Definition of Scenarios, Internal and External Services
Total Page:16
File Type:pdf, Size:1020Kb
FP6- 027685 MESH D6.1 Definition of MESH Application Scenarios, internal & external services Contractual Date of Delivery: M3 (May 2006) Actual Date of Delivery: 13 July 2006 Workpackage: WP6 System Architecture and Integration Dissemination Level: Public Nature: Report Approval Status: Approved Version: 5 Total Number of Pages: 54 Distribution List: WP6, TMC members, European Commission Filename: mesh-wp6-D6.1-20060711-Application Scenarios-v5.doc Keyword list: Users, Application scenarios, Services, External services Abstract This document describes the application scenarios created in MESH to drive the system design and relate the features to be developed in the technical workpackages, plus the list of services to be potentially provided by MESH (internal services) as well as external services to be linked from within the MESH platform. The information in this document reflects only the author’s views and the European Community is not liable for any use that may be made of the information contained therein. The information in this document is provided as is and no guarantee or warranty is given that the information is fit for any particular purpose. The user thereof uses the information at its sole risk and liability. Page 1 D6.1 – v. 5 History Version Date Reason Revised by 01 2006-04-30 Initial scenarios Nikos Sarris, Martin Pinkerneil 02 2006-05-30 Updated services linked to MESH Nikos Sarris technical activities 03a 2006-06-25 Updated scenarios and services Nikos Sarris according to plenary discussion and added scenario summary tables and UML models 03b 2006-06-30 Integrated External Services Katerina survey Diamantakou 04 2006-07-05 Added summary & conclusions, Nikos Sarris plus updated list of references 05 2006-07-11 Revised template, some small Paulo Villegas fixes Author list ATC Nikos Sarris ATC Katerina Diamantakou DW Jochen Spanenberg DW Wilfried Runde DW Martin Pinkerneil TID Pedro Concejero Additionally, DIAS, DFKI and INA provided additional useful MESH usage ideas. The whole consortium contributed linking the MESH technical activities to the technical concepts illustrated in the scenarios. Page 2 D6.1 – v. 5 Executive Summary This document is the final edition of the MESH Application Scenarios identifying the necessary MESH services which are also linked to the foreseen MESH technical activities. This was produced after iterative consultation with the whole MESH consortium carried out in the series of actions detailed in the following table: Action Actor(s) Deadline Status Describe a set of scenarios with associated technologies T6.2 partners 30-4-06 Completed Fill in annexed tables with relevant technical activities All partners 15-5-06 Completed Revise and merge scenarios into realisable use cases ATC 30-5-06 Completed Present and discuss final scenarios in the plenary meeting ATC, all 07-06-06 Completed Finalise and formalise scenarios ATC 15-06-06 Completed Produce relevant deliverable ATC 30-06-06 Completed This document now envisions the implementation target of the MESH project and to this end we also include an introductory chapter which outlines the ‘setting’ within which MESH intends to be positioned. This document will be further utilised by T6.1 for the detailed and formal definition of requirements and the instantiation of use cases by means of sequence diagrams, which will be carried forward to lead the technical implementation and integration of the MESH platform. Page 3 D6.1 – v. 5 Table of Contents 1. Introduction – defining the MESH ‘setting’ .................................................................6 2. MESH targeted users ........................................................................................................7 3. MESH Application Scenarios............................................................................................7 3.1. Scenario 1: Ilias Bonn – a travelling journalist ................................................7 3.1.1. Storyline description ............................................................................................7 3.1.2. Summary Table ...................................................................................................10 3.1.3. System boundary model ................................................................................... 12 3.2. Scenario 2: Martha Jong – a retired doctor..................................................... 13 3.2.1. Storyline description .......................................................................................... 13 3.2.2. Summary Table ............................................................................................... 14 3.2.3. System boundary model ............................................................................... 15 3.3. Scenario 3: John Clark – a news correspondent............................................ 16 3.3.1. Storyline description .......................................................................................... 16 3.3.2. Summary Table ............................................................................................... 17 3.3.3. System boundary model ...............................................................................18 3.4. Scenario 4: Claudia – a business analyst......................................................... 19 3.4.1. Storyline description .......................................................................................... 19 3.4.2. Summary Table ............................................................................................... 19 3.4.3. System boundary model .............................................................................. 20 3.5. Scenario 5: Bill Jones – building a news agency............................................ 21 3.5.1. Storyline description .......................................................................................... 21 3.5.2. Summary Table ...............................................................................................22 3.5.3. System boundary model ...............................................................................23 3.6. Scenario 6: Young periodist and blogger .........................................................24 3.6.1. Introduction to the scenario.............................................................................24 3.6.2. Storyline description ......................................................................................25 3.6.3. Summary Table ...............................................................................................26 3.6.4. System boundary model ...............................................................................27 4. MESH list of Internal Services ..................................................................................... 28 5. MESH External Services ................................................................................................ 38 5.1. Introduction ............................................................................................................. 38 5.2. Syndication .............................................................................................................. 38 Page 4 D6.1 – v. 5 5.3. Web Feeds.................................................................................................................39 5.3.1. RSS and ATOM.....................................................................................................39 5.3.2. Who publishes Feeds? [57].......................................................................... 41 5.3.3. How does someone read Feeds? ................................................................ 41 5.3.4. Feed Readers ...................................................................................................42 5.4. Electronic Content Syndication Methods ..........................................................44 5.5. News personal publishing sources..................................................................... 48 5.5.1. Web Blogs ............................................................................................................ 48 5.5.2. Mob Blogs..........................................................................................................49 5.5.3. Spam Blogs.......................................................................................................49 5.5.4. Video Blogs ...................................................................................................... 50 5.5.5. Podcasting......................................................................................................... 51 6. Conclusions........................................................................................................................52 References.................................................................................................................................53 Page 5 D6.1 – v. 5 1. Introduction – defining the MESH ‘setting’ In our days we are confronted with vast amounts of information commonly referred to as “news”. News about all aspects of our everyday lives are nowadays accessible to all corners of the world. But how easy is it for anyone to navigate this flood of information and what opportunities are there to get an objective view of controversial events, at national or international level? Was the latest war an invasion or a liberation? Were the latest elections a grand victory or the result of an unfair election system? Our era of knowledge should provide for methods of understanding