Politecnico di Torino

Displaying 1-40 of 105 results

  • White Papers // Dec 2013

    Efficient Protocols for Secure Broadcast in Controller Area Networks

    Controller Area Network (CAN) is a bus commonly used by controllers inside vehicles and in various industrial control applications. In the past controllers were assumed to operate in secure perimeters, but today these environments are well connected to the outside world and recent incidents showed them extremely vulnerable to cyber-attacks....

    Provided By Politecnico di Torino

  • White Papers // Oct 2013

    Bridging Dolev-Yao Adversaries and Control Systems with Time-Sensitive Channels

    Defining security objectives for industrial control scenarios is a challenging task due to the subtle interactions between system components and because security goals are often far from obvious. Moreover, there is a persistent gap between formal models for channels and adversaries (usually, transition systems) and models for control systems (differential...

    Provided By Politecnico di Torino

  • White Papers // Jun 2013

    LiBrA-CAN: Lightweight Broadcast Authentication for Controller Area Networks

    Despite realistic concerns, security inside vehicular buses (such as CAN) is still absent mostly due to technical challenges: low bandwidth and processing power, low cost margins, etc. Here, the authors design an efficient protocol based entirely on simple symmetric primitives that takes advantage of two interesting procedures which they call...

    Provided By Politecnico di Torino

  • White Papers // Jun 2013

    Knowledge Intensive Processes as a Challenge for Business Process Simulation

    This paper presents literature review and theoretical background for simulation of knowledge intensive processes. In the beginning it describes the concept of knowledge economy - environment, in which most modern organizations have to operate. In the next step it tries to define what knowledge intensity means as well as what...

    Provided By Politecnico di Torino

  • White Papers // Jun 2013

    A Layer-Based, Matric Oriented Business Process Simulation Solution

    In this paper, the authors review and compare different business process modeling techniques, reveal their capabilities and use a combination of their elements to create a model of applicable simulation solution that is easy to understand on the one hand but enables integration of innovative complex dynamics on the other...

    Provided By Politecnico di Torino

  • White Papers // May 2013

    Features and Functions of a Business Process Modeler

    Business Process Modeling (BPM) is defined as the activity of representing processes of an enterprise, so that the current process may be analyzed and improved. Modeling is further connected with activities of simulation, evaluation, and optimization. BPM is typically performed by business analysts who are seeking to improve process efficiency...

    Provided By Politecnico di Torino

  • White Papers // Feb 2013

    Cryptographic Puzzles and DoS Resilience, Revisited

    Cryptographic puzzles (or client puzzles) are moderately difficult problems that can be solved by investing non-trivial amounts of computation and/or storage. Devising models for cryptographic puzzles has only recently started to receive attention from the cryptographic community as a first step toward rigorous models and proofs of security of applications...

    Provided By Politecnico di Torino

  • White Papers // Oct 2012

    Benefits of Using Enterprise Resource Planning Systems

    During the last years several enterprises have used significant amounts of money for their resource planning systems. In ideal situations these investments have proven to help enterprises to have more efficient business processes. They have also enabled significant cost savings and better information sharing. However, many enterprises have also got...

    Provided By Politecnico di Torino

  • White Papers // Sep 2012

    Business Process Management in Practice of Czech Companies

    The purpose of this paper is to provide an overview of applications of principles of Business Process Management in department of energetics in company Barum Continental, Ltd. which ensures the energy operation of manufacturing and office building of this company. The paper aims to point out the potential of increasing...

    Provided By Politecnico di Torino

  • White Papers // Jul 2012

    Secure Broadcast with One-Time Signatures in Controller Area Networks

    Broadcast authentication in Controller Area Networks (CAN) is subject to real time constraints that are hard to satisfy by expensive public key primitives. For this purpose, the authors study here the use of one-time signatures which can be built on the most computationally efficient one-way functions. They use an enhancement...

    Provided By Politecnico di Torino

  • White Papers // Jul 2012

    Revisiting Difficulty Notions for Client Puzzles and DoS Resilience

    Cryptographic puzzles are moderately difficult problems that can be solved by investing non-trivial amounts of computation and/or storage. Devising models for cryptographic puzzles has only recently started to receive attention from the cryptographic community as a first step towards rigorous models and proofs of security of applications that employ them...

    Provided By Politecnico di Torino

  • White Papers // Apr 2012

    Offloading Cellular Networks Through ITS Content Download

    Content downloading by mobile users is expected to significantly increase the cellular network load. Vehicular users, in particular, are likely to engage in information retrieval on the move: in this context, Intelligent Transportation Systems (ITS) can play an important role in offloading the cellular infrastructure. The authors investigate the effectiveness...

    Provided By Politecnico di Torino

  • White Papers // Feb 2012

    Broadcast Authentication in a Low Speed Controller Area Network

    Controller Area Network (CAN) is a communication bus that has no cryptographic protection against malicious adversaries. Once isolated, the environments in which CAN operates are now opened to intruders and assuring broadcast authentication becomes a concern. To achieve this, public key primitives are not a solution because of the computational...

    Provided By Politecnico di Torino

  • White Papers // Dec 2011

    Knowledge Applications Solutions at the SME Level in the E-Enterprise Business Intelligence

    The paper presents the knowledge management and business, intelligent concepts in order to analyze enterprise internal and external resources based on the knowledge transfer and capitalization processes. The virtual enterprise business network purposed solution expect to improve Small and Medium-sized Enterprises (SMEs) involvement in new product manufacturing networking efforts in...

    Provided By Politecnico di Torino

  • White Papers // Oct 2011

    Protocol Vulnerabilities in Practice: Causes, Modeling and Automatic Detection

    Starting from practical scenarios the authors underline that the most relevant security vulnerabilities in practice come from weak protocol design or implementation flaws rather than from weak or flawed cryptography. In particular, they outline security vulnerabilities in several kinds of scenarios starting from well explored fields such as computer networks...

    Provided By Politecnico di Torino

  • White Papers // Sep 2011

    Exploiting Traffic Dynamics in Power-Aware Logical Topology Design

    The authors propose the Multi-Period Power-Aware Logical Topology Design. They compared two different heuristics and show that exploiting the day-night fluctuations of the traffic can lead to significant power savings at a low reconfiguration cost. Recent studies show that the Information and Communication Technologies (ICT) sector is responsible for a...

    Provided By Politecnico di Torino

  • White Papers // Jul 2011

    Proactive Seeding for Information Cascades in Cellular Networks

    In today's Internet, Online Social Networks (OSNs) play an important role in informing users about content. At the same time, mobile devices provide ubiquitous access to this content through the cellular infrastructure. In this paper, the authors propose Proactive Seeding - a technique for minimizing the peak load of cellular...

    Provided By Politecnico di Torino

  • White Papers // Jul 2011

    Bounds on QoS-Constrained Energy Savings in Cellular Access Networks With Sleep Modes

    Sleep modes are emerging as a promising technique for energy-efficient networking: by adequately putting to sleep and waking up network resources according to traffic demands, proportionality between energy consumption and network utilization can be approached, with important reductions in energy consumption. Previous studies have investigated and evaluated sleep modes for...

    Provided By Politecnico di Torino

  • White Papers // Jul 2011

    Switch-Off Transients in Cellular Access Networks With Sleep Modes

    The introduction of sleep modes in the operations of base stations is today considered one of the most promising approaches to reduce the energy consumption of cellular access networks. Several papers have considered this option, assuming that the switch-on and switch-off transients are of negligible duration. In this paper, the...

    Provided By Politecnico di Torino

  • White Papers // Jun 2011

    Passive Characterization of SopCast Usage in Residential ISPs

    In this paper, the authors present an extensive analysis of traffic generated by SopCast users and collected from operative networks of three national ISPs in Europe. After more than a year of continuous monitoring, they present results about the popularity of SopCast which is the largely preferred application in the...

    Provided By Politecnico di Torino

  • White Papers // Jun 2011

    Customizing Protocol Specifications for Detecting Resource Exhaustion and Guessing Attacks

    Model checkers for security protocols often focus on basic properties, such as confidentiality or authentication, using a standard model of the Dolev-Yao intruder. In this paper, the authors explore how to model other attacks, notably guessing of secrets and denial of service by resource exhaustion, using the AVANTSSAR platform with...

    Provided By Politecnico di Torino

  • White Papers // Jun 2011

    Some Security Issues in SCALANCE Wireless Industrial Networks

    The authors discuss some security weaknesses of Scalance wireless access points and clients. These devices, developed by Siemens, are commonly used for wireless communication in network control systems. After the identification of the Stuxnet worm, which targeted PLCs from uranium enrichment facilities in Iran, these devices become of increased interest...

    Provided By Politecnico di Torino

  • White Papers // May 2011

    Investigating Overlay Topologies and Dynamics of P2P-TV Systems: the Case of SopCast

    Several successful commercial P2P-TV applications are already available. Unfortunately, some algorithms and protocols they adopt are unknown, since many follow a closed and proprietary design. This calls for tools and methodologies that allow the investigation of the application behavior. In this paper, the authors present a novel approach to analyze...

    Provided By Politecnico di Torino

  • White Papers // May 2011

    Design and Control of Next Generation Distribution Frames

    Today, the permutation of circuits in the Main Distribution Frames (MDF), which connect the subscriber lines to POTS and to DSLAMs, is still operated manually. However, new market regulations, allowing subscribers to change network operator frequently, and the new schemes to concentrate active ADSL users into few DSLAMs during off-peak...

    Provided By Politecnico di Torino

  • White Papers // Mar 2011

    Management of Business Processes Through Reengineering

    Re-engineering is considered to be a means of transforming the organization into a flexible, knowledge-based and structured to serve clients needs system and allows and allow fundamental rethinking and radical redesign of business processes to achieve dramatic improvements in business indicators considered critical in evaluating performance - cost, quality, service...

    Provided By Politecnico di Torino

  • White Papers // Mar 2011

    Application of System Dynamics Model and GIS in Sustainability Assessment of Urban Residential Development

    Considering rapid population growth and urbanization, sustainability assessment of residential development has become increasingly necessary for understanding environmental impacts and supporting urban planning. In this paper, due to the urban activities cause impacts not only on local level but also a broader scale, a simulation model, using System Dynamics (SD)...

    Provided By Politecnico di Torino

  • White Papers // Mar 2011

    Business Networks in the Internationalization of B-to-B-Services

    This paper focuses on business networks in the internationalization of b-to-b-services. The literature includes vast amount of knowledge of internationalization of a firm in general. A great deal of this literature is based on the concept of incremental stepwise internationalization process and empirical findings in manufacturing companies. So far, little...

    Provided By Politecnico di Torino

  • White Papers // Mar 2011

    Experiences of Internet Traffic Monitoring With Tstat

    Since the early days of the Internet, network traffic monitoring has always played a strategic role in understanding and characterize users' activities. In this paper, the authors present their experience in engineering and deploying Tstat, an open source passive monitoring tool that has been developed in the past ten years....

    Provided By Politecnico di Torino

  • White Papers // Mar 2011

    Creating Portable and Efficient Packet Processing Applications

    Network processors are special-purpose programmable units deployed in many modern high-speed network devices, which combine flexibility and high performance. However, software development for these platforms is traditionally cumbersome due both to the lack of adequate programming abstractions and to the impossibility of reusing the same software on different hardware platforms....

    Provided By Politecnico di Torino

  • White Papers // Mar 2011

    Concealable, Low-Cost Paper-Printed Antennas for WISP-Based RFIDs

    Paper-based, inkjet-printed antennas are proposed in this paper as replacement for the typical antennas used on the WISP RFID tag. These antennas are designed to be as concealable as possible. The designs presented exploit meandered techniques in order to achieve significantly reduced dimensions. In particularly, text-based meandered line techniques are...

    Provided By Politecnico di Torino

  • White Papers // Feb 2011

    Requirements Elicitation Using BPM Notations: Focusing on the Strategic Level Representation

    Business Process Models (BPM) can be useful for requirements elicitation, among other uses. Since the active participation of all stakeholders is a key factor for successful requirements engineering, it is important that BPM be shared by all stakeholders. Unfortunately, organizations may end up with inconsistent BPM not covering all stakeholders'...

    Provided By Politecnico di Torino

  • White Papers // Feb 2011

    A Wireless Sensor Network-Based Approach to Large-Scale Dimensional Metrology

    In many branches of industry, dimensional measurements have become an important part of the production cycle, in order to check product compliance with specifications. This task is not trivial especially when dealing with large-scale dimensional measurements: the bigger the measurement dimensions are, the harder is to achieve high accuracies. Nowadays,...

    Provided By Politecnico di Torino

  • White Papers // Feb 2011

    Business Model for Mobility and Interactivity in Heterogeneous Convergent Environment - A Study Case

    This paper presents a study for a business model applied to heterogeneous systems for a mobility and interactivity framework. The main idea is a system based in heterogeneity and convergence technological oriented to end-user. Now-a-days, the conventional systems are formed only by homogeneous systems and not always end-to-end. For this...

    Provided By Politecnico di Torino

  • White Papers // Feb 2011

    Linked Data Approach for Selection Process Automation in Systematic Reviews

    A systematic review is a literature review performed to answer a set of research questions and has to be performed according to a pre-defined protocol describing how primary sources are selected and categorized. It strives to produce an objective evaluation of findings available on a certain topic, reducing as much...

    Provided By Politecnico di Torino

  • White Papers // Feb 2011

    Mining Unclassified Traffic Using Automatic Clustering Techniques

    In this paper, the authors present a fully unsupervised algorithm to identify classes of traffic inside an aggregate. The algorithm leverages on the K-means clustering algorithm, augmented with a mechanism to automatically determine the number of traffic clusters. The signatures used for clustering are statistical representations of the application layer...

    Provided By Politecnico di Torino

  • White Papers // Jan 2011

    Modeling Sleep Modes Gains With Random Graphs

    Nowadays two main approaches are being pursued to reduce energy consumption of network devices: the use of sleep modes in which devices can be put in low-power state, and the adoption of energy proportional approaches where the device architecture is designed to make energy consumption proportional to the actual load....

    Provided By Politecnico di Torino

  • White Papers // Jan 2011

    10-year Experience of Internet Traffic Monitoring With Tstat

    Network monitoring has always played a key role in understanding telecommunication networks since the pioneering time of the Internet. Today, monitoring traffic has become a key element to characterize network usage and users' activities, to understand how complex applications work, to identify anomalous or malicious behaviors. In this paper, the...

    Provided By Politecnico di Torino

  • White Papers // Jan 2011

    Design of Fault-Tolerant Logical Topologies in Wavelength-Routed Optical IP Networks

    In this paper the authors illustrate a new methodology for the design of fault-tolerant logical topologies in wavelength-routed optical networks exploiting wavelength division multiplexing, and supporting both unicast and multicast IP datagram flows. The approach to protection and restoration generalizes the "Design protection" concepts, and relies on the dynamic capabilities...

    Provided By Politecnico di Torino

  • White Papers // Jan 2011

    Efficient Broadcasting of Safety Messages in Multihop Vehicular Networks

    Broadcasting of safety messages is one of the fundamental services in multihop vehicular networks. These services typically require to deliver the information to all vehicles traveling over a geographical area, with high reliability and low delay. The authors focus on a unidirectional vehicular network supporting safety applications, and they present...

    Provided By Politecnico di Torino

  • White Papers // Jan 2011

    Multi-Hop Scheduling Algorithms in Switches With Reconfiguration Latency

    Optical Switching Fabrics (OSF) is receiving increasing attention in the design of high speed packet switches, due to their excellent properties in terms of available bandwidth and reduced power consumption. However, most optical devices suffer reconfiguration latency each time input/output connections are modified; unfortunately, this latency may not be negligible...

    Provided By Politecnico di Torino

  • White Papers // Feb 2010

    Hy-Sim: Model Based Hybrid Simulation Framework for WSN Application Development

    By bringing the physical world and the virtual one closer, one is able to expand the possibilities of accelerating and easing embedded system design. In case of Wireless Sensor Network (WSNs), which require testing of the developed applications in hundreds to thousands of nodes, this is even more useful. The...

    Provided By Politecnico di Torino

  • White Papers // Jun 2009

    Engineering a Quality of Service-Enabled Network: A Case Study

    This paper presents a case study concerning a network operator that wants to provide services with a certain degree of quality to its customers. Users are presented with a set of services with different Quality of Service capabilities and the network is engineered in order to satisfy the requests and...

    Provided By Politecnico di Torino

  • White Papers // Jan 2010

    NETPDL: An Extensible XML-Based Language for Packetheader Description

    Although several applications need to know the format of network packets to perform their tasks, till now, each application uses its own packet description database. This paper addresses this problem by proposing the NetPDL, an XML-based language for describing packet headers, which has the potential of enabling the realization of...

    Provided By Politecnico di Torino

  • White Papers // Jan 2011

    Design of Fault-Tolerant Logical Topologies in Wavelength-Routed Optical IP Networks

    In this paper the authors illustrate a new methodology for the design of fault-tolerant logical topologies in wavelength-routed optical networks exploiting wavelength division multiplexing, and supporting both unicast and multicast IP datagram flows. The approach to protection and restoration generalizes the "Design protection" concepts, and relies on the dynamic capabilities...

    Provided By Politecnico di Torino

  • White Papers // Jan 2009

    A Holistic Approach to Information Distribution in Ad Hoc Networks

    The authors investigate the problem of spreading information contents in a wireless ad hoc network with mechanisms embracing the peer-to-peer paradigm. In the vision, information dissemination should satisfy the following requirements: It conforms to a predefined distribution and it is evenly and fairly carried by all nodes in their turn....

    Provided By Politecnico di Torino

  • White Papers // Jan 2009

    Efficient LDPC Codes Over GF(q) for Lossy Data Compression

    In this paper the authors consider the lossy compression of a binary symmetric source. They present a scheme that provides a low complexity lossy compressor with near optimal empirical performance. The proposed scheme is based on b-reduced ultra-sparse LDPC codes over GF(q). Encoding is performed by the Reinforced Belief Propagation...

    Provided By Politecnico di Torino

  • White Papers // Sep 2009

    A Lightweight Distributed Solution to Content Replication in Mobile Networks

    Performance and reliability of content access in mobile networks is conditioned by the number and location of content replicas deployed at the network nodes. Facility location theory has been the traditional, centralized approach to study content replication: computing the number and placement of replicas in a network can be cast...

    Provided By Politecnico di Torino

  • White Papers // Jun 2009

    Improving the Reusability and Interoperability of E-Learning Material

    A key requirement for e-learning materials is reusability and interoperability, that is the possibility to use at least part of the contents in different courses, and to deliver them trough different platforms. These features make possible to limit the cost of new packages, but require the development of material according...

    Provided By Politecnico di Torino

  • White Papers // Jul 2009

    A Review of Localization Algorithms for Distributed Wireless Sensor Networks in Manufacturing

    Wireless Sensor Networks (WSNs) typically consist of a large number of densely populated sensor nodes. Due to important advances in integrated circuits and radio technologies, the use of distributed sensor networks is becoming increasingly widespread for a variety of applications, e.g. indoor navigation, environmental monitoring, people and object tracking, logistics,...

    Provided By Politecnico di Torino

  • White Papers // May 2010

    An Empirical Regressive Model to Improve the Metrological Performance of Mobile Spatial Coordinate Measuring Systems

    The Mobile Spatial coordinate Measuring system (MScMS) is a system to perform dimensional measurements of large-scale objects. It consists of a wireless measuring probe with UltraSonic (US) transceivers, the position of which is determined using a distributed constellation of analogous transceivers arranged around the measuring area. The principle is to...

    Provided By Politecnico di Torino

  • White Papers // Feb 2011

    A Wireless Sensor Network-Based Approach to Large-Scale Dimensional Metrology

    In many branches of industry, dimensional measurements have become an important part of the production cycle, in order to check product compliance with specifications. This task is not trivial especially when dealing with large-scale dimensional measurements: the bigger the measurement dimensions are, the harder is to achieve high accuracies. Nowadays,...

    Provided By Politecnico di Torino

  • White Papers // Jan 2011

    Efficient Broadcasting of Safety Messages in Multihop Vehicular Networks

    Broadcasting of safety messages is one of the fundamental services in multihop vehicular networks. These services typically require to deliver the information to all vehicles traveling over a geographical area, with high reliability and low delay. The authors focus on a unidirectional vehicular network supporting safety applications, and they present...

    Provided By Politecnico di Torino

  • White Papers // Jan 2010

    Service Providers Indexing Using P2P Systems

    The idea of sharing resources across the network has become very popular during the last few years, leading to a diversified scenario in which shared resources include not only files and videos but also storage and CPU cycles. A new trend is to extend this paradigm toward a distributed architecture...

    Provided By Politecnico di Torino

  • White Papers // Jan 2010

    Kiss to Abacus: A Comparison of P2P-TV Traffic Classifiers

    In the last few years the research community has proposed several techniques for network traffic classification. While the performance of these methods is promising especially for specific classes of traffic and particular network conditions, the lack of accurate comparisons among them makes it difficult to choose between them and find...

    Provided By Politecnico di Torino

  • White Papers // Feb 2009

    Evidences Behind Skype Outage

    Skype is one of the most successful VoIP application in the current Internet spectrum. One of the most peculiar characteristics of Skype is that it relies on a P2P infrastructure for the exchange of signaling information amongst active peers. During August 2007, an unexpected outage hit the Skype overlay, yielding...

    Provided By Politecnico di Torino

  • White Papers // Feb 2009

    KISS: Stochastic Packet Inspection

    This paper proposes KISS, a new Internet classification method. Motivated by the expected raise of UDP traffic volume, which stems from the momentum of P2P streaming applications, the authors propose a novel statistical payload-based classification framework, targeted to UDP traffic. Statistical signatures are automatically inferred from training data, by the...

    Provided By Politecnico di Torino

  • White Papers // Mar 2009

    An Abacus for P2P-TV Traffic Classification

    This paper focuses on the online classification of traffic generated by P2P-TV applications, live video delivering services used by an ever increasing number of users worldwide. They designed a novel behavioural technique, which is able to reliably identify P2P-TV traffic simply based on raw counts of packets and bytes exchanged...

    Provided By Politecnico di Torino

  • White Papers // Mar 2011

    Experiences of Internet Traffic Monitoring With Tstat

    Since the early days of the Internet, network traffic monitoring has always played a strategic role in understanding and characterize users' activities. In this paper, the authors present their experience in engineering and deploying Tstat, an open source passive monitoring tool that has been developed in the past ten years....

    Provided By Politecnico di Torino

  • White Papers // Jul 2010

    Peer-to-Peer Traffic Classification: Exploiting Human Communication Dynamics

    This paper focuses on the online classification of traffic generated by P2P applications, considering two approaches with radically different designs. One approach is payload based: it inspects the packet payload to automatically gather a stochastic description of the content, thus inferring the syntax of the application protocol rather than payload...

    Provided By Politecnico di Torino

  • White Papers // Dec 2009

    Formally-Based Black-Box Monitoring of Security Protocols

    In the challenge of ensuring the correct behaviour of legacy implementations of security protocols, a formally-based approach is presented to design and implement monitors that stop insecure protocol runs executed by such legacy implementations, without the need of their source code. The authors validate the approach at a case study...

    Provided By Politecnico di Torino

  • White Papers // Jul 2011

    Proactive Seeding for Information Cascades in Cellular Networks

    In today's Internet, Online Social Networks (OSNs) play an important role in informing users about content. At the same time, mobile devices provide ubiquitous access to this content through the cellular infrastructure. In this paper, the authors propose Proactive Seeding - a technique for minimizing the peak load of cellular...

    Provided By Politecnico di Torino

  • White Papers // Mar 2011

    Concealable, Low-Cost Paper-Printed Antennas for WISP-Based RFIDs

    Paper-based, inkjet-printed antennas are proposed in this paper as replacement for the typical antennas used on the WISP RFID tag. These antennas are designed to be as concealable as possible. The designs presented exploit meandered techniques in order to achieve significantly reduced dimensions. In particularly, text-based meandered line techniques are...

    Provided By Politecnico di Torino

  • White Papers // Jan 2009

    To Cache or Not to Cache?

    The authors address cooperative caching in mobile ad hoc networks where information is exchanged in a peer-to-peer fashion among the network nodes. Their objective is to devise a fully-distributed caching strategy whereby nodes, independently of each other, decide whether to cache or not some content, and for how long. Each...

    Provided By Politecnico di Torino

  • White Papers // Apr 2012

    Offloading Cellular Networks Through ITS Content Download

    Content downloading by mobile users is expected to significantly increase the cellular network load. Vehicular users, in particular, are likely to engage in information retrieval on the move: in this context, Intelligent Transportation Systems (ITS) can play an important role in offloading the cellular infrastructure. The authors investigate the effectiveness...

    Provided By Politecnico di Torino

  • White Papers // Jun 2009

    On the Performance of Secure Vehicular Communication Systems

    Vehicular Communication (VC) systems are being developed primarily to enhance transportation safety and efficiency. Vehicle-to-vehicle communication, in particular frequent cooperative awareness messages or safety beacons, have been considered over the past years as a main approach. Meanwhile, the need to provide security and safeguard the users privacy is well understood,...

    Provided By Politecnico di Torino

  • White Papers // Sep 2011

    Exploiting Traffic Dynamics in Power-Aware Logical Topology Design

    The authors propose the Multi-Period Power-Aware Logical Topology Design. They compared two different heuristics and show that exploiting the day-night fluctuations of the traffic can lead to significant power savings at a low reconfiguration cost. Recent studies show that the Information and Communication Technologies (ICT) sector is responsible for a...

    Provided By Politecnico di Torino

  • White Papers // Jan 2009

    PEDS: A Parallel Error Detection Scheme for TCAM Devices

    Ternary Content-Addressable Memory (TCAM) devices are increasingly used for performing high-speed packet classification, which is an essential component of many networking applications such as routing, monitoring and security. For packet classification, routers use a classification database that consists of rules (sometimes called filters). Each such rule specifies a certain pattern,...

    Provided By Politecnico di Torino

  • White Papers // Jan 2009

    Optimal Fast Hashing

    This paper is about designing optimal high-throughput hashing schemes that minimize the total number of memory accesses needed to build and access an hash table. Recent schemes often promote the use of multiple-choice hashing. However, such a choice also implies a significant increase in the number of memory accesses to...

    Provided By Politecnico di Torino

  • White Papers // Jan 2009

    Layered Interval Codes for TCAM-Based Classification

    Ternary Content-Addressable Memories (TCAMs) are increasingly used for high-speed packet classification. TCAMs compare packet headers against all rules in a classification database in parallel and thus provide high throughput. TCAMs are not well-suited, however, for representing rules that contain range fields and prior art algorithms typically represent each such rule...

    Provided By Politecnico di Torino

  • White Papers // Aug 2010

    Message-Passing for Wireless Scheduling: An Experimental Study

    In the recent years, message-passing paradigm has emerged as a canonical algorithmic solution to solve network-wide problems by means of minimal local information exchange, across variety of disciplines. The primary purpose of this work is to understand trade-offs offered between network performance and protocol overhead by a class of message-passing...

    Provided By Politecnico di Torino

  • White Papers // Jan 2011

    Multi-Hop Scheduling Algorithms in Switches With Reconfiguration Latency

    Optical Switching Fabrics (OSF) is receiving increasing attention in the design of high speed packet switches, due to their excellent properties in terms of available bandwidth and reduced power consumption. However, most optical devices suffer reconfiguration latency each time input/output connections are modified; unfortunately, this latency may not be negligible...

    Provided By Politecnico di Torino

  • White Papers // May 2011

    Design and Control of Next Generation Distribution Frames

    Today, the permutation of circuits in the Main Distribution Frames (MDF), which connect the subscriber lines to POTS and to DSLAMs, is still operated manually. However, new market regulations, allowing subscribers to change network operator frequently, and the new schemes to concentrate active ADSL users into few DSLAMs during off-peak...

    Provided By Politecnico di Torino

  • White Papers // Jun 2011

    Passive Characterization of SopCast Usage in Residential ISPs

    In this paper, the authors present an extensive analysis of traffic generated by SopCast users and collected from operative networks of three national ISPs in Europe. After more than a year of continuous monitoring, they present results about the popularity of SopCast which is the largely preferred application in the...

    Provided By Politecnico di Torino

  • White Papers // Feb 2011

    Mining Unclassified Traffic Using Automatic Clustering Techniques

    In this paper, the authors present a fully unsupervised algorithm to identify classes of traffic inside an aggregate. The algorithm leverages on the K-means clustering algorithm, augmented with a mechanism to automatically determine the number of traffic clusters. The signatures used for clustering are statistical representations of the application layer...

    Provided By Politecnico di Torino

  • White Papers // Jan 2011

    10-year Experience of Internet Traffic Monitoring With Tstat

    Network monitoring has always played a key role in understanding telecommunication networks since the pioneering time of the Internet. Today, monitoring traffic has become a key element to characterize network usage and users' activities, to understand how complex applications work, to identify anomalous or malicious behaviors. In this paper, the...

    Provided By Politecnico di Torino

  • White Papers // May 2011

    Investigating Overlay Topologies and Dynamics of P2P-TV Systems: the Case of SopCast

    Several successful commercial P2P-TV applications are already available. Unfortunately, some algorithms and protocols they adopt are unknown, since many follow a closed and proprietary design. This calls for tools and methodologies that allow the investigation of the application behavior. In this paper, the authors present a novel approach to analyze...

    Provided By Politecnico di Torino

  • White Papers // Feb 2010

    KISS: Stochastic Packet Inspection Classifier for UDP Traffic

    This paper proposes KISS, a novel Internet classification engine. Motivated by the expected raise of UDP traffic, which stems from the momentum of P2P streaming applications, the authors propose a novel classification framework which leverages on statistical characterization of payload. Statistical signatures are derived by the means of a Chi-Square...

    Provided By Politecnico di Torino

  • White Papers // Sep 2009

    Stochastic Packet Inspection for TCP Traffic

    In this paper, the authors extend the concept of Stochastic Packet Inspection (SPI) to support TCP traffic classification. SPI is a method based on the statistical fingerprint of the application-layer headers: by characterizing the frequencies of observed symbols, SPI can identify application protocol formats by automatically recognizing group of bits...

    Provided By Politecnico di Torino

  • White Papers // Nov 2009

    Remote Ethernet PLC Networking and Control

    Now-a-days, in the people highly automated, high-tech society, programmable logic controllers PLC are as common as their personal computers or laptops. They are more resilient and more compact than conventional computers, they can be programmed to be very specific tasks and they can be used in all kind of environments....

    Provided By Politecnico di Torino

  • White Papers // Aug 2009

    Dimensioning Rules Regarding Radio Resources in GSM/GPRS Networks

    Many paper have studied traffic modeling in GSM/GPRS networks trying to establish different performance parameters needed for dimensioning purposes. An important element of these networks is the radio resources. Sharing resources between different users and different services is a key concept of radio resources dimensioning in GSM/GPRS networks. In this...

    Provided By Politecnico di Torino