Marco Savi

Marco Savi
Università degli Studi di Milano-Bicocca | UNIMIB · Department of Informatics, Systems and Communication (DISCo)

PhD
Telecommunication networks and cloud

About

55
Publications
12,373
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
557
Citations
Introduction
Marco Savi is an Assistant Professor at University of Milano-Bicocca (Milano, Italy). In 2016, he pursued a Ph.D. degree in Information Technology at Politecnico di Milano (Milano, Italy). From March 2016 to March 2020 he worked with Fondazione Bruno Kessler (Trento, Italy) as Researcher (being promoted to Expert Researcher in 2018). He is currently working on several topics related to telecommunication networks and cloud computing.
Additional affiliations
March 2016 - March 2020
Fondazione Bruno Kessler
Position
  • PostDoc Position
January 2016 - February 2016
Politecnico di Milano
Position
  • PhD Student
Education
January 2013 - June 2016
Politecnico di Milano
Field of study
  • Information Technology

Publications

Publications (55)
Article
Full-text available
LoRa is a long-range and low-power radio technology largely employed in Internet of Things (IoT) scenarios. It defines the lower physical layer while other protocols, such as LoRaWAN, define the upper layers of the network. A LoRaWAN network assumes a star topology where each of the nodes communicates with multiple gateways which, in turn, forward...
Article
Full-text available
Residential short-term energy consumption forecasting plays an essential role in modern decentralized power systems. The rise of innovative prediction methods able to handle the high volatility of users’ electrical load has posed the basis to accomplish this task. However these methods, which mostly rely on Artificial Neural Networks, require that...
Conference Paper
Full-text available
Edge Computing pushes cloud capabilities to the edge of the network, closer to the users, to address stringent Quality-of-Service requirements and ensure more efficient bandwidth usage. Function-as-a-Service appears to be the most natural service model solution to enhance Edge Computing applications' deployment and responsiveness. Unfortunately, th...
Article
Distributed Denial-of-Service (DDoS) attacks represent a persistent threat to modern telecommunications networks: detecting and counteracting them is still a crucial unresolved challenge for network operators. DDoS attack detection is usually carried out in one or more central nodes that collect significant amounts of monitoring data from networkin...
Article
Full-text available
Volumetric distributed Denial-of-Service (DDoS) attacks have become one of the most significant threats to modern telecommunication networks. However, most existing defense systems require that detection software operates from a centralized monitoring collector, leading to increased traffic load and delayed response. The recent advent of Data Plane...
Conference Paper
In the last few years, some research papers have proposed usage of UAVs organized in Flying Ad-Hoc Network (FANET) in remote areas with a poor or completely non-existent structured network to support novel application scenarios in which data generated by the end users must be processed on site with ultra-low latency. This way, a FANET can be seen a...
Article
Full-text available
Personalization is an important factor to increase the user experience (UX) and effectiveness of mHealth solutions. In this paper, we present an innovative approach to the personalization of mHealth apps. A profiling function has been developed based on the physical and psychological characteristics of users, with the final aim to cluster them acti...
Conference Paper
Full-text available
Network monitoring is of paramount importance for effective network management: it allows to constantly observe a network's behavior to ensure it is working as intended, and can trigger both automated and manual remediation procedures in case of failures and anomalies. Software-Defined Networking (SDN) decouples the control plane of network infrast...
Conference Paper
Full-text available
Network Function Virtualization has established itself as one of the most important paradigms towards software-based networking. While today Virtual Network Functions (VNFs) are typically deployed in the form of serverful virtual-machine or container-based applications, the emergence of serverless computing opens the door to the possibility of impl...
Article
Full-text available
Network Function Virtualization (NFV) provides higher flexibility for network operators and reduces the complexity in network service deployment. Using NFV, Virtual Network Functions (VNF) can be located in various network nodes and chained together in a Service Chain (SC) to provide a specific service. Consolidating multiple VNFs in a smaller numb...
Conference Paper
Full-text available
The emergence of programmable data planes in Software-Defined Networks enables the execution of various monitoring tasks directly in network devices, overcoming the need to deliver huge amounts of information to a controller that must then process it at scale. In this paper, we aim to solve a fundamental problem arising when exploiting programmable...
Article
Full-text available
This paper presents an enhanced hybrid Software-Defined Networking (SDN) layer-2 switch whose behavior is specified by the Programming Protocol-independent Packet Processors (P4) language. Its SDN capabilities are enabled by using P4Runtime as control plane protocol to specify the forwarding rules used by its programmable data plane. Additionally,...
Article
This Editorial summarizes the Special Issue entitled Challenges and Solutions for hybrid SDN (Chal. & sol. HSDN) published in Elsevier’s Computer Networks during 2021. We first provide the motivation and context for such a Special Issue, followed by a short explanation and classification of the articles accepted for publication, and concluded with...
Preprint
Volumetric distributed Denial-of-Service (DDoS) attacks have become one of the most significant threats to modern telecommunication networks. However, most existing defense systems require that detection software operates from a centralized monitoring collector, leading to increased traffic load and delayed response. The recent advent of Data Plane...
Preprint
Full-text available
Distributed Denial-of-Service (DDoS) attacks represent a persistent threat to modern telecommunications networks: detecting and counteracting them is still a crucial unresolved challenge for network operators. DDoS attack detection is usually carried out in one or more central nodes that collect significant amounts of monitoring data from networkin...
Conference Paper
Wearable technologies are transforming research in software and knowledge engineering research fields. In particular, expert systems have the opportunity to manage knowledge bases varying according to real-time data collected by position sensors, movement sensors, and so on. This opportunity launches a series of challenges, from the role of network...
Article
Full-text available
The management of Service-Level Agreements (SLAs) in Edge-to-Cloud computing is a complex task due to the great heterogeneity of computing infrastructures and networks and their varying runtime conditions, which influences the resulting Quality of Service (QoS). SLA-management should be supported by formal assurances, ranking and verification of va...
Conference Paper
Full-text available
The recent COVID-19 emergency has pointed out the importance of effective and efficient tools to support users in their day-by-day activities, ranging from health-related ones to studying, remote working and recreation. Indeed, wearables and modern network technologies, such as network slicing and SD-WAN, play a key role in this scenario, but exist...
Conference Paper
Full-text available
In this paper we consider the problem of initial resource selection for a single-domain fog provider lacking sufficient resources for the complete deployment of a batch of IoT applications. To overcome resources shortage, it is possible to lease assets from other domains across a federation of cloud-fog infrastructures to meet the requirements of t...
Article
Full-text available
Application-centric networking proposes a novel approach to provision connectivity services in transport networks based on application-specific requirements. By exploiting this paradigm, an application can request a service with several requirements to a generic control and management plane, which can leverage this information to differentiate a se...
Article
Computer networks are adopting the new Software- Defined Networking (SDN) architecture, however not all devices can support it, mainly due to power and computational constraints. This paper proposes the Hybrid Domain Discovery Protocol (HDDP), a new discovery protocol that enhances the existing OpenFlow Discovery Protocol (OFDP). HDDP allows the di...
Conference Paper
Full-text available
The evaluation of network traffic entropy is very useful for management purposes, since it helps to keep track of changes in network flow distribution. Nowadays, network traffic entropy is usually estimated in centralized monitoring collectors, which require a significant amount of information to be retrieved from switches. The advent of programmab...
Conference Paper
Full-text available
This demonstration aims at showcasing an initial version of the DECENTER Brokerage Platform, which leverages an Ethereum blockchain to enable resource federation among different Fog Computing infrastructures. We consider a scenario where an Italian Infrastructure Provider wants to seamlessly extend its pool of resources to get access to an IP camer...
Article
Full-text available
The advent of Software-Defined Networking with OpenFlow first, and subsequently the emergence of programmable data planes, has boosted lots of research around many networking aspects: monitoring, security, traffic engineering. In the context of monitoring, most of the proposed solutions show the benefits of data plane programmability by simplifying...
Article
Full-text available
Most of today's cloud applications are delivered by Cloud Service Providers (CSPs) on top of a physical network managed by one or multiple Infrastructure Providers (InPs). This new way of delivering services is impacting InPs' revenues, as InPs are only responsible for transporting data to users. Network Function Virtualization (NFV) was proposed t...
Article
Full-text available
A promising area of application for Network Function Virtualization (NFV) is in network security, where chains of Virtual Security Network Functions (VSNFs), i.e., security-specific virtual functions such as firewalls or Intrusion Prevention Systems, can be dynamically created and configured to inspect, filter or monitor the network traffic. Howeve...
Conference Paper
Full-text available
The advent of Software-Defined Networking with OpenFlow first, and subsequently the emergence of pro-grammable data planes, has boosted lot of research around many networking aspects: monitoring, security, traffic engineering. In the context of network monitoring, most of the proposed solutions show the benefits of data plane programmability by sim...
Conference Paper
Full-text available
We present a Mixed Integer Linear Programming formulation to perform optimal placement of Quantum Key Distribution devices to protect active/planned traffic at minimal cost, thus securing active core transport networks.
Preprint
A promising area of application for Network Function Virtualization is in network security, where chains of Virtual Security Network Functions (VSNFs), i.e., security-specific virtual functions such as firewalls or Intrusion Prevention Systems, can be dynamically created and configured to inspect, filter or monitor the network traffic. However, the...
Article
Full-text available
In an SDN-based network, service requests can be accommodated according to network application requirements. We devise a framework where such requirements drive IP and optical network resource allocation, dynamic optimization, and instantiation through an SDN orchestrator. The framework aims to balance the often-conflicting goals such as energy sav...
Article
Full-text available
Future 5G networks will run into the massive spread of applications with diverse and stringent requirements in terms of latency, reliability and security. Current multi-layer transport networks lack coordination between their constituent IP/MPLS and optical layers, and thus cannot provide to applications a full service differentiation all the way d...
Conference Paper
Full-text available
We propose a novel negotiation scheme for an application-driven relaxation of different requirements in multi-layer networks. Simulative results show that it improves service acceptance while keeping requirements' degradation much lower than applications' worst-case acceptable values.
Conference Paper
Full-text available
In dynamic networks with diverse application requirements, Software Defined Networking (SDN) principles enable application-aware in-operation planning. Project ACINO built a network orchestrator as the connecting component between network applications and the underlying network infrastructure.
Conference Paper
Full-text available
We evaluate our method for dynamically accommodating applications that require more than just bandwidth. Our simulations show the advantages of two availability-aware approaches on a network equipped with an SDN orchestrator. Introduction Many network applications today want more than just connectivity and a bandwidth pipe. Examples include autonom...
Article
Full-text available
Telecom operators worldwide are witnessing squeezed profit margins mainly due to hyper-competition. Hence, new business models/strategies are needed to help operators reduce Operational and Capital Expenditures. In this context, the Network Function Virtualization (NFV) paradigm, which consists of running Virtual Instances of Network Functions (NFs...
Conference Paper
Full-text available
The demonstration presents the first implementation of a resource negotiation scheme between users and a network for the provisioning of application-aware connectivity services. This active interaction enables the users, who request connectivity services with multiple application requirements, to select an alternative solution when the network does...
Conference Paper
Full-text available
Internet traffic is generated by a multitude of applications, each one with diverse service requirements in terms of bandwidth, latency, reliability, etc. Today traffic engineering techniques can provide service differentiation at the IP/MPLS layer, but not at the optical layer. In this paper we propose a framework where application service require...
Presentation
Full-text available
We describe the approaches followed in H2020 EU project ACINO to enable application-centric service differentiation all the way down to the optical layer, by means of an open source modular SDN orchestrator enabling applications to program the IP/Optical transport network by means of high-level primitives.
Conference Paper
Full-text available
In an SDN-based network, connection requests can be accommodated according to application requirements. We devise a framework where such requirements drive IP and optical network resource allocation, dynamic optimization, and instantiation through an SDN orchestrator.
Conference Paper
Full-text available
A novel application-aware multi-layer resource allocation algorithm is proposed. We demonstrate that it prevents the violation of application requirements (bandwidth, latency, availability, encryption), while keeping blocking probability lower than an existing algorithm.
Conference Paper
Full-text available
The end-point of the cloud trend is that all computational and storage resources leave the homes and move to the cloud. We can be rather certain the future eventually looks like this as IT and telecommunications services are commoditised and the end users' time, interest and skill to acquire and maintain electronics fade away. The network architect...
Conference Paper
Full-text available
Virtualization technologies are changing the way network operators deploy and manage Internet services. In particular in this study we focus on the new Network Function Virtualization (NFV) paradigm, which consists in instantiating Virtual Network Function (VNFs) in Commercial-Off-The-Shelf (COSTS) hardware. Adopting NFV network operators can dynam...
Conference Paper
Full-text available
The Network Function Virtualization paradigm enables the possibility to dynamically instantiate Virtual Network Functions (VNFs) in Commercial-Off-The-Shelf (COTS) hardware. Such VNFs are then concatenated together in Service Chains (SCs) to provide specific Internet services to the users. Depending on latency requirements for such services and con...
Conference Paper
Full-text available
The Network Functions Virtualization (NFV) paradigm is the most promising technique to help network providers in the reduction of capital and energy costs. The deployment of virtual network functions (VNFs) running on generic x86 hardware allows higher flexibility than the classical middleboxes approach. NFV also reduces the complexity in the deplo...
Conference Paper
Full-text available
The success of novel bandwidth-consuming multi-media services such as Video-on-Demand (VoD) is leading to a tremendous growth of the Internet traffic. Content caching can help to mitigate such uncontrolled growth by storing video content closer to the users in core, metro and access network nodes. So far, metro and especially access networks suppor...
Article
Full-text available
The Video-on-Demand (VoD) service is becoming one the most popular Internet services. Due to its bandwidth-consuming nature and thanks to the efforts made by telecom operators to provide the users with higher access rates, an huge amount of VoD traffic is expected to flood the core segment of the network, potentially leading to congestion and Quali...
Article
Full-text available
Internet traffic is increasingly becoming a media-streaming traffic. Especially, Video-on-Demand (VoD) services are pushing the demand for broadband connectivity to the Internet, and optical fiber technology is being deployed in the access network to keep up with such increasing demand. To provide a more scalable network architecture for video deli...
Article
Full-text available
Smart grid users and standardization committees require that utilities and third parties collecting metering data employ techniques for limiting the level of precision of the gathered household measurements to a granularity no finer than what is required for providing the expected service. Data aggregation and data perturbation are two such techniq...
Conference Paper
Full-text available
The explosion of mobile multimedia and Internet-of-things (IoT) services implies strong requirements for seamless switching among various types of networks. Thus, to offer true ubiquitous Internet connection, a Fixed and Mobile Converged (FMC) network architecture is essential for the future 5G network. Such a convergent network can not only improv...
Conference Paper
Full-text available
Thanks to the widespread deployment of LTE and WiFi networks, connectivity at anytime, anywhere on any device is no longer a dream. However, we can hardly say that today the QoS/QoE provided by the current network is satisfactory. This is mainly caused by the separated management of the different infrastructures, which leads to sub-optimal usage of...
Conference Paper
Full-text available
Today's growth in the demand for access band-width is driven by the success of the Video-on-Demand (VoD) bandwidth-consuming service. At the current pace at which network operators increase the end users' access bandwidth, and with the current network infrastructure, a large amount of video traffic is expected to flood the core/metro segments of th...
Conference Paper
Full-text available
Internet traffic is increasingly becoming a mediastreaming traffic. Especially, Video-on-Demand (VoD) services are pushing the demand for broadband connectivity to the Internet, and optical fiber technology is being deployed in the access network to keep up with such increasing demand. To provide a more scalable network architecture for video/conte...
Article
Full-text available
Measurements gathered by smart metres and collected through the automatic metering infrastructure of smart grids can be accessed by numerous external subjects for different purposes, ranging from billing to grid monitoring. Therefore, to prevent the disclosure of personal information through the analysis of energy consumption patterns, the metering...
Conference Paper
Full-text available
The privacy-preserving management of energy consumption measurements gathered by Smart Meters plays a pivotal role in the Automatic Metering Infrastructure of Smart Grids. Grid users and standardization committees are requiring that utilities and third parties collecting aggregated metering data are prevented from accessing measurements at the hous...
Conference Paper
Full-text available
Measurements gathered by Smart Meters and collected through the Automatic Metering Infrastructure of Smart Grids can be accessed by numerous external subjects for different purposes, ranging from billing to grid monitoring and management. Therefore, metering data must be securely handled, in order to protect the users' privacy and to prevent the di...

Network

Cited By