Pub Date : 2022-09-19DOI: 10.23919/radio.2017.8242203
Authors/employers retain all proprietary rights in any process, procedure, or article of manufacture described in the Work. Authors/employers may reproduce or authorize others to reproduce the Work, material extracted verbatim from the Work, or derivative works for the author’s personal use or for company use, provided that the source and the AICT/AEIT copyright notice are indicated, the copies are not used in any way that implies AICT/AEIT endorsement of a product or service of any employer, and the copies themselves are not offered for sale. Although authors are permitted to re-use all or portions of the Work in other works, this does not include granting third-party requests for reprinting, republishing, or other types of reuse. AICT/AEIT must handle all such third-party requests.
{"title":"Copyright page","authors":"","doi":"10.23919/radio.2017.8242203","DOIUrl":"https://doi.org/10.23919/radio.2017.8242203","url":null,"abstract":"Authors/employers retain all proprietary rights in any process, procedure, or article of manufacture described in the Work. Authors/employers may reproduce or authorize others to reproduce the Work, material extracted verbatim from the Work, or derivative works for the author’s personal use or for company use, provided that the source and the AICT/AEIT copyright notice are indicated, the copies are not used in any way that implies AICT/AEIT endorsement of a product or service of any employer, and the copies themselves are not offered for sale. Although authors are permitted to re-use all or portions of the Work in other works, this does not include granting third-party requests for reprinting, republishing, or other types of reuse. AICT/AEIT must handle all such third-party requests.","PeriodicalId":178778,"journal":{"name":"2014 Euro Med Telco Conference (EMTC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114597638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-29DOI: 10.1109/EMTC.2014.6996659
Angelo Ananasso, M. Vari, R. Giuliano
The paper describes some relevant solutions for Next Generation Access Network (NGAN, or NGN), considering evolution from copper legacy network to optical access network (PON, Passive Optical Network) and analysing pros and cons of several PON solutions (TDM-PON, WDM-PON, TWDM and OFMD-PON) as well as potential convergence/coexistence scenarios.
{"title":"The future of ultrabroadband communications: A roadmap to NGAN","authors":"Angelo Ananasso, M. Vari, R. Giuliano","doi":"10.1109/EMTC.2014.6996659","DOIUrl":"https://doi.org/10.1109/EMTC.2014.6996659","url":null,"abstract":"The paper describes some relevant solutions for Next Generation Access Network (NGAN, or NGN), considering evolution from copper legacy network to optical access network (PON, Passive Optical Network) and analysing pros and cons of several PON solutions (TDM-PON, WDM-PON, TWDM and OFMD-PON) as well as potential convergence/coexistence scenarios.","PeriodicalId":178778,"journal":{"name":"2014 Euro Med Telco Conference (EMTC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121023511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-29DOI: 10.1109/EMTC.2014.6996650
Savio Sciancalepore, G. Piro, Elvis Vogli, G. Boggia, L. Grieco
The IEEE 802.15.4 standard is widely recognized as one of the most successful enabling technologies for short range low rate wireless communications. Although it provides all the details of both MAC and PHY layers of the protocol stack, the standard also explains specific methodologies to protect MAC packets through symmetric-key cryptography techniques under several security options. However, the orchestration of available security profiles and the management of key negotiation schemes is delegated to upper layers. In support of this feature, this work describes a standard compliant security framework aimed at proposing: (i) different kind of security architectures, (ii) an efficient mechanism for initializing a secure IEEE 802.15.4 domain, and (iii) a lightweight mechanism to negotiate link keys among devices. Experimental tests have been conducted to demonstrate the behavior of the proposed solution in real environments. Obtained results clearly show that the enabling of security features in constrained nodes requires additional computational efforts, which involve a not negligible growth of communication latencies. Such findings have to be carefully considered when designing and developing enhanced applications in future and secured Internet of Things (IoT) systems.
{"title":"On securing IEEE 802.15.4 networks through a standard compliant framework","authors":"Savio Sciancalepore, G. Piro, Elvis Vogli, G. Boggia, L. Grieco","doi":"10.1109/EMTC.2014.6996650","DOIUrl":"https://doi.org/10.1109/EMTC.2014.6996650","url":null,"abstract":"The IEEE 802.15.4 standard is widely recognized as one of the most successful enabling technologies for short range low rate wireless communications. Although it provides all the details of both MAC and PHY layers of the protocol stack, the standard also explains specific methodologies to protect MAC packets through symmetric-key cryptography techniques under several security options. However, the orchestration of available security profiles and the management of key negotiation schemes is delegated to upper layers. In support of this feature, this work describes a standard compliant security framework aimed at proposing: (i) different kind of security architectures, (ii) an efficient mechanism for initializing a secure IEEE 802.15.4 domain, and (iii) a lightweight mechanism to negotiate link keys among devices. Experimental tests have been conducted to demonstrate the behavior of the proposed solution in real environments. Obtained results clearly show that the enabling of security features in constrained nodes requires additional computational efforts, which involve a not negligible growth of communication latencies. Such findings have to be carefully considered when designing and developing enhanced applications in future and secured Internet of Things (IoT) systems.","PeriodicalId":178778,"journal":{"name":"2014 Euro Med Telco Conference (EMTC)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124851441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-29DOI: 10.1109/EMTC.2014.6996624
R. Cavallari, R. Verdone
This paper presents a preliminary work based on the idea of offloading part of the traffic carried by a wireless multi-hop backbone on the lamp posts on a urban street to improve its throughput. Under some circumstances one or more nodes of the backbone may be congested, this could lead to packet losses. In order to overcome this situations, the backbone may decide to offload part of its traffic to the mobile nodes on the street (pedestrians and vehicles). These nodes form a Delay Tolerant Network (DTN) that delivers the offloaded data to the sink. Within this paper we characterise advances that the DTN offload brings to the performance of such a system under different operational conditions.
{"title":"Performance of a lamp post wireless backbone with Delay Tolerant offload","authors":"R. Cavallari, R. Verdone","doi":"10.1109/EMTC.2014.6996624","DOIUrl":"https://doi.org/10.1109/EMTC.2014.6996624","url":null,"abstract":"This paper presents a preliminary work based on the idea of offloading part of the traffic carried by a wireless multi-hop backbone on the lamp posts on a urban street to improve its throughput. Under some circumstances one or more nodes of the backbone may be congested, this could lead to packet losses. In order to overcome this situations, the backbone may decide to offload part of its traffic to the mobile nodes on the street (pedestrians and vehicles). These nodes form a Delay Tolerant Network (DTN) that delivers the offloaded data to the sink. Within this paper we characterise advances that the DTN offload brings to the performance of such a system under different operational conditions.","PeriodicalId":178778,"journal":{"name":"2014 Euro Med Telco Conference (EMTC)","volume":"228 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115549780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-29DOI: 10.1109/EMTC.2014.6996655
D. Adami, Lisa Donatini, Gianluca Foddis, S. Giordano, S. Roma, Simone Topazzi
In the latest years, we have seen a fast evolution of Internet systems and a remarkable increase of the number and variety of services required. The need of new architectural solutions has led to the creation of new tools that allow to develop more flexible and dynamic networks. Software Defined Networking (SDN) goes in this direction, offering a new way to manage networks, based on programmability, virtualization of the network and centralization of decision processes. In this article we will analyse how it is possible to deploy these new tools to realize some fundamental network functions also for monitoring systems. We will also show a real testbed where we implemented the functions we describe, and we will show the experimental results obtained with it.
{"title":"Design and development of management functions for distributed monitoring based on SDN-based network","authors":"D. Adami, Lisa Donatini, Gianluca Foddis, S. Giordano, S. Roma, Simone Topazzi","doi":"10.1109/EMTC.2014.6996655","DOIUrl":"https://doi.org/10.1109/EMTC.2014.6996655","url":null,"abstract":"In the latest years, we have seen a fast evolution of Internet systems and a remarkable increase of the number and variety of services required. The need of new architectural solutions has led to the creation of new tools that allow to develop more flexible and dynamic networks. Software Defined Networking (SDN) goes in this direction, offering a new way to manage networks, based on programmability, virtualization of the network and centralization of decision processes. In this article we will analyse how it is possible to deploy these new tools to realize some fundamental network functions also for monitoring systems. We will also show a real testbed where we implemented the functions we describe, and we will show the experimental results obtained with it.","PeriodicalId":178778,"journal":{"name":"2014 Euro Med Telco Conference (EMTC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128295895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-29DOI: 10.1109/EMTC.2014.6996661
Jonathan Spruytte, Bram Naudts, K. Casier, J. V. Ooteghem, S. Verbrugge
On one hand, customers expect mobile broadband at any time and place at increasing bandwidth while on the other hand there is an evolution towards smart cities which include video monitoring and large amount of extra sensors putting additional strain on the existing network. Because of this, optimal long term network planning is of crucial importance. This planning has to take into account the ever increasing bandwidth demand and user adoption. In this publication, a genetic algorithm is proposed to find the optimal location of base stations to achieve a full coverage. Using this algorithm, a clear comparison has been made between a short-term (incremental) and a long-term (anticipated) planning.
{"title":"Planning omni-present networks of the future","authors":"Jonathan Spruytte, Bram Naudts, K. Casier, J. V. Ooteghem, S. Verbrugge","doi":"10.1109/EMTC.2014.6996661","DOIUrl":"https://doi.org/10.1109/EMTC.2014.6996661","url":null,"abstract":"On one hand, customers expect mobile broadband at any time and place at increasing bandwidth while on the other hand there is an evolution towards smart cities which include video monitoring and large amount of extra sensors putting additional strain on the existing network. Because of this, optimal long term network planning is of crucial importance. This planning has to take into account the ever increasing bandwidth demand and user adoption. In this publication, a genetic algorithm is proposed to find the optimal location of base stations to achieve a full coverage. Using this algorithm, a clear comparison has been made between a short-term (incremental) and a long-term (anticipated) planning.","PeriodicalId":178778,"journal":{"name":"2014 Euro Med Telco Conference (EMTC)","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133886452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-29DOI: 10.1109/EMTC.2014.6996637
A. S. Cacciapuoti, M. Caleffi, L. Paura, M. A. Rahman
In this paper, the problem of estimating the link quality in mesh networks has been considered. Such a problem is a major task to develop an efficient network layer, since an accurate knowledge of the link qualities allows routing protocols to efficiently use neighbors as relays for multi-hop communications. In the last years, a number of link-quality aware routing metrics based on the packet delivery ratio have been proposed and analyzed. However, very few works have addressed the problem of correctly estimating the delivery ratio of a wireless link. Therefore, in this paper we resort to a 802.11b mesh network to carry on a performance comparison between two widely adopted delivery ratio estimators, namely the Simple Moving Average and the Exponentially Weighted Moving Average, and a recently proposed one based on the neural network paradigm.
{"title":"Link quality estimators for multi-hop mesh network","authors":"A. S. Cacciapuoti, M. Caleffi, L. Paura, M. A. Rahman","doi":"10.1109/EMTC.2014.6996637","DOIUrl":"https://doi.org/10.1109/EMTC.2014.6996637","url":null,"abstract":"In this paper, the problem of estimating the link quality in mesh networks has been considered. Such a problem is a major task to develop an efficient network layer, since an accurate knowledge of the link qualities allows routing protocols to efficiently use neighbors as relays for multi-hop communications. In the last years, a number of link-quality aware routing metrics based on the packet delivery ratio have been proposed and analyzed. However, very few works have addressed the problem of correctly estimating the delivery ratio of a wireless link. Therefore, in this paper we resort to a 802.11b mesh network to carry on a performance comparison between two widely adopted delivery ratio estimators, namely the Simple Moving Average and the Exponentially Weighted Moving Average, and a recently proposed one based on the neural network paradigm.","PeriodicalId":178778,"journal":{"name":"2014 Euro Med Telco Conference (EMTC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130787923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-29DOI: 10.1109/EMTC.2014.6996631
Eleonora Cerciello, G. Massei, L. Paura
The proliferation of the RFID (Radio-Frequency IDentification) technology in the last decade shows its importance as effective solution for a large variety of application scenarios, such as monitoring, homeland security, healthcare, logistic and last but not the least Internet of Things. Actually, an accurate RFID modeling, optimization and performance analysis via simulation is strongly desired. In this paper, the authors propose two innovations of tag anti-collision algorithm in EPC Gen 2 RFID Specification: i. the adaptive management of Q-parameter (to maximize the efficiency of the inventory procedure depending on the tags number) and its communication by a QueryAdjust command, and ii. the muting option, which silences the tags after their identification with the effect of reducing the offered load to the reader after each successful identification.
{"title":"Optimization of tag anti-collision algorithm for EPC Gen2 RFID","authors":"Eleonora Cerciello, G. Massei, L. Paura","doi":"10.1109/EMTC.2014.6996631","DOIUrl":"https://doi.org/10.1109/EMTC.2014.6996631","url":null,"abstract":"The proliferation of the RFID (Radio-Frequency IDentification) technology in the last decade shows its importance as effective solution for a large variety of application scenarios, such as monitoring, homeland security, healthcare, logistic and last but not the least Internet of Things. Actually, an accurate RFID modeling, optimization and performance analysis via simulation is strongly desired. In this paper, the authors propose two innovations of tag anti-collision algorithm in EPC Gen 2 RFID Specification: i. the adaptive management of Q-parameter (to maximize the efficiency of the inventory procedure depending on the tags number) and its communication by a QueryAdjust command, and ii. the muting option, which silences the tags after their identification with the effect of reducing the offered load to the reader after each successful identification.","PeriodicalId":178778,"journal":{"name":"2014 Euro Med Telco Conference (EMTC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116964567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-29DOI: 10.1109/EMTC.2014.6996660
E. Tego, F. Matera, V. Attanasio, D. D. Buono
This work experimentally demonstrates how to control and manage user Quality of Service (QoS) by acting on the switching on-off of the optical Gigabit Ethernet (GbE) interfaces in a wide area network test bed including routers and GPON accesses. The QoS is monitored at the user location by means of active probes developed in the framework of the FP7 MPLANE project. The network topology is managed according to some current Software Defined Network issues and in particular an Orchestrator checks the user quality, the traffic load in the GbE links and manages the network interface reconfiguration when congestion occurs in some network segments.
{"title":"Quality of service management based on Software Defined Networking approach in wide GbE networks","authors":"E. Tego, F. Matera, V. Attanasio, D. D. Buono","doi":"10.1109/EMTC.2014.6996660","DOIUrl":"https://doi.org/10.1109/EMTC.2014.6996660","url":null,"abstract":"This work experimentally demonstrates how to control and manage user Quality of Service (QoS) by acting on the switching on-off of the optical Gigabit Ethernet (GbE) interfaces in a wide area network test bed including routers and GPON accesses. The QoS is monitored at the user location by means of active probes developed in the framework of the FP7 MPLANE project. The network topology is managed according to some current Software Defined Network issues and in particular an Orchestrator checks the user quality, the traffic load in the GbE links and manages the network interface reconfiguration when congestion occurs in some network segments.","PeriodicalId":178778,"journal":{"name":"2014 Euro Med Telco Conference (EMTC)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122116028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-29DOI: 10.1109/EMTC.2014.6996629
Amr Y. Elnakeeb, H. Elsayed, M. Khairy
This paper considers Cognitive Radio Sensor Networks (CRSN). The aim of this paper is twofold: First, we analyze the problem of total energy minimization in CRSN by choosing the best relay for each cognitive sensor node in the network. A node either sends its data packet directly to the Base Station (BS) or forwards to another node; and the latter, in turn, sends both packets to the BS. The proposed optimization problem is a multiple choice knapsack optimization problem that chooses the best path for each node targeting minimizing the total energy consumption in the network under interference constraints and with the aim of satisfying a specific Bit Error Rate (BER) for the CR system. The second aim of the paper targets increasing the lifetime in CRSN. This target is important in several applications as considering energy minimization only affects the network lifetime. Consequently, another knapsack optimization problem has been formulated and solved to choose the best scenario for each node, either by sending directly to the BS or by relaying via another node, with the aim of enhancing network lifetime under interference constraints and BER requirement for the CR system.
{"title":"Energy minimization and lifetime enhancement in Cognitive Radio Sensor Networks via relaying under interference constraints","authors":"Amr Y. Elnakeeb, H. Elsayed, M. Khairy","doi":"10.1109/EMTC.2014.6996629","DOIUrl":"https://doi.org/10.1109/EMTC.2014.6996629","url":null,"abstract":"This paper considers Cognitive Radio Sensor Networks (CRSN). The aim of this paper is twofold: First, we analyze the problem of total energy minimization in CRSN by choosing the best relay for each cognitive sensor node in the network. A node either sends its data packet directly to the Base Station (BS) or forwards to another node; and the latter, in turn, sends both packets to the BS. The proposed optimization problem is a multiple choice knapsack optimization problem that chooses the best path for each node targeting minimizing the total energy consumption in the network under interference constraints and with the aim of satisfying a specific Bit Error Rate (BER) for the CR system. The second aim of the paper targets increasing the lifetime in CRSN. This target is important in several applications as considering energy minimization only affects the network lifetime. Consequently, another knapsack optimization problem has been formulated and solved to choose the best scenario for each node, either by sending directly to the BS or by relaying via another node, with the aim of enhancing network lifetime under interference constraints and BER requirement for the CR system.","PeriodicalId":178778,"journal":{"name":"2014 Euro Med Telco Conference (EMTC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125902333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}