Mobile Virtual Enterprise Communication Reference Model

4 downloads 636 Views 350KB Size Report
Abstract. The latest development in mobile communication has provided the architects of Virtual ... App. App. Figure 1: WSI General Reference Model for Wireless World .... (2002): Timeline and Roadmap for the coming of the Wireless World.
The Proceedings of the 9th International Conference of Concurrent Enterprising, Espoo, Finland, 16-18 June 2003

Mobile Virtual Enterprise Communication Reference Model Petri Pulli, Xiaosong Zheng, Peter Antoniac, Seamus Hickey and Tony Manninen University of Oulu, Department of Information Processing Science, POBox 3000, 90014 Oulu, Finland, [email protected], [email protected], [email protected], [email protected], [email protected] Abstract The latest development in mobile communication has provided the architects of Virtual Enterprises with new tools and platforms. The studies of the new field, often referred to as Mobile Virtual Enterprise, are concerned with the abilities to have access and operate the VE infrastructure from anywhere, anytime. The emphasis of this paper is on how to provide the future research in this field with an established reference model concerning communication. An introduction of the term Cyberworld is discussed and series of definitions and technologies to support the “Mobile Virtual Enterprise” fundaments are included. Conclusion and future developments are presented at the end of the paper, along with a roadmap of the technologies for the next ten years in the wireless communication field. Keywords: Virtual Enterprise, mobility, concurrent engineering, mobile services, mobile engineering, and wireless.

1 Introduction This paper describes a reference model of the Cyberworld building block, which contributes towards the evolution of the general reference model for the Mobile Virtual Enterprise. Five important components are identified: Presence, Identity, Interaction, Applica tion and Cyberhost respectively. On top of the user there are two value functions, namely Values and Capabilities, that have key importance in user-centred mobile scenario design and analysis. The Cyberworld structure and a vivid reference model are demonstrated in this paper, including detailed description and definition for each component presented in the pictures describing the reference model. At the end of this paper, a few Cyberworld technologies are listed describing a technology roadmap. This should provide the reader with some clues on the future technologies and research within Mobile Virtual Enterprise field.

2 Proposed Theories and Techniques 2.1

Cyberworld definition

Originally the word “cybernetics” is associated with the study of control and communication in living and artificial made systems. The word itself comes from Greek's kubernan, to govern. In the latest developments there are separated disciplines like artificial intelligence, neural networks, systems theory, and chaos theory, but the boundaries between those and cybernetics has not yet been properly defined. In this paper, the word “cyber” is associated with the world of intra-communication and networked devices, a world of advanced technology used for a better human interaction and information. Cyberworld can be defined as a virtual world, a parallel world created and sustained by the computers’ world, wearable communication terminals and deviceless interfaces. In the Cyberworld we can stay in touch with our agents, knowledge databases, communities, and use electronic services and transactions.

The Proceedings of the 9th International Conference of Concurrent Enterprising, Espoo, Finland, 16-18 June 2003

2.2

Cyberworld and Mobile Virtual Enterprise

The Cyberworld , as defined within the reference model provided by the Wireless Strategic Initiative project (WSI) [Arbanowski 2002, Mößner 2002, Pabst 2002, WWI 2003], deals with the integration of application functionality in real and virtual environments. It can be classified by five well-defined components, namely: Presence, Identity, Interaction, Application and Cyberhost. Each of the components is detailed further so that it will have predominant features and/or subcomponents. The WSI general reference model, Cyberworld structure and reference model are demonstrated in Figure 1, Figure 2 and Figure 3 respectively. Ubiquity

Ambient Awareness

Personalization

Adaptation

Consistency

App

App

App

Cyberworld

Open Service Platform

Interconnectivity Mobility

Reconfiguration Support

Accounting & Charging

Service / Access Discovery

Media Routing & Delivery

Security & Authentication

Addressing & Identification

Environment Monitoring

Service Handling



Access Figure 1: WSI General Reference Model for Wireless World

Figure 2: Cyberworld Structure for Wireless World

The Proceedings of the 9th International Conference of Concurrent Enterprising, Espoo, Finland, 16-18 June 2003

Figure 3: Cyberworld Reference Model for Wireless World

In the following, a more detailed discussion of the above figures is available. 2.2.1 Presence The WSI reference model establishes three spheres i.e. personal, local and global spheres. The Presence component in Cyberworld describes the sphere of information that is presented or available to user. It refines the three generic spheres into five dynamic sub-spheres: Personal, Ambient, Partners, Periphery and Outside. Personal is the zone containing all personal information and tools that can be reached or accessed by the user. The Ambient is about the environment containing the personal area. Partners are people or machines that are interacting or exchanging information with the user. Periphery is defined as the area that the user is aware and that is not part of the previous spheres. Outside is everything else that the user is not acknowledged. Outside and periphery are corresponding to the global sphere. Partners and ambient are within local sphere and personal is the personal sphere. 2.2.2 Identity The mobile services and applications are expected to run within a secure environment. The function of Identity is to provide the security and privacy while supporting a tailored interaction based on user needs. The Identity function includes User identity, Trusted partner identity , Avatar, Pseudonym and Alias that are used to complete the identity and security requirements in mobile service execution. For example family members can use a Trusted partner identity . Avatar is a digital character. Pseudonym looks like a normal user identity, but it is in reality a second and unofficial identity. Alias is seen as a second or unofficial identity. 2.2.3 Interaction By its very nature Interaction contains the issues of Modality, Positioning, Orientation and Timing. The Modality is about interaction classification that could be defined according to different criteria, like level of interaction and amount of interaction etc. Positioning and Orientation are key functions for successful Augmented Reality and Virtual Reality applications. Timing is used for tracking the movements and also needed for logging, tracking etc.

The Proceedings of the 9th International Conference of Concurrent Enterprising, Espoo, Finland, 16-18 June 2003

2.2.4 Application The Application, as in mobile services, can be classified as: Stand-alone, Client, Server, Persistent, Resident and Remote. Various existing mobile applications can be fit into these categories. Persistent is when the application is running from ROM. Resident is when located an run in permanent memory, while Remote is when located and run from remote address. 2.2.5 Cyberhost The Cyberhost provides a standardized local execution environment for mobile services and application. The Capability negotiation and Security framework are the most important generic Cyberhost requirements. It should also support the negotiation of capabilities with other Cyberhost’s servers and underlying service platforms and it should offer a security framework for the execution of various applications. 2.2.6 Values The Values are defined as important function concerning the user-centred mobile services and application development. All the mobile services should be driven by user needs. Research in this area includes studies to find the key characteristics of mobile users that will enable the development of services needed and easily accepted by the mass consumer. Mobile users can be modelled relying on the analysis of cognitive cultural schemes, emphasizing transfer, social group factors and motivation. Quality Function Deployment (QFD) [Akao 1990, Day 1993] is a powering method to collect, prioritise and balance user needs for developing a better usercentred mobile services. 2.2.7 Capability The Capability of Mobile service application reflects the internal and external mobile service requirements and characteristics. It consists of the following six functions: Consistency, Personalization, Ubiquity , Natural interaction, Ambient Awareness and Adaptation. These application Capabilities represent implementation requirements and characteristics of mobile service applications. They address the values of the service system or network beyond the user needs and act as a linkage between user values and mobile service development. 2.2.8 Cyberworld Reference Model Implementation The reference model implementation is defined as five phases: reference model, formalized model, simulation model, prototype implementation and integrated prototype implementation. Reference model phase is to build a general and abstract model for Cyberworld. Formalized model is a model with detailed definitions and structures built on a specific service case. By using Simulation model we can run animated simulation to get a better understanding of the general reference model. Prototype implementation phase is used for laboratory tests of the theories (i.e. to separate components, real-time execution capability etc.). Integrated prototype implementation is the last phase and it is the first real test of the whole system.

3 Technology Roadmap The technology roadmap is drawn in Figure 4. Seven important components are listed at the left side of the roadmap and each of them contains a cluster of technologies with the exception of the Cyberworld Reference Implementation component, which is divided into five individual implementation phases. Three timeframes i.e. 2003-2005, 2006-2008 and 2009-2012 are defined to host the enabling technologies with some of the technologies span between two or all three timeframes. New technologies are to be identified and developed to meet the increasing demands from the challenging mobile field.

The Proceedings of the 9th International Conference of Concurrent Enterprising, Espoo, Finland, 16-18 June 2003

Intelligent Agent: Single dynamic

Stand-alone

Presence

Multithreading agents with dynamic control

Presence Service: Mobile and virtual telepresence

Static telepresence

Mobile and multi-location telepresence Shielding Technology

Smart Avatars

Scalable Telepresence Mobile Augmented Reality: high-presicion and real-time services

Communication Sphere Def. Service concept demonstration CSIM (Cyberworld Identity)

Personal Identity Technologies: Secure identity equipment

Identity Basic service (operator)

Service Identification Technologies: Extended service (value-added service provider)

Global service (user)

Advanced SIP Ubiquitous Interaction Multiple Synchronized Sessions

Interaction

Audio-visual interfaces

Multimodal Interfaces: Avatar appearance

Haptic interfaces

New Ways of Human -Computer Interaction: Rich interaction technologies Universal Interaction Language

Terminal customization

Application

Customized Services: Customization by service provider Customization at application level New Toolkits for Service Creation

Open Service Programming Interfaces and Libraries

Integrated Development Environment for Mobile App.

Integrated Prototypes

IP-Based Quality of Service

Cyberhost

Terminal Equipment Resource Management Capability Negotiation

Advanced Security Framework Wireless Infrastructures for Networked Virtual Reality Cyberhost Runtime Environment

QFD framework and examples

Value Deployment

Quality Function Deployment (QFD): QFD data collection QFD in new service design User Segment Studies

Examples, case studies

Business Modeling: Modeling guidelines

Reusable library

Scenario-Based Design Methodology Domain Meta Models

Cyberworld SimulaReference Ref. Formalized tion Mod. Model Implementation Model

2002

2003

2004

2005

Integrated Prototype Implementation

Prototype Implementation

2006

2007

2008

2009

2010

2011

2012

Figure 4: Cyberworld Technology Roadmap

4 Conclusion and future In this paper we introduce a possible reference model for future Mobile Virtual Enterprise. The model describes the interactions and relationships among the essential components. The value functions are emphasised and placed on top of the reference model. The reference model implementation is then briefly described with special care at each stage. At the end of the paper a few Mobile Virtual Enterprise technologies/technology enablers are identified and clustered to form a technology roadmap. Future research in wireless world modelling includes refining or sub-modelling of some other building blocks from the reference model. The present reference model will be applied on some typical mobile scenarios to demonstrate and get a better understanding of pros and cons of the

The Proceedings of the 9th International Conference of Concurrent Enterprising, Espoo, Finland, 16-18 June 2003

applications in the field of Mobile Virtual Enterprise. Respective technologies also need to be examined in a 10-year time span framework. Further study is needed on topics like Values and Capabilities. Questions like what is needed to support Virtual Enterprise lower communication layers will require an answer. Moreover, insertions of more values specific to the field are to be considered (i.e. workspace). New capabilities like brokerage or knowledge sharing are also closely examined to be included in future reference models.

5 Acknowledgements The authors wish to thank the Department of Information Processing Science from University of Oulu for research support. The authors also thank their international research partners of WWRF, WSI, WWI and WWRI for their invaluable comments and feedbacks.

6 References Y. oji Akao (1990): Quality function deployment : integrating customer requirements into product design, Productivity Press, Cambridge, Mass. Stefan Arbanowski, Ralf Pabst, Klaus Mößner, Petri Pulli, Xiaosong Zheng, Kimmo Raatikainen, Mikko Uusitalo, Michael Lipka, Karl Ott and Andreas Schieder (2002): The WSI Reference Model. WWRF, pp. 45. R. G. Day (1993): Quality Function Deployment: Linking a Company with Its Customers, ASQ Quality Press. Klaus Mößner, Stefan Arbanowski, Ralf Pabst, Petri Pulli, Xiaosong Zheng, Andreas Schieder and Michael Lipka (2002): Timeline and Roadmap for the coming of the Wireless World. WWRF, pp. 51. Ralf Pabst, Stefan Arbanowski, Klaus Mößner, Petri Pulli and Xiaosong Zheng (2002): Important technological principles and system options for the elements of the WSI Reference Model. WWRF, pp. 81. WWI: Wireless World Initiative. WWW page. http://www.wwip.org/, accessed 14/1/2003