Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Renato Lo Cigno is active.

Publication


Featured researches published by Renato Lo Cigno.


IEEE Transactions on Mobile Computing | 2015

How Shadowing Hurts Vehicular Communications and How Dynamic Beaconing Can Help

Christoph Sommer; Stefan Joerer; Michele Segata; Ozan K. Tonguz; Renato Lo Cigno; Falko Dressler

We study the effect of radio signal shadowing dynamics, caused by vehicles and by buildings, on the performance of beaconing protocols in Inter-Vehicular Communication (IVC). Recent research indicates that beaconing, i.e., one hop message broadcast, shows excellent characteristics and can outperform other communication approaches for both safety and efficiency applications, which require low latency and wide area information dissemination, respectively. We show how shadowing dynamics of moving obstacles hurt IVC, reducing the performance of beaconing protocols. At the same time, shadowing also limits the risk of overloading the wireless channel. To the best of our knowledge, this is the first study identifying the problems and resulting possibilities of such dynamic radio shadowing. We demonstrate how these challenges and opportunities can be taken into account and outline a novel approach to dynamic beaconing. It provides low-latency communication (i.e., very short beaconing intervals), while ensuring not to overload the wireless channel. The presented simulation results substantiate our theoretical considerations.


international ifip tc networking conference | 2009

On the Optimal Scheduling of Streaming Applications in Unstructured Meshes

Luca Abeni; Csaba Kiraly; Renato Lo Cigno

Unstructured, chunk-based P2P streaming (TV and Video) systems are becoming popular and are subject of intense research. Chunk and peer selection strategies (or scheduling) are among the main driver of performance. This work presents the formal proof that there exist a distributed scheduling strategy which is able to distribute every chunk to all N peers in exactly ***log2 (N ) *** + 1 steps. Since this is the minimum number of steps needed to distribute a chunk, the proposed strategy is optimal. Such a strategy is implementable and an entire class of deadline-based schedulers realize it. We show that at least one of the deadline-based schedulers is resilient to the reduction of the neighborhood size down to values as small as log2 (N ). Selected simulation results highlighting the properties of the algorithms in realistic scenarios complete the paper.


European Transactions on Telecommunications | 2002

Generalized window advertising for TCP congestion control

Mario Gerla; Renato Lo Cigno; Saverio Mascolo; Wenjie Weng

AbstracL Congestion in the Internet is a major cause of network performance degradation. The Generalized Window Advertising (GWA) scheme proposed in this paper is a new approach for enhancing the congestion control properties of TCP. GWA requires only minor modifications to the existing protocol stack and is completely backward compatible, allowing GWA-hosts to interact with non-GWA hosts without modifications. GWA exploits the notion of end-host-network cooperation, with the congestion level notified from the network to end hosts. It is based on solid control theory results that guarantee performance and stable network operation. GWA is able to avoid window oscillations and the related fluctuations in offered load and network performance. This makes it more robust to sustained network overload due to a large number of connections competing for the same bottleneck, a situation where traditional TCP implementations fail to provide satisfactory performance. GWA-TCP is compared with traditional TCP, TCP with RED and also ECN using the ns-2 simulator. Results show that in most cases GWA-TCP outperforms the traditional schemes. In particular, when compared with ECN, it provides smoother network operation and increased fairness.


IEEE Transactions on Vehicular Technology | 2014

A Vehicular Networking Perspective on Estimating Vehicle Collision Probability at Intersections

Stefan Joerer; Michele Segata; Bastian Bloessl; Renato Lo Cigno; Christoph Sommer; Falko Dressler

Finding viable metrics to assess the effectiveness of intelligent transportation systems (ITSs) in terms of safety is one of the major challenges in vehicular networking research. We aim to provide a metric, i.e., an estimation of the vehicle collision probability at intersections, that can be used for evaluating intervehicle communication (IVC) concepts. In the last years, the vehicular networking community reported in several studies that safety-enhancing protocols and applications cannot be evaluated based only on networking metrics such as delays and packet loss rates. We present an evaluation scheme that addresses this need by quantifying the probability of a future crash, depending on the situation in which a vehicle is receiving a beacon message [e.g., a cooperative awareness message (CAM) or a basic safety message (BSM)]. Thus, our criticality metric also allows for fully distributed situation assessment. We investigate the impact of safety messaging between cars approaching an intersection using a modified road traffic simulator that allows selected vehicles to disregard traffic rules. As a direct result, we show that simple beaconing is not as effective as anticipated in suburban environments. More profoundly, however, our simulation results reveal more details about the timeliness (regarding the criticality assessment) of beacon messages, and as such, they can be used to develop more sophisticated beaconing solutions.


international conference on communications | 2004

An MMPP-based hierarchical model of Internet traffic

Luca Muscariello; M. Meillia; Michela Meo; Marco Ajmone Marsan; Renato Lo Cigno

In this paper, we propose a MMPP (Markov modulated Poisson process) traffic model that accurately approximates the LRU (long range dependence) characteristics of Internet traffic traces. Using the notion of sessions and flows, the proposed MMPP model mimics the real hierarchical behavior of the packet generation process by Internet users. Thanks to its hierarchical structure, the proposed model is both simple and intuitive: it allows the generation of traffic with the desired characteristics by easily setting a few input parameters which have a clear physical meaning. Results prove that the queuing behavior of the traffic generated by the MMPP model is coherent with the one produced by the real traces collected at our institution edge router under different networking scenarios and loads. Due to its characteristics, the proposed MMPP traffic model can be used as a simple and manageable tool for IP network performance analysis, as well as for network planning and dimensioning.


global communications conference | 2000

Bandwidth feedback control of TCP and real time sources in the Internet

M. Geria; Wenjie Weng; Renato Lo Cigno

This paper proposes a feedback based algorithm for congestion control and bandwidth allocation in the presence of either TCP traffic or both TCP and real time traffic. In this proposal, the network layer conveys bandwidth and propagation delay measurements to data sources, for instance using IPv6 optional fields. TCP sources use this bandwidth delay product to control their congestion window, while video sources use the available bandwidth feedback to adjust their data sending rate. The experiments show that with this approach, the network achieves stable equilibrium, and users, either transmitting TCP traffic or real-time traffic, can share network resources fairly. Furthermore, since TCP sources learn about the available bandwidth independent of packet loss, there is no need to reduce the congestion window following a packet loss. This provides a way to improve the TCP performance in wireless networks where it is difficult to distinguish between congestion loss and radio channel interference loss.


IEEE ACM Transactions on Networking | 2004

Closed queueing network models of interacting long-lived TCP flows

Michele Garetto; Renato Lo Cigno; Michela Meo; Marco Ajmone Marsan

This paper presents a new analytical model for the estimation of the performance of TCP connections. The model is based on the description of the behavior of TCP in terms of a closed queueing network. The model is very accurate, deriving directly from the finite state machine description of the protocol. The assessment of the accuracy of the analytical model is based on comparisons against detailed simulation experiments developed with the ns-2 package. The protocol model interacts with an IP network model that can take into account meshed topologies with several bottlenecks. Numerical results indicate that the proposed closed queueing network model provides accurate performance estimates in all situations. A novel and interesting property of the model is the possibility of deriving ensemble distributions of relevant parameters, such as, for instance, the transmission window size or the timeout probability, which provide useful insight into the protocol behavior and properties.


international conference on computer communications | 2013

How shadowing hurts vehicular communications and how dynamic beaconing can help

Christoph Sommer; Stefan Joerer; Michele Segata; Ozan K. Tonguz; Renato Lo Cigno; Falko Dressler

We study the effect of radio signal shadowing dynamics, caused by vehicles and by buildings, on the performance of beaconing protocols in Inter-Vehicular Communication (IVC). Recent research indicates that beaconing, i.e., one hop message broadcast, shows excellent characteristics and can outperform other communication approaches for both safety and efficiency applications, which require low latency and wide area information dissemination, respectively. To mitigate the broadcast storm problem, adaptive beaconing solutions have been proposed and designed. We show how shadowing dynamics of moving obstacles hurt IVC, reducing the performance of beaconing protocols. To the best of our knowledge, this is one of the first studies on identifying the problem and the underlying challenges and proposing the opportunities presented by such challenges. Shadowing also limits the risk of overloading the wireless channel. We demonstrate how these challenges and opportunities can be taken into account and outline a novel approach to dynamic beaconing. It provides low-latency communication (i.e., very short beaconing intervals), while ensuring not to overload the wireless channel. The presented simulation results substantiate our theoretical considerations.


IEEE Communications Magazine | 2011

Architecture of a network-aware P2P-TV application: the NAPA-WINE approach

Robert Birke; Emilio Leonardi; Marco Mellia; Arpad Bakay; Tivadar Szemethy; Csaba Kiraly; Renato Lo Cigno; Fabien Mathieu; Luca Muscariello; Saverio Niccolini; Jan Seedorf; Giuseppe Tropea

Peer to Peer streaming (P2P-TV) applications have recently emerged as cheap and efficient solutions to provide real time streaming services over the Internet. For the sake of simplicity, typical P2P-TV systems are designed and optimized following a pure layered approach, thus ignoring the effect of design choices on the underlying transport network. This simple approach, however, may constitute a threat for the network providers, due to the congestion that P2P-TV traffic can potentially generate. In this article, we present and discuss the architecture of an innovative, network cooperative P2PTV application that is being designed and developed within the STREP Project NAPA WINE1 Our application is explicitly targeted to favor cooperation between the application and the transport network layer.


ad hoc networks | 2015

A week in the life of three large Wireless Community Networks

Leonardo Maccari; Renato Lo Cigno

Wireless Community Networks (WCNs) are created and managed by a local community with the goal of sharing Internet connection and offering local services. This paper analyses the data collected on three large WCNs, ranging from 131 to 226 nodes, and used daily by thousands of people. We first analyse the topologies to get insights in the fundamental properties, next we concentrate on two crucial aspects: (i) the routing layer and (ii) metrics on the centrality of nodes and the network robustness. All the networks use the Optimized Link State Routing (OLSR) protocol extended with the Expected Transmission Count (ETX) metric. We analyse the quality of the routes and two different techniques to select the Multi-Point Relay (MPR) nodes. The centrality and robustness analysis shows that, in spite of being fully decentralized networks, an adversary that can control a small fraction of carefully chosen nodes can intercept up to 90% of the traffic. The collected data-sets are available as Open Data, so that they can be easily accessed by any interested researcher, and new studies on different topics can be performed. In fact, WCN are just an example of large wireless mesh networks, so our methodology can be applied to any other large mesh network, including commercial ISP networks.

Collaboration


Dive into the Renato Lo Cigno's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Csaba Kiraly

Budapest University of Technology and Economics

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge