Juan Gorricho - Profile on Academia.edu (original) (raw)

Papers by Juan Gorricho

Research paper thumbnail of Contributions to Efficient Resource Management in Virtual Networks

Abstract. Network virtualisation is a promising technique for a better future Internet by allowin... more Abstract. Network virtualisation is a promising technique for a better future Internet by allowing for network resource sharing. However, re-source sharing requires that virtual nodes and links be embedded onto substrate nodes and links (virtual network embedding), and thereafter the allocated resources dynamically managed throughout the lifetime of the virtual network (dynamic resource allocation). Since the con-strained virtual network embedding problem is NP–Hard, many existing approaches are not only static, but also propose heuristics by making simplifying assumptions, most of which would not apply in practical en-vironments. This PhD research proposes improvements to both virtual network embedding and dynamic resource allocation. The objective is to achieve an efficient utilisation of physical network resources. To this end, we propose a path generation-based approach for a one-shot, unsplittable flow virtual network embedding, and a reinforcement learning-based dy-namic alloc...

Research paper thumbnail of Neural Network-based Autonomous Allocation of Resources in Virtual Networks

Abstract—Network virtualisation has received attention as a way to allow for sharing of physical ... more Abstract—Network virtualisation has received attention as a way to allow for sharing of physical network resources. Sharing resources involves mapping of virtual nodes and links onto physical nodes and links respectively, and thereafter managing the allocated resources to ensure efficient resource utilisation. In this paper, we apply artificial neural networks for a dynamic, decentralised and autonomous allocation of physical network resources to the virtual networks. The objective is to achieve better efficiency in the utilisation of substrate network resources while ensuring that the quality of service requirements of the virtual networks are not violated. The proposed approach is evaluated by comparison with two static resource allocation schemes and a reinforcement learning-based approach. Keywords—Artificial neural networks, network virtualisation, resource allocation, reinforcement learning, autonomous systems. I.

Research paper thumbnail of Doctoral student

Doctoral student

The so-called second generation P2P file-sharing applications have with no doubt a better perform... more The so-called second generation P2P file-sharing applications have with no doubt a better performance than the first implementations. The most remarkable difference is due to the file division into smaller pieces, where a receiving peer of any piece automatically becomes a new source to other peers. But a new question arises on how we distribute all the pieces provided by a seed peer to minimize the global and presumably individual download times. In this paper we summarize part of the work we have developed up until now to answer this general question, in particular, we will analyze how close the present second generation P2P file-sharing applications remain from an ideal solution with the theoretical best performance, that is, where all peers are interconnected with each other and all peers have an altruistic behavior always uploading its contents at any chance. Successive modifications of the ideal solution will lead us to more realistic scenarios. We will estimate the performanc...

Research paper thumbnail of Resource allocation for network slicing in WiFi access points

2017 13th International Conference on Network and Service Management (CNSM)

Network slicing has recently appeared as one of the most important features that will be provided... more Network slicing has recently appeared as one of the most important features that will be provided by 5G networks and is attracting considerable interest from industry and academia. At the wireless edge of these networks, most of the contributions in this area are related to cellular technologies leaving behind WiFi networks. In this work, we present a resource allocation mechanism based on airtime assignment to achieve infrastructure sharing and slicing in WiFi Access Points. The approach is simple and has the potential to be straightforwardly used within scenarios of wireless access infrastructure sharing.

Research paper thumbnail of A Multi-Stage Graph Aided Algorithm for Distributed Service Function Chain Provisioning Across Multiple Domains

IEEE Access

Network Service Providers (NSPs) envisage to support the divergent and stringent requirements of ... more Network Service Providers (NSPs) envisage to support the divergent and stringent requirements of future services by instantiating these services as service chains, commonly referred to as Service Function Chains (SFCs), that are customized and configured to meet specific service requirements. However, due to the limited footprint of the Infrastructure Providers (InPs), these SFCs may have to transcend multiple InPs/domains. In this regard, determining the optimal set of InPs in which to embed the SFC request emerges as a complex problem for several reasons. First, the large number of possible combinations for selecting the InPs to embed the different sub-chains of the request makes this problem computationally complex, rendering optimal solutions only after long computations, especially in large scale networks, which is unfeasible for delay sensitive applications. Second, the unwillingness of InPs to disclose their internal information, which may be vital for making embedding decisions, usually implies the provisioning of single-domain solutions, which are unsuitable in this working scenario. In this regard, this paper first formulates the multi-domain service deployment problem under multiple request constraints, such as bandwidth or delay, among others. Then, due to the NP-hardness nature of the above problem, this paper proposes an algorithm that is aided by a multi-stage graph for computing a request embedding solution in a distributed manner, solving the problem in acceptable run-times. Results from different simulations reveal that the proposed algorithm is optimized in terms of acceptance ratio and embedding cost, with up to 60.0% and 88.7% improvements in terms of embedding cost and execution time, respectively, for some scenarios, in comparison with a benchmark state-of-the-art algorithm. INDEX TERMS Service function chaining, distributed algorithm, multi-domain embedding, network function virtualization.

Research paper thumbnail of A Multi-Stage Graph Aided Algorithm for Distributed Service Function Chain Provisioning Across Multiple Domains

IEEE Access, 2021

Network Service Providers (NSPs) envisage to support the divergent and stringent requirements of ... more Network Service Providers (NSPs) envisage to support the divergent and stringent requirements of future services by instantiating these services as service chains, commonly referred to as Service Function Chains (SFCs), that are customized and configured to meet specific service requirements. However, due to the limited footprint of the Infrastructure Providers (InPs), these SFCs may have to transcend multiple InPs/domains. In this regard, determining the optimal set of InPs in which to embed the SFC request emerges as a complex problem for several reasons. First, the large number of possible combinations for selecting the InPs to embed the different sub-chains of the request makes this problem computationally complex, rendering optimal solutions only after long computations, especially in large scale networks, which is unfeasible for delay sensitive applications. Second, the unwillingness of InPs to disclose their internal information, which may be vital for making embedding decisi...

Research paper thumbnail of End-to-end Virtual Resource Management across Heterogeneous Networks and Services (EVANS)

Research paper thumbnail of Slicing With Guaranteed Quality of Service in WiFi Networks

IEEE Transactions on Network and Service Management, 2020

Network slicing has recently been proposed as one of the main enablers for 5G networks. The slici... more Network slicing has recently been proposed as one of the main enablers for 5G networks. The slicing concept consists of the partition of a physical network into several self-contained logical networks (slices) that can be tailored to offer different functional or performance requirements. In the context of 5G networks, we argue that existing ubiquitous WiFi technology can be exploited to cope with new requirements. Therefore, in this paper, we propose a novel mechanism to implement network slicing in WiFi Access Points. We formulate the resource allocation problem to the different slices as a stochastic optimization problem, where each slice can have bit rate, delay, and capacity requirements. We devise a solution to the problem above using the Lyapunov drift optimization theory, and we develop a novel queuing and scheduling algorithm. We have used MATLAB and Simulink to build a prototype of the proposed solution, whose performance has been evaluated in a typical slicing scenario.

Research paper thumbnail of An intelligent two-agent self-configuration approach for radio resource management

2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), 2015

in this paper we propose the use of a two-agent learning scheme for the management of radio resou... more in this paper we propose the use of a two-agent learning scheme for the management of radio resources on cellular access networks. The management is materialized by the implementation of a self-configuration system governing the setup of several parameters on each base station. The two agents have independent goals; one is trying to maximize the quality of service and the other the economic benefit. Thanks to the combined use of the fuzzy logic technique and reinforcement learning, both agents will work in a complementary mode, achieving both goals simultaneously.

Research paper thumbnail of User activity monitoring using conventional cell phones for IMCIC 2010

User activity monitoring using conventional cell phones for IMCIC 2010

ABSTRACT User activity monitoring has a considerable potential for a whole range of new applicati... more ABSTRACT User activity monitoring has a considerable potential for a whole range of new applications in different environments: user surveillance, military purposes, health-care, etc. More precisely, in health-care there is an implicit potential application monitoring elderly people or patients suffering an illness. Besides, nowadays our society is more than ever exposed to an aging population, which is one of the main concerns of present administrations. Any technical approach alleviating the ever increasing health-care budget will be welcomed. Thankfully, recent progress in communication technologies and sensor miniaturization has opened the door to new approaches overcoming the above mentioned situation, involving, for example, remote supervision of home-confined elderly people. In particular, a real-time monitoring system of human activities would be an interesting solution to supervise aged people or people deserving medical attention. In the present paper we expose the development of a real-time monitoring system of human activities using a single cell phone equipped with some sensors. This way the monitoring system is reduced to the minimum expression, no especial hardware is required, as far as a conventional cell phone will monitor the user, classify the user activities with respect to a customized rule’s set and finally trigger the corresponding alerts when necessary Postprint (published version)

Research paper thumbnail of Evaluation of the soft handover benefits on CDMA systems

Evaluation of the soft handover benefits on CDMA systems

Universal Personal Communications …, 1996

... Polytechnic University of Catalonia. c/. Gran Capitan, s/n. Modulo C3. 08034 Barcelona. Spain... more ... Polytechnic University of Catalonia. c/. Gran Capitan, s/n. Modulo C3. 08034 Barcelona. Spain. Abstract ... Additionally, due to slow fadings, the received signal is decreased or reinforced, following a lognormal distribution with standard deviation G between 6 and 8 dB. ...

Research paper thumbnail of Indoor location on uncoordinated environments

Indoor location on uncoordinated environments

Electronics Letters, 2011

ABSTRACT Presented are two novel alternatives to implement an indoor location approach based on s... more ABSTRACT Presented are two novel alternatives to implement an indoor location approach based on signal-strength measurements for an uncoordinated environment, an environment where one does not have any control on the number of access points, their location, availability or transmitted power.

Research paper thumbnail of Resource allocation and management techniques for network slicing in wifi networks

Network slicing has recently been proposed as one of the main enablers for 5G networks; it is bou... more Network slicing has recently been proposed as one of the main enablers for 5G networks; it is bound to cope with the increasing and heterogeneous performance requirements of these systems. To ``slice'' a network is to partition a shared physical network into several self-contained logical pieces (slices) that can be tailored to offer different functional or performance requirements. Moreover, a key characteristic of the slicing paradigm is to provide resource isolation as well as an efficient use of resources. In this context, a slice is envisioned as an end-to-end virtual network which permits that the infrastructure operators lease their resources to service providers (tenants) through the dynamic, and on-demand, deployment of slices. Tenants may have complete control over the slice functions and resources, and employ them to satisfy their client’s demands. Recent works on slicing for Radio Access Networks (RANs) just focus on general architectures and frameworks for the m...

Research paper thumbnail of A Reinforcement Learning Based Approach for 5G Network Slicing Across Multiple Domains

A Reinforcement Learning Based Approach for 5G Network Slicing Across Multiple Domains

2019 15th International Conference on Network and Service Management (CNSM)

Research paper thumbnail of A multi-stage graph based algorithm for survivable Service Function Chain orchestration with backup resource sharing

A multi-stage graph based algorithm for survivable Service Function Chain orchestration with backup resource sharing

Computer Communications

Research paper thumbnail of A Multi-Domain VNE Algorithm Based on Load Balancing in the IoT Networks

A Multi-Domain VNE Algorithm Based on Load Balancing in the IoT Networks

Mobile Networks and Applications

Research paper thumbnail of Challenges to support edge-as-a-service

IEEE Communications Magazine, 2000

A new era in telecommunications is emerging. Virtualised networking functions and resources will ... more A new era in telecommunications is emerging. Virtualised networking functions and resources will offer network operators a way to shift the balance of expenditure from capital to operational, opening up networks to new and innovative services. This paper introduces the concept of Edge-as-a-Service (EaaS), a means of harnessing the flexibility of virtualised network functions and resources to enable network operators to break the tightly coupled relationship they have with their infrastructure and to enable more effective ways of generating revenue. To achieve this vision, we envisage a virtualised service access interface that can be used to programmatically alter access network functions and resources available to service providers in an elastic fashion. EaaS has many technically and economically difficult challenges that must be addressed before it can become a reality; the main challenges are summarised in this paper.

Research paper thumbnail of Management and orchestration challenges in network functions virtualization

Management and orchestration challenges in network functions virtualization

IEEE Communications Magazine, 2016

Research paper thumbnail of Server placement and assignment in virtualized radio access networks

Server placement and assignment in virtualized radio access networks

2015 11th International Conference on Network and Service Management (CNSM), 2015

Research paper thumbnail of Network Function Virtualization: State-of-the-art and Research Challenges

IEEE Communications Surveys & Tutorials, 2015

Network Function Virtualization (NFV) has drawn attention from both industry and academia as an i... more Network Function Virtualization (NFV) has drawn attention from both industry and academia as an important shift in telecommunication service provision. By decoupling network functions from the physical devices on which they run, NFV has the potential to lead to reductions in OPEX and CAPEX and to allow for deployment of new services with increased agility and faster time-to-value. Since NFV is a recently proposed paradigm, there is need for the research community to develop new architectures, software and systems, and to evaluate different possibilities and trade-offs in developing technologies for its deployment. In this paper, after discussing NFV and its relationship with complementary fields software defined networking (SDN) and cloud computing, we survey the state-of-the-art in NFV, and explore promising research directions in this area. We also explore key NFV projects, standardization efforts, early implementations, use cases and commercial products.

Research paper thumbnail of Contributions to Efficient Resource Management in Virtual Networks

Abstract. Network virtualisation is a promising technique for a better future Internet by allowin... more Abstract. Network virtualisation is a promising technique for a better future Internet by allowing for network resource sharing. However, re-source sharing requires that virtual nodes and links be embedded onto substrate nodes and links (virtual network embedding), and thereafter the allocated resources dynamically managed throughout the lifetime of the virtual network (dynamic resource allocation). Since the con-strained virtual network embedding problem is NP–Hard, many existing approaches are not only static, but also propose heuristics by making simplifying assumptions, most of which would not apply in practical en-vironments. This PhD research proposes improvements to both virtual network embedding and dynamic resource allocation. The objective is to achieve an efficient utilisation of physical network resources. To this end, we propose a path generation-based approach for a one-shot, unsplittable flow virtual network embedding, and a reinforcement learning-based dy-namic alloc...

Research paper thumbnail of Neural Network-based Autonomous Allocation of Resources in Virtual Networks

Abstract—Network virtualisation has received attention as a way to allow for sharing of physical ... more Abstract—Network virtualisation has received attention as a way to allow for sharing of physical network resources. Sharing resources involves mapping of virtual nodes and links onto physical nodes and links respectively, and thereafter managing the allocated resources to ensure efficient resource utilisation. In this paper, we apply artificial neural networks for a dynamic, decentralised and autonomous allocation of physical network resources to the virtual networks. The objective is to achieve better efficiency in the utilisation of substrate network resources while ensuring that the quality of service requirements of the virtual networks are not violated. The proposed approach is evaluated by comparison with two static resource allocation schemes and a reinforcement learning-based approach. Keywords—Artificial neural networks, network virtualisation, resource allocation, reinforcement learning, autonomous systems. I.

Research paper thumbnail of Doctoral student

Doctoral student

The so-called second generation P2P file-sharing applications have with no doubt a better perform... more The so-called second generation P2P file-sharing applications have with no doubt a better performance than the first implementations. The most remarkable difference is due to the file division into smaller pieces, where a receiving peer of any piece automatically becomes a new source to other peers. But a new question arises on how we distribute all the pieces provided by a seed peer to minimize the global and presumably individual download times. In this paper we summarize part of the work we have developed up until now to answer this general question, in particular, we will analyze how close the present second generation P2P file-sharing applications remain from an ideal solution with the theoretical best performance, that is, where all peers are interconnected with each other and all peers have an altruistic behavior always uploading its contents at any chance. Successive modifications of the ideal solution will lead us to more realistic scenarios. We will estimate the performanc...

Research paper thumbnail of Resource allocation for network slicing in WiFi access points

2017 13th International Conference on Network and Service Management (CNSM)

Network slicing has recently appeared as one of the most important features that will be provided... more Network slicing has recently appeared as one of the most important features that will be provided by 5G networks and is attracting considerable interest from industry and academia. At the wireless edge of these networks, most of the contributions in this area are related to cellular technologies leaving behind WiFi networks. In this work, we present a resource allocation mechanism based on airtime assignment to achieve infrastructure sharing and slicing in WiFi Access Points. The approach is simple and has the potential to be straightforwardly used within scenarios of wireless access infrastructure sharing.

Research paper thumbnail of A Multi-Stage Graph Aided Algorithm for Distributed Service Function Chain Provisioning Across Multiple Domains

IEEE Access

Network Service Providers (NSPs) envisage to support the divergent and stringent requirements of ... more Network Service Providers (NSPs) envisage to support the divergent and stringent requirements of future services by instantiating these services as service chains, commonly referred to as Service Function Chains (SFCs), that are customized and configured to meet specific service requirements. However, due to the limited footprint of the Infrastructure Providers (InPs), these SFCs may have to transcend multiple InPs/domains. In this regard, determining the optimal set of InPs in which to embed the SFC request emerges as a complex problem for several reasons. First, the large number of possible combinations for selecting the InPs to embed the different sub-chains of the request makes this problem computationally complex, rendering optimal solutions only after long computations, especially in large scale networks, which is unfeasible for delay sensitive applications. Second, the unwillingness of InPs to disclose their internal information, which may be vital for making embedding decisions, usually implies the provisioning of single-domain solutions, which are unsuitable in this working scenario. In this regard, this paper first formulates the multi-domain service deployment problem under multiple request constraints, such as bandwidth or delay, among others. Then, due to the NP-hardness nature of the above problem, this paper proposes an algorithm that is aided by a multi-stage graph for computing a request embedding solution in a distributed manner, solving the problem in acceptable run-times. Results from different simulations reveal that the proposed algorithm is optimized in terms of acceptance ratio and embedding cost, with up to 60.0% and 88.7% improvements in terms of embedding cost and execution time, respectively, for some scenarios, in comparison with a benchmark state-of-the-art algorithm. INDEX TERMS Service function chaining, distributed algorithm, multi-domain embedding, network function virtualization.

Research paper thumbnail of A Multi-Stage Graph Aided Algorithm for Distributed Service Function Chain Provisioning Across Multiple Domains

IEEE Access, 2021

Network Service Providers (NSPs) envisage to support the divergent and stringent requirements of ... more Network Service Providers (NSPs) envisage to support the divergent and stringent requirements of future services by instantiating these services as service chains, commonly referred to as Service Function Chains (SFCs), that are customized and configured to meet specific service requirements. However, due to the limited footprint of the Infrastructure Providers (InPs), these SFCs may have to transcend multiple InPs/domains. In this regard, determining the optimal set of InPs in which to embed the SFC request emerges as a complex problem for several reasons. First, the large number of possible combinations for selecting the InPs to embed the different sub-chains of the request makes this problem computationally complex, rendering optimal solutions only after long computations, especially in large scale networks, which is unfeasible for delay sensitive applications. Second, the unwillingness of InPs to disclose their internal information, which may be vital for making embedding decisi...

Research paper thumbnail of End-to-end Virtual Resource Management across Heterogeneous Networks and Services (EVANS)

Research paper thumbnail of Slicing With Guaranteed Quality of Service in WiFi Networks

IEEE Transactions on Network and Service Management, 2020

Network slicing has recently been proposed as one of the main enablers for 5G networks. The slici... more Network slicing has recently been proposed as one of the main enablers for 5G networks. The slicing concept consists of the partition of a physical network into several self-contained logical networks (slices) that can be tailored to offer different functional or performance requirements. In the context of 5G networks, we argue that existing ubiquitous WiFi technology can be exploited to cope with new requirements. Therefore, in this paper, we propose a novel mechanism to implement network slicing in WiFi Access Points. We formulate the resource allocation problem to the different slices as a stochastic optimization problem, where each slice can have bit rate, delay, and capacity requirements. We devise a solution to the problem above using the Lyapunov drift optimization theory, and we develop a novel queuing and scheduling algorithm. We have used MATLAB and Simulink to build a prototype of the proposed solution, whose performance has been evaluated in a typical slicing scenario.

Research paper thumbnail of An intelligent two-agent self-configuration approach for radio resource management

2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), 2015

in this paper we propose the use of a two-agent learning scheme for the management of radio resou... more in this paper we propose the use of a two-agent learning scheme for the management of radio resources on cellular access networks. The management is materialized by the implementation of a self-configuration system governing the setup of several parameters on each base station. The two agents have independent goals; one is trying to maximize the quality of service and the other the economic benefit. Thanks to the combined use of the fuzzy logic technique and reinforcement learning, both agents will work in a complementary mode, achieving both goals simultaneously.

Research paper thumbnail of User activity monitoring using conventional cell phones for IMCIC 2010

User activity monitoring using conventional cell phones for IMCIC 2010

ABSTRACT User activity monitoring has a considerable potential for a whole range of new applicati... more ABSTRACT User activity monitoring has a considerable potential for a whole range of new applications in different environments: user surveillance, military purposes, health-care, etc. More precisely, in health-care there is an implicit potential application monitoring elderly people or patients suffering an illness. Besides, nowadays our society is more than ever exposed to an aging population, which is one of the main concerns of present administrations. Any technical approach alleviating the ever increasing health-care budget will be welcomed. Thankfully, recent progress in communication technologies and sensor miniaturization has opened the door to new approaches overcoming the above mentioned situation, involving, for example, remote supervision of home-confined elderly people. In particular, a real-time monitoring system of human activities would be an interesting solution to supervise aged people or people deserving medical attention. In the present paper we expose the development of a real-time monitoring system of human activities using a single cell phone equipped with some sensors. This way the monitoring system is reduced to the minimum expression, no especial hardware is required, as far as a conventional cell phone will monitor the user, classify the user activities with respect to a customized rule’s set and finally trigger the corresponding alerts when necessary Postprint (published version)

Research paper thumbnail of Evaluation of the soft handover benefits on CDMA systems

Evaluation of the soft handover benefits on CDMA systems

Universal Personal Communications …, 1996

... Polytechnic University of Catalonia. c/. Gran Capitan, s/n. Modulo C3. 08034 Barcelona. Spain... more ... Polytechnic University of Catalonia. c/. Gran Capitan, s/n. Modulo C3. 08034 Barcelona. Spain. Abstract ... Additionally, due to slow fadings, the received signal is decreased or reinforced, following a lognormal distribution with standard deviation G between 6 and 8 dB. ...

Research paper thumbnail of Indoor location on uncoordinated environments

Indoor location on uncoordinated environments

Electronics Letters, 2011

ABSTRACT Presented are two novel alternatives to implement an indoor location approach based on s... more ABSTRACT Presented are two novel alternatives to implement an indoor location approach based on signal-strength measurements for an uncoordinated environment, an environment where one does not have any control on the number of access points, their location, availability or transmitted power.

Research paper thumbnail of Resource allocation and management techniques for network slicing in wifi networks

Network slicing has recently been proposed as one of the main enablers for 5G networks; it is bou... more Network slicing has recently been proposed as one of the main enablers for 5G networks; it is bound to cope with the increasing and heterogeneous performance requirements of these systems. To ``slice'' a network is to partition a shared physical network into several self-contained logical pieces (slices) that can be tailored to offer different functional or performance requirements. Moreover, a key characteristic of the slicing paradigm is to provide resource isolation as well as an efficient use of resources. In this context, a slice is envisioned as an end-to-end virtual network which permits that the infrastructure operators lease their resources to service providers (tenants) through the dynamic, and on-demand, deployment of slices. Tenants may have complete control over the slice functions and resources, and employ them to satisfy their client’s demands. Recent works on slicing for Radio Access Networks (RANs) just focus on general architectures and frameworks for the m...

Research paper thumbnail of A Reinforcement Learning Based Approach for 5G Network Slicing Across Multiple Domains

A Reinforcement Learning Based Approach for 5G Network Slicing Across Multiple Domains

2019 15th International Conference on Network and Service Management (CNSM)

Research paper thumbnail of A multi-stage graph based algorithm for survivable Service Function Chain orchestration with backup resource sharing

A multi-stage graph based algorithm for survivable Service Function Chain orchestration with backup resource sharing

Computer Communications

Research paper thumbnail of A Multi-Domain VNE Algorithm Based on Load Balancing in the IoT Networks

A Multi-Domain VNE Algorithm Based on Load Balancing in the IoT Networks

Mobile Networks and Applications

Research paper thumbnail of Challenges to support edge-as-a-service

IEEE Communications Magazine, 2000

A new era in telecommunications is emerging. Virtualised networking functions and resources will ... more A new era in telecommunications is emerging. Virtualised networking functions and resources will offer network operators a way to shift the balance of expenditure from capital to operational, opening up networks to new and innovative services. This paper introduces the concept of Edge-as-a-Service (EaaS), a means of harnessing the flexibility of virtualised network functions and resources to enable network operators to break the tightly coupled relationship they have with their infrastructure and to enable more effective ways of generating revenue. To achieve this vision, we envisage a virtualised service access interface that can be used to programmatically alter access network functions and resources available to service providers in an elastic fashion. EaaS has many technically and economically difficult challenges that must be addressed before it can become a reality; the main challenges are summarised in this paper.

Research paper thumbnail of Management and orchestration challenges in network functions virtualization

Management and orchestration challenges in network functions virtualization

IEEE Communications Magazine, 2016

Research paper thumbnail of Server placement and assignment in virtualized radio access networks

Server placement and assignment in virtualized radio access networks

2015 11th International Conference on Network and Service Management (CNSM), 2015

Research paper thumbnail of Network Function Virtualization: State-of-the-art and Research Challenges

IEEE Communications Surveys & Tutorials, 2015

Network Function Virtualization (NFV) has drawn attention from both industry and academia as an i... more Network Function Virtualization (NFV) has drawn attention from both industry and academia as an important shift in telecommunication service provision. By decoupling network functions from the physical devices on which they run, NFV has the potential to lead to reductions in OPEX and CAPEX and to allow for deployment of new services with increased agility and faster time-to-value. Since NFV is a recently proposed paradigm, there is need for the research community to develop new architectures, software and systems, and to evaluate different possibilities and trade-offs in developing technologies for its deployment. In this paper, after discussing NFV and its relationship with complementary fields software defined networking (SDN) and cloud computing, we survey the state-of-the-art in NFV, and explore promising research directions in this area. We also explore key NFV projects, standardization efforts, early implementations, use cases and commercial products.