0000000001298370

AUTHOR

Fabrizio Giuliano

showing 36 related works from this author

Deploying Virtual MAC Protocols Over a Shared Access Infrastructure Using MAClets

2013

Network virtualization has been extensively researched in the last years as a key enabler for improving the network performance. However, virtualization in wireless networks pose some unique challenges: first, the usual over-provisioning approach for providing isolation between multiple virtual entities is not viable; second, the partitioning criteria are often ambiguous, since the actual resources perceived by each entity depend on many external (and time-varying) factors. In this demo, we show an effective virtualization solution for wireless local area networks, solving the problem of isolation and flexible resource paritioning, based on the concept of MAClets. MAClets are software progr…

Full virtualizationHardware virtualizationNetwork packetComputer scienceWireless networkbusiness.industrySettore ING-INF/03 - TelecomunicazioniDistributed computingLocal area networkNetwork virtualizationVirtualizationcomputer.software_genreUploadNetwork performancebusinesscomputerComputer networkCognitive network wireless internet mac layer
researchProduct

A flexible and reconfigurable 5G networking architecture based on context and content information

2017

The need for massive content delivery is a consolidated trend in mobile communications, and will even increase for next years. Moreover, while 4G maturity and evolution is driven by video contents, next generation (5G) networks will be dominated by heterogeneous data and additional massive diffusion of Internet of Things (IoT). The current network architecture is not sufficient to cope with such traffic, which is heterogeneous in terms of latency and QoS requirements, and variable in space and time. This paper proposes architectural advances to endow the network with the necessary flexibility helping to adapt to these varying traffic needs by providing content and communication services whe…

5G networkingComputer scienceflexible HW/SW platforms 5G networking context-awareness content-centric networks reconfigurability050801 communication & media studies02 engineering and technologyflexible HW/SW platforms 5G networking context-awareness; content-centric networks; reconfigurability.0508 media and communications0202 electrical engineering electronic engineering information engineeringReference architectureArchitectureNetwork architecturebusiness.industrySettore ING-INF/03 - TelecomunicazioniQuality of service05 social sciencesflexible HW/SW platformscontent-centric networkscontext-awarenessReconfigurability020206 networking & telecommunicationsApplications architectureMobile telephonybusinessreconfigurability5GComputer network
researchProduct

A decentralized load control architecture for smart energy consumption in small islands

2020

Abstract In this paper we propose the adoption of Overgrid, a new decentralized load control architecture, for balancing the energy production variations introduced with the adoption of renewable sources, facilitating and improving the smart energy retrofit. The system is presented and applied for managing the aggregated daily load profile of a community of domestic end-users in the island of Lampedusa, Italy, exploiting the load profiles gathered in a real measurement campaign. The Overgrid Demand Response (DR) architecture is used for managing the residential flexible loads, estimating the aggregated power demand without any centralized server and creating a virtual “community” of smart b…

Computer scienceDistributed computingGeography Planning and Development0211 other engineering and technologiesOverlay networkTransportationSmart grid02 engineering and technology010501 environmental sciences01 natural sciencesLoad profileDemand responseLoad shifting021108 energy0105 earth and related environmental sciencesCivil and Structural EngineeringBuilding automationRenewable Energy Sustainability and the Environmentbusiness.industryLoad curtailingLoad curtailing; Load shifting; Overlay network; Smart gridEnergy consumptionRenewable energySmart gridElectricity generationbusinessLoad shiftingSustainable Cities and Society
researchProduct

Learning from Errors: Detecting ZigBee Interference in WiFi Networks

2014

In this work we show how to detect ZigBee interference on commodity WiFi cards by monitoring the reception errors, such as synchronization errors, invalid header formats, too long frames, etc., caused by ZigBee transmissions. Indeed, in presence of non-WiFi modulated signals, the occurrence of these types of errors follows statistics that can be easily recognized. Moreover, the duration of the error bursts depends on the transmission interval of the interference source, while the error spacing depends on the receiver implementation. On the basis of these considerations, we propose the adoption of hidden Markov chains for characterizing the behavior of WiFi receivers in presence of controlle…

business.industryComputer scienceSettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSReal-time computingwlan 802.11 802.15.4 frame error detection wireless coexistenceInterval (mathematics)Interference (wave propagation)SynchronizationLearning from errorsTransmission (telecommunications)HeaderbusinessHidden Markov modelComputer networkNeuRFon
researchProduct

MAC design on real 802.11 devices: From exponential to Moderated Backoff

2016

In this paper we describe how a novel backoff mechanism called Moderated Backoff (MB), recently proposed as a standard extension for 802.11 networks, has been prototyped and experimentally validated on a commercial 802.11 card before being ratified. Indeed, for performance reasons, the time critical operations of MAC protocols, such as the backoff mechanism, are implemented into the card hardware/firmware and cannot be arbitrarily changed by third parties or by manufacturers only for experimental reasons. Our validation has been possible thanks to the availability of the so called Wireless MAC Processor (WMP), a prototype of a novel wireless card architecture in which MAC protocols can be p…

Settore ING-INF/03 - Telecomunicazionibusiness.industryFirmwareWireless ad hoc networkComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS05 social sciences050801 communication & media studies020206 networking & telecommunicationsTime critical02 engineering and technologyDistributed coordination functioncomputer.software_genreExponential functionComputer Networks and Communication0508 media and communicationsFormal languageMedia Technology0202 electrical engineering electronic engineering information engineeringWirelessbusinesscomputerComputer network2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)
researchProduct

Learning From Errors: Detecting Cross-Technology Interference in WiFi Networks

2018

In this paper, we show that inter-technology interference can be recognized using commodity WiFi devices by monitoring the statistics of receiver errors. Indeed, while for WiFi standard frames the error probability varies during the frame reception in different frame fields (PHY, MAC headers, and payloads) protected with heterogeneous coding, errors may appear randomly at any point during the time the demodulator is trying to receive an exogenous interfering signal. We thus detect and identify cross-technology interference on off-the-shelf WiFi cards by monitoring the sequence of receiver errors (bad PLCP, bad FCS, invalid headers, etc.) and propose two methods to recognize the source of in…

MonitoringComputer Networks and CommunicationsComputer scienceReal-time computingheterogeneous network050801 communication & media studies02 engineering and technologySpectrum managementZigBee0508 media and communicationsArtificial IntelligencePHY0202 electrical engineering electronic engineering information engineeringLong Term EvolutionDemodulationWireless fidelityHidden Markov modelsHidden Markov modelCross technology interferenceArtificial neural networkSettore ING-INF/03 - Telecomunicazioni05 social sciencesComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKScoexistenceunlicensed bands020206 networking & telecommunicationsThroughputLearning from errorsHardware and ArchitectureInterferenceCoding (social sciences)
researchProduct

Designing the 5G network infrastructure: a flexible and reconfigurable architecture based on context and content information

2018

5G networks will have to offer extremely high volumes of content, compared to those of today’s. Moreover, they will have to support heterogeneous traffics, including machine-to-machine, generated by a massive volume of Internet-of-Things devices. Traffic demands will be variable in time and space. In this work, we argue that all this can be achieved in a cost-effective way if the network is flexible and reconfigurable. We present the Flex5Gware network architecture, designed to meet the above requirements. Moreover, we discuss the links between flexibility and reconfigurability, on the one side, and context awareness and content awareness, on the other; we show how two of the building…

5G networkingStandardizationFlexible HW/SW platformComputer Networks and CommunicationsComputer scienceContext-awareneDistributed computinglcsh:TK7800-8360050801 communication & media studies02 engineering and technologylcsh:Telecommunication0508 media and communicationslcsh:TK5101-6720flexible HW/SW platforms 5G networking context-awareness; content-awareness; reconfigurability0202 electrical engineering electronic engineering information engineeringContext awarenessArchitecturecontent-awarenessNetwork architectureAccess networklcsh:Electronicsflexible HW/SW platforms05 social sciencescontext-awarenessReconfigurabilityControl reconfigurationComputer Science Applications1707 Computer Vision and Pattern Recognition020206 networking & telecommunicationsComputer Science ApplicationsContent-awareneSignal Processingreconfigurability5GEURASIP Journal on Wireless Communications and Networking
researchProduct

MAC-Engine

2011

In this demo, we prove that the flexibility supported by off-the-shelf IEEE 802.11 hardware can be significantly extended if we move the control of the MAC programming interface from the driver to the firmware, i.e. from the host CPU to the card CPU. To this purpose, we introduce the concept of MAC--Engine, that is an executor of Programmable Finite State Machines (PFSM) implemented at the firmware level: we show how the card itself can support different protocol logics thanks to PFSM bytecode representations that can be dynamically injected inside the card memory at run-time without incurring in down time issues or network disconnect events. We provide different PFSM examples in order to t…

DowntimeFinite-state machineComputer scienceFirmwarebusiness.industryInterface (computing)computer.software_genreExecutorBytecodeEmbedded systemOperating systembusinessProtocol (object-oriented programming)computerHost (network)Computer hardwareProceedings of the 6th ACM international workshop on Wireless network testbeds, experimental evaluation and characterization
researchProduct

Exploring Training Options for RF Sensing Using CSI

2018

This work analyzes human behavior recognition approaches using WiFi channel state information from the perhaps less usual point of view of training and calibration needs. With the help of selected literature examples, as well as with more detailed experimental insights on our own Doppler spectrum-based approach for physical motion/presence/cardinality detection, we first classify the diverse forms of training so far employed into three main categories (trained, trained-once, and training-free). We further discuss under which conditions it is possible to move toward lighter forms of calibration or even succeed in devising fully untrained model-based solutions. Our take home messages are main…

Point (typography)Settore ING-INF/03 - TelecomunicazioniComputer Networks and CommunicationsCalibration (statistics)Computer sciencebusiness.industry010401 analytical chemistryBehavioural sciences020206 networking & telecommunications02 engineering and technologyMachine learningcomputer.software_genreTraining Wireless fidelity Calibration Doppler effect Behavioral sciences Radio frequency Sensors Channel state estimation01 natural sciencesTraining (civil)Motion (physics)0104 chemical sciencesComputer Science ApplicationsPersonalization0202 electrical engineering electronic engineering information engineeringArtificial intelligenceElectrical and Electronic EngineeringbusinesscomputerIEEE Communications Magazine
researchProduct

Enabling a win-win coexistence mechanism for WiFi and LTE in unlicensed bands

2018

The problem of WiFi and LTE coexistence has been significantly debated in the last years, with the emergence of LTE extensions enabling the utilization of unlicensed spectrum for carrier aggregation. Since the two technologies employ com-pletely different access protocols and frame transmission times, supporting coexistence with minimal modifications on existing protocols is not an easy task. Current solutions are often based on LTE unilateral adaptations, being LTE in unlicensed bands still under definition. In this paper, we demonstrate that it is possible to avoid a subordinated role for WiFi nodes, by simply equipping WiFi nodes with a sensing mechanism based on adaptive tunings of the …

IEEE 802.11Information Systems and ManagementUnlicensed bandbusiness.industryComputer scienceWiFiComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS05 social sciencesMechanism based050801 communication & media studies020206 networking & telecommunications02 engineering and technologySpectrum managementScheduling (computing)Win-win game0508 media and communicationsIEEE 802.11Computer Networks and CommunicationWhite spaces0202 electrical engineering electronic engineering information engineeringLTE-UbusinessComputer networkISM coexistency
researchProduct

Wireless MAC processors: programming MAC protocols on commodity hardware

2012

Programmable wireless platforms aim at responding to the quest for wireless access flexibility and adaptability. This paper introduces the notion of wireless MAC processors. Instead of implementing a specific MAC protocol stack, Wireless MAC processors do support a set of Medium Access Control “commands” which can be run-time composed (programmed) through software-defined state machines, thus providing the desired MAC protocol operation. We clearly distinguish from related work in this area as, unlike other works which rely on dedicated DSPs or programmable hardware platforms, we experimentally prove the feasibility of the wireless MAC processor concept over ultra-cheap commodity WLAN hardw…

Chipsetbusiness.industryFirmwareComputer scienceSettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSReconfigurabilityNetwork interfacecomputer.software_genreWLAN 802.11 reconfigurabilityProtocol stackCognitive radioprogrammable MACEmbedded systemWireless lancognitive radio overlay software modules running on the host computer.WirelessbusinesscomputerWireless distribution systemComputer network
researchProduct

Enabling Cognitive-Radio Paradigm on Commercial Off-The-Shelf 802.11 Hardware

2013

Cognitive Radio paradigm (CR) has been recognized as key enabler for next generation wireless networking: the pos- sibility to access the limited radio spectrum in an oppor- tunistic manner allows secondary users to boost their trans- mission performance without interfering with existing pri- mary networks. Full testing and experimenting with this paradigm, however, is still a tough task, given either the i) limited capabilities above the PHY layer of cheap SDR so- lutions, or the ii) heavy investment required for setting up multi-node testbeds powered by FPGAs. In this demo we show how we leveraged our Wireless MAC Processor archi- tecture to tackle the two issues at the same time, providi…

Wireless networkbusiness.industryComputer scienceSettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPhysical layerLocal area networkMicroarchitectureCognitive radioEmbedded systemCognitive radio Wireless MAC Processor ControlWirelessbusinessCommercial off-the-shelfCommunication channelComputer network
researchProduct

DEMO: Unconventional WiFi-ZigBee communications without gateways

2014

Nowadays, the overcrowding of ISM bands is becoming an evident limitation for the performance and widespread usage of 802.11 and 802.15.4 technologies. In this demo, we prove that it is possible to opportunistically exploit the inter-technology interference between 802.11 and 802.15.4 to build an unconventional low-rate communication channel and signalling protocol, devised to improve the performance of each contending technology. Differently from previous solutions, inter-technology communications do not require the deployment of a gateway with two network interfaces, but can be activated (when needed) directly between two heterogeneous nodes, e.g. a WiFi node and a ZigBee node. This capab…

Exploitbusiness.industryComputer scienceSettore ING-INF/03 - TelecomunicazioniReading (computer)Node (networking)WiFiComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSNetwork interfacezigbeeEmbedded systemDefault gatewayComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMSbusinessProtocol (object-oriented programming)Computer networkNeuRFonCommunication channel
researchProduct

A Navigation and Augmented Reality System for Visually Impaired People

2021

In recent years, we have assisted with an impressive advance in augmented reality systems and computer vision algorithms, based on image processing and artificial intelligence. Thanks to these technologies, mainstream smartphones are able to estimate their own motion in 3D space with high accuracy. In this paper, we exploit such technologies to support the autonomous mobility of people with visual disabilities, identifying pre-defined virtual paths and providing context information, reducing the distance between the digital and real worlds. In particular, we present ARIANNA+, an extension of ARIANNA, a system explicitly designed for visually impaired people for indoor and outdoor localizati…

navigation; visually impaired; computer vision; augmented reality; cultural context; convolutional neural network; machine learning; hapticExploitComputer scienceconvolutional neural networkImage processingContext (language use)02 engineering and technologyTP1-1185BiochemistryConvolutional neural networkArticleMotion (physics)computer visionAnalytical ChemistrySettore ING-INF/04 - AutomaticaArtificial IntelligenceHuman–computer interactioncultural context0202 electrical engineering electronic engineering information engineeringHumansElectrical and Electronic EngineeringnavigationInstrumentationHaptic technologySettore ING-INF/03 - TelecomunicazioniChemical technology020206 networking & telecommunicationsAtomic and Molecular Physics and Opticsaugmented realitymachine learning020201 artificial intelligence & image processingAugmented realityvisually impairedNeural Networks ComputerhapticAlgorithmsVisually Impaired PersonsPATH (variable)augmented reality computer vision convolutional neural network cultural context haptic machine learning navigation visually impaired Algorithms Artificial Intelligence Humans Neural Networks Computer Augmented Reality Visually Impaired PersonsSensors
researchProduct

Privacy-Preserving Overgrid: Secure Data Collection for the Smart Grid

2020

In this paper, we present a privacy-preserving scheme for Overgrid, a fully distributed peer-to-peer (P2P) architecture designed to automatically control and implement distributed Demand Response (DR) schemes in a community of smart buildings with energy generation and storage capabilities. To monitor the power consumption of the buildings, while respecting the privacy of the users, we extend our previous Overgrid algorithms to provide privacy preserving data aggregation (PP-Overgrid). This new technique combines a distributed data aggregation scheme with the Secure Multi-Party Computation paradigm. First, we use the energy profiles of hundreds of buildings, classifying the amount of &ldquo

Overlay networksComputer scienceDistributed computingOverlay networkSmart grid02 engineering and technologylcsh:Chemical technologyBiochemistryArticlePeer to peerAnalytical ChemistryDemand response0202 electrical engineering electronic engineering information engineeringlcsh:TP1-1185Electrical and Electronic EngineeringSecret sharingInstrumentationOvergridBuilding automationP2P020203 distributed computingbusiness.industryDistributed; Gossiping; Overgrid; Overlay networks; P2P; Peer to peer; Privacy; Secret sharing; Smart grid020206 networking & telecommunicationsEnergy consumptionAtomic and Molecular Physics and OpticsRenewable energyDistributedElectricity generationSmart gridPrivacyGossipingbusinessSensors
researchProduct

An Inter-Technology Communication Scheme for WiFi/ZigBee Coexisting Networks

2017

In this paper we show how inter-technology interference can be exploited to set-up a low-rate bi-directional communication channel between heterogeneous technologies, which coexist in ISM bands. In particular, we focus on WiFi and ZigBee networks, whose high density deployments make coexistence a critical issue. We monitor the transmission duration of the interference and, after recognizing ZigBee interference from WiFi off-the-shelf receivers, we precisely measure the channel busy intervals to map time duration to communication symbols. A similar approach is used on the ZigBee receivers for making the communication channel bidirectional. Extensive experimental results show the feasibility …

ZigBeeSettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKScoexistenceWiFi ZigBee wireless networkComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMSWireless LAN
researchProduct

Performance of LoRa for Bike-Sharing Systems

2019

Today bike sharing systems are becoming popular in many cities as short-distance transit vehicles. More than 18 million bicycles are available worldwide for public use and one of the main problems that afflicts such sharing systems is the loss of bikes, which can be stolen or simply left in unknown locations. Thus, many bikes are docked or tracked using GPS and costly cellular connections. In this paper, we consider the emerging Long Range (LoRa) technology for use in bike sharing systems. LoRa exploits free ISM bands and has been conceived for low power and low data rate applications. Additionally, LoRa is characterized by large cells and heterogeneous application domains, which may lead t…

ExploitSettore ING-INF/03 - Telecomunicazionibusiness.industryComputer science020209 energy020208 electrical & electronic engineeringAutomotive industry02 engineering and technologyScalabilityLow data rate0202 electrical engineering electronic engineering information engineeringGlobal Positioning SystemBike sharingbusinessInternet of ThingsLoRa LoRaWAN Low Power Wide Area Net-works (LPWAN) Automotive Vehicular Network (VANET) bikebike-sharing tracker IoTComputer network2019 AEIT International Conference of Electrical and Electronic Technologies for Automotive (AEIT AUTOMOTIVE)
researchProduct

Wireless MAC Processor Networking: A Control Architecture for Expressing and Implementing High-Level Adaptation Policies in WLANs

2013

The current proliferation of unplanned wireless local area networks (WLANs) is creating the need for implementing different adaptation strategies to improve network performance under mutating and evolving interference scenarios. In this article, we envision a new solution for expressing and implementing high-level adaptation policies in WLANs, in contrast to the current approaches based on vendor-specific implementations. We exploit the hardware abstraction interface recently proposed by the wireless medium access control (MAC) processor (WMP) architecture and some flow-control concepts similar to the Openflow model for defining MAC adaptation policies. A simple control architecture for dis…

OpenFlowbusiness.industryWireless networkService setComputer scienceSettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSWireless WANlaw.inventionlawAutomotive EngineeringMultiple Access with Collision Avoidance for WirelessWi-FiControl architecture Wireless MAC Processor MAClet distribution flow controlbusinessHeterogeneous networkComputer networkWireless distribution system
researchProduct

Interference Cancellation for LoRa Gateways and Impact on Network Capacity

2021

In this paper we propose LoRaSyNc (LoRa receiver with SyNchronization and Cancellation), a second generation LoRa receiver that implements Successive Interference Cancellation (SIC) and time synchronization to improve the performance of LoRa gateways. Indeed, the chirp spread spectrum modulation employed in LoRa experiences very high capture probability, and cancelling the strongest signal in case of collisions can significantly improve the cell capacity. An important feature of LoRaSyNc is the ability to track the frequency and clock drifts between the transmitter and receiver, during the whole demodulation of the interfered frame. Due to the use of low-cost oscillators on end-devices, a s…

General Computer ScienceComputer scienceInternet of ThingsinterferenceChirp spread spectrumSilicon carbideSignalReceiversSettore ING-INF/01 - ElettronicaLoRaSynchronizationLPWANElectronic engineeringDemodulationGeneral Materials ScienceComputer architecturesynchronized signalsscalabilityClocksFrame (networking)TransmitterGeneral Engineeringinterference cancellationLogic gatesLoRaWANTK1-9971Single antenna interference cancellationModulationspreading factorElectrical engineering. Electronics. Nuclear engineeringCapture effectIEEE Access
researchProduct

MAClets: Active MAC Protocols over hard-coded devices

2012

We introduce MAClets, software programs uploaded and executed on-demand over wireless cards, and devised to change the card's real-time medium access control operation. MAClets permit seamless reconfiguration of the MAC stack, so as to adapt it to mutated context and spectrum conditions and perform tailored performance optimizations hardly accountable by an once-for-all protocol stack design. Following traditional active networking principles, MAClets can be directly conveyed within data packets and executed on hard-coded devices acting as virtual MAC machines. Indeed, rather than executing a pre-defined protocol, we envision a new architecture for wireless cards based on a protocol interpr…

WLAN 802.11business.industryComputer scienceNetwork packetSettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSNetwork virtualizationControl reconfigurationAccess controlProtocol stackSoftware portabilityprogrammable MACEmbedded systemcognitive radiobusinessProtocol (object-oriented programming)reconfigurabilityActive networkingComputer network
researchProduct

Error-Based Interference Detection in WiFi Networks

2017

In this paper we show that inter-technology interference can be recognized by commodity WiFi devices by monitoring the statistics of receiver errors. Indeed, while for WiFi standard frames the error probability varies during the frame reception in different frame fields (PHY, MAC headers, payloads) protected with heterogeneous coding, errors may appear randomly at any point during the time the demodulator is trying to receive an exogenous interfering signal. We thus detect and identify cross-technology interference on off-the-shelf WiFi cards by monitoring the sequence of receiver errors (bad PLCP, bad PCS, invalid headers, etc.) and develop an Artificial Neural Network (ANN) to recognize t…

Artificial Neural NetworkNeuronsMonitoringComputer scienceSettore ING-INF/03 - Telecomunicazioni05 social sciencesReal-time computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS050801 communication & media studies020206 networking & telecommunicationsWireless LAN02 engineering and technologySpectrum managementReceiversZigBee0508 media and communicationsComputer Networks and CommunicationPHYHardware and Architecture0202 electrical engineering electronic engineering information engineeringLong Term EvolutionDemodulationWireless fidelitySafety Risk Reliability and QualityInterference
researchProduct

Cross-Technology WiFi/ZigBee Communications: Dealing With Channel Insertions and Deletions

2016

In this letter, we show how cross-technology interference can be exploited to set up a low-rate bidirectional communication channel between heterogeneous WiFi and ZigBee networks. Because of the environment noise and receivers' implementation, the cross-technology channel can be severely affected by insertions and deletions of symbols, whose effects need to be taken into account by the coding scheme and communication protocol.

Settore ING-INF/03 - TelecomunicazioniComputer sciencebusiness.industryWiFichannelinterferencewireless coexistenceComputer Science Applications1707 Computer Vision and Pattern Recognition020206 networking & telecommunications020302 automobile design & engineeringinterference; wireless coexistence; WLAN; Modeling and Simulation; Computer Science Applications1707 Computer Vision and Pattern Recognition; Electrical and Electronic Engineering02 engineering and technologyComputer Science ApplicationsWLANZigBee0203 mechanical engineeringModeling and Simulation0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringbusinessCommunications protocolComputer networkCommunication channelIEEE Communications Letters
researchProduct

Overgrid: A Fully Distributed Demand Response Architecture Based on Overlay Networks

2017

In this paper, we present Overgrid, a fully distributed peer-to-peer (P2P) architecture designed to automatically control and implement distributed demand response (DR) schemes in a community of smart buildings with energy generation and storage capabilities. As overlay networks in communications establish logical links between peers regardless of the physical topology of the network, the Overgrid is able to apply some power balance criteria to its system of buildings, as they belong to a virtual microgrid, regardless of their physical location. We exploit an innovative distributed algorithm, called flow updating, for monitoring the power consumption of the buildings and the number of nodes…

EngineeringSettore ING-IND/11 - Fisica Tecnica AmbientaleSettore ING-INF/03 - Telecomunicazionibusiness.industry020209 energyDistributed computingOverlay network02 engineering and technologyEnergy consumptionNetwork topologySettore ING-IND/33 - Sistemi Elettrici Per L'EnergiaDemand responseControl and Systems EngineeringDistributed algorithm0202 electrical engineering electronic engineering information engineeringMicrogridElectrical and Electronic EngineeringbusinessReference modelBuilding automationComputer networkIEEE Transactions on Automation Science and Engineering
researchProduct

Making WiFi work in multi-hop topologies: Automatic negotiation and allocation of airtime

2015

We propose a solution for mitigating the performance impairments of CSMA/CA protocols in multi-hop topologies based on the dynamic adaptation of the contention process experienced by nodes in a wireless network. A distributed protocol is used to negotiate the channel airtime for a node as a function of the traffic requirements of its neighbourhood, taking into account bandwidth reserved for the control operations. A mechanism is provided for a node to tune its contention window depending on its allocated airtime. Different from previous schemes, a node's contention window is fixed in size unless the traffic requirements of its neighbourhood change. The scheme is implemented on legacy commer…

Wireless networkbusiness.industryComputer scienceSettore ING-INF/03 - TelecomunicazioniDistributed computingmedia_common.quotation_subjectComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTestbedCrewNeighbourhood (graph theory)TestbedNegotiation protocolNetwork topologyHop (networking)NegotiationMulti-hop WIFIComputer Networks and CommunicationControl and Systems EngineeringbusinessComputer networkmedia_common
researchProduct

Demo - Dynamic Adaptations of WiFi Channel Widths Without TX/RX Coordination

2017

Most modern standards for wireless communications support physical layer adaptations, in terms of dynamic selection of channel central frequency, transmission power, modulation format, etc., in order to increase link robustness under time-varying propagation and interference conditions. In this demo, we demonstrate that another powerful solution for extending physical layer flexibility in OFDM-based technologies is the dynamic adaptation of the channel width. Although some standards already define the possibility of utilizing multiple channel widths (e.g. 20MHz, 10MHz, 5MHz for IEEE 802.11a standards), such an utilization is limited to a static configuration of a value defined during the ne…

business.industryOrthogonal frequency-division multiplexingComputer scienceTransmitterPhysical layer020206 networking & telecommunications02 engineering and technologyIEEE 802.11Cognitive radioRobustness (computer science)0202 electrical engineering electronic engineering information engineeringElectronic engineeringWirelessCenter frequencybusinessComputer networkProceedings of the 23rd Annual International Conference on Mobile Computing and Networking - MobiCom 17
researchProduct

MAC learning

2016

Cognition as a way to deal with the challenges of future wireless networks has been largely considered by the recent literature, with a main focus on physical layer adaptability and dynamic spectrum access. In this demo, we show how a simple cognition mechanism can be also applied at the MAC layer, by exploiting the emerging paradigm of programmable wireless cards. The idea is using the formal definition of simple MAC protocol components and platform-independent representation of channel events gathered from the wireless node, for emulating the behavior of protocols which are not currently running on the network, learning about their expected performance, and dynamically reconfiguring the w…

ScheduleSIMPLE (military communications protocol)Wireless networkbusiness.industryComputer scienceDistributed computingNode (networking)Physical layer020206 networking & telecommunications02 engineering and technology0202 electrical engineering electronic engineering information engineeringWirelessbusinessProtocol (object-oriented programming)Computer networkCommunication channelProceedings of the Tenth ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation, and Characterization
researchProduct

Exploiting programmable architectures for WiFi/ZigBee inter-technology cooperation

2014

The increasing complexity of wireless standards has shown that protocols cannot be designed once for all possible deployments, especially when unpredictable and mutating interference situations are present due to the coexistence of heterogeneous technologies. As such, flexibility and (re)programmability of wireless devices is crucial in the emerging scenarios of technology proliferation and unpredictable interference conditions. In this paper, we focus on the possibility to improve coexistence performance of WiFi and ZigBee networks by exploiting novel programmable architectures of wireless devices able to support run-time modifications of medium access operations. Differently from software…

Technology and EngineeringCognitive networksComputer Networks and CommunicationsComputer scienceDynamic MAC adaptationTime division multiple access02 engineering and technologyMAC protocolMAC protocols0202 electrical engineering electronic engineering information engineeringWirelessCross-technology interferenceINTERFERENCEProtocol prototypingSettore ING-INF/03 - Telecomunicazionibusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsCognitive networkComputer Science ApplicationsEmbedded systemSignal ProcessingInterference avoidanceIBCNWireless network control020201 artificial intelligence & image processingbusinessCognitive networkDecoupling (electronics)Communication channelComputer networkEURASIP Journal on Wireless Communications and Networking
researchProduct

ErrorSense: Characterizing WiFi Error Patterns for Detecting ZigBee Interference

2014

Recent years have witnessed the increasing adoption of heterogeneous wireless networks working in unlicensed ISM bands, thus creating serious problems of spectrum overcrowding. Although ZigBee, Bluetooth and WiFi networks have been natively designed for working in presence of interference, it has been observed that several performance impairments may occur because of heterogeneous sensitivity to detect or react to the presence of other technologies. In this paper we focus on the WiFi capability to detect interfering ZigBee links. Despite of the narrowband transmissions performed by ZigBee, in emerging scenarios ZigBee interference can have a significant impact on WiFi performance. Therefore…

Computer scienceWireless networkbusiness.industrySettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSwlan 802.11 802.15.4 frame error detection wireless coexistenceInterference (wave propagation)law.inventionBluetoothNarrowbandlawSensitivity (control systems)businessHeterogeneous networkComputer networkNeuRFon
researchProduct

A cultural heritage experience for visually impaired people

2020

Abstract In recent years, we have assisted to an impressive advance of computer vision algorithms, based on image processing and artificial intelligence. Among the many applications of computer vision, in this paper we investigate on the potential impact for enhancing the cultural and physical accessibility of cultural heritage sites. By using a common smartphone as a mediation instrument with the environment, we demonstrate how convolutional networks can be trained for recognizing monuments in the surroundings of the users, thus enabling the possibility of accessing contents associated to the monument itself, or new forms of fruition for visually impaired people. Moreover, computer vision …

Cultural heritagePotential impactComputer scienceVisually impairedHuman–computer interactionSettore ING-INF/03 - TelecomunicazioniMediationComputer vision algorithmsImage processingnavigation visually impaired computer vision augmented reality cultural context convolutional neural network machine learning hapticPhysical accessibility
researchProduct

MAC–Engine: a new architecture for executing MAC algorithms on commodity WiFi hardware

2011

In this demo, we prove that the flexibility supported by off–the–shelf IEEE 802.11 hardware can be significantly ex- tended if we move the control of the MAC programming interface from the driver to the firmware, i.e. from the host CPU to the card CPU. To this purpose, we introduce the concept of MAC–Engine, that is an executor of Pro- grammable Finite State Machines (PFSM) implemented at the firmware level: we show how the card itself can support different protocol logics thanks to PFSM bytecode repre- sentations that can be dynamically injected inside the card memory at run-time without incurring in down time issues or network disconnect events. We provide different PFSM examples in order…

Settore ING-INF/03 - TelecomunicazioniIEEE 802.11 Programmable MAC EFSM
researchProduct

Supporting code mobility and dynamic reconfigurations over Wireless MAC Processor Prototype

2014

Mobile networks for Internet Access are a fundamental segment of Internet access net- works, where resource optimization are really critical because of the limited bandwidth availability. While traditionally resource optimizations have been focused on high effi- cient modulation and coding schemes, to be dynamically tuned according to the wireless channel and interference conditions, it has also been shown how medium access schemes can have a significant impact on the network performance according to the application and networking scenarios. This thesis work proposes an architectural solution for supporting Medium Access Con- trol (MAC) reconfigurations in terms of dynamic programming and c…

Settore ING-INF/03 - TelecomunicazioniWireless MAC Processor Software Defined Network Network Programmability Cognitive Network
researchProduct

Demo - MAC learning: Enabling automatic combination of elementary protocol components

2016

Cognition as a way to deal with the challenges of future wireless networks has been largely considered by the recent literature, with a main focus on physical layer adaptability and dynamic spectrum access. In this demo, we show how a simple cognition mechanism can be also applied at the MAC layer, by exploiting the emerging paradigm of programmable wireless cards. The idea is using the formal definition of simple MAC protocol components and platform-independent representation of channel events gathered from the wireless node, for emulating the behavior of protocols which are not currently running on the network, learning about their expected performance, and dynamically reconfiguring the w…

Computer Networks and CommunicationHardware and ArchitectureSettore ING-INF/03 - TelecomunicazioniSoftware
researchProduct

WMPS: A Positioning System for Localizing Legacy 802.11 Devices

2012

The huge success of location-aware applications calls for the quick development of a positioning system alternative to GPS for indoor localization based on existing technologies such as 802.11 wireless networks. In this paper we propose WMPS, the Wireless MAC Processor Positioning System, that is a localization system running on off-the-shelf 802.11 Access Points and based on time-of-flight ranging of users’ standard terminals. We prove through extensive experiments that propagation delays can be measured with the accuracy required by indoor applications despite the different noise components that can affect the result, like latencies of the hardware transreceivers, multi- path, ACK jitters…

Settore ING-INF/03 - Telecomunicazioniindoor positioning system WiFi-based localization time of arrival
researchProduct

BusyBee: Low Rate WiFi-ZigBee Communications without Gateways

2014

Nowadays, the overcrowding of ISM bands is becoming an evident limitation for the performance and widespread us- age of 802.11 and 802.15.4 technologies. In this demo, we prove that it is possible to opportunistically exploit the inter- technology interference between 802.11 and 802.15.4 to build an unconventional low-rate communication channel and sig- nalling protocol, devised to improve the performance of each contending technology. Differently from previous solutions, inter-technology communications do not require the deploy- ment of a gateway with two network interfaces, but can be activated (when needed) directly between two heterogeneous nodes, e.g. a WiFi node and a ZigBee node. Thi…

noisebusywmpcommunicationSettore ING-INF/03 - Telecomunicazioniwifizigbee
researchProduct

Method of changing the operation of wireless network nodes

2013

Settore ING-INF/03 - Telecomunicazioniwireless network node MAC protocol finite state machine
researchProduct

Control Architecture for Wireless MAC Processor Networking

2013

Abstract: In these years, the proliferation of unplanned WLANs is creating the need of implementing different adaptation strategies for improving the network per- formance under mutating and evolving interference scenarios. Many vendors pro- pose undisclosed MAC/PHY optimization solutions, such as ambient noise immunity schemes, dynamic tuning of operating channels and contention parameters, etc., rely- ing on low-level implementations in the card hardware/firmware. In this paper we envision a new solution for expressing and implementing high-level adaptation policies in WLANs, in contrast to the current approaches based on vendor- specific implementations. We exploit the hardware abstracti…

Settore ING-INF/03 - TelecomunicazioniControl architecture Wireless MAC Processor MAClet distribution flow control
researchProduct