Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Andrea Passarella is active.

Publication


Featured researches published by Andrea Passarella.


IEEE Communications Magazine | 2006

Opportunistic networking: data forwarding in disconnected mobile ad hoc networks

Luciana Pelusi; Andrea Passarella; Marco Conti

Opportunistic networks are one of the most interesting evolutions of MANETs. In opportunistic networks, mobile nodes are enabled to communicate with each other even if a route connecting them never exists. Furthermore, nodes are not supposed to possess or acquire any knowledge about the network topology, which (instead) is necessary in traditional MANET routing protocols. Routes are built dynamically, while messages are en route between the sender and the destination(s), and any possible node can opportunistically be used as next hop, provided it is likely to bring the message closer to the final destination. These requirements make opportunistic networks a challenging and promising research field. In this article we survey the most interesting case studies related to opportunistic networking and discuss and organize a taxonomy for the main routing and forwarding approaches in this challenging environment. We finally envision further possible scenarios to make opportunistic networks part of the next-generation Internet


world of wireless mobile and multimedia networks | 2007

HiBOp: a History Based Routing Protocol for Opportunistic Networks

Chiara Boldrini; Marco Conti; Jacopo Jacopini; Andrea Passarella

In opportunistic networks the existence of a simultaneous path between a sender and a receiver is not assumed. This model (which fits well to pervasive networking environments) completely breaks the main assumptions on which MANET routing protocols are built. Routing in opportunistic networks is usually based on some form of controlled flooding. But often this results in very high resource consumption and network congestion. In this paper we advocate context-based routing for opportunistic networks. We provide a general framework for managing and using context for taking forwarding decisions. We propose a context-based protocol (HiBOp), and compare it with popular solutions, i.e., Epidemic Routing and PROPHET. Results show that HiBOp is able to drastically reduce resource consumption. At the same time, it significantly reduces the message loss rate, and preserves the performance in terms of message delay.


IEEE Communications Magazine | 2010

From opportunistic networks to opportunistic computing

Marco Conti; Silvia Giordano; Martin May; Andrea Passarella

Personal computing devices, such as smart-phones and PDAs, are commonplace, bundle several wireless network interfaces, can support compute intensive tasks, and are equipped with powerful means to produce multimedia content. Thus, they provide the resources for what we envision as a human pervasive network: a network formed by user devices, suitable to convey to users rich multimedia content and services according to their interests and needs. Similar to opportunistic networks, where the communication is built on connectivity opportunities, we envisage a network above these resources that joins together features of traditional pervasive networks and opportunistic networks fostering a new computing paradigm: opportunistic computing. In this article we discuss the evolution from opportunistic networking to opportunistic computing; we survey key recent achievements in opportunistic networking, and describe the main concepts and challenges of opportunistic computing. We finally envision further possible scenarios and functionalities to make opportunistic computing a key player in the next-generation Internet.


modeling analysis and simulation of wireless and mobile systems | 2004

Performance measurements of motes sensor networks

Giuseppe Anastasi; A. Falchi; Andrea Passarella; Marco Conti; Enrico Gregori

In this paper we investigate the performance of mica2 and mica2dot Berkeley motes by means of an extensive experimental analysis. This study is aimed at analyzing the main elements that characterize the performance of a sensor network, e.g., power consumption in different operating conditions, impact of weather conditions, interference between neighboring nodes, etc. Even if the analysis is related to a specific technology it provides some general useful information. Specifically, we found that the transmission range of mote sensor nodes decreases significantly in the presence of fog or rain. We also investigated the interference between neighboring nodes and, based on the experimental results, we propose a channel model for mote sensor nodes. This model is very similar to the channel model of IEEE 802.11 networks.


Pervasive and Mobile Computing | 2012

Fast track article: Looking ahead in pervasive computing: Challenges and opportunities in the era of cyber-physical convergence

Marco Conti; Sajal K. Das; Chatschik Bisdikian; Mohan Kumar; Lionel M. Ni; Andrea Passarella; George Roussos; Gerhard Tröster; Gene Tsudik; Franco Zambonelli

The physical environment is becoming more and more saturated with computing and communication entities that interact among themselves, as well as with users: virtually everything will be enabled to source information and respond to appropriate stimuli. In this technology-rich scenario, real-world components interact with cyberspace via sensing, computing and communication elements, thus driving towards what is called the Cyber-Physical World (CPW) convergence. Information flows from the physical to the cyber world, and vice-versa, adapting the converged world to human behavior and social dynamics. Indeed humans are at the center of this converged world since information about the context in which they operate is the key element to adapt the CPW applications and services. Alongside, a new wave of (human) social networks and structures are emerging as important drivers for the development of novel communication and computing paradigms. In this article we present some of the research issues, challenges and opportunities in the convergence between the cyber and physical worlds. This article is not a comprehensive survey of all aspects of the CPW convergence. Instead, it presents some exciting research challenges and opportunities identified by members of the journals editorial board with a goal to stimulate new research activities in the emerging areas of CPW convergence.


IEEE Communications Magazine | 2011

Human mobility models for opportunistic networks

Dmytro Karamshuk; Chiara Boldrini; Marco Conti; Andrea Passarella

Mobile ad hoc networks enable communications between clouds of mobile devices without the need for a preexisting infrastructure. One of their most interesting evolutions are opportunistic networks, whose goal is to also enable communication in disconnected environments, where the general absence of an end-to-end path between the sender and the receiver impairs communication when legacy MANET networking protocols are used. The key idea of OppNets is that the mobility of nodes helps the delivery of messages, because it may connect, asynchronously in time, otherwise disconnected subnetworks. This is especially true for networks whose nodes are mobile devices (e.g., smartphones and tablets) carried by human users, which is the typical OppNets scenario. In such a network where the movements of the communicating devices mirror those of their owners, finding a route between two disconnected devices implies uncovering habits in human movements and patterns in their connectivity (frequencies of meetings, average duration of a contact, etc.), and exploiting them to predict future encounters. Therefore, there is a challenge in studying human mobility, specifically in its application to OppNets research. In this article we review the state of the art in the field of human mobility analysis and present a survey of mobility models. We start by reviewing the most considerable findings regarding the nature of human movements, which we classify along the spatial, temporal, and social dimensions of mobility. We discuss the shortcomings of the existing knowledge about human movements and extend it with the notion of predictability and patterns. We then survey existing approaches to mobility modeling and fit them into a taxonomy that provides the basis for a discussion on open problems and further directions for research on modeling human mobility.


IEEE Communications Surveys and Tutorials | 2015

Data Offloading Techniques in Cellular Networks: A Survey

Filippo Rebecchi; Marcelo Dias de Amorim; Vania Conan; Andrea Passarella; Raffaele Bruno; Marco Conti

One of the most engaging challenges for mobile operators today is how to manage the exponential data traffic increase. Mobile data offloading stands out as a promising and low-cost solution to reduce the burden on the cellular network. To make this possible, we need a new hybrid network paradigm that leverages the existence of multiple alternative communication channels. This entails significant modifications in the way data are handled, affecting also the behavior of network protocols. In this paper, we present a comprehensive survey of data offloading techniques in cellular networks and extract the main requirements needed to integrate data offloading capabilities into todays mobile networks. We classify existing strategies into two main categories, according to their requirements in terms of content delivery guarantees: delayed and nondelayed offloading. We overview the technical aspects and discuss the state of the art in each category. Finally, we describe in detail the novel functionalities needed to implement mobile data offloading in the access network, as well as current and future research challenges in the field, with an eye toward the design of hybrid architectures.


Social Networks | 2015

The structure of online social networks mirrors those in the offline world

R. I. M. Dunbar; Valerio Arnaboldi; Marco Conti; Andrea Passarella

Abstract We use data on frequencies of bi-directional posts to define edges (or relationships) in two Facebook datasets and a Twitter dataset and use these to create ego-centric social networks. We explore the internal structure of these networks to determine whether they have the same kind of layered structure as has been found in offline face-to-face networks (which have a distinctively scaled structure with successively inclusive layers at 5, 15, 50 and 150 alters). The two Facebook datasets are best described by a four-layer structure and the Twitter dataset by a five-layer structure. The absolute sizes of these layers and the mean frequencies of contact with alters within each layer match very closely the observed values from offline networks. In addition, all three datasets reveal the existence of an innermost network layer at ∼1.5 alters. Our analyses thus confirm the existence of the layered structure of ego-centric social networks with a very much larger sample (in total, >185,000 egos) than those previously used to describe them, as well as identifying the existence of an additional network layer whose existence was only hypothesised in offline social networks. In addition, our analyses indicate that online communities have very similar structural characteristics to offline face-to-face networks.


Wireless Networks | 2008

802.11 power-saving mode for mobile computing in Wi-Fi hotspots: limitations, enhancements and open issues

Giuseppe Anastasi; Marco Conti; Enrico Gregori; Andrea Passarella

Nowadays Wi-Fi is the most mature technology for wireless-Internet access. Despite the large (and ever increasing) diffusion of Wi-Fi hotspots, energy limitations of mobile devices are still an issue. To deal with this, the standard 802.11 includes a Power-Saving Mode (PSM), but not much attention has been devoted by the research community to understand its performance in depth. We think that this paper contributes to fill the gap. We focus on a typical Wi-Fi hotspot scenario, and assess the dependence of the PSM behavior on several key parameters such as the packet loss probability, the Round Trip Time, the number of users within the hotspot. We show that during traffic bursts PSM is able to save up to 90% of the energy spent when no energy management is used, and introduces a limited additional delay. Unfortunately, in the case of long inactivity periods between bursts, PSM is not the optimal solution for energy management. We thus propose a very simple Cross-Layer Energy Manager (XEM) that dynamically tunes its energy-saving strategy depending on the application behavior and key network parameters. XEM does not require any modification to the applications or to the 802.11 standard, and can thus be easily integrated in current Wi-Fi devices. Depending on the network traffic pattern, XEM reduces the energy consumption of an additional 20–96% with respect to the standard PSM.


Pervasive and Mobile Computing | 2005

Understanding the real behavior of Mote and 802.11 ad hoc networks: an experimental approach

Giuseppe Anastasi; Eleonora Borgia; Marco Conti; Enrico Gregori; Andrea Passarella

IEEE 802.11 and Mote devices are today two of the most interesting wireless technologies for ad hoc and sensor networks respectively, and many efforts are currently devoted to understanding their potentialities. Unfortunately, few works adopt an experimental approach, though several papers highlight that popular simulation and analytical approximations may lead to very inaccurate results. In this paper we discuss outcomes from an extensive measurement study focused on these technologies. We analyze the dependence of the communication range on several parameters, such as node distance from the ground, transmission data rate, environment humidity. Then, we study the extent of the physical carrier sensing zone around a sending node. On the basis of these elements, we provide a unified wireless link model for both technologies. Finally, by using this model we analyze well-known scenarios (such as the hidden node problem), and we modify the traditional formulations according to our experimental results.

Collaboration


Dive into the Andrea Passarella's collaboration.

Top Co-Authors

Avatar

Marco Conti

National Research Council

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Chiara Boldrini

National Research Council

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Raffaele Bruno

National Research Council

View shared research outputs
Top Co-Authors

Avatar

Enrico Gregori

National Research Council

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Lorenzo Valerio

National Research Council

View shared research outputs
Top Co-Authors

Avatar

Fabio Pezzoni

National Research Council

View shared research outputs
Researchain Logo
Decentralizing Knowledge