774,457 research outputs found

    Open Access to Resource Management in Multimedia Networks

    Full text link
    The paper is dedicated to mechanisms for open access to resource management in the Internet Protocol (IP) multimedia networks. First we present the concept of IP Multimedia Subsystem (IMS) and explain the IMS functional architecture, principles of quality of service management and service control in IMS. Then we describe the idea behind the opening of network interfaces for third parties so that others besides the network operator can create and deploy services. Open Service Access (OSA) and Parlay appear to be the technologies for value-added service delivery in multimedia networks. In the paper we take a closer look to the Parlay/OSA interfaces that allow third party applications to access the resource management functions in IMS. OSA "Connectivity Manager" interfaces and OSA "Policy Management" interfaces are considered. Parlay X Web Services interfaces provide a higher level of abstraction than Parlay/OSA interfaces and gain an amazing amount of support among service developers. We address "Applicationdriven Quality of Service" Parlay X Web Service and "Policy" Parlay X Web Service also

    Teaching case: Leading the change - ERP implementation at Keda

    Get PDF
    Recently, several disasters have affected the tourism industry. In order to mitigate the effects of disasters, increasing the level of preparedness is essential. However, despite the devastating effect disasters can have on tourism, few tourism organizations have properly developed disaster strategies as an integral part of their business plans. Emergency management systems that utilize mobile communication infrastructures can provide prompt information delivery to save human lives. Several supra-national initiatives and research projects are working on possibilities to facilitate mobile communication networks for emergency management systems. However, the success of such systems depends on users being familiar with the service, which is difficult to achieve, if the system is solely used for emergency management. Therefore, we propose a system design that allows the integration of mobile value-adding services. We also present exemplary services, which offer value to tourists and create business opportunities for the tourism industry. The central component of our proposed system design is a service platform, which communicates with mobile network operators and provides basic services for service providers from the tourism industry and the emergency manager via service interfaces

    Quantifying Risks in Service Networks: Using Probability Distributions for the Evaluation of Optimal Security Levels

    Get PDF
    The increasing costs and frequency of security incidents require organizations to apply proper IT risk management. At the same time, the expanding usage of Service-oriented Architectures fosters software systems composed of cross-linked services. Therefore, it is important to develop risk management methods for these composite systems. In this paper, we present a straightforward model that can be used to quantify the risks related to service networks. Based on the probability distribution of the costs which are related to risks, it is possible to make proper investment choices using individual risk preferences. The attractiveness of investment alternatives and different levels of security can be measured with various characteristics like the expected value of the costs, the Value-at-Risk or more complex utility functions. Through performance evaluations we show that our model can be used to calculate the costs’ probability density function for large scale networks in a very efficient way. Furthermore, we demonstrate the application of the model and the algorithms with the help of a concrete application scenario. As a result, we improve IT risk management by proposing a model which supports decision makers in comparing alternative service scenarios and alternative security investments in order to find the optimal level of IT security

    Automating decisions for inter-enterprise collaboration management

    Get PDF
    Proceeding volume: 283/2008The current trend towards networked business forces enterprises to enter federated, loosely-coupled business networks, since much of the competition takes place between networks and value nets. The Pilarcos E2B interoperability middleware supports trend by providing services such as business service discovery and selection, interoperability management, eContracting and reputation-based trust management. Although these services automate the interoperability knowledge management and interoperability. testing, and may help in routine decisions, an essential element of the architecture involves oil expert system that automates or supports decisions oil joining collaborations, acting in them, or leaving them. The expert system focuses oil a single enterprise needs. This paper focuses on the ways of governing the automation level in the expert system in a way suitable for autonomous enterprises to control their participation in agile collaborations.Peer reviewe

    Ubiquitous Sensor Networks in IMS: an Ambient Intelligence Telco Platform

    Get PDF
    Ubiquitous Sensor Network (USN) concept describes the integration of heterogeneous and geographically dispersed Wireless Sensor and Actuator Networks (WS&AN) into rich information infrastructures for accurate representation and access to different dynamic user’s physical contexts. This relatively new concept envisions future Sensor-Based Services leading to market disruptive innovations in a broad range of application domains, mainly personal (lifestyle assistants), community (professional users) and industrial domains. The support for this broad range of innovative Ambient Intelligence services urgently demands a standardized access to different WS&AN, and Telco Operators have an opportunity to lead this technological challenge as they evolve towards future Next-Generation Networks. Telefónica Research and Development is a leading innovation company that provides communication services for businesses and consumers. Networks and Service Platforms is a major Telefónica I+D innovation area where new Service Architectures and Platforms concepts are essential for the development of services with a high differentiation value. This contribution describes Telefónica I+D activities directed to the design of an Ambient Intelligence Platform integrating USN concepts over NGN architectures. In our view IP Multimedia Subsystem (IMS) concepts can enable and promote a first generation of Sensor-Based Services where multimedia interactive sessions are enriched with contextual information from WS&ANs. To this end three major design criteria are addressed at three different levels. At the application layer, OMA Service Environment and OGC Sensor Web Enablement are combined to define a specific USN Service Enabler. At the communication, management and control level WS&AN Gateways are defined for integrating WS&ANs infrastructures into all-IP IMS environments. While at the lower level, data and meta-data exchanges with different WS&ANs entities are homogeneously represented using OGC® SensorML standard. Finally this paper concludes by discussing some preliminary business opportunities we foresee for the proposed Platform

    Controlling and enabling practices to manage supply in online service triads

    Get PDF
    Purpose: The purpose of this paper is to understand which controlling and enabling practices are used, how the numerous supplying partners are managed and how positive network effects are generated in online service triads (multi-sided platform – supplying partners – consumers). Design/methodology/approach: A single representative in-depth case study was conducted to refine theory on managing service triads. The main data source consists of field notes collected by one author, who held a temporary position within the organization. Additional data were collected from observations, internal documents, informal talks and 20 interviews. Findings: The authors found controlling and enabling organizational practices in four main categories on two levels as follows: managing network composition (system level), managing order fulfillment and returns (operations level), category management (both levels) and capability enhancement (both levels). Research limitations/implications: The authors show that both controlling and enabling practices are present in online service triads. This enables platform owners and supplying partners to share responsibilities for creating positive network effects, i.e. to increase scale, which increases value, which again attracts more suppliers and consumers, which creates more value, etc. Practical implications: The authors present a range of and controlling and enabling practices that describe how multi-sided platforms can manage numerous supplying partners in an online context. Originality/value: This study is the first to show that contractual and relational governance is insufficient in service triads in online settings with numerous supplying partners. Further, the authors provide empirical evidence that supply networks continuously adapt over time

    A framework for SLA-centric service-based Utility Computing

    Get PDF
    Nicht angegebenService oriented Utility Computing paves the way towards realization of service markets, which promise metered services through negotiable Service Level Agreements (SLA). A market does not necessarily imply a simple buyer-seller relationship, rather it is the culmination point of a complex chain of stake-holders with a hierarchical integration of value along each link in the chain. In service value chains, services corresponding to different partners are aggregated in a producer-consumer manner resulting in hierarchical structures of added value. SLAs are contracts between service providers and service consumers, which ensure the expected Quality of Service (QoS) to different stakeholders at various levels in this hierarchy. \emph{This thesis addresses the challenge of realizing SLA-centric infrastructure to enable service markets for Utility Computing.} Service Level Agreements play a pivotal role throughout the life cycle of service aggregation. The activities of service selection and service negotiation followed by the hierarchical aggregation and validation of services in service value chain, require SLA as an enabling technology. \emph{This research aims at a SLA-centric framework where the requirement-driven selection of services, flexible SLA negotiation, hierarchical SLA aggregation and validation, and related issues such as privacy, trust and security have been formalized and the prototypes of the service selection model and the validation model have been implemented. } The formal model for User-driven service selection utilizes Branch and Bound and Heuristic algorithms for its implementation. The formal model is then extended for SLA negotiation of configurable services of varying granularity in order to tweak the interests of the service consumers and service providers. %and then formalizing the requirements of an enabling infrastructure for aggregation and validation of SLAs existing at multiple levels and spanning % along the corresponding service value chains. The possibility of service aggregation opens new business opportunities in the evolving landscape of IT-based Service Economy. A SLA as a unit of business relationships helps establish innovative topologies for business networks. One example is the composition of computational services to construct services of bigger granularity thus giving room to business models based on service aggregation, Composite Service Provision and Reselling. This research introduces and formalizes the notions of SLA Choreography and hierarchical SLA aggregation in connection with the underlying service choreography to realize SLA-centric service value chains and business networks. The SLA Choreography and aggregation poses new challenges regarding its description, management, maintenance, validation, trust, privacy and security. The aggregation and validation models for SLA Choreography introduce concepts such as: SLA Views to protect the privacy of stakeholders; a hybrid trust model to foster business among unknown partners; and a PKI security mechanism coupled with rule based validation system to enable distributed queries across heterogeneous boundaries. A distributed rule based hierarchical SLA validation system is designed to demonstrate the practical significance of these notions
    • …
    corecore