Update of GIGA-VAMOS Technolgy Roadmap

206
07
Tekes
●
Update of GIGA-VAMOS – Technology Roadmap
Update of GIGA-VAMOS
– Technology Roadmap
Technology Review 206/2007
Further Information
www.tekes.fi/giga
www.tekes.fi/vamos
Technology Review
The Finnish Funding Agency for Technology and Innovation
Kyllikinportti 2, P.O. Box 69, FIN-00101 Helsinki, Finland
Tel. +358 1060 55000, Fax +358 9 694 9196, E-mail: [email protected]
www.tekes.fi
April 2007
ISSN 1239-758X
ISBN 978-952-457-364-1
Update of GIGA-VAMOS
– Technology Roadmap
Mikael von Hertzen, Juhani Timonen, Pekka Huuhka
Technology Review 206/2007
Update of GIGA-VAMOS
– Technology Roadmap
Mikael von Hertzen
Juhani Timonen
Pekka Huuhka
Oy Swot Consulting Finland Ltd
Technology Review 206/2007
Helsinki 2007
Tekes, the Finnish Funding Agency for Technology and Innovation
Tekes is the main public funding organisation for research and development
(R&D) in Finland. Tekes funds industrial projects as well as projects in research organisations, and especially promotes innovative, risk-intensive
projects. Tekes offers partners from abroad a gateway to the key technology
players in Finland.
Technology programmes – Tekes´ choices for the greatest impact
of R&D funding
Tekes uses technology programmes to allocate its financing, networking
and expert services to areas that are important for business and society.
Programmes are launched in areas of application and technology that are in
line with the focus areas in Tekes’ strategy. Tekes allocates about half the financing granted to companies, universities and research institutes through
technology programmes. Tekes technology programmes have been contributing to changes in the Finnish innovation environment for twenty years.
Copyright Tekes 2007. All rights reserved.
This publication includes materials protected under copyright law, the copyright for which is held by Tekes or a third party. The materials appearing in
publications may not be used for commercial purposes. The contents of
publications are the opinion of the writers and do not represent the official
position of Tekes. Tekes bears no responsibility for any possible damages
arising from their use. The original source must be mentioned when quoting
from the materials.
ISSN 1239-758-X
ISBN 978-952-457-364-1
Page layout: DTPage Oy
Printers: Painotalo Miktor, Helsinki 2007
Foreword
This report presents the results of a project initiated by Tekes, the Finnish Funding Agency for
Technology and Innovation.
As part of an earlier technology programme (NETS – Networks of the Future), the report Roadmap
for Network Technologies and Services was published in 2004. Technological development in the
area concerned is very rapid, and Tekes decided to update the roadmap accordingly. The key target
of this report is to summarise roadmaps related to the development of a very large range of technologies and applications. It is expected to support planning and development in different industries,
as well as to provide stimulating input for discussion and development work. The project is part of
two Tekes programmes: ‘GIGA – Converging Networks 2005–2010’ and ‘VAMOS – Value added
Mobile Solutions 2005–2010’. It addresses both applications and technological angles.
Long-term roadmaps are challenging to create. The markets, user habits, trends, and also various
unpredictable events shape the future in parallel with technological developments. The roadmaps
were given timelines, with reference points of the current state (2007), 2010, and 2015, instead of
just presenting trends. The purpose of this is threefold: first of all, it provides a framework for comparison with the previous roadmap; secondly, timing is always crucial for business decisions; and,
thirdly, we believe that providing firm time estimates will form a stronger basis for further dialogue. A firm time framework also enables easier tracking of key changes as time passes.
The subject addressed is extremely broad. Several industries are covered, and a number of broadband technologies are included; hence, there certainly are areas that could have been handled more
thoroughly. We hope, however, that this report nonetheless provides a good overview of the most
central subjects. In the conclusions, some critical points have been identified, along with potential
business opportunities related to them.
The content of the report is based on a number of publicly available roadmap reports, personal interviews, and a Web-based survey sent to more than 200 persons (with broad international coverage).
We gratefully acknowledge the valuable insight that was provided by all 40 persons who were interviewed individually in the course of this project. A list of these persons is found in Appendix 2.
We likewise wish to acknowledge with gratitude the opinions of the 83 persons who responded to
the online survey, as well as those who participated in the expert workshop. The participants in the
workshop are listed in Appendix 3.
The project was implemented and the report written by Oy Swot Consulting Finland Ltd.
Helsinki, March 2007
Tekes, the Finnish Funding Agency for Technology and Innovation
Contents
Foreword
1 Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
2 Background and Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
3 Project Methodology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
3.1
3.2
3.3
General Approach to the Project . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
GIGA-VAMOS Roadmap Scope. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Sources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
3.3.1 Publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
3.3.2 Personal Interviews . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
3.3.3 Web-based Survey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
3.3.4 Workshop. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
4 VAMOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
4.1
4.2
4.3
4.4
4.5
4.6
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Traffic and Logistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
4.2.1 Needs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
4.2.2 Trends and Drivers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
4.2.3 Challenges and Opportunities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
4.2.4 Standardisation and Regulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
4.2.5 Functionalities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
4.2.6 Systems and Technologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
4.2.7 Terminals and User Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
4.2.8 Vision of the Future. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
4.2.9 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Construction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
4.3.1 Infrastructure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
4.3.2 Construction of Buildings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
4.3.3 Building Automation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Manufacturing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
4.4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
4.4.2 Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
4.4.3 Needs and Drivers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
4.4.4 Trends . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
4.4.5 Challenges and Opportunities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
4.4.6 Functionalities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
4.4.7 Technologies and Competencies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
4.4.8 Vision of the Future. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
4.4.9 Summary Roadmap for Manufacturing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Business Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
4.5.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
4.5.2 Vertical Business Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Conclusions on the Sectors under Focus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
5 Business Models, Functionality and Services, and Content . . . . . . . . . . . 47
5.1
Business Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
5.1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
5.1.2 Industry Vertical Dimension . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
5.1.3 Technology Dimension . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
5.2
5.3
5.4
5.5
User Behaviour. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Functionality and Technologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Content. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Roadmaps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
6 GIGA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
6.1
6.2
6.3
6.4
6.5
6.6
6.7
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Radio Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
6.2.1 Definition of Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
6.2.2 General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
6.2.3 Regulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
6.2.4 Geographical Differences. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
6.2.5 Bit Rates, Mobility, and Network Structures . . . . . . . . . . . . . . . . . . . . . . . . . . 60
6.2.6 New Radio Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
6.2.7 Key Radio Technologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
6.2.8 Summary and Roadmap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
6.3.1 General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
6.3.2 Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
6.3.3 Network Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
6.3.4 Hand-over, Interoperability, and Quality of Service. . . . . . . . . . . . . . . . . . . . . . 67
6.3.5 Capacity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
6.3.6 IP Versions and Next Generations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
6.3.7 Competence. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
6.3.8 Summary and Roadmap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Devices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
6.4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
6.4.2 Number of Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
6.4.3 Usability. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
6.4.4 Features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
6.4.5 New Design Criteria . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
6.4.6 Platforms and Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
6.4.7 Power Supply . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
6.4.8 Summary and Roadmap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Other Areas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Hype Curves. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
7 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
7.1
7.2
7.3
7.4
7.5
7.6
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Key Differences from the Previous Roadmap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Hype Curve Changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Summary Roadmaps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Critical Paths and Points, with Related Opportunities . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Recommendations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Appendices
1
2
3
4
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
People Interviewed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Participants in the Expert Workshop. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Abbreviations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Tekes’ Technology Reviews in English. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
1 Abstract
This report provides roadmaps for the future of broadband
technologies and specific industry sectors’ utilisation of
mobile and wireless technologies, for improving their business processes and making them more efficient and effective.
The roadmaps present the development with timeframes
referring to the years 2007, 2010, and 2015 for the following areas: traffic and logistics, construction, manufacturing, business services, business models, radio access, networks, devices, and security.
The substance of the report is based on recent public
roadmap materials, strongly complemented by 40 individual interviews, an extensive Web-based survey, and an expert workshop. On the basis of this information coupled
with thorough analysis, roadmaps have been drawn up and
conclusions drawn.
Take-up of technologies is described also, through the use
of ‘hype curves’.
The report is concluded by summarising recent key
changes and identifying some critical paths and points as
well as opportunities related to them. At the end is a list of a
few recommendations for future development of the GIGA
and VAMOS programmes.
1
2 Background and Objectives
As part of the Tekes NETS programme, the roadmap report
Roadmap for Network Technologies and Services was published in 2004. The technological development in the area
in question is very fast and hence concerned is very rapid;
therefore, Tekes decided to initiate a project named ‘Update of GIGA-VAMOS – Technology Roadmap’. A target
of the present report was not to address technological angles alone but also to have a strong application focus.
The Tekes programme GIGA – Converging Networks
2005–2010 focuses on development of broadband technologies for future converging networks. The five-year
programme, with an estimated total budget of EUR 240
million and ending in 2010, will be funded by Tekes with
EUR 100 million. The main goals are to promote the leading position of the Finnish telecommunications industry in
technologies for wireless broadband communication and to
strengthen strategic basic research and applied research in
broadband communication. The scope of the programme is
the development of broadband technologies (especially
wireless broadband), converged network technologies, services, and content in a newly profound way driving different players into ever closer collaboration.
The VAMOS – Value added Mobile Solutions 2005–2010
programme is a Tekes programme launched in summer
2005 in co-operation with companies and research institutions. The programme aims to find ways to utilise the newest mobile technology solutions.
The objectives of the present project, Update of GIGAVAMOS – Technology Roadmap, are:
● To support the GIGA and VAMOS programmes of
Tekes
● To provide insight into future technological development, especially for small and medium enterprises
(SMEs) that are technology developers or service providers; the target is to support these companies in strategic planning and in developing new business and technologies
● To focus on applications relevant to the following sectors
of industry, relevant for VAMOS:
– traffic and logistics
– construction
– manufacturing
– business services
● Additionally, to provide a discussion base for collaboration between research and business (in particular, SMEs)
Creating roadmaps for the future is very challenging, especially if clear timelines are included. Mostly, if not always,
the actual outcome does not correspond to the forecasts.
Nonetheless, it was decided to include clear timelines in
the roadmaps, as opposed to only trends, in order to stimulate discussion as well as make it easier to determine the
changes as time passes and hence be better able to make
new decisions, based on clearly seen changes.
3
3 Project Methodology
3.1 General Approach
to the Project
The project’s approach was structured into 12 distinct
modules, which are presented in Figure 1.
The key current and future needs of the selected sectors –
i.e., traffic and logistics, construction, manufacturing, and
business services – were identified. Also, the ideas and
needs of SMEs supplying technology or services to the sectors of industry in question were identified.
Swot Consulting Finland Ltd, a management consulting
company focusing on companies and public sector in the
technology industry, was selected by Tekes to implement
this project and write the related report.
Content providers, operators, and system suppliers were
addressed as well. Universities and research institutes were
included in order to ensure sufficiently theoretical and future-oriented views.
The project’s starting point was the existing NETS report
Roadmap for Network Technologies and Services, which
was published in 2004, as well as other relevant information from the GIGA and VAMOS programmes.
The technology enablers and industry-specific development needs were elaborated upon further in an expert
workshop.
Further information has been accumulated through analysis of a large number of recent materials from public
sources and publications, listed in Appendix 1 of this report. This information has been complemented by Swot’s
own information sources as cultivated through experience
of acting in the information and communication technologies (ICT), electronics, and technology sector.
On the basis of all of the above, the final report was created,
including updates and changes from the previous report.
Also, key conclusions and recommendations are presented.
The project and the report have been and will be presented
to the Programme Management Board of both GIGA and
VAMOS, to the GIGA subject-specific task forces, and to
the VAMOS forums.
Figure 1. General approach of the project.
5
3.2 GIGA-VAMOS Roadmap Scope
The scope of the project, with the target of a viewpoint addressing technology-enabling as well as sector-specific applications, is potentially very extensive. In order to retain a
certain focus and be able to deliver meaningful results, the
scope presented in Figure 2 was selected.
In the VAMOS-led dimension, the programme considers
the topic from the industry solution point of view, for each
selected sector (traffic and logistics, construction, manufacturing, or business services). On a more generic level,
the business models are addressed as well. There are, however, also changes in the business models from the technology-enabler direction, such as emergence of different hardware and software platforms. These business model changes
are discussed as well.
In the GIGA-led dimension, the analysis considers the
topic from a technology and technology enabler point of
view. The individual technologies can partially be grouped
under the main categories radio access, networks, devices,
and security. Some of the individual technologies, however, are relevant in many or all of these main areas.
The two dimensions – the GIGA and VAMOS directions –
meet at a crossing point, which can be described to have its
base built on content. The crossing point is built upon individual technologies (elements), which together form
functionalities, such as navigation. The functionalities then
are further built into relevant industry-specific solutions
that provide value to the business processes in question.
3.3 Sources
The project work was conducted through desk studies of
public sources and publications, personal interviews, a
Web-based survey, and an expert workshop, all of which
are described in greater detail below.
3.3.1 Publications
A remarkable number of publications were evaluated as
sources, and the most relevant ones were selected as bases
for reference.
Common to most of the references is that, while they do
discuss trends quite extensively, when it comes to timing –
which is of utmost importance in utilising technology
within business – the publications are rather cautious in
terms of taking any strong stands.
Figure 2. GIGA-VAMOS roadmap scope.
6
Brief Description of Each of the Selected
References
The base document was the Roadmap for Network Technologies and Services (2004), which has a focus on
roadmaps for networks, services, and business models. The
industry-specific solutions were not included as such in the
scope of the report.
The report described roadmaps for the future with a time
reference to years 2007 and 2012 – i.e., three and eight
years into the future. Since the Roadmap for Network Technologies and Services report was the base report to be updated, the present report was given as its reference years
2007, 2010, and 2015, which then made it possible to analyse key changes also. These key changes are discussed in
section 7.1.
The report addressed also so-called critical paths from the
technology-centric world of the past to the future’s
user-centric world, with individual paths for selected topics. The critical paths contained also what are called critical
points, where certain criteria – e.g., emergence of standards
– must be satisfied if one more step is to be taken along the
path. These critical paths did not have time references, and
among other challenges with them is that, if some element
does not proceed according to the path, the model does not
provide an alternative approach. The topics covered by the
critical paths were:
● Commerce
● Business models
● Services
● Context-awareness
● Content
● Digital identity and security
● Mobile terminals
● Networks
● Radio technology
The technology summary roadmap is presented in Table 1
on page 8.
NETS – Networks of the Future 2001–2005, Final Report
(2005) was based on a previous Tekes programme of the
same name. The content of the report consists of descriptions of technologies for wireless systems, broadband networks, and related service and application concepts. It describes well the technologies that are studied but does not
contain real roadmaps.
eMobility, Mobile and Wireless Communications Technology Platform, Strategic Research Agenda (2006) has a
technical, business, and psychological approach, with year
2020 as the vision timeframe. It describes a vision that de-
Figure 3. The SET concept (eMobility, Mobile and Wireless Communications
Technology Platform, Strategic Research Agenda, 2006).
7
Table 1. Technology summary roadmap (Roadmap for Network Technologies and Services, 2004).
2007
2012
Towards more natural use or network services
Services
New services available 2007
Communication getting mobile
Multimedia communication
Personalization and adaptation using simple
context (location)
• Mobile services for various fields of life
• Collaboration and sharing an important trend
•
•
•
•
• Communication and user interaction with ICT systems
getting more natural (new means of interaction)
• More accurate positioning available
• Services and adaptation are context aware
• Agent technology to help user with vast amount of
content and services
• Brokering-type business models
From a network-centered world towards terminal-centred world
• More radio accesses implemented for mobile terminals • Multi-purpose terminals (communication, remote
Terminals
•
•
•
•
(2G, 3G, HSDPA, WLAN, BT, NFC,DVB-H,...)
User identification (biometric / smart card)
Terminal can choose best radio access
Limited multimodality
More sensors in terminals
control, data storage, authentication)
• Radio access based on SDR
• MIMO and start antennae integrated with terminals
• Power is a critical issue (due to, e.g., multimedia
processing requirements)
• Fuel cells in use as power sources
• Size of terminals and sensors very small => can be
embedded anywhere
• Communication without a terminal (voice interfaces)
Increased bandwidth in converging networks
Networks
IP is the dominant network protocol
Network convergence expanding
Application-level handover accomplished
2 Mbps on move, 10 - 14 Mbps stationary
Data traffic mainly symmetric
Positioning using global navigation satellite system
(GNSS) with cellular positioning and indoor positioning
• MIMO and smart antennae integrated with base
stations
•
•
•
•
•
•
• All-IP converged networks with IPv6 base protocol
• SDR used to access all radio interfaces in optimum
•
•
•
•
•
way
100 Mbps on move, 1Gbps stationary
Single log-on in heterogeneous networks
UWB mature enabler
PAN networks used widely
Sensor networks embedded in our surroundings
Digital multimedia data to be main source of traffic in networks
• MPEG-4 and its successors as a foundation for
Content
video coding
• MPEG-7 and XML used widely for metadata
• Digital Rights management importance increasing
• Multimedia content is a major traffic source in
telecommunication networks
• New multimedia coding algorithms are developed
• DRM and content protection integrated in services
• All multimedia content is described with metadata
Towards trusted services and end to end security
• Security mainly using VPN, PKI, SIM-card, bank
Security
account key numbers
• Bio-identification used in certain applications
• Trusted third party certification services emerging
• End to end security accomplished
• Security embedded in all devices and telecom
infrastructure
• Automatic spam and DRM filtering in network
• Third-party services e.g. for charging, certification,
personal information used
• Authentication done with same scheme for all
networks and services
8
mands a major shift from the current concept of ‘anywhere,
anytime’ to a paradigm shift of ‘any network, any device,
with relevant content and context in a secure and trustworthy
manner’. The increasing dependence of society on a communications infrastructure with a multitude of services and
networks requires new approaches and an emphasis on research captured by a new concept called the SET concept
that underscores the need for a three-dimensional vision of
research activities, for delivery of simplicity, efficiency and
trust. The SET concept is illustrated in Figure 3 on page 7.
Global Visions of a Wireless World (2006), published by
the Wireless World Research Forum (WWRF), describes
visions of the future in terms of major trends, innovation cycles, vision principles from a user-centric perspective, and
system concepts and requirements. Some pictures from this
presentation are referred to later on in this report.
Development of Broadband Technologies and Business,
GIGA Converging Networks Technology Programme
2005–2010 (2006) contains presentation slides from case
studies in the US, Japan, China, and South Korea. It contains good overviews of technological developments in
these countries over the last few years, current areas of focus, and some roadmaps for the future (especially in relation to Japan and South Korea). The key roadmaps from Japan are presented in figures 4, 5, 6, and 7, while the key
roadmaps from South Korea are presented in figures 8, 9,
and 10.
E-Business Logistics, Visions, Innovations and Research
(2006), published as part of the ELO – E-Business Logistics Technology Programme 2002–2005 by Tekes, contains roadmaps with some time references.
Figure 4. Forecast for broadband households in Japan (Development of Broadband
Technologies and Business, 2006).
9
Figure 5. Growth of data access speed in fixed and mobile communications
(Development of Broadband Technologies and Business, 2006).
Figure 6. Network evolution – DoCoMo’s case (Development of Broadband
Technologies and Business, 2006).
10
Figure 7. The mobile phone in the future (Development of Broadband Technologies
and Business, 2006).
Figure 8. Convergence and technology trends (Development of Broadband Technologies and
Business, 2006).
11
Unit: billion KRW (mil EUR)
2003
2004E
2005E
2006E
2007E
2008E
SMS
513 (407)
578 (459)
605 (480)
618 (490)
622 (494)
626 (497)
4
MMS
13 (10)
79 (63)
160 (127)
322 (256)
480 (381)
608 (483)
115
Ring tone
78 (62)
90 (71)
104 (83)
115 (91)
125 (99)
132 (105)
11
Ringback tone
82 (65)
121 (96)
197 (156)
262 (208)
314 (249)
370 (294)
35
158 (125)
188 (149)
210 (167)
228 (181)
241 (191)
250 (198)
10
Mobile
broadcasting
52 (41)
77 (61)
156 (124)
259 (206)
356 (283)
433 (344)
53
Mobile game
203 (161)
320 (254)
413 (328)
531 (421)
587 (466)
638 (506)
26
LBS
213 (169)
335 (266)
520 (413)
667 (529)
794 (630)
896 (711)
33
m-Commerce
123 (98)
337 (267)
644 (511)
916 (727)
1,160 (921)
1,327 (1,053)
61
Adult contents
113 (90)
220 (175)
298 (237)
374 (297)
427 (339)
454 (360)
32
Community
95 (75)
131 (104)
148 (117)
160 (127)
169 (134)
177 (140)
13
Lottery/Reservation
98 (78)
108 (86)
114 (90)
117 (93)
119 (94)
119 (94)
18
Stock/Banking
62 (49)
79 (62)
99 (79)
114 (90)
130 (103)
143 (113)
18
Others
96 (76)
167 (133)
237 (188)
292 (232)
349 (277)
428 (340)
35
1,899 (1,507)
2,830 (2246)
3,905 (310)
4,976 (3,949)
5,872 (4,660)
6,598 (5,237)
28
Character
download
Total
Figure 9. Mobile Internet content’s market outlook in Korea (Development of Broadband Technologies and
Business, 2006).
Narrowband
1990
2.4 – 9.6Kbps
Broadband
2000
BcN
2010
2005
4-100 Mbps
1.5 – 9.6Kbps
50 – 100 Mbps
●
●
●
●
●
●
●
Voice and text
communications
Low interoperability
and synchronization
among terminals
Emphasis on electronic
data processing
Narrowband
technology
IS95 A/B
64 Kbps
●
●
●
●
●
IS95C
2000.10
144 kbps
Broadband internet
service
PC-based service
Web-based service
Networking among
some IT products
Broadband
technology
CDMA1 -x EVDO
2002
Up:2.4 Mbps
Down: 153kbps
●
●
Various converged IT services
Universal IT integration &
Universal networking
Broadband network technology:
Digital convergence technology
Trial services in July ‘05
Convergence
Services
Fixed+Mobile
TPS
Wibro+ HSDPA+ WLAN+ DMB
Home Networking
WCDMA/HSDPA
CDMA1 -x EVDV
2006
3/1.8Mbps for WCDMA
14 Mbps for HSDPA
Figure 10. ICT network evolution in Korea (Development of Broadband Technologies and Business,
2006).
12
ELO – Elektronisen liiketoiminnan logistiikka 2002–
2005, loppuraportti (2006) discusses enabling technologies for management of physical material flows and contains some roadmaps.
Etätunnistuksen suuntaviivat logistiikassa, Logistiikan
RFID Roadmap (2006) covers in a very concrete way the
possibilities for applying Radio Frequency Identification
(RFID) technologies in logistics. This publication is referred to later on in this report.
The Odyssey of the Mobile Internet (2006) discusses the
success of mobile Internet introduction in Japan as compared to Europe and the related barriers and success factors
involved in applying new mobile communications technologies in business.
‘The Long Tail’ (2004) describes business model changes
that have been enabled by the Internet.
Kansallinen tietoyhteiskuntastrategia 2007–2015 (2006),
later referred to as ‘the Strategy’, was drafted in 2006 in
co-operation with actors and decision-makers from various
sectors of society. The Strategy outlines a national vision
and strategic intent concerning the information society in
Finland. In addition to the current state of the Finnish information society, the Strategy describes changes in the national and international operating environment. The Strategy includes a concrete implementation programme and
several proposed measures, including parties that could be
responsible.
The main projects defined in the Strategy are:
● Initiating a policy programme for reforming public-sector service structures
● Increasing connection speeds for information networks
and ensuring interoperability in the information society
infrastructure
● Ensuring that the conditions for lifelong learning are met
● Reforming the rules for working life and developing
leadership and supervisory work
● Reforming the innovation system
● Developing the copyright system further
● Promoting digitalisation of business in SMEs
● Having an influence internationally, especially at the EU
level, and co-operating with Asian countries and neighbouring regions
In addition to the main projects, the Strategy includes 72
proposals for measures intended to ensure Finland’s transformation from an industrial society to an internationally
attractive, human-centric, and competitive knowledge and
service society. The Strategy includes an implementation
programme and a number of very concrete measures and
targets for 2015 – for example, households and enterprises
generally will use connections with a speed of 100 Mbps,
and new and renovated buildings will have fibre-optic connections of 1 Gbps.
The Finnish real-estate and construction cluster has a relatively long tradition in shaping a shared vision for all main
actors in the cluster. Joint vision work was started in 2000,
and the latest update report, Kiinteistö- ja rakennusklusterin visio 2010, Strategiapäivitys, was published in 2005.
The report lists the main development trends and evaluates
how the earlier visions have become reality. The report
lists as strong trends:
● Internationalisation getting faster and deeper
● Services growing and networking
● Information management becoming a more and more
important success factor
● The importance of energy- and eco-efficiency growing
● In the vision, ICT has a significant role.
New Business Opportunities for Finnish Real Estate and
ICT Clusters (2005) is a report on a two-phase pre-study to
analyse the trends in the real property business and new opportunities provided by clustering of real-estate and technology businesses. The work was supervised and sponsored by the Finnish Association of Building Owners and
Construction Clients (RAKLI), Technology Industries of
Finland, and the Federation of the Finnish Information Industries, and it was funded by Tekes. The work addresses
broadly the field’s development globally, with links to the
US and Far East.
The real-estate business and companies are seen as part of
global change in which competition is growing tougher.
Service capability and improved productivity – so-called
hyperefficiency – is a way to sharpen one’s competitive
edge.
The customers with their increasingly dynamic behaviour
play a central role in profit-making real-estate business.
This has led to new concepts in workplace services and
new combinations of business infrastructure solutions. In
Finland, these new concepts are still taking shape and finding their role in the marketplace.
Applications of new and wireless ICT are important tools
for the real-estate business, to serve the customers and
manage the property portfolios and services. New business
models and networking with ICT providers are ways to facilitate business performance.
The report Mobiiliteknologia rakennus- ja kiinteistöalalla (2005), part of the VAMOS technology programme,
reviews the state and potential of mobile applications. The
report concludes that mobile technologies and their application potential are quite new to actors in the construction
and real-estate sector, and that experience is thin. Likewise, the developers of mobile technologies lack clear understanding of how the technology and markets should be
classified or how the applications and services should be
directed.
13
The report points out the gap between technology developers and the potential users in the real-estate and construction industry: Technology experts often do not want to
limit their thinking to everyday reality, whereas professionals in this field may have difficulties in seeing the solutions that the technologies enable. The report points out
that the biggest challenges often are connected with the
biggest opportunities, and it recommends strongly that, in
future development projects, experts in mobile technology
and the construction industry should be part of joint teams.
The research reported on in Mobilizing Business Applications (2005) was carried out as part of the NETS Technology Programme in 2004 with an objective of creating a realistic picture of the role of mobile technology in businesses and identifying the challenges and opportunities in
the area of new mobile business applications and services
in business use.
The main questions for the research were:
● What is the current role of mobile solutions in business
use?
● What are the major obstacles to utilising mobile technologies in business applications?
● What are the most important (mobile) technologies in
the short term, and how will they evolve in 2005–2010?
Where do the most promising new possibilities reside?
On the basis of interviews and background analysis, the
challenges for mobile services were found to be mostly
non-technical – the available technical enablers for creating new services were judged to be sufficient for most
needs arising among the prospective users of mobile services. The real challenges were seen as being related to understanding the needs of the customer and the fit of the mobile solutions with these requirements.
The content and focus of the key references are summarised in Table 2 on pages 15 and 16.
3G Evolution – the Trusted Road Ahead (2005) is a white
paper published by Nokia and Vodafone. This white paper
describes rich content and services delivered by different
broadband technologies, including both some roadmap information and comparisons between different technologies. Some pictures from this white paper are referred to
later on in this report.
3.3.2 Personal Interviews
A number of persons from companies, research institutes,
and universities were chosen for personal interviews, with
20 persons selected to provide input from a GIGA perspective and 20 from a VAMOS perspective. All VAMOS-related interviewees were from Finland. From the technology enablement perspective it was felt to be very important
that persons from other areas, such as China, Japan, elsewhere in Europe, and the US, be included, for a more
global view of the developments and trends. The interviews were conducted between mid-October and mid-December 2006, and all, apart from two telephone interviews,
were conducted face to face. The list of persons interviewed is provided in Appendix 2.
●
It was pointed out that introducing a mobility aspect to a
business practice can change the business processes and
the roles of the players in a new value network. Understanding of the structures of value chains/networks for mobile services was seen as a bottleneck.
The large variety of different terminals, and especially the
incompatibility between terminal programming platforms,
was identified as a challenge. Understanding user needs
and usability issues are two very important elements for a
successful mobile service.
In general, mobile services were considered best suited to
tasks with a need for real-time information without requirements for large displays or input capabilities. Good coverage by the mobile network was considered even more important than bandwidth from the mobile business services
point of view.
14
3.3.3 Web-based Survey
To complement the personal interviews, especially with respondents outside Finland, a Web-based survey was carried out in November 2006. The survey was sent to 205
persons in total, both in Finland and abroad. With 83 responses received, the response rate was about 40%, which
was a very typical rate in prior experience with surveys using the same methodology.
A clear majority (56) of the respondents represented companies, with 20 representing research institutions. It was regarded as positive that the majority of the respondents were
from companies, because of the target and objectives of
this report; 36 of the respondents represented business and
43 technology, which provides a good balance. The industries that the respondents were evaluating had the following distribution: 25 persons evaluating business services,
23 traffic and logistics, 19 telecommunications, three construction, and five manufacturing. Because the number of
responses was low for construction and manufacturing, the
limitations to the statistical reliability of the results must be
kept in mind when one analyses the results.
The respondent categories are presented in figures 11, 12,
and 13.
Table 2. The content and focus of the key references.
Source
Publisher
Pub. year
Origin
Length
Roadmap for Network Tekes
Technologies and
Services
2004
Finland
NETS – Networks of
the Future 2001–
2005, Final Report
Tekes
2005
eMobility SRA,
Version 5
WWRF
Global Visions
of a Wireless World
Development of
Broadband
Technologies and
Business
Timeframe
Focus
Timeframe
estimates
Trends
107 pages 2007–2012
Roadmaps in for
networks and
services
Yes
Yes
Finland
214 pages 2010
Technologies for
wireless systems,
broadband
networks, and
related service and
application
concepts
No
Yes
August
2006
Global
62 pages
2020
Technical,
business, and
psychological
elements
Some
Yes
WWRF
2006
Global
57 pages
2017
Vision of a future
wireless world
Some
Yes
Tekes
2006
Finland
780 pages Up to 2005,
some
predictions
Technology and
business
Some
Some
E-Business Logistics, Tekes
Visions, Innovations
and Research
2006
Finland
92 pages
E-business logistics Some
Yes
ELO – Elektronisen
liiketoiminnan
logistiikka
Tekes
2006
Finland
178 pages –2010–
Enabling
technologies for
management of
physical material
flows
Some
Some
Etätunnistuksen
suuntaviivat
logistiikassa,
Logistiikan RFID
Roadmap
VTT
Rakennusja Yhdyskunta
tekniikka
2006
Finland
45 pages
RFID applications
Yes
Yes
The Odyssey of the
Mobile Internet
The Finnish 2006
Information
Society
Developmen
t Centre
Finland
252 pages –
Mobile Internet and Some
its application in
practice
Yes
‘The Long Tail’
Wired
2004
US
5 pages
–
Business model
changes
–
Yes
Kansallinen
tietoyhteiskuntastrategia
Finnish
Prime
Minister’s
Office
2006
Finland
42 pages
2007–2015
Renewal, humanorientation,
competitiveness
Yes
Yes
–2010–
2006–2015
15
...Table 2.
Source
Publisher
Pub. year
Origin
Length
Timeframe
Focus
Timeframe
estimates
Kiinteistö- ja
rakennusklusterin
visio 2010,
Strategiapäivitys
RAKLI
2005
Finland
36 pages
–2010–
Vision of real-estate No
and building
cluster, follow up of
strategy
Yes
New Business
Opportunities for
Finnish Real Estate
and ICT Clusters
Helsinki
School of
Economics
2005
Finland
63 pages
Near future
Proposals for joint
research by RE &
building and ICT
No
General
Mobiiliteknologia
rakennus- ja
kiinteistöalalla
Tekes
2005
Finland
23 pages
Near future
Project proposals
for mobile
applications
No
No
Mobilising Business
Applications
Tekes
2005
Finland
46 pages
–
Challenges and
opportunities
No
Some
3G Evolution – the
Trusted Road Ahead
(white paper)
Nokia and
Vodafone
2005
Global
20 pages
2009
Evolution of mobile
technology
bandwidths and
services
Yes
Yes
7
20
Research institution
An enterprise
Neither of the above
56
Figure 11. Web-based survey – respondents by employer.
16
Trends
4
43
Technology expert
Business person
36
Neither of the above
Figure 12. Web-based survey – respondents by profession.
8
23
Traffic and logistics
19
Construction
Manufacturing
Business services
3
5
Telecommunications
Other
25
Figure 13. Web-based survey – industries evaluated.
The Web-based survey was implemented using the Survette tool of Oy Fountain Park Ltd. In addition to freeform
verbal questions and traditional multiple-choice questions,
a technique we term ‘graphical evaluation boards’ was
used extensively in the survey for collecting opinions about
the importance of different issues. The evaluation board is
a circular field. The issues that the respondent is evaluating
are presented via labels, which can be dragged with the
mouse in the circular field one by one. Issues that get a high
importance rating are placed close to the centre of the
board, with less important ones toward the edges.
Figure 14 shows an example of a graphical evaluation
board. The red dots are the evaluations of 22 different respondents for the same issue. In the example case, the majority of the respondents considered the issue in question to
be rather important, while two respondents put it outside
the circles, thus giving it a very low importance rating. The
calculation outcome for this issue would be a number representing the median of the distances of all red dots from
the centre of the circle, which is inversely proportional to
the joint importance evaluation of this group of respondents for the issue being evaluated.
The evaluation board is a fast and easy way to collect subjective ratings for importance of issues from a number of
respondents. The method does not require artificially exact answering because there is no need to input numerical
data, and the requirement for independence and comparable scale of the issues is not as strict as in multiple-choice
questions. In graphical evaluation, the space is used twodimensionally, although only the distance from the centre
counts as an evaluation metric when the results are calculated.
17
Figure 14. Example of importance evaluation using a graphical evaluation board.
such; it indicates only which technology or functionality is
important. It is also worth noting that each issue is evaluated individually, so it is not a problem if the issues overlap
or are not of similar size.
The tables describing the expected market entry of different technologies or functionalities represent the distribu-
4G
W
IM
AX
GP
RS
ED
GE
IPv
6
Sm SDR
ar
Ac
td
cc
us
ele
t
ra
L
tio in
n S ux
en
so
rs
PA
N
HS
Fu PA
el
ce
lls
Po
st
IP
ME
MS
MI
MO
LT
E
3G
r N NFC
etw
or
k
W s
CD
MA
so
Se
n
SIP
Se
m RFI
an
D
tic
W
Un
eb
ive
W
ibr
rsa
ee
lv
eh
icl
XD
ec
Bl SL
om
ue
too
m
un
th
ica
tio UW
np B
lat
for
m
-IP
AII
P2
P
The results from evaluation boards are converted into bar
graphs by taking, for each issue in a group, the median of
the distances of all respondents’ answers from the centre;
inverting it (because small distance corresponds to great
importance); and sorting the resulting numbers in declining
order for presentation in a bar graph. Figure 15 shows such
a graph. The absolute value does not have a meaning as
Figure 15. Example bar graph – impact of technologies for the development of machine-to-machine
communication.
18
Table 3. Example of expected market entry of various functionalities.
ALL
Already
in use
By 2010
Identification and tracking of
investment goods based on RFID
***
*****
Identification and tracking of
consumer goods based on RFID
**
****
Positioning/navigation based on
digital maps and satellite or
mobile systems
*******
**
Biometrics used for human
identification
**
****
**
Daily use of mobile e-mail by more
than 30 % of business users
***
*****
*
*
******
*
Daily use of mobile Web browsing by
more than 30 % of business users
tion of individual opinions expressed in the Web-based
survey. If all respondents had placed the market entry in the
same time period, the table would have 10 asterisks in the
corresponding cell. When the opinions are distributed over
different time periods, the number of asterisks indicates the
proportion of the evaluations selecting that period, with
each asterisk corresponding to 10% of the votes. That the
sum of all asterisks is not always 10 is an effect of rounding. An example can be seen in Table 3.
By 2015
After 2015
Never
**
The second target of the workshop was to identify critical
paths and points in overall development, as well as to identify opportunities that could be of interest for Finnish organisations.
The workshop encouraged lively discussion and provided
valuable comments in terms of either supporting or challenging the intermediate results of the project. These comments were considered as a matter of course in the preparation of this final report.
3.3.4 Workshop
In January 2007, 14 persons, with diverse backgrounds,
participated in an expert workshop arranged in the latter
part of the project in order to allow the experts to comment
and review the intermediate results of the project. The participants in the workshop are listed in Appendix 3.
19
4 VAMOS
4.1 Introduction
The VAMOS programme focuses on improving business
processes in selected industries by utilising mobile and
wireless technologies. The key industries selected in the
VAMOS programme are traffic and logistics, construction
and facility maintenance, manufacturing, and business services; hence, these areas were also the ones investigated in
the focus of this project. The concept of business services is
a very broad one, and those of greatest interest for VAMOS
are horizontal business applications. These are enterprise
resource planning (ERP), customer relationship management (CRM) (including mobile marketing), and field force
automation (FFA). The name of the programme – VAMOS
(‘Value added Mobile Solutions’) – emphasises opportunities of mobile technology to add value to business processes. One of the key tasks in VAMOS is to determine the
business opportunities in selected industries.
The structure of the roadmap, which forms the essential result of this project for each sector, is divided into four parts:
● Key trends
● Current situation (2007)
● Forecast for 2010
● Forecast for 2015
In discussing trends, it is vital to identify which are most
relevant from a Finnish perspective, despite the fact that
globalisation drives things in the direction that all trends
somehow affect.
Some common key drivers, enablers, and barriers in renewal of business processes are presented in Figure 16. It is
worth noticing that in many cases the same subject may
well be a driver and an enabler at the same time. Sometimes, the same topic may even be both a driver and a barrier. It is also very important to stress that developments or
Figure 16. Common key drivers, enablers, and barriers in renewal of business processes.
21
Figure 17. Interrelation between logistics and the value chain.
barriers to development are affected strongly by other factors than technology alone, such as politics, regulation,
psychology, and marketing.
Logistics is a very broad concept and has strong ties with
the whole value chain – e.g., supply, manufacturing, traffic, and transport, as well as consumption. As indicated in
Figure 17, this report focuses on the elements of traffic and
logistics, which are discussed in section 4.2, below, and
manufacturing, addressed in section 4.4.
4.2 Traffic and Logistics
4.2.1 Needs
Good knowledge of relevant branches of industry is becoming very important when the target is intelligent logistics solutions. In this context, it is also important to understand that the often-required ‘one customer interface’ has
two dimensions – the human and the machine.
It is essential to recognise in which part of the value chain
the logistics enterprise is and where it wants to be.
Warehouses are well under control at present in the logistics chain, but the quantity and whereabouts of property being transported is not always known. This can represent
10–30% of the total inventory value of the chain.
Logistics is only one function among many in enterprises,
and thus development focus is limited. Enterprises have
very different needs and requirements that must be fulfilled. There are no common standards, but some recommendations do exist. When the large corporations deploy
their backbone IT solutions, logistical requirements are
22
taken into consideration only to a certain extent. The larger
the enterprise is, the more tailoring is required. That SMEs
tend to use ready-made packages makes integration with
these systems easier.
Needs vary greatly from one segment of the market to another, and also within each. Some reasons for this are:
● Manner of use
● Processes
● Fleet size
The price points for willingness to invest in vehicle ICT
systems are estimated to be about five times higher today in
northern Europe than in Eastern Europe, due to the difference in labour cost levels but also as a consequence of a different culture of using IT. The US market for truck systems
is about five times the size of the EU market and also much
more homogenous.
The need for using positioning varies a lot and depends
very much also on the safety of the areas and districts
where the transport takes place, as well as the drivers’ reliability.
The framework for a logistics provider can be arranged under three main categories – namely, the goods of the customers, the driver, and the truck or other vehicle, as illustrated in Figure 18, below. The level of integration of systems addressing these categories, both with each other and
into the logistics provider’s ERP system, remains very limited – it is more a question of somewhat independent islands.
Information related to the customer and goods: The exact
position is typically not crucial. It still suffices to know between which points the goods are. There is often an inde-
Figure 18. Level of integration between purpose-specific systems and the logistics service
provider’s ERP systems.
pendent system based on the Global Positioning System
(GPS).
higher than in many other industries, and this has driven the
change.
Truck information, such as speed, fuel consumption, and
engine Revolution Per Minute (RPM) data: These systems
tend to be truck-manufacturer-specific, and the needs of
different transportation types are so different that complete
solutions are very difficult to build.
The market is divided between a few large players, medium-size players, and small players. The consolidation
and globalisation of the large enterprises and hence logistics players following the same trend is one key driver of
development. The different logistics chains – that is, the
big companies – have different automation of vehicles and
different planning, their own management systems, and
their own standards worldwide. If the customer wants
global service, the choice of supplier is limited. Big companies are optimising their chains, but at the same time there
are chains consisting of many independent actors.
Driver information consists of working hour reports, salary
information, etc. Some driver information is beginning to
be integrated into the truck systems also, such as working
hour reporting.
The systems still tend to be quite purpose-built for goods
transportation requirements: Digital maps and navigation
are not integrated, even if they technically could be. The
reasons for this are the better usability of purpose-specific
devices and greater reliability.
4.2.2 Trends and Drivers
A key trend is outsourcing of logistics, and this has only begun. The outsourcing market is still growing. There are big
differences between the various sectors of industry in relation to this; for example, the telecommunications and electronics industry are very developed, while the forest industry is only in the very beginning of these changes. The
speed and cycle time requirements in electronics are much
The consolidation of logistics companies leads to polarisation. It is an interesting option – and feasible from a business perspective – for large logistics suppliers to serve primarily large customers. Smaller customers can be served
well only if the standard solutions match.
Information technology is going to be an integrated part of
traffic infrastructure. Development will be driven by big
purchasers, not by the transport companies. Consolidation
of vehicle system suppliers is also inevitable.
Technology and business are driving factors, but one of the
very important decisive points for take-up is to determine
the human factors related to the adoption of more advanced
logistics solutions.
23
That there is much more cargo from Asia to Europe than
the other way round has further potential to drive some interesting and unexpected business model changes.
business processes need to be used, making the process so
expensive that the potential savings are not achieved.
Logistics centres are a new development phenomenon in
Finland – examples are logistics parks in the Ring III area,
Vuosaari, and Riihimäki. Similar trends were visible elsewhere in Europe much earlier. The current development in
Finland may include a bit of logistics centre hype.
Opportunities and Business Model Changes
The key trends and drivers can be summarised as:
● Changing business models including outsourcing and
globalisation
● Ease of use
– Users who are willing to try new things are driving
changes – the young generation is very adaptive
● Transparency requirements for all players in the value
net
● Reliability
● Requirements of a large customer for certain
functionalities, which may spread rapidly after that
● Standards that are starting to be at a sufficient level
● Several needs that will gradually be incorporated into
the same integrated business process
● An increasing amount of ICT everywhere, with wireless
use and mobility as key features
4.2.3 Challenges and Opportunities
Challenges and Bottlenecks
The key challenge is one of holistic management. Outsourcing requires larger entities to be managed and networked. Enterprises in the cluster should be capable of envisioning the developments together.
Everybody has different systems today, with various inhouse formats making interfaces expensive to implement.
Within a company, there are also many different systems
that do not work together as they could. Navigation, as an
example, is in very wide use but not integrated into other
systems. The integration is going to take a long time.
The increased amount of information that is digitally available poses an increased security risk also, in the form of potential misuse of information (e.g., where a truck is or
where the goods are stored). Another example in this context is electronic licence plates. From a technical standpoint, they could be implemented today, but privacy considerations may be an obstacle.
The truck manufacturers are working toward stronger integration of the systems embedded in trucks and those related
to the driver, but this transition will take time. The problem
from the transport company’s point of view is that the fleet
typically consists of several brands of trucks and that, in a
transition period, several types of equipment, systems, and
24
Outsourcing requires management of larger entities and
networking in a holistic way, as indicated above. There is
still much efficiency to be gained, but that requires unified
models, processes, and IT. Logistics is estimated to represent about 17% of the gross national product of Finland,
which makes it evident that the potential for efficiency and
added value is vast.
The status of traffic data is somewhat unclear: Is it public
or private? In some countries, the government is investing
in traffic data, on account of a belief that the state should remain in the value chain as a subcontractor of traffic data. It
is not likely that this mode will survive in the long run,
since the same development will take place as has been
seen already with geographical information. Traffic data
should come about 15 years behind digital maps.
The market value of rapidly changing information is higher
than that of static information.
A key enabler of the development in traffic and logistics
services is the shift of financing, including the possible
subventions, to end-use-based models. Technology is not
the limiting factor. A considerable enabling factor in Finland is the strong base of networks and support of mobility.
An interesting example is dynamic follow-up on traffic,
which is on its way already. Payment for the use of a road
will be included in route optimisation dynamically. Dynamic and complete availability of traffic data enables
price-setting for all available routes between destinations
also, in order to steer traffic toward optimal use of the
available infrastructure.
Timing, however, is a crucial question: When is the benefit
of a certain technology or application so great that implementation makes sense? Also, some newer technology
may arise that makes the previous one obsolete too early.
Road and traffic services will be developed according to
the following model of operation: The owner of the road
network contracts the traffic in a region to a company that
charges for the services on the basis of end users’ usage.
In terms of other developments, there will be trip intermediaries in road traffic similar to those for air and rail travel today.
In addition, new technology enables, e.g., pay-as-you-drive
insurance. Also, would there be an opportunity for horizontalisation, with container operator and content operator?
The Finnish Road Administration has a key position in the
development of traffic services. Authorities and politicians
set the pace of deployment. Numerous studies are carried
out by public actors in Finland, but implementation of real
change is rather slow when no serious problems are clear.
Global and even European policies on transport (e.g., rail
transport) are very fragmented.
The country that is first to implement an operational system
reaps benefits. Finland is well positioned due to networks’
mobility support and the existing road condition monitoring systems.
Because of the view that the vehicle communications arena
remains very fragmented, the right approach may be one
with a universal vehicle platform, consisting of open interfaces and standard modules. These platforms then can be
used for customer-specific systems as the base on which
the needed applications are built. There will also be vertical
players, such as companies specialising in bus systems, and
then strong component suppliers.
Regulatory factors may drive technology deployment by
enforcing changes in vehicle automation systems. Examples of such regulatory factors include truck safety recorders as well as breath alcohol detection and interlocks.
Environmental and energy fees will change the logistics
business. Large changes in the prices of oil and emission
rights may have a huge influence. It is possible that additional regulatory fees for energy usage will be implemented in the future.
4.2.5 Functionalities
The functionalities and timing of use for certain functionalities, as indicated in the Web-based survey’s results,
are presented in Figure 19 and Table 4.
Europe is very fragmented in terms of usage and standards.
While the EU is attempting some standardisation, this is
difficult and, to a certain extent, may not even be viable.
Emergence of a de facto standard for traffic information in
Europe would speed up the development significantly. It is
hoped that this will take place.
Tracking and tracing, identification, and positioning were
identified as the most important functionalities for the development of the sector. The second category of importance consists of seamless access to networks, navigation,
and mobile terminals, closely followed by digital identity
and security. Digital security and identity as an essential element also in traffic was confirmed in many of the personal
interviews as well. There is an EU directive under preparation concerning the release of geographical information to
public use.
Follow-up information handling is in the process of becoming integrated, and the use of open database standards
is increasing.
It is interesting to note that telecommunications capacity as
such is not seen as one of the most important functionalities, which can be interpreted as an indication that mo-
4.2.4 Standardisation and Regulation
Figure 19. Relative importance of different functionalities for the development of
traffic and logistics.
25
Table 4. Timing of usage of certain key functionalities within traffic and logistics.
TRAFFIC AND LOGISTICS
Identification and tracking of investment
goods based on RFID
Already
in use
By 2010
**
******
***
Identification and tracking of consumer
goods based on RFID
*
Biometrics used for human identification
*
***
***
Daily use of mobile e-mail by more than
30 % of business users
**
*****
**
Daily use of mobile Web browsing by
more than 30 % of business users
*
******
*
bile technologies already provide the required throughput
for most applications for the present and the near future.
From the timing table, a few key observations can be made.
In the next few years, RFID should see a strong entry into
tracking and identification of investment goods. The same
is expected for consumer goods about five years later. Positioning/navigation based on digital maps and satellite
(GPS, Galileo) or mobile systems is already in extensive
use today, but the key area for development is to integrate
these systems and the information content into other systems. The use of biometrics for human identification is expected to start becoming common by 2010 and continue its
spread.
Some of the basic functionalities in use today in this field
are acknowledgement of delivery and information on subsequent delivery.
Some other additional functionalities that could be included
in the future:
● Identity of the person receiving the delivery
● Exceptions
● Indication of whether the store at the destination is open
● Real-time applications
● Fuel consumption
4.2.6 Systems and Technologies
The impact of different technologies on navigation, positioning, tracking, and identification functionalities was addressed in the Web-based survey as presented in Figure 20.
By far, RFID was seen as the technology that will have the
most important impact, followed by a number of other
technologies, such as sensor networks and near distance
After 2015
Never
***
********
Positioning/navigation based on digital
maps and satellite or mobile systems
26
By 2015
*
communications (near field communication (NFC), Bluetooth, Wibree). Since RFID was seen as so important both
in the Web-based survey and in the interviews, it is discussed separately and in more detail below. Other key technologies are addressed as well but given less emphasis.
RFID Technology
The use of RFID technology has remarkable potential in
traffic and logistics, in areas such as:
● Tracing and tracking
– Example: Tracking whether all required goods are included and ensuring that no goods are included that
should not be
● Car surveillance and monitoring (e.g., an intelligent transport system through placement of the tag on, for example, the registration plate)
However, there remain some bottlenecks, such as:
High price
● The limited number of players
● That RFID needs to be embedded in products
● That some trials have not shown good enough results
(new chips that are available today may be better)
● That a certain number of readers is needed (cost needs to
decrease to about €20–200)
●
The key drivers are that:
Large retail stores such as Wal-Mart, Tesco, Marks &
Spencer, and Metro Group are requiring it of their suppliers
● The US Department of Defense is requiring it of key
suppliers
● Large industrial companies are requiring it of key
suppliers
●
UW
B
Ac
Lin
cc
u
S
ele m
x
ra art
tio du
n S st
en
so
rs
SD
R
HS
PA
Po
st
IP
Se
m
L
an TE
tic
We
b
ME
MS
DV
BH
XD
SL
SIP
6
AII
-I
W P
IM
A
W X
CD
MA
W
ibr
ee
ED
GE
MI
MO
IPv
Un
ive
rsa
lv
eh
icl
e
co
m
m
un
ica
tio
n p 3G
lat
for
m
G
Bl PRS
ue
too
th
P
4G
P2
or N
Ne FC
tw
or
ks
PA
N
Se
ns
RF
ID
0
Figure 20. Impact of the various technologies for development of navigation – positioning
– tracking – identification.
The technology is making its breakthrough in both industry and the retail sphere. Large retailers and industry are
adopting RFID, which means that others need to follow.
The technology will complement the bar code, not replace
it. For instance, RFID will decrease errors while increasing speed and traceability. Transparency, predictability,
and early corrective actions are part of the key added
value that logistics companies can provide using, e.g.,
RFID technology.
Some large industrial companies, such as ABB with its
subcontractors, have implemented RFID technology successfully, resulting in:
● Better transparency
● More efficient operations
● Better handling of exceptions
● Improved gathering of statistics
All in all, the business results were better management of
goods and reduced stocks.
Figure 21. RFID tags are read when components are delivered to the
factory (E-Business Logistics, Visions, Innovations and Research, 2006).
27
Figure 22. RFID penetration in Finland in the logistics field (Etätunnistuksen
suuntaviivat logistiikassa, Logistiikan RFID Roadmap, 2006).
Typically, RFID will become common earlier in more expensive products, such as drugs, high-end mobile phones,
and high-priced investment goods. However, this technology is already in some use for theft prevention with a few
less expensive products.
Most new cars soon will have passive RFID tags. Tags in
different parts of cars would provide real value in operations related to sourcing, production, tracking, and maintenance.
Figure 23. Services using RFID tags in Japan (Development of Broadband Technologies
and Business, 2006).
28
Table 5. Development of RFID usage in traffic and logistics.
2007
RFID
2010
2015
• Successful RFID trials are
• RFID is used extensively
• RFID also is used in daily
completed
• Large retail stores and
industrial companies
require RFID compatibility
of suppliers
• The rapid expansion
phase begins
in closed systems and
investment goods
consumer products
extensively
• RFID is a dominant
technology
• Packaging suppliers have
fully integrated RFID
Eventually, RFID will become common in every product,
even daily consumer products. When the price is in the
range of one cent per chip, this will be reality. Eventually,
the RFID tags will be integrated into the packaging material.
However, the change of reading systems will be a rather
long and expensive process (e.g., for readers in point-ofsale systems in stores).
A recent study within the Aino programme (Etätunnistuksen suuntaviivat logistiikassa, Logistiikan RFID Roadmap, 2006) supports very well the findings of this project.
Timing of the penetration of RFID usage as described in
the Aino programme is presented in Figure 22.
Figure 23 describes the usage today and future willingness
to use three RFID-enabled services in Japan.
A summary roadmap of RFID development is presented in
Table 5.
Other Technologies
Practical, easy-to-use solutions are in use today – e.g.,
WAP-based solutions are still in important use in some
transport applications, enhanced with extended General
Packet Radio Service (GPRS) capabilities in some sectors
since the beginning of the millennium. Upgrades to more
modern technologies are not performed, because of the
high transition costs.
The usage conditions in the Finnish climate are harsh, with
large temperature changes, which provides both a challenge and an opportunity to develop robustness. The lack
of Global System for Mobile Communications (GSM) coverage in a sparsely populated country such as Finland was a
bottleneck earlier on but not anymore.
Newer vehicle systems being introduced in 2007 tend to be
operator-independent, which provides the opportunity to
use the most cost-efficient communications option. There
is greater bandwidth, depending on where Enhanced Data
Rates for GSM Evolution (EDGE) and 3G access are available. More functionalities are being integrated on a continuous basis. One of the main ideas continues to be that most
of the inputs are handled automatically, without the expensive use of, e.g., driver resources.
The Digita Flash Orthogonal Frequency Division Multiplexing (OFDM) network will bring Wireless Local Area
Network (WLAN) use to public transport vehicles in April
2007. Through this, access to the Internet can be provided
to passengers.
New-generation GPS will bring another frequency. The
Galileo project has stimulated civil GPS development. By
the end of 2008, all Galileo satellites will be up, and the
system is expected to be operational in 2010. Also, Assisted GPS, or AGPS, technology brings auxiliary information over the mobile net to improve GPS accuracy and integrate services. The technology is already in use. The use of
Real-Time Kinematics GPS (RTKGPS) will enable the accuracy of a few centimetres. By 2010, GPS will be widely
available in mobile phones. In 2015, it will be a standard
feature of a mobile phone.
At the same time, Micro-Electro-Mechanical Systems
(MEMS) acceleration sensors are coming to mobile
phones. They can complement the positioning.
Sensor technologies (for temperature, humidity, corrosion,
oxygen content, etc. in addition to RFID per se) can provide a great deal of added value, but implementation
throughout the logistics chain is a very long-term development, beyond 2015.
In 2010, a pan-European smartcard system for mobile
phones will be available, and in 2015 commonplace. It will
enable a number of payment types, such as transportation
fares. Different payment modes are possible and in competition with each other, examples including a purse of electronic money, payment through operator billing, credit
card use, and third-party invoicing.
29
Dedicated Short Range Communication (DSRC) is enabling a pan-European road toll system.
Some trials with digital pens – in conjunction with acknowledgement of delivery – were not successful, because
the pens were not reliable enough and the digital paper was
too expensive.
There are companies providing platforms for professional
vehicle telematics and fleet management systems. On top
of these platforms, sector-specific and company-specific
applications can then be tailored.
4.2.7 Terminals and User Interface
The terminals used are typically purpose-built standard terminals for, e.g., truck drivers. Illumination factors have
been one area that has not been considered sufficiently
from the usage point of view.
The terminal typically has functionalities such as WLAN,
RFID, bar code reader, and camera.
In the long term, more functionalities are going to be integrated into all terminal devices, but the use of dedicated
terminals, built for a specific purpose, probably will remain
dominant.
4.2.8 Vision of the Future
The vision for the future is full transparency across the
whole value net, such that:
● Tracking and tracing on its own is not sufficient
(too passive)
● Exceptions and warning signals are delivered
proactively
● There is the possibility of taking corrective action when
exceptions are spotted and reported early enough
● The customer is informed in advance
All of the elements necessary for such solutions are available today, but the question remains of having different
systems to communicate and accumulate the relevant information – for better utilisation of the existing vast quantity of data, which is the main bottleneck.
30
The vision for the future could be the following:
2010: Invoicing for all forms of transport will use the same
principle – you pay by the kilometre. The meter is always on.
Optimistic scenario for 2015: Finland has made the important decisions on time so that in 2010 the management of
road traffic has moved to the same mode as air traffic.
There are Finnish international business success stories in
this field. Business and concepts have been globalised.
Change has begun in so many countries that the effects on
national economies start to be visible.
Pessimistic scenario for 2015: Cutting of budgets is necessary, recession development takes place elsewhere, and the
traffic and logistics industry withers.
The difference between the pessimistic and optimistic scenarios is the state’s position on road payments and road operation contracts. If the changes in these areas are left
half-done, the advantages will not be actualised.
If development is favourable, traffic will take its place as a
support process for society, earning its money from supporting the main processes.
4.2.9 Summary
As a summary, the following can be stated:
The network needs to fulfil the basic requirements of
functionality, reliability, quality, and cost-efficiency
● Several needs gradually will be incorporated into the
same integrated business process
● Users should be able to use the systems – the younger
generation is very adaptive
●
Figure 24 describes the essentials for realisation of the vision of transparency in a new, future value net within the
area of traffic and logistics: There needs to be uniformity
and seamless communication between all companies and
authorities on the level of business models, processes, and
IT systems.
A summary roadmap for traffic and logistics, based on inputs and the analysis and conclusions within this report, is
presented in Table 6.
Figure 24. Realisation of the vision for the future of transparency requires
uniformity, and seamless communications.
Table 6. Roadmap for traffic and logistics.
TRAFFIC AND LOGISTICS
Key trends
• Increased need for transparency, for all players in the value net
• Globalisation of customers and logistics suppliers
• Large retail stores such as Wal-Mart or Tesco and large global industrial companies driving
changes through at a rapid pace
• Consolidation of logistics providers
Situation in 2007
• Business and process models are rather well defined within companies
• Content is only partially digitalised
• Communications between the digital and physical world are sporadic
Situation in 2010
• Business and process models are defined for entire value networks
• The majority of content is digitalised
• Communication between the digital and physical world occurs in certain areas systematically
Situation in 2015
• Business and process models for dynamically changing value networks are defined
• Virtually all relevant content is digitalised
• Communications between the digital and physical world takes place systematically, and
transparency is good
31
4.3 Construction
Construction of infrastructure and construction of buildings are two segments of industry with very different products, business processes, and structure, and consequently
different views on utilisation of technologies. The technologies used in construction processes themselves differ
from those included in the products (e.g., buildings and
roads). Maintenance needs add another point of view on
utilisation of technologies. In this section of the report,
consideration of the use of technologies in construction industries is divided into the following areas:
● Infrastructure construction and maintenance
● Construction of buildings
● Building automation
The connection of building automation to the construction
process itself is loose, because the lifetime of a building is
much greater than that of an automation system.
4.3.1 Infrastructure
The greatest volume in the infrastructure construction and
maintenance business is in traffic networks (road and rail)
that are owned by public actors and built in large projects
involving a substantial design effort. The products have
long lifetimes and require regular maintenance. The challenges in construction and maintenance of other societal infrastructure, such as that for electricity, water, and telecommunication networks, are largely similar but involve
lower volumes.
At the core of the infrastructure cluster is the land and water structure construction field, where most production traditionally has been carried out as the work of the public
sector. The structure of the industry in European countries
is in various phases of transition from state- or city-controlled activity to a cluster of competitive enterprises offering their products and services to the owners of the infrastructure networks. In most cases, the owners are stateowned companies, cities, or other public actors.
The industry traditionally has been quite conservative, and
the availability of individual technologies is not the limiting factor in the deployment of new methods. As in many
other industry clusters, one crucial enabler is to first create
a common language in an industry where the terminology
has been diversified. Agreeing on common terms and subsequent standardisation are prerequisites for the optimisation and full application of ICT in processes wherein multiple parties contribute to the same project.
32
Traditionally, the purchaser has specified in detail how the
project is to be implemented, and service providers have
competed on the basis of unit costs. There have not been incentives for the development of reusable product concepts.
Product development culture is emerging in the industry,
but it is in its early stages when compared with, e.g., that in
house construction. At the national level, the industry actively seeks standard product models that would enable automated information exchange between different companies working in a common value network, e.g., when designing, building, and maintaining a road.
Standardisation issues and also industry structure issues
seem to be less internationally focused in infrastructure-building than in many other industries.
New (mobile and Web-based) technologies can offer new
communication and participation possibilities for the citizens in relation to infrastructure-planning and construction
issues. They can help to speed up the process of city planning by improving communication as well.
The impact of mobility in infrastructure-building and
maintenance processes is even greater than in house-building because of the mobility of the building site. The power
supply of the mobile terminals is not as critical as in some
other applications, because the terminals can be connected
to vehicles in most phases of the work. Robustness and
ease of use (including hands-free operation) are important
factors, as is the capability for presentation of graphical
data, such as maps and design information.
Real-time information about the status of the infrastructure
is essential for management and maintenance. Timelines
and geographical coverage are more important than great
accuracy. The bandwidth in collection of real-time information is increasing rapidly. This puts pressure on information-handling processes as well.
Maintenance of the road infrastructure is closely linked to
operation issues – i.e., management of traffic. Traffic was
discussed separately in section 4.2.
When location information becomes commonplace in consumer terminals, it will be possible, for example, to have
the road users report road damage, including photographs,
in real time with accurate location information.
In 2010, the automation of road-building processes will
still be in a pilot stage, but the first implementations should
exist. In 2015, product-model-based design and implementation of projects will be in use. The advantages of mobility
can be obtained fully only after design and maintenance information is available automatically in digitised form.
4.3.2 Construction of Buildings
4.3.3 Building Automation
Although ERP systems are commonly in use by construction companies, at present the physical tracking of parts
and materials all the way to the building site typically is not
integrated into the system. Existing RFID technology has
not been reliable enough to justify the investment, although
it would bring remarkable savings and quality improvements to the process. Often, the environmental conditions
at building sites impose limits on the practical input of
tracking data. There is a need for robust handheld terminals
for the transactions outdoors on building sites.
Much of the available automation technology, mostly developed first in industrial applications, would be useful in
houses. There is use for traditional automation in the monitoring and control of the basic parameters and supplies of
houses. The concept of intelligent building is 15 years old;
only the practical implementation has been very slow.
In 2010, RFID tracking of products will be in common use
in logistics between enterprises if the G2 standard functions well in use. If we must wait for G3, the breakthrough
will take longer. In 2015, RFID tags will be part of everyday life.
The use of product models is much better implemented in
building construction than in infrastructure. Some large
buyers already require all design work to be done on the basis of product models.
The biggest factor slowing the application of automation in
houses is that there is no open-standard service platform to
enable development of different services by independent
companies and integration of these in the building project.
Houses are built as projects, and for house-builders automation is a minor issue, lumped in with electrical installation work. Nobody has the incentive to develop a general-purpose platform for house automation applications.
One possible driver for the use of sensors in buildings and
infrastructure could be the legal liabilities of the constructor. It is not clear, however, who might be a suitable driving
party for this development. So far, neither the industry itself nor insurance companies have been very active.
Also, ERP systems are used in purchasing of materials.
Links between suppliers’ product catalogues and design
systems have been built. The first trials of tracking of incoming materials via RFID are taking place. While standard bar codes – Universal Product Code (UPC) and European Article Number (EAN) – were widely implemented
for retail product tracking in the ’70s and ’80s, no common
bar code standard ever was developed for building materials. The industry is searching for ways to migrate to process-based operation from its current project-by-project
approach. Here, RFID standards may be an enabler. It is
expected that in 2010 the first pioneers will have building
sites where the incoming products are identified digitally
and linked to the maintenance systems. In 2015, this procedure should be commonplace, except perhaps for the sites
with the worst weather and environmental conditions. The
portability, weather-resistance, usability, and reliability of
the terminals are essential – there is a need for ‘militarygrade equipment with civil pricing’.
Some applications are under development, such as electric
meter reading using GSM, but in these cases often the developer tries to create a proprietary platform in line with
the earning logic for the maintenance phase.
The advantages of having online up-to-date design information available on the building site are clear; old versions
of drawings, omissions in designs, and misunderstandings
of the intention of the designer are frequent, and good version management, perhaps in concert with an online visual
communication link to the designers, would pay off early.
The integration will proceed on several levels and using
various interfaces. Communication between building-operations-oriented systems serves functionalities such as:
● Access control
● Energy control
● Safety and security
● Protection against fire
● Heating, ventilation, and air conditioning (HVAC)
● Lighting
● Lifts, escalators, and internal logistics performance
● 24/7 monitoring and maintenance
Control of access to the construction site and recording of
the tasks accomplished are mobility-based functionalities
that will find use in construction-related industries.
Also, the established methods of operation in the industry
were seen as obstacles to implementation. Changes would
cause elimination of traditional jobs and roles yet also create new ones.
Regardless of all of the structural and cultural issues that
slow down development, there is a slowly advancing trend
toward open multi-vendor platforms in building automation. To quote New Business Opportunities for Finnish
Real Estate and ICT Clusters (2005), “[we] assume that the
traditional building systems will become integrated and
network connected so that the control of systems and user
services can be designed to use a common user interface in
a common backbone network of a building.”
33
Intelligent building technology also can support the unassisted living of older people in their own homes.
While the buildings are designed to last 100 years, automation and data processing technologies become obsolete in a
few years. It is to be expected that in building automation
there will be a market for systems that are installed in existing buildings in modernisation projects rather than as part
of the original design.
Table 7 presents the results of the Web-based survey in relation to different functionalities and the timing of their
broad implementation. In reading the results, it should be
borne in mind that the number of respondents to this part of
the survey was only three.
Figure 25. Building systems and user services with
independent networks will be integrated in a backbone and simplify the building network and communication environment (New Business Opportunities
for Finnish Real Estate and ICT Clusters, 2005).
Communication between facilities management and users
is utilised for:
● Maintenance work orders and reporting
● Lobby services and guest guidance
● Reporting and billing
The views of the respondents on the use of RFID were split,
some of them seeing RFID technology as being in use already and others foreseeing a delay of 4–8 years before implementation.
At building sites, optically readable personnel identification cards are in wide use. The respondents obviously considered this a sufficient level of identification, since they
were unanimously quite sceptical about biometric identification ever entering use in this branch of industry.
Key trends and developments foreseen in the construction
field are summarised in Table 8.
Table 7. Timing of usage of certain key functionalities within construction.
CONSTRUCTION
Identification and tracking of
construction material based on RFID
Positioning/navigation based on
digital maps and satellite or mobile
systems
Already
in use
By 2010
******
By 2015
Never
***
******
***
******
***
Biometrics used for human
identification
34
After 2015
Daily use of mobile e-mail by more
than 30% of business users
******
***
Daily use of mobile Web browsing by
more than 30% of business users
******
***
Table 8. Roadmap for construction.
CONSTRUCTION
Key trends
• Interactive online access from the building site to up-to-date design information
• Tracking of the flow of material and components all the way
• Standardisation of the service platform layer for building automation
Situation in 2007
• Design information in drawings and enquiries by phone
• ERP systems managing materials until dispatch from the warehouse, and thereafter no automatic
checking
• Emerging standards not in wide use; proprietary channels for new services
Situation in 2010
• Paper drawings primary, with mobile phone cameras to check details
• Completion of first pioneers’ implementation of end-to-end RFID tracking of components
• Struggle related to standards: COBA, BACnet, own solutions, service-specific solutions
Situation in 2015
• Robust, easily operable handheld terminals for many building sites for online ERP-CAD
• RFID-based material tracking between companies – commonplace but gaps still exist
• Emergence of a clear standard, however many less dominant existing in paralell
4.4 Manufacturing
4.4.1 Introduction
There have been big changes in Finnish manufacturing
over the last 10 years. Most of the successful companies
operate globally, and manufacturing has been moved close
to the customers, partly for logistical reasons and partly because of manufacturing costs. The other main driver has
been remarkable structural change throughout the industry
but especially in manufacturing, with system suppliers becoming a new type of player between large manufacturing
companies and individual component suppliers. A third
factor, which is getting more and more important, is the
lack of skilled labour and the geographical imbalance between different parts of the country. Also, investments in
manufacturing have been very modest, and trust that manufacturing can offer a competitive edge for the companies
concerned has vanished.
In manufacturing, the electronics industry has seen remarkable improvement in productivity (2.5-fold from 1995
to 2002) while other manufacturing has been almost flat.
The current thinking is very much that Finland is making
its living from R&D but manufacturing can be done globally. In the long run, it is, however, impossible to be competitive in the total end-to-end process in the absence of
world-class technologies and competence in all parts of the
process. Hence, choices need to be made as to which part of
the end-to-end process should receive the focus.
4.4.2 Structure
The great structural change in manufacturing began during
the recession in the early ’90s, when large companies
started to outsource their production. In the beginning, the
main reasons were the reduction of fixed expenses and assets, but more recently other drivers have been the technologies and competencies that system suppliers and subcontractors can provide.
System suppliers were, until the late ’90s, very much like
manufacturing departments for the big companies, but in
10 years the best of the system suppliers have developed
their production control, purchasing, engineering, and even
R&D competencies such that the customer can order a
complete product, to be designed and delivered to the end
users.
Subcontractors who earlier were delivering their goods directly to the big companies now have business relationships mostly with system suppliers. The leading subcontractors have focused on certain types of manufacturing
and have invested in modern machine tools, control systems, and automation.
35
Outsourcing started in the electronics industry in early
2000, when globally operated companies demanded that
their partner companies have their own international manufacturing facilities in the same countries and locations as
the customers. Now this development is being seen also in
engineering and the machine-building industry.
Some of the strategic partnerships have been very successful, but there are also plenty of warning examples of badly
planned and implemented manufacturing co-operation.
This means that we will continue to see considerable structural change and the main trend will be toward insourcing
instead of outsourcing.
4.4.3 Needs and Drivers
The manufacturing field is very large and diversified, so
the needs can vary a great deal from one market segment to
the next. The needs and drivers in the electronics industry
and other manufacturing are different. Also, manufacturing volume has a great impact. Manufacturing can be divided into the following main categories:
● Mass production
● Flexible, cost-effective manufacture of project and
low-volume products
● Manufacture of demanding and more intelligent
mass-customised products
Common needs for the whole end-to-end process are:
● Global operations
● Technical key accounts: New products are developed in
collaboration with demanding customers so that the
product has the right features; here, the development
work’s scope is much broader than in the past, covering
the product, manufacturing methods, service, and life
cycle management
● Customer relationship management
● Capability to mass-customise small-volume, high-value
products
● A high technology and competence level
● Competitive pricing and overall efficiency
● Accuracy in delivery times and content
● Flexibility
● Real-time visibility and controllability of the whole
manufacturing network
● Manufacturing network management
● International sourcing and purchasing
● Quality
Mass production in recent years has been moved close to
the customers, especially in the Far East. From the technology point of view, this means that the complexity of the
products and the level of automation are still too low to
compete with low labour costs.
36
In the future, the products will become more intelligent, decrease in size, and have miniaturised components that
make manual assembly difficult or impossible. When the
flexibility and intelligence of automated manufacturing are
increasing at the same time, the location of mass production need not depend on labour costs but instead can be customer- and market-driven.
The main needs and drivers for mass production are:
Product costs
● Quick ramp-up
● Quality yield
●
The following aspects of operations in this field will become more important:
● Integrated enterprise management
● Fully integrated. optimised design and manufacturing
● Intelligent processes and equipment
● Flexible decentralised operations
● Plug and Play interoperability
The elements most relevant to manufacturing in Finland
are:
● Flexible, cost-effective manufacturing of project and
small-volume products
● Manufacturing of demanding and more intelligent
mass-customised products
Today, Finnish competitiveness in these types of manufacturing is very much related to willingness to create bespoke
products with a short delivery time and relatively low
price.
Manufacturing still is based on flexibility, manual finetuning, and control, in spite of the fact that companies have
invested heavily in ERP systems.
By utilising modern technologies such as integrated sales,
ICT tools for design and manufacturing, RFID, and flexible self-learning Plug and Play automation, Finland can
build a real competitive edge in manufacture of small-volume, mass-customised products.
The needs and drivers are:
Management of the total end-to-end process
● Modelling and simulation
● Flexible, fast, cost-optimised production of
mass-customised products
● Improved efficiency
● Manufacturing network management and control
● Technology and competence level
– Plug and Play flexibility
– Self-learning automation
– Level of integration
– ICT
●
●
4.4.4 Trends
●
Market- and customer-driven trends in manufacturing are
that:
● Global structural changes and consolidation are proceeding apace, which mean big customers, partners, and
competitors
● Big companies are continuing to reduce the number of
direct suppliers, and networking and network management are becoming very important
● Manufacturing in mass production will be moved close
to the customers and performed by the same global strategic partners in all locations
● Other products are either mass-customised or tailor-made and delivered with rapid turnaround and excellent delivery accuracy and quality
● System suppliers take responsibility for the whole product
– R&D
– Engineering
– International purchasing
– Manufacturing
– Life cycle management
●
●
●
●
●
Intelligent materials
RFID
MOEMS, flip-chip technology, bioelectronics, and
conductive plastics
Nanotech and biotechnologies
Life cycle management
Recycling
New, environmentally friendly soldering materials and
paints etc.
4.4.5 Challenges and Opportunities
Some of the main challenges and opportunities are listed in
Table 9.
A key difference can be seen between developing the manufacturing process itself and developing more intelligent
products, for which manufacturing needs new technologies
and competencies.
Another way of segmenting operations in the manufacturing industry is:
● In-house production
● System suppliers
● Subcontractors
Technology- and environment-driven trends are:
● Products and manufacturing that all utilise a combination of different technologies
● Plug and Play automation
– Robotics
– ERP
● The use of lasers (welding, cutting surface covering, etc.)
● Other new joint technologies (gluing etc.)
● Machine vision and digital X-ray technology
A third viewpoint is offered by the fact that provision of
products is being replaced by provision of services. The
subject of changing business models is discussed in more
detail in Chapter 5.
Table 9. Challenges and opportunities of manufacturing.
Challenges
• The number of layers and players in
•
•
•
•
•
•
manufacturing is increasing
Product and manufacturing competencies are
drifting apart while activities are carried out in
different companies and other organisations
Big companies promote strategic partnership,
but in practice price is the deciding factor
Standards and systems still are defined for legal
entities, not for the operational network (one
system supplier can have five different
CAD/CAM systems)
Management and development of the whole
end-to-end process is a focus
Constant structural change takes resources
away from development
The price- and cost-competitiveness of system
suppliers and subcontractors are getting worse
due to heavy investments in technologies and
competencies
Opportunities
• Networking and good network management
•
•
•
•
•
improve efficiency, flexibility, and response
time
Real utilisation and integration of ICT and
ERP systems provides a competitive edge
System suppliers have excellent potential to
make technology transfer and utilise best
practice when working with several
international customers
The level and flexibility of automation have
increased
Improved material flow control is enabled
through the use of, e.g., RFID tags
Subcontractors and spin-off companies can
innovate breakthrough technologies
37
4.4.6 Functionalities
The functionalities, their importance, and the timing for
this field as addressed here are based on the Web-based
survey’s results, presented in Figure 26 and Table 10.
Seamless access to the network and machine-to-machine
communication were seen as the most important functionalities. After these, several functionalities occupy
the same level of perceived importance. It is important to
notice that most of these ‘features’ are related more to
products than to their manufacture. The main idea must
be to utilise the future product features as much as possible in manufacturing control and development. One of
these opportunities is offered by RFID tags. If all main
parts, components, and modules have RFID tags, the
possibility is provided for real-time accurate material
flow control. The same tags would be used to create the
machine cards (as built) as in troubleshooting and life
cycle management.
Very important
Not important
Seamless access to networks
Context aware communication
Machine to Machine communication
Image recognition
Camera
Telecommunication capacity
Mobile terminals
Video telephony
Telepresence
Voice recognition/control
Voice telephony
Navigation
Digital identity and security
Micro Payment
Positioning
Tracking
Identification
Power supply
Mobile Payment
Figure 26. Which functionalities are important for the development of manufacturing?
Table 10. Timing of usage of certain key functionalities within manufacturing.
MANUFACTURING
Already
in use
By 2010
Identification and tracking of materials
based on RFID
****
******
Positioning based on digital maps and
satellite or mobile systems
**********
Biometrics used for human identification
**
******
Daily use of mobile e-mail by more than
30% of business users
****
******
Daily use of mobile Web browsing by more
than 30% of business users
38
********
By 2015
**
**
After 2015
Never
4.4.7 Technologies and Competencies
●
Technologies and competencies must be divided into two
categories. One is related to products and the other to the
manufacturing of the products. While the scope and variety
of the products are huge, the list below is based on the machine-building example.
●
Unmanned operations moving to ‘open area’ from
the current closed area
The technologies needed are:
RFID
● Sensors
● Sensor nets
● Communication band use (e.g., Controller Area
Network, CAN)
● Broadband
● Navigation/positioning (GPS)
● Ubiquitous technologies
Basic objectives for future machine design are:
● To develop machines and equipment that can autonomously, unmanned or partly unmanned operate in open
infrastructure and can communicate with other machines and humans
● To develop new performance-based business models
further
● To develop modern after-sales services and service business models: Service business is getting more important,
but for global companies it cannot be based on local
presence in all locations; thus, fleet management, troubleshooting, and to some extent problem-solving must
utilise automatic, mobile, and real-time monitoring,
analysis, and data transfer (also, in the future, machines
will be able to solve simple problems autonomously or
bypass the problem area)
Key drivers are:
The military industry
● The automotive industry
● The engineering industry (machine tools, earthmoving
machines, and other moving machines and equipment)
● Japan, Germany, and the US
●
Key obstacles are:
● Regulations
● Unmanned vehicles in open manufacturing area need for
excellent automation security and reliability
The main areas for development are:
● Data collection
● Diagnostics
● Data processing and analyses
● Man–machine communication
● Service instructions
● Virtual reality
Manufacturing technologies and competencies of the future can be described in a technology/competence pyramid
(Figure 27), which distinguishes among spearhead (international level), key (strong national level), and related
(needed but can involve partnership) technologies/competencies.
Spearheads
●
CRM
Global distribution
management
● Mass customization
●
●
●
System integration
Enterprise control
●
International
sourcing and
purchasing
●
Key technologies
and competencies
●
●
●
Production control
Integration of different
technologies
R&D
●
Modeling and
simulation
●
Product data
management (PDM)
Engineering
●
Network management
Manufacturing
technologies and automation
●
Material technology
●
Integrated systems
●
●
Assembly
Related technologies and
competencies
●
Financial systems
●
●
EDI and other digital
communication
Quality systems
●
●
Logistics
HR systems
Figure 27. Future manufacturing-related technologies and competencies.
39
4.4.8 Vision of the Future
4.4.9 Summary Roadmap for
Manufacturing
The vision for the future for Finnish manufacturing could
be the following:
Finland is one of the world’s leading manufacturers of
mass-customised low-volume products
The development of manufacturing is based on the identification of customers’ needs, an effective end-to-end manufacturing process, flexibility, management of the international strategic networks, a high competence level, and
cost-efficiency
A roadmap related to manufacturing for three different industries – machinery and engineering, wood products, and
electronics – is presented in Table 11.
A summary roadmap for manufacturing, based on inputs
and the analysis and conclusions in this report, is presented
in Table 12.
In all actions, one of the objectives is sustainable development and environment-friendliness
Table 11. Roadmap for developments related to manufacturing for three different industries –
machinery and engineering, wood products, and electronics.
Machinery and engineering
1980s
1990s
40
•
•
•
•
•
Modularity
Tailoring
Flexibility
Productivity
Subcontracting (the flexibility of
capacity)
Wood products
Engineering
• Big companies withdraw
• Investments in product
from the carpentry industry
• The level of processing
rises
• Support from other fields of
• Flexibility
• Improvement of capital
• Specialisation increases
• The level of automation in
employed
• Distribution of risk
• Outsourcing of production
caused by structural changes
• System suppliers
production increases
• Export increases
Tailoring
Speed
Flexibility
Productivity
Development of networks
Co-operation even of
competitors
• Customer-oriented
2000s
•
•
•
•
•
•
Mass tailoring
Speed
Specialisation
True networking
Internationalisation of
networks
• Companies specialise
2010 +
•
•
•
•
•
production is a focus
• Stocks are minimised
• Networking is key
strongly
• Networking increases
• Productivity grows
• The technology level
increases significantly
development
business
• Strong growth
• Focusing
• Development of products
and production mass
production
• Strong increase of
automation in production
• Growth
• Structural changes in
production (transfer of
production to countries with
low production costs)
• Stabilisation
• Structural changes
Table 12. Summary roadmap for manufacturing.
MANUFACTURING
Key trends
• The level of integration is increasing, more focus is put on end-to-end processes, and fully integrated ERP systems
enter use not only for individual companies but for the whole network
• In large-volume and mass production, the level of automation is increasing, making the selection of production
location more customer-driven than labour-cost-driven
• Online real-time follow-up and management of material flow are more and more important
• The intelligence of the end products produced and of the manufacturing machines and equipment is increasing
constantly (e.g., monitoring, diagnostics, and wireless M2M and M2P communication)
Situation in 2007
• Sophisticated and integrated ERP systems are in use, but these are missing the real-time monitoring and
feedback – changes still require manual decisions and actions
• Some kinds of identification and location tags are in pilot use (RFID)
• Automated manufacturing systems have high flexibility, and wireless M2M and M2P communication see
increasing use in real-time performance and condition monitoring
Situation in 2010
• Sophisticated and integrated ERP systems cover whole networks, providing for real-time monitoring and feedback;
some changes are made automatically and don’t need human decisions or actions
• Identification and location tags are widely used: RFID tags are left on the components, subassemblies, and complete
products, and these convey manufacturing, performance, condition, and even recycling information
• Automated manufacturing systems have limited capability of ‘self-adjustment’; there is great flexibility in volume,
product size, materials, etc.; and wireless M2M and M2P communication are commonly used in real-time
performance and condition monitoring
Situation in 2015
• Way of operation
– Wide use of virtual reality with the customer for simulation of mass-customised products
– Emulator that generates the customised product structure from built and tested modules in the piloting stage
– Part-automated generation of purchase orders (manufacturing, components, etc.)
– Fully integrated ERP systems (real-time information available to all stakeholders)
– Continuous performance and condition monitoring, troubleshooting, and some self-repair
• Manufacturing
– Machining
Automated, self-learning, and adjustable manufacturing systems (manufacturing is flexible in terms of
capacity, size of the products and components, etc.) are used; the system can solve some maintenance
problems automatically or bypass the problem area; the level of automation is so high that labour costs
are not the driving factor for the location; and full integrated with ERP and wireless M2M and M2P
communication is in place
– Assembly
Volume production has flexible adjustable automation directly connected to ERP (Plug and Play);
the system allows rapid ramp-up and yield
Small-volume products still are assembled mostly manually, but PDM information can be fed wirelessly
to all places and users
– Logistics and life cycle monitoring
RFID or similar tags are used for all parts and components
– Autonomic, ‘moving’ automation is in pilot use: Instead of transporting the parts and components to different
manufacturing cells, the robots move around to different locations, obtaining all product and manufacturing data
via wireless links
I
I
I
I
41
4.5 Business Services
●
●
4.5.1 Introduction
Figure 28, drawn from New Business Opportunities for
Finnish Real Estate and ICT Clusters (2005), presents under the title ‘Customer Business Services’ a number of support processes and services that a corporation needs to
have, and which very often are subcontracted to specialists
in each branch of industry. These services, which include
traditional legal, financial, real-estate, and HR services,
have been handled since long before any computers were
used in business. This group also includes ICT services.
Depending on the strategy and specialisation of each company, other non-core business processes may be
outsourced as well.
Outsourced Non-core Business Processes
Companies always have sought competitiveness and focus
by defining their core competencies and processes and by
subcontracting (outsourcing) non-core services to companies for whom these services are the core area of competence. The result is a network of specialised providers of
services. The main limiting factors in outsourcing and networking have been management and the related costs of
dealing with outside vendors as opposed to doing all necessary activities in-house. These management activities include:
● Finding service providers/customers
● Specifying service content and level
● Closing the contract
●
●
●
Addressing contract risk
Guaranteeing the speed and reliability of communication between provider and buyer
Addressing transportation costs
Taking care of delivery time requirements
Handling quality assurance
Development of markets and fast, reliable communication
between customers and service providers increases the feasibility of outsourcing. The possibility of linking external
resources to value chains has grown to global scale. Generally, at least bigger companies have learned outsourcing.
Outsourcing of processes to specialists need not always be
driven by direct cost; external service providers can bring
standardisation, better quality, and functionality that one’s
own resources do not allow.
We believe that outsourcing will continue in the coming
years and that its geographical scope will increase. Proper
understanding of how the parts of new value networks are
linked together is important and improving.
Human resource management, real-estate and location services, and ICT, where mobile value-added services will
have a significant impact, are discussed in further detail below.
Human Resource Management
Human resource services form the company’s link to the
personnel and more generally to those people who may
contribute to the work of the company. The main aspects of
Figure 28. The role of service providers integrated with the customer
business (from New Business Opportunities for Finnish Real Estate and
ICT Clusters, 2005).
42
the operations are recruitment, management of employment contracts and conditions, and development of the
skills and motivation of the personnel.
The use of ICT-enabled remote work has been increasing
slowly. Mobile technologies will not cause a revolution in
traditional job structures but will improve the efficiency
and flexibility of information-related work. The spectrum
of job types will broaden also: HR systems will support the
utilisation of creativity by enabling flexibility – with the
best resources for each job, and flexibility of working arrangements for those who appreciate it. This will create a
new increase in ‘untypical’ employment contracts. The
management of information security (IS) in a network of
different partnerships and different levels of association of
persons with companies will cause challenges for HR management, among these being how to keep safe track of access rights of temporary employees of a subcontractor’s
subcontractor. Technological solutions for identification
and authentication of persons are available, and, e.g., biometric identification methods are improving. Privacy protection laws will impose limits in many countries, affecting
fail-safe and effective information security systems.
Security issues related to HR are a challenging part of the
total problematic of privacy–security–trust related to new
service structures and networks. There are technological
concerns also. An essential enabler of business services is
the handling of digital identity and security throughout entire processes, covering fixed as well as mobile access to
the resources. Now providers of applications have to build
secure access and authentication/authorisation methods on
a case-by-case basis in many industries. It is likely that, by
2010 more service providers will be able to provide secure
access services for use as part of various industry vertical
solutions. This may include the technology only but also
could be enhanced to include trusted third-party services
for various transactions and relationships.
In the development of mobile business process applications, it is an advantage to be able to develop richer applications in the PC domain with the same application development tools as at mobile client level. The present strict division between the phone world and PC world probably will
disappear.
Collaboration tools enable better teamwork over distances.
Teleconferencing will be part of the standard PC environment by 2010 and finally become commonplace also in
smaller companies. Teleconferences will not replace personal presence but, rather, enable quicker and more focused meetings and support mobile work.
Real-estate and Location Services
Real-estate and location services provide the link of business processes to locations, buildings, and other man-built
physical infrastructure. Due to a standardised approach
originating from national surveying bodies, Geographic Information Systems (GIS) already are quite advanced, but
the data formats vary from country to country. The Infrastructure for Spatial Information in Europe (INSPIRE) proposal aims at an EU-wide standard for presentation of geographic data. Whereas geographic data (in the form of
maps) is quite well digitised, what describes buildings remains largely on paper alone. New buildings are designed
on the basis of digital data, but, since there is no standardisation between constructors, the integration of geographical data, building infrastructure data, and functional data
of building users will proceed very slowly.
Section 4.3 deals with construction and building maintenance issues in more detail.
ICT Services
ICT services provide a company with access to the rapidly
growing world of ICT infrastructure and applications. The
trend toward outsourcing in ICT will continue, and those
integrators able to take highest-level responsibility for all
systems and applications will have an increasingly large
role but also encounter fierce competition. Companies do
the outsourcing in a cost-conscious manner, but the main
driver will be the quality and reliability of service.
At the second level, providing services to system integrators, there is a large and growing ecosystem of specialised
vendors of applications, services, solutions, and equipment. Some confusion about the role of different service
providers in the field of information processing will continue: Telecommunication operators have tried to take on
more integrator-type ICT responsibilities, leveraging the
mobile applications, and, e.g., financial consultants may
enter fields related to information security. The trend will
be that, as conventional business applications, mobile applications, and communication infrastructure converge,
there will be need for overall integrators to provide maintenance for all company infrastructures.
4.5.2 Vertical Business Applications
Vertical business applications are electronic services that
are broadly used in a variety of industries. For example,
ERP and CRM systems are traditional business applications where mobility will bring new features. Personal information management (PIM) was not chosen as an area of
focus for this report.
43
Enterprise Resource Planning
Customer Relationship Management
An ERP system presents a digitised dynamic model of the
entire business process of the company concerned, including data on the actual physical flow of materials, planning
tools and plans for production, and detailed monetary values over the whole business process. It communicates outward to customers, banks, and suppliers in the form of orders, invoices, payments, etc. The model is used for documenting, monitoring, and predicting the business process.
The use of CRM systems links the business process to its
customers by modelling the customer base and providing
tools to provide customers with focused and tailored actions, such as marketing messages, product offers, or focused pricing. Mobile applications make the biggest impact in CRM through context-sensitive data processing.
Privacy protection probably is going to limit combining of
stored customer data with position information and active
addressing of mobile customers with place-dependent
messages, but user-initiated enquiries in, e.g., shopping
malls or on the roads will be possible in a few places by
2010 and commonplace by 2015.
There are two major aspects to the development and transformation of ERP systems – namely, increased networking with other members of company networks and improved synchronisation of the computer model with the
real world, where mobile and wireless technologies can
play a vital role.
When companies grow into networks of specialised providers of different services, the ERP of a company will
have to include models of the whole network in order to facilitate supply chain management (SCM). Visualisation,
forecasting, and optimisation tools for networks will see
increasing use.
Technological possibilities for mobile tracing, tracking,
and identification of items will improve the timelines and
accuracy of ERP models.
Not important
In the Web-based survey, the following results, illustrated
in Figure 29 and Table 13, were obtained. Digital identity
and security, seamless access to networks, identification,
and context-aware communications were seen as the most
important functionalities for the further development of
business services.
All of the functionalities considered were seen as being
widely adopted today or being in broad use in 2010, except
for mobile Web browsing and mobile e-mail, where some
further growth is expected in 2015 still.
Very important
Seamless access to networks
Identification
Digital identity and security
Mobile terminals
Context aware communication
Positioning
Navigation
Machine to Machine communication
Telepresence
Power supply
Tracking
Mobile Payment
Telecommunication capacity
Voice telephony
Micro Payment
Camera
Video telephony
Voice recognition/control
Image recognition
Figure 29. Which functionalities are important for the development of business services?
44
Table 13. Timing of usage of certain key functionalities within business services.Conclusions on the Sectors under Focus
Business services
Already
in use
By 2010
Identification and tracking of investment
goods based on RFID
******
**
Identification and tracking of consumer
goods based on RFID
***
****
Positioning/navigation based on digital
maps and satellite or mobile systems
********
*
Biometrics used for human identification
**
******
Daily use of mobile e-mail by more than
30% of business users
****
****
*
**
******
*
Daily use of mobile Web browsing by
more than 30% of business users
4.6 Conclusions on the Sectors
under Focus
A summary of the developments in the sectors of industry
considered in the report – i.e., traffic and logistics, construction, manufacturing, and business services – is presented in Figure 30, below.
By 2015
After 2015
Never
The overall development can be conceptualised through a
description of four layers:
● Models existing only in people’s minds
● Business and process models
● Digital content
● The physical world
The key is seamless communications across these layers’
boundaries.
Figure 30. Conceptualised development through a description of four layers.
45
The development stages and their expected timing are described in Table 14.
Table 14. Roadmap for development of the layered model.
Business and process
models
2007
2010
• Well defined within
46
Communications
between digital and
physical world
• Islands
• Sporadic
• Connection of islands in
• In certain areas
companies
• Well defined for whole
value networks
• Defined for dynamically
2015
Digitised content
changing value
networks
progress
• Visibility of a common
basic level
• Systematic and with
good transparency
5 Business Models, Functionality and Services,
and Content
5.1 Business Models
5.1.1 Introduction
Business models are changing continuously, but more radical change is occurring right now due to the stage of development of the Internet and mobility.
It is very difficult, even impossible, to pin down future
business models. What is more important is to determine
the enablers and various concepts for business models. At
the end of the day, each player must specify his own business models. Only the business model platforms and concepts may be defined in advance.
One of the keys for this development is the removal of barriers – technical, political, policy, standards, regulator-related, IPR-based, etc.
What is clear is that the traditional value chains are breaking down and new value nets including new players are
emerging. This is happening in relation to both industry
verticals and technologies along with technology platforms. In the next two sections of the report, these two dimensions are discussed, first the business models related to
industry verticals, then technologies.
Some of the underlying key changes are a more central role
for service business, development of digitalisation, and the
continued effects of Moore’s law.
The WWRF describes the overall future end-to-end model
by way of the so-called Reference Cake Model for
I-Centric Communications, presented in Figure 31. One of
the important aspects of this model is the ‘I-centric’ view,
in which the user – ‘I’ – is the starting point, as opposed to
that position being held by, e.g., technology or business.
Figure 31. Reference Cake Model for I-Centric Communications (Global Visions of a Wireless
World, 2006).
47
Overall there will be a rich multitude of suppliers and users, creating many business opportunities also for new
players.
Pricing models from the user perspective are crucial in
terms of usage penetration. If pricing is based on price per
bit, there are clear barriers. If flat-rate pricing models are
used, usage is encouraged and penetration rates grow.
5.1.2 Industry Vertical Dimension
One of the bottlenecks is pricing (for mobile roaming), and
the future will see the capacity of international connections
again become an important issue.
Business Model Changes
Media and entertainment are driving the overall development right now. The key developments are:
● Digital convergence
● Mobility
● A truly mobile Internet
What will be the business models and rules of the game in
the future in addition to the above media and entertainment’s roles as drivers? Will IT rules enter the mobility
space? Will mobility rules extend to the Internet or vice
versa? These questions are very important from a Finnish
industry point of view, where the particular cluster strength
has been in mobility.
The traditionally well-defined value chains will break
down, and new value nets will emerge, where the value is
redistributed and, while, the total value may not necessarily
increase, increased efficiency will be achieved. Value
chains will become more straightforward, and intermediate
steps will disappear due to digitalisation; for instance,
wholesale operations may disappear in certain sectors.
Sometimes also new value may be created, but this is not
always the case.
New players will come from outside the existing value
chain and change the rules of the game.
Apple’s iPod product concept is a concrete example of how
an existing value chain was broken down and a new, reshaped value net, with new players and roles, emerged. The
iPod product concept example is described in Figure 32,
below. Earlier, music aggregation and selection was done
onto CD, marketed in a traditional way, and distributed
mainly via stores or expensive mail-order operations. Now
consumers decide for themselves which music they want to
individually select, and marketing and distribution occur
over the Internet. The essence is that, through its iPod concept and iPod product itself, Apple changed the manner of
aggregation, marketing, distribution, and consumption of
music.
Even though the example relates to music, it is an excellent
example for illustrating the opportunity also in the sectors
focused upon in this report.
Many of the new business concepts and models have been
very hard or impossible to imagine in advance. One example is Habbo Hotel. Much has to do with knowledge (or
non-knowledge) of user behaviour.
Peer-to-peer traffic in, e.g., Tampere today represents
about 90% of the traffic in the networks, according to operator information. This has some important implications.
Figure 32. How the iPod concept and product changed music aggregation, marketing,
distribution, and consumption.
48
Firstly, peer-to-peer traffic has increased significantly; secondly, this is symmetric traffic, which is not supported well
by current network technologies such as ADSL (Asymmetric Digital Subscriber Line); and, thirdly, much of the content actually is produced by the consumers themselves.
There are examples from more traditional sectors such as
traffic or construction: The maps of the pipe network under
roads in Finland are being digitised, which can add completely new efficiency factors as well as new earning
logics. The forest industry and related logistics form a big
opportunity in the Nordic countries to provide cost-efficiency and added value. Also, health care and related digital information can be a remarkable opportunity for large
cost savings, as well as added value.
There are vast changes in progress in enterprises. Work expertise will be outsourced further not only to companies but
to individuals. A transition of applications to make use of
basic and embedded network functionalities is taking place
also.
Capabilities at different levels of CRM, such as information management, customer data, and data-mining, could
be embedded in the network in future.
The digital world can be embedded in the physical world in
various industries: The next step is RFID, from intelligent
transport to manufacturing and after-sales services. Tracing may be a privacy issue in the future. At the same time,
there will emerge new business models using ‘your data’ as
an example: A black box is embedded in your car and you
pay for insurance on the basis of usage. In addition, an opportunity will appear for new value-added services.
The development of business models is presented in Figure
33, below. The five business model categories presented in
the figure, for a certain resource, are investment-based,
time-based, usage-based, exchange-based, and free of
charge (which can be subsidised or co-operatively based).
Typical development involves movement from investment- to time-based and further on to usage-based. The resource exchange and free models are the most disruptive
ones. Also, often there are movements back from usage-based to time-based models. The picture does not indicate that the development goes from left to right but that the
multitude of alternatives is increasing and that certain cycles and patterns are common.
Another natural development is that functionalities that
used to be advanced start to become basic features and become free of charge or part of a basic package.
It is important to note also that sometimes a very successful service and business model is a bottleneck and may
prevent entry of the next wave of innovation. One oftcited example is the very wide use of text messages in Europe and that this may have been slowing down the development of some mobile Internet applications in Europe,
as compared to Japan.
Graphical
Presentation of
Model:
Name of Model:
Example:
Investment
-based
Time
-based
Usage
-based
Exchange of
resources
Free of
charge
No insurance:
invest in new
car if accident
Annual car
insurance fee
Car insurance
fee based on
kilometres driven
and places
Exchange of
usage rights
of Fon WLAN
access
Wikipedia
Figure 33. Development of business models.
49
Web 2.0
‘Web 2.0’, a phrase coined by O’Reilly Media in 2004, refers to a perceived or proposed second generation of
Internet-based services – such as social networking sites,
Wikis, communication tools, and folksonomies – that
emphasise online collaboration and sharing among users.
Since then, many technical and marketing communities
have adopted and loosely adapted the phrase.
In the new era of the Internet, there are clearly more opportunities also for smaller companies. However, the trend of
going for de facto standards is pushing somewhat in the opposite direction.
Another very interesting aspect of the landscape that will
change the possibilities to provide and distribute valueadded mobile solutions is the ‘long tail’ concept introduced
by Chris Anderson (in Wired, 2004), described in Figure 35.
Examples of some Web 2.0 players are presented in Figure
34.
Business has tried to focus on customers and market segments where sales volume per unit is high.
The community phenomenon includes content produced
by individuals as one of its key characteristics. Other
changes include giving software out and in exchange getting free access to users through the network.
In the Internet-powered era, and with mobility capabilities
added, it will be very interesting to address the ‘long tail’
from a business perspective also. The main growing opportunities now may be in the long tail phase, but – not only
that – it may mean also that the ‘body’ segment, with less
personalisation and customisation, may shrink.
Another example is Fon, which provides shared use of
WLAN connections. Though the company is viewed as a
Wi-Fi community and does subsidise the customised routers sold in its online store, it is a for-profit company. Fon
makes money by charging a usage fee to ‘Aliens’ for day
passes, which can be used to connect to the Internet via a
Fon access point.
Certainly, there will be many new players entering this
field, some of which may be very disruptive to existing
business models and some creating completely new business models.
In these examples, Digital Rights Management (DRM) is
not a problem, since the individuals do produce the content
themselves and want to share it.
The typical example again comes from the music world.
Record shops do not want to keep CDs that sell only a few
units. Today, with the possibility to download the music
over the Internet without high marketing and distribution
costs, suddenly the long tail becomes very attractive. The
cost per contact will go down, but the number of variants
increases. Where the end user can create the variation, as is
the case with music purchases over the Internet, this is not a
problem.
This business value chain certainly will have an impact at
least on certain business services but also potentially on logistics. Here there may exist very interesting new business
opportunities.
Figure 34. Examples of Web 2.0 players.
50
Figure 35. The long tail concept provides business opportunities for value-added
mobile solutions (‘The Long Tail’, Wired magazine, 2004).
This trend may also further strengthen models of discriminated pricing – i.e., the seller of a resource (product or service) may know so much about the purchaser that the seller
prices the resource on the basis of this knowledge.
Application of the long tail concept may change the dynamics also and provide new global opportunities for companies and countries that are geographically further from
large domestic markets.
Customer Needs and Aggregators/Integrators
No existing service provider (operator) will be able to provide all of the services required by customers and users.
This will create networking and new business models. Big
service providers will have to compete with people who
provide different and specialised services.
One of the key questions from the operator’s standpoint is
how to provide the bit pipe or to grab a position in the content model. On the other hand, it is a fact that the end users
do not want to deal with too many different suppliers –
there will be good opportunities for new middlemen between service providers and users.
For instance, Google is active in many areas related to
easy-to-use services that, though not necessarily technically challenging even with today’s technologies, may
have an immense impact on business models nonetheless.
It may well become feasible to provide free mobile services
in whole cities, or even nationwide, that are funded by advertisement.
Web search algorithms will be crucial. The number of information sources and the quantity of data are increasing
all the time. Obtaining relevant information easily is key.
Advanced information search technologies are vital. Relatively speaking, it is easier to develop business models and
apply software for searching than hardware and basic technologies. A good example is Google, which was very good
at adapting, with excellent timing, what was commercially
available.
The information available via advanced search engines
could be sorted on the basis of factors such as:
● Reliability
● User profile
● User motivation
● User location
Different levels of reliability of information may be an important differentiation factor in the future. This may lead to
new pricing schemes also.
From the user perspective, it would be important for the intelligent search engines to develop at least as rapidly, preferably more quickly, as the quantity of digitally available
and accessible data increases. This challenge and business
opportunity is presented in Figure 36, below.
51
Society and Regulators
Society’s role in the changes will be large. Not only the
strongly developing user communities but also the authorities and regulators will be important.
Regulation can be a bottleneck for development when the
playground is too regulated. On the other hand, due to the
number of unlicensed bands, there may emerge too many
networks and also greater concern over security.
A key trend is the drive for liberalisation of spectrum use,
where Ofcom, the UK regulator, remains quite visibly at
the forefront globally in terms of new business models and
enabling business use of new technologies. Some examples are trading, reselling, spot trading, and dynamic allocation of spectrum.
Figure 36. Search engine capability development
v. quantity of digital data available.
Many cities are planning to provide wireless access free of
charge in their area, as mentioned earlier. Free access,
funded by taxes, may become a prerequisite for attracting
businesses and a basic service, like streetlights. In the long
term, certain sensor networks may have the same role.
Traffic and Cost Developments
5.1.3 Technology Dimension
Usage of the Internet has grown very rapidly over the last
few years, driving the amount of traffic up, on average,
116% per year. At the same time, revenues for transporting
the traffic have risen by only 14%. Hence, revenue per bit
has declined by an average of 48% per year. This development is illustrated in Figure 37.
Business models are changing also in the technology dimension in the mobile and wireless arena. The technology
convergence drivers for new business opportunities are illustrated in Figure 38.
The number of standards and technologies has increased a
great deal since 2G. Many companies in the past were capable of addressing a sustainable part of the value chain by
themselves. The number of alternative and complementing
technologies is going to grow much larger, which has created different types of business models related to both
hardware and software.
Traffic: +116%
Revenue: +14%
Commercially available software base platforms have
emerged, such as Microsoft, Linux, and Symbian, as well
as platforms with additional functionalities, such as
Nokia’s S60.
Companies are focusing also on developing multi-input
multi-output (MIMO) platforms in radio technologies, related to hardware and software both, which then are used
by companies selling their own branded products.
Also, more and more functionalities are being integrated
into the same standard chips, which makes the individual
chips cheaper but at the same time increases the development cost constantly.
Revenue/bit: -48%
Figure 37. Annual Internet growth rates
(The Multi-Service Edge, 2005).
52
No-one, not even the largest companies, has the capability
and willingness to invest in all of the relevant technologies
and products related to them. This overall trend driving to a
5.2 User Behaviour
All three driving elements for a new service need to be in
place – user interest, business models, and technology, as
illustrated in Figure 40, below.
Technology and business models are enablers, while user
interest is the real driver and creator of business.
Investments in examination of user behaviour are increasing, but it is still difficult to predict how users actually are
going to behave. As an example, the community-type communications that have emerged in the last few years are
something that was difficult to predict.
Many of the new services introduced have not succeeded,
but some have.
Figure 38. The business opportunities of
convergence in technologies.
The mobile TV trial was successful as a pilot. Youth are eager to try new things, and hence the threshold for trying
new services and applications of technology is much
lower.
layered and networked approach becomes more dominant,
an approach that shares risks and opportunities.
An example of the layered approach with modularity and
open interfaces in a mobile device is presented in Figure
39, below.
High level concept: Example
Physical level architecture
Figure 39. High-level concept of modular design with open interfaces
(Multiradio – Architectural Challenges of Mobile Devices, 8.11.2005).
53
Machine-to-Machine Communications
Figure 41 describes the impact of different technologies on
the functionality of machine-to-machine communications,
according to the Web-based survey. Evaluated as having
the strongest impact are All-IP and RFID.
Context-Aware Communications
Figure 42, below, illustrates the impact of different technologies on the development of context-aware communications, according to the Web-based survey. Personal Area
Network (PAN), Post-IP, and sensor networks are seen as
the most important technological drivers.
Figure 40. All Three elements need to be in place
to develop new business: 1) user interest,
2) business models, and 3) technology.
Earlier estimates concerning the emergence of context-aware solutions were much too optimistic. There may
be mission-critical applications related to location and positioning – and here the real penetration will take much longer than that of less critical applications.
5.3 Functionality and Technologies
In Japan, location- and position-based services are common already, and they are not always regarded as context-aware services at all – somehow proof of how much
they have entered everyday use.
A certain technology typically does enable the implementation of a new functionality or, alternatively, enhanced implementation of an existing functionality.
The collection of information can happen through sensors,
actively sending the information, or, alternatively, through
a mobile phone or other such device. Sensors probably are
MA
4
W G
IM
AX
GP
RS
ED
GE
IPv
6
Sm SDR
ar
Ac
td
ce
us
ler
t
at
L
ion inu
x
Se
nc
or
s
PA
N
H
Fu SPA
el
Ce
lls
Po
st
IP
ME
MS
MI
MO
LT
E
W
CD
C
ks
or
tw
ne
3G
NF
or
ns
Se
Se
SIP
m RF
an ID
tic
We
Un
ive
W b
i
rsa
br
ee
lv
eh
icl
X
D
ec
Bl SL
om
ue
too
m
un
th
ica
tio UW
np B
lat
for
m
P
P2
AII
-IP
0
Figure 41. Impact of technologies on the development of machine-to-machine communications.
54
LT
E
DR
M
4G
DV
BH
GP
RS
W
ibr
ee
UW
W B
CD
MA
SD
R
Lin
ux
ED
Fu GE
el
Ce
lls
Se
ns Po
or st
ne IP
tw
or
ks
P
Sm AN
Se art
m du
an st
tic
We
b
RF
ID
Ac
IPv
ce
6
ler
at
ion P2
Se P
nc
or
s
W
I
MA
Un
X
ive
rsa
XD
lv
S
L
eh
icl
ec
SIP
om
m
un
3G
ica
tio
n p NFC
lat
for
m
HS
PA
AII
Bl IP
ue
too
th
0
Figure 42. Impact of technologies on the development of context-aware communications.
By 2010, there will be an increased number of new
easy-to-use context-aware services, and the number will be
increased further by 2015.
required before further context-based services can be implemented on a large scale.
Privacy is one of the key bottlenecks. One way of removing
this barrier is to have a special button to push, by which you
allow information about yourself to be used. One example
in Japan is a service that is very popular and has been in use
for three years: The best train connection is sought for you
on the basis of your location and where you want to go. It
seeks the alternatives and suggests the optimal one, with,
e.g., the closest train station and information on where you
need to change trains.
Table 15 describes the anticipated usage take-up of a selection of some key functionalities, based on the Web-based
survey responses of all respondents. Identification and
tracking of investment goods will be very common by
2010, while this will be reality for consumer goods by
2015.
Table 15. Anticipated usage take-up of some key functionalities.
ALL
Already
in use
By 2010
Identification and tracking of investment
goods based on RFID
***
*****
Identification and tracking of consumer
goods based on RFID
**
****
Positioning/navigation based on digital
maps and satellite or mobile systems
*******
**
Biometrics used for human identification
**
****
**
Daily use of mobile e-mail by more than
30% of business users
***
*****
*
*
******
*
Daily use of mobile Web browsing by
more than 30% of business users
By 2015
After 2015
Never
**
55
5.4 Content
Media and entertainment are driving much of the development right now.
Today Finland is behind the leading markets related to mobile media, which clearly are Japan and Korea. This is the
case despite the fact that Finland was behind only Italy in
EU countries to begin commercial mobile TV services on
the basis of the DVB-H (Digital Video Broadcasting –
Handheld) standard, by the end of 2006.
The re-forming of entire value chains and value nets is progressing. Experience is that too early trials fail. The key
criteria are how and when to enter. It is important to follow
developments closely and have good readiness and capabilities to act rapidly when the timing is right.
Today’s media use many parallel distribution channels,
such as television, the Web, and mobile services. Content
providers and pipe providers operate in a net of interdependency. For fast growth, it is important for none of the players in the net to be too greedy. Also, the models with separate pipe providers, such as in digital TV, have problems of
competitiveness: What is a decent profit for a network provider? What drives efficiency? In relation to mobile TV, it
may well be that an external aggregator is necessary to finally make business happen.
There will be much more content that is matched to the end
user. At the same time, production techniques that provide
scaling benefits for strongly customised programmes are
being developed.
Some drivers for the digital home are:
Surveillance and security
● Digital cameras – still and video
● Media PCs
● Children and robots
● Ease of use
● Energy savings
● What the neighbours have
●
A concept of globalisation and aggregation will emerge:
‘Google TV’ will arrive, with 90% being the same global
content and 10% localised by country.
Due to the increased capacities that digitalisation provides
in distribution, there is not going to be a need for licences
for TV in the future. Aggregators who work under a licence
may be in a very difficult position.
From the media perspective, the key questions are who has
the ‘ownership’ of the customer in the future and which
role is selected, among pipe provider, simply providing the
connections; content provider, producing real content; or
aggregator, combining content addressed to different
groups of end users. The expression ‘ownership’ in this
context refers to the position of the player with the greatest
impact on the customer and the decisions that the customer
makes. This is illustrated in Figure 43, below. The content
providers are likely to have a very strong role. Also advertisers will have a very strong role, especially when they
start to know more and more about the individual consumer
and the ads actually include a great deal of useful information.
Competition for the consumers’ limited resources (money,
time, and interest) is increasing (e.g., the hit product in
2006/2007 was the navigator). The future is very difficult
to predict – the Internet was not mentioned in the information society programme from the early ’90s. It is, however,
worthwhile to follow the user behaviour of the youth as
trend-setters.
Google has had a big impact on classified ads. The future
will see interactive advertising. An overriding question is
how the overall ad market is developing and how it is
shared among the various media. The overall ad market in
the television realm has been growing in the US but actually shrank recently in the UK. The business models are
changing: Google’s sales in the UK exceeded the sales of
Channel 4, where Google grabbed all of the growth.
The digital home, which may have an immense impact,
starts with different user groups and places. The ‘play corner’ and workplace are connected to the Net already, and
the sofa soon will be. The impact of change has only begun.
56
Figure 43. The roles and customer ownership
in the media business.
5.5 Roadmaps
An overall summary roadmap based on all inputs and analysis within this roadmap update project has been developed
and summarised in Table 16 in relation to business models.
Table 16. Roadmap for business models
BUSINESS MODELS
Key trends
•
•
•
•
•
•
•
•
•
•
Current value chains are falling apart, and value nets are being formed with the value capturing redistributed
Intermediate players may lose their role if sustainable value is not created or alternative approaches introduced
Consumers and media are driving many changes, with, e.g., content creation
The number of services that are perceived as free of charge is increasing
The number of distinct technologies existing and emerging is increasing
– Not even the largest companies have sufficient resources or willingness to invest in all technologies:
Horizontalisation of technologies will occur, with different commercial technology platforms and
platform layers emerging
People will continue to want to communicate
Moore’s law will continue to apply
The technological possibilities are greater than the capabilities for business use – strong technology push
The users are even slower to adapt technology
This gap is increasing all the time
Situation in 2007
• Existing value chains are breaking down, and intermediate players are losing their position
– Examples are travel agencies and music and film retailers
• New players have emerged to capture value in the value net (e.g., Yahoo and Google)
Situation in 2010
• Many of the existing value chains have broken down
• Much of the new value is created by consumers or user communities themselves, and some of the value has been
adapted and utilised by businesses
• New strong players have emerged, really able to provide value to businesses and end users
Situation in 2015
• Transition from ‘old-fashioned’ value chains to true value nets has taken place in most areas
• Platform economics have emerged – multidimensional platforms that serve many purposes and
are being funded from several directions
• Much new business is based on originally consumer-developed value
• Digital Rights Management issues have been solved, through either a standard or a de facto model of operation,
and there may well be two groups, those who pay for the service and get some extra benefits and
those who are satisfied with a basic offering that is free of charge
57
6 GIGA
6.1 Introduction
The areas of focus of the GIGA programme are wireless access, seamless networking, network support, and telecommunications business, especially new business models and
value chain evolution.
In moving further on to the future, it hence has become important to define the terminology after 3G. The WWRF
speaks of ‘Beyond 3G’, abbreviated ‘B3G’, or even more
about a Future Wireless World, describing the fact that
there will coexist many different standards and technologies. This evolution is illustrated in Figure 44.
In order to serve these focus areas and to be able to identify
key differences from the previous roadmap, this chapter
has been structured to address, by section, radio access,
networks, devices (previously called terminals), and security (the latter being given separate consideration on account of its increasing importance).
Each section concludes with a roadmap, which is structured in the same way as in the VAMOS section of the report – i.e., into the following four parts:
● Key trends
● Current situation (2007)
● Forecast for 2010
● Forecast for 2015
The chapter is rounded out with a summary of ‘hype
curves’, for each of the years 2007, 2010, and 2015, respectively.
The timescales forecast do depend on technological developments but very much also on legislative, IPR, and business model issues.
The subjects of business model and value chain evolution
have been presented in Chapter 4 because of the great many
intersections with the VAMOS programme.
6.2 Radio Access
6.2.1 Definition of Terms
The number of radio technologies and standards used is
constantly on the increase, and at the same time the terminology is not unified.
The 2G GSM standard was defined very well, and there
was a quite common view, especially in Europe, that the
evolution would simply be to 3G and then 4G. The reality
after 2G has been much more fragmented, and 3G and
WCDMA – one of the 3G standards – is only one of the radio access technologies being used.
Figure 44. Evolution of radio technology definitions.
It is important also to recognise that there are some geographical differences in the vocabulary used. In Japan and
especially Korea, it is common to speak about 4G in reference to all future technologies, including, for instance, the
WiMAX (Worldwide Interoperability for Microwave Access) standards.
In North America, the vocabulary used for the subject is
even less clearly defined, and by ‘4G’ or even ‘5G’ companies might, from a marketing perspective, be referring to,
for instance, WiMAX.
International Mobile Telecommunications – Advanced
(IMT-Advanced) is a concept used by the International
Telecommunication Union) (ITU) for mobile communication systems with capabilities that go further than those of
IMT-2000. IMT-Advanced previously was known as ‘systems beyond IMT-2000’.
In this report, the WWRF definition is the main one that is
used.
59
6.2.2 General
Some general assumptions applied are that:
● Moore’s law will continue to hold for the foreseeable future, with performance doubling every 18 months and
packing density continuing to increase, but ever greater
R&D spending will be needed, giving chip manufacturers a larger piece of the pie
● Everything that can be digitalised will be
● Everything that can be wireless will be done wirelessly
● Fixed lines always will be faster than mobile, but speed
of radio access will not necessarily be a showstopper for
most applications
● Cell size will decrease continuously, bringing new opportunities all the time
● Many interesting mobile applications are very close to
being able to attract users; the response speeds have become sufficient, the user interfaces have become better,
and functioning business models have emerged – one
example is services based on local digital maps
There are more free frequencies at higher rates, which
mean in practice that repeater stations will become more
common.
Digitalisation of homes will be a major change. Homes will
be connected to networks, and in the homes there will be
networks. One of the key questions is related to the business models and what the operators’ business will be.
Concepts of integrated ‘home base stations’ probably will
emerge, with a multitude of radio technologies integrated.
The transport to the home employs, e.g., ADSL, and in the
homes the concept provides Internet connections, digital
TV, etc. If the service is priced on a fixed-fee basis, there
can be strong growth of usage and new services. Example
application might be photos that can be transferred automatically from the camera device to the storage and viewing devices. These applications may open up many opportunities for SMEs to develop new business.
6.2.6 New Radio Concepts
6.2.3 Regulation
Today, frequency bands are divided into fixed segments allocated for different usage. However, the frequencies could
be dynamically allocated, with only a rough regulation
framework. New technologies support this approach. This
concept could become reality in the timeframe of 2010–
2020.
The importance of ‘cognitive radios’ will increase. The terminal or base station searches for the most suitable available radio bandwidth and communications protocol, after
which the use of the communications path starts. This will
happen first in the ‘infra’ part of radio networks, because of
size, power consumption, and price drivers. Cognitive radios will coexist with the current radio environment. The
first cognitive radios applied in real networks may become
reality after 2015.
6.2.4 Geographical Differences
Japan and the EU are rather close in terms of standardisation related to radio access technologies. One of the biggest
differences is that the EU puts much more focus on roaming functionalities, due to the region’s geography consisting of many, rather small countries.
Because it is a small and densely populated area, Japan is
eager to deploy 4G, while the EU wants to reap returns
from the 3G investments first.
The Asian and European roadmaps and standardisation efforts are well synchronised in terms of the most important
questions, while North America has a different tradition
and does not recognise as strongly the need for standards
and harmonisation.
6.2.5 Bit Rates, Mobility, and Network
Structures
In B3G and by 2017 in the Future Wireless World, as stated
by the WWRF, the target for stationary bit rates is 1 Gbps
and for full-mobility wide area network applications is 100
Mbps. It will be difficult to get significantly beyond these
rates at reasonable cost.
60
Software-defined radio (SDR) or multiradio refers to radio
communication systems using software for the modulation
and demodulation of radio signals. It does bring important
additional advantage despite the fact that radio frequency
elements already are integrated on silicon. The radio access
method is changed simply via software. With the same
hardware, different radio solutions can be implemented.
This approach comes from the applications direction. The
trend started from the infra side; e.g., High Speed Packet
Access (HSPA) upgrades in the infrastructure typically
were pure software upgrades. The infra area is physically
larger as well as more expensive, which has been the key
driver for use of this approach there first. Other views have
been presented, which claim that SDR never will become
very important.
In the wireless communication systems context, MIMO refers to the use of an array of antennas (i.e., multiple antennas) at both the transmitter and receiver. For the last decade, MIMO has been of increasing interest in research,
and it will become even more important on account of the
many different radio access technologies that will be used
in mobile devices.
Also, semantic technologies are going to emerge over the
next five to 10 years.
6.2.7 Key Radio Technologies
ing (DMB). Finland and many other European countries
have adopted DVB-H.
Wide Area Technologies
The deployment of WLANs will continue, and there will
be WLANs in all hot spots. The WLAN standard is living
and evolving. No major changes to the current approach
before 2010 are expected. Operators will not disappear, despite WLANs becoming more common, since somebody
needs to take care of and run the networks. There will
emerge new operators, since WLANs are not of prime interest to incumbent operators. Here WLANs are positioned
to be part of wide area networks but naturally also have a
role in short-range communications.
The direct derivatives of 3G are HSPA and Long-Term
Evolution (LTE). Often, HSPA is divided further, for separate consideration of downlink and uplink, into HSDPA
and HSUPA, respectively. For downlink, HSPA reaches
14 Mbps, and 1.5 Mbps for uplink, while LTE will go up to
100 Mbps. Even if not yet widespread, HSPA access is deployed already. The first LTE systems will be on the market in about 2012 and in extensive use by 2017.
The WiMAX technology is increasing in importance. One
of the WiMAX drivers is that operators are not necessarily
going to get the required 3G licences. The use of WiMAX
will complement 3G and its derivatives.
It is claimed that WiMAX is cheaper than HSPA and LTE,
because the original design criteria and selected components make it so. Some have expressed the view that building WiMAX infrastructure will not necessarily be cheaper
than 3G, HSPA, and LTE at all, when the whole network is
considered and the economies of scale of 3G, HSPA, and
LTE are taken into account. Fixed WiMAX is already
specified and available on the market, and WiMAX with
mobility soon will be introduced to the market.
Short-range Radio Technologies
Bluetooth has a very strong position in near field communication, with over one billion devices using it today.
Bluetooth is a radio standard and communications protocol
primarily designed for low power consumption, with a
short range (power-class-dependent: one, 10, or 100
metres), based on the use of low-cost transceiver microchips in each device.
However, Bluetooth will recede as Wibree replaces it in
many applications. Wibree is easier to use, employs simpler authentication, and offers significantly lower power
consumption. The range is about 10 metres.
Currently, NFC technology is targeted mainly for use with
mobile phones. The working distance is 0–20 centimetres.
NFC could enable many new applications and uses of mobile phones, such as:
● Car keys, house/office keys, hotel room keys, etc.
● Money
● Tickets – flight tickets, concert/event tickets, etc.
● Travel cards
● ID
● Electronic wallet / smart wallet
The relative positioning in relation to working distance and
bandwidth of Bluetooth, Wibree, and NFC is presented in
Figure 45.
Bandwidth
The key differences from WLAN are better mobility and
security; WiMAX could become the Internet access
method for more rural areas as well.
Bluetooth
Wibree
Code Division Multiple Access (CDMA) technologies
seem to be slowly disappearing.
Flash-OFDM-based solutions operating at 450 MHz have
been introduced, but they probably will be rather expensive, particularly because of not achieving economies of
scale. These technologies have their strongest support in
the US. Some Flash-OFDM networks have been deployed
in Europe, one of them in Finland.
DVB-H is a technical specification for bringing broadcast
services to handheld receivers. It was formally adopted as
European Telecommunications Standards Institute (ETSI)
standard EN 302 304 in November 2004. The major competitor of this technology is Digital Multimedia Broadcast-
Near Field
Communications
(NFC)
Working
distance
0.2 m
100 m
Figure 45. Positioning of short-range communication wireless technologies.
Ultra-Wideband (UWB) is a technology for transmitting
information spread over a large bandwidth (>500 MHz)
that should, in theory and under the right circumstances, be
61
able to share spectrum with other users. The future of UWB
is still somewhat unclear, but the technology is intended to
provide efficient use of scarce radio bandwidth while enabling both high-data-rate Personal Area Network wireless
connectivity and longer-range, low-data-rate applications,
as well as radar and imaging systems. Licensing issues for
UWB have been open. The technology will gain ground in
short-distance communication. In 2010, half of new
laptops will have UWB, and in 2015 it will be in very broad
use.
Ultra-Wideband is a good enabler for accurate positioning,
with centimetre-scale accuracy without use of satellites.
Wireless USB is based on the WiMedia Alliance’s UWB
common radio platform, and it will be positioned very
close to Wibree and Bluetooth.
As RFID technology matures, the price development will
determine the speed of implementation. The bottlenecks lie
in commercialisation, materials, and production. In 2010,
RFID will be in wide use, and in 2015 it will bring new applications – partly intelligent environments with integrated
sensor networks.
Millimetre radio technologies, which today are used in, for
instance, parking sensors of cars, are developing also, and
these may become interesting low-cost elements for indoor
sensor applications. The latest development related to
millimetre radio technologies, however, is the new
WirelessHD (for ‘Wireless High-Definition’) group, established in November 2006. Six large Japanese and Korean
consumer electronics companies formed this group, which
aims to use 60-GHz radios that could carry uncompressed
high-definition video across the living room at 5 Gbps. The
cost of the technology, the maximum range of about 10
metres, and the lack of penetration through walls are the
key challenges with this technology.
6.2.8 Summary and Roadmap
A summary of the take-up of different radio technologies is
presented in Figure 46, below.
Figure 47, below, describes the 3GSM (2G, 3G, and LTE)
evolution path in terms of availability of technology and
typical end user bit rates. The term ‘3GSM’ is widely used
to describe the evolution from 2G to 3G and beyond.
Table 17 provides a comparison of some different technology alternatives.
It has become very clear that the path of the future is not a
matter of which one technology or standard will be used for
radio access but, rather, one of the coexistence of many
complementary technologies and standards. Interoperability
will become even more important and crucial than today.
The positioning and coexistence of the short-range communications technologies were presented above in Figure 45.
Figures 48 and 49, below, present in summary form the positioning of the most important long-distance communications technologies – WLAN, WiMAX, and HSPA/LTE –
in relation to bandwidth, price, and mobility.
Figure 46. Estimated take-up of different technologies by 2009 (3G Evolution – the
Trusted Road Ahead, 2005).
62
Figure 47. 3GSM evolution path (3G Evolution – the Trusted Road Ahead, 2005).
Table 17. Comparison of different technology alternatives (3G Evolution – the Trusted Road
Ahead, 2005).
Typical coverage
deployment
3G WCDMA and HSPA Wide area coverage in
urban, suburban, key
roads
Indoor coverage in
most locations
Global 2G/3G
roaming; automatic
handovers with
GSM/EDGE
Voice
Mobile data
Broadband access
typical speed range
Full mobility and
handover support
Circuit switched and
VoIP
Mobile use-case
Practical 0.6–2 Mbps
optimised applications
& terminals
Interoperability
Internet applications
Other Broadband
Wireless technologies
Metropolitan area
Partial mobility and
coverage in urban and handover support
key suburban areas
VoIP
Indoor coverage
typically with external
antennas or dedicated
deployment
Internet applications
Practical 0.2–2 Mbps
WLAN
Offices, homes,
specific public
premises and
hot-zones
50…100 nodes per
typical office/hotel
Internet applications
Practical 1–10 Mbps
Limited mobility and
handover support
VoIP
63
Price
Bandwidth
HSPA/LTE
WLAN
WiMAX
WiMAX
WLAN
HSPA/LTE
Stationary
Walking
Vehicle
Stationary
Mobility
Vehicle
Walking
Mobility
Figure 48. Positioning of key wireless technologies
– bandwidth/mobility.
Figure 49. Positioning of key wireless technologies
– price/mobility.
The timing of the commercial availability and usage of different key radio technologies were evaluated in the
Web-based survey, and these survey results are presented
in Table 18.
The penetration of the Internet protocol, IPv6 and All-IP as
well as WCDMA and B3G/4G were regarded as the most
influential technologies.
Also, the relative impact of different technologies for
seamless access to networks was evaluated via the
Web-based survey, as presented in Figure 50.
An overall summary roadmap based on all inputs and analysis involved in this roadmap update project that are related
to radio technologies has been prepared and is summarised
in Table 19.
Table 18. Commercial availability and usage of key radio access technologies.
TECHNOLOGIES RELATED TO
RADIO ACCESS
Already
in use
By 2010
RFID
******
**
MIMO
**
*****
**
***
****
SDR
WCDMA
********
NFC
Wibree
64
*
****
UWB
**
By 2015
***
******
******
*
After 2015
*
Never
NF
C
Po
st
Un
I
P
ive
rsa
XD
lv
SL
eh
icl
LT
ec
E
om
UW
m
un
B
ica
tio DR
np M
lat
for
m
GP
R
B
S
Se luet
m o
Se an oth
ns tic
or W
ne eb
tw
or
ks
W
ibr
ee
DV
BH
Lin
Fu ux
el
C
Sm ells
ar
td
us
t
P2
P
SIP
PA
N
3G
SD
R
ED
GE
RF
ID
MI
MO
W
4G
CD
MA
W
IM
AX
PA
IPv
6
HS
AII
-
IP
0
Figure 50. Relative impact of technologies for development of seamless access to networks.
Table 19. Roadmap summary for radio access.
RADIO ACCESS
Key trends
•
•
•
•
The number of radio access technologies is still increasing
Many of them will coexist, each with a specific purpose
Bandwidth is increasing so that many more functionalities can be used with ease
Everything that can be done wirelessly will be
Situation in 2007
•
•
•
•
More than a billion devices use Bluetooth
WLANs are common
3G is widely deployed, but usage is still low
HSPA is being introduced
Situation in 2010
•
•
•
•
•
•
Wibree complements Bluetooth
RFID has achieved strong commercial penetration
WLANs continue to have strong position
WiMAX and HSPA are in broad commercial use
The first LTE networks are deployed
Home access networks start to play a crucial role
Situation in 2015
Relay networks between terminal devices have become more common
Radio frequencies start to become dynamically allocated (not only by fixed segment)
There is some kind of wireless connection everywhere with reasonable price and performance
Cognitive radios are in use
Stationary bandwidths (peak rates per user) start to be around 1 Gbps in hot spots and
100 Mbps in high-speed applications
• WLANs and WiMAX are in broad commercial use
• LTE is in commercial use with reasonable penetration rates
•
•
•
•
•
65
6.3 Networks
6.3.3 Network Concepts
6.3.1 General
In future, the most descriptive terminology will involve
speaking not about individual networks only but about networks of networks. Below, some examples are described in
more detail.
The GSM standard and its derivatives form a very robust
base, but the number of new and complementary technologies that are in use and are yet to come is immense, and this
will create further complexity – not just at the access level
but also on the network level. Fixed and mobile operators
are converging, and so are the networks as they switch over
to packet-based operation standardised on Internet Protocol Version 4 (IPv4) and Internet Protocol Version 6
(IPv6).
One challenge facing future developments is that the new
standards and technologies need to fit the existing environment.
6.3.2 Standards
In terms of standards, Europe and Asia seem to be more
enthusiastic, while the US typically drives for de facto
standards. There is ‘no time’ to develop standards, people
want to go to market sooner, and thus de facto standards
become the rule. Standards as such probably are good for
smaller players, lacking the muscle to develop or enforce
de facto standards. For end users, standards are typically
beneficial, since then the user is not tied to one technology
supplier.
The ‘MultiSphere Level’ concept introduced by the
WWRF is a different and very useful concept, one that proceeds from a user-centric perspective also when it comes to
networks. Everything starts with the Personal Area Network; continues to the immediate environment, instant
partners, radio access, and interconnectivity; and finally
proceeds to the ‘CyberWorld’, as outlined in Figure 51, below. The user can have several parallel profiles, such as
business or private user. The concept can be expanded to a
similar path with devices in the centre instead of a person.
One of the key elements of the model is that usage needs to
be easy; i.e., the complexity is masked as in the ‘calm computing’ concept introduced by Xerox years ago.
The Personal Network (PN) is again a network that follows
along. It uses the devices securely, follows the user all the
time, and gets connected to other personal networks. The
Federated Networks (FN) approach involves the connection of several parallel personal networks, where resources
are shared, trusted profiles are used, etc. Authorities may
have the right to forcefully take into use FN infrastructure
in emergency or crisis situations.
Figure 51. The MultiSphere Level Concept (The Wireless World Research Forum
–Global Visions of a Wireless World, 2006).
66
The difference between PANs and PNs is that PANs focus
primarily on the radio access only; PAN development will
be restricted somewhat by the multitude of competing candidate technologies and standards for wireless short-range
communication.
How will the networks be composed? It is not clear what an
element is. Is a terminal a terminal, or is it actually at the
same time a repeater station – i.e., a network element? Is a
railway car a network?
The digital home concept is on its way; one example of a
new application is secure storage for photos. The digital
home involves not just a radio access question but a very
important networking change as well. Home networks will
be an important change driver, and the related changes
have only started. The key drivers for these future investments will be both cost and value, not to forget security and
ease of use. Internet Protocol Television (IPTV) probably
will be one key application even in the near future. There
are strong reasons to believe that IPTV could be the main
driver for the digital home also in China. It should be simple enough to adapt to (also for older people), and it offers a
large screen and comfortable environment.
There soon will be – perhaps even via government regulations – a fibre link to almost every home in developed
countries.
There were great expectations for machine-to-machine
(M2M) interaction in the mid-’90s, but then telecoms technology developed much more rapidly than automation did.
In 2010 to 2015, telecommunications and automation
probably are going to be convergent again. Figure 52 describes the image for future utilisation of ubiquitous network technology (see Development of Broadband Technologies and Business, 2006).
Smart dust – i.e., self-co-ordinating flocks of miniature or
nano-scale robots performing tasks as a team – is an interesting futuristic idea, but it remains to be seen whether it
ever will be real. Some applications may exist in 2015; the
main problems, however, are related to networking, power
supply, and eventually biodegradability.
6.3.4 Hand-over, Interoperability, and
Quality of Service
The vision for the future involves networks of networks,
where vertical hand-over operations (between networks)
occur invisibly to the user. The quality-of-service (QoS)
angle is very important here. The future will see a multitude of networks, due to different optimisation priorities,
such as coverage, data rates, propagation, and mobility.
Any network needs to be able to connect to any other.
There will be a need for a lot of fast cross-layer communication, and the protocols of the layers being different in-
Figure 52. The image of future utilisation of ubiquitous network technology (Development of
Broadband Technologies and Business, 2006).
67
creases complexity. For instance, the necessary security
checks must not delay the service. Issues related to both
protocols and business models need resolution.
The end-to-end connection must be reliable, so the QoS
and performance requirements have growing importance,
from a network as well as application point of view.
6.3.5 Capacity
Bandwidth between the access network and the core network is likely to become the next real bottleneck, due to
significant bandwidth increases in the access network. As
richer content becomes more common and usage grows,
the availability of bandwidth will become a problem. This
eventually will lead to bottlenecks in the core network
again. A simple rule applies: All available bandwidth will
be used in the long term.
Figure 53 shows the typical data rates needed for some
common applications, as well as the rates provided by
some cellular technologies.
6.3.6 IP Versions and Next Generations
Deployment of IPv6 technology, which exists today, will be
dependent on the changeover costs. Some of the key features
of IPv6 are that the address space increases significantly, the
‘options field’ is much broader, and some features support
mobile applications better. ‘Light’ versions of IPv6 are being developed for sensor network applications.
The current IP versions have severe limitations, however.
The fundaments of IP were designed some 30 years ago.
Now there are significant new needs, such as:
● Mobility
● Sensor network connections
● Different types of networks
● Different types of nodes – not only computers but, e.g.,
mobile phones and Personal Digital Assistants (PDAs)
● Greater security
Today’s IP implementation is, in addition, not necessarily
cost-effective; overheads are very high; multimedia applications consume excessive bandwidth; and IP service has
delays.
Figure 53. Application data rates required and delivered by cellular technologies (The MultiService Edge, 2005).
68
Currently discussions are under way in relation to Post-IP
network and Next Generation Network (NGN) development, which is being standardised at ITU level. It is
claimed that the NGN, in essence, just replaces the current
network with IP – serving as an extension of the telecoms
network.
ity and multiplicity of solutions increases. There also is an
increasing need to remain up to date, with an ever-increasing pace. Thus, networking of people – even through communities, as described in earlier sections – becomes more
essential and is the recipe for facing the above challenges.
Europe and Japan are collaborating well on the Post-IP
front, while the US seems to have somewhat different
views. The current estimates are that the first Post-IP networks could be operational in 2015–2020.
6.3.8 Summary and Roadmap
The network is, however, changing only gradually. The
Post-IP world is most likely to include sensors and cognitive and context functionalities. The networking is automatic and robust, and the best/easiest method of access is
used. Communications in general are based on what the
needs are.
All in all, the changes in networks cannot be radical, due to
the huge existing infrastructure. Rather, the question is going to be more of evolutionary networks. Obviously, also
the software content of the networks themselves is going to
continue increasing.
The Web-based survey was used also to collect views concerning which technologies will be most crucial in terms of
development of telecommunications capacity. From those
of the results that emphasise B3G/4G, All-IP, LTE, and
HSPA (illustrated in Figure 54, below) the conclusion can
be drawn that the radio capacities that are delivered and in
full use today are not yet sufficient. It is important to note,
however, that HSPA is a mature technology but has not entered wide commercial use yet.
The timing of the commercial availability and of the usage
of different network-related key technologies was evaluated by means of the Web-based survey, and the survey results are presented in Table 20, below. Most of the technologies listed were seen as entering broad use by 2010–2015,
while Post-IP network applications would become dominant only after 2015.
6.3.7 Competence
Competence issues are arising as well. It is increasingly
hard to gather ‘all of the experts’ (those with expertise in,
e.g., security, performance, and standards) as the complex-
An overall summary roadmap based on all inputs and analysis considered in this roadmap update project has been
summarised in Table 21 where network technologies are
concerned.
SIP
SD
R
ED
GE
W
IM
AX
DV
BH
MI
MO
Po
st
IP
PA
N
RF
Un
I
D
ive
rsa
P2
lv
P
eh
icl
DR
ec
M
om
m
UW
un
B
ica
tio I
n p Pv
lat 6
for
m
ME
MS
W
ib
Fu ree
el
Ce
lls
N
Se Sm FC
ns art
or du
ne st
tw
or
k
W s
CD
MA
4G
HS
PA
XD
SL
3G
GP
RS
Se
m Linu
an
tic x
We
b
-IP
AII
LT
E
0
Figure 54. Relative impact of different technologies for the development of telecommunications capacity.
69
Table 20. Commercial availability and usage of key network technologies.
NETWORK-RELATED
TECHNOLOGIES
Already
in use
By 2010
By 2015
IPv6
**
****
**
SIP
******
**
All-IP
*
***
****
PAN
*
****
**
***
*****
*
**
******
4G
Post-IP
HSPA
***
*****
DVB-H
****
***
******
**
*
****
****
Peer-to-peer networks
Semantic Web
After 2015
Never
*
Table 21. Roadmap summary for networks.
NETWORKS
Key trends
•
•
•
•
The current core and edge networks are converging (as are the operators)
The current network protocols are being replaced with IP
Network changes happen only gradually and over time
There are significant new needs to be taken into account, since the original IP was designed some 30
years ago; among these are mobility, sensor network connections, the many different types of
networks, and different types of nodes
Situation in 2007
• The edge networks start to become bottlenecks because of the increased bandwidth
in access networks
Situation in 2010
• The first few countries no longer have a PSTN circuit-switched network
• Many horizontal infrastructure platforms exist commercially, based on which system
suppliers build the products
• Virtual peer-to-peer networks have increased significantly in importance
• The proportion of software content continues to increase
Situation in 2015
•
•
•
•
•
70
The first Post-IP networks will be deployed
The network is invisible to the user
There are no more PSTN circuit-switched networks
The home in developed countries will be a digital network of its own
There will be a multitude of networks of networks
6.4 Devices
6.4.1 Introduction
Mobile terminals will be transformed into multipurpose
devices. Many of the traditionally fixed devices will have
radio technologies for communications purposes built in.
The terminals will become repeaters or gateways for local
connectivity within networks, and they also will be embedded, e.g., in vehicles. Accordingly, this report speaks more
of ‘devices’ than the more traditional ‘terminals’ as the umbrella term.
The basic mobile device business is becoming rather mature, but the horizontal technologies only now have started
to develop rapidly. On the infra side, the horizontal technologies are a bit more developed.
Many of the technologies that were described in the section
on radio access are obviously also relevant to the devices.
Often, developments are driven from the infrastructure
side, where the size and cost of the equipment are greater,
meaning that the potential benefits of technological development are initially higher as well. When very small sizes
need to be reached, the development may, however, be
driven from the device direction.
6.4.2 Number of Devices
The number of mobile devices is growing at twice the
speed of PC growth. The number of subscribers will exceed two billion in 2007 and three billion in 2008. The
WWRF anticipates that there will be seven trillion wireless
devices serving seven billion people by 2017. In other
words, there will be one thousand devices per person.
6.4.3 Usability
The mobile phone has become the single personal device,
and has replaced, for instance, notebooks. People do not
want to carry many different devices with them, so
multifunctional devices will be more common in the mobile domain, while those in the stationary domain will be
more purpose-built.
deltas, that are continuously updated. The user does not recognise this and sees the information as continuous, despite the snapshots.
Some of the persons interviewed were of the opinion that
wireless technology soon is going to begin providing the
maximum ‘receiving bandwidth’ of humans (eyes, ears,
brain), which means that this bottleneck of wireless applications may soon be passed.
One of the continued main development needs related to
devices is the further enhancement of the user interface to
become more user-friendly.
6.4.4 Features
Wireless access is a prerequisite for most laptops today,
and in the future they will employ several alternative radio
access technologies, such as WLAN, WiMAX, and cellular with radio bit rates up to and beyond 10 Mbps.
For mobile devices, more and more features will be incorporated into the basic package and assumed to be a part of
even the lower-cost models. As an example, some years
from now positioning will be part of all mobile devices,
while today this functionally is an extra feature.
Voice over IP (VoIP) and, e.g., Skype functionality will become common also in mobile devices.
6.4.5 New Design Criteria
No mobile devices so far have been Internet-optimised; instead, they have been designed with voice as the key parameter. Now some manufacturers have created such devices, which also are called Internet Tablets.
The idea is that these Internet Tablets will ‘mobilise the
Internet’. The Internet will go truly mobile and is becoming
casual. The user groups are quite different:
● Middle-aged businesspeople use the device as a PC
and mobile service extension
● Youngsters and the next generation use it with friends
and for chatting and music
There is an important distinction between:
Internet Tablets
● ‘Wanna be’ Internet devices, such as e.g. the PC
– Smaller PCs can be made
– PDAs can be made wireless
– The legacy from a landline or mobile phone
can be addressed
The terminals of today can do virtually anything – with increasing complexity, the problem starts to be ease of use.
Parallel SIM cards and use of several devices will become
more common. Devices need to update each other automatically, so that the same, up-to-date information is always
available.
●
The Post-IP approach would mean, in devices, that there is
always a snapshot of the situation and it is the changes, the
Internet Tablets have broadband access over a WLAN connection or connection via a more traditional mobile phone.
71
These Internet Tablets are a threat to mobile operators, but
at the same time they are going to increase the traffic in the
networks of broadband operators in any case.
The interconnectivity between different main platforms,
such as Symbian, Linux, and Microsoft offerings, currently is poor, and there is a clear need for further development.
6.4.6 Platforms and
Architecture
A generic picture of the horizontalisation of the architecture and business models for mobile devices is presented in
Figure 55.
Thus far, the internal architecture of mobile terminals has
been created primarily in individual sections. In future,
there will be a renewed networked architecture for mobile
terminals. An example is presented in Figure 39, in section
5.1.3. The cost of materials in mobile devices/phones will
be only a few tens of euros. The Mobile Industry Processor
Interface (MIPI) alliance is developing this approach with
clear interfaces and protocols. For instance, the camera interface may be one of the first to be standardised, within the
next one or two years.
The software platforms on which future mobile devices are
built will be based on competing alternatives such as
Symbian, Nokia S60, Microsoft, and Linux solutions. In
the trend toward an open source platform, Linux is an obvious preferred choice.
6.4.7 Power Supply
Power supply continues to be an issue with mobile devices.
No revolutionary developments are likely by 2010. In
2015, the majority of devices most probably still will be
powered by rechargeable batteries.
6.4.8 Summary and Roadmap
An overall summary roadmap based on all inputs and analysis within this roadmap-updating project that relate to devices has been prepared, and the results are summarised in
Table 22.
Figure 55. Horizontalisation of technologies in mobile devices.
72
Table 22. Roadmap summary for devices.
DEVICES
Key trends
• The number of mobile devices is growing at twice the speed of PC growth
• Mobile devices will transform from ‘terminals’ into ‘gateways’ for local connectivity as well as
being embedded in, for instance, vehicles
• Horizontal platforms continue to emerge: Symbian, Linux, Microsoft solutions, radio technology
platforms, multiradio technology platforms
• Simplicity of use is the most important individual driver
Situation in 2007
• The number of mobile devices exceeds 2 billion
• The first mobile devices to be designed purely to be Internet-optimised are on the market
• Average prices continue to decline by 10–15% annually
Situation in 2010
• It is becoming common to use several parallel devices for different purposes; the devices update
themselves automatically with up-to-date data
• When one is on the move, there is one personal mobile device with ample functionality
that the user always carries
Situation in 2015
•
•
•
•
There is radio connectivity everywhere, and the network is invisible to the user
The user interface has become significantly more user-friendly
The number of self-learning services provided is vast
Two years after 2015, according to the WWRF: “7 trillion wireless devices serving 7 billion people”
6.5 Security
Information security is a subject that is relatively new and
of increasing importance. Information security has been an
active research subject in universities since the early ’80s.
Security issues traditionally have been handled as separate
items, while, by contrast, they should be an integral part of
all platforms, products, systems, operations, and users’ behaviour.
Much comprising the fundamental structures and user discipline is still rather weak. The shift to an integrated approach to security will take time: Even if many, if not most,
products today are designed to take security issues into account even in the design phase, this also is needed on system level, where systems consist of several products. The
fact that there is an installed base of products and systems
that will be replaced only slowly means that it is going to
take time for an overall integrated approach to security to
become reality.
The other very important point is that security is very much a
user-level question. The identity in most cases is held by users, not by devices. Users many times are the weakest link,
and they need to know the risks and realities if this risk is to
be minimised. At the same time, user confidence and trust is
vital, to enable fast expansion in usage of wireless services.
Security issues are becoming more and more of a financial
risk factor as well, with huge monetary risk potential. The
key security issues are moving away from the world of hackers, who generally just want to be recognised, to that of professional crime, where financial benefits are the target.
Today, SIM cards and PIN codes are the cornerstones of
authentication. In the future, identification will be more related to one or a combination of several of, for instance,
walking, grip, fingerprint, voice, and skin conductivity. A
type of ‘secure citizen identity’ would be an enabler for
many new services and ease of use.
No matter what, IP always brings an information security
risk, and users do not necessarily even understand this. The
basic model of IP is that sending is easier than receiving.
For instance, SPIT (spam over IP telephony) will be an increasingly important issue. There will be a need to split
contact lists into a trusted and an open list. ‘Bot’ attacks
may have radical and very far-reaching financial consequences (Internet bots are software applications that run
automated tasks over the Internet; malicious use of these
can involve, for example, co-ordination and operation of an
automated attack on networked computers).
Information security may actually be the key driver for
Post-IP development.
73
3G
H
Sm SP
ar A
td
m
us
un
t
i
Ac catio X
ce
D
ler n pla SL
at
ion tfor
Se m
ns
or
s
S
Fu DR
el
Ce
lls
Un
iv
er
sa
lv
eh
icl
ec
om
LT
E
PA
N
Se
m Linu
an
x
tic
We
b
GP
R
W S
IM
Bl AX
ue
too
th
DV
BH
ED
GE
4G
P2
W P
ibr
ee
UW
B
Po
st
W IP
CD
MA
I
ne Pv6
tw
or
ks
Se
ns
or
SIP
AII
-IP
C
DR
M
NF
RF
ID
0
Figure 56. Impact of technologies for the development of digital identity and security,
on the basis of the results of the Web-based survey.
Solving of security issues is one of the key challenges of
home networks as a large set of functionalities becomes
common.
The Web-based survey was used also to identify the most
important technologies for the development of digital identity and security. Included were RFID and NFC, but then
also the above-mentioned Post-IP was on the top of this
list, as illustrated in Figure 56, below.
An overall summary roadmap based on all inputs and
analysis within this roadmap-updating project that relate
to security has been prepared. It is summarised in Table
23.
Table 23. Roadmap summary for information security.
INFORMATION SECURITY
Key trends
• The importance of security is increasing all the time
• Because of the change in value nets, the security issues become end-to-end issues, also outside companies
• The weakest link in the end-to-end chain (structures, platforms, products, systems, operations, and users) is
the target of security attacks – many times, the end user
• Security issues are no longer primarily a question of hackers but about professional abuse
Situation in 2007
• Security still is handled as a separate issue
Situation in 2010
• The fundamental importance of information security has become widely understood
• The complexity of security issues has increased, but there also are enhanced capabilities to address them
Situation in 2015
• Security will be proactively treated as an integral element across network, access, device, application,
operation, and end user boundaries from the very beginning, not an ‘afterthought’
• Advanced identification methods, such as biometrics, have some use
74
6.6 Other Areas
The commercial availability of some other relevant technologies was evaluated via the Web-based survey. The results of these assessments are presented in Table 24.
Table 24. Commercial availability of some other key technologies, estimated on
the basis of the Web-based survey’s results.
MEASUREMENT AND OTHER
TECHNOLOGIES
Already
in use
By 2010
By 2015
After 2015
Never
*
****
**
**
****
***
**
*
***
****
*
***
**
*
Smart dust
Sensor networks
****
DRM
Microbial fuel cells
*
MEMS
ment – where the technology will be applied in scale by
business.
6.7 Hype Curves
The breakthrough of technologies on the time axis can be
described also via the ‘hype curve’ concept, originally introduced by Gartner in 1995.
The timing of some key technologies was mapped in this
study onto the hype curve concept for the roadmap years
2007, 2010, and 2015, primarily on the basis of the results
from the personal interviews. These curves are illustrated
in figures 57, 58, and 59, respectively.
Each technology goes through technology-driven positive
hype, has a peak of inflated expectations, goes through a
time of negative hype, and reaches a slope of enlighten-
Visibility
WiMAX
IPv6
Wibree
GPRS
EDGE
HSPA
FMI
Bluetooth
WLAN
ATM
LBS
WCDMA
Tracing &
Tracking
LTE
IPv4
RFID
Maturity
Technology
Trigger
Peak of
Inflated
Expectations
Trough of
Disillusionment
Slope of
Enlightenment
Plateau of
Productivity
Figure 57. Hype curve concept, results for 2007.
75
Visibility
Tracing & Tracking
LTE
GPRS
EDGE
WLAN
FMI
WCDMA
4G
WiMAX
IPv4
IPv6
RFID
HSPA
SW Radio
MIMO
Sensor
Networks
Maturity
Technology
Trigger
Trough of
Disillusionment
Peak of
Inflated
Expectations
Slope of
Enlightenment
Plateau of
Productivity
Figure 58. Hype curve concept, results for 2010.
It is interesting to compare these results with a Gartner
result from July 2006 (see Kauppalehti, 2.1.2007) as
presented in Figure 60. For instance, the results concerning RFID and IPv6 support quite well the findings of this
project.
Visibility
Post-IP
Tracing & Tracking
Virtual
Presence
IPv4
HSPA
4G
RFID
IPv6
FMI
LTE
Maturity
Technology
Trigger
Peak of
Inflated
Expectations
Trough of
Disillusionment
Slope of
Enlightenment
Figure 59. Hype curve concept, results for 2015.
76
Plateau of
Productivity
Figure 60. Gartner hype curve from July 2006 (Kauppalehti, 2.1.2007)
77
7 Conclusions
7.1 Introduction
7.2 Key Differences from
the Previous Roadmap
This chapter summarises the key changes since the previous roadmap report, compares the key differences on the
hype curve with the information in the previous report,
summarises the anticipated roadmaps, and identifies some
of the critical paths and points as well as the opportunities
related to them.
The key changes seen since the previous roadmap are summarised in Table 25. Because of the difference in target-setting and the objectives of this project, the present report has discussed business-related questions clearly more
extensively than the previous roadmap report did.
Table 25. Key differences from the previous roadmap.
Services
2007
2010/2015
• Community-type services have grown rapidly
• The number of business models has
• Many different business models coexist
increased, also with many free-of-charge
services
• ‘Devices’ is a more descriptive term
Devices
than ‘terminals’
• Internet-optimised devices are on the market
• The number of radio access technologies
Networks
Content
is increasing
• WiMAX has rapidly become a key technology
• IP is becoming the dominant protocol
• The edge network is becoming a bottleneck
in terms of capacity
• The amount of individually created and
• The user carries one personal mobile device
• User-friendliness has developed significantly
•
•
•
•
Devices function as relay networks
Some cognitive radios exist
Home networks are important change drivers
Some sensor networks start to exist
• De facto rules are applied for DRM
shared content is increasing rapidly
• Security still is handled as a separate issue
• The fundamental importance of security is
widely understood
• Security is proactively treated as an integral
Security
element across network, access, device,
application, operation, and end user
boundaries from the very beginning,
not as an ‘afterthought’
79
7.3 Hype Curve Changes
7.4 Summary Roadmaps
In comparison of the hype curve for 2007 created as part of
this project with the Gartner hype curve in the previous
NETS roadmap report, some key changes can be identified:
● GPRS and EDGE have progressed
● WCDMA has progressed well
● 4G has dropped away from the curve for 2007
(however, it appears again in the curve for 2010)
● LTE is a newcomer on the curve
● RFID was not mentioned on the previous curve
A summary of each roadmap is presented in graphical form
below, in figures 61 to 68.
Figure 61. Roadmap summary for traffic and logistics.
Figure 62. Roadmap summary for construction.
80
Figure 63. Roadmap summary for manufacturing.
Figure 64. Roadmap summary for business models.
81
2007
2010
2015
Cognitive radios
Wireless connection everywhere at reasonable
price and performance
Terminal relay networks
Home access networks
LTE
RFID
Wibree
HSPA
3G
WLAN’s
Bluetooth
Short range communications
Medium
Wide area networks
Figure 65. Roadmap summary for radio access.
Figure 66. Roadmap summary for networks.
82
Other
Figure 67. Roadmap summary for devices.
Figure 68. Roadmap summary for security.
83
7.5 Critical Paths and Points,
with Related Opportunities
The challenge many times involves moving from trial operations to real business, even if the trials as such have been
successful.
There are many examples of a trial or business concept being parked or sold and then flourishing under another company. The barrier is typically either simply wrong timing or
the lack of a suitable culture.
There were 13 critical paths/points identified, each of
which has related opportunities that should be studied and
examined further. Some of them are very practical, while
others are more visionary in nature. These critical paths
and points, with their related opportunities, are listed in Table 26, below.
In evaluating these opportunities, it is useful to apply a
framework for cycles of innovation, describing the different cycle times, in order to position the opportunities and
determine the right timing for the opportunity and related
investment in it.
The WWRF (see Global Visions of a Wireless World,
2006) has a good generic model describing these cycles,
which is illustrated in Figure 70, below.
Policy-related subjects have very long cycles, typically
lasting up to a decade. Network-related innovation questions have medium cycle lengths, of typically about seven
years, while terminals or devices have short cycles –
namely, two years or less.
It is important to note that services, with all of the current
technology enablers present, can have very short cycles of
innovation – i.e., about one year. This is why many new innovative services may become reality rapidly, as the examples of Web 2.0 have shown recently.
Figure 69. The Challenge of Creating a Successful Process – from trials to business.
Figure 70. Model for cycles of innovation (from Global Visions of a Wireless World, 2006).
84
Table 26. Critical paths and points identified, with related opportunities.
Critical path or point
Opportunity
• The environmental/energy balance is changing
• These changes will make many new things feasible
• Business is shifting toward services
• Mobility is enabling this change in many cases
• Speed increases and cost decreases
• In mobile solutions, this is highly pronounced
• Individual identification of mass products is
• This yields extensive cost, accuracy, and value creation
gaining force
• Business processes are being reshaped
opportunities
• Entirely new types of business processes are enabled by
mobility: Real-time road conditions, maintenance personnel
management, in-the-pocket Web services
• Disruption, a security issue, can affect Wall Street or
• Opportunities related to information security and information
even entire influential countries
• Spam over IP telephony results in disinformation and
reliability appear
• SPIT filters can be used
has connection to financial impact
• The oil reality appears – the oil production peak has
• Tele-presence and virtual reality opportunities appear
been passed, and oil is starting to become a more
scarce resource
• The market economy opens borders (which may
• Can this be an opportunity for a ‘faraway’ country like
become closed again in cycles); this leads to lower
transaction costs
Finland?
• Is the Short Message Service disappearing?
• What comes instead?
• How is SMS use changing?
• Ambient communications gain importance
• Examples include Information ‘appearing’ on the calendar
• What are the next disruptive services?
• The next killer application after mobile voice may
•
•
•
•
•
•
•
emerge
YouTube – what next?
Enablers do exist
Scaling capabilities are there
Community presents opportunities
Ads have a new role – information-rich?
Pricing models and reputation can be explored
Context- and presence-related services may appear
85
7.6 Recommendations
Some key recommendations can be summarised for the
further work within the GIGA and VAMOS programmes.
Disruptions
It is important to be prepared for radical change and disruptions thus:
● Be ready to ‘unlearn’
● Keep abreast of what is happening in the environment
● Reflect on the changes and be pragmatic
● Ensure capability for fast reaction, and act rapidly
when decisions have been made
standards. The opportunity of these standards should be
utilised, for Finnish companies to be at the forefront of the
upcoming changes in business and business models.
All in all, open standards should be seen more as an opportunity, applicable for all branches of industry.
Focus and Choices
This report had a predefined scope that was very broad; in
order to achieve concrete results in the further work of the
GIGA and VAMOS programmes, it is important to have a
strong focus and select some key areas in which breakthroughs are being and can be achieved, such that these
later on can be utilised elsewhere.
Business Models
It is impossible to envisage the exact business models of
choice in advance, but it is important to prepare for them as
enablers and determine which are the most suitable for the
business and company in question.
Sector-Specific Considerations
The construction, traffic, and logistics fields have a rather
domestic focus and somewhat limited use of international
86
Opportunities
The technology is not the limiting factor in many areas.
There is plenty of room for business innovation and commercial success.
Business model changes should be seen more as an opportunity for a ‘faraway’ country such as Finland than a threat
in the global marketplace.
Appendix 1
References
Roadmap for Network Technologies and Services. Petteri
Alahuhta, Marko Jurvansuu, Heikki Pentikäinen,
Tekes. Technology Review 162/2004.
NETS – Networks of the Future 2001–2005, Final Report.
Tekes, Technology Programme 1/2005. Helsinki
2005.
eMobility, Mobile and Wireless Communications Technology Platform, Strategic Research Agenda, version
5. Prof. Rahim Tafazolli, Juha Saarnio. August 2006.
Global Visions of a Wireless World. The Wireless World
Research Forum, Mikko A. Uusitalo. November 2006.
The Odyssey of the Mobile Internet – the Emergence of a
Networking Attribute in a Multidisciplinary Study.
Ville Saarikoski. Finnish Information Society Development Centre Publication Series, Helsinki 2006.
‘The Long Tail’. Chris Anderson. Wired magazine (online), issue 12.10, October 2004. Available from the
World Wide Web at http://www.wired.com/wired/archive/12.10/tail.html.
Kansallinen tietoyhteiskuntastrategia 2007 - 2015, Tietoyhteiskuntaohjelma, Valtioneuvoston kanslia. Helsinki 2006.
Development of Broadband Technologies and Business.
GIGA Converging Networks Technology Programme
2005–2010, Tekes. February 2006:
Broadband in Japan. Shigetoshi Kudoh, GIGA Converging Networks, Tekes, Tokyo
Fixed Line Broadband in China, Tony Wang / Finpro
China, Guangzhou
Broadband Internet In Korea, Yoonmi Kim / Finpro
Korea
Fixed Broadband in the USA, Miika Nevalainen,
Veijo Iivonen, Finpro USA, Silicon Valley
Kiinteistö- ja rakennusklusterin VISIO 2010, Raportti 4.
Vision strategiapäivitys. Arkkitehtitoimistojen Liitto
ATL ry, Kiinteistöpalvelut ry, Rakennusteollisuus RT
ry, Rakennustietosäätiö RTS, Suomen Kiinteistöliitto
ry, Suomen toimitila- ja rakennuttajaliitto RAKLI ry,
koordinaattori, Suunnittelu- ja konsulttitoimistojen
Liitto SKOL ry, Sähkö- ja teleurakoitsijaliitto STUL
ry, Teknologian kehittämiskeskus Tekes, Ympäristöministeriö. 23.11.2005.
Wireless Broadband in China, Mikael Leinonen, Finpro
Hong Kong
Mobilizing Business Applications, Petteri Alahuhta, Jari
Ahola, Hannu Hakala, Tekes, Technology Review
167/2005, Helsinki 2005.
Wireless Broadband In Korea, Yoonmi Kim / Finpro Korea, GIGA Converging Networks
Wireless Broadband in the USA. Miika Nevalainen, Veijo
Iivonen, Finpro USA, Silicon Valley
E-Business Logistics, Visions, Innovations and Research.
ELO – E-Business Logistics Technology Programme
2002–2005, Tekes, Editor: Heikki Kekäläinen. Technology Review 196/2006, Helsinki 2006.
ELO – Elektronisen liiketoiminnan logistiikka 2002–2005
loppuraportti, Teknologiaohjelmaraportti 7/2006. Tekes.
Helsinki 2006.
Etätunnistuksen suuntaviivat logistiikassa, Logistiikan
RFID Roadmap. Antti Permala, Ajantasaisen Liikenneinformaation T&K-Ohjelma Aino, Aino-julkaisuja
30/2006. Helsinki 2006.
Mobiiliteknologia rakennus- ja kiinteistöalalla. Jussi Kanerva, Harri Haapasalo, Tekes, Teknologiakatsaus
187/2005. Helsinki 2005.
3G Evolution – the Trusted Road Ahead. Nokia/Vodafone
white paper. 2005.
New Business Opportunities for Finnish Real Estate and
ICT Clusters. Neoclusters, RAKLI, Editors: Jussi
Kanerva, Kaija-Stiina Paloheimo. Helsinki School of
Economics 2005.
The Multi-Service Edge, Tellabs Business Solutions
Primer. Tellabs. September 2005.
Multiradio – Architectural Challenges of Mobile Devices,
Tekes, ELMO Seminar. Kalle Kivekäs, Nokia Research Center, Nokia Corporation. 08.11.2005.
Gartner Hype Curve from July 2006. Kauppalehti.
2.1.2007.
87
Appendix 2
People Interviewed
We would like to thank all those who were interviewed during this project for their valuable views
and contribution. The persons interviewed are listed below.
Interviews: GIGA
Surname
First name
Organisation
Ainali
Golmie
Härkönen
Inoue
Jaakola
Juntti
Jurvansuu
Kegel
Ketola
Lu
Mäklin
Mäntylä
Pipatti
Räty
Saarnio
Salmelin
Talvitie
Uusitalo
Virtanen
Wright
Timo
Nada
Jorma
Masugi
Pekka
Markku
Marko
Ian
Kari
Shannon
Martin
Martti
Eskoensio
Esko
Juha
Juha
Jaakko
Mikko
Ari
Steve
NetHawk Oyj
National Institute of Standards and Technology, US
MTV3
National Institute of ICT, Japan
SanomaWSOY Group
Oulun Yliopisto
VTT
British Telecom
Plenware Group Oy
B-Star, Shanghai
TeliaSonera Oyj
Helsinki Institute for Information Technology (HIIT)
SanomaWSOY Group
Tellabs Oy
Nokia Oyj
Nokia Networks
Elektrobit Group
Nokia Oyj
Nokia Oyj
British Telecom
Interviews: VAMOS
88
Surname
First name
Organisation
Aalto
Arola
Helkkula
Hietanen
Hämäläinen
Korpela
Lehtinen
Liukkonen
Lång
Mikkonen
Nuutinen
Paananen
Pekkanen
Permala
Rainio
Seppä
Sopula
Sulameri
Talvitie
Vuoria
Erkki
Tomi
Vesa
Sampo
Pekka
Mikko
Kai
Kimmo
Krister
Pekka
Risto
Vesku
Jukka
Antti
Antti
Heikki
Jouni
Toni
Jaakko
Aila
Rakli ry
Valmet Automotive Oy
Aplicom Oy
Tieliikelaitos
Tekla Oyj
SysOpen Digia Oyj
Tekla Oyj
YIT Oyj
DHL Finland Oy
Procomp Solutions Oy
Schenker Oy
Microsoft
Rakennusteollisuus RT ry
VTT
ITS Finland ry
VTT
Schenker Oy
Forum for Intelligent Machines c/o Hermia Oy
Elektrobit Group
Skanska Oy
Appendix 3
Participants in the Expert Workshop
We would like to express our gratitude also to all participants who provided valuable insight on the
subject at the expert workshop held on 10th January 2007.
Participants
Surname
First name
Organisation
Frantti
Ikäheimo
Killström
Markus
Mattila
Mikkola
Mustonen
Mäntylä
Nikander
Penttilä
Permala
Rantala
Simula
Syyrakki
Tirri
Virtanen
Tapio
Jorma
Ulla
Kari
Ville-Veikko
Hannu
Panu
Martti
Pekka
Matti
Antti
Jukka
Timo
Matti
Henry
Ville
VTT
NetHawk Oy
Elisa Communications Oyj
Tekes
Nokia Oyj
Racon Oy
Ramblas Digital Ltd
Helsinki Institute for Information Technology (HIIT)
Sony Ericsson
VTT
VTT
Nokia Oyj
Netcare Finland
Tekla Oyj
Nokia Oyj
Tieliikelaitos
89
Appendix 4
Abbreviations
90
2G/2.5/3G/4G
3GPP
X Generation Mobile System
3rd Generation Partnership Project
A/V
AAA
ABC
ACM
ADSL
AGPS
AMI
API
ATM
Audio/Video
Authorisation, Authentication, and Accounting
Always Best Connected
Adaptive Coding and Modulation
Asymmetric Digital Subscriber Line
Assisted GPS
Ambient Intelligence
Application Programming Interface
Asynchronous Transfer Mode
B2B/b2b
B2C/b2c
BACnet
BAN
BT
BW
Business-to-Business
Business-to-Consumer
Building Automation and Control Networking
Body Area Network
Bluetooth
Bandwidth
CAN
CC/PP
CDI
CDMA
CELTIC
COBA
COPS
CORBA
CPN
CRM
Controller Area Network
Composite Capabilities/Preferences Profile
Content Distribution Internetworking
Code Division Multiple Access
Co-operation for a European sustained Leadership
in Telecommunications
Connected Open Building Automation
Common Open Policy Service
Common Object Request Broker Architecture
Customer Premises Network
Customer Relationship Management
DAB
DARPA
DBS
DEAS
DiffServ
DMB
DMFC
DRM
DS/FH-CDMA
DSL
DSRC
DVB
DVB-H
D-WDM
Digital Audio Broadcasting
The Defense Advanced Research Projects Agency
Digital Broadcast Satellite
Interoperability Developments for Enterprise Application and Software
Differentiated Services
Digital Multimedia Broadcasting
Direct Methanol Fuel Cell
Digital Rights Management
Direct Sequence / Frequency-Hopping Code Division Multiple Access
Digital Subscriber Line
Dedicated Short Range Communication
Digital Video Broadcasting
Digital Video Broadcasting – Handheld
Dense Wavelength Division Multiplexing
E2E/e2e
EAN
EDGE
EDI
ERP
ETSI
End-to-End
European Article Number
Enhanced Data rates for GSM Evolution
Electronic Data Interchange
Enterprise Resource Planning
European Telecommunications Standards Institute
FDM
FDMA
FFA
Flash-ODM
FN
Frequency Division Multiplexing
Frequency Division Multiple Access
Field Force Automation
Fast Low-latency Access with Seamless Handoff,
Orthogonal frequency Division Multiplexing
Federated Networks
GIS
G-MPLS
GNSS
GPRS
GPS
GSM
Geographic Information Systems
Generalized Multi-Protocol Label Switching
Global Navigation Satellite System
General Packet Radio Service
Global Positioning System
Global System for Mobile communications
HAVi
HFC
HSDPA
HSI
HSPA
HSUPA
HTML
HW
HVAC
Home Audio/Video Interoperability
Hybrid Fiber Coax
High-Speed Downlink Packet Access
Human System Interaction
High-Speed Packet Access
High-Speed Uplink Packet Access
HyperText Markup Language
Hardware
Heating, Ventilation, and Air Conditioning
ICT
IEEE
IETF
IMS
IMT
INSPIRE
IP
IP/MPLS
IPR
IPTV
IPv4/6
IS
ISP
IST
IT
ITEA
ITU
Information and Communication Technologies
Institute of Electrical and Electronic Engineers
Internet Engineering Task Force
IP Multimedia Subsystem
International Mobile Telecommunications
The Infrastructure for Spatial Information in Europe
Internet Protocol
Internet Protocol / Multi-Protocol Label Switching
Intellectual Property Rights
Internet Protocol Television
Internet Protocol Version 4 or 6
Information Security
Internet Service Provider
Information Society Technologies
Information Technology
Information Technology for European Advancement
International Telecommunications Union
LAN
LBS
LTE
Local Area Network
Location-Based Services
Long-Term Evolution
91
92
M2M/m2m
M2P/m2p
MAC
MBnet
MC-CDMA
MCS
MEMS
MFC
MIMO
MIPI
MIPv6
MITF
MOEMS
MP3
MPEG-2/4/7
MPLS
Machine-to-Machine Communications
Machine-to-Person Communications
Medium Access Control
Network of Excellence in mBusiness Applications and Services
Multi-Carrier Code Division Multiple Access
Modulation and Coding Scheme
Micro-Electro-Mechanical Systems
Microbial Fuel Cell
Multiple Input / Multiple Output
Mobile Industry Processor Interface
Mobile IPv6
Mobile IT Forum
Micro-Opto-Electro-Mechanical Systems
Standard for music compression (MPEG subset)
Motion Picture Experts Group, version 2/4/7
Multi-Protocol Label Switching
NFC
NGN
NIST
Near Field Communication
Next Generation Network
National Institute of Standards and Technology, US
ODM
OEM
OFDM
O-FDM
OMA
OPEX
OSA
OSS
Original Design Manufacturing
Original Equipment Manufacturing
Orthogonal Frequency Division Multiplexing
Optical Frequency Division Multiplexing
Open Mobile Alliance
Operating Expenditure
Open Service Access
Operations Support System
P2P/p2p
PAM
PAN
PDA
PGP
PHY
PIM
PKI
PN
PoC
PSTN
Peer-to-Peer
Pluggable Authentication Modules
Personal Area Network
Personal Digital Assistant
Pretty Good Privacy
Physical layer
Personal Information Management
Public Key Infrastructure
Personal Network
Push-to-talk over Cellular
Public Switched Telephone Network
QoS
Quality of Service
RDF
RF
RFID
ROADCON
Roaming
Resource Description Framework
Radio Frequency
Radio Frequency Identification
Strategic Roadmap towards Knowledge-Driven Construction
A mobile device ‘roams’ when it changes its point of attachment to
another (operator) network. This requires formal agreements between
operators and is not seamless – i.e., the current session is not continued
when the next operator network is accessed.
RoW
RPMS
RTKGPS
Right of Way
Remote Plant Monitoring System
Real-Time Kinematics GPS
SCM
SDMA
SDR
Seamless hand-over
SET
SIP
SLA
SME
SMS
SOAP
SONET
SPIT
SS7
STB
SW
Supply Chain Management
Space Division Multiple Access
Software Defined Radio
The current network connection is maintained without disruption
when the mobile terminal connects to a new access network.
Simplicity, Efficiency, and Trust
Section Initiation Protocol
Service Level Agreement
Small and Medium Enterprise
Short Message Service
Simple Object Access Protocol
Synchronous Optical Network (US standard)
Spam Over IP Telephony
Signalling System 7
Set-Top Box
Software
TCP
TDMA
Transmission Control Protocol
Time Division Multiple Access
UaProf
UDDI
UI
UMTS
UMTS PS
UPC
UPnP
UWB
User Agent Profile
Universal Authority Mark-Up Language
User Interface
Universal Mobile Telecommunication System
UMTS Packet Switched
Universal Product Code
Universal Plug and Play
Ultra Wide Band
VAN
WAP
WCDMA
WDM
VDSL
VHE
Wi-Fi
WiMAX
WirelessHD
WLAN
VoD
VoIP
WPAN
VPN
VTT
WWRF
WWRI
Vehicle Area Network
Wireless Application Protocol
Wideband Code Division Multiple Access
Wavelength Division Multiplexing
Very High Speed Digital Subscriber Line
Virtual Home Environment
Wireless Fidelity
Worldwide Interoperability for Microwave Access
Wireless High Definition
Wireless Local Area Network
Video on Demand
Voice over IP
Wireless Personal Area Network
Virtual Private Network
Technical research centre of Finland
Wireless World Research Forum
Wireless World Research Initiative
XDSL x (generic)
XML
XMPP
Digital Subscriber Line
Extensible Markup Language
Extensible Messaging and Presence Protocol
93
Tekes’ Technology Reviews in English
206/2007 Update of GIGA-VAMOS – Technology Roadmap. Mikael von Hertzen, Juhani Timonen,
Pekka Huuhka. 93 p.
205/2007 Seizing the White Space: Innovative Service Concepts in the United States. Peer Insight. 76 p.
202/2007 Five Steps for Finland’s Future. Pirjo Ståhle (ed.). 42 p.
200/2007 Innovation, Journalism and Future. Erkki Kauhanen and Elina Noppari. 88 p.
196/2006 E-Business Logistics Visions, Innovations and Research. ELO – E-Business Logistics
Technology Programme 2002–2005. Heikki Kekäläinen (editor). 91 p.
191/2006 MASI Technology Programme 2005–2009. Yearbook 2006. Eija Alakangas &
Pekka Taskinen (eds)
184/2005 Globalisation of R&D. Part 1: R&D in a Global World, and Part 2: R&D in a Global Economy.
182/2005 Research training and national innovation systems – Finland compared to Australia and the USA.
Sandra Haukka. 154 p.
179/2005 Pharma development in Finland today and 2015. (Updated version of review 163/2004) 78 p.
177/2005 Best Practices in Innovation Policies. Heikki Kotilainen. 92 p.
172/2005 Business Cycle Effects on Start-Up Finance in Finland. 47 p.
171/2005 Technology Based Entrepreneurship and Regional Development in Finland. 51 p.
167/2005 Mobilizing Business Applications – A survey about the opportunities and challenges of mobile
business applications and services in Finland. Petteri Alahuhta, Jari Ahola, Hannu Hakala. 46 p.
165/2004 Utilisation of Large Finnish Study Cohorts in Genome Research. Kirsti Käpyaho,
Leena Peltonen-Palotie, Markus Perola, Tero Piispanen
163/2004 Pharma development in Finland today and 2015. Malin Brännback, Markku Jalkanen,
Kauko Kurkela, Esa Soppi
162/2004 ROADMAP for Network Technologies and Services. Petteri Alahuhta, Marko Jurvansuu,
Heikki Pentikäinen. 104 p.
158/2004 Microfluidics. Pasi Kallio, Johana Kuncova. 32 p.
157/2004 Proteomics – Challenges and possibilities in Finland. Heini Koivistoinen, Harri Siitari. 35 p.
156/2004 Finnish Software Product Business: Results from the National Software Industry Survey 2003.
Juhana Hietala.
150/2003 Towards a Supercluster: Chemical and Biochemical Innovations Connecting Finnish Clusters.
149/2003 Managing Non-Core Technologies: Experiences from Finnish, Swedish and US Corporations
Annaleena Parhankangas, Päivi Holmlund, Turkka Kuusisto. 76 p.
147/2003 Innovative waste management products – European market survey. Christoph Genter. 40 p.
145/2003 The Finnish Maritime Cluster. Mikko Viitanen, Tapio Karvonen, Johanna Vaiste, Hannu Hernesniemi. 187 p.
144/2003 Tracing Knowledge Flows in the Finnish Innovation System – A Study of US Patents Granted
to Finnish University Researchers. Martin Meyer, Tanja Siniläinen, Jan Timm Utecht,
Olle Persson, Jianzhong Hong. 36 p.
138/2003 Finland’s Wireless Valley: Domestic Politics, Globalizing Industry. Dan Steinbock.
Subscriptions:
www.tekes.fi/english/publications
206
07
Tekes
●
Update of GIGA-VAMOS – Technology Roadmap
Update of GIGA-VAMOS
– Technology Roadmap
Technology Review 206/2007
Further Information
www.tekes.fi/giga
www.tekes.fi/vamos
Technology Review
The Finnish Funding Agency for Technology and Innovation
Kyllikinportti 2, P.O. Box 69, FIN-00101 Helsinki, Finland
Tel. +358 1060 55000, Fax +358 9 694 9196, E-mail: [email protected]
www.tekes.fi
April 2007
ISSN 1239-758X
ISBN 978-952-457-364-1
Update of GIGA-VAMOS
– Technology Roadmap
Mikael von Hertzen, Juhani Timonen, Pekka Huuhka
Technology Review 206/2007