SlideShare une entreprise Scribd logo
1  sur  99
Télécharger pour lire hors ligne
Future Internet: New Network
  Architectures and Technologies

Part III - Requirements & Challenges
         Antônio Marcos Alberti



                                   © Antônio M. Alberti 2011
Outline
1.   Substrate Resources and Its Integration with Software
2.   Information, ID/Loc Splitting, Semantic, Context and Mobility
3.   Autonomic and Cognitive Technologies
4.   Security, Privacy and Trust
5.   Services and Applications
6.   Simplicity, Sustainability and Evolvability
7.   Artificial Intelligence and Other Bio-inspired ICT




                                                            © Antônio M. Alberti 2011
1. Substrate Resources and Its Integration with Software
 Technology Evolution
 Capacity and Ubiquity
 Internet of Things
 Real World Internet
 Virtualization




                                                           © Antônio M. Alberti 2011
Technology Evolution
 Moore's Law:
    Predicts technological developments in computing power.

 (Kurzweil, 2005):
    A theory for technological evolution – to describe the exponential
     growth of technological advances: The Law of Accelerated Returns




                                                            © Antônio M. Alberti 2011
Technology Evolution
 The Law of Accelerating Returns: Two positive feedback loops
   1. Selection of the more capable techniques of a certain stage to
      build the next stage – increases the rate of progress
      exponentially, reducing required time to obtain the same results.

   2. Selected process becomes more attractive than others and
      begins to catalyze resources to it – starts to evolve even faster,
      experiencing an additional exponential growth over the 1st.

      Source: http://www.kurzweilai.net/the-law-of-accelerating-returns




                                                                          © Antônio M. Alberti 2011
Capacity and Ubiquity
 (Kurzweil, 2005):
    Exponential growth trends for:
        Memory capacity (DRAM in bits per dollar), microprocessor clock speed
         (Hz), transistors per chip, processor performance (MIPS), magnetic
         storage (bits per dollar), the number of hosts on the Internet.


 (Saracco, 2009):
    Consistent technological developments in:
        Computing – is achieving teraflops right now and evolution proceeds to
         petaflops in the next decade.
        Display technology – has advanced enormously in later years.
        Consumer electronics, such as handsets, laptops, HDTVs, e-books,
         video games, GPSs, etc.




                                                                    © Antônio M. Alberti 2011
Capacity and Ubiquity
 Minnesota Internet Traffic Studies (MINTS):
    Annual Internet traffic growth rates were about 50-60% in 2008
     and about 40-50% in 2009.
    The monthly Internet traffic was circa 7.5-12x1018 bytes or
     exabytes.

 Japanese Akari project:
    Traffic could increase 1.7 times per year in Japan in the next
     years, producing an expansion of 1000 times in 13 years.


 We can expect a growth of roughly 30-100 times in the next
  decade.




                                                              © Antônio M. Alberti 2011
Capacity and Ubiquity
 How to meet this demand?
    Mobile Access: 4G, Cognitive Radio (CR).

    Fixed Access: Fiber-To-The-Home (FTTH).

    Core: State-of-art optical transmission and switching.




                                                              © Antônio M. Alberti 2011
Capacity and Ubiquity
 The technological evolution leads to price reduction → Ubiquity.

 More and more devices are becoming computationally capable
  and connected to the Internet (e.g. clothing, buildings).

 Inexpensive computing → Ubiquitous Computing (smart
  environments and ambient intelligence).




                                                         © Antônio M. Alberti 2011
Internet of Things
 Consequences of Ubiquitous Computing:
    Connectivity anywhere, anytime, in anyplace, to anyone.

    The rise of the NEDs (Network Enabled Devices) army.

    The appearance of the Internet of Things (IoT) and Real World
     Internet (RWI).




                                                            © Antônio M. Alberti 2011
Internet of Things
 Challenges and Requirements (1/3):
    Exponential growth in the number of sensors collecting real world
     information → A flood of traffic on the network.

    Real world could be increasingly integrated to the virtual one,
     making it possible to greatly increase the interaction between
     them.

    Changes in real world objects could be reflected in virtual world –
     Changes made to virtual objects can become real.

    User’s sensitive information will be collected, such as identity,
     location and other contextualized information.



                                                                © Antônio M. Alberti 2011
Internet of Things
 Challenges and Requirements (2/3):
    Flood of sensitive information → will push network scalability to
     new limits.

    How to make this information safely available for innovative
     applications?

    How to address billions of new nodes? Addressing and traceability
     to sensors and actuators, e.g. in the case of a fire.

    Information needs to be contextualized to allow delivering to the
     right destiny, at the right time (information freshness).




                                                              © Antônio M. Alberti 2011
Internet of Things
 Challenges and Requirements (3/3):
    The need for energy-aware security → trust relations among
     nodes.

    Semantic and context → smoke detector: fire or fireworks?

    NEDs mobility → ID/Loc splitting.

    Management and control → Autonomic technologies.

    RWI as a sensorial system for Future Internet.




                                                           © Antônio M. Alberti 2011
Virtualization
 Exponential growth → diffuse substrate of digital technologies
  composed by processing, storage, display and communication
  resources.

 Much of the communication equipment today → become
  computers, with CPUs, Operating Systems, etc.

 How to make this diffuse substrate of hardware resources
  transparently and uniformly available to software?




                                                        © Antônio M. Alberti 2011
Virtualization
 The roles of virtualization on FI:
    An elementary aspect of the architecture itself;

    To enable simultaneous architectures over the physical SN,
     therefore creating a meta-architecture;

    To support experimentation with new architectures;

    To allow customizable service-aware networks, e.g. content-
     networks;

    To allow “new business models for carriers and operators”,
     (Nakao, 2009), e.g. virtual service operators.



                                                            © Antônio M. Alberti 2011
Virtualization
 My definition of network virtualization:
    To create an abstraction (indirection) layer between network
     equipment (routers, switches and radios) and network software,
     such that communication resources can be used concurrently/
     transparently/uniformly by different software instances.


 It allows multiple Virtual Networks (VNs) to share the same
  Substrate Network (SN).

 A virtual network has several of virtual nodes connected by
  physical and/or virtual links, thus forming a virtual topology.




                                                            © Antônio M. Alberti 2011
Virtualization
 What we can do with such idea?

  Isolated                     Transitive            Overlaid
                                                            VN2
   VN1 VN2 VN3 VN4              VN1      VN2   VN3          VN1
   Substrate Network             Substrate Network    Substrate Network

  Fonte: Hiroaki Harai, Akari Project.




                                                                  © Antônio M. Alberti 2011
Virtualization
 Challenges and Requirements (1/2):
    Scalability – How to support a large number of VNs?

    Manageability – How to manage a large number of VNs? How to
     manage traffic?

    Multidomain/Multioperator – How to interoperate VNs? How to
     span over multiple physical operators? Is it standardization
     required?

    Selection/Admission/Routing – Virtual topology design and
     physical entities assignment are NP-hard problems.




                                                           © Antônio M. Alberti 2011
Virtualization
 Challenges and Requirements (2/2):
    Resources Exposure – How to describe resources?

    Security, Trust and Privacy – Possible attacks, security risks,
     denial of service.

    Mobility – How to move virtual entities?

    Complexity – How to deal with the increasing complexity?
     Autonomicity?




                                                              © Antônio M. Alberti 2011
Virtualization
 Is it possible to apply virtualization on wireless networks?

 More difficult to be virtualized:
    E.g. interference, shadowing, multipaths, multiple access and
     other aspects of the propagation environment.


 These difficulties do not mean that radio resources aren’t an
  exception.

 Software Defined Radio (SDR) can be seen as a radio where
  hardware resources are exposed and reconfigured by software.




                                                            © Antônio M. Alberti 2011
Virtualization
 Some interesting things we can do with radio virtualization:


         Isolated                Virtual MAC
                                     VMAC1                   VMAC2
          T1     T2    T3              PHY1                  PHY2
          Substrate Hardware       Substrate Hardware
                                 © Antônio M. Alberti 2011


         Transitive              Generic MAC
                                                    MAC
          T1      T2        T3         PHY1                  PHY2
          Substrate Hardware      Substrate Hardware
2. Information, ID/Loc Splitting, Semantic, Context and Mobility
 Information-centric Approches
 ID/Loc Splitting
 Generalized Mobility
 Semantic, Context, Context-Awareness and Ontology
 Semantic Web




                                                          © Antônio M. Alberti 2010
Information-Centric Approaches
 Information as a key ingredient in design.

 Information is in everywhere, i.e. contracts, location, police, IDs,
  descriptors, naming, etc.




                                                            © Antônio M. Alberti 2010
Information-Centrism
 Requirements and Challenges (1/5):
    To make information the center of design.
        “Information is everything and everything is information” (PSIRP, 2009).


    To represent persistently and consistently information by means of
     Information Objects (IOs), which contains:
        Digital signatures, checksums, metadata, access rights, formats,
         ontology, etc.


    To access information independently of its location.

    To name contents (or its representation).
        “Named content is a better abstraction for today’s communication
         problems than named hosts.” (Van Jacobson, 2009).



                                                                     © Antônio M. Alberti 2010
Information-Centrism
 Requirements and Challenges (2/5):
    To adequately manage content → versioning, encodings, copies
     of identical content.

    To use name resolution schemes to find out locators to named
     content.

    To allow disruptive and consented communications, e.g. publish/
     subscribe (pub/sub) paradigm.

    To enable anycast and multi path routing of previously located
     information. To improve multicasting support.

    To efficiently distribute content, customizing and improving Quality
     of Experience (QoE).

                                                              © Antônio M. Alberti 2010
Information-Centrism
 Requirements and Challenges (3/5):
    To cache information to improve performance and efficiency.

    To enable efficient, semantic rich, context-based information
     search and manipulation.

    To deal with information scope. “Policy is metadata. So is scope!”,
     PSIRP.

    To deal with provenance, ontology and coherence as advocated
     by Van Jacobson @ FISS 2009.

    To identify information uniquely.




                                                              © Antônio M. Alberti 2010
Information-Centrism
 Requirements and Challenges (4/5):
    To rethink security from the information point of view → securing
     information per se.

    To explore self-certifying names → cryptographic hash function
     over the binary data.

    To provide secure rendezvous among information producers and
     consumers.

    To verify publisher privacy before content publishing –
     authenticate and authorize subscribers during rendezvous.




                                                             © Antônio M. Alberti 2010
Information-Centrism
 Requirements and Challenges (5/5):
    To solve indirections (ID/Loc) dynamically, efficiently, generically
     and robustly.

    To deal with scalability on information representation, searching,
     naming resolution, location, routing, etc.

    To deal with multi level, multi domain environments.

    To autonomously manipulate content.




                                                                © Antônio M. Alberti 2010
ID/Loc Splitting
 Future networks need to separate identifiers (ID) from locators
  (Loc) → the so called ID/Loc splitting.

 This split is required not only for physical entities (e.g. hosts),
  but also for virtual entities as well as for content.




                                                              © Antônio M. Alberti 2010
ID/Loc Splitting
 Requirements and Challenges (1/2):
    To uniquely identify every entity in the network as well as
     information → They can be moved, searched and localized
     without change their identities.

    How to generate unique digital identifiers for real or virtual
     entities?

    How to manage IDs in order to provide generalized mobility for
     real or virtual entities?

    How to deal with privacy, anonymity and traceability?
        Unique IDs can provide information sources non-repudiation.




                                                                   © Antônio M. Alberti 2010
ID/Loc Splitting
 Requirements and Challenges (2/2):
    How to use accountability information to prevent or to punish
     cyber crimes?
        Traceability based on persistent IDs discourage network misuse.


    How to manage the large number of IDs, their relationships and
     lifecycles?
        There is a massive scalability problem here!

    How to manage credentials and their relations to IDs?
        Unique IDs enhances digital credentials.


    How to discovery IDs of real or virtual entities?



                                                                   © Antônio M. Alberti 2010
Generalized Mobility
 General mobility means to comprehensively support user,
  terminal, service, application, virtual networks, information, and
  other real and virtual entities mobility.




                                                           © Antônio M. Alberti 2010
Semantic, Context, Context-Awareness and Ontology
 Semantic
    “Relating to meaning in language or logic”, Thesaurus Dictionary.

 Context
    (Giunchiglia, 1992) defines context as a “subset of the complete
     state of an individual that is used for reasoning about a given
     goal”.

 Situation
    (Baker et al., 2009): situation is a snapshot of related context
     information at a certain time and space.




                                                               © Antônio M. Alberti 2010
Semantic, Context, Context-Awareness and Ontology
 Situation-Awareness
    According to (Baker et al., 2009) “... being aware of its physical
     environment or situation and responding proactively and
     intelligently based on such awareness”.

 Context-Awareness
    To be aware of relevant contexts.

 Ontology
    For (TripCom, 2008) “an ontology is a formal definition of
     terminology and relationships among the terms in a computer-
     processable form”.




                                                               © Antônio M. Alberti 2010
Semantic, Context, Context-Awareness and Ontology
 Requirements and Challenges:
    Situation and Context Awareness → RWI as a source for situation
     and context information.

    Autonomicity → To enable a system/application/artifact to adapts
     to environmental or goal changes → Ontologies for rules, goals,
     regulations, etc.

    Context Distribution → Collaboration of context processing entities
     using the publish/subscribe paradigm.




                                                             © Antônio M. Alberti 2010
Semantic Web
 (Berners-Lee, 1999):
    Information meaning (semantic) + treatment = a web that can
     “understand” what entities want.

    “We need to abstract from the syntax to semantics”.

    It is an autonomous knowledge web, including context-aware
     applications and services composition.




                                                           © Antônio M. Alberti 2010
3. Autonomic and Cognitive Technologies
 Introduction
 Autonomic Computing
 Cognitive Computing
 Autonomic Communications
 Cognitive Radio




                                          © Antônio M. Alberti 2010
Introduction
 (Wang, 2009) classifies computer technologies and systems as:
    Imperative → Based on Von Neumann architecture.

    Autonomic → “Goal-driven and self-decision-driven technologies
     that do not rely on instructive and procedural information.”

    Cognitive → “Implements computational intelligence by
     autonomous inferences and perceptions mimicking the
     mechanisms of the brain.”




                                                             © Antônio M. Alberti 2010
Autonomic Computing
 Why autonomic computing?
    Accelerated returns:
       Boom in diversity, scale and complexity.

    Human capability limitations:
       Highly stressful job and deep sense of failure.


    OPEX:
       Human resources are expensive.

   Rapid adaptation to the environment.




                                                          © Antônio M. Alberti 2010
Autonomic Computing
 (IBM, 2001):
    A famous manifesto → autonomic computing.

    “Computing systems’ complexity appears to be approaching the
     limits of human capability”.

    Bio-inspired → human autonomic nervous system governs various
     functions without our awareness.

    Computational systems → manage themselves according to high-
     level objectives outlined by human operators.

    Reduce human interference and OPEX.


                                                         © Antônio M. Alberti 2010
Autonomic Computing
 (Kephart and Chess, 2001):

  4 autonomic properties:
    Self-Configuration - To configure components and the system
     itself to achieve high-level goals.

    Self-Optimization - To optimize proactively system resources and
     other aspects in order to improve performance, efficiency, quality,
     etc.

    Self-Healing - To detect, diagnose and repair localized problems
     and failures.

    Self-Protection - To defend against attackers, threads or cascade
     failures.

                                                              © Antônio M. Alberti 2010
Autonomic Computing
 Autonomic Managers:
    Decentralized and cooperative.

    Interact each other and with human operators to obtain the
     expected behavior for the system → self-emergent or “social”
     behavior.

    Follows a bottom-up design approach, where basic functions
     cooperate to achieve top level goals.

    Require gateways to managed resources.

    Use communication resources to exchange obtained knowledge.



                                                           © Antônio M. Alberti 2010
Autonomic Computing
 Monitor-Analyze-Plan-Execute-Knowledge (MAPE-K).


               Autonomic Manager
                      Knowledge

         Monitor    Analyze    Plan    Execute




                   Managed Element


    Adapted from (Kephart and Chess, 2001).




                                                     © Antônio M. Alberti 2010
Autonomic Computing
 (Dobson et al., 2010):
    The most notable omission from IBM’s original vision is
     autonomous elements communication.

 (Clark et al., 2003):
    To incorporate more autonomy in communication networks,
     creating the so-called Knowledge Plane.


 (Smirnov, 2004)
    The idea of Situated and Autonomic Communication (SAC).




                                                               © Antônio M. Alberti 2010
Autonomic Computing
 Requirements and Challenges (1/2):
    (Sterrit and Bustard, 2003):
        Self-awareness → aware of its internal states, skills, available/
         unavailable resources
        Self-situation → aware of the situation of the external environment.
        Self-monitoring → automatically detect context changes in rules, goals
         and other information.
        Self-adjustment → adapt appropriately to them.


    (Dobson et al., 2010):
        “Researchers have devised innovative autonomic solutions to individual
         problems, but the larger, more difficult task of combining these point
         solutions into autonomic systems remains.” → transcendence.




                                                                    © Antônio M. Alberti 2010
Autonomic Computing
 Requirements and Challenges (2/2):
    (EURESCOM, 2009):
       Operators environment → combine self-* properties in a gracefull and
        holistic way.

       Interoperability → fundamental to deploy “open, end-to-end and
        heterogeneous autonomic features”.




                                                                   © Antônio M. Alberti 2010
Cognitive Computing
 (Wang et al., 2006):
    Bioinpired → inference, perception and cognitive mechanisms of
     the human brain as defined in the Layered Reference Model of
     the Brain (LRMB).

 (Wang et al., 2010):
    Perspectives on AI (Artificial Intelligence), knowledge
     representation, machine learning, role-based social computing.




                                                            © Antônio M. Alberti 2010
Autonomic Communications
 (Clark et al., 2003):
    “to build a different sort of network that can assemble itself given
     high-level instructions, reassemble itself as requirements change,
     automatically discover when something goes wrong, and
     automatically fix a detected problem or explain why it cannot do
     so.”


 (Smirnov, 2004):
    “radical paradigm shift towards a self-organising, self-managing
     and context-aware autonomous network – considered in a
     technological, social and economic context – to respond to the
     increasingly high complexity and demands now being placed on
     the Internet”.




                                                               © Antônio M. Alberti 2010
Autonomic Communications
 (Dobson et al., 2006):
    “... rethinking of communication, networking, and distributed
     computing paradigms to face the increasing complexities.”

    Context awareness and semantics → important to improve
     network operation.




                                                              © Antônio M. Alberti 2010
Autonomic Communications
 Requirements and Challenges (1/3):
    Self-awareness, Self-situation, Self-monitoring, Self-adjustment.

    Self-awareness → introspective to the own node status and
     capabilities, e.g. antenna, bandwidth, laser.

    Self-situation or environment-aware → sensing from RWI, e.g.
     primary operators in cognitive radio.

    Adequate self-situation → adequate reasoning in the control loop.




                                                             © Antônio M. Alberti 2010
Autonomic Communications
 Requirements and Challenges (2/3):
    Information contextualization → relevance, self-situation/self-
     awareness, sound reasoning.

    Cooperation → common objectives, self-management, self-
     emergent behavior, quality and scalability of information gathering,
     privacy, security.

    Stability → self-stable, i.e. to avoid instability.

    Detail level and timely sharing → Information needs to be
     collected, filtered and distributed to cooperating nodes, in the right
     time, with right context.



                                                                © Antônio M. Alberti 2010
Autonomic Communications
 Requirements and Challenges (3/3):
    Incomplete knowledge → part of the real world, c.f. cognitive
     informatics.




                                                             © Antônio M. Alberti 2010
Cognitive Radio
 Joseph Mitola III:
    Software Defined Radio (SDR) in 1991;
    and Cognitive Radio (CR) in 1999.


 Software Defined Radio (SDR):
    A radio where PHY signal processing is software-defined or even
     software based. It is capable to reconfigure its parameters and
     even functionalities.

 Cognitive Radio (CR):
    Reconfigurable SDR to assert operational decisions accordingly
     to the state of the radio environment as well as the available
     physical hardware capabilities.



                                                           © Antônio M. Alberti 2010
Cognitive Radio
 Requirements and Challenges (1/2):
    Opportunistically share radio spectrum → primary and secondary
     network operators/users.

    Dynamically manage access to the radio frequency spectrum.

    Sensing → constantly search for new bandwidth opportunities.

    Planning & Reasoning → When an opportunity is found, a
     decision must be made.

    Primary-users-aware → If a primary signal is detected, secondary
     transmission should stop to avoid interference.


                                                           © Antônio M. Alberti 2010
Cognitive Radio
 Requirements and Challenges (2/2):
    Cooperation → it helps:
       To avoid shadowing areas and other phenomena that can cause false
        opportunities detection as well as interference.
       To establish trustable networks in order to improve security.
       To avoid attackers.


    Autonomicity → reduces human interference, takes advantage of
     software platform, deals with repetitive tasks.




                                                                © Antônio M. Alberti 2010
4. Security, Privacy and Trust
 FI: Security, Privacy and Trust
 Research Projects




                                    © Antônio M. Alberti 2010
FI: Security, Privacy and Trust
 Requirements and Challenges (1/5):
    Built in or inherent;

    Current communication model (receive all) → consented
     communications, e.g. publish/subscribe paradigm;

    People must trust not only in the network, but also in its entities;

    Establishment of trusted networks → entities, services, users,
     hardware.




                                                                © Antônio M. Alberti 2010
FI: Security, Privacy and Trust
 Requirements and Challenges (2/5):
    How to evaluate trust and reputation?

    Reputation → monitoring and policing is necessary to determine
     trustworthiness of entities;

    Dependability → trusted parties need to be ascertained;

    Risk announcements → intuitive, contextualized dissemination;




                                                               © Antônio M. Alberti 2010
FI: Security, Privacy and Trust
 Requirements and Challenges (3/5):
    Relationships → identities, trust relations, credentials, reputation;

    Privacy → To help users to protect and preserve their privacy;

    Anonymity and accountability → relation to governments and
     cyber laws;

    Tussle networking (Clark) → contradictory requirements,
     evolvability, tussle accommodation;




                                                                © Antônio M. Alberti 2010
FI: Security, Privacy and Trust
 Requirements and Challenges (4/5):
    To identify, assess, monitor, analyze and sort risks, vulnerabilities
     and threats;

    Management of identities, credentials and reputation is required;

    Autonomicity → to manage complexity of security, privacy, trust,
     dependability, decision, risk, etc.;

    Self-awareness, situation awareness and semantics of
     contextualized information are also requirements;

    What about the role of standardization/regulation?



                                                                © Antônio M. Alberti 2010
FI: Security, Privacy and Trust
 Requirements and Challenges (5/5):
    Huge amount of data?

    (X-ETP, 2010):
       Multi-domains, multi-level;
       Protection of credentials and ID-management;


    To include legal issues on the network?

    Proactive → distributed massive attacks and unpredicted
     vulnerabilities and threats;




                                                           © Antônio M. Alberti 2010
5. Services and Applications
 Service-centric Approaches
 Internet of Services
 Benefits for Users
 Digital Business Ecosystems




                                © Antônio M. Alberti 2010
Service-centric Approaches
 Software design → changing from component-based to service
  oriented design: service-centrism.
    E.g. SOA (Service Oriented Architecture).


 The idea → applications are flexibly and dynamically
  constructed by the composition of distributed software services
  or utilities.

  Dependability will be a                                        Scalability and cross-domain
  problem and will require
                                            App
                                                                 operation will be needed.
  appropriate treatment.               S8         S9
                                  S7        S6         S5
                             S4        S3         S2        S1


         Basic building blocks become available to compose other services.
                                                                                       © Antônio M. Alberti 2010
Service-centric Approaches
 Requirements and Challenges (1/3):
    Life-cycling → dynamic, distributed and cross-domain;

    Seamless → service describing, publishing, discovering and
     negotiating will be necessary;

    How to search, discover and select candidate services?

    Which atributes are representative? Context? Semantic?

    How to make attributes searchable? Publishing in divulgation
     services?




                                                              © Antônio M. Alberti 2010
Service-centric Approaches
 Requirements and Challenges (2/3):
    Negotiation → necessary to establish SLAs (Service Level
     Agreements);

    Admission control → is there available resources to attach the
     desired service to one more application?

    Admission installation → proceeds to configure the services;

    Service monitoring, logging and exception handling;

    Management → Autonomicity?




                                                            © Antônio M. Alberti 2010
Service-centric Approaches
 Requirements and Challenges (3/3):
    Self-Adaptation → changes in application/business:
         Inclusion or elimination of participating services;
         SLAs adequacy;
         Context and semantics;
         Rules, objectives, goals;
         Business processes adequacy.


    Turn off → application resources release;




                                                                © Antônio M. Alberti 2010
Internet of Services
 Above a certain level of abstraction everything can be viewed as
  a service → Internet of Services.

 (Villasante, 2009):
    “Internet of Services – Supporting the service economy (70% of
     GDP in modern societies)”.

 (Cross-ETP, 2009):
    “The term Internet of Services is an umbrella term to describe
     several interacting phenomena that will shape the future of how
     services are provided and operated on the Internet”.




                                                            © Antônio M. Alberti 2010
Digital Business Ecosystems
 Dynamic service compose-ability → integrate business
  processes with applications and services, creating the so called
  Digital Business Ecosystems (DBEs).

 DBEs → the new savannah.




                                                         © Antônio M. Alberti 2010
6. Simplicity, Sustainability and Evolvability
 Simplicity
 Sustainability
 Evolvability




                                                 © Antônio M. Alberti 2010
Simplicity
 To call attention on how difficult it is to design with simplicity we
  can evoke Leonardo Da Vinci’s:
    “Simplicity is the ultimate sophistication”.

 Or as Einstein said:
    "Make everything as simple as possible, but no simpler.“


 Simplification of integrated technologies is one of the concerns
  in Japanese Akari project.




                                                             © Antônio M. Alberti 2010
Sustainability
 Sustainability can be defined as the property of maintaining a
  certain level/situation in the course of time.

 Akari also aims to project a sustainable network, capable to
  evolve and support information society requirements in the next
  decades.




                                                         © Antônio M. Alberti 2010
Evolvability
 Evolvability is a definition related to biological systems.

 (Rowe & Leaney, 1997):
    “the ability of a system to adapt in response to changes in its
     environment, requirements and implementation technologies.”


 Accommodating tussles → A tool for evolvability




                                                             © Antônio M. Alberti 2010
7. Artificial Intelligence and Other Bio-inpired ICT
 AGI
 Bio-inspired ICT




                                                       © Antônio M. Alberti 2010
AGI
 (Wang)(Kurzweil, 2005)(Dartmouth Meeting, 1956):
    Artificial Intelligence (AI) came up with the idea of building thinking
     machines similar to humans.


 (Kurzweil, 2005):
    Due to various issues, this did not happen. The expectations were
     too high and incorrectly timed.

 “AI winter” → many companies failed in 80 years because
  profits did not materialized.

 “narrow AI” → scope changed to domain-specific problems.



                                                                © Antônio M. Alberti 2010
AGI
 Little value → devalue the “narrow AI” success achieved on last
  decades.

 (Wang):
    “narrow AI” segmentation → led to research fragmentation and
     loss of identity.

    AI rarely gets the credit for their accomplishments.

    Since 2004 → interest for general-purpose AI research is back.

    “AGI research treats "intelligence" as a whole.



                                                            © Antônio M. Alberti 2010
AGI
 AGI vs. FI?
    Cognitive aspects → need more than specific AI, possibly
     requiring results from AGI.

    Examples: cognitive radio networks, digital ecosystems, virtual
     entities, applications and services orquestration, semantics and
     contextualization, etc.

    "narrow AI?" → continues to have a role in specific aspects.




                                                             © Antônio M. Alberti 2010
Bio-inspired ICT
 Some inovative bio-inspired approaches for ICT:
      Artificial Life
      Digital Evolution
      Digital Ecosystems
      Evolvable Hardware
      Artificial Embryogeny
      Artificial Immune Systems
      Swarm Intelligence
      Social Insects
      Brain Inspired ICT
      Bio-Chemistry ICT
      Molecular Scale Networks




                                                    © Antônio M. Alberti 2010
Thank You!
Antônio Marcos Alberti
 antonioalberti.blogspot.com




                               © Antônio M. Alberti 2010
References
 Kurzweil R (2005) The Singularity is Near: When Humans
  Transcend Biology, Viking Press, ISBN 0670033847.

 Saracco R (2009) Telecommunications Evolution: The Fabric of
  Ecosystems. Revista Telecomunicações INATEL 12(2):36-45.

 Akari (2008) New Generation Network Architecture AKARI
  Conceptual Design. Project Description v1.1.

 Cross-ETP (2009) The Cross-ETP Vision Document. European
  Technology Platforms (ETPs) Cross Vision Document v1.0.




                                                     © Antônio M. Alberti 2011
References
 Presser M, Daras P, Baker M, Karnouskos S, Gluhak A, Krco S,
  Diaz C, Verbauwhede I, Naqvi S, Alvarez F, Fernandez-Cuesta
  A (2008) Real World Internet Position Paper.

 Peterson L, Anderson T, Culler D, Roscoe T (2003) A Blueprint
  for Introducing Disruptive Technology into the Internet.
  SIGCOMM Computer Comm. Review 33(1):59-64.

 Peterson L, Shenker S, Turner J (2005) Overcoming the
  Internet Impasse through Virtualization. IEEE Computer 38(4):
  34-41.

 GENI (2006) Technical Document on Wireless Virtualization.
  Global Environment for Network Innovations (GENI) Technical
  Report GDD-06-17.

                                                       © Antônio M. Alberti 2011
References
 Jacobson V, Content-Centric Networking, Future Internet
  Assembly (FIA), Valencia, Spain, 2010.

 Rothenberg CE, Verdi FL, Magalhaes, M (2008) Towards a New
  Generation of Information-Oriented Internetworking
  Architectures. Re-Architecting the Internet, Madrid, Spain.

 Berners-Lee T, Hendler J, Lassila O (1999) The Semantic Web.
  Scientific American Magazine 23(1).

 Alberti A, (2010) Future Network Architectures: Technological
  Challenges and Trends, New Network Architectures: The Path
  to the Future Internet. Book Chapter. Springer-Verlag GmbH.
  DOI: 10.1007/978-3-642-13247-6_5. 2010.

                                                       © Antônio M. Alberti 2010
References
 Jacobson V, Smetters D, Thornton J, Plass M, Briggs N,
  Braynard R (2009) Networking Named Content. CoNEXT’09,
  Rome, Italy.

 Ahlgren B, D’Ambrosio M, Dannewitz C, Marchisio M, Marsh I,
  Ohlman B, Pentikousis K, Rembarz R, Strandberg O, Vercellone
  V (2008) Design Considerations for a Network of In-formation.
  Re-Architecting the Internet, Madrid, Spain.

 Tarkoma S, Ain M, Visala K (2009) The Publish/Subscribe
  Internet Routing Paradigm (PSIRP): Designing the Future
  Internet Architecture. Towards the Future Internet, IOS Press.

 4WARD (2010) Architecture and Design for the Future Internet:
  Second NetInf Architecture Description. Deliverable D6.2.
                                                         © Antônio M. Alberti 2010
References
 Ohlman B, Ahlgren B, et al. (2010) Networking of Information:
  An Information-centric Approach to the Network of Future. ETSI
  Future Network Technologies Workshop.

 Niebert N (2008) Vision on Future Content Networks: A
  Networks and Media Joint Venture. Future Internet Assembly
  (FIA), Madrid, Spain.

 Paulson LD (2003) News Briefs - W3C Works on Semantic Web
  Proposal. Computer Magazine 36(11):20

 Fensel D (2007) ServiceWeb 3.0. IEEE/WIC/ACM International
  Conf. on Intelligent Agent Technology, Fremont, USA.


                                                       © Antônio M. Alberti 2010
References
 Baker N, Zafar M, Moltchanov B, Knappmeyer M (2009)
  Context-Aware Systems and Implications for Future Internet,
  Towards the Future Internet, IOS Press.

 Bicocchi N, Baumgarten M, Brgulja N, Kusber R, Mamei M,
  Mulvenna M, Zambonelli F (2010) Self-Organized Data
  Ecologies for Pervasive Situation-Aware Services: The
  Knowledge Networks Approach, IEEE Transactions on Systems,
  Man and Cybernetics – Part A: System and Humans, Vol. 40,
  No. 4.

 Dey A, Abowd D (2000) Towards a better understanding of
  context and context-awareness, Proc. ACM Conf. Human
  Factors Comput. Syst.—What, Who, Where, When and How of
  Context-Awareness, Hague, The Netherlands.
                                                       © Antônio M. Alberti 2010
References
 Zimmermann A et al. (2005) Personalization and Context
  Management, User Modeling and User-Adapted Interaction 15,
  3-4, pp. 275-302.

 Giunchiglia F (1992) Contextual Reasoning, Trento, Italy.

 Wang P (2004) Experience-Grounded Semantics: A theory for
  intelligent systems, Preprint submitted to Elsevier Science.

 Gruber T (1993) A Translation Approach to Portable Ontology
  Specifications. Knowledge Acquisition, 5:199–220.

 TripCom (2008) Ontology of EDIFACT Syntax and Semantics,
  Deliverable D7.2.

                                                        © Antônio M. Alberti 2010
References
 Ben Yahia I, Bertin E, Crespi N (2007) Ontology-based
  Management Systems for the Next Generation Services: State-
  of-the-Art, presented in Networking and Services, 2007. ICNS
  Third International Conference and published in IEEE
  Transaction.

 Clark D, Partridge C, Ramming C, Wroclawski J (2003) A
  knowledge plane for the Internet, Proc. ACM SIGCOMM Conf.,
  Karlsruhe, Germany, pp. 3–10.

 Siekkinen M, et al. (2007) Beyond the Future Internet –
  Requirements of Autonomic Networking Architectures to
  Address Long Term Future Networking Challenges, 11th IEEE
  International Workshop on Future Trends of Distributed
  Computing Systems (FTDCS'07).
                                                     © Antônio M. Alberti 2010
References
 Strassner J, (2008) The Role of Autonomic Networking in
  Cognitive Networks, Cognitive Networks: Towards Self-Aware
  Networks. John Wiley and Sons, Book Chapter 23-52.




                                                   © Antônio M. Alberti 2010
References
 Jelger C (2009) Information Dispatch Points, NetArch
  Symposium Presentation, Ascona, Switzerland.

 Pollock J, Hodgson R (2004) Adaptive information: improving
  business through semantic interoperability, grid computing, and
  enterprise integration, John Wiley and Sons.




                                                         © Antônio M. Alberti 2010
References
 Kephart JO, Chess DM (2003) The Vision of Autonomic
  Computing. IEEE Computer Magazine 36(1):41-50.

 Dobson S, Sterritt R, Nixon P, Hinchey M (2010) Fulfilling the
  Vision of Autonomic Computing. Computer Magazine 43(1):
  35-41;

 Clark D, Partridge C, Ramming J, Wroclawski J (2003) A
  Knowledge Plane for the Internet. Proc. of the Conference on
  Applications, Technologies, Architectures, and Protocols for
  Computer Comm., Karlsruhe, Germany;

 Smirnov M (2004) Autonomic Communication: Research
  Agenda for a New Communications Paradigm. Fraunhofer
  FOKUS technical Report;
                                                         © Antônio M. Alberti 2010
References
 Dobson S, Denazis S, Fernández A, Gaïti D, Gelenbe E,
  Massacci F, Nixon P, Saffre F, Schmidt N, Zambonelli F, (2006)
  A Survey of Autonomic Communications. ACM Transactions on
  Autonomous and Adaptive Systems 1(2):223-259.

 Sterritt R, Bustard D W, (2003), Autonomic Computing—A
  Means of Achieving Dependability?, Proc. 10th IEEE Int’l Conf.
  and Workshop on the Eng. of Computer-Based Systems
  (ECBS 2003), IEEE Press:247-251.

 Chaparadza R, (2010), Can Autonomicity help Migration, and
  what could be a possible Evolution Path?, FIA‐GHENT:
  Migration Session, December 2010.


                                                       © Antônio M. Alberti 2010
References
 Cross-ETP (2009) The Cross-ETP Vision Document. European
  Technology Platforms (ETPs), Cross Vision Document v1.0.

 Clarke J (2008) Trust & Identity in the Future Internet,
  Presentation at FIA.

 X-ETP (2010) Future Internet Strategic Research Agenda,
  Version 1.1.

 PICOS (2008) Taxonomy, Deliverable D2.1 Version 1.0.

 RFC 4949 (2000), Internet Security Glossary, IETF Request for
  Comments 2828.

                                                             © Antônio M. Alberti 2010
References
 Chaum D (1985) Security without Identification: Transaction
  Systems to make Big Brother Obsolete, Communications of the
  ACM 28/10 1030-1044.

 Avizienis A, Laprie J, Randell B, Landwehr C, Basic concepts
  and taxonomy of dependable and secure computing, IEEE
  Transactions on Dependable and Secure Computing 1 (1).

 Pfitzmann A, Hansen M (2010), A terminology for talking about
  privacy by data minimization: Anonymity, Unlinkability,
  Undetectability, Unobservability, Pseudonymity, and Identity
  Management, Available online at http://dud.inf.tu-dresden.de/
  Anon_Terminology.shtml/.


                                                       © Antônio M. Alberti 2010
References
 Fischer-Hübner S, Hedbom H (2008) D14.1.c – PRIME
  Framework V3. Public Project Deliverable.

 Luhmann, N (1979) Trust and Power, Chichester, Wiley.

 RISEPTIS (2009) Trust in the Information Society, Report of the
  Research and Innovation for SEcurity, Privacy and
  Trustworthiness in the Information Society.

 Campolargo, M (2010) Trust in the Information Society,
  Presentation at “Trust in the Information Society” Conference.




                                                         © Antônio M. Alberti 2010
References
 European Commission, “The Future of the Internet: A
  Compendium of European Projects on ICT Research Supported
  by the EU 7th Framework Programme for RTD”, 2008.

 Pedrinaci, C., “Lightweight Semantic Annotations for Services
  on the Web”, SSAIE 2009.

 Ristol, S., “Enabling a Web of Billions of Services”, SW 2009.

 S-Cube, “The S-Cube Book”, August 2010.

 De Panfilis, S., "FISO architecture of the Future Internet", FIA
  Workshop– FISO Session May 2009.

                                                           © Antônio M. Alberti 2010
References
 Gittler, F, "NEXOF: An Approach for Service‐based System
  Architectures", 2nd International SOA Symposium, October
  2009.

 Pasic, A., “Delivering Building Blocks for Internet of Services:
  Trust, Security, Privacy and Dependability”, Book Chapter, New
  Network Architectures, 2010.

 Benko, B. K., “Autonomic Communication Elements
  and the ACE Toolkit”, ACE Toolkit tutorial, Milan, November
  2008.

 Baresi, L., Di Ferdinando, A., Manzalini, A., Zambonelli, F., “The
  CASCADAS Framework for Autonomic Communications”,
  Autonomic Communication, Springer, Heidelberg, 2009.
                                                          © Antônio M. Alberti 2010
References
 Rowe D, Leaney JR (1997) Evaluating evolvability of computer
  based systems architectures - an ontological approach”, Proc.
  International Conference on the Engineering of Computer
  Based Systems, 1997.




                                                       © Antônio M. Alberti 2010
References
 Wang P Artificial General Intelligence: A Gentle Introduction,
  Available online at: http://sites.google.com/site/narswang/home/agi-
   introduction/


 Kurzweil R (2005) The Singularity is Near: When Humans
  Transcend Biology, Viking Press, ISBN 0670033847.

 Dartmouth Meeting (1956) A Proposal for the Dartmouth
  Summer Research Project on Artificial Intelligence, Dartmouth
  College in Hanover, New Hampshire, Available online at: http://
   www-formal.stanford.edu/jmc/history/dartmouth/dartmouth.html/


 Langton C What is Artificial Life?, Available online at http://
   www.biota.org/papers/cglalife.html/


                                                                   © Antônio M. Alberti 2010
References
 McKinley P, Cheng B, Ofria C, Knoester D, Beckmann B,
  Goldsby H (2008) Harnessing Digital Evolution, IEEE Computer
  Magazine.

 Nachira F (2006) How ICT research supports Innovation
  Ecosystems and SMEs, UEAPME workshop.

 Briscoe G, De Wilde P (2006) Digital Ecosystems: Evolving
  Service-Orientated Architectures, Proceedings of the 1st
  international conference on Bio inspired models of network,
  information and computing systems.




                                                        © Antônio M. Alberti 2010
References
 Tempesti G, Mange D, Mudry P, Rossier J, Stauffer A (2007)
  Self-Replicating Hardware for Reliability: The Embryonics
  Project, ACM Journal on Emerging Technologies in Computing
  Systems (JETC), Vol. 3 Issue 2.

 Guedj D (2010) Future and Emerging Technologies Proactive
  Initiatives in FP7 call 6, Information Day, ICT Call 6 Brussels.




                                                           © Antônio M. Alberti 2010

Contenu connexe

Tendances

Measurable Security in Mobile Systems
Measurable Security in Mobile SystemsMeasurable Security in Mobile Systems
Measurable Security in Mobile SystemsJosef Noll
 
Masterthesis/Masteroppgaver at UNIK
Masterthesis/Masteroppgaver at UNIKMasterthesis/Masteroppgaver at UNIK
Masterthesis/Masteroppgaver at UNIKJosef Noll
 
Intermediate project by harsha
Intermediate project by harshaIntermediate project by harsha
Intermediate project by harshaHARSHA DURUGOJI
 
Ubiquitous computing
Ubiquitous computing Ubiquitous computing
Ubiquitous computing Govind Raj
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computingu065932
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive ComputingAnkita Gupta
 
seminar report on ambient intelligent
seminar report on ambient intelligentseminar report on ambient intelligent
seminar report on ambient intelligentAnkita Srivastava
 
Ubiquitous networking
Ubiquitous networkingUbiquitous networking
Ubiquitous networkingAashish Jain
 
Ubiquitous computing Paper
 Ubiquitous computing Paper Ubiquitous computing Paper
Ubiquitous computing PaperAssem mousa
 
Ubiquitous Computing and AmI Smart Environments
Ubiquitous Computing and AmI Smart EnvironmentsUbiquitous Computing and AmI Smart Environments
Ubiquitous Computing and AmI Smart EnvironmentsJosephHowerton
 
Ieee pimrc 2011 M2M challenges - WWRF - exalted
Ieee pimrc 2011   M2M challenges - WWRF - exaltedIeee pimrc 2011   M2M challenges - WWRF - exalted
Ieee pimrc 2011 M2M challenges - WWRF - exaltedThierry Lestable
 
Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Arpan Patel
 
Ubiquitous Computing, Ubiquitous Services
Ubiquitous Computing, Ubiquitous ServicesUbiquitous Computing, Ubiquitous Services
Ubiquitous Computing, Ubiquitous ServicesIan Miles
 
Towards Abundant Do-it-Yourself (DiY) Service Creativity in the Internet-of-T...
Towards Abundant Do-it-Yourself (DiY) Service Creativity in the Internet-of-T...Towards Abundant Do-it-Yourself (DiY) Service Creativity in the Internet-of-T...
Towards Abundant Do-it-Yourself (DiY) Service Creativity in the Internet-of-T...trappenl
 
Ubiquitous computing abstract
Ubiquitous computing abstractUbiquitous computing abstract
Ubiquitous computing abstractPriti Punia
 
Ppt perkembangan-teknologi-informasi-abad-21-08-1996
Ppt perkembangan-teknologi-informasi-abad-21-08-1996Ppt perkembangan-teknologi-informasi-abad-21-08-1996
Ppt perkembangan-teknologi-informasi-abad-21-08-1996Ricky Gaskinz
 
Ubiquitous Computing: Privacy Issues
Ubiquitous Computing: Privacy IssuesUbiquitous Computing: Privacy Issues
Ubiquitous Computing: Privacy IssuesHongseok Kim
 

Tendances (20)

Measurable Security in Mobile Systems
Measurable Security in Mobile SystemsMeasurable Security in Mobile Systems
Measurable Security in Mobile Systems
 
Masterthesis/Masteroppgaver at UNIK
Masterthesis/Masteroppgaver at UNIKMasterthesis/Masteroppgaver at UNIK
Masterthesis/Masteroppgaver at UNIK
 
Intermediate project by harsha
Intermediate project by harshaIntermediate project by harsha
Intermediate project by harsha
 
Ubiquitous computing
Ubiquitous computing Ubiquitous computing
Ubiquitous computing
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
seminar report on ambient intelligent
seminar report on ambient intelligentseminar report on ambient intelligent
seminar report on ambient intelligent
 
Ubiquitous networking
Ubiquitous networkingUbiquitous networking
Ubiquitous networking
 
Ubiquitous computing Paper
 Ubiquitous computing Paper Ubiquitous computing Paper
Ubiquitous computing Paper
 
Ubiquitous Computing and AmI Smart Environments
Ubiquitous Computing and AmI Smart EnvironmentsUbiquitous Computing and AmI Smart Environments
Ubiquitous Computing and AmI Smart Environments
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Ieee pimrc 2011 M2M challenges - WWRF - exalted
Ieee pimrc 2011   M2M challenges - WWRF - exaltedIeee pimrc 2011   M2M challenges - WWRF - exalted
Ieee pimrc 2011 M2M challenges - WWRF - exalted
 
Ubiquitous networking
Ubiquitous networkingUbiquitous networking
Ubiquitous networking
 
Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Ubiquitous computing presentation 2
Ubiquitous computing presentation 2
 
Ubiquitous Computing, Ubiquitous Services
Ubiquitous Computing, Ubiquitous ServicesUbiquitous Computing, Ubiquitous Services
Ubiquitous Computing, Ubiquitous Services
 
Towards Abundant Do-it-Yourself (DiY) Service Creativity in the Internet-of-T...
Towards Abundant Do-it-Yourself (DiY) Service Creativity in the Internet-of-T...Towards Abundant Do-it-Yourself (DiY) Service Creativity in the Internet-of-T...
Towards Abundant Do-it-Yourself (DiY) Service Creativity in the Internet-of-T...
 
Ubiquitous computing abstract
Ubiquitous computing abstractUbiquitous computing abstract
Ubiquitous computing abstract
 
Ppt perkembangan-teknologi-informasi-abad-21-08-1996
Ppt perkembangan-teknologi-informasi-abad-21-08-1996Ppt perkembangan-teknologi-informasi-abad-21-08-1996
Ppt perkembangan-teknologi-informasi-abad-21-08-1996
 
Ubiquitous Computing: Privacy Issues
Ubiquitous Computing: Privacy IssuesUbiquitous Computing: Privacy Issues
Ubiquitous Computing: Privacy Issues
 

Similaire à Future Internet Tutorial - Requirements and Challenges - IWT 2011

Internet das Coisas e o Paradigma Software-Defined Everything (SDE)
Internet das Coisas e o Paradigma Software-Defined Everything (SDE)Internet das Coisas e o Paradigma Software-Defined Everything (SDE)
Internet das Coisas e o Paradigma Software-Defined Everything (SDE)Antonio Marcos Alberti
 
IoT Challenges: Technological, Business and Social aspects
IoT Challenges: Technological, Business and Social aspectsIoT Challenges: Technological, Business and Social aspects
IoT Challenges: Technological, Business and Social aspectsRoberto Minerva
 
Complexity in Future Networks (A. Manzalini)
Complexity in Future Networks (A. Manzalini)Complexity in Future Networks (A. Manzalini)
Complexity in Future Networks (A. Manzalini)Antonio Manzalini
 
Harbor Research - Designing Security for the Internet of Things & Smart Devices
Harbor Research - Designing Security for the Internet of Things & Smart DevicesHarbor Research - Designing Security for the Internet of Things & Smart Devices
Harbor Research - Designing Security for the Internet of Things & Smart DevicesHarbor Research
 
The Five forces that shape StrategyRivalry among existing co
The Five forces that shape StrategyRivalry among existing coThe Five forces that shape StrategyRivalry among existing co
The Five forces that shape StrategyRivalry among existing cocarmanl5wisc
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Global IoT Technology and Digital transformation
Global IoT Technology and Digital transformationGlobal IoT Technology and Digital transformation
Global IoT Technology and Digital transformationSANDEEP MITTAPALLY
 
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-thingssmall-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-thingsMeshDynamics
 
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMSEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMijwmn
 
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMSEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMijwmn
 
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMSEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMijwmn
 
Towards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud ServicesTowards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud Servicesijsptm
 
Tutorial on Internet of Thing (IoT) Paradigm in Consumer Applications
Tutorial on Internet of Thing (IoT) Paradigm in Consumer ApplicationsTutorial on Internet of Thing (IoT) Paradigm in Consumer Applications
Tutorial on Internet of Thing (IoT) Paradigm in Consumer ApplicationsRaffaele Giaffreda
 
Telecom trends 261112
Telecom trends 261112Telecom trends 261112
Telecom trends 261112Sharon Rozov
 
Internet of Everything
Internet of EverythingInternet of Everything
Internet of EverythingShubham Vyas
 

Similaire à Future Internet Tutorial - Requirements and Challenges - IWT 2011 (20)

Internet das Coisas e o Paradigma Software-Defined Everything (SDE)
Internet das Coisas e o Paradigma Software-Defined Everything (SDE)Internet das Coisas e o Paradigma Software-Defined Everything (SDE)
Internet das Coisas e o Paradigma Software-Defined Everything (SDE)
 
IoT Challenges: Technological, Business and Social aspects
IoT Challenges: Technological, Business and Social aspectsIoT Challenges: Technological, Business and Social aspects
IoT Challenges: Technological, Business and Social aspects
 
What is the internet of things v3
What is the internet of things v3What is the internet of things v3
What is the internet of things v3
 
Complexity in Future Networks (A. Manzalini)
Complexity in Future Networks (A. Manzalini)Complexity in Future Networks (A. Manzalini)
Complexity in Future Networks (A. Manzalini)
 
PhD Admission Pitching
PhD Admission PitchingPhD Admission Pitching
PhD Admission Pitching
 
PERVASIVE COMPUTING
PERVASIVE COMPUTINGPERVASIVE COMPUTING
PERVASIVE COMPUTING
 
Harbor Research - Designing Security for the Internet of Things & Smart Devices
Harbor Research - Designing Security for the Internet of Things & Smart DevicesHarbor Research - Designing Security for the Internet of Things & Smart Devices
Harbor Research - Designing Security for the Internet of Things & Smart Devices
 
The Five forces that shape StrategyRivalry among existing co
The Five forces that shape StrategyRivalry among existing coThe Five forces that shape StrategyRivalry among existing co
The Five forces that shape StrategyRivalry among existing co
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
nptel-1.pdf
nptel-1.pdfnptel-1.pdf
nptel-1.pdf
 
Global IoT Technology and Digital transformation
Global IoT Technology and Digital transformationGlobal IoT Technology and Digital transformation
Global IoT Technology and Digital transformation
 
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-thingssmall-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
 
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMSEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
 
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMSEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
 
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMSEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM
 
Towards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud ServicesTowards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud Services
 
Tutorial on Internet of Thing (IoT) Paradigm in Consumer Applications
Tutorial on Internet of Thing (IoT) Paradigm in Consumer ApplicationsTutorial on Internet of Thing (IoT) Paradigm in Consumer Applications
Tutorial on Internet of Thing (IoT) Paradigm in Consumer Applications
 
Telecom trends 261112
Telecom trends 261112Telecom trends 261112
Telecom trends 261112
 
Internet of Everything
Internet of EverythingInternet of Everything
Internet of Everything
 
IOTCYBER
IOTCYBERIOTCYBER
IOTCYBER
 

Plus de Antonio Marcos Alberti

Convergência de Arquiteturas de Informação: 6G e Além
Convergência de Arquiteturas de Informação: 6G e AlémConvergência de Arquiteturas de Informação: 6G e Além
Convergência de Arquiteturas de Informação: 6G e AlémAntonio Marcos Alberti
 
Disrupções Tecnológicas e seus Impactos
Disrupções Tecnológicas e seus ImpactosDisrupções Tecnológicas e seus Impactos
Disrupções Tecnológicas e seus ImpactosAntonio Marcos Alberti
 
EMPREENDENDO A MUDANÇA EM REDE ABUNDANTE: COMO INTEGRAR TECNOLOGIA, METODOLO...
EMPREENDENDO A MUDANÇA EM REDE ABUNDANTE: COMO  INTEGRAR TECNOLOGIA, METODOLO...EMPREENDENDO A MUDANÇA EM REDE ABUNDANTE: COMO  INTEGRAR TECNOLOGIA, METODOLO...
EMPREENDENDO A MUDANÇA EM REDE ABUNDANTE: COMO INTEGRAR TECNOLOGIA, METODOLO...Antonio Marcos Alberti
 
Palestra Transformação Digital no The Developer Conferece (TDC) - Future
Palestra Transformação Digital no The Developer Conferece (TDC) - FuturePalestra Transformação Digital no The Developer Conferece (TDC) - Future
Palestra Transformação Digital no The Developer Conferece (TDC) - FutureAntonio Marcos Alberti
 
PILARES DA TRANSIÇÃO E CONVERGÊNCIA DE TECNOLOGIAS DISRUPTIVAS
PILARES DA TRANSIÇÃO E CONVERGÊNCIA DE TECNOLOGIAS DISRUPTIVASPILARES DA TRANSIÇÃO E CONVERGÊNCIA DE TECNOLOGIAS DISRUPTIVAS
PILARES DA TRANSIÇÃO E CONVERGÊNCIA DE TECNOLOGIAS DISRUPTIVASAntonio Marcos Alberti
 
CIDADES INTELIGENTES: TECNOLOGIAS, NOVOS MODELOS, SOLUÇÕES E DESAFIOS EM AB...
CIDADES INTELIGENTES: TECNOLOGIAS, NOVOS MODELOS, SOLUÇÕES E DESAFIOS EM AB...CIDADES INTELIGENTES: TECNOLOGIAS, NOVOS MODELOS, SOLUÇÕES E DESAFIOS EM AB...
CIDADES INTELIGENTES: TECNOLOGIAS, NOVOS MODELOS, SOLUÇÕES E DESAFIOS EM AB...Antonio Marcos Alberti
 
Inteligência Artificial na Transformação Digital de Smart Cities
Inteligência Artificial na Transformação Digital de Smart CitiesInteligência Artificial na Transformação Digital de Smart Cities
Inteligência Artificial na Transformação Digital de Smart CitiesAntonio Marcos Alberti
 
SDN, NFV AND CDN/ICN IN HIBRID TERRESTRIAL/SATELLITE 5G: WHAT IS MISSING?
SDN, NFV AND CDN/ICN IN HIBRID TERRESTRIAL/SATELLITE 5G: WHAT IS MISSING?SDN, NFV AND CDN/ICN IN HIBRID TERRESTRIAL/SATELLITE 5G: WHAT IS MISSING?
SDN, NFV AND CDN/ICN IN HIBRID TERRESTRIAL/SATELLITE 5G: WHAT IS MISSING?Antonio Marcos Alberti
 
Convergência de Tecnologias Disruptivas: IoT, IA, Blockchain, 5G e Internet d...
Convergência de Tecnologias Disruptivas: IoT, IA, Blockchain, 5G e Internet d...Convergência de Tecnologias Disruptivas: IoT, IA, Blockchain, 5G e Internet d...
Convergência de Tecnologias Disruptivas: IoT, IA, Blockchain, 5G e Internet d...Antonio Marcos Alberti
 
Convergência de Tecnologias Disruptivas
Convergência de Tecnologias DisruptivasConvergência de Tecnologias Disruptivas
Convergência de Tecnologias DisruptivasAntonio Marcos Alberti
 
FORWARDING/ROUTING WITH DUAL NAMES: THE NOVAGENESIS APPROACH
FORWARDING/ROUTING WITH DUAL NAMES: THE NOVAGENESIS APPROACHFORWARDING/ROUTING WITH DUAL NAMES: THE NOVAGENESIS APPROACH
FORWARDING/ROUTING WITH DUAL NAMES: THE NOVAGENESIS APPROACHAntonio Marcos Alberti
 
Internet das Coisas, Blockchain e NovaGenesis
Internet das Coisas, Blockchain e NovaGenesisInternet das Coisas, Blockchain e NovaGenesis
Internet das Coisas, Blockchain e NovaGenesisAntonio Marcos Alberti
 
FUTURE INTERNET OF THINGS: EXPERIMENTING WITH NOVAGENESIS AND VIRTUAL SENSORS...
FUTURE INTERNET OF THINGS: EXPERIMENTING WITH NOVAGENESIS AND VIRTUAL SENSORS...FUTURE INTERNET OF THINGS: EXPERIMENTING WITH NOVAGENESIS AND VIRTUAL SENSORS...
FUTURE INTERNET OF THINGS: EXPERIMENTING WITH NOVAGENESIS AND VIRTUAL SENSORS...Antonio Marcos Alberti
 
PROJETO NOVAGENESIS: A CRIAÇÃO DE UMA NOVA INTERNET
PROJETO NOVAGENESIS: A CRIAÇÃO DE UMA NOVA INTERNETPROJETO NOVAGENESIS: A CRIAÇÃO DE UMA NOVA INTERNET
PROJETO NOVAGENESIS: A CRIAÇÃO DE UMA NOVA INTERNETAntonio Marcos Alberti
 

Plus de Antonio Marcos Alberti (20)

6G
6G6G
6G
 
Convergência de Arquiteturas de Informação: 6G e Além
Convergência de Arquiteturas de Informação: 6G e AlémConvergência de Arquiteturas de Informação: 6G e Além
Convergência de Arquiteturas de Informação: 6G e Além
 
Disrupções Tecnológicas e seus Impactos
Disrupções Tecnológicas e seus ImpactosDisrupções Tecnológicas e seus Impactos
Disrupções Tecnológicas e seus Impactos
 
EMPREENDENDO A MUDANÇA EM REDE ABUNDANTE: COMO INTEGRAR TECNOLOGIA, METODOLO...
EMPREENDENDO A MUDANÇA EM REDE ABUNDANTE: COMO  INTEGRAR TECNOLOGIA, METODOLO...EMPREENDENDO A MUDANÇA EM REDE ABUNDANTE: COMO  INTEGRAR TECNOLOGIA, METODOLO...
EMPREENDENDO A MUDANÇA EM REDE ABUNDANTE: COMO INTEGRAR TECNOLOGIA, METODOLO...
 
Palestra Transformação Digital no The Developer Conferece (TDC) - Future
Palestra Transformação Digital no The Developer Conferece (TDC) - FuturePalestra Transformação Digital no The Developer Conferece (TDC) - Future
Palestra Transformação Digital no The Developer Conferece (TDC) - Future
 
NovaGenesis Overview
NovaGenesis OverviewNovaGenesis Overview
NovaGenesis Overview
 
NovaGenesis Overview
NovaGenesis OverviewNovaGenesis Overview
NovaGenesis Overview
 
NovaGenesis Overview
NovaGenesis OverviewNovaGenesis Overview
NovaGenesis Overview
 
PILARES DA TRANSIÇÃO E CONVERGÊNCIA DE TECNOLOGIAS DISRUPTIVAS
PILARES DA TRANSIÇÃO E CONVERGÊNCIA DE TECNOLOGIAS DISRUPTIVASPILARES DA TRANSIÇÃO E CONVERGÊNCIA DE TECNOLOGIAS DISRUPTIVAS
PILARES DA TRANSIÇÃO E CONVERGÊNCIA DE TECNOLOGIAS DISRUPTIVAS
 
CIDADES INTELIGENTES: TECNOLOGIAS, NOVOS MODELOS, SOLUÇÕES E DESAFIOS EM AB...
CIDADES INTELIGENTES: TECNOLOGIAS, NOVOS MODELOS, SOLUÇÕES E DESAFIOS EM AB...CIDADES INTELIGENTES: TECNOLOGIAS, NOVOS MODELOS, SOLUÇÕES E DESAFIOS EM AB...
CIDADES INTELIGENTES: TECNOLOGIAS, NOVOS MODELOS, SOLUÇÕES E DESAFIOS EM AB...
 
Inteligência Artificial na Transformação Digital de Smart Cities
Inteligência Artificial na Transformação Digital de Smart CitiesInteligência Artificial na Transformação Digital de Smart Cities
Inteligência Artificial na Transformação Digital de Smart Cities
 
SDN, NFV AND CDN/ICN IN HIBRID TERRESTRIAL/SATELLITE 5G: WHAT IS MISSING?
SDN, NFV AND CDN/ICN IN HIBRID TERRESTRIAL/SATELLITE 5G: WHAT IS MISSING?SDN, NFV AND CDN/ICN IN HIBRID TERRESTRIAL/SATELLITE 5G: WHAT IS MISSING?
SDN, NFV AND CDN/ICN IN HIBRID TERRESTRIAL/SATELLITE 5G: WHAT IS MISSING?
 
Convergência de Tecnologias Disruptivas: IoT, IA, Blockchain, 5G e Internet d...
Convergência de Tecnologias Disruptivas: IoT, IA, Blockchain, 5G e Internet d...Convergência de Tecnologias Disruptivas: IoT, IA, Blockchain, 5G e Internet d...
Convergência de Tecnologias Disruptivas: IoT, IA, Blockchain, 5G e Internet d...
 
Arte e Pensamento - Mundo Virtual
Arte e Pensamento - Mundo VirtualArte e Pensamento - Mundo Virtual
Arte e Pensamento - Mundo Virtual
 
Convergência de Tecnologias Disruptivas
Convergência de Tecnologias DisruptivasConvergência de Tecnologias Disruptivas
Convergência de Tecnologias Disruptivas
 
FORWARDING/ROUTING WITH DUAL NAMES: THE NOVAGENESIS APPROACH
FORWARDING/ROUTING WITH DUAL NAMES: THE NOVAGENESIS APPROACHFORWARDING/ROUTING WITH DUAL NAMES: THE NOVAGENESIS APPROACH
FORWARDING/ROUTING WITH DUAL NAMES: THE NOVAGENESIS APPROACH
 
OVERVIEW OF ICT LAB RESEARCH
OVERVIEW OF ICT LAB RESEARCHOVERVIEW OF ICT LAB RESEARCH
OVERVIEW OF ICT LAB RESEARCH
 
Internet das Coisas, Blockchain e NovaGenesis
Internet das Coisas, Blockchain e NovaGenesisInternet das Coisas, Blockchain e NovaGenesis
Internet das Coisas, Blockchain e NovaGenesis
 
FUTURE INTERNET OF THINGS: EXPERIMENTING WITH NOVAGENESIS AND VIRTUAL SENSORS...
FUTURE INTERNET OF THINGS: EXPERIMENTING WITH NOVAGENESIS AND VIRTUAL SENSORS...FUTURE INTERNET OF THINGS: EXPERIMENTING WITH NOVAGENESIS AND VIRTUAL SENSORS...
FUTURE INTERNET OF THINGS: EXPERIMENTING WITH NOVAGENESIS AND VIRTUAL SENSORS...
 
PROJETO NOVAGENESIS: A CRIAÇÃO DE UMA NOVA INTERNET
PROJETO NOVAGENESIS: A CRIAÇÃO DE UMA NOVA INTERNETPROJETO NOVAGENESIS: A CRIAÇÃO DE UMA NOVA INTERNET
PROJETO NOVAGENESIS: A CRIAÇÃO DE UMA NOVA INTERNET
 

Dernier

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Dernier (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Future Internet Tutorial - Requirements and Challenges - IWT 2011

  • 1. Future Internet: New Network Architectures and Technologies Part III - Requirements & Challenges Antônio Marcos Alberti © Antônio M. Alberti 2011
  • 2. Outline 1. Substrate Resources and Its Integration with Software 2. Information, ID/Loc Splitting, Semantic, Context and Mobility 3. Autonomic and Cognitive Technologies 4. Security, Privacy and Trust 5. Services and Applications 6. Simplicity, Sustainability and Evolvability 7. Artificial Intelligence and Other Bio-inspired ICT © Antônio M. Alberti 2011
  • 3. 1. Substrate Resources and Its Integration with Software  Technology Evolution  Capacity and Ubiquity  Internet of Things  Real World Internet  Virtualization © Antônio M. Alberti 2011
  • 4. Technology Evolution  Moore's Law:  Predicts technological developments in computing power.  (Kurzweil, 2005):  A theory for technological evolution – to describe the exponential growth of technological advances: The Law of Accelerated Returns © Antônio M. Alberti 2011
  • 5. Technology Evolution  The Law of Accelerating Returns: Two positive feedback loops 1. Selection of the more capable techniques of a certain stage to build the next stage – increases the rate of progress exponentially, reducing required time to obtain the same results. 2. Selected process becomes more attractive than others and begins to catalyze resources to it – starts to evolve even faster, experiencing an additional exponential growth over the 1st. Source: http://www.kurzweilai.net/the-law-of-accelerating-returns © Antônio M. Alberti 2011
  • 6. Capacity and Ubiquity  (Kurzweil, 2005):  Exponential growth trends for:  Memory capacity (DRAM in bits per dollar), microprocessor clock speed (Hz), transistors per chip, processor performance (MIPS), magnetic storage (bits per dollar), the number of hosts on the Internet.  (Saracco, 2009):  Consistent technological developments in:  Computing – is achieving teraflops right now and evolution proceeds to petaflops in the next decade.  Display technology – has advanced enormously in later years.  Consumer electronics, such as handsets, laptops, HDTVs, e-books, video games, GPSs, etc. © Antônio M. Alberti 2011
  • 7. Capacity and Ubiquity  Minnesota Internet Traffic Studies (MINTS):  Annual Internet traffic growth rates were about 50-60% in 2008 and about 40-50% in 2009.  The monthly Internet traffic was circa 7.5-12x1018 bytes or exabytes.  Japanese Akari project:  Traffic could increase 1.7 times per year in Japan in the next years, producing an expansion of 1000 times in 13 years.  We can expect a growth of roughly 30-100 times in the next decade. © Antônio M. Alberti 2011
  • 8. Capacity and Ubiquity  How to meet this demand?  Mobile Access: 4G, Cognitive Radio (CR).  Fixed Access: Fiber-To-The-Home (FTTH).  Core: State-of-art optical transmission and switching. © Antônio M. Alberti 2011
  • 9. Capacity and Ubiquity  The technological evolution leads to price reduction → Ubiquity.  More and more devices are becoming computationally capable and connected to the Internet (e.g. clothing, buildings).  Inexpensive computing → Ubiquitous Computing (smart environments and ambient intelligence). © Antônio M. Alberti 2011
  • 10. Internet of Things  Consequences of Ubiquitous Computing:  Connectivity anywhere, anytime, in anyplace, to anyone.  The rise of the NEDs (Network Enabled Devices) army.  The appearance of the Internet of Things (IoT) and Real World Internet (RWI). © Antônio M. Alberti 2011
  • 11. Internet of Things  Challenges and Requirements (1/3):  Exponential growth in the number of sensors collecting real world information → A flood of traffic on the network.  Real world could be increasingly integrated to the virtual one, making it possible to greatly increase the interaction between them.  Changes in real world objects could be reflected in virtual world – Changes made to virtual objects can become real.  User’s sensitive information will be collected, such as identity, location and other contextualized information. © Antônio M. Alberti 2011
  • 12. Internet of Things  Challenges and Requirements (2/3):  Flood of sensitive information → will push network scalability to new limits.  How to make this information safely available for innovative applications?  How to address billions of new nodes? Addressing and traceability to sensors and actuators, e.g. in the case of a fire.  Information needs to be contextualized to allow delivering to the right destiny, at the right time (information freshness). © Antônio M. Alberti 2011
  • 13. Internet of Things  Challenges and Requirements (3/3):  The need for energy-aware security → trust relations among nodes.  Semantic and context → smoke detector: fire or fireworks?  NEDs mobility → ID/Loc splitting.  Management and control → Autonomic technologies.  RWI as a sensorial system for Future Internet. © Antônio M. Alberti 2011
  • 14. Virtualization  Exponential growth → diffuse substrate of digital technologies composed by processing, storage, display and communication resources.  Much of the communication equipment today → become computers, with CPUs, Operating Systems, etc.  How to make this diffuse substrate of hardware resources transparently and uniformly available to software? © Antônio M. Alberti 2011
  • 15. Virtualization  The roles of virtualization on FI:  An elementary aspect of the architecture itself;  To enable simultaneous architectures over the physical SN, therefore creating a meta-architecture;  To support experimentation with new architectures;  To allow customizable service-aware networks, e.g. content- networks;  To allow “new business models for carriers and operators”, (Nakao, 2009), e.g. virtual service operators. © Antônio M. Alberti 2011
  • 16. Virtualization  My definition of network virtualization:  To create an abstraction (indirection) layer between network equipment (routers, switches and radios) and network software, such that communication resources can be used concurrently/ transparently/uniformly by different software instances.  It allows multiple Virtual Networks (VNs) to share the same Substrate Network (SN).  A virtual network has several of virtual nodes connected by physical and/or virtual links, thus forming a virtual topology. © Antônio M. Alberti 2011
  • 17. Virtualization  What we can do with such idea? Isolated Transitive Overlaid VN2 VN1 VN2 VN3 VN4 VN1 VN2 VN3 VN1 Substrate Network Substrate Network Substrate Network Fonte: Hiroaki Harai, Akari Project. © Antônio M. Alberti 2011
  • 18. Virtualization  Challenges and Requirements (1/2):  Scalability – How to support a large number of VNs?  Manageability – How to manage a large number of VNs? How to manage traffic?  Multidomain/Multioperator – How to interoperate VNs? How to span over multiple physical operators? Is it standardization required?  Selection/Admission/Routing – Virtual topology design and physical entities assignment are NP-hard problems. © Antônio M. Alberti 2011
  • 19. Virtualization  Challenges and Requirements (2/2):  Resources Exposure – How to describe resources?  Security, Trust and Privacy – Possible attacks, security risks, denial of service.  Mobility – How to move virtual entities?  Complexity – How to deal with the increasing complexity? Autonomicity? © Antônio M. Alberti 2011
  • 20. Virtualization  Is it possible to apply virtualization on wireless networks?  More difficult to be virtualized:  E.g. interference, shadowing, multipaths, multiple access and other aspects of the propagation environment.  These difficulties do not mean that radio resources aren’t an exception.  Software Defined Radio (SDR) can be seen as a radio where hardware resources are exposed and reconfigured by software. © Antônio M. Alberti 2011
  • 21. Virtualization  Some interesting things we can do with radio virtualization: Isolated Virtual MAC VMAC1 VMAC2 T1 T2 T3 PHY1 PHY2 Substrate Hardware Substrate Hardware © Antônio M. Alberti 2011 Transitive Generic MAC MAC T1 T2 T3 PHY1 PHY2 Substrate Hardware Substrate Hardware
  • 22. 2. Information, ID/Loc Splitting, Semantic, Context and Mobility  Information-centric Approches  ID/Loc Splitting  Generalized Mobility  Semantic, Context, Context-Awareness and Ontology  Semantic Web © Antônio M. Alberti 2010
  • 23. Information-Centric Approaches  Information as a key ingredient in design.  Information is in everywhere, i.e. contracts, location, police, IDs, descriptors, naming, etc. © Antônio M. Alberti 2010
  • 24. Information-Centrism  Requirements and Challenges (1/5):  To make information the center of design.  “Information is everything and everything is information” (PSIRP, 2009).  To represent persistently and consistently information by means of Information Objects (IOs), which contains:  Digital signatures, checksums, metadata, access rights, formats, ontology, etc.  To access information independently of its location.  To name contents (or its representation).  “Named content is a better abstraction for today’s communication problems than named hosts.” (Van Jacobson, 2009). © Antônio M. Alberti 2010
  • 25. Information-Centrism  Requirements and Challenges (2/5):  To adequately manage content → versioning, encodings, copies of identical content.  To use name resolution schemes to find out locators to named content.  To allow disruptive and consented communications, e.g. publish/ subscribe (pub/sub) paradigm.  To enable anycast and multi path routing of previously located information. To improve multicasting support.  To efficiently distribute content, customizing and improving Quality of Experience (QoE). © Antônio M. Alberti 2010
  • 26. Information-Centrism  Requirements and Challenges (3/5):  To cache information to improve performance and efficiency.  To enable efficient, semantic rich, context-based information search and manipulation.  To deal with information scope. “Policy is metadata. So is scope!”, PSIRP.  To deal with provenance, ontology and coherence as advocated by Van Jacobson @ FISS 2009.  To identify information uniquely. © Antônio M. Alberti 2010
  • 27. Information-Centrism  Requirements and Challenges (4/5):  To rethink security from the information point of view → securing information per se.  To explore self-certifying names → cryptographic hash function over the binary data.  To provide secure rendezvous among information producers and consumers.  To verify publisher privacy before content publishing – authenticate and authorize subscribers during rendezvous. © Antônio M. Alberti 2010
  • 28. Information-Centrism  Requirements and Challenges (5/5):  To solve indirections (ID/Loc) dynamically, efficiently, generically and robustly.  To deal with scalability on information representation, searching, naming resolution, location, routing, etc.  To deal with multi level, multi domain environments.  To autonomously manipulate content. © Antônio M. Alberti 2010
  • 29. ID/Loc Splitting  Future networks need to separate identifiers (ID) from locators (Loc) → the so called ID/Loc splitting.  This split is required not only for physical entities (e.g. hosts), but also for virtual entities as well as for content. © Antônio M. Alberti 2010
  • 30. ID/Loc Splitting  Requirements and Challenges (1/2):  To uniquely identify every entity in the network as well as information → They can be moved, searched and localized without change their identities.  How to generate unique digital identifiers for real or virtual entities?  How to manage IDs in order to provide generalized mobility for real or virtual entities?  How to deal with privacy, anonymity and traceability?  Unique IDs can provide information sources non-repudiation. © Antônio M. Alberti 2010
  • 31. ID/Loc Splitting  Requirements and Challenges (2/2):  How to use accountability information to prevent or to punish cyber crimes?  Traceability based on persistent IDs discourage network misuse.  How to manage the large number of IDs, their relationships and lifecycles?  There is a massive scalability problem here!  How to manage credentials and their relations to IDs?  Unique IDs enhances digital credentials.  How to discovery IDs of real or virtual entities? © Antônio M. Alberti 2010
  • 32. Generalized Mobility  General mobility means to comprehensively support user, terminal, service, application, virtual networks, information, and other real and virtual entities mobility. © Antônio M. Alberti 2010
  • 33. Semantic, Context, Context-Awareness and Ontology  Semantic  “Relating to meaning in language or logic”, Thesaurus Dictionary.  Context  (Giunchiglia, 1992) defines context as a “subset of the complete state of an individual that is used for reasoning about a given goal”.  Situation  (Baker et al., 2009): situation is a snapshot of related context information at a certain time and space. © Antônio M. Alberti 2010
  • 34. Semantic, Context, Context-Awareness and Ontology  Situation-Awareness  According to (Baker et al., 2009) “... being aware of its physical environment or situation and responding proactively and intelligently based on such awareness”.  Context-Awareness  To be aware of relevant contexts.  Ontology  For (TripCom, 2008) “an ontology is a formal definition of terminology and relationships among the terms in a computer- processable form”. © Antônio M. Alberti 2010
  • 35. Semantic, Context, Context-Awareness and Ontology  Requirements and Challenges:  Situation and Context Awareness → RWI as a source for situation and context information.  Autonomicity → To enable a system/application/artifact to adapts to environmental or goal changes → Ontologies for rules, goals, regulations, etc.  Context Distribution → Collaboration of context processing entities using the publish/subscribe paradigm. © Antônio M. Alberti 2010
  • 36. Semantic Web  (Berners-Lee, 1999):  Information meaning (semantic) + treatment = a web that can “understand” what entities want.  “We need to abstract from the syntax to semantics”.  It is an autonomous knowledge web, including context-aware applications and services composition. © Antônio M. Alberti 2010
  • 37. 3. Autonomic and Cognitive Technologies  Introduction  Autonomic Computing  Cognitive Computing  Autonomic Communications  Cognitive Radio © Antônio M. Alberti 2010
  • 38. Introduction  (Wang, 2009) classifies computer technologies and systems as:  Imperative → Based on Von Neumann architecture.  Autonomic → “Goal-driven and self-decision-driven technologies that do not rely on instructive and procedural information.”  Cognitive → “Implements computational intelligence by autonomous inferences and perceptions mimicking the mechanisms of the brain.” © Antônio M. Alberti 2010
  • 39. Autonomic Computing  Why autonomic computing?  Accelerated returns:  Boom in diversity, scale and complexity.  Human capability limitations:  Highly stressful job and deep sense of failure.  OPEX:  Human resources are expensive.  Rapid adaptation to the environment. © Antônio M. Alberti 2010
  • 40. Autonomic Computing  (IBM, 2001):  A famous manifesto → autonomic computing.  “Computing systems’ complexity appears to be approaching the limits of human capability”.  Bio-inspired → human autonomic nervous system governs various functions without our awareness.  Computational systems → manage themselves according to high- level objectives outlined by human operators.  Reduce human interference and OPEX. © Antônio M. Alberti 2010
  • 41. Autonomic Computing  (Kephart and Chess, 2001): 4 autonomic properties:  Self-Configuration - To configure components and the system itself to achieve high-level goals.  Self-Optimization - To optimize proactively system resources and other aspects in order to improve performance, efficiency, quality, etc.  Self-Healing - To detect, diagnose and repair localized problems and failures.  Self-Protection - To defend against attackers, threads or cascade failures. © Antônio M. Alberti 2010
  • 42. Autonomic Computing  Autonomic Managers:  Decentralized and cooperative.  Interact each other and with human operators to obtain the expected behavior for the system → self-emergent or “social” behavior.  Follows a bottom-up design approach, where basic functions cooperate to achieve top level goals.  Require gateways to managed resources.  Use communication resources to exchange obtained knowledge. © Antônio M. Alberti 2010
  • 43. Autonomic Computing  Monitor-Analyze-Plan-Execute-Knowledge (MAPE-K). Autonomic Manager Knowledge Monitor Analyze Plan Execute Managed Element Adapted from (Kephart and Chess, 2001). © Antônio M. Alberti 2010
  • 44. Autonomic Computing  (Dobson et al., 2010):  The most notable omission from IBM’s original vision is autonomous elements communication.  (Clark et al., 2003):  To incorporate more autonomy in communication networks, creating the so-called Knowledge Plane.  (Smirnov, 2004)  The idea of Situated and Autonomic Communication (SAC). © Antônio M. Alberti 2010
  • 45. Autonomic Computing  Requirements and Challenges (1/2):  (Sterrit and Bustard, 2003):  Self-awareness → aware of its internal states, skills, available/ unavailable resources  Self-situation → aware of the situation of the external environment.  Self-monitoring → automatically detect context changes in rules, goals and other information.  Self-adjustment → adapt appropriately to them.  (Dobson et al., 2010):  “Researchers have devised innovative autonomic solutions to individual problems, but the larger, more difficult task of combining these point solutions into autonomic systems remains.” → transcendence. © Antônio M. Alberti 2010
  • 46. Autonomic Computing  Requirements and Challenges (2/2):  (EURESCOM, 2009):  Operators environment → combine self-* properties in a gracefull and holistic way.  Interoperability → fundamental to deploy “open, end-to-end and heterogeneous autonomic features”. © Antônio M. Alberti 2010
  • 47. Cognitive Computing  (Wang et al., 2006):  Bioinpired → inference, perception and cognitive mechanisms of the human brain as defined in the Layered Reference Model of the Brain (LRMB).  (Wang et al., 2010):  Perspectives on AI (Artificial Intelligence), knowledge representation, machine learning, role-based social computing. © Antônio M. Alberti 2010
  • 48. Autonomic Communications  (Clark et al., 2003):  “to build a different sort of network that can assemble itself given high-level instructions, reassemble itself as requirements change, automatically discover when something goes wrong, and automatically fix a detected problem or explain why it cannot do so.”  (Smirnov, 2004):  “radical paradigm shift towards a self-organising, self-managing and context-aware autonomous network – considered in a technological, social and economic context – to respond to the increasingly high complexity and demands now being placed on the Internet”. © Antônio M. Alberti 2010
  • 49. Autonomic Communications  (Dobson et al., 2006):  “... rethinking of communication, networking, and distributed computing paradigms to face the increasing complexities.”  Context awareness and semantics → important to improve network operation. © Antônio M. Alberti 2010
  • 50. Autonomic Communications  Requirements and Challenges (1/3):  Self-awareness, Self-situation, Self-monitoring, Self-adjustment.  Self-awareness → introspective to the own node status and capabilities, e.g. antenna, bandwidth, laser.  Self-situation or environment-aware → sensing from RWI, e.g. primary operators in cognitive radio.  Adequate self-situation → adequate reasoning in the control loop. © Antônio M. Alberti 2010
  • 51. Autonomic Communications  Requirements and Challenges (2/3):  Information contextualization → relevance, self-situation/self- awareness, sound reasoning.  Cooperation → common objectives, self-management, self- emergent behavior, quality and scalability of information gathering, privacy, security.  Stability → self-stable, i.e. to avoid instability.  Detail level and timely sharing → Information needs to be collected, filtered and distributed to cooperating nodes, in the right time, with right context. © Antônio M. Alberti 2010
  • 52. Autonomic Communications  Requirements and Challenges (3/3):  Incomplete knowledge → part of the real world, c.f. cognitive informatics. © Antônio M. Alberti 2010
  • 53. Cognitive Radio  Joseph Mitola III:  Software Defined Radio (SDR) in 1991;  and Cognitive Radio (CR) in 1999.  Software Defined Radio (SDR):  A radio where PHY signal processing is software-defined or even software based. It is capable to reconfigure its parameters and even functionalities.  Cognitive Radio (CR):  Reconfigurable SDR to assert operational decisions accordingly to the state of the radio environment as well as the available physical hardware capabilities. © Antônio M. Alberti 2010
  • 54. Cognitive Radio  Requirements and Challenges (1/2):  Opportunistically share radio spectrum → primary and secondary network operators/users.  Dynamically manage access to the radio frequency spectrum.  Sensing → constantly search for new bandwidth opportunities.  Planning & Reasoning → When an opportunity is found, a decision must be made.  Primary-users-aware → If a primary signal is detected, secondary transmission should stop to avoid interference. © Antônio M. Alberti 2010
  • 55. Cognitive Radio  Requirements and Challenges (2/2):  Cooperation → it helps:  To avoid shadowing areas and other phenomena that can cause false opportunities detection as well as interference.  To establish trustable networks in order to improve security.  To avoid attackers.  Autonomicity → reduces human interference, takes advantage of software platform, deals with repetitive tasks. © Antônio M. Alberti 2010
  • 56. 4. Security, Privacy and Trust  FI: Security, Privacy and Trust  Research Projects © Antônio M. Alberti 2010
  • 57. FI: Security, Privacy and Trust  Requirements and Challenges (1/5):  Built in or inherent;  Current communication model (receive all) → consented communications, e.g. publish/subscribe paradigm;  People must trust not only in the network, but also in its entities;  Establishment of trusted networks → entities, services, users, hardware. © Antônio M. Alberti 2010
  • 58. FI: Security, Privacy and Trust  Requirements and Challenges (2/5):  How to evaluate trust and reputation?  Reputation → monitoring and policing is necessary to determine trustworthiness of entities;  Dependability → trusted parties need to be ascertained;  Risk announcements → intuitive, contextualized dissemination; © Antônio M. Alberti 2010
  • 59. FI: Security, Privacy and Trust  Requirements and Challenges (3/5):  Relationships → identities, trust relations, credentials, reputation;  Privacy → To help users to protect and preserve their privacy;  Anonymity and accountability → relation to governments and cyber laws;  Tussle networking (Clark) → contradictory requirements, evolvability, tussle accommodation; © Antônio M. Alberti 2010
  • 60. FI: Security, Privacy and Trust  Requirements and Challenges (4/5):  To identify, assess, monitor, analyze and sort risks, vulnerabilities and threats;  Management of identities, credentials and reputation is required;  Autonomicity → to manage complexity of security, privacy, trust, dependability, decision, risk, etc.;  Self-awareness, situation awareness and semantics of contextualized information are also requirements;  What about the role of standardization/regulation? © Antônio M. Alberti 2010
  • 61. FI: Security, Privacy and Trust  Requirements and Challenges (5/5):  Huge amount of data?  (X-ETP, 2010):  Multi-domains, multi-level;  Protection of credentials and ID-management;  To include legal issues on the network?  Proactive → distributed massive attacks and unpredicted vulnerabilities and threats; © Antônio M. Alberti 2010
  • 62. 5. Services and Applications  Service-centric Approaches  Internet of Services  Benefits for Users  Digital Business Ecosystems © Antônio M. Alberti 2010
  • 63. Service-centric Approaches  Software design → changing from component-based to service oriented design: service-centrism.  E.g. SOA (Service Oriented Architecture).  The idea → applications are flexibly and dynamically constructed by the composition of distributed software services or utilities. Dependability will be a Scalability and cross-domain problem and will require App operation will be needed. appropriate treatment. S8 S9 S7 S6 S5 S4 S3 S2 S1 Basic building blocks become available to compose other services. © Antônio M. Alberti 2010
  • 64. Service-centric Approaches  Requirements and Challenges (1/3):  Life-cycling → dynamic, distributed and cross-domain;  Seamless → service describing, publishing, discovering and negotiating will be necessary;  How to search, discover and select candidate services?  Which atributes are representative? Context? Semantic?  How to make attributes searchable? Publishing in divulgation services? © Antônio M. Alberti 2010
  • 65. Service-centric Approaches  Requirements and Challenges (2/3):  Negotiation → necessary to establish SLAs (Service Level Agreements);  Admission control → is there available resources to attach the desired service to one more application?  Admission installation → proceeds to configure the services;  Service monitoring, logging and exception handling;  Management → Autonomicity? © Antônio M. Alberti 2010
  • 66. Service-centric Approaches  Requirements and Challenges (3/3):  Self-Adaptation → changes in application/business:  Inclusion or elimination of participating services;  SLAs adequacy;  Context and semantics;  Rules, objectives, goals;  Business processes adequacy.  Turn off → application resources release; © Antônio M. Alberti 2010
  • 67. Internet of Services  Above a certain level of abstraction everything can be viewed as a service → Internet of Services.  (Villasante, 2009):  “Internet of Services – Supporting the service economy (70% of GDP in modern societies)”.  (Cross-ETP, 2009):  “The term Internet of Services is an umbrella term to describe several interacting phenomena that will shape the future of how services are provided and operated on the Internet”. © Antônio M. Alberti 2010
  • 68. Digital Business Ecosystems  Dynamic service compose-ability → integrate business processes with applications and services, creating the so called Digital Business Ecosystems (DBEs).  DBEs → the new savannah. © Antônio M. Alberti 2010
  • 69. 6. Simplicity, Sustainability and Evolvability  Simplicity  Sustainability  Evolvability © Antônio M. Alberti 2010
  • 70. Simplicity  To call attention on how difficult it is to design with simplicity we can evoke Leonardo Da Vinci’s:  “Simplicity is the ultimate sophistication”.  Or as Einstein said:  "Make everything as simple as possible, but no simpler.“  Simplification of integrated technologies is one of the concerns in Japanese Akari project. © Antônio M. Alberti 2010
  • 71. Sustainability  Sustainability can be defined as the property of maintaining a certain level/situation in the course of time.  Akari also aims to project a sustainable network, capable to evolve and support information society requirements in the next decades. © Antônio M. Alberti 2010
  • 72. Evolvability  Evolvability is a definition related to biological systems.  (Rowe & Leaney, 1997):  “the ability of a system to adapt in response to changes in its environment, requirements and implementation technologies.”  Accommodating tussles → A tool for evolvability © Antônio M. Alberti 2010
  • 73. 7. Artificial Intelligence and Other Bio-inpired ICT  AGI  Bio-inspired ICT © Antônio M. Alberti 2010
  • 74. AGI  (Wang)(Kurzweil, 2005)(Dartmouth Meeting, 1956):  Artificial Intelligence (AI) came up with the idea of building thinking machines similar to humans.  (Kurzweil, 2005):  Due to various issues, this did not happen. The expectations were too high and incorrectly timed.  “AI winter” → many companies failed in 80 years because profits did not materialized.  “narrow AI” → scope changed to domain-specific problems. © Antônio M. Alberti 2010
  • 75. AGI  Little value → devalue the “narrow AI” success achieved on last decades.  (Wang):  “narrow AI” segmentation → led to research fragmentation and loss of identity.  AI rarely gets the credit for their accomplishments.  Since 2004 → interest for general-purpose AI research is back.  “AGI research treats "intelligence" as a whole. © Antônio M. Alberti 2010
  • 76. AGI  AGI vs. FI?  Cognitive aspects → need more than specific AI, possibly requiring results from AGI.  Examples: cognitive radio networks, digital ecosystems, virtual entities, applications and services orquestration, semantics and contextualization, etc.  "narrow AI?" → continues to have a role in specific aspects. © Antônio M. Alberti 2010
  • 77. Bio-inspired ICT  Some inovative bio-inspired approaches for ICT:  Artificial Life  Digital Evolution  Digital Ecosystems  Evolvable Hardware  Artificial Embryogeny  Artificial Immune Systems  Swarm Intelligence  Social Insects  Brain Inspired ICT  Bio-Chemistry ICT  Molecular Scale Networks © Antônio M. Alberti 2010
  • 78. Thank You! Antônio Marcos Alberti antonioalberti.blogspot.com © Antônio M. Alberti 2010
  • 79. References  Kurzweil R (2005) The Singularity is Near: When Humans Transcend Biology, Viking Press, ISBN 0670033847.  Saracco R (2009) Telecommunications Evolution: The Fabric of Ecosystems. Revista Telecomunicações INATEL 12(2):36-45.  Akari (2008) New Generation Network Architecture AKARI Conceptual Design. Project Description v1.1.  Cross-ETP (2009) The Cross-ETP Vision Document. European Technology Platforms (ETPs) Cross Vision Document v1.0. © Antônio M. Alberti 2011
  • 80. References  Presser M, Daras P, Baker M, Karnouskos S, Gluhak A, Krco S, Diaz C, Verbauwhede I, Naqvi S, Alvarez F, Fernandez-Cuesta A (2008) Real World Internet Position Paper.  Peterson L, Anderson T, Culler D, Roscoe T (2003) A Blueprint for Introducing Disruptive Technology into the Internet. SIGCOMM Computer Comm. Review 33(1):59-64.  Peterson L, Shenker S, Turner J (2005) Overcoming the Internet Impasse through Virtualization. IEEE Computer 38(4): 34-41.  GENI (2006) Technical Document on Wireless Virtualization. Global Environment for Network Innovations (GENI) Technical Report GDD-06-17. © Antônio M. Alberti 2011
  • 81. References  Jacobson V, Content-Centric Networking, Future Internet Assembly (FIA), Valencia, Spain, 2010.  Rothenberg CE, Verdi FL, Magalhaes, M (2008) Towards a New Generation of Information-Oriented Internetworking Architectures. Re-Architecting the Internet, Madrid, Spain.  Berners-Lee T, Hendler J, Lassila O (1999) The Semantic Web. Scientific American Magazine 23(1).  Alberti A, (2010) Future Network Architectures: Technological Challenges and Trends, New Network Architectures: The Path to the Future Internet. Book Chapter. Springer-Verlag GmbH. DOI: 10.1007/978-3-642-13247-6_5. 2010. © Antônio M. Alberti 2010
  • 82. References  Jacobson V, Smetters D, Thornton J, Plass M, Briggs N, Braynard R (2009) Networking Named Content. CoNEXT’09, Rome, Italy.  Ahlgren B, D’Ambrosio M, Dannewitz C, Marchisio M, Marsh I, Ohlman B, Pentikousis K, Rembarz R, Strandberg O, Vercellone V (2008) Design Considerations for a Network of In-formation. Re-Architecting the Internet, Madrid, Spain.  Tarkoma S, Ain M, Visala K (2009) The Publish/Subscribe Internet Routing Paradigm (PSIRP): Designing the Future Internet Architecture. Towards the Future Internet, IOS Press.  4WARD (2010) Architecture and Design for the Future Internet: Second NetInf Architecture Description. Deliverable D6.2. © Antônio M. Alberti 2010
  • 83. References  Ohlman B, Ahlgren B, et al. (2010) Networking of Information: An Information-centric Approach to the Network of Future. ETSI Future Network Technologies Workshop.  Niebert N (2008) Vision on Future Content Networks: A Networks and Media Joint Venture. Future Internet Assembly (FIA), Madrid, Spain.  Paulson LD (2003) News Briefs - W3C Works on Semantic Web Proposal. Computer Magazine 36(11):20  Fensel D (2007) ServiceWeb 3.0. IEEE/WIC/ACM International Conf. on Intelligent Agent Technology, Fremont, USA. © Antônio M. Alberti 2010
  • 84. References  Baker N, Zafar M, Moltchanov B, Knappmeyer M (2009) Context-Aware Systems and Implications for Future Internet, Towards the Future Internet, IOS Press.  Bicocchi N, Baumgarten M, Brgulja N, Kusber R, Mamei M, Mulvenna M, Zambonelli F (2010) Self-Organized Data Ecologies for Pervasive Situation-Aware Services: The Knowledge Networks Approach, IEEE Transactions on Systems, Man and Cybernetics – Part A: System and Humans, Vol. 40, No. 4.  Dey A, Abowd D (2000) Towards a better understanding of context and context-awareness, Proc. ACM Conf. Human Factors Comput. Syst.—What, Who, Where, When and How of Context-Awareness, Hague, The Netherlands. © Antônio M. Alberti 2010
  • 85. References  Zimmermann A et al. (2005) Personalization and Context Management, User Modeling and User-Adapted Interaction 15, 3-4, pp. 275-302.  Giunchiglia F (1992) Contextual Reasoning, Trento, Italy.  Wang P (2004) Experience-Grounded Semantics: A theory for intelligent systems, Preprint submitted to Elsevier Science.  Gruber T (1993) A Translation Approach to Portable Ontology Specifications. Knowledge Acquisition, 5:199–220.  TripCom (2008) Ontology of EDIFACT Syntax and Semantics, Deliverable D7.2. © Antônio M. Alberti 2010
  • 86. References  Ben Yahia I, Bertin E, Crespi N (2007) Ontology-based Management Systems for the Next Generation Services: State- of-the-Art, presented in Networking and Services, 2007. ICNS Third International Conference and published in IEEE Transaction.  Clark D, Partridge C, Ramming C, Wroclawski J (2003) A knowledge plane for the Internet, Proc. ACM SIGCOMM Conf., Karlsruhe, Germany, pp. 3–10.  Siekkinen M, et al. (2007) Beyond the Future Internet – Requirements of Autonomic Networking Architectures to Address Long Term Future Networking Challenges, 11th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS'07). © Antônio M. Alberti 2010
  • 87. References  Strassner J, (2008) The Role of Autonomic Networking in Cognitive Networks, Cognitive Networks: Towards Self-Aware Networks. John Wiley and Sons, Book Chapter 23-52. © Antônio M. Alberti 2010
  • 88. References  Jelger C (2009) Information Dispatch Points, NetArch Symposium Presentation, Ascona, Switzerland.  Pollock J, Hodgson R (2004) Adaptive information: improving business through semantic interoperability, grid computing, and enterprise integration, John Wiley and Sons. © Antônio M. Alberti 2010
  • 89. References  Kephart JO, Chess DM (2003) The Vision of Autonomic Computing. IEEE Computer Magazine 36(1):41-50.  Dobson S, Sterritt R, Nixon P, Hinchey M (2010) Fulfilling the Vision of Autonomic Computing. Computer Magazine 43(1): 35-41;  Clark D, Partridge C, Ramming J, Wroclawski J (2003) A Knowledge Plane for the Internet. Proc. of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Comm., Karlsruhe, Germany;  Smirnov M (2004) Autonomic Communication: Research Agenda for a New Communications Paradigm. Fraunhofer FOKUS technical Report; © Antônio M. Alberti 2010
  • 90. References  Dobson S, Denazis S, Fernández A, Gaïti D, Gelenbe E, Massacci F, Nixon P, Saffre F, Schmidt N, Zambonelli F, (2006) A Survey of Autonomic Communications. ACM Transactions on Autonomous and Adaptive Systems 1(2):223-259.  Sterritt R, Bustard D W, (2003), Autonomic Computing—A Means of Achieving Dependability?, Proc. 10th IEEE Int’l Conf. and Workshop on the Eng. of Computer-Based Systems (ECBS 2003), IEEE Press:247-251.  Chaparadza R, (2010), Can Autonomicity help Migration, and what could be a possible Evolution Path?, FIA‐GHENT: Migration Session, December 2010. © Antônio M. Alberti 2010
  • 91. References  Cross-ETP (2009) The Cross-ETP Vision Document. European Technology Platforms (ETPs), Cross Vision Document v1.0.  Clarke J (2008) Trust & Identity in the Future Internet, Presentation at FIA.  X-ETP (2010) Future Internet Strategic Research Agenda, Version 1.1.  PICOS (2008) Taxonomy, Deliverable D2.1 Version 1.0.  RFC 4949 (2000), Internet Security Glossary, IETF Request for Comments 2828. © Antônio M. Alberti 2010
  • 92. References  Chaum D (1985) Security without Identification: Transaction Systems to make Big Brother Obsolete, Communications of the ACM 28/10 1030-1044.  Avizienis A, Laprie J, Randell B, Landwehr C, Basic concepts and taxonomy of dependable and secure computing, IEEE Transactions on Dependable and Secure Computing 1 (1).  Pfitzmann A, Hansen M (2010), A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management, Available online at http://dud.inf.tu-dresden.de/ Anon_Terminology.shtml/. © Antônio M. Alberti 2010
  • 93. References  Fischer-Hübner S, Hedbom H (2008) D14.1.c – PRIME Framework V3. Public Project Deliverable.  Luhmann, N (1979) Trust and Power, Chichester, Wiley.  RISEPTIS (2009) Trust in the Information Society, Report of the Research and Innovation for SEcurity, Privacy and Trustworthiness in the Information Society.  Campolargo, M (2010) Trust in the Information Society, Presentation at “Trust in the Information Society” Conference. © Antônio M. Alberti 2010
  • 94. References  European Commission, “The Future of the Internet: A Compendium of European Projects on ICT Research Supported by the EU 7th Framework Programme for RTD”, 2008.  Pedrinaci, C., “Lightweight Semantic Annotations for Services on the Web”, SSAIE 2009.  Ristol, S., “Enabling a Web of Billions of Services”, SW 2009.  S-Cube, “The S-Cube Book”, August 2010.  De Panfilis, S., "FISO architecture of the Future Internet", FIA Workshop– FISO Session May 2009. © Antônio M. Alberti 2010
  • 95. References  Gittler, F, "NEXOF: An Approach for Service‐based System Architectures", 2nd International SOA Symposium, October 2009.  Pasic, A., “Delivering Building Blocks for Internet of Services: Trust, Security, Privacy and Dependability”, Book Chapter, New Network Architectures, 2010.  Benko, B. K., “Autonomic Communication Elements and the ACE Toolkit”, ACE Toolkit tutorial, Milan, November 2008.  Baresi, L., Di Ferdinando, A., Manzalini, A., Zambonelli, F., “The CASCADAS Framework for Autonomic Communications”, Autonomic Communication, Springer, Heidelberg, 2009. © Antônio M. Alberti 2010
  • 96. References  Rowe D, Leaney JR (1997) Evaluating evolvability of computer based systems architectures - an ontological approach”, Proc. International Conference on the Engineering of Computer Based Systems, 1997. © Antônio M. Alberti 2010
  • 97. References  Wang P Artificial General Intelligence: A Gentle Introduction, Available online at: http://sites.google.com/site/narswang/home/agi- introduction/  Kurzweil R (2005) The Singularity is Near: When Humans Transcend Biology, Viking Press, ISBN 0670033847.  Dartmouth Meeting (1956) A Proposal for the Dartmouth Summer Research Project on Artificial Intelligence, Dartmouth College in Hanover, New Hampshire, Available online at: http:// www-formal.stanford.edu/jmc/history/dartmouth/dartmouth.html/  Langton C What is Artificial Life?, Available online at http:// www.biota.org/papers/cglalife.html/ © Antônio M. Alberti 2010
  • 98. References  McKinley P, Cheng B, Ofria C, Knoester D, Beckmann B, Goldsby H (2008) Harnessing Digital Evolution, IEEE Computer Magazine.  Nachira F (2006) How ICT research supports Innovation Ecosystems and SMEs, UEAPME workshop.  Briscoe G, De Wilde P (2006) Digital Ecosystems: Evolving Service-Orientated Architectures, Proceedings of the 1st international conference on Bio inspired models of network, information and computing systems. © Antônio M. Alberti 2010
  • 99. References  Tempesti G, Mange D, Mudry P, Rossier J, Stauffer A (2007) Self-Replicating Hardware for Reliability: The Embryonics Project, ACM Journal on Emerging Technologies in Computing Systems (JETC), Vol. 3 Issue 2.  Guedj D (2010) Future and Emerging Technologies Proactive Initiatives in FP7 call 6, Information Day, ICT Call 6 Brussels. © Antônio M. Alberti 2010