Search results for "Communications protocol"
showing 10 items of 76 documents
IN service specification using the KANNEL language
1995
KANNEL is an application-oriented language for protocol engineering, with integrated support for all the main aspects of implementing typical communications software. Intelligent network services with distributed and interacting components share a number of central features with communications protocols, thus bringing in the possibility of applying protocol engineering techniques within the area of intelligent networking. To verify this view, the KANNEL language is applied to the specification of an intelligent calling card service. The specification includes both visual and textual notations of KANNEL.
Interaction Mechanism of Humans in a Cyber-Physical Environment
2015
The research initiative “Industrie 4.0” (I4.0) of the high-tech strategy announced by the German government targets the deployment of a cyber-physical system (CPS) in production and logistics. Such CPS-based environments are characterized by an increasing number of heterogeneous intelligent autonomous and communicating artifacts tightly integrated with humans. Thus, the human’s role will become a composite factor (“man-in-the-mesh”) for this future CPS environment, playing more than just a simple role inside the control loop. This paper investigates the need of a robust communication between CPS and humans, which includes a clear semantic of the exchanged information. For this purpose, a me…
Cross-Technology WiFi/ZigBee Communications: Dealing With Channel Insertions and Deletions
2016
In this letter, we show how cross-technology interference can be exploited to set up a low-rate bidirectional communication channel between heterogeneous WiFi and ZigBee networks. Because of the environment noise and receivers' implementation, the cross-technology channel can be severely affected by insertions and deletions of symbols, whose effects need to be taken into account by the coding scheme and communication protocol.
PDA -- Remote Display Interaction Framework
2008
This paper discusses the design of a PDA-driven remote display control system which was designed for a pervasive computing scenario. Our solution enables a PDA to perform as an interaction device (such as keyboard or mouse) to operate applications which are using remote displays. Our system consists of two components: one devoted to pair users and remote display according to their relative position, and one to provide the PDA with appropriate graphical interfaces and ad-hoc communication protocols. Besides a case study on the use of remote displays during a course with in our department, this paper discusses system highlights, components, and experiments as for standard multimedia and offic…
High-level Programming and Symbolic Reasoning on IoT Resource Constrained Devices
2015
While the vision of Internet of Things (IoT) is rather inspiring, its practical implementation remains challenging. Conventional programming approaches prove unsuitable to provide IoT resource constrained devices with the distributed processing capabilities required to implement intelligent, autonomic, and self-organizing behaviors. In our previous work, we had already proposed an alternative programming methodology for such systems that is characterized by high-level programming and symbolic expressions evaluation, and developed a lightweight middleware to support it. Our approach allows for interactive programming of deployed nodes, and it is based on the simple but effective paradigm of …
A Middleware to Develop and Test Vehicular Sensor Network Applications
2019
The Smart city ecosystem is composed of several networked devices that provide services to citizens and improve their quality of life. Basic services, which must be exposed by the underlying software infrastructure, require efficient networking and communication protocols to coordinate and manage all the system components. In particular, Vehicular Sensor Networks (VSNs) are envisioned as key components of smart cities. Verification is crucial in such a highly dynamic scenario to ensure operation correctness and to reduce the development cost of smart applications. However, the rigidity of existing middlewares makes development, reconfiguration, and testing rather difficult. In this work, we…
Vulnerability evaluation of distributed reputation management systems
2017
In distributed environments, Reputation Management Systems (RMSs) aim to estimate agents' trustworthiness by exploiting different sources of information. The distributed nature of these systems makes them vulnerable to several types of security attacks, and the response provided by a specific RMS depends on various factors, such as the algorithms adopted for estimating the reputation values and the communication protocols used to enable the cooperation among agents. This work examines the most important security attacks against RMSs and proposes a set of metrics for a quantitative evaluation of the RMS vulnerabilities. A parallel simulation framework is used to automatically give a vulnerab…
Modeling Efficient and Effective Communications in VANET through Population Protocols
2021
Vehicular Ad-hoc NETworks (VANETs) enable a countless set of next-generation applications thanks to the technological progress of the last decades. These applications rely on the assumption that a simple network of vehicles can be extended with more complex and powerful network infrastructure, in which several Road Side Units (RSUs) are employed to achieve application-specific goals. However, this assumption is not always satisfied as in many real-world scenarios it is unfeasible to have a conspicuous deployment of RSUs, due to both economic and environmental constraints. With the aim to overcome this limitation, in this paper we investigate how the only Vehicle-to-Vehicle (V2V) communicati…
On the Fidelity of IEEE 802.11 commercial cards
2006
The IEEE 802.11 D CF protocol is known to be fair in terms of long-term resource repartition among the contending stations. However, when considering real scenarios, where commercial 802.11 cards interact, very unpredictable as well as sometimes surprising behaviors emerge. Motivation of this paper is to investigate the reasons of the very evident disagreement between the theoretical IEEE 802.11 DCF protocol models and its practical implementations. Inparticular, we try to characterize the card behavior not only in terms of perceived throughput, but also in terms of low-level channel access operations. In fact, the simple throughput analysis does not allow to identify what affecting paramet…
Improving similarity measures for re-identification of vehicles using AMR sensors
2013
The use of Anisotropic Magneto-Resistive (AMR) sensors for road traffic monitoring has gained popularity in recent years. The Earth magnetic field variations caused by vehicles passing over this kind of sensors can be measured and used for various purposes, including vehicle re-identification at different sensing zones. AMR sensors provide data that allow the calculation of traffic parameters by using simple signal processing techniques. But when vehicle re-identification is the objective, it is not clear which is the best method to compare the signals from different sensors in order to know whether or not they belong to the same vehicle. This paper presents an experimental study with the o…