
Rosario Giuseppe Garroppo- PhD
- Professor (Associate) at University of Pisa
Rosario Giuseppe Garroppo
- PhD
- Professor (Associate) at University of Pisa
About
161
Publications
29,890
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,431
Citations
Introduction
Current institution
Additional affiliations
December 2001 - January 2016
Publications
Publications (161)
Recently, the WiFi community has focused on improving privacy measures, beginning with the introduction of randomized and changing MAC addresses (RCM) to mitigate privacy concerns during pre-association discovery (PAD) mechanisms. A significant advancement has been the establishment of the IEEE 802.11bi Task Group (TG), known as enhanced data priva...
Quantum computers have the potential to break the public-key cryptosystems widely used in key exchange and digital signature applications. To address this issue, quantum key distribution (QKD) offers a robust countermeasure against quantum computer attacks. Among various QKD schemes, BB84 is the most widely used and studied. However, BB84 implement...
The paper presents an experimental security assessment within two widely used open-source 5G projects, namely Open5GS and OAI (Open-Air Interface). The examination concentrates on two network functions (NFs) that are externally exposed within the core network architecture, i.e., the Access and Mobility Management Function (AMF) and the Network Repo...
Multi-access Edge Computing (MEC) enhances the capabilities of 5G by enabling the computation closer to the end-user for real-time and context-aware services. One of the main challenges of MEC is the migration of the MEC application in the presence of user mobility. MigraMEC is a hybrid testbed that simulates the network scenario and user mobility...
Multi-access Edge Computing (MEC) and 5G are key technologies for the development of new applications requiring low latency and for computation off-loading. Emulation tools, such as AdvantEDGE, allow to rapidly test new services and resource management techniques in the 5G-MEC infrastructure. The paper presents an experimental study aimed to show t...
Fifth-generation (5G) mobile networks fulfill the demands of critical applications, such as Ultra-Reliable Low-Latency Communication (URLLC), particularly in the automotive industry. Vehicular communication requires low latency and high computational capabilities at the network's edge. To meet these requirements, ETSI standardized Multi-access Edge...
The Fifth Generation (5G) of mobile networks offers new and advanced services with stricter requirements. Multi-access Edge Computing (MEC) is a key technology that enables these new services by deploying multiple devices with computing and storage capabilities at the edge of the network, close to end-users. MEC enhances network efficiency by reduc...
The proliferation of Wi-Fi devices has led to the rise of privacy concerns related to MAC Address-based systems used for people tracking and localization across various applications, such as smart cities, intelligent transportation systems, and marketing. These systems have highlighted the necessity for mobile device manufacturers to implement Rand...
The introduction of 5G technology enables new V2X services requiring reliable and extremely low latency communications. To satisfy these requirements computing elements need to be located at the edge of the network, according to the Multi-access Edge Computing (MEC) paradigm. The user mobility and the MEC approach lead to the need to carefully anal...
The 5G-MEC architecture increases the heterogeneity and dynamicity of the available resources, presenting unique and competing challenges to researchers, network designers, and application developers. Recent studies indicate AdvantEDGE as an interesting emulation platform to investigate these challenges. The paper presents a particular example of A...
The main innovation of the Fifth Generation (5G) of mobile networks is the ability to provide novel services with new and stricter requirements. One of the technologies that enable the new 5G services is the Multi-access Edge Computing (MEC). MEC is a system composed of multiple devices with computing and storage capabilities that are deployed at t...
In this paper, we present an approach and an algorithm aimed at minimising the energy consumption of enterprise Wireless Local Area Networks (WLANs) during periods of low user activity. We act on two network management aspects: powering off some Access Points (APs), and choosing the level of transmission power of each AP. An efficient technique to...
The purpose of this Special Issue is to present the most recent advances, or comprehensive reviews, relating to green wireless sensor networks. Potential topics include but are not limited to:
Energy harvesting;
Distributed power control schemes;
Energy efficient WSN architecture and design;
Energy efficient communication protocols for WSNs;
Green...
In this paper, we present an approach and an algorithm aimed at minimising the energy consumption of enterprise wireless LANs during periods of low user activity. We act on two network management aspects: powering off some access points (APs), and choosing the level of transmission power of each AP. An efficient technique to allocate the user termi...
We consider the problem of designing a Wireless Local Area Network according to a Green paradigm (GWLAN), i.e. minimizing the power consumption of the network by powering-on just a subset of access points and associating users with the powered-on access points. To protect the system against fluctuations in the data rate transmission between users a...
Anomaly detection has been a very popular research topics over the last few years and applies to many scenarios from different disciplines. This research focuses on crowded phenomena, and addresses the detection of popular events by looking for “anomalous” patterns in cellular traffic data. In particular, the paper elaborates upon previous proposal...
The fifth generation (5G) of cellular networks promises to be a major step in the evolution of wireless technology. 5G is planned to be used in a very broad set of application scenarios. These scenarios have strict heterogeneous requirements that will be accomplished by enhancements on the radio access network and a collection of innovative wireles...
Long-Term Evolution (LTE) is a broadband wireless cellular system currently available in about 200 countries. From the Mobile Network Operator (MNO) point of view, one of the most appealing characteristics of LTE is the possibility of providing the users with mobile broadband services like Voice over LTE (VoLTE) and Video over LTE (ViLTE), with str...
In this paper, we present a novel method to predict long-term popularity of User Generated Content (UGC). At first, the method clusters the dynamics of UGC popularity into a vocabulary of growth in popularity (sequence) by using a mixture model. Eventually, the method assigns to each sequence a topic model to describe the dynamics of the sequence i...
We consider the problem of designing a wireless local area network according to a green paradigm, i.e. serving users with a telecommunication service while minimizing power consumption. To protect against fluctuations in data rate transmission that naturally affect the problem, because of unpredictable user mobility and wireless propagation conditi...
The design of new tools to detect on-the-fly traffic anomaly without scalability problems is a key point to exploit the cellular system for monitoring social activities. To this goal, the paper proposes two methods based on the wavelet analysis of the cumulative cellular traffic. The utilisation of the wavelets permits to easily filter “normal” tra...
We consider a problem arising in the design of green wireless local area networks. Decisions on powering-on a set of access points (APs), via the assignment of one power level (PL) to each opened AP, and decisions on the assignment of the user terminals (UTs) to the opened APs, have to be taken simultaneously. The PL assigned to an AP affects, in a...
Energy consumption of communication networks has continued to grow faster than global electricity consumption, despite the increased focus placed on all the areas of networking research in this last decade. Even though wireless networks have always placed a strong emphasis on energy efficiency concerns, the ever-increasing number of connected devic...
In this paper, the feasibility of a single integrated autonomous device equipped with WiFI capability is analyzed, discussing its potentiality in the framework of the Internet of Things and Cyber Physical Systems. By equipping photovoltaic panels with sensors and antennas, it is possible to obtain a single stand-alone wireless network node. Specifi...
This letter proposes an analytical model to evaluate the collision probability on the Random-Access CHannel (RACH) in Long-Term Evolution systems as a function of the number of user equipment, the number of available preambles, and the Inter-arrival times of the RACH Requests (IRRs) of the average user. The model for the IRR of the average user is...
The integration of the various home devices into a single, multi-service, and user-friendly platform is still an area of active research. In this scenario, we propose a domotics framework based on the Session Initiation Protocol (SIP) and on a SIP-based Home Gateway (SHG). The SHG retains the compatibility with the existing SIP infrastructure, allo...
We present a robust optimisation approach to energy savings in wireless local area networks, that incorporates both link capacity fluctuations and user mobility under Bertsimas and Sim's robust optimization paradigm. Preliminary computational results are discussed.
The reduction of the energy footprint of large and mid-sized IEEE 802.11 access networks is gaining momentum. When operating at the network management level, the availability of an accurate power model of the APs becomes of paramount importance, because different detail levels have a non-negligible impact on the performance of the optimisation algo...
This is the accepted manuscript of a paper that will be published in the proceedings of the IEEE International Conference on Communications. It is currently under an infinite embargo.
In the last years, Software Defined Networking has emerged as a promising paradigm to foster network innovation and address the issues coming from the ossification of the TCP/IP architecture. The clean separation between control and data plane, the definition of northbound and southbound interfaces are key features of the Software Defined Networkin...
The paper presents the lessons learned during the test activity of LTE network in Telecom Italia Lab. The issues mainly regard the lack of low cost and flexible monitoring and test platforms easy to reconfigure and adapt to the diverse network interfaces. The paper presents the design guideline for the development of FPGA-based devices able to over...
In this paper we focus on a Residential Community Network (RCN) in which the various home gateways have (limited) caching capabilities, can be shared among the users, and can exploit multi-hop wireless paths to communicate with each other. We analyse such a RCN from an energy-aware perspective, investigating its energy-saving potential in deliverin...
In this paper, we study a wireless access network based on the Institute of Electrical and Electronics Engineers 802.11 standard and enriched with features such as caching and mesh networking. This system is analysed in terms of energy efficiency and traffic offloading, two objectives that are somewhat in contrast but both relevant to network and s...
In this paper we study a wireless access network based on the WLAN technology and enriched with features such as caching and mesh networking. This system is analysed in terms of energy efficiency and traffic offloading, two objectives that are somewhat in contrast, but both relevant to network and service providers as they directly impact the opera...
A key issue in VoIP services market is the availability of tools that permit a constant monitoring of the relevant Quality of Service (QoS) parameters. Several commercial and open-source solutions are available, based on dedicated hardware and/or open-source software. These solutions aim to achieve a tradeoff between performance and instrumentation...
The deployment of LTE and the explosion of smart-phones and tablet market increase the requirements of mobile connectivity, together with a change in the users expectations in terms of bandwidth, access speed, reliability and QoS man-agement. In this new network scenario, traffic characterization and monitoring is of paramount relevance in order to...
Monitoring operations in today's mobile networks is becoming a more and more challenging task due to the higher bandwidth and technological complexity brought by LTE. The paper summarizes some relevant problems that arose in the tests of LTE equipment carried out at Telecom Italia Lab (TILAB, thtechnological complexitye R&D center of Telecom Italia...
This paper presents RA-WF2Q+, a radio-aware version of the well-known WF2Q+ scheduler, tailored for the downlink traffic of a WiMAX system. With respect to WF2Q+, the proposed scheduler introduces the number of slots in the downlink frame as a parameter of the sharing decision process. This solution permits taking into account the information on th...
We consider a problem arising in the design of green (or energy-saving) wireless local area networks (GWLANs). Decisions on both location and capacity dimensioning must be taken simultaneously. We model the problem as an integer program with nonlinear constraints and derive valid inequalities. We handle the nonlinearity of the formulation by develo...
In this paper we study the behavior of a general optimization model for reducing the power consumption of core networks employing energy-aware network equipment. Specifically, we assess how the energy profiles of the devices affect the outcome of the optimization model and hence determine the general power saving policy. The computational analysis...
The paper presents a comparison between various approaches to the optimized operation of a Content Centric Residential Community Network (CCRCN). The evaluation basis is mostly about the energy footprint of CCRCNs, but other factors, such as content offloading and Internet Sharing, are also taken into account. From the analysis it emerges that the...
Mobile network operators are experiencing a tremendous increase in data traffic due to the growing popularity of bandwidth-intensive video services. This challenge can be faced either by boosting the capacity of the network infrastructure, or by means of offloading traffic from the backhaul and core network and serving contents from distributed cac...
The paper focuses on Network Power Management in telecommunication infrastructures. Specifically, the paper describes four energy aware network design problems, with the related mathematical models, for reducing the power consumption of the current and future Internet. Each problem is based on a different characterization and power awareness of the...
The paper deeply analyzes a novel network-wide power management problem, called Power-Aware Routing and Network Design with Bundled Links (PARND-BL), which is able to take into account both the relationship between the power consumption and the traffic throughput of the nodes and to power off both the chassis and even the single Physical Interface...
The paper presents an approach aimed to reduce the overall power consumption of a backbone network by exploiting the power behavior of green network devices. This approach is based on the solution of an optimization problem that has a Mixed Integer NonLinear Programming (MINLP) formulation. Given that the problem is NP-hard, exact methods for findi...
A slot antenna integrated in a photovoltaic panel has been designed and optimized for IEEE 802.11b/g Wireless LANs applications (2400-2485 MHz). The radiating element has been optimized by exploiting the space available among adjacent solar cells, without decreasing the PV panel solar efficiency. Finally, a comparison between the proposed antenna a...
Application Layer Traffic Optimization (ALTO) has recently gained attention in the research and standardisation community as a way for a network operator to guide the peer selection process of distributed applications by providing network layer topology information. In particular P2P applications are expected to gain from ALTO, due to the many conn...
The research community and Internet Service Providers (ISPs) are interested in designing locality-aware P2P applications, which balance the trade-off between localizing traffic and satisfying the quality of service requirements of the application. To this aim, taking into account the architecture considered by the Application Layer Traffic Optimiza...
One of the main features of the upcoming IEEE 802.11s standard is the path selection procedure, which is performed by the Hybrid Wireless Mesh Protocol by means of thetextitairtime link metric (ALM). Through a small experimental testbed, and using the open80211s code, which provides one of the most compliant draft implementations, we analysed the i...
In modern houses, the presence of sensors and actuators is increasing, while
communication services
and
entertainment systems
had long since settled into everyday life. The utilization of wireless communication technologies, such as ZigBee, Wi-Fi, and Bluetooth, is attractive because of their short installation times and low costs. The research is...
The GreenNet project aims at re-thinking and redesigning different aspects of the current Internet technologies and network protocols to smartly support hardware power management. The pursued approach exploits two basic features already and largely present in today's networks and devices: the network resource virtualization and the modular architec...
The paper describes and compares different approaches that can be used to design Network Power Management methods, with the aim of reducing the power consumption of telecommunication networks. The approaches are based on the solution of optimization problems that have, in general, a Mixed Integer NonLinear Programming (MINLP) formulation. Given tha...
In WiMAX systems the Base Station scheduler plays a key role as it controls the sharing of the radio resources among the users.
The goal of the scheduler is multiple: achieve fair usage of the resources, satisfy the QoS requirements of the users, maximize
goodput, and minimize power consumption, and at the same time ensuring feasible algorithm comp...
The paper copes with the reduction of network power consumption by the definition of new routing algorithms, able to take into account the energy consumed by the network devices. In particular, based on the power consumption characterization of the network devices obtained using the Energy Profile (EP) concept, the paper presents the analysis of th...
Recently, the power consumption of the home/access networks has stimulated several research efforts devoted to the study of new mechanisms to optimize the energy utilization. In particular, most of these works is based on the idea that Ethernet links are mostly underutilized, and is thus aimed at realizing mechanisms able to adapt device consumptio...
Many wireless technologies used to build local or personal area networks (WLANs, WPANs) operate into the 2.4 GHz ISM band. Due to the mutual interference, the coexistence of such devices working at the same time in the same area can be troublesome. This paper reports the result of an extensive experimental study on the performance of three popular...
The paper presents several experimental and simulation activities aimed at providing a proof-of-concept for a marine emergency network in which the main components are a WiMAX system and a satellite link. WiMAX represents quite a novelty for the marine environment and its integration with the satellite link turns out to be remarkably efficient and...
Overload is a challenging problem for a SIP server because the built-in overload control mechanism based on generating rejection messages could not prevent the server from collapsing due to congestion. In this scenario, the paper presents an overload mechanism combining a local and a remote solution. The local part of the overload control mechanism...
The paper presents a survey on the techniques to solve the multi-constrained optimal path (MCOP) problem. Computing the MCOP is a task shared by many research areas, from transportation systems to telecommunication networks. In the latter, the MCOP is often related to the issue of Quality of Service (QoS) routing, which consists in finding a route...
The peer selection approaches used in state-of-the-art P2P live streaming applications do not take into account the underlying physical network parameters. By localizing P2P live streaming traffic with respect to the network layer topology, operators could save backbone transmission costs. This would allow an important reduction in OPEX while at th...
ó We present the detailed planning of the test-bed, experimental, implementation and demonstrative activities that will be carried out within the TWELVE PRIN Project. During the entire second year of the project, in parallel with fundamental research, all the partners of the project will carry out an extensive campaign of experiments and demonstrat...
The paper reports the outcome of an experimental evaluation of two open source solutions for realising a Wireless Mesh Network (WMN). Both works at layer two of the ISO/OSI stack and are transparent to the IP layer, i.e. they allow keeping the existing TCP/IP stack unchanged and avoid dealing with the complex IP configuration and management tasks....
The standardisation process of IEEE 802.11s requires some effort to be devoted to assess the effectiveness of the proposed solutions. Specifically, the path selection and forwarding facilities, embodied by the Hybrid Wireless Mesh Protocol (HWMP), are the major and most delicate components. A working prototype can be profitably used to experimental...
The paper proposes the analysis of the Dual-Threshold Policy, used by Adaptive Link Rate (ALR). In particular, the paper firstly presents a new Markov model of the Dual-Threshold Policy. The new features of the model concern its ability to take into account the rate switching times and the buffer size of the Ethernet Network Interface Controller (N...
The paper reports an analysis about the convenience of employing multi-protocol label switching (MPLS) to provide mobility in wireless mesh networks (WMNs). In such networks, which are expected to serve a considerable number of mobile users, the efficient support of mobility is a non-trivial issue. The starting point of our work is proxy mobile IPv...
The paper presents a scheduling algorithm for WiMAX systems, which exploits Time-Utility Functions (TUFs) and game theory. The scheduling decision is performed by means of two steps: the intra-class scheduling step and the inter-class scheduling step. In the first one, each user exploits TUFs to choice the packets to transmit according to QoS requi...
As other signaling protocols in the past, also SIP suffers of server overload leading to performance collapse. In this framework, recent Internet drafts propose the improvements of overload control mechanisms already presented in SIP and/or a closed loop system model for overload avoidance. In this framework, the paper presents the system simulator...
The paper reports an analysis about the convenience of employing Multi-Protocol Label Switching (MPLS) to provide mobility in Wireless Mesh Networks (WMNs). In such networks, which are expected to serve a considerable number of mobile users, the efficient support of mobility is a non-trivial issue. The starting point of our work is Proxy Mobile IPv...
The IEEE 802.16 technology (WiMAX) is a promising technology for providing last-mile connectivity by radio link due to its large coverage area, low cost of deployment and high speed data rates. However, the maximum number of channels defined in the current system may cause a potential bottleneck and limit the overall system capacity. The aim of thi...
This paper presents some experimental results about the robustness of a WiMAX system against interfering signals. In particular, this work presents a WiMAX performance comparison when two different types of interfering signals were generated: a continuous wave and a rectangular pulsed wave. Both of them were tuned at the same working frequency of t...
The IEEE 802.16 technology (WiMAX) is a promising technology for providing last-mile connectivity by radio link due to its large coverage area, low cost of deployment and high speed data rates. However, the maximum number of channels defined in the current system may cause a potential bottleneck and limit the overall system capacity. The aim of thi...
In the last few years the number and impact of security attacks over the Internet, and in particular against VoIP, have been continuously increasing. To face this issue, the use of intrusion detection systems (IDSs) has emerged as a key element in network and application security. In this paper we address the problem considering a novel statistical...
The deployment of multimedia over IP (MoIP), and in particular voice over IP services, requires to solve new security issues they introduce, before completely exploiting the great opportunities they offer to telecommunication market. Furthermore, the implementation of various security measures can cause a marked deterioration in quality of service,...
We propose a traffic engineering (TE) architecture to supply wireless mesh networks (WMNs) with an efficient support of diverse applications with different quality of service (QoS) requirements. The proposed TE-WMN architecture is based on the MPLS technology. Its main goal is to provide TE capabilities so that a heterogeneous infrastructure, made...
The paper presents a network scenario for multimedia communications during emergency operations in a sea area. The network scenario is composed by a satellite link and a WiMAX system provided by a main naval unit. The WiMAX system permits the communications between the operators on small units and the main naval unit, where there are both local coo...
The paper presents a measurement campaign carried out on a 2.5 GHz Mobile WiMAX test-bed in a sea port scenario, aimed at evaluating the system performance. The analysis of acquired data suggested the definition of a 2-ray pathloss model, which is able to fit the actual behavior of the observed marine channel. In order to evaluate the effects of th...
In the last years, broadband satellite networks have emerged as a flexible technology offering high-speed Internet access to large communities of users at relatively low-cost. At the same time, the large widespread of VoIP and Multimedia over IP (MoIP) applications, has pointed out the need of investigating their performance over heterogeneous netw...
We propose a Traffic Engineering (TE) architecture to supply Wireless Mesh Networks (WMNs) with an efficient support of diverse applications with different Quality of Service (QoS) requirements. The proposed TE-WMN architecture is based on the MPLS technology. Its main goal is to provide TE capabilities so that a heterogeneous infrastructure, made...
The IEEE 802.16 technology (WiMAX) is a promising technology for providing last-mile connectivity by radio link due to its large coverage area, low cost of deployment and high speed data rates. However, the maximum number of channels defined in the current system may cause a potential bottleneck and limit the overall system capacity. The aim of thi...
In the last years, broadband satellite networks have emerged as a flexible technology offering high-speed Internet access to large communities of users at relatively low-cost. At the same time, the large widespread of VoIP and Multimedia over IP (MoIP) applications, has pointed out the need of investigating their performance over heterogeneous netw...
The paper refers to the particular scenario where a set of naval units forms a WiMax-based mobile ad hoc network (MANET) to permit the communications among users on board of them and the sharing of the few satellite links towards the headquarter (HQ). In particular, the paper considers two different technical aspects: the definition of an appropria...
The paper presents a predictive approach to network resource allocation techniques. The rationale of this work is to use measurements to estimate future traffic behavior by prediction, and to use such an estimation to define the amount of future network resources that will be required by the considered traffic. In this framework, the paper presents...
Due to its large coverage area, low cost of deployment and high speed data rates, WiMAX is a promising technology for providing wireless last-mile connectivity. Physical and MAC layer of this technology refer to the IEEE 802.16e standard, which defines 5 different data delivery service classes that can be used in order to satisfy Quality of Service...
I. EXTENDED ABSTRACT The increased popularity and the growth in the number of deployed IEEE 802.11 Access Points (APs) have raised the opportunity to merge together various disjointed wireless LANs to form a unique wireless mesh network (WMN). In this architecture only few nodes, called Portals (MPPs), interface to the external world thanks to thei...
Wireless Mesh Networks (WMNs) are gaining wide popularity as a flexible and cost-effective access technology. Many vendors
and network operators have already deployed their own proprietary solutions, and, in the meantime, the IEEE has set off Task
Group 802.11s (TGs) to develop a common standard for WMNs. So far, however, TGs has not yet produced a...
Due to its large coverage area, low cost of deployment and high speed data rates, WiMAX is a promising technology for providing wireless last-mile connectivity. Physical and MAC layer of this technology refer to the IEEE 802.16e standard, which defines 5 different data delivery service classes that can be used in order to satisfy Quality of Service...
The paper presents a predictive approach to network resource allocation techniques. The rationale of this work is to use measurements to estimate future traffic behavior by prediction, and to use such an estimation to define the amount of future network resources that will be required by the considered traffic. In this framework, the paper presents...