the different ar -ticulations that Future Internet Systems (FIS) are assuming,

Future Internet Enterprise Systems (FINES. In particular, this paper foresees a progressive implementation of a rich, complex, articulated digital world that

FINER (Future Internet Enterprise Resources), will directly act and evolve ac -cording to what exists in the real world

Future Internet, Future Enterprise Systems, component-based soft -ware engineering, COTS, SOA, MAS, smart objects, FINES, FINER

develop enterprise systems (ES), even if one adopts a customisable pre-built applica -tion platform, e g.,

-based enterprise systems, along the line of what has been indicated in the FINES 408 D. Angelucci, M. Missikoff, and F. Taglino

Future Internet Enterprise Systems) Research Roadmap1, a study carried out in the context of the European commission,

Internet of things and Enterprise Environments (DG Infso. The report claims that we are close to a significant transformation in the enterprise systems, where (i

the way they are developed, and (ii) their architectures, will undergo a progressive paradigm shift. Such paradigm shift is motivated primarily by the need to reposition

-ing the role of enterprise systems that, since their inception, have been conceived to support the management and planning of enterprise resources.

Payroll, inventory management, and accounting have been the first application areas. Then, ES progres -sively expanded their functions and aims,

and realising enterprises software applications In essence, while enterprise management and planning services will be increas -ingly available from the †cloudâ€, in a commoditised form, the future business needs

and challenges) are progressively shifting towards the support to enterprise innova -tion. But also innovation cannot remain as it used to be:

Future Internet, Web 2. 0 Semantic web, Cloud computing, Saas, Social media, and similar emerging forms of distributed, open computing will push forward new forms of innovation such as, and

continuous change required to enterprises. New business requirements that current software engineering practices do not seem to meet.

environments, specifically conceived to be used directly by business experts. Such development environments will be based on an evolution of MDA,

role will be played by enterprise system Business Process Engineering, for the above point (i), and a new vision, based on a new family of reusable components, in the

implementation of enterprise operations (and related services) automation, for the last two points. Reusable components mash-up techniques,

/Future Internet Enterprise Systems 409 interfaces will foster new development environments conceived for business experts to directly intervene in the development process

Internet Enterprise Systems (FINES) that need to deeply change with respect to what we have today. A new paradigm is somehow already emerging nowadays,

the Internet of Services (Ios), Internet of things (Iot) and smart ob -jects, Internet of Knowledge (Iok), Internet of People (Iop.

-ties of an enterprise, supported by an adequate theory, able to propose new techno -logical paradigms.

Internet Enterprise Resource (FINER) in the FINES Research Roadmap. So, the sec -ond grand research challenge consists in conceiving new, highly modular, flexible

-tention from the management and planning of business and enterprise resources to enterprise innovation. This GRC requires, again, a strategic synergy between ICT

and business experts. Together, they need to cooperate in developing a new breed of services, tools, software packages, interfaces and user interaction solutions that are

not available at the present time. A new family of ICT solutions aimed at supporting the conception, design, implementation and deployment of enterprise innovation

including assessment of impact and risks In this paper, we intend to further elaborate on these challenges.

correspond to the enterprise architectures, and will be composed by elements tightly coupled with business entities. The achievement of this objective relies on a number

Enterprise Systems FINES represents a new generation of enterprise systems aimed at supporting continu -ous, open innovation.

Innovation implies continuous, often deep changes in the enter -prise; such changes must be mirrored by the enterprise systems:

if the latter are too complex, rigid, difficult to evolve, they will represent a hindering factor for innova

communication paradigms, has encouraged the development of loosely coupled and highly interoperable software architectures through the spread of the Service-Oriented

interacting software services, i e.,, units of work performed by software applications typically communicating over the Internet 11

e-services) of two different sorts. Some services will have a †technical†nature, con -ceived to the specific needs of ICT people;

some other will have a †business†nature reflecting the needs of the enterprise. Furthermore, the very same notion of an e

-service is an abstraction that often hides the entity (or agent) that in the real world

) Conversely, for business people, services are generated not †in the airâ€: there is an active entity (a person, an organization, a computer, a robot, etc.

provides the services, with a given cost and time (not to mention SLA, etc. associ -ated to it

Future Internet Enterprise Systems 411 In summary, Web services were introduced essentially as a computation resource

transforming a given input to produce the desired output, originally without the need to have a persistent memory and an evident state.

when we consider business services, where states, memories, and even the preexisting history of the entity providing the busi

manage a new generation enterprise software architectures. Cloud computing repre -sents an innovative way to architect and remotely manage computing resources:

hosting and operating those resources (i e. applications, services and the infrastructure on which they operate) locally.

It refers to both the applications delivered as services over the Internet and the hardware and system software in the datacenters that provide

those services 12. Cloud computing may be considered the basic support for a brand new business reality where FINERS can easily be searched,

organizing and implementing the enterprises of the future In conclusion, for decades component technologies have been developed with an ICT

-ness experts by using Enterprise Systems/Architectures (including Business Process Engineering methods and tools starting from a repository of FINERS, the new sort of

computational enterprise components just introduced (see below for more details S2 †FINES Open Monitoring System

S1, to keep under control the health of the enterprise, its performances, both internally HR, resources, productivity, targets, etc.

enterprise and, correspondingly, on FINES. This task is achieved by using a platform with a rich set of tools necessary to support the business experts in their redesign

-Future Internet Enterprise Systems 413 worked structure, conceived as an evolution of the Linked Open Data2 of today;

-nication among the great variety of components, services, tools, platforms, resources produced by different providers) that compose a FINES

applications and services) and vertically (using sub-parts at different levels of granu -larity). ) But the most relevant aspect is the large role played by a new sort of compo

, computational units representing enterprise entities. They are recognised by business people as constituent parts of the enterprise, and therefore

easily manipulated by them. A FINER has also a computational nature, characterised by 5 aspects, as described below

such as an enterprise, is itself a FINER. FINERS are conceived to interact and cooperate among themselves, in a more or less tight way

depending on the complexity of the enterprise entity represented. In general we have FID: FINER identifier. This is a unique identifier defined according to a precise, uni

•Enterprise, being the †key assembly†in our work •Public Administration, seen in its interactions with the enterprise

•People, a special class of FINERS for which avatars are mandatory •Tangible entity, from computers to aircrafts, to buildings and furniture

Future Internet Enterprise Systems 415 5. 1 A Business-Driven FINES Develpment Platform In order to put the business experts at the centre of the ES development process, we

that models the enterprise reality (i e.,, a Virtual Enteprise Reality) where the user can navigate and manage changes.

positioned in different parts of the enterprise or in the Cloud, depending on the cases Fig. 3. FINES design environment

5. 2 A Cloud-Based Architecture for FINERS Runtime Once a FINES has been assembled (or re-casted,

see Fig. 1), a runtime environment will recognise, connect, and support the execution and collaboration of the FINER

A similar interface, representing a Virtual Enterprise Reality, will be made available to the users during business operations to navigate in the enterprise

and see how the operations evolve The computational resources of a FINES are maintained in the Computing Cloud

world, with the enterprise and the actual business resources. Below we distinguish High Level and Low Level and FINERS.

Fig. 4. FINES Runtime Environment Future Internet Enterprise Systems 417 The runtime architecture of Fig. 4 is described in a sketchy way,

aiming to highlight the main issues represented by (i) the highly modular structure, (ii) the mirroring of

next prophecy we propose â€oethe Enterprise is the Computerâ€, meaning that an enter -prise, with all its FINERS deployed

where computation will be performed directly by enterprise com -ponents, mainly positioned in the enterprise itself of in the Cloud (typically, in case of

intangible entities. This approach represents a disruptive change, from both a techno -logical point of view and a business perspective.

some key areas of the enterprise that will start to benefit of the FINES approach

-Internet of Services. Business & Information Sys -tems Engineering 1 (5), 341†342 (2009 3. Chesbrough, H.:

Communications of AIS 1 (11)( 1999 5. Mansell, R. E.:Introduction to Volume II: Knowledge, Economics and Organization.

In Mansell (ed.),The Information Society, Critical Concepts in Sociology, Routledge (2009 6. Cordis. lu:

Proposition for Enterprise Interoperability Report (2009), http://cordis. europa eu/fp7/ict/enet/ei-isg en. html

Bringing Semantics to Web Services with OWL-S. In: Proc. Of WWW Conference (2007 14.

Web Services: Principles and Technology. Prentice-hall, Englewood Cliffs (2007 17. Mellor, S. J.,Scott, K.,Uhl, A.,Weise, D.:

Renewable Energy Provisioning for ICT Services in a Future Internet Kim Khoa Nguyen1, Mohamed Cheriet1, Mathieu Lemay2, Bill St. Arnaud3

-tion and Communication Technologies) services entirely based on renewable energy such as solar wind and hydroelectricity across Canada and around the

user services to be processed in data centers built in proximity to green energy sources, reducing GHG (Greenhouse Gas) emissions of ICT equipments.

-all energy consumption will eventually increase due to the growing demand from new services and users, resulting in an increase in GHG emissions.

Based on the cooperation between Mantychore FP7 and the GSN, our approach is therefore, much broader and more appropriate

the heaviest computing services are dedicated to virtual data centers powered completely by green energy from a

challenging research topics in Information and Communication Technologies (ICT 420 K. K. Nguyen et al because of the alarming growth of indirect GHG emissions resulting from the over

-cused on microprocessor design, computer design, power-on-demand architectures and virtual machine consolidation techniques. However, a micro-level energy effi

aimed at providing ICT services based entirely on renewable energy sources such as solar wind and hydroelectricity across Canada and around the world.

services will be dedicated to data centers powered completely by green energy. This is enabled thanks to a large abundant reserve of natural green energy resources in

to enhance the carbon footprint exchange standard for ICT services. This collabora -tion enables research on the feasibility of powering e-Infrastructures in multiple do

Renewable Energy Provisioning for ICT Services in a Future Internet 421 one is powered by a different renewable energy source) could be integrated into an

Energy considerations are taken before moving virtual services without suffering connectivity interruptions. The influence of physical location in that

environment from which to derive best practices and guidelines to follow when build -ing low carbon networks.

This allows complex underlying services to remain hidden inside the infrastructure provider. Resources are allocated according

2 Provisioning of ICT Services over Mantychore FP7 and GSN with Renewable Energy In the European NREN community connectivity services are provisioned on a manual

basis with some effort now focusing towards automating the service setup and opera -tion. Rising energy costs, working in an austerity based environment

which has dynami -cally changing business requirements has raised the focus of the community to control

some characteristics of these connectivity services, so that users can change some of the service characteristics without having to renegotiate with the service provider

MPLS (Layer 2. 5) switches to configure different services. In this aspect, Mantychore will integrate the Ether project 6 and its capabilities for the management of Ethernet

and firewall services, v) Creation, modification and deletion of resources (interfaces routers) both physical and logical,

Renewable Energy Provisioning for ICT Services in a Future Internet 423 using renewable energy resources is vital for any NREN with such an abundance of

zero-carbon ICT services. The only difference between the GSN and a regular net -work is that the former one is able to transport ICT services to data centers powered

Switch Allied Telesis Raritan UPS (APC Gbe Tranceiver PDU Servers (Dell Poweredge R710 To core

-cally sets up required connectivity for Layer 1 and Layer 2 using dynamic services then pushes Virtual machines (VMS) or software virtual routers from the hub to a sun

grid energy for running other services if it is required. However, GSN services are powered entirely by green energy.

The VMS are used to run user applications, particu -larly heavy-computing services. Based on this testbed network, experiments and re

-search are performed targeting cloud management algorithms and optimization of the intermittently-available renewable energy sources

control capabilities, the proposed solution aims at distributing user-oriented services Fig. 3. Layered GSN and Cloud computing Architectures

Renewable Energy Provisioning for ICT Services in a Future Internet 425 regardless of the underlying infrastructure.

implementing the platform level services that provide running environment enabling cloud computing and networking capabili -ties to GSN services.

The Cloud Middleware plane corresponds to the User-level Middleware, providing Platform as a service capabilities based on Iaas Framework

components 5. The top Management plane or User level focuses on application services by making use of services provided by the lower layer services

4 Virtual Data center Migration In the GSN project, we are interested in moving a virtual data center from one node to

i) Setting up a new environment (i e.,, a new data center) for hosting the application with

servers and network devices in a multi-domain environment Fig. 4. Iaas Framework Architecture Overview

Iaas Resource used to build web services interfaces for manageable resources, iii Iaas Service serves as a broker

It uses services provided by protocols and transport layers in order to achieve communications. Each engine has a state machine

which parses commands and decides to perform appropriate actions. The GSN man -agement is achieved by three types of engines:

additional services, such as persistence, which are shared by other components Based on the J2ee/OSGI platform, the Iaas Framework is designed in such a

Open Services Gateway initiative) is a Java framework for remotely deployed service applications, which provides high reliability, collaboration, large scale distribution

Renewable Energy Provisioning for ICT Services in a Future Internet 427 5 Federated Network GSN takes advantage of the virtualization to link virtual resources together to span

or VPLS services at the network edge Fig. 5. Energy-aware routing In the proposed new energy-ware routing scheme based on Mantychore support, the

-quests to appropriate services provided by data centers distributed across the network Each data center is represented by a virtual instance,

Renewable Energy Provisioning for ICT Services in a Future Internet 429 6 Conclusion In this chapter, we have presented a prototype of a Future Internet powered only by

green energy sources. As a result of the cooperation between Europe and North America researchers, the Greenstar Network is a promising model to deal with GHG

-newable energy for ICT services worldwide. Virtualization techniques are shown to be the most appropriate solution to manage such a network

Our future work includes research on the quality of services hosted by the GSN and a scalable resource management

Enabling the low carbon economy in the information age. Report on behalf of the Global esustainability Initiative, Gesi (2008

and Grid Services Using Iaas to Reduce GHG Emissions. J. of Lightwave Technology 27 (12)( 2009

Infrastructure Services for Optical Networks. J. of Optical Communications and Networking 1 (2)( 2009 7. Kiddle, C.:

Geochronos: A Platform for Earth Observation Scientists. Opengridforum 28 3/2010 8. Grasa, E.,Hesselbach, X.,Figuerola, S.,Reijs, V.,Wilson, D.,Uzã, J. M.,Fischer, L.,de

-ing Future Internet-enabled services. Based on an analysis of the current land -scape of smart city pilot programmes, Future Internet experimentally-driven re

environments. Effectively sharing these common resources for the purpose of establishing urban and regional innovation ecosystems requires sustainable

partnerships and cooperation strategies among the main stakeholders Keywords: Smart Cities, Future Internet, Collaboration, Innovation Ecosys

enablers of e-services become more and more important for urban development while cities are increasingly assuming a critical role as drivers of innovation in areas such as

health, inclusion, environment and business 1. Therefore the issue arises of how cities, surrounding regions and rural areas can evolve towards sustainable open and

-tion for user-driven services and how they can accelerate the cycle of research, inno

vation and adoption in real-life environments. This paper pays particular attention to collaboration frameworks which integrate elements such as Future Internet testbeds

and Living Lab environments that establish and foster such innovation ecosystems The point of departure is the definition

†smart†â€oewhen investments in human and social capital and traditional (transport) and modern (ICT) communication infrastructure fuel sustainable economic growth and a

high quality of life, with a wise management of natural resources, through participa -tory government†2. This holistic definition nicely balances different economic and

social demands as well as the needs implied in urban development, while also encom -passing peripheral and less developed cities.

-lenges, such as energy efficiency, environment and health Whereas until now the role of cities and regions in ICT-based innovation mostly

step, the potential role of cities as innovation environments is gaining recognition 4 The current European commission programmes FP7-ICT and CIP ICT-PSP stimulate

environments. The implicit aim of such initiatives is to mobilise cities and urban areas as well as rural and regional environments as agents for change, and as environments

of â€oedemocratic innovation†5. Increasingly, cities and urban areas are considered not only as the object of innovation but also as innovation ecosystems empowering the

Partnerships and clear cooperation strategies among main stakeholders are needed in order to share research and innovation resources such as experimental technology

enterprises, researchers as co-creators Priorities Future Internet technical challenges (e g. routing scaling, mobility Urban development

Pilot environments Technologies Urban policy framework Organisational assets Development plans Living lab facilities methodologies & tools

-vation environments for exploiting the opportunities provided by Future Internet technologies. Three perspectives are addressed in this paper

-ies and urban areas provide a potentially attractive testing and validating environment However, a wide gap exists between the technology orientation of Future Internet re

and needs of cities and their stakeholders, including citizens and businesses, and which may bridge the gap between short-term city development

-Private-People-Partnership) ecosystems providing opportunities to citizens and busi -nesses to co-create, explore, experiment and validate innovative scenarios based on

and large companies as well as stakeholders from different disciplines This paper is structured as follows. Section 2 addresses challenges for cities to ex

-ploit the opportunities of the Future Internet and of Living Lab-innovation ecosys -tems. How methodologies of Future Internet experimentation and Living Labs could

meet the challenges of cities within a global knowledge economy 7. However, the more recent interest in smart cities can be attributed to the strong concern for sustain

capital of cities, collaborative learning and innovation, people-driven innovation Smart cities, from smart phones, mobile devices, sensors, embedded systems, smart envi

The most urgent challenge of smart city environments is to address the problems and development priorities of cities within a global and innovation-led world.

skills to promote the knowledge economy. Active labour market policy is a top prior -ity to sustain employment,

sustain the innovation economy and wealth of cities, maintain employment and fight against poverty through em

-take initiatives and strategies that create the physical-digital environment of smart cities, actualising useful applications and e-services,

and assuring the long-term sus -tainability of smart cities through viable business models The first task that cities must address in becoming smart is to create a rich envi

-ronment of broadband networks that support digital applications. This includes:(1 the development of broadband infrastructure combining cable, optical fibre, and wire

All city economic activities and utilities can be seen as inno -vation ecosystems in which citizens and organisations participate in the development

supply and consumption of goods and services. Fig. 1 presents three key domains of potential smart city applications in the fields of innovation economy, infrastructure

and utilities, and governance Future media research and technologies offer a series of solutions that might work

as content and context fusion, immersive multi-sensory environments, location-based content dependent on user location and context, augmented reality applications, open

new e-services within the innovation ecosystems of cities (see Table 2 Table 2. Media Internet technologies and components for Smart Cities

Cloud services and software components City-based clouds Open and federated content platforms Cloud-based fully

Demand for e-services in the domains outlined in Fig. 1 is increasing, but not at a

-sion of e-services in terms of sustainability and financial viability. Not all applications are turned into e-services.

Those that succeed in bridging the gap rely on successful business models that turn technological capabilities into innovations, secure a con

-tinuous flow of data and information, and offer useful services. It is here that the third

task for city authorities comes into play, that of creating business models that sustain the long-term operation of smart cities.

To date, the environment for applications and their business models has been very complex, with limited solutions available †off the

shelfâ€, a lot of experimentation, and many failures. Cities currently face a problem of standardisation of the main building blocks of smart/intelligent cities in terms of

applications, business models, and services. Standardisation would dramatically reduce the development and maintenance costs of e-services due to cooperation, exchange

Smart Cities and the Future Internet 437 and sharing of resources among localities. Open source communities may also sub

-stantially contribute to the exchange of good practices and open solutions The current research on smart cities is guided partly by the above priorities of con

also aims at stimulating a wider uptake of innovative ICT-based services for smart cit

experimental facilities for exploring new applications and innovative services Technology push is still dominant in the actual research agenda.

funding mechanisms and business models for their sustainability been developed Creating the market constitutes the first priority.

cities have to be defined, in terms of applications, services, financial engineering and partnerships. This will help cities to secure funding,

standards through the innovation economy, smart cities must instrument new ways to enhance local innovation ecosystems and the knowledge economy overall

3 Future Internet Experimentation and Living Labs Interfaces In exploring the role of Future Internet experimentation facilities in benefiting urban

initiatives in that respect have started such as the Smart Santander project (services and applications for Internet of things in the city), the TEFIS project (platform for

co-creation of wellbeing, logistics and environment Iot-based services A comparison of the role of users in FIRE facilities projects compared to Living

Object of testing Technologies, services, architec -tures, platforms, system require -ments; impacts Validation of user ideas, prototype

applications and solutions. Testing as joint validation activity Scale of testing Large-scale mainly From small to large scale

Stakeholders FI Researchers (ICT industry & academia IT multidisciplinary researchers End-users enterprises (large & SMES

Objective Facilities to support research Impact assessment of tested solutions Support the process of user-driven

In order to explore the opportunities and interfaces, we will now take a further look at Living Labs. The Web 2. 0 era has pushed cities to consider the Internet,

Such infrastructure also creates many opportunities for innovative services such as green services, mobility services, wellbeing services,

and playable city ser -Smart Cities and the Future Internet 439 vices based on real-time digital data representing digital traces of human activity and

applications and services seem to be emerging from user co-creation processes Recent paradigms, such as open innovation and open business models 16, Web

2. 0 17 as well as Living Labs 18, a concept originating from the work of William

provides opportunities to users/citizens to co-create innovative scenarios based on technology platforms such as Future Internet technology environments involving

large enterprises and SMES as well as academia from different disciplines. It appears that Future Internet testbeds could be enabling the co-creation of innovative scenarios

by users/citizens contributing with their own content or building new applications that would mash-up with the city†s open, public data

Internet services and sensor network in the city. www. smartsantander. eu •ELLIOT (FP7-ICT, 2010.

Public sector services •EPIC (CIP ICT-PSP, 2010. Platforms for intelligent cities •Apollon (CIP ICT-PSP, 2010.

•Networking for Communications Challenges Communities (N4c. Ex -tending Internet access to remote regions. www. n4c. eu

by users of green services in the areas of air quality and ambient noise pollution with

The second one addresses wellbeing services in connection with a hospital and the third focuses on logistic services in product devel

-opment facilities with professional users. Its goal is to investigate evidence of the social dynamics of the Living Lab approach for the purpose of ensuring a wide and rapid

The green services use case takes place in the context of the ICT Usage Lab and

local stakeholders, such as the regional institution for air measurement quality (Atmo PACA), the local research institute providing the Iot-based green service portal and

Iot-based green services use case are twofold: to investigate experiential learning of the Iot in an open and environmental data context,

green services based on environmental data obtained via sensors. Various environ -mental sensors will be used, such as fixed sensors from Atmo PACA in the NCA area

services use case is based an Iot service portal which addresses three main Iot -related portal services by allowing the user:

1) to participate in the collection of envi -ronmental data; 2) to participate in the co-creation of services based on environmental

data; and 3) to access services based on environmental data, such as accessing and/or visualising environmental data in real time.

Three complementary approaches have already been identified as relevant for the green services use case: participatory/user

-centred design methods; diary studies for Iot experience analysis, and coupling quan -titative and qualitative approaches for portal usage analysis. In this context of an open

and services in real-life urban environ -ments in Europe. Actually, the Periphã ria project forms a bridge between the Smart

services, etc. †in which the integration of Future Internet infrastructures and services occurs as part of a â€oediscovery-driven†process.

environment that is dynamically configured (run-time) to bring together testbeds, ap -plets, services, and whatever is relevant, available and configured for integration at

the moment that the social interaction of People In places calls for those services Participation is at the heart of this bottom-up approach to Future Internet technol

-ogy integration, whereby Future Internet research adopts a â€oecompetitive offer†stance to prove its added value to users.

mobile e-government services are delivered As an example (see Fig. 2), the City of Genova is experimenting with the Smart

and integrates Future Internet technologies (such as augmented reality services for the appreciation of cultural heritage) with networks of video-cameras used to monitor

In addition, the integration of these services occurs in the Living Lab context where citizens contribute both to the definition and prioritisation of the cul

that are central to the acceptance and success of Future Internet services for the safety

of urban environments Fig. 2. Genoa smart city experiments on Smart Museum and Smart Park

and citizens in defining the services that make up a Smart City as well as the new sustainable lifestyles and workstyles

other Future Internet paradigms such as cloud services and camera and sensor net -works can be considered as already operational.

accessible and adaptable to specific demands of any research and innovation projects The second layer concerns collaboration at the territorial level,

demand for services and availability of advanced end-users (see Fig. 3). Additionally the value creation system in its conceptualisation by Michael Porter is affected by

-tems based on sustainable partnerships among the main stakeholders from business research, policy and citizen groups

In this paper we explored the concept of â€oesmart cities†as environments of open and user driven innovation for experimenting

businesses to push for innovation and the quality of services. Here we see a clear

-bodies open business models of collaboration between citizens, enterprises and local governments, and the willingness of all parties-including citizens and SMES-to en

resource sharing opportunities. Initial examples of resource sharing appear in making user communities available for joint use with Future Internet facilities (e g. the TEFIS

New opportunities require new business models. Forrester for Ventor Strategy Professionals (2010 15. European commission, DG INFSO:

economy forward in the coming years. However, most of the current city and urban developments are based on vertical ICT solutions leading to an unsus

Things (Iot) and Internet of Services (Ios), can become building blocks to pro -gress towards a unified urban-scale ICT platform transforming a Smart City

-ablers to facilitate the composition of interoperable smart city services. We also discuss the need of infrastructures at the European level for a realistic

Internet of Services, Ubiquitous Sensor Networks, Open, Federated and Trusted innovation platforms, Future Internet 1 Introduction

of †smartness†were identified (economy, people, governance, mobility, environment and living As the upsurge of information and communication technologies (ICT) has become

the nervous system of all modern economies, making cities smarter is usually achieved through the use of ICT intensive solutions.

In fact, ICT is already at the heart of many current models for urban development: revamping their critical infra

development of essential services for health, security, police and fire departments governance and delivery of public services

efficient, scalable and suitable for supporting new generations of services that are not even envisaged nowadays

•Urban Communications Abstraction. One of the most urgent demands for sustainable urban ICT developments is to solve the inefficient use (i e. duplications) of existing

or new communication infrastructures. Due to the broad set of heterogeneous urban scenarios, there will be also a pronounced heterogeneity of the underlying communi

-cation layers. So far, through communications abstraction, urban-scale ICT platforms will allow unified communications regardless the different network standards and

will enable data transfer services agnostic to the underlying connection protocol. Fur -thermore, a major challenge in future urban spaces will be how to manage the in

-creasing number of heterogeneous and geographically dispersed machines, sensors and actuators intensively deployed everywhere in the city

•Unified Urban Information Models. Also related to the huge amount of heteroge -neous information generated at urban scale,

-ferent applications and services at global urban levels. This will relay on the articu -lation of different enriched semantic descriptions,

-formation processing services involving different urban resources and entities of interest. Specific information management policies should also be addressed to en

•Open Urban Services Development. Together with unified communications and information, a key functionality of urban ICT Platforms should be to guarantee in

-teroperability at both the application and service levels. Only through open, easy -to-use, and flexible interfaces the different agents involved (public administrations

enterprises, and citizens) will be able to conceive new innovative solutions to interact Smart Cities at the Forefront of the Future Internet 449

-vestments to create products and services which have not yet been envisioned, a crucial aspect for Smartcities to become future engines of a productive and profit

-able economy Once major challenges of unified urban-scale ICT platforms are identified, it is clear

that the future development of Smart Cities will be only achievable in conjunction with a technological leap in the underlying ICT infrastructure.

system comprising Internet-accessible information and services, coupled to the physi -cal environment and human behavior,

and supporting smart applications of societal importance†4. Thus the FI can transform a Smart City into an open innovation

•The Internet of Services (Ios: flexible, open and standardized enablers that facili -tate the harmonization of various applications into interoperable services as well as

the use of semantics for the understanding, combination and processing of data and information from different service provides, sources and formats

-change information about themselves and their social context and environment At this point, it is important to highlight a bidirectional relationship between the FI

experimental environment for the development, experimentation and testing of com -mon FI service enablers required to achieve †smartness†in a variety of application

required capacity, scalability, inter -operability, and stimulation of faster development of new and innovative applications

stimulate the development of new services and applications by various types of users and to help gathering a more realistic assessment of users†perspective by means of

services of a city †administration, education, healthcare, public safety, real estate transportation and utilities †more aware, interactive and efficient. †According to this

•Remote working and e-commerce services for businesses, entertainment and com -munications for individuals. Advanced location based services, social networking

and collaborative crowdsourcing collecting citizens†generated data By analyzing these different Smart Cities application scenarios, together with the

need of a broadband communication infrastructure that is becoming, or starting to be considered, the 4th utility (after electricity, gas and water), two major ICT building

-lutions and services to meet the needs of cities and their inhabitants. In this context Ios evolution must be correlated undoubtedly with Iot advances.

number of future Smart City services will never have an opportunity to be con -ceived due to the lack of the required links to the real world

-essary support for new innovative applications and services (the city as an Open In -novation Platform

among the main European stakeholders in order to develop cross-domain Next Gen -eration (NG) Iot platforms suitable to different usage areas and open business models

to improve market dynamics by involving third parties in the value chain (SMES Some of the essential functionalities identified as required for NG Iot platforms

comprise the support for horizontality, verticality, heterogeneity, mobility, scalability as well as security, privacy, and trust 12 13.

foster the creation of new services taking advantage of the increasing levels of effi -ciency attained by the reuse of deployed infrastructures

list of potential benefits for Smart Cities†services relaying on the same basic sensed information and a suite of application enablers (i e. from sensor data processing appli

-cations, to enablers for accessing multimedia mobile communications or social net -works, etc..Thus the integration of innovative principles and philosophy of Ios will

) In that way, an increasing number of Smart Cities†services could be searched 452 J. M. Hernã¡

massive deployments of city-scale applications and services for a large number of activ -ity sectors.

IT/Telecom/Content services, Machine to machine-Machine (M2m) services, or entirely new service delivery models simultaneously involving virtual and real worlds

aspects are related closely (e g. environment and traffic, both of them to health, etc Smart Cities at the Forefront of the Future Internet 453

technological ground where services can be developed in a cost efficient manner Consequently, at urban-scale, a USN platform can represent an invaluable infrastruc

Smart City environments. Through a set of basic functionalities it will support differ -ent types of Smart City services in multiple application areas

•Sensor Discovery: this functionality will provide services and applications infor -mation about all the registered sensors in the city.

In that way, a particular service interested in finding information (such as available parking places in a given area

many Smart City services will rely on continuously generated sensor data (for example for energy monitoring, video surveillance or traffic con

in other cases, services rely on some specific events happening in the city (such as traffic jams or extreme pollution situations.

platform will allow services to subscribe not just to the observations provided by the sensors,

so city services could either change sensor con -figuration parameters (i e. the sensibility of a critical sensor) or to call actuator

City services using a unified information model, regardless of the particular infor -mation model used by the sensor technologies deployed through the city infrastruc

Services should be agnostic to the communication protocol used. The platform should provide access to the informa

so services and networks are decoupled in order to evolve inde -pendently 22. This capability will allow a seamless link between Iot and Ios, as

City services, thus allowing federation with different service creation environments and different business processes 3. 2 USN Architecture for Urban Iot Platforms

While the new wave of Next Generation Iot platforms are expected to be defined by initiatives and projects like Iot-A 23, the IERC cluster 24 or the emerging PPP

SIP Services Web Services Configuration A A A D evice M anagem ent Application /Service

Communication Protocol Adapter Fig. 2. High-level Architecture of a USN Iot Platform Smart Cities at the Forefront of the Future Internet 455

-Enabler (that interfaces services) and the USN-Gateways (that interacts with Sensor networks). ) This approach is inspired by the Open Geospatial Consortium (OGC

where services will be capable to access any type of sensors through the web. This has been reflected by a set of

specifications from the OMA Service Environment (OSE) 27 enablers (such as presence, call conferencing, transcoding, billing, etc..

sensors networks deployed throughout the city and the core IP communication network), the main responsibility is to provide independence from the communica

Functionalities required to support services are offered both in synchronous and asynchronous mode by the USN-Enabler through the following entities

•The Sensor Tasking Entity (STE) allows services to perform requests operations to the sensor network, like for example a request to gather data, without the need to

Web Services and SIP requests and responses •The Catalogue and Location Entity (CLE) provides mechanisms in a distributed

environment to discover which of the different instances of the entities is the one performing the request a user might be interested In for example, in an architec

compromising the viability of new services and applications. Most of these problems are related to scalability aspects and performance

degradation. The level of maturity achieved at the networking level, despite the fact that they can be improved further,

abstract the networking level from the higher ones, so new services and information management activities can be performed over heterogeneous networking technologies

This increasing demand to move from network experimentation towards service provi -sioning requirements does not just apply to the Smart Cities field,

The resulting scale and heterogeneity of the environment makes it an ideal environment for enabling the above mentioned broad range of experi

-Smart Cities at the Forefront of the Future Internet 457 mentation needs. Furthermore, a city can serve as an excellent catalyst for Iot research

application domains (such as vertical solutions for the environment control and safety horizontal application to test network layers, content delivery networks, etc..

This new smart city model can serve as an excellent incubator for the development of a diverse set of highly innovative services and applications 18

For all these reasons, systems†research in ICT needs more powerful and realistic tools, which can only be provided by large-scale experimental facilities.

opportunities and sustainably increase ICT research and innovation capability with specific objective to make urban cities/areas"smarter".

well as"on-demand"."This will enable city environments to become"smarter",as more adaptive and supportive environment, for people as well as organizations

Interconnecting Infrastructure WISEBED SENSEI New Colour scheme Telco2. 0 (TID Common Testbed/Gateway Testbed management Testbed Access

Interface Testbed Portal Overlay Enabler Security Privacy and Trust Smart Santander Node WISELIB User Developed App

services and applications for the Iot. The facility will allow large-scale experimenta -tion and testing in a real-world environment.

The infrastructure will be mainly de -ployed in Santander in the North of Spain, with nodes in Guildford, UK;

will be used also to provide real services to citizens. Smartsantander experimental facility is envisaged not as a closed, standalone system.

Thus, the platform will be attractive for all involved stakeholders: industries, commu -nities of users, other entities that are willing to use the experimental facility for de

-ploying and assessing new services and applications, and Internet researchers to vali -date their cutting-edge technologies (protocols, algorithms, radio interfaces, etc

as well as traffic management services creation of corridors for emergency vehicles, ecoways enablement proposing alter -native routes for vehicles based on pollution monitoring in different city zones

•Alert services that, orchestrating several services such as such ehealth, environ -mental monitoring, traffic control and communication services, will inform and/or

alert citizens of different critical situations (i e. urgent medical attention, city ser -vices recommendations, etc

requirements coming up from the different smart city services (use cases. A set of basic subsystems can be identified:

-sidering the investment required to deploy city scale testbeds. For this reason, apart from serving to its research purposes, it is essential,

This will be very useful to open new business opportunities and, at least and not less important, provide the means to guarantee its day by day

and services is huge in the smart city context. First time success of large Iot deploy

mentation and testing limited to small domain-specific environments or application specific deployments. While those may suffice as proof-of-concepts,

been demonstrated successfully in real deployments for smart metering services smart places scenarios, and environmental monitoring systems.

-tial to create a fan of new services, providing the key components required to inter

environment is been carried. Nontechnical aspects are also of a big importance. The cardinality of the different stakeholders involved in the smart city business is so big

that many nontechnical constraints must be considered (users, public administrations vendors, etc..In this sense, what may be evident from a purely technique perspective

as the corresponding end-user services, the real situation is quite far different. Nowa -days, there are no field experiences across the world allowing assessing, in the short

smart & proactive energy management, Open Innovation by FI-enabled services Brussels, 15 january (2010 Smart Cities at the Forefront of the Future Internet 461

New Opportunities Require New Busi -ness Models, 2 november 2010. Forrester research (2010 10. EC FI-PPP:

http://services. future-internet. eu/images/d/d4/Report GSDPPANEL-FISO-FIA-Madrid-draft%2breqs. pdf

OMA Service Environment Archive, http://www. openmobilealliance. org /technical/release program/ose archive. aspx 28. Oulu Smart City, http://www. ubiprogram. fi

Traffic Evolution Characteristics and Scalability Problems of the Mobile Internet Evolution of Flat Architectures Distributed Mobility Management in Flat Architectures

Phases of Communication Related Work Conclusion and Future Work References Engineering Secure Future Internet Services

Introduction Future Internet Services The Need for Engineering Secure Software Services Research Focus on Developing Secure FI Services

Security Requirements Engineering Secure Service Architecture and Design Security Support in Programming Environments Secure Service Composition

Secure Service Programming Platform Support for Security Enforcement Embedding Security Assurance and Risk management during SDLC

Security Assurance Risk and Cost Aware SDLC Conclusion Towards Formal Validation of Trust and Security in the Internet of Services

Introduction Specification Languages Automated Validation Techniques Orchestration Model Checking of SOAS Channels and Compositional Reasoning

Abstract Interpretation The AVANTSSAR Platform and Library Case studies, Success Stories, and Industry Migration Conclusions and Outlook

Today's Datacenters as the Benchmark for the Cloud New Security and Privacy Risks and Emerging Security Controls

Isolation Breach between Multiple Customers Insider Attacks by Cloud Administrators Failures of the Cloud Management Systems

A Use-Case on Testing Adaptive Admission Control and Resource Allocation Algorithms on the Federated Environment of Panlab

Technical Environment, Testbed Implementation and Deployment Running and Operating the Experiment Conclusions References Multipath Routing Slice Experiments in Federated Testbeds

Testing End-to-end Self management in a Wireless Future Internet Environment Introduction Experimental Facilities Decription Mechanism for Service-Aware Network Self management

New Roles and Strategic Business model Virtual Infrastructures in Action Virtual Infrastructure Life cycle Controlling the Virtual Infrastructures

Services Introduction to Part VI SLAS Empowering Services in the future Internet Introduction Reference Architecture for SLA Management

Adoption Aspects Use Case †Enterprise IT Use Case †ERP Hosting Use Case †Service Aggregation

Use Case †egovernment Conclusions References Meeting Services and Networks in the future Internet Ontological Approach in FINLAN

Ontological Layers Representation FINLAN Ontology Example Contributions to the Future Internet Works Collaboration to the Autoi Planes

Integration between Services and Networks Integration Using FINLAN Library Conclusions Fostering a Relationship between Linked Data and the Internet of Services

Introduction Linked Data Services on the Web Linked Services Conclusions References Part VII: Future Internet Areas:

Content Introduction to Part VII Media Ecosystems: A Novel Approach for Content-Awareness in Future Networks

Introduction Background System Architecture Business Actors and Policy Implications Conclusions References Scalable and Adaptable Media Coding Techniques for Future Internet

Future Internet Enterprise Systems: A Flexible Architectural Approach for Innovation Introduction A Long March towards Component-Based Enterprise Systems

Guidelines for a FINES Architecture The New Frontier for ES Components: The FINER Approach The FINES Approach to Design and Runtime Operations

Renewable Energy Provisioning for ICT Services in a Future Internet Introduction Provisioning of ICT Services over Mantychore FP7 and GSN with Renewable Energy

Architecture of a Zero-Carbon Network Virtual Data center Migration Federated Network Conclusion References Smart Cities and the Future Internet:


< Back - Next >


Overtext Web Module V3.0 Alpha
Copyright Semantic-Knowledge, 1994-2011