Documente Academic
Documente Profesional
Documente Cultură
ROADMAP
for Network Technologies and Services
Petteri Alahuhta
Marko Jurvansuu
Heikki Pentikinen
VTT
ISSN 1239-758X
ISBN 952-457-176-5
Abstract
This report provides an analysis of the major roadmaps in the network and
service domain for the timeframe 2007-2012. The work was funded by the
NETS programme of the National Technology Agency of Finland (Tekes). The
main focus is on technology enablers to consider future broadband networks
(wireless and fixed), new services and applications, the evolution of service
technologies and user requirements for the services. The roadmaps summarized
here were published by the Wireless World Research Forum (WWRF) , the
mobile IT Forum (mITF), the Eureka cluster projects ITEA (Information
technology for European advancements) and CELTIC (Co-operation for a
European sustained Leadership in Telecommunications), the Tekes NETS
programme, the European Commission IST Programme, the Technical Research
Centre of Finland (VTT), and the Wireless World Research Initiative (WWRI).
As a result, we present an analysis of the most important visions and trends, and
an analysis of network convergence, all-IP, the ubiquitous environment, digital
multimedia communication, wireless technologies and business models. The
roadmap analysis was evaluated and commented on by more than 40 Finnish
industry and research experts in this field. Here we present one roadmap that
collates the main aspects of the evaluated roadmaps. We also present 9 critical or
causal paths that describe the development of the services and networks. These
critical paths have not previously been published.
Preface
In 2004 the National Technology Agency of Finland (Tekes) funded a roadmap
study for services and networks under the NETS - "Networks of the Future" programme. The work was carried out by VTT in co-operation with the NETS
thematic groups 1b) Service technology evolution in co-operation with the
thematic group 3a) New services and applications and supervised by Tekes.
Long-term roadmaps are very challenging to create. The markets, accidents, user
habits, trends, etc., guide our future in hand-in-hand with the development of
technology. The unpredictable nature of the development in this field hinders the
reliability of predictions for the short-term time scale, i.e. 2004-2007, not to
mention the long-term estimations for the timeframe of 2007-2012 - the
timeframe of this study. Thus roadmaps must be treated with caution, and should
be seen as a vision to approach rather than something that will surely happen in
detail.
The vision presented here gives the view of the major players and experts
throughout the world that have contributed to the roadmaps examined in this
work. It must be pointed out that it is not only the markets and trends but also
the vision adopted by the ICT (Information and Communication Technology)
community that will guide the development of technology enablers for our
future. Therefore, the presented vision is somewhat self-realising, since it is the
vision presented by those entities that can actually influence it. Naturally, not all
services or enablers will become the success that is envisioned in the roadmap,
but it does show the future possibilities in the road ahead. Of course, the vision
and the roadmap must be updated from time to time to see which direction the
development is heading in.
In this work we have gathered the main topics from the most essential roadmaps
available that include networks and services domains. The analysis was
evaluated by Finnish NETS programme thematic groups and by other top
Finnish experts. The final analysis is, therefore, a mixture that consists of solid
background from the existing roadmaps and fine-tuning of analysis using a large
number of comments.
We gratefully acknowledge following people who were interviewed: Risto
Alander (Elisa), Olli Martikainen (ETLA), Sami Grnberg (TeliaSonera), Bjrn
Melen (Ericsson), Lauri Haapanen (Incode), Timo Leppinen (Ficora), KariPekka Estola (Nokia), Raija Tervo-Pellikka (HUT) and Heikki Hmminen
(HUT). We would also like to thank the thematic groups service technology
evolution and new services and applications of the Tekes NETS programme for
their contribution to the roadmap process.
We gratefully acknowledge the work of Marko Palola (VTT) for his extensive
contribution to the development of the critical paths. We would also like to
thank Heikki Ailisto, Aarne Mmmel, Ville Typp, Jari Korva, Reijo Savola
and Arto Laikari from VTT for their contributions to this report.
Contents
Abstract
Preface
1
Introduction..................................................................................................... 1
1.1 Challenges for roadmaps ....................................................................... 1
1.2 Maturity of technology .......................................................................... 2
1.3 Our approach to timescale estimations.................................................. 3
1.4 Process of the current roadmap ............................................................. 4
1.5 Content of this document....................................................................... 5
4.1.9
5
Discussion..................................................................................................... 41
Acknowledgements............................................................................................. 44
References........................................................................................................... 45
Appendices
Appendix A. List of symbols
Appendix B. Summary of Company and Organisation Interviews
Appendix C. Summary of WWRF Book of Vision
Appendix D. Summary of CELTIC Purple Book
Appendix E. Summary of ITEA Roadmap
Appendix F. Summary of mITF Flying Carpet
Appendix G. Summary of Tekes NETS programme vision and roadmap
Appendix H. Summary of AMI@LIFE Roadmap
Appendix I. Summary of VTT Roadmaps
Appendix J. Summary of WWRI Roadmap
Appendix K. Services and technology enablers based on roadmaps
1 Introduction
There is always a need to predict the future. Companies, research organizations,
standardization bodies, etc., need information on how the markets and technologies are
developing in order to make the right strategic decisions.
Typically, roadmaps predictions are more optimistic the further in to the future they are
targeted. For a long-term analysis, the undefined factor is the new emerging technologies that
cannot be predicted - i.e. some new technology or trend may come up that we cannot know at
this point. Therefore, in a long-term analysis we have to use the technologies that are now
rising or at the top of the hype curve as a basic assumption of future technologies.
It is good to bear in mind that a typical timescale for a certain technology to be really mature
and make large profits is 5-10 years after its first launch. It is also good to realise that it is
more realistic and sound to describe the functionalities rather than the exact technologies.
Particularly as, with a timeframe of roughly 10 years ahead, there will be a large number of
technologies that we cannot name or predict at this point. However, functionalities that are
technology-independent can be described.
Literature reviews
Interviews
Roadmap
Workshops
2.1 WWRF
The Wireless World Research Forum (WWRF) [1] is one of the most important industrial
and academic research platforms in the world. Alcatel, Ericsson, Motorola, Nokia, and
Siemens founded the "Wireless World Research Forum" in early 2001 and it has grown to a
large society with 153 members consisting of manufacturers, operators, R&D centres,
academia and one regulator from 4 continents. It has the critical mass to have a global
influence on the development of the future wireless world.
The objective of the forum is to formulate visions on strategic future research directions in
the wireless field, involving industry and academia, and to generate, identify and promote
research areas and technical trends for mobile and wireless system technologies. The
timeframe of reflection is in the range of 10 15 years from now.
WWRF organises meetings (roughly 3 times a year), provides a publication forum, collects
actors and research topics for research projects, and develops a vision of the wireless world
in working groups (6), which produce the material for a public deliverable called Book of
Visions.
As an example of the contributions to European research programs, the Wireless-WorldInitiative (WWI) (launched from WWRF) submitted very large-scale Integrated Project
proposals (IP) to the IST 6th call in 2003 supporting the WWRF vision. The main IP projects
under the WWI that were funded by the commission at the beginning of 2004 were Ambient
Networks [2], E2R [3] and Winner [4].
2.2 EUREKA
EUREKA [7] is a pan-European network for market-oriented, industrial R&D supporting the
competitiveness of European companies through international collaboration in creating links
and networks of innovation. There are a number of EUREKA clusters - e.g. ITEA, CELTIC,
PIDEA and MEDEA+ - each providing a platform for European co-operation between
companies and research institutions. Roughly, 170 new projects are started under EUREKA
every year.
2.2.1
ITEA
The ITEA (Information Technology for European Advancement) programme [18](! 2023)
was initiated in February 1998 as an eight-year EUREKA programme. ITEA was set up to
stimulate and support projects that will give European industry a leading edge in softwareintensive systems. ITEA works closely with other EUREKA projects and the Framework
Programmes of the European Commission. The projects are financially supported by all 33
countries in the EUREKA framework.
An industrial lead vision of ITEA can be stated as "Europe to become a leader in softwareintensive systems on embedded and distributed platforms". This is combined with
"Middleware infrastructure of dynamically configurable distributed IT". The stakeholders are
individuals who have local access to multimedia data processed by software and embedded
in hardware. The resources that are accessed are distributed over a dynamic infrastructure.
An underlying principle is the assumption that software is a factor of convergence for all
kinds of industries.
ITEA published its first Technology Roadmap of Software-Intensive Systems in March 2001.
The second edition has been produced during the spring of 2004.
The timeframe of the second edition of the ITEA Technology Roadmap is divided into three
clusters: short-term is associated with the period 2004-06, medium-term with 2007-09 and
long-term with 2010 and onwards.
2.2.2
CELTIC
CELTIC has published a roadmap called Purple Book, which defines the "priorities and
outlines a roadmap for the evolution of communication technologies for Europe." Purple
Book is compiled from contributions from a large number of technical experts, from both the
industry and academia.
The timeframe of the CELTIC projects is in the short to medium-term R&D aspects, filling
the gap between telecommunication companies six to twelve months and IST medium long-term projects.
2.3 mITF
The objectives of the 4th Generation (4G) Mobile Communications Committee (Japan) are to
clarify the system configuration and applications of the 4th generation mobile
communication systems and to propose concrete near-term activities envisioning its
commercial introduction around 2010, so as to lay the ground work for the R&D and
standardisation activities by the industry and academia.
The Mobile IT Forum (mITF) [19] was established in June 2001, consisting of over 130
Japanese partners such as companies (NTT DoCoMo, KDDI, Fujitsu, Hitachi,...) and
universities. The Mobile IT Forum was established with a goal of facilitating the R&D and
standardization activities from a comprehensive perspective, so as to contribute to
transforming Japan into a leading Mobile IT nation.
In the course of this work mITF published a second revision of its vision report "Flying
Carpet" in April 2004.
2.4.1
Funding entities
2.4.2
Standardisation bodies
Standardisation bodies are important sources for roadmapping since the standards that are
being prepared and developed today are the most potential enablers for future services. Some
of the relevant standardisation bodies and forums that have a large impact on standardisation
include Institute of Electrical and electronic engineers (IEEE) [21],
International
Telecommunication Union (ITU) [23], European Telecommunications Standards Institute
(ETSI) [24], 3rd Generation partnership Project (3GPP) [25] and 3rd Generation partnership
Project 2(3GPP2) [26].
2.4.3
Research institutes
[30] and The Defence Advanced Research Projects Agency (DARPA) [31] are usually
heavily involved with long-term research topics.
2.4.4
Companies, research establishments and public entities are networked in forums and
alliances in order to improve the visibility of a certain technology or create interoperability
among different solutions. They provide e.g. white papers and specifications for common
practices. Examples of such forums are the UMTS Forum [33], World Wide Web
Consortium (W3C) [35], Open Mobile Alliance (OMA) [22], Wireless Fidelity (Wi-Fi) [36],
IPv6 Forum [32], OFDM forum [34].
2.4.5
Commercial Research
There are several commercial research sources that provide consultancy and forecast the
telecommunication industry. The price of their reports and forecasts typically varies from
500$ to 10,000$, corresponding the depth of the analysis.
Gartner, Inc. is perhaps the most well known research and advisory firm that helps more than
10,000 clients leverage technology to achieve business success. Gartner's businesses consist
of Research, Consulting, Measurement, Events and Executive Programmes. Gartner includes
approximately 1,000 research analysts and consultants in more than 75 locations worldwide
[13].
The Insight Research Corporation [12], USA, provides commercial market research and
strategic analysis for the telecom industry. Topics include, e.g., Operations Support System
(OSS) 2004-2009 and Streaming Media in Telecom Networks 2003-2008, Pervasive
Technologies and Telecom Carriers 2004-2009.
2.4.6
Companies
Large companies like Apple, Dell, IBM, Intel, Microsoft, Nokia Palm, Sun Microsystems,
etc., not only create roadmaps and white paper documents to guide their strategy but also
publish some of them in order to influence the markets - i.e. shape the future.
10
Book of Vision
Technology
Roadmap for
SoftwareIntensive
Systems
Purple Book
Flying Carpet
WWRI
Publisher
WWRF
ITEA
CELTIC
mITF
Tekes
IST
Published,
latest
revision
2001, (2004)2
2001, 20043
2003, 2004
2003, 2004
2001, 2003
2002
Origin
Global
Europe
Europe
Japan
Finland
Europe
Length
(pages)
279 +
papers
109
148
26
84
Timeframe
-2010-
- 2010
2002 - 2010
2005-2010
2002-2010
Focus
Technical
Softwarerecommendations intensive
for the wireless systems
world
End-to-End
Telecommunication
systems, networks
Mobile
Wireless
systems,
Business,
broadband
packet market, services
networks, services and
applications
Approach
Suggestions
for
future
research
and concepts in
the wireless world
Timeframe
estimations
for
technologies
Trends
Yes
working 148
2004 - 2010
Overview
of Overview
of Suggestions
and Guidance
research
research challenges concepts for 4G programme
challenges and and trends
mobile systems
trends
Yes
Yes
towards Yes,
(2002-2003, Yes, shortly for 2005 (2002-2003),
2005-2006,
2010 and 2010
(2005-2007),
beyond)
(2009-2010)
Yes
Yes
Yes
AMI@Life, NETS thematic group 3a roadmaps and VTT technology roadmaps were used as input
for this work but not included in this table due to shortage of space
2
Version 2 not published at the time fo writing (published in the summer 2004); a draft version of
version 2 was used in addition to version 1 in this work
11
12
There are two different views existing in the roadmaps concerning the terminals people will
be using in the future. The first is that everyone will have one multi-purpose terminal, which
can be used for communication, authentication, as keys, etc. Another view is that the user
will communicate with and control services using all kinds of devices in his surroundings.
The communication will be based on self-explanatory, easy-to-use multi-modal natural
human interfaces like voice and gestures, which are suitable for all sorts of people, such as
the elderly and the disabled, and will also respect differences in our cultures. We will be
helped by augmented reality, which will provide our daily lives and physical views with
useful information, as well as exciting experiences.
Mobile systems will be an inseparable part of our daily lives in various branches of living
(e.g. work, education, entertainment, health care, commerce...). The nature of mobile systems
will make new lifestyles viable. For example, systems monitoring vital functions using bodywearable sensors with pervasive communication capabilities will provide an added sense of
security for elderly people and possibly encourage them to take longer walking trips outside
the home.
In addition to the business drivers there are other factors driving progress further. People are
looking for a life that is more enriched and cultural, more flexible and diversified, more
comfortable and safe, and more personal and convenient. Advancements in communication
and information technology will be a major factor in realising these needs.
A convergence of ubiquitous computing, ubiquitous communication and intelligent user
interfaces will bring us towards the Ambient Intelligence era.
Networks
Networks - cellular, broadband, short-range, sensor, vehicular, satellite networks, etc. - are
converging and interoperable over All-IP.
Networks provide always-on, Always Best-Connected (ABC) access with guaranteed end-toend seamless services with QoS (Quality of Service), security and mobility. Networks are
also utilising general authentication, charging, personalisation methods supported by end-toend security and QoS, while virus- and digital rights management (DRM) protection are
embedded in the telecommunication infrastructure.
There will be networks-in-networks, which will form nested spheres inside one another
starting from Body Area Network (BAN), Personal Area Network (PAN), Vehicular Area
Network (VAN), Virtual Home Environment (VHE), etc. Whenever people move, at home,
in their car or in public places, the associated personal networks will move with them. These
personal networks will provide access to the desired information and all services they are
subscribed to. The mobile terminal will be used to control other devices; it will enables
Internet connectivity and be a part of the personal area network. Ad hoc networks will be
13
used in a temporary situation - e.g. in a conference or in concerts - to build up an autoconfigurative network and as an extension to access network coverage.
New radio interfaces will provide higher bandwidth efficiency. The target for beyond-3Gsystem bandwidth should be 100Mbps/1Gbps for the mobile and stationary user,
respectively. The cost of the access network will be relatively low (equivalent of 30 /month)
and still provide a high bandwidth access in the order of 10 -100 Mbps.
Machine to machine (M2M) communication and applications is an issue that has many
controversial views. The issue is not highly ranked in the major roadmaps and not all of the
interviewed people were convinced of the importance of M2M. M2M applications today
have been realized largely based on the Short Message Service (SMS), but the trend is
towards M2M using IP-protocol. Other strong opinions in favor of M2M stated that M2M in
All-IP environment would create large share of the network traffic in the future. This is based
on general assumption that the devices in ubiquitous environment would be connected to AllIP networks and would use IP as a base protocol for communication.
Services and frameworks
Personalized and context-aware services are available for the user anywhere, anytime using
the most appropriate means.
Applications will adapt to the users context by using profiles and network services
(presence, positioning, billing, local services, QoS) to allow rich communication. The
services will have self-learning capabilities.
Services are easy find and use. They can be used anonymously, but, whenever necessary, the
users can be reliably identified. Common charging and identification methods exist. Personal
authentication technology allows a user to securely purchase items, do mobile ordering or use
administrative services through networks. Network security will emerge to prevent illegal
activities and violation of privacy in different domains, including home, work, vehicles, etc.
New services will be based on open standards and interfaces that are interoperable in an allIP network. A flexible service platform will provide services management and charging and
inter-work with other domains. It will also be open to third-party service providers to import
their own services. It will also be possible to offer and charge services with different level of
quality of service (QoS).
In homes there will be an increased number of automated and intelligent devices that will
help our daily lives. Communication - e.g. video calls with family members outside the
home, reading emails, etc. - will be embedded in the home infrastructure. The devices and
machines at home will have a network connection, so the home appliance software can be
updated by service providers via the Internet when authorized.
14
15
Networks
Networks are developing rapidly
The Internet is becoming a mass medium and Internet Protocol (IP) the leading network
protocol. Based on the interviews, value creation will move from the network to all-IP
applications. In IP networks, Session Initiation Protocol (SIP) is an important enabler that
provides session initiation - e.g. between users or devices.
16
17
but they are presently not very active in providing session mobility between two
technologies. This is probably an issue for the future UMTS release 7.
However, according to the interviews there are signs that handovers will work between
different network technologies in 2007. The vertical handover between 3G and WLAN is
already presented by Finnish operator TeliaSonera in the Tekes-funded VHO project. There
is also the question of how seamless the seamless handover needs to be. In certain
applications the users may not see, e.g., a 10-second handover time problematic. In the
interviews there was a statement that fully operable seamless roaming between network
technologies, and private and public networks could be technically realized before 2012, but
the major challenge probably lies with the business models. Without a sustainable business
model that would provide profits for most of the actors in this field, seamless roaming will
not be established. For example, would it be reasonable for a cellular operator to invest a
large amount of resources in establishing system that would allow their customers to change
their current connection from 3G to a public and possibly free WLAN connection that is not
owned by that operator?
New functionalities are emerging in the networks. They will start to support quality of
service (QoS) (one-to-one, multipoint, content distribution), security, billing, serviceawareness, etc. The network can also provide capabilities like location or presence. In some
of the comments it was pointed out that voice recognition is becoming mature technology
and will be used for controlling services in the networks.
Home networking will be increasingly important, also its connectivity to the Internet using
broadband access. Car networks are seen as likely to become more important in the future
due to the integration of communication and entertainment devices in cars. Communication
between cars and between the car and the traffic environment will increase. Traffic
information systems will emerge. These car-related trends are strongest in the countries
where the amount of traffic is high and where the people have to spend a considerable
amount of time per day in their car due to traffic jams.
Services, software, content and frameworks
Digital content and interoperability of systems and services will be a major enabler for
various services in the future
Users should be in the driving seat in the development of new services. They have certain
expectations for mobile services. According to the roadmaps and interviews, users value
relatively simple things. They want to have more freedom of time and place. They want to
have easy-to-use, fun and convenient applications and services. Communication between
people should be richer, expressing emotions and feelings, and users also expect that new
mobile communication systems will provide something more than just "faster speed".
18
19
protection. In addition to reliable user identification, solutions for payments in a network are
an important subject for development.
Digital Rights Management (DRM) seems to be an issue with controversial viewpoints.
Obviously, content producers are most interested in DRM and willing to have it deployed in
the system. Strong DRM protection is already today necessity for mobile ring tone and
JAVA-application business. On the other hand, some people interviewed were not quite sure
whether users want to have DRM or what the business model for that will be. It is seen as a
"nice to have" feature for common user-created material, but for large entertainment
companies like TimeWarner the efficient and trusted way of content protection -e.g.
protecting latest box-office movie in digital format - is surely important.
20
Terminals in 2007
More radio accesses are implemented to mobile terminals, including digital Video broadcast
(DVB-H) and short range technologies - e.g. Near Field Communication (NFC). Terminals
are capable of identifying the user by biometric or smart card solution, they can choose the
best possible radio access, smart applications use indoor/outdoor positioning information as a
first step towards context awareness. Positioning is done by Global Navigation Satellite
system (GNSS) added to cellular positioning (A-GPS) and indoor positioning. Limited multimodality of voice and gestures is used in terminals and services.
Terminals in 2012
There may be one terminal which takes the place of all devices and is used for many
purposes - i.e. wallet, remote control, personal data storage and authentication. Terminals are
not always needed for communication - e.g. using voice-controlled user interfaces. Terminals
or devices that need to be controlled are used with a wide range of modalities (voice,
gestures, pointing, eye-control) and can give feedback to the user. Terminals can sense each
other and make assumptions on how they should react e.g. by going to silent mode in place
where other terminals are in silent mode if this is in user preferences. Sensors and terminals
are so small that they can be embedded in clothing and the environment. Terminal power
consumption (and extensive heat production) is challenging due to the large power
consumption of multimedia processing. This requires terminal platform and application
power optimisation. Power is produced in the terminals by fuel cells, and batteries can be
charged inductively without wires.
Networks in 2007
Network convergence is expanding, but end-to-end network control over security, QoS and
seamless fast roaming is not fully accomplished at the network level. Application level
handover is accomplished. Network-dependent QoS mechanisms are not fully interoperable.
Bandwidth is 2 Mbps on the move and 10-14 Mbps for a stationary user. Data traffic is
symmetrical in fixed networks but asymmetry exists in the mobile environment due to
browsing and download-type applications. Improvements on spectral efficiency rely on
emergent Multiple Input / Multiple Output (MIMO), adaptive antennae, diversity, Medium
Access Control (MAC) solutions. MIMO and smart antennae are used in base stations, but
not in terminals at this point.
Networks in 2012
Cellular, WLAN, WPAN and broadcast networks are mainly converged. Software Defined
Radio (SDR) is used to access all radio interfaces in an optimum way. It is possible that RoW
technologies are used in some cases to establish fixed-line networks connectivity - e.g. in
third world countries. Communication speed for mobile networks is 100 Mbps for a mobile
21
user and 1 Gbps for a stationary user. In the wireless domain this kind of speed may require a
very short range (i.e. below a few meters) between the transmitter and the receiver.
Multimedia services like VoIP, videoconferencing and P2P cause symmetrical traffic
(downlink-uplink) also in mobile network. Single login to heterogeneous networks provides
roaming of service, authentication, billing information and QoS guarantees with one
procedure. Ultra Wide Band (UWB) is a mature enabler to exploit fast data transmission of
short-range networking. Spectral efficiency is clearly higher than before due to MIMO, smart
antennae, ad hoc, diversity, new MAC technologies and cross-layer design. MIMO and smart
antennae are used in terminals and base stations. Cross-layer techniques over a TCP/IP stack
improve telecommunication system multimedia data delivery. PANs are used widely in
conjunction with ad hoc connectivity to other devices and networks, ad hoc and sensor
networks have multi-hop capabilities, moving network bubbles - i.e. PANs - can connect to
each other and sensor networks are embedded in our surroundings.
Content and security in 2007
MPEG-4 and its successors provide the foundation for video coding in 2007. MPEG-7 and
MPEG-21 are widely used for metadata descriptions of multimedia content. XML is a basic
mark-up language and is used in most of the applications.
Security is mainly done by Virtual Private Networks (VPN), Public Key Infrastructure (PKI),
SIM-card, bank account key numbers. Bio-identification is used in certain applications.
Content and security in 2012
Multimedia data content is a major source of traffic for telecommunication networks. In
order to save bandwidth, new multimedia coding algorithms are developed that have a very
high compression rate and are scalable to network load and the required video quality.
Security is embedded in all devices and the telecom infrastructure, which automatically does
SPAM and DRM filtering. End-to-end security is accomplished. Third-party certifications
are used. Authentication is done with one scheme that works for all networks and services; it
could be based on biometric or/and smart card approaches. User privacy is assured by thirdparty service providers that hold this information securely.
22
Services
Terminals
Networks
Content
Security
2012
23
24
Future/Vision
Past/Now
Time
C ommerce
Business
Models
Services
C ontext
Aw areness
C ontent
D igital Identity
and Security
Mobile
Terminals
N etw orks
R adio
Technology
25
4.1.1
Commerce
Future/Vision
Past/Now
Time
Shopping and Commerce on the
Internet
e/m-shopping
Readers in
Handhelds
RFID
Tagged
products
E-commerce
The Internet
G lobal Naming,
Numbering, and
Addressing
IPv6
Common
Authentication
SIP
All-IP
Telecommunication
Networks
Digital
Identity
M-commerce
Mobile Commerce
ubiquitously available,
network & terminal
indepence
common charging,
privacy & security
O pen Service
platforms
3G
SIM based
authentication
Charging
Mobile
Payment
O ne Invoice
Figure 4. Commerce
Figure 4 presents the critical path for commerce. Commerce is separately evolving in the
Internet and telecommunication networks, which are expected to converge in the future and
provide a common way of selling and purchasing services, products and things.
In the vision of the future people will be able to buy and easily consume services anywhere
they are provided by All-IP connectivity, and with many new ways provided by a natural
access to mobile commerce services.
Commerce requires security and the digital identity of customers, resellers and products.
Open service platforms will speed up the commerce development by integrating new
resellers into a global m-commerce network. Common authentication allows the
identification of the people and different parties involved in commercial transactions over
different networks.
In the future, commerce will go towards a point-and-order type of interaction. Tagged
products and mobile devices capable of reading tag information will provide access to
product information and make purchases instantly using mobile devices on the move.
An important role for commerce is the development of payment methods. There are three
major approaches: mobile operator charging system (local), credit card companies - e.g.
26
VISA - (global) and digital money (global). The low cost per payment transaction is crucial
in the competition between these approaches. In addition, the users trust of a payment
method is important - this is especially challenging for digital money.
The critical points in commerce are: user acceptance of new types of purchasing commonly
used trusted invoicing, payment and authentication systems, tagged products and tag readers
in terminals.
4.1.2
Business Models
Future/Vision
Past/Now
Time
System integrators
Information
Technology
ICT
Communication
Technology
Contract
manufacturer
O riginal Design
Manufacturer O DM
Equipment
manufacturer
Original Equipment
Manufacturer O EM
Equipment
manufacturer
IP Operators
Virtual operators
Network provider
with services
Network
provider
Service
provider
Internet
ISP/W ISP
Content provider
Application
Developer
Large number of
business roles
and rapidly
changing
business models
Content aggregator
Broker
Content
Provisioning
Application Service
Provider ASP
Application
aggretator
"End-users" providing
services
27
phase of the mobile services. Later, they also started to provide a large number of data
transport, infotainment and downloadable application services.
Regulation has an effect on the evolution of business roles. The competition authorities in the
EU and US emphasize open competition without monopolies. As a result, operators are
forced to open their network infrastructure to other players. Such new players are virtual
operators that use existing network operator infrastructure to provide GSM and data services
for their customers. Another revolution in the service market is the connection from the
terminal to the Internet - the realisation of a mobile Internet. This gives large opportunities
for service providers in the Internet to provide services to mobile users as well. Users can
then choose the Internet services independent of their mobile connectivity operator.
The general trend is towards separation of the network operator business role into network
infrastructure provider and service provider roles. In addition to the telecom business, a
similar trend can be identified in the broadcasting business - e.g. separation of digital
television network provider and digital television service provider.
The All-IP environment will be very versatile. There is a demand for third-party service
providers in order to reduce complexity and increase interoperability and communication.
Third-party added-value service providers will offer services for identification purposes
between individuals and businesses (e.g. MS .NET Passport [37], Liberty Alliance [38]),
managing context information, charging, personal data management, personal profiles
management and certification, etc. Brokers and aggregators will provide a platform where a
vast number of services, businesses and users can meet.
The "distance" between service provider and service consumer in value chains will be
shortened in the future. Examples of this are Internet music (MP3, CD) and the movie
business (DVD), downloadable mobile applications, etc. It will become easier and easier for
new actors to start providing services in the network. In the long term, even end users may
become service providers. This requires that business models include users not only as
people who pay for all the services but also as content creators and service providers.
The business models will have to cope with increased interoperability and open interfaces in
order to create the possibilities for gaining revenue by letting other parties use their resources
for a fee. The challenges in combined ALL-IP services reside mostly in business logic rather
than in technology. Already today these kinds of services can be realized, but business
models will not provide all actors in the business network with an incentive to start doing
business.
All-IP will provide global connectivity and markets, but local content and services will have
an important role in peoples everyday lives. For example, one will be able to download
DVD movies from a service provider abroad, but the local bus timetables, etc., will still be
found from a local service provider.
28
As the technology development cycle gets shorter and the technology complexity increases,
the possibility that even the largest companies can hold all the necessary knowledge and be
as fast as required in R&D will decrease. The current trend of contract manufacturing - e.g.
ODM, aggregator and integrator companies - will continue, especially in mobile terminal
development.
The critical points are the emergence of new business models that would provide revenues
for all actors in the E2E chain, adaptation to global markets and interoperability of business
actors' systems.
4.1.3
Services
Future/Vision
Past/Now
Time
All-IP
O ne service,
one network
eG overment
Voting, Tax
Secure
Interoperability of
services
Internet
eHealth
QoS required, terminal capabilities, user
acceptance for video calls
Chat
Email, news
Common Access to
medical and government
services
SIP
Instant
messaging
Multimedia
conferencing &
telephony
Context-aware
communication
e-mail
Autonomous ubi-services in
All-IP networks
Peer2peer
applications
File transfer
Computers
Understand content
Web
browsing
Semantic
web
Automated M2M
Remote access to
systems
Information in many
places, needs users
own effort
SMS
Ipv6
M2M
GPRS
SIP
SIP-based
M2M
Augmented
reality
Virtual
reality
Agents /
Avatars
Figure 6. Services
In general, services offered to users will follow the same technological paths as the
commerce path (Figure 4) and context awareness (Figure 7). Context awareness is one of the
key points to avoid frustrating users with too much irrelevant content in different situations.
The main vision of autonomous services (Figure 6) is that services will be available over any
access, user intervention will be reduced, and more and more services will appear. The main
issues surrounding this trend are a semantic web, secure interoperability of services,
multimedia conferencing, peer2peer applications, SIP, M2M, and agent-based programs in
virtual reality.
29
The important issue for mobile services is the service discovery. Typically today, the
information about mobile services - e.g. logos, ring tones and JAVA applications - is found
from traditional media, such as magazines and newspapers, and from web portals. In order to
have a successful mobile service business in the future, users should be able to find services
easily from the networks and from the surrounding environment in real time.
New services will emerge around multimedia communication, community sharing of content
and experience between family and friends, and local information services - e.g. tourist
guides, infotainment and e/mCommerce.
eGoverment and eHealth services will be available separately in the beginning, but later any
access will be used to access both services easily. This will require secure interoperability of
service infrastructures. The benefit of these systems is identified in the roadmaps to reduce
the costs of medical and government infrastructures.
A semantic web will allow computers to discover information sources, and interpret and
process information autonomously. Semantic web technologies are the main enabler for
service interoperability and a semantic web is one of the key technologies that will allow
automation of information sharing and processing between participants. For users, the service
interoperability will allow switching between services and using and sharing the data
managed and created by different services.
Multimedia conferencing and telephone and peer-to-peer services will enable richer
communication and easy distribution of information between users. The usage of the
different services (WWW, instant messaging, chat and email) that are used today will be
unified by SIP support over different networks. Rich calls will consist of calls combining
different media and services, such as voice, video and mobile multimedia messaging, into a
single call session.
Remote access to different systems and equipment is already provided by GPRS and SMSbased technologies. In the future, SIP could be used to open control sessions between these
systems. Semantic web information will provide the possibility of automating the exchange
of information between the services, systems and business transactions.
Information processing today is characterized by the fact that information is scattered in
different places, which are mainly accessible using manual searching with WWW browsers.
Information processing is going towards automation. Firstly, augmented reality systems will
embed information in the surrounding environment, which will then be accessible in different
ways - e.g. displays in spectacles and head-up displays in cars. After a vast amount of
information is available, monitoring of the new information will become too difficult for the
user. The solution to this will be avatars and agents working in virtual reality to allow
systems to make decisions and actions on behalf of the user.
Critical points for service evolution are: ease of use, service discovery, access to services
over networks and channels, personalisation and context awareness in services,
interoperability of services, functional security and authentication and management of
information, possibility of using services anonymously and lower technical threshold to
create services.
30
4.1.4
Context awareness
Context awareness is a key issue in the future services and applications ability to adapt the
amount and type of information provided to users at a given time and place. Figure 7 shows
the major paths to context-adaptive services, which consists of a user profile standard,
content-adaptation technologies and collecting context information from different locations.
Collecting, sharing and managing personal information and digital identity are prerequisites
to discovering new services from the networks that might be interesting to the user. A user
profile standard is needed for storing and using different types of context and profile
information on the users. The profile can be also used to find and customize services for the
users. Keeping a user profile in the network requires that users have a global identity and can
be authenticated. Most likely, the user profile standard will evolve from the
telecommunication networks.
Future/Vision
Past/Now
Time
Digital Identity
Satellite positioning
Global context
available in all
services
Cellular
location-based
Context
Telecommunication
Networks
G lobal location
awareness
User Personal
Profile Standard
Network profiles
Terminal Profiles
Context Adaptive
Services
Content Adaptation
Context from
environment
User Context
awareness
Presence
Electronic calendar
Terminals
Positioning
PIM context
Sensors in terminals
- noise, compass,
acceleration,
proximity...
Context Sensing
Terminals
31
and the information can be used differently depending on the situation. Future terminals and
networks will support various ways of obtaining context information and managing user
personal profiles and personal information, and automating service usage and communication
in daily life. One of the challenges is to communicate the relevant context information from
the various context sources to the service that is bring used - e.g. from sensors, mobile
terminals (e.g. sensors in a mobile terminal or shared context from other mobile terminals)
and networks (e.g. presence information or user profiles, user access rights etc.). The sensors
in terminals provide information about the sounds, illumination and temperature surrounding
the user, and the velocity, direction and actions taken by users - e.g. standing, running,
walking, etc.
The interoperability of different context sources requires a standardised way of presenting
and communicating the context. In addition to using context information to tailor the services
to the users' perspective, operators may also use context information for network admission
control and resource allocation - e.g. by knowing the mobile users direction from network
cell to another.
Services and applications may need position information of the user. Global location services
are provided by GPS, Galileo or Global Navigation Satellite System (GNSS), which would
mean combining many western and eastern satellite systems. The cellular and satellite
positioning will be merged - e.g. by A-GPS - but locally it could be meaningful to provide
positioning information also in local wireless networks e.g. using WLAN positioning.
In addition to location, the telecommunication networks can provide presence information,
which is valuable to context-based applications. On the other hand, business users in
particular keep an electronic calendar, which can also be utilized by context-aware services.
In more advanced scenarios the systems might be able to observe and learn user habits. This
information could be used to automate a repeating service usage on behalf of the user.
Critical points for context awareness are: user acceptance and control over automation and
adaptivity, management of context information (acquisition, processing, storing, sharing and
use), infrastructure support for context (sensors and intelligence in terminals and
environment, presence and location information) and common standards for context
information.
32
4.1.5
Content
Future/Vision
Past/Now
Time
Price/bit/service
Multimedia services
over fixed IP
Internet webpages
Mobile Multimedia
Telepresence
New coding
technologies
MPEG 4
Automatic
Content/Information
Processing
XML, SOAP
Web services
Content
Description
Languages
Semantic Web
O ntology
Standardized
Metadata
Metadata
Searchable Storage
Systems
Databases
DRM
Content created by
specialists
Realtime
Media Analysis
Individuals create
content and share
G lobal Content
Intellectual Property
Context
Adaptive
Services
Figure 8. Content
Figure 8 shows the critical path concerning the creation, management and consumption of
content. The content will be globally accessed using a diversity of terminals and networks,
content management and processing will be more automated, and content semantics will be
more and more understood by applications.
The way to create content is evolving from specialists to individual users and eventually all
content will be available to all when authorised. The critical paths leading to this are contextadaptive services, automatic content processing, management of intellectual property on a
global scale, and storage systems that distribute content in different ways using broadcasting
and other multimedia transmission methods.
Automatic content processing is made possible by semantic web technologies, real-time
media analysis and standardized metadata formats. These allow the automatic processing and
indexing of content into searchable storage systems. Management of owner and usage rights
of the content (DRM) is a precondition to searchable storage systems and it will increase the
popularity of developing new content. DRM techniques will evolve from the mobile
environment to a global scale.
New efficient information coding techniques are needed to reduce the amount of delivered
data in mobile multimedia communication, broadcasting and multimedia transmissions of the
content in the future. For multimedia coding, there is still much to be improved in coding
efficiency from the current MPEG-4 standard. As the compression ratio is improved, the
33
coding needs to be lightweight in order to match the mobile terminal processing capabilities
and reduce power consumption.
Critical points for content are: development of more efficient coding methods and content
description languages, storage capacity, search functionalities, Intellectual Property Rights
(IPR) protection, and Digital Rights Management (DRM).
4.1.6
Future/Vision
Past/Now
Time
Local firewalls and virus
protection
Common security
Multiple Digital
Identities
Biometric
identification
Traditional
Passport
Encryption
Biometric
Profile
standardisation
Public Key
Infrastructure
Possibility to
identify user if
needed or be
autonomous when
using a service
G lobal
authentication
services+ trusted
3rd party
Local
Authentication
SIM
Password
Biometric information in
digital format
AAA servers
Digital
Signature
Single Sign-on
Personal Information
G lobal Naming+
Addressing
34
One critical challenge for All-IP networks is security. Already today (2004) we are facing
severe problems with viruses, worms, SPAM and malicious attacks in networks. In order to
cope with these, the networks and computers have to be protected, e.g. with firewalls. As
more and more devices are connected to the Internet, so more protection is needed. The lack
of security or restrictions caused by security solutions (e.g. firewalls do not pass necessary
traffic for certain applications) may endanger the vision of ubiquitous access. There are also
a huge number of relatively simple devices connected to All-IP networks, such as consumer
electronics and sensors. It is not likely that these devices can be protected as well as more
powerful devices such as computers. Therefore, the security must be established in the
telecom infrastructure.
Global authentication services will be needed to guarantee the users digital identity during
anonymous access (from the viewpoint of the service provider) and fully identified access to
services (e.g. access to bank or company). Both Internet and telecommunication network
technologies will support the path. Common AAA servers will provide authentication,
authorization and accounting globally for all users.
Personal information can be stored in networks as a profile, which can be partly revealed to
service providers during the service access. The key point of security is that global naming
and addressing is available, after which the authentication services can be arranged globally.
Critical points for digital identity and security are: trusted global and local identification
(biometric identification, digital signature), development of virus protection methods and
SPAM filtering, improvements in network infrastructure security and anonymous use of
services.
35
4.1.7
Mobile terminals
Future/Vision
Past/Now
NETW O RK CENTRICITY
BIW displays
TERMINAL CENTRICITY
Color displays
3D displays
Time
non-rigid displays
Sensors in terminals
- noise, compass, acceleration, proximity...
Camera
Intelligent applications
Proprietary sw in MT
O pen platforms
Symbian/JAVA/
MS/Linux/SavaJe
Contextual, sensing
mobile terminal
Applications provided by
3:rd parties
O ne access
e.g. G SM
O ne modality
O ne antenna
Multi-access e.g.
2G ,3G , W LAN, short
range, DVB-H
Multimodal, natural
interfaces
Sector Antennas
MIMO in BS
Smart antenna array in BS
MIMO on MT and BS
Smart antenna in MT/BS
Power usage and high heat
production critical
NiCd batteries
Li-ion batteries
36
The user interface evolution consists of displays, multimodal interfaces and standard
applications, such as GPS, camera, biometric identification, etc. Multimodal interfaces are
the key technology as they determine the appearance and interaction of a device or
application. Multimodal interfaces will be optional to keyboard and mouse. Pen, speech, and
gesture-based operation will be increasingly popular for mobile consumer terminals.
The air interface consists of radio and antenna evolution in wireless networks. At present the
terminals are only capable of accessing one network at a time and a terminal is capable of
switching a radio network from GSM to UMTS. Parallel radio multi-access will allow access
to different radio networks at the same time. Antenna evolution promises increased
throughput and more optimal utilization of bandwidth using multiple input-output-capable
base stations and mobile terminals.
Terminals will be able to communicate with a large number of other devices using different
techniques (e.g. NFC, RDIF). Many types of sensors will be also embedded in future devices
to allow control of applications and to sense the current user context.
New multimedia applications, the many radio interfaces that may be used simultaneously,
and the increased intelligence in terminals will clearly require higher amounts of power.
Todays battery technology may not be able provide a sufficient amount of power/volume an issue that could become critical. Low-temperature fuel cells, such as the Direct Methanol
Fuel Cell (DMFC), may replace rechargeable batteries and solve this challenge. But if the
power issue is solved, another critical issue comes with the extensive heat production and
cooling for the handheld terminals.
Critical points for terminal development are: open sw-platforms and programming languages
that are interoperable and have more interfaces to terminal functionalities, development of
display technology, integration of sensors to terminals, ease of use, power consumption and
heat production.
37
4.1.8
Networks
Future/Vision
Past/Now
Unicast
networks
Multicast
networks
Unicast/multicast/broadcast used in
conjuction
Time
Transition period
(IPv4 and IPv6)
Short range
networks
Internet
convergence
Home/Local
networks
VPN
Converged networks,
seamless access
Sensor networks
Fixed-line Internet
QoS in networks
Cellular Networks
Mobile Internet
Mobile networks
SIP
ABC
3GPP rel 7 enables
Intra-technology
roaming and HO
in same techn.
Mobility
Multi-access
Seamless interdomain
handover between
technologies
Mobile
multi-homing
Session
mobility
Independent flow
mobility
38
Internet. It can be foreseen that there is a great need for new standards, protocols and best
practices concerning these issues in order to realise All-IP networking. The deployment of
IPv6 is also critical; the address space of IPv4 is running out and the current IP version 4
does not give as good support for security and QoS as IPv6. China has chosen their own
approach by establishing a new IP protocol, version 9, which should be interoperable with
earlier versions.
At least one, most likely several, networks will be available to users at any time. Flexible
network selection and usage from applications is a difficult issue. Vertical and horizontal
handover, as well as mobility between devices, will allow natural ubiquitous access to
services. Networks in the home and outside, and between devices are continuously being
changed and optimised by various protocols and methods without user intervention. The
critical issue will be the management of this process - would it be possible for networks to
communicate between each other and manage an always-on connection for a mobile user?
There is still much to come in the development path for mobility. From one open network
connection at a time, we will have many simultaneous connections to different services using
different radio interfaces. Furthermore, when we move, the session of these open services
must be maintained whilst the network connections vary. For this, multi-homing will provide
one device with many IP-addresses. Device will also be able to use multiple interfaces, e.g.
WLAN and UMTS, simultaneously and split traffic to most appropriate ones.
Sometimes, users will be using several devices at the same time and intelligent information
routing will be a key enabler in providing multi-access over networks and access types from
applications in different terminals to service content. Eventually, in the ideal case, the flow
mobility will manage the different streams (e.g. video and voice) separately to the most
appropriate available terminal (e.g. voice to headphones and video to wall screen) that
satisfies user requirement and context. The challenges are even greater for all-kinds of
mobility (terminal, session, flow) when the user's Personal Area Network is connected to
other PANs.
As the development pushes for higher data rates by advanced compression techniques,
diversity techniques and new radio interfaces, the way the TCP/IP stack works with new
systems may become a bottleneck. Already today there are examples of this kind of problem
- e.g. a high roundtrip packet delay triggers Transmission Control Protocol (TCP) congestion
control in 2.5 and 3G systems. Solutions for further development of telecommunication
systems could arise from cross-layer techniques with protocol optimisations between the
TCP/IP stack.
Critical issues for network technology evolution are: management of heterogeneous network
infrastructure, exploitation of All-IP with IPv6 protocol, end-to-end management of QoS,
security, session continuity, and operation of new kinds of networks like sensor and personal
area networks.
39
4.1.9
Radio technology
Future/Vision
Past/Now
Satellite
Broadcast
Satellite Systems
Analog T V and Radio
Terrestrial
wireless trunking
DVB-C/T/H, DAB
Microwave links
Terrestrial mobile
cellular systems
(Europe)
Time
Voice
oriented
NMT
G SM
UMT S
4G
GPRS
Data oriented
EDG E
SDR
cognitive radio
TETRA
Terrestrial local
(indoor) wireless
systems
Voice
oriented
DECT
WLAN
Data oriented
IR
WPAN
RF ID
NFC
5 Discussion
An extensive review and analysis of the major ICT Roadmaps was carried out during this
roadmap process. Comments and feedback for the work were collected from a large number
of experts. Nine critical paths were created for visualizing paths from the technology-centric
world to the user-centric world.
Based on an analysis of the major ICT roadmaps, the most important topics have been
identified and are summarized below. The envisaged development in network services and
related technology enablers has been presented in Table 2.
The content of the roadmaps has been classified under five different clusters: services,
terminals, networks, content and security.
Based on the analysis of the major ICT roadmaps and the interviews with the experts, it can
be said that we are moving towards a more natural use of network services in different
branches of life. This view incorporates the advancements in technologies encouraging users
to collaborate and share content, and use personalized and increasingly intelligent services.
As the amount of available services and content increases, there will be functions for helping
the user to manage services and content automatically based on his context or profiles.
Terminals are becoming more versatile and effective platforms for different applications and
services. In the long term terminals and even our environment will be able to take users into
account more naturally than today. Terminals will be equipped with an increasing number of
radio access technologies, local connectivity will be more important, sensors technology will
enable new features in terminals and user interaction technologies will help terminals to
become more user friendly and easy to use than today. Power will be one of the main
challenges in terminals in the coming years. In the long term software-defined radios will be
embedded in terminals. A complementing view of terminal development is an approach
whereby the user can communicate with digital surroundings without the terminal.
Networks will develop rapidly. They are converging and bandwidth is increasing remarkably
quickly, both for stationary and mobile users. Internet protocol will be the dominant network
protocol. Accurate global positioning, sensor networks and personal area networks will
emerge. Bandwidth is increasing towards 100 Mbps for mobile users and 1Gbps for
stationary users by the beginning of next decade. There will be new enablers for local
connectivity and the use of personal area networks and sensor networks will be part of
people's everyday lives.
Digital multimedia content will be the main traffic in future networks. As the amount of
digital content will increase dramatically, there will be an increased need for solutions for
more effective coding techniques, content management and rights management of the
content.
41
Business Models The critical point for future services, especially in an all-IP
environment are emergence of new business models that would provide revenues for
all actors in the E2E chain, adaptation to global markets and interoperability of
business actors' systems.
Services - ease of use, service discovery, access to services over networks and
channels, personalisation and context awareness in services, interoperability of
services, functional security and authentication and management of information,
possibility of using services anonymously and lower technical threshold to create
services.
Context Awareness user acceptance and control over automation and adaptivity,
management of context information (acquisition, processing, storing, sharing and
use), infrastructure support for context (sensors and intelligence in terminals and
environment, presence and location information) and common standards for context
information.
42
Digital Security and identity - trusted global and local identification (biometric
identification, digital signature), development of virus protection methods and
SPAM filtering, improvements in network infrastructure security and anonymous use
of services.
Networks - management of heterogeneous network infrastructure, exploitation of AllIP with IPv6 protocol, end-to-end management of QoS, security, session continuity,
operation of new kinds of networks like sensor and personal area networks.
43
Acknowledgements
The authors would like to acknowledge the following people for their valuable comments
and input to this roadmap. This work would not have been possible without comments,
suggestions and workshops with the Tekes NETS programme thematic group members,
especially the members of groups 1b and 3a, who are gratefully acknowledged. We are also
grateful that we were given the opportunity to interview experts in a number of companies
and organisations who gave us valuable insight and new views on improving our work.
The following people that gave comments and participated in the workshops during the
roadmap process are gratefully acknowledged: Heli Kukko (Tekes), Anssi Kujala (JPEpstar), Katja Ahola (Tekes), Risto Alander (Elisa), Olli Lukkari (MFO), Mika Ruostesuo
(Ardites), Jari Forstadius (University of Oulu), Mikko Jalonen TY/IT (TUCS), Timo
Leppinen (Ficora), Jari Ala-Ruona (Movial), Ville Typp (VTT), Arto Laikari (VTT), Reijo
Savola (VTT), Timo Prkk (University of Oulu), Jouko Sankala (Nethawk), Veli-Matti
Tuovila (Movial), Pasi Viitanen (VTT), Heikki Ailisto (VTT), Esko Strmmer (VTT), Miska
Kaipiainen (MEshCom), Jarkko Niittylahti (staselog), Max Bjorgren (Radionet), Kari Tilli
(Tekes), Raimo Kantola (HUT).
We gratefully acknowledge the following people that were interviewed for the roadmap:
Risto Alander (Elisa), Olli Martikainen (ETLA), Sami Grnberg (TeliaSonera), Bjrn Melen
(Ericsson), Lauri Haapanen (Incode), Timo Leppinen (Ficora), Kari-Pekka Estola (Nokia),
Raija Tervo-Pellikka (HUT) and Heikki Hmminen (HUT)
44
References
1. WWRF, Wireless World Research Forum, http://www.wireless-world-research.org/, 2004.
2. IST-Ambient Networks project, http://www.ambient-networks.org/, 2004.
3. IST-E2R project, http://www.e2r.motlabs.com/, 2004.
4. IST-WINNER project, http://www.ist-winner.org/, 2004.
5. Mikko A. Uusitalo, WWRF chairman, Nokia, Personal communication and draft material
of Book of Visions 2003, 15.3.2004.
6. CELTIC, www.celtic-initiative.org, 1.3.2004.
7. EUREKA, http://www.eureka.be, 2004.
8. IST Key Action II FP6 preparation roadmap projects, New Methods of Work and
Electronic Commerce, http://www.cordis.lu/ist/ka2/roadmap.html, 2002.
9. IST-MBnet, http://www.mobiforum.org/, 2003.
10. IST-IDEAS, www.ideas-roadmap.net, 2003.
11. IST-ROADCON, http://www.roadcon.org/, 2003.
12. Insight Research Corporation, USA, http://www.insight-corp.com/, 2004.
13. Gartner Inc., http://www3.gartner.com, 2004.
14.
NETS,
Tekes,
Uuden
tietoliikenneohjelman
http://akseli.tekes.fi/Resource.phx/tivi/nets/kuvaus.htx, 29.1.2003.
suunnitelma.
45
46
3GPP
AAA
A/V
Audio/Video
ABC
ACM
ADSL
API
AMI
Ambient Intelligence
ATM
B2B/b2b
Business-to-Business
B2C/b2c
Business-to-Consumer
BAN
BW
Bandwidth
CC/PP
CDI
CDMA
CELTIC
Co-operation for a
Telecommunications
COPS
CORBA
CPN
DAB
DARPA
DBS
DEAS
DMFC
47
European
sustained
Leadership
in
DiffServ
Differentiated Services
DRM
DS/FH-CDMA
DSL
DVB
D-WDM
e2e
End-to-End
EDGE
EDI
ETSI
FDM
FDMA
G-MPLS
Generalized MPLS
GNSS
GSM
GPRS
GPS
HAVi
HFC
HSDPA
HSI
HTML
HW
Hardware
ICT
IEEE
IETF
IMS
IP Multimedia Subsystem
IP
Internet Protocol
48
IP/MPLS
IPR
IPV4/6
ISP
IST
IT
Information Technology
ITEA
ITU
LAN
LBS
m2m
MC-CDMA
MAC
MEMS
Microelectromechanical systems
MBnet
MC-CDMA
MCS
MIMO
mITF
mobile IT forum
MIPv6
MP3
MPEG-2/4
MPLS
NFC
NGN
NIST
ODM
OEM
O-FDM
49
OFDM
OMA
OPEX
Operating Expenditure
OSA
OSS
PAN
PAM
PDA
PHY
Physical layer
PKI
PoC
QoS
Quality of Service
RDF
RDIF
ROADCON
RoW
Right of Way
SDMA
SDR
SIP
SLA
SME
SMS
SOAP
SONET
SS7
Signalling System 7
STB
Set-Top Box
SW
Software
TCP
TDMA
50
UaProf
UDDI
UI
User Interface
UMTS
UMTS PS
UPnP
UWB
VAN
VDSL
VHE
VoD
Video on Demand
VoIP
Voice over IP
VPN
VTT
WAP
WDM
Wi-Fi
Wireless Fidelity
WLAN
WPAN
WWRF
WWRI
XDSL x (generic)
XML
XMPP
Roaming
Seamless handover
51
52
The market makers are the young and children. They are used to new technologies and are
interested in new things. The price for services should be small, since this user group will be
first users but will have few resources. The EU has also stated that the specific categories of
end users (i.e. children, disabled) must be taken into account in telecommunication systems.
In traditional networks this is achieved with large keypads and screens or by feedback in
telephones, emergency calls, etc., but for emergent IP-based call systems very little is being
done. Since everything is to be based on IP, the services and applications would be easy to
deliver and they would gain large markets. This is something that has large potential in the
future, e.g. for SMEs to keep an eye on.
The present mobile networks are not designed for session mobility or handovers between
different operators, even with the same access technology. There are signs that handovers
will work in 2007. Variable bandwidth capability in UMTS is needed. The packing
algorithms need to become adaptive and related to bandwidth. It is likely that the bandwidth
adaptation will be still missing in 2007 and no host identity will be available.
The Internet Protocol (IP) has become the dominant design standard for new telecom
services. All services and terminals will become IP-compatible. At the same time, generic
network services and systems will become commoditized. IPv6 will certainly come before
2012. There are good reasons and major indications for this. First of all, in Asia there are
very few IPv4 addresses and they need IPv6 to enlarge their address space. The major
indication is from the USA, where the Department of Defence has committed to a complete
migration to IPv6 by 2008. IP networks will be pervasive; high prices will not be charged for
use of the network. Terminals will become a commodity. This will consolidate the telecom
industry. Value creation will move from the network to all-IP-based applications. In the
operator networks, IMS will be a platform for services. The IMS system is IPv6-based,
although it will initially be IPv4-based. TCP/IP is an important standard as well as web
services, SOAP and OSA/Parley, and OMA, which will become important techniques in the
IP world.
The main areas for mobile applications are infotainment and positioning services. The
positioning information can be used in many applications for end users. The location
accuracy of a few cm would be challenging but attractive. For infotainment, mobile TV is
likely to be successful. People would like to use their free time with video or TV in a mobile
device. Some monthly fee could be even paid for it, but not on an each-view-time-basis. For
the 3G services, the software development cycle must be short, which is understood by
Nokia.
Voice over IP (VoIP) will soon be a major service for residential users. The users will be able
to call other users via their home ADSL without paying extra in addition to the monthly
broadband payment. Even the other the person-to-person communication services will be
important. Synchronisation of office calendars and the familys calendars could be
established. The car networks and the communication between car-to-car and the traffic
53
environment will increase and improve traffic safety. Telematics (traffic information system)
will emerge. Health care and security will become an important service.
The number of home networks will increase and an important issue in the home is their
connectivity to the Internet with broadband connections, as well the privacy and security of
home networks. The connection could be terminated to some smart device - e.g. a set-top
box, iTV or gateway - that would be connected to the home security and home ventilation
control systems, and personal data. A lot of technologies already exist and give the
possibility of creating new services, but other factors prevent their expansion (pricing,
regulations, etc). The SIP-based applications could offer potential new services for
residential users. Approaches like Napster, Kaza and other democratic services could also
become important home-related services, although the operators seem to have strong
resistance to changes in their business models.
It is likely that the E2E connectivity of IP devices will create a similar boost for new
services, as when SMS emerged. Old ideas with SMS may be also valuable in this new
situation. M2M will be an important source of data traffic in the future. Many automatic
applications will create traffic and they will be connected either though a wired or a wireless
link to the Internet. M2M will be important within the 2012 timeframe. It is expensive to
have people monitoring devices, so it will naturally evolve towards M2M. For peer-to-peer
M2M communication, the IPv6 is an important enabler.
There will clearly be more third parties that will do similar things to the present Telco's, like
content and service provision. Both ways will co-exist and new brokers will appear, so the
operators have big opportunities but also big challenges ahead. One model is that the
transport providers will offer the connectivity and the third parties and operators will provide
the services. Open interfaces between operator networks are important to have, but not to
open operator networks to third parties.
The charging model will depend on the application that is used. Transaction-based charging,
the amount of transmitted data, or monthly payment may be used, or combinations of these.
It should be pointed out that mobile payment is clearly safer than Internet payments and if it
is made easy (e.g. part of the phone bill), users are likely to use mobile payment methods.
The methods for charging will emerge and new possibilities for network payments, like
micro payment, will appear.
Although the importance of DRM is realised, there will be difficulties in introducing the use
of DRM. It is unclear how DRM should be located in the networked infrastructure. The
business model is unclear at present: who wants to pay for DRM. The role of TEOSTO in
Finland is unclear. SPAM filters are ok, but DRM will create problems: no motivation for
strong DRM protection. The rule of TEOSTO prevents the use of proxy servers to distribute
the content to a larger audience in the net.
54
55
One device for all will be the evolution of the mobile phone. When people want IP over
Mobile, one important interoperability factor is JAVA, which is used widely both in the
Internet and the mobile domain. The JAVA interoperability does not yet work properly, even
with the same terminal type and different OS SW versions. A lot of work has been done and
is still needed to fit TCP into the mobile environment. The mobile terminal will approach the
PC, but it must be remembered that mobile terminals will never be as fast as PCs and the
applications must be tailored. The power consumption of future terminals needs to be solved
as well. New operating systems for mobiles will emerge in the future. One OS for terminals
in 2012 does not seem likely; instead, the situation will be like today, with many mobile OSs.
Frequencies up to 5Ghz are in use today. The speed is going forwards to 100Mb; the question
is how many bits/hz can be transmitted in future. 2Mb is the theoretical limit of UMTS;
WLAN can have a higher speed. Adaptation to variation of bandwidth and its changes is
important. The SDR technology will be used in all radios. Very-short-range radios will be
needed in future. The UWB has the range of WLAN. No explosion of bandwidth in the radio
networks, but it can be possible in the core network. The wires will also be important in the
future.
Not only technologies but also regulations and public interest should be taken into account
when defining this roadmap. An example is in Sweden with the "fiber-to-home" concept,
where the society is involved in building and financing the network infrastructure. You
should also be prepared for and adapt to the cases where "something" will pop up from some
side path. Like, for instance, VoIP. The future will show whether this will be applicationdriven or technology-driven progress.
In the telecommunication business, regulation has a higher impact on the business than is
generally imagined. The driver of the regulation authorities is competition. The regulator
thinks that competition forces actors to be more effective and innovative. The current trend
on the regulator's side is the adoption of an Internet-like architecture in the
telecommunication business. The main implication of this trend is the separation of data
transfer and service provision.
In the long term, the separation of network-operating and service-operating will highly
influence business. The main consequence will be the increased pressure for convergence.
Virtual operators / service operators have a possibility to provide multi-channel services
when they integrate data and GSM services from different network operators. The business
of virtual operators is based on the fact that the regulator forces network operators to sell
network capacity to all actors in reasonable conditions.
In the GSM environment business models have been quite stable for some time. It is likely
that the business model in person-to-person messaging (voice, sms, mms) will remain stable.
There is little room for new business models and new actors. IP-E2E operators will not have
a big role in person-to-person communication. However, the situation is different in the
56
corporate solutions. Actors providing data connections for businesses are also starting to
provide GSM connections to the companies (can act as a virtual operator). Therefore, these
actors are able to provide all communication services for companies - e.g. data services,
GSM communication and VoIP calls. This phenomenon is due to the regulators efforts to
separate network operator and service operator business. In this kind of business there will be
a large variety of different value chains and competing business models available.
Continuous change will be the state of affairs in this business.
Invoicing is the major thing in mCommerce. The party collecting payments from the user
will have a strong position in the value chain. There seem to be three major alternatives for
an electronic payment service provider: mobile operators providing payment services for
their clients, credit card companies (like VISA) and electronic money. In the mobile
payments the fight will be between the mobile operators and the credit card companies. One
of the most important factors in this fight is the cost of a single payment transaction. The
actor who is able to provide a more effective (and low-cost) invoicing process is likely to be
successful. There are two main factors in lowering the price of the payments: The amount of
paper handling in the invoicing process and the recording and storing of payment
transactions data.
The challenges in mobile applications and services (especially applications, which need
many actors providing content or service) lie mostly in business logic in the value chain
rather than in the technology. System integration is a really challenging task when there are
many actors in the value chain. There is a need for business system that makes the transfer of
money and bits synchronized in a way that is generally accepted. Cultural evolution is
needed in addition to many small developments in various technologies
New business models in the ALL-IP world will be increasingly complex. Brokers making the
business models look simpler for the end user have a certain time frame in which to do
business. As business models stabilize, the brokers business possibilities will be diminished.
The "distance" between service provider and service consumer in value chains will be shorter
in the future as it becomes easies and easier for new actors to start providing services in the
network. In the long term, even end users may become service providers, although this
development is not realistic for the near future.
Major issues in the future development of the business environment of network-based
services are: shorter distance between service producer and consumer, service discovery and
payment solutions. As value chains in network-based services will be shorter due to All-IP, a
direct link between the producer and the consumer will be established. This development will
have a great impact on business. Search engines that tackle the service discovery problem are
a permanent phenomenon in the Internet. The importance of these super-hubs will be even
higher in the future due to the increased amount of data in the Internet. These super-hubs are
global players like Google, Yahoo, etc.
57
Technical categories
The following categorisation is used to summarize the Book of Visions 2001 - i.e. Human
Perspective of the Wireless World, Service Architectures for the Wireless World, Cooperative Networks and Spectrum, new air interfaces and ad hoc networking.
Human Perspective of the Wireless World
Communications in the Wireless World will meet (and perhaps even exceed) user
expectations in terms of simplicity and functionality.
Our environment should be constantly tailored and personalised to our likes, habits and
situation. Users are in control. We will use the services and devices surrounding us with
interfaces traditional to humans, like voice and gestures. We will be helped by augmented
reality, which will provide our daily life and physical view with useful information.
Applications should work with all kinds of people - the elderly and the disabled - and also
take cultural differences into account.
Service Architectures for the Wireless World
Service adaptation and personalisation are the key issues. The user can be provided with
individualized services for his actual demands based on an evaluation of profiles that
describe user preferences, service capabilities and sensing information about its actual
environment (context). For gathering the user information, self-learning capabilities could be
used.
58
Personalisation can be carried out at present with techniques like VHE, PAM, CC/PP,
UaProf, MPEG, XML, agents, etc., but for the future Wireless World the consensus on
profile format, standards and security, and profile learning functionality would be beneficial.
The first context aware applications already exist today and use location information in a
mobile map application.
For adaptation, there is currently no common model that would allow applications to adapt
dynamically to new situations (location, time, user needs, network, and terminal capabilities).
It is also challenging to formulate a set of rules corresponding to the insufficient, inaccurate
and sometimes contradictory information on the user. Agents may search for information on
behalf of a user
Open interfaces to make networks accessible to third-party service providers such as Parlay,
OSA, JAIN. Novel business models and services will emerge for converged
telecommunication systems based on ubiquitous wireless services. For the software
development process, the standardisation is moving towards open APIs, on top of which
almost anybody could create his or her own applications. Instant messaging implemented by
an SIP-type of protocol may replace the SMS-type of communication.
Co-operative Networks
In converged access everybody should have seamless access to all services, independent of
their location and terminal type. Co-operation between different network technologies aims
for seamless delivery of a range of services and applications with an appropriate delivery
mode (unicast, multicast, broadcast), with agreed (pre-determined) Quality (QoS), via
appropriate air-interface technology in order to achieve always best connected and to
achieve a balance between cost/quality/spectral efficiency. The seamless roaming of services
and terminals will utilise general authentication, charging and personalisation methods
supported by end-to-end security. IPv6 will play a major role and provide a more sound
technical foundation to security, mobility, QoS, etc., than IPv4.
Intertechnology mobility is optimised well (e.g. in cellular networks), but does not work
across different access networks. SIP provides personal mobility by locating one or more IP
addresses whose use can receive multimedia stream with a location-independent addressspecific domain (e.g. changing a device without notifying the caller). This does not work for
user/terminal mobility between network domains during the calls. The Mobile IPv6 (MIPv6)
tackles this problem but it is not designed for real-time services. Micro-mobility solutions
improve the situation for handover-related packet losses and delays.
QoS is typically based on intserv, diffserv or a hybrid of them. The end-to-end QoS support
is still challenging to reach since each network only deploys their unique network-related
QoS mechanism. QoS mapping may be beneficial and it will be necessary to expand it to all
59
system layers. Even more challenging is the maintainance of QoS with mobility. New
transport-level protocols are needed (not plain TCP/IP) to support QoS.
Spectrum, new air interfaces and ad hoc networking
Intelligent devices will surround us. Sensors and actuators embedded in appliances and/or
carried by living beings will interact between themselves as well as their physical
environment. In addition, the increase in the number of mobile users and amount of data that
is delivered over the air channel will require more efficient use of the radio spectrum.
Frequency band is a limited resource, thus the usage of frequencies and bits/Hz/sec/km2
needs to be improved. The target for beyond 3G system bandwidth should be
100Mbps/1Gbps. Radio link performance can be greatly increased by MIMO, space time
coding, multi-user detection, multi-hop links, relaying, new air interfaces like ultra wideband
(UWB) and smart antenna techniques. Smart antennae (antenna arrays) are also integrated
with mobile phones. Refined Multiple Access Techniques (MAC) would allow more
simultaneous users to be allocated to a certain communication channel. Information
compression techniques are important to develop in order to save bandwidth.
The spectrum is usually reserved to respond to peak hour demands; dynamic allocation of
spectrum is more efficient. Frequency Sharing Rules (FSR) allow different radio standards to
co-exist in the same spectrum.
One of the main goals is to achieve Software Defined Radio (SDR) terminals and base
stations that can change their radio technology using only one radio hardware, while the
adaptation is done with software (downloadable software).
60
61
Advance of the Internet: the Internet will become a mass medium and IP
the leading network protocol.
Services and applications are key: the end user is only interested in
services and applications; the underlying technology is not relevant.
Reduced cost/bit
62
Table 3 Summary of WWRF Book of Vision 2001. The timeframe of the Book of Vision 2001
was towards and beyond 2010 .
Vision
Scenarios &
user needs
Services
Terminals
Network
Content
Security
Other
Factors
Our environment consists of intelligent devices and sensors, constantly tailored and
personalised to our likes, habits and situation. We communicate with our
environment using voice and gestures. We are helped by augmented reality, virtual
reality and avatars.
Services are adapted to users by profiles and self-learning
Converged networks provide always-on, always best connected, guaranteed end-toend QoS and security.
Networks-in-networks are like nested spheres inside one another, starting from
BAN, PAN, etc.
Services need to be easy to use
The user is the key to understand what
is needed
All kinds of people (young, old,
disabled) should be able to use the
Body Area Networks (BAN): wearable
services
electronics embedded in clothing or
implanted
Videoconference, telepresence, VoIP Services are context aware (location,
situation ...)
Services are personalised and selflearning
Open interfaces to services and
networks for third parties;
Profiling is used (learning profiles),
OSA/Parlay, JAIN
common profile format.
PAM, XML, SOAP, UDDI, WSDL,
SIP is a major service enabler
HAVi, UPnP, Jini, RDF, OPES, CDI,
Agent technology is used
CORBA, JAVA
Service discovery for all services
All senses communicate without
Terminals can "sense" the environment
terminals
HMD (head-mounted displays)
Multimode (simultaneous and SDR
Wearables
radio accesses), multimodal (voice,
Terminal profiling CC/PP, UaProf
gestures, haptic-feedback),
Terminals have authentication method
multihoming (many IP addresses)
terminals
Intelligence in terminals, smart
antennae
Cellular networks converged with
Mobile IPv6 + micromobility
local and short-range networks,
New transport protocols emerge
UMTS, WLAN, BT, UWB, DVB,
New efficient technologies to improve
xDSL
spectral efficiency (MIMO, new 4G air
100Mbps / 1 Gbps
interfaces, UWB, OFDM, diversity
PAN, BAN
techniques, smart antennae, beam
forming, MAC solutions, multicarrier)
End-to-end QoS guaranteed, DiffServe
in IP
Frequency sharing and co-farming
IPv6 core protocol
Wireless routers
Ad hoc networks
Sensor networks interact with users
and other devices
Home networks and VHE
MPEG-7
CDI
New efficient information coding
techniques
From individual firewalls and VPN's General authentication method, AAA
to security embedded to all systems in
servers
a heterogeneous environment
Privacy of user information
Novel business models will emerge
Price for bandwidth will decrease dramatically
Mobile communication will increase enormously
Different frequency bands worldwide
63
Technical categories
In the following, the Purple Book is summarized under four categories: services and
applications; networks, terminals and multimedia; security; and business models.
Services and Applications
The key issues are personalisation of the services and contents according to the users
preferences, the context or ambient awareness (including time, location, situation, etc.) in
order to catch the usage environment and adapt the contents and services based on the device
and network capabilities. Even if these topics have been researched in several recent projects,
there is still no common understanding of the concepts and methods. Person-to-Person
multimedia communication in general will be one of the main service areas.
The user applications/services will adapt to the specific user profile in different
circumstances (e.g. be silent, disconnect on low battery) and network conditions (e.g.
available positioning services, available presence and context services, available
billing/charging mechanisms, available local content).
The scalable service platform will provide service management and charging, and inter-work
with other domains. It is also open for third-party service providers to import their own
services. Service platforms have to support several business models. The application server
will be based on open platforms and open APIs for the creation, provisioning and delivery of
advanced next-generation services. A common IP charging (not proprietary) solution is
needed. IP-based Multimedia Services (IMS) will be the means to handle services using the
packet switched domain. The JAVA and OMA forums will provide solutions that can be
used in many environments. A short development cycle is more and more crucial for service
applications - e.g. with new tools, open platforms and toolkits for developing new services.
64
It will be possible to offer and charge for services with different QoS. Therefore, user
applications need to be more intelligent - e.g. capable of asking the charging rates from the
network.
User needs concerning services should be identified. Significant improvement in the user
experience and usability of services and applications is required.
The advent of home connectivity and home networking is emerging. In residential areas, the
important services are communications (e.g. wideband Internet access, videoconferencing),
entertainment (e.g. VoD, games), digital home management (e.g. security) and home
networking. Storage functionality is integrated with home equipment - e.g. to a gateway.
Terminals and user premises equipment should be developed to enable good usability of
services, as in the mobile domain.
Some of the current services are voicemail, unified messaging, voice portal, voice browsing,
audio mining, multimedia conferencing, call centre, application server, enterprise resource
planning (ERP), customer relationship management (CRM), hosted web, storage, computing,
IP service switch, teleworking.
Networks, terminals, multimedia
It is expected that the future of the terminal equipment environment will consist of
distributed components that interact via self-organising home/enterprise/provider networks to
offer the users an integrated experience of information retrieval, audio-visual entertainment
and multimedia communication. Networks become more automated and possess selfawareness with the ability to self-configure and recover. The new ways of communicating
between people in multimedia networks will be built on the three cornerstones of presence,
messaging and mobility.
To accomplish the converged networks vision, the roaming between operators and network
technologies, and between public and private networks has to be accomplished. The mobility
should be seamless between the terminal, the user, and the session. Networks will be
enriched with features such as presence management, dynamic call management, advanced
unified messaging services and multi-modal service management interfaces. The connection
to the Internet would be always-on and be based on an all-IP packet-based multi-service
networking environment. Privacy issues related to roaming need to be solved - e.g., sharing
of identity/profile information, and a common authentication method is needed. The data
storage and computing will be increasingly embedded in the network infrastructure - e.g.
because of the personal information storage or intelligent environment.
Ad hoc networks will be used in temporary situations - e.g. in a conference to build up an
autoconfigurative network and as an extension to access network coverage. Their security
and authentication is a challenging issue to be solved.
65
The mobile phone can be seen as a "hub" that enables Internet connectivity for other user
devices (PAN). Whenever the persons move, at home, in their car or in public places, the
associated personal network bubbles will move with them. An overall network
management is needed for the heterogeneous network environment. In addition, the networks
will possess self-awareness, plug-and-play device installation, self-configuration, and repair
and recovery. In customer premises the home networks can provide connectivity between
home appliances.
The broadband infrastructure should allow for an easy migration to 100 Mbps per user by
2008-2010. In optical high-speed networks (C)WDM, 80Gb/s can be expected in 2008 and
development of single-rack Terabit IP/MPLS routers with 40Gb/s line cards in a few years.
Enhanced xDSL, WLAN and cable modem will provide broadband with the last mile
connectivity. It is also possible to use a low-cost (e.g. for Third World countries) novel
broadband delivery over Right of Ways (RoW) using the existing infrastructure of sewers,
gas pipes and drinking water pipes. This can be applied with power line data transmission or
by satellite delivery (e.g. for distant rural areas).
For the QoS level guarantees, there is a need for a method of establishing E2E QoS,
monitoring the QoS and providing the protocol support, also considering the type of radio
access. Service Level Agreements will provide a solution to arranging certain QoS between
networks domains. Scalable coding could be used in conjunction with QoS protocols.
As the amount of content increases, the importance of Digital Right Management (DRM) and
end-to-end Content Protection techniques (CP) increases.
Bit rate efficiency can be increased by advanced transmitter / receiver technology - e.g.
MIMO, space time coding, (SDR) Software Defined Radio and diversity methods in general.
Important radio technologies to be considered are OFDM, DS or FH CDMA, MC-CDMA,
SDMA enhanced 3G, UWB, ZigBee and HSDPA (around 10 Mbps) extension of 3G. The
link adaptation can provide the best modulation and coding scheme corresponding to the
situation. In the upper level to PHY, the advanced MAC solutions - e.g. MAC schemes
changed in-flight - may provide improved efficiency for medium access. The topic "Crosslayer-Design", already notified in 3GPP, is a promising method for optimising data
transmission at the MAC/PHY level. In ad hoc networking the bandwidth usage efficiency
should be improved in by, e.g., optimisation of the physical and MAC layer co-operation for
this purpose. For the efficient delivery of content at the network level, the multicast
technique is important. New information compression techniques after MPEG-4 (H.264 or
JVT) are needed to save the bandwidth.
The terminals may include new UI for security, privacy and DRM enforcements (smart card
reader, biometric sensors). Novel UI methods with terminals may include tactile feedback,
66
SECURITY
In addition to user-initiated virus protection, the operators and telecommunications providers
will have to develop mechanisms to prevent and mitigate attacks on their customers.
Therefore, the inbound security should be taken into account for all system levels, products
and technologies. Content filtering will be extended from virus detection and SPAM filtering
to DRM filtering in order to ensure that the infrastructure is not intentionally used to violate
authors' rights. When the user must be identified (actually in many usage cases the
anonymity of the user must be assured!), the global identity management could be done by
solutions based on Microsoft Passport or Liberty Alliance Project types of approaches.
Common authentication architecture for security in wireless access (e.g. WLAN and its interworking with existing 3G or 2.5G) is needed. Certification of trust may be done with thirdparty certification, such as Common Criteria. Advanced cryptography algorithms will appear.
User privacy protection is important. End-to-end security management is needed in all-IP
connectivity.
Smart cards could be used for user identification. Integration with SIM card or RFID type of
functionality is uncertain. Memory should be increased to use smart cards as a data storage
and application container. XML-based technologies are becoming prevalent in today's
information systems and should be studied in E2E security solutions.
67
Business Models
In this arena it is expected that the traditional operator-led business models might be
complemented and co-exist with new kinds of business models in the near future. It is
expected that solutions for Service Brokering - i.e. for adding value by managing user
identity, profiling and billing - and for granting access to services in a homogeneous way will
emerge. At the same time, normal end users can become service and content providers; enduser groups can establish communities for sharing information and content.
Some business models for traditional telco:
68
10 years from now I will have a personal network around me wherever I go with
access to all my services (providers) and information.
All kind of devices in my home (residential) network can be safely and securely
controlled by me anytime anywhere and supported by my service providers when I
authorise it.
The cost of the access network will be marginal (equivalent of 30 /month) and still
provide my high-bandwidth access in the order of 10-100Mbps
Operators can roll out multiple services quickly and affordable as each roll-out is a
reuse of an existing back office process for supporting services and flexible
core/metro/access networks.
The new information society scenario is leading to a situation where the home is
increasingly becoming a place of work.
It is expected that residential users will, together with business, be the main sources
of revenue for operators and manufacturers.
While there used to be one distinct set of applications per network infrastructure,
most of the applications will now be deployable on many network infrastructures.
Convergence is expected between the gaming and the audio-visual industries, on the
level of end-user equipment (game consoles with video recording capabilities).
A real integration of communication, A/V and gaming applications will first emerge
in the area of on-line gaming. New modes of multimedia person-to-person
communication will emerge.
Industry is moving towards using open software platforms that enable widespread
applications development, Java and Open Mobile Alliance (OMA) being the key
solutions.
A more symmetrical bandwidth than todays ADSL (Asymmetric Digital Subscriber
Line) or cable modem is needed to deliver symmetrical data services like video
69
The bandwidth is expected to grow from the 1 Mbit/s offered today via ADSL
(Asymmetric Digital Subscriber Line) or Cable modem to 10 -100 Mbit/s in the next
decade.
Satellite access systems envisage broadband deployment in areas where wired firstmile solutions fail to be cost effective.
One of the main "revolutions" in person-to-person communication will be the longawaited addition of video to the standard voice stream with the development of video
telephony.
MPEG-4 Advanced Video Coding, also named H.264 or JVT (Joint Video Team
merging MPEG and ITU-T groups), is expected to become the prosperous successor
of MPEG-2.
Location-Based Services (LBS) are expected to provide new revenue for all the
actors in the value chain
In the 2004-2008 timeframe, 3G, Wireless LAN and Bluetooth will be important
wireless technologies to build applications on.
A huge potential of less progressive and/or elderly people that are less familiar with
multimedia communications and multi-modal functions.
Service brokering business models are likely to appear for adding value by managing
user identity, profiling, billing and granting access to services
The post-PC era is emerging, when not only the PC is connected to the Internet but
also game consoles, Internet enabler TVs, Internet smart handheld devices, web
terminals, PC tablets...
70
Table 4 Summary of CELTIC Purple Book 2003. The timeframe is mainly towards 2010.
Vision
Scenarios &
user needs
Services
Terminals
Network
Content
Security
Other
Factors
The user applications adapt to the user context using profiles and network services (presence,
positioning, billing, local services, QoS) that allow rich communication
Services in residential areas are used widely, access to the Internet with fixed and wireless
broadband, user control of home appliances and their updates from service providers
Networks provide all-IP packet-based, always-on access, inter-intra network roaming, network
access to my "PAN bubble" - e.g. via mobile phone - with 10-100 Mbps at a cost of 30 per
month
Security is integrated at all system levels, common authentication and security schemes are used,
virus and DRM protection is embedded in telecommunication infrastructure
Significant improvement on user
Normal end users become content and service
experience and service usability is
providers
needed
The terminals and applications must be
more intelligent to improve usability
VoD, messaging, games,
IMS major service handler
videoconferencing, digital home
Software application cycle short
management
Open API's and platforms for third party
Rich communication (presence,
QoS value-added services
positioning)
JAVA and OMA forum solutions
Context aware services, e.g. closing
Service platforms connected to OSS
phone in meeting
Agents (still challenging)
Person-to-person multimedia services
XML prevalent
SIP key enabler
Multiaccess terminals (2G, 3G, WLAN, Support sensing and controlling of environment
Bluetooth...), multiple sessions managed Support novel Uis, voice, gesture, tactile
through many radio interfaces
feedback, eye control
Multimodality terminals
Data storage functionality in home equipment
and network infrastructure
Support positioning (GPS, Galileo, EOTD, using also MIMO and smart
New UI for security and authentication (smart
antenna positioning)
card, biometric sensors)
100 Mbps per user
E2E QoS protocols, Qos guaranteed, SLA, QoS
monitoring
PAN networks with outer connectivity
Ad hoc networks
Network roaming (inter-intra
technology, operators, public-private)
E2E network management, MPLS, GMPLS
Network self-configurability, self Improved technologies: OFDM,DS/FH CDMA,
repairing
MC-CDMA multicarrier, UWB, ZigBee,
HSPDA, MIMO, SDR, advanced MAC, crossPositioning support
layer design, link adaptation
Multicast
(C)WDM, HFC-based optical networks Optical core 80Gbit/s 2008
Satellite networks
DRM and Content Protection (CP)
New information compression techniques after
MPEG-4 (H.264) in conjunction with QoS
H.323, MGCP, SIP proxy
adapted delivery
Common authentication method
VPN
Advanced cryptography methods
Third-party certification
SPAM, DRM network filtering
E2E security management, XML could be used
PKI most used
Smart cards with larger memory and
applications
Heterogeneous networks need a controlling system to function in the best way
Service brokering business models will emerge
71
Home - All kinds of activities that may be required by people in their private
environment in order to achieve exchange of information inside and outside their
home through and between all possible appliances.
Nomadic - All kinds of activities that may be required by mobile people outside their
home or working place to achieve exchange of information and, possibly, perform
some tasks. It also includes any means of moving from one place to another.
72
Cyber enterprise - All kinds of activities that may be required by a cluster of people
who communicate with one another to achieve a common (technical or economic)
goal or perform a task, regardless of their organisational or geographical location.
Services and software creation - All kinds of activities that may be required to help
the different technical people engaged in designing, implementing, verifying,
maintaining and modifying software-intensive products and/or systems and/or
services
Content - deals with signal, data, information, document and knowledge from
capture to complete processing. Three technology categories
Infrastructure and basic services - deals with transport mechanisms and protocols,
as well as with the management of the networks (including security). It is
articulated into four technology categories
Human system interface - deals with the interaction between the human and the
appliances and systems that support the services. It is composed of only one
technology category
Content
The content technology category can be considered a means for the acquisition, processing,
representation, sharing and management of content. The content can also be considered on
different levels of abstraction: signal, data, information and knowledge.
The main trend in te content category is digitalisation. The business and industrial worlds are
handled in digital format, the entertainment business moves from analogue to digital format,
broadcasting transactions move from analogue to digital, and consumers self-created content
increasingly in digital format. Another important trend is the appearance of sensors-based
73
74
Certain services are identified in the ITEA roadmap. Ubiquitous networking is seen as a
concept penetrating all fields of everyday life from education to the electronics business.
Example services in the roadmap report are: (Tele-) education taking advantage of
syncronization of multimedia content, multicasting/broadcasting audio and video clips over
IP networks, and video conferencing anywhere using portable computer equipment with
video conferencing facilities. This service will be increasingly used for consultation with
experts. In addition, applications are suggested for the utilisation of nomadic personal
profiles for use in ad hoc connections between devices, virtual reality, and virtual personal
networks where the computation and processing of data is distributed in an organized way in
the network. Trust will be an important factor. Trusted third-party services will be important
in the future. For example, electronic commerce can benefit from these services
Constrained resources like memory and storage, bandwidth, display size, time, power and
network resources should be managed in such a way that an appliance, device or system is
able to function in an optimal way. Terminal power management will be a critical issue.
Complex distributed architectures will use new technologies like grid computing to share
resources across the organisation. Dynamic resource management will become increasingly
important for critical systems. User trust is a key challenge for security ("used is in control").
Security will become pervasive, and handled at all stages of the software life cycle
75
Regarding Human System Interaction, the domains for technology development and
standardisation proposed in the ITEA roadmap are multi-modal user interaction, an adaptive
and context-aware user interface and HSI creation and usability. Multi-modality includes
technologies like speech recognition, speech to text, text to speech, gestures (to control
applications), eye movement (to control applications), multi-user interfaces, and virtual and
augmented reality. The most important technologies for adaptivity are user profiles, contextawareness (with sensors and profiles), learning user interfaces, support for multidisplay/device systems, privacy and security. Usability engineering, a platform for HSI
development, HSI usability test systems and measurement of satisfaction are important topics
in HSI creation and usability.
There are many services and applications identified in the ITEA roadmap where HSI has an
important role. These applications may become drivers for the development of advanced user
interaction technologies. For example, terminals adapting to user capabilities help users to
use services and applications; shared project spaces and virtual training rooms help teams in
different places efficiently work together on the same task. Learning applications capturing
users profiles for adapting user interfaces and advanced voice-controlled user interfaces may
become part of everyday life in the future
Software-intensive systems are becoming increasingly complex, and, at the same time,
systems have to be used by more and more people - easy-to-use Human System Interaction is
critical. In user interaction, the multilingualism, collaboration, multi-cultural and multi-user
environments need to be supported. Employment of sensors may support new options in
interaction. Centimetre-precision positioning of a user and his wearable equipment would
allow context-sensitive information to be conveyed to/from the user. A user-driven process
(as much as possible) for creating systems will increase the chance of success in building
new services, applications and products. Simple, self-explanatory and easy-to-use multimodal Human System Interaction utilising context-aware and adaptive technologies, and
providing seamless and interoperable HSIs, will be needed in future applications and
services.
ITEA Visions
The world is etting more and more digital and more and more interconnected. The future is
bringing us even more capabilities in two different, but not independent, directions related to
exchanges / interactions / communication and the corresponding (and new) services
The environment will become proactive: this implies that there is some
intelligence or autonomy in the digital surroundings of a person
76
ITEA Trends
Business models are changing rapidly. There are many stakeholders, with often
mutually conflicting interests, who are active on the market with different
understanding and goals.
In access networks speed has been increasing as techniques allow creation of new
services
Software plays and will play a major role. SW is the heart of an increasing
number of new products and services
77
Scenario
s&
user
needs
Terminal
s
Services
Network
Content
DRM
Position information (std. exchange)
Cheap location positioning with increased
precision
New or extended intelligent sensors
Efficient and standardized context exchange
(user profiles)
Context fusion - integration of context
Domain-specific meta-data standards
Protection of pre-recorded content
Off-line media interpretation algorithms
More efficient compression algorithms / bitrate reduction - H.261/H.263
Descriptive coding of context evolution in
space and time
Domain-specific behaviour prediction based
on actual and historical data
78
Virtual reality
Trusted third-party services
Electronic trading, electronic notary
Electronic multimedia magazine, internal
TV
Location-dependent information services
Unified messaging
Digital library
Profiles within closed or proprietary
environments
Context-awareness: groups, more context,
detailed presence
Basic support for multi-display/device/HSI
system
Basic privacy and security functionality
Profiles (community support and
management)
Automatic resource discovery in a local
network
Profile and network context-based service
orchestration - workflow
Intelligent power mgmt - increased
granularity
Bandwidth usage control - static
Fine-granular synchronization of interrelated
streams from different media sources SMIL
Extended name spaces - IPv6
Universal content identifiers - CRID
Sector-specific standardized descriptive
models - OWL
Rules for automatic reasoning about
information (service ontologies) - OWL
Multi-media databases - MPEG7
Search agents for multimedia
Flexible configuration of access for shared
content in collaborative env. File-oriented
Intelligent garbage collection and
management
Learning-based classification of multimedia
content
Scenario
s&
user
needs
Services
Terminal
Network
79
Content
Security
Other
Factors
80
81
2. Broader bandwidth does not necessarily imply more fun and convenience - it is
important to take into account users' preferences and acceptability in designing a
communication systems and services.
3. "Cost" is a decisive factor for user demand - the costs of terminals and content cast a
significant influence on their uptake.
4. Expectations for real communications with "people" - communication that can
express emotions and feelings will likely be an important application
5. Agent feature is a must the growing number of available content and services will
require automated and intelligent solutions for handling the supply.
6. 4G needs to offer something more than "faster speeds" the expectations of general
users will not be met by just greater bandwidth and faster speed
Industry's expectations for 4G mobile systems are listed below:
1. Expectations and requests for communications capabilities - there are high
expectations for transmission speeds in the order of 100 Mbps. Certainty and stability
of communication is most important in medical / disaster / transportation-related
sectors. Bandwidth dedicated for public service should be secured for public
infrastructure. Security of communications is indispensable, particularly for medical /
settlement / content services.
2. Expectations and requests for terminal features - terminal / file specifications must be
unified among carriers and manufacturers. Sophisticated features must be offered at
affordable prices. Mobile terminals need to become a media for presenting product
information attractively and effectively. an easy-to-use universal input interface is a
must
3. Expectations and requests for authentication and other peripheral techniques advanced authentication techniques must be provided at low cost
4. Expectations and requests for authentication / billing model a billing model with a
great degree of flexibility not monopolized by carriers needs to be studied.
Expectations for collective management of ID/Password by third-party
authentication bodies
5. Expectations and requests for revision of legal system - establishment of a legal
framework for personal information protection is important. Revision of legal system
is indispensable in realizing medical / administrative services leveraging IT
6. Expectations and requests on other important issues - establishment of mechanism
for rights clearance is indispensable for content delivery
82
. Figure 16: mITF roadmap for transmission rate enhancements towards 4G mobile systems
83
Scenarios
&
user needs
Services
Terminals
Network
Mobile systems are an inseparable part of peoples daily lives in various branches of life,
including. Education, Arts and Science, Business Use, Entertainment, Visual Communication,
Mobile Commerce, Work, Nursing and Health Care, Emergency Medical Treatment and
Utilization in a Disaster.
New lifestyles will be realized by 4G mobile communication systems. People will look for an
enriched and cultural, more flexible and diversified, more comfortable and safe, and more
personal and convenient life
Packet-switched networks will provide 2Mbps for uplink and 10-14Mbps downlink for
mobile users
Knowledge-sharing technologies
Mobile communications are used for emergency
medical treatment after, e.g., a traffic accident.
Network games and music/video
content downloading in mobile
Freedom of time, place and use of features
systems
Low costs
Video/picture communication between Real communication with "people" - e.g.
remote places.
feelings
Mobile systems are used for
Agent feature for handling growing number of
merchandise purchase and settlement.
services
Personal authentication technology
"Something more than Faster Speed"
allows the user to securely purchase
84
Content
Security
Other
Factors
connection policy
Compatibility of greater number of
existing access systems, function for
receiving terrestrial digital broadcast
Standardised QoS control and AAA
assured handover between same access
system
MIPv6 standardisation and low cost
implementation to mobile phones
First sensor network products
Coordination between home networks,
information appliances
Prototype small size MIMO, MIMO is
discussed in 3GPP, in mobile
environment MIMO <20Mbps, MIMO
WLAN standardisation
Adaptive antennae in base stations
Development of baseband for SDR,
standardisation activities start
High-quality scalable voice coding
algorithms, 3D image coding
Use of information broker agent
Information compression techniques 510 times more efficient
Advanced authentication techniques
based on voice, venous and iris
authentication
AES, Elliptic curve cryptosystem
Various business models will emerge
and evolve
Revisions may be needed on
legislation (e.g. medical practitioners,
administrative laws)
Advanced, accepted and easy-to-use
authentication techniques are critical
Scenarios
&
user needs
Services
Terminals
Data and entertainment services are used ubiquitously, anytime, anywhere independent of
location and available terminals. The services are adapted to user needs.
Communication is enriched with "reality feeling" in addition to plain video and voice, e.g.
virtual meetings
Cost is decisive factor for user demand Single terminal is used for communication,
payment, keys, control of environment, data
4G must offer something more than
storage
just more speed
Users need a more comfortable,
enriched and safer life
85
Network
Content
Security
Other
Factors
86
Traffic prioritisation has been started (diffserv, less than best effort)
Users can connect to their files from home, at work or on the move
New services are based on open standards (IETF, 3GPP, W3C, OMA)
2010
Multi-access
terminals
(WCDMA/GSM/WLAN/PAN)
Nanotechnology is promising after the silicon technology has reached its limitations
and
87
networks
support
common
User controls home devices with various terminals independent of place and time
88
There is a trend that the number of telecommunication protocols will increase, but new
protocols will tend to be relatively simple. The regulation aspects need to be considered for
privacy, and with EU directives.
Table 9 NETS thematic group 3a roadmap summary for 2005 (comments included from Elisa
roadmap, Risto Alander)
Scenarios &
user needs
Vision
Terminals
Network
Services
The seamless mobility of users and services in wireless, mobile and fixed networks.
Applications are IP-based, trend towards converged network environment
Companies improve their
The services must be easy to use (e.g. by
effectiveness by using wireless
familiar UI-like web browser) and easy to
solutions.
charge.
Communication is enriched (e.g. rich Standardised interfaces between networks,
calls)
seamless roaming, overlap of network
coverage
Common user access and
management control system needs to
be developed over the open network
structure
Rich calls
Location services
Emerging P2P services
IMS
Enterprise presence and messaging
Multi-access terminals
OMA SyncML
Service platforms with open interfaces for
third parties
Efficient development tools for services
(OSA/Parlay, CPL editor)
IMS, service platform OSA/Parlay, JAIN
MMS, JAVA, WAP2.0/XHTML
Push-to-talk (PoC)
LAN-WLAN-Bluetooth application level
roaming
3G-WLAN roaming
Content
DRM
Security
Other
Factors
89
90
In order to implement the vision, the following applications are needed: traffic management
systems, including traffic monitoring, dynamic routing of traffic, ticketing and control.
Navigation in traffic is an important application in mobility and transport. Navigation
systems require real-time (traffic) information, travel assistance and individual navigation
functionalities. Safety is an important issue in traffic. In this context, safety includes
surveillance of driver, car and environment. Mobile information and entertainment services
are also highly relevant to the mobility and transport application field.
Services in mobility and transport are communication-intensive. There is a need for different
types of networks: mobile networks, sensor networks and P2P networks. There is also a need
to process a vast amount of information acquired from sensor networks. Services for
travellers need to be multi-lingual and easy to use with different types of terminals and user
interfaces. Interoperability of multiple different systems is an important topic. There are high
requirements for reliability in safety systems.
The most important technologies in the mobility and transport domain are networking,
microelectronics, user interfaces and system integration / interoperability.
Shopping and Commerce
In the shopping and commerce application domain, electronic support for shopping and
integration of customers into the electronic value chain is of concern. According to the
AMI@Life roadmap, there are different functionalities to be seen in the future: shopping
facilities leading to better transparency of the market, personalized advertising and profiling
of customer behaviour. Mobile business and commerce is seen as an important topic. Mobile
catalogue services and personalized marketing and advertising will be seen in the future.
Automation of order processing will improve productivity in certain functions.
There are high requirements for customers privacy and the security of payments and
transactions, as well as digital rights management for intangible goods. In order to facilitate
mobile commerce for the public on a large scale, mass producible and cheap tagging
technologies are needed. Technologies for personalisation can offer added value to
consumers and businesses through personalized services. New display technologies and easyto-use user interfaces are needed. In logistics applications, networked sensors and actuators
may offer improved effectiveness and better management of transport of goods.
Security and trust are crucial enablers in the shopping and commerce application domain.
Networking technologies as well as advancement in microelectronics are also important
issues.
91
92
& education, and prediction. Monitoring, diagnosis, treatment and surgery will also be helped
by AMI techniques. Functions of hospitals will also be supported by AMI techniques.
Services in the health application field have the highest requirements for all applications.
There is a need for the highest degree of privacy protection. Systems must be reliable and
trustworthy. They must be easy to use, especially when the users are not educated
professionals. Many services are communication-intensive. Bodily sensors and wearable
devices with low power consumption will open possibilities for new kinds of applications,
especially in preventive health care
The technologies of high importance in the health domain are security and trust,
microelectronic sensors and devices, networking, interfaces and power-source technologies
Key Technologies for AmI Applications
Since AmI can be defined as ubiquitous computing + ubiquitous communication + user
friendly and unobtrusive interfaces the key technologies are subdivided into
93
The work is part of a theme called Future Communications Technologies, one of VTTs
strategic technology themes. The purpose of the roadmapping work is to help the planners
and players direct their activities towards better competitiveness in this rapidly developing
field by utilizing VTTs best expertise. The roadmap was published in 2002.
94
Figure 17. Existing and emerging network technologies (source VTT roadmaps 2002)
Figure 18. Existing and emerging technologies in the wired domain (source VTT roadmaps
2002)
95
Service Architectures
Future research activities in the area of service architectures are based on the vision of Cyber
Space. In Cyber Space, a human, or any type of machine, agent or service is able to
communicate in a unified way, share any type of information in a meaningful form, and
co-operate anywhere in real-time using available telecommunication services. The aim of
Cyber Space is to provide the relevant service in the right form anywhere and at any time the
service is needed by humans, machines or agents. Therefore, the objective of the Service
Architecture Framework is to support users subscribing to, and paying for, an open set of
services. As a framework, the Service Architecture Framework provides a skeleton for cooperating services with an integrated set of components that can be reused and customised.
The figure below illustrates the research challenges that must be tackled and solved in
order to gain a comprehensive open service architecture.
96
97
The Smart Human Environment will completely change the way we interact with our
environment and with each other. People will communicate with their technological
environment naturally, using a variety of modalities and devices. The environment will be
aware of and will understand the user's social, physical and situational context. The
environment will be able to smartly assist the user in his tasks, based on this context
awareness and knowledge of the user's behavioural profile as well as common sense
knowledge. It will exhibit pro-active behaviour for recurring tasks and provide personalised
information services.
Figure 20. Roadmap for smart human environments (source VTT roadmaps 2002)
While reviewing the technologies enabling the smart human environment vision, four main
fields of research were distinguished within the IT research: Ambient Intelligence, Smart
98
99
100
101
Though the three scenarios and the consequent important technologies have been presented
in a sequential manner, the process of evolution in the real world may be quite different.
There is very little certitude that only one of the three studied scenarios will come
true in an overwhelming manner. Moreover, several other possible scenarios might
have been overlooked simply due the lack of information.
102
Table 10: Summary of service and technology enablers based on main roadmaps
2007
2012
SERVICES
Communication
services
Health care
wellbeing
Electronic
Commerce
public services
Security
Real-time disaster information delivery service, thirdparty certification services (trust centres), personal
private network-service
Infotainment
services
Video services
Location
context-based
services
Mobile
education
working, Shared project spaces, virtual training room, teleeducation , enterprise network services (office VoIP
calls, VPN remote work, multimedia), contact centre
services , collaboration services
Services at home
TERMINALS
Radio access
Terminal centered
Multiple simultaneous accesses 2G, 3G, HSDPA, Software Defined Radio, clear improvements on bits/Hz
WLAN, Bluetooth, DVB-S/T, PDC, PHS, NFC
efficiency
Sensing of environment
UI
Traditional + voice commands, text-to-speech, Device-less interaction or low need for specific
gestures (games)
terminal, full multimodality: voice, gestures, natural
sounding text-to-speech, speaker independency, eye
control, tactile feedback, pointing, HMD, non-rigid
scrollable displays
Authentication/secur
ity
Biometric identification
103
Positioning
CPU, power
Software
JAVA, Symbian, OMA solutions, agent software, One operating system (OS), JAVA, agent software,
downloadable sw
interoperable software with open interfaces
Other
Sensors in clothing
NETWORKS
Convergence emerging
Converged networks
Network
technologies
UMTS, EDGE, xDLS, HSDPA, 802.11a/b/e/f/g, Software Defined Radio with downloadable SW from
802.16a WiMax, ZigBee, PDS, ATM. UWB network, new OFDM and multicarrier technologies
emerging
combined with enhanced 3G, WLAN, xDSL++,
Bluetooth+, DVB+, ATM, UWB
Bandwidth
Mobile networks: 2 Mbps on the move and 10-14 Mobile networks: 100 Mbps on the move, 1 Gbps for
Mbps for stationary user
stationary user (short range)
Optical networks: 40 Gbps (1 carrier)
Roaming
QoS
Mobility
MobileIPv6 mobility
BAN/PAN
Home networks
Protocols
CONTENT
Compression
and MPEG-4 H.264 and its successors prominent, New 5-10 times more efficient coding techniques, FGS
metadata formats
MPEG-7, MPEG-21, high-quality voice coding
codecs supporting QoS
Enablers
DRM, mark-up languages (XML), profiling UaProf, DRM and content protection
CC/PP
SECURITY
Security
not
communication
Authentication
privacy
very
well
established
and SIM card, bank accounts, biometric identification, Common automatic, transparent user authentication
digital signatures
architecture for all networks with single sign-on to
ubiquitous networks
104
Fast development cycle for service and application Open API's for third parties
development, Agile sw-development
105
162/2004 ROADMAP for Network Technologies and Services. Petteri Alahuhta, Marko Jurvansuu,
Heikki Pentikinen. 104 p.
161/2004 Innovaatio investointina. Osa 2. Tekesin rahoituksen vaikutukset yritysten t&k-toimintaan
kyselytutkimuksen tulokset. Joonas Pekkanen, Toni Riipinen, Seppo Leminen, KTT. 48 s.
160/2004 FINE-ohjelmaraportti
159/2004 Ohutlevyteollisuuden kehittmistarpeiden kartoitus. Mikael Ollikainen, Juha Varis. 135 s.
158/2004 Microfluidics. Pasi Kallio, Johana Kuncova. 32 p.
157/2004 Proteomics Challenges and possibilities in Finland. Heini Koivistoinen, Harri Siitari. 35 p.
156/2004 Finnish Software Product Business: Results from the National Software Industry Survey 2003.
Juhana Hietala.
155/2004 Globaali tietoyhteiskunta Kehityssuuntia Piilaaksosta Singaporeen. Pekka Himanen (toim.).
119 s.
154/2004 Logistiikan shkisten tieto- ja viestintteknologioiden hydyntminen Kokemuksia suomalaisista yrityksist. Jouni Kauremaa, Jaana Auramo. 49 s.
153/2004 Ravitsemushoidon kustannusvaikuttavuus taloudellinen arviointi kansansairauksien
ehkisyss ja/tai hoidossa. Anne-Mari Ottelin. 37 s.
152/2004 Viranomaisvalvonta kudosteknologian tuotekehityksess.
151/2004 Toimialakehitys ohjelmistoteollisuuden vauhdittajana Uutta liiketoimintaa lhialoilta.
Pasi Tyrvinen, Juhani Warsta, Veikko Seppnen. 71 s.
150/2003 Towards a Supercluster: Chemical and Biochemical Innovations Connecting Finnish Clusters.
149/2003 Managing Non-Core Technologies: Experiences from Finnish, Swedish and US Corporations
Annaleena Parhankangas, Pivi Holmlund, Turkka Kuusisto. 76 p.
148/2003 Kantasolutoimiala Suomessa. Toimijoiden nkemyksi vuonna 2003. Noin 90 s.
147/2003 Innovative waste management products European market survey. Christoph Genter. 40 p.
146/2003 Elektroniikan lmmnhallinta. Simo Keskinen. 8 s.
145/2003 The Finnish Maritime Cluster. Mikko Viitanen, Tapio Karvonen, Johanna Vaiste, Hannu Hernesniemi. 187 p.
144/2003 Tracing Knowledge Flows in the Finnish Innovation System A Study of US Patents Granted
to Finnish University Researchers. Martin Meyer, Tanja Sinilinen, Jan Timm Utecht,
Olle Persson, Jianzhong Hong. 36 p.
143/2003 Paikannus mobiilipalveluissa ja sovelluksissa. Antti Rainio. 75 s.
142/2003 Innovaatio investointina. Osa 1. Rahoitusteoreettinen nkkulma Tekesin vaikuttavuuteen.
Mika Vaihekoski, Seppo Leminen, Joonas Pekkanen, Jussi Tiilikka
141/2003 Suomen bioteollisuuden bioprosessitekniset tarpeet
140/2003 Suomen meriklusteri. Mikko Viitanen, Tapio Karvonen, Johanna Vaiste, Hannu Hernesniemi. 190 s.
139/2003 Innovaatioita metsstmss media valinkauhassa. Ulf Lindqvist, Timo Siivonen,
Caj Sdergrd. 44 s.
Subscriptions:
www.tekes.fi/english/publications