Juan Gorricho | Universitat Politecnica de Catalunya (original) (raw)
Papers by Juan Gorricho
Abstract. Network virtualisation is a promising technique for a better future Internet by allowin... more Abstract. Network virtualisation is a promising technique for a better future Internet by allowing for network resource sharing. However, re-source sharing requires that virtual nodes and links be embedded onto substrate nodes and links (virtual network embedding), and thereafter the allocated resources dynamically managed throughout the lifetime of the virtual network (dynamic resource allocation). Since the con-strained virtual network embedding problem is NP–Hard, many existing approaches are not only static, but also propose heuristics by making simplifying assumptions, most of which would not apply in practical en-vironments. This PhD research proposes improvements to both virtual network embedding and dynamic resource allocation. The objective is to achieve an efficient utilisation of physical network resources. To this end, we propose a path generation-based approach for a one-shot, unsplittable flow virtual network embedding, and a reinforcement learning-based dy-namic alloc...
Abstract—Network virtualisation has received attention as a way to allow for sharing of physical ... more Abstract—Network virtualisation has received attention as a way to allow for sharing of physical network resources. Sharing resources involves mapping of virtual nodes and links onto physical nodes and links respectively, and thereafter managing the allocated resources to ensure efficient resource utilisation. In this paper, we apply artificial neural networks for a dynamic, decentralised and autonomous allocation of physical network resources to the virtual networks. The objective is to achieve better efficiency in the utilisation of substrate network resources while ensuring that the quality of service requirements of the virtual networks are not violated. The proposed approach is evaluated by comparison with two static resource allocation schemes and a reinforcement learning-based approach. Keywords—Artificial neural networks, network virtualisation, resource allocation, reinforcement learning, autonomous systems. I.
The so-called second generation P2P file-sharing applications have with no doubt a better perform... more The so-called second generation P2P file-sharing applications have with no doubt a better performance than the first implementations. The most remarkable difference is due to the file division into smaller pieces, where a receiving peer of any piece automatically becomes a new source to other peers. But a new question arises on how we distribute all the pieces provided by a seed peer to minimize the global and presumably individual download times. In this paper we summarize part of the work we have developed up until now to answer this general question, in particular, we will analyze how close the present second generation P2P file-sharing applications remain from an ideal solution with the theoretical best performance, that is, where all peers are interconnected with each other and all peers have an altruistic behavior always uploading its contents at any chance. Successive modifications of the ideal solution will lead us to more realistic scenarios. We will estimate the performanc...
2017 13th International Conference on Network and Service Management (CNSM)
IEEE Access, 2021
Network Service Providers (NSPs) envisage to support the divergent and stringent requirements of ... more Network Service Providers (NSPs) envisage to support the divergent and stringent requirements of future services by instantiating these services as service chains, commonly referred to as Service Function Chains (SFCs), that are customized and configured to meet specific service requirements. However, due to the limited footprint of the Infrastructure Providers (InPs), these SFCs may have to transcend multiple InPs/domains. In this regard, determining the optimal set of InPs in which to embed the SFC request emerges as a complex problem for several reasons. First, the large number of possible combinations for selecting the InPs to embed the different sub-chains of the request makes this problem computationally complex, rendering optimal solutions only after long computations, especially in large scale networks, which is unfeasible for delay sensitive applications. Second, the unwillingness of InPs to disclose their internal information, which may be vital for making embedding decisi...
IEEE Transactions on Network and Service Management, 2020
Network slicing has recently been proposed as one of the main enablers for 5G networks. The slici... more Network slicing has recently been proposed as one of the main enablers for 5G networks. The slicing concept consists of the partition of a physical network into several self-contained logical networks (slices) that can be tailored to offer different functional or performance requirements. In the context of 5G networks, we argue that existing ubiquitous WiFi technology can be exploited to cope with new requirements. Therefore, in this paper, we propose a novel mechanism to implement network slicing in WiFi Access Points. We formulate the resource allocation problem to the different slices as a stochastic optimization problem, where each slice can have bit rate, delay, and capacity requirements. We devise a solution to the problem above using the Lyapunov drift optimization theory, and we develop a novel queuing and scheduling algorithm. We have used MATLAB and Simulink to build a prototype of the proposed solution, whose performance has been evaluated in a typical slicing scenario.
2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), 2015
ABSTRACT User activity monitoring has a considerable potential for a whole range of new applicati... more ABSTRACT User activity monitoring has a considerable potential for a whole range of new applications in different environments: user surveillance, military purposes, health-care, etc. More precisely, in health-care there is an implicit potential application monitoring elderly people or patients suffering an illness. Besides, nowadays our society is more than ever exposed to an aging population, which is one of the main concerns of present administrations. Any technical approach alleviating the ever increasing health-care budget will be welcomed. Thankfully, recent progress in communication technologies and sensor miniaturization has opened the door to new approaches overcoming the above mentioned situation, involving, for example, remote supervision of home-confined elderly people. In particular, a real-time monitoring system of human activities would be an interesting solution to supervise aged people or people deserving medical attention. In the present paper we expose the development of a real-time monitoring system of human activities using a single cell phone equipped with some sensors. This way the monitoring system is reduced to the minimum expression, no especial hardware is required, as far as a conventional cell phone will monitor the user, classify the user activities with respect to a customized rule’s set and finally trigger the corresponding alerts when necessary Postprint (published version)
Universal Personal Communications …, 1996
... Polytechnic University of Catalonia. c/. Gran Capitan, s/n. Modulo C3. 08034 Barcelona. Spain... more ... Polytechnic University of Catalonia. c/. Gran Capitan, s/n. Modulo C3. 08034 Barcelona. Spain. Abstract ... Additionally, due to slow fadings, the received signal is decreased or reinforced, following a lognormal distribution with standard deviation G between 6 and 8 dB. ...
Electronics Letters, 2011
ABSTRACT Presented are two novel alternatives to implement an indoor location approach based on s... more ABSTRACT Presented are two novel alternatives to implement an indoor location approach based on signal-strength measurements for an uncoordinated environment, an environment where one does not have any control on the number of access points, their location, availability or transmitted power.
Network slicing has recently been proposed as one of the main enablers for 5G networks; it is bou... more Network slicing has recently been proposed as one of the main enablers for 5G networks; it is bound to cope with the increasing and heterogeneous performance requirements of these systems. To ``slice'' a network is to partition a shared physical network into several self-contained logical pieces (slices) that can be tailored to offer different functional or performance requirements. Moreover, a key characteristic of the slicing paradigm is to provide resource isolation as well as an efficient use of resources. In this context, a slice is envisioned as an end-to-end virtual network which permits that the infrastructure operators lease their resources to service providers (tenants) through the dynamic, and on-demand, deployment of slices. Tenants may have complete control over the slice functions and resources, and employ them to satisfy their client’s demands. Recent works on slicing for Radio Access Networks (RANs) just focus on general architectures and frameworks for the m...
2019 15th International Conference on Network and Service Management (CNSM)
Mobile Networks and Applications
IEEE Communications Magazine, 2000
IEEE Communications Magazine, 2016
2015 11th International Conference on Network and Service Management (CNSM), 2015
IEEE Communications Surveys & Tutorials, 2015
Abstract. Network virtualisation is a promising technique for a better future Internet by allowin... more Abstract. Network virtualisation is a promising technique for a better future Internet by allowing for network resource sharing. However, re-source sharing requires that virtual nodes and links be embedded onto substrate nodes and links (virtual network embedding), and thereafter the allocated resources dynamically managed throughout the lifetime of the virtual network (dynamic resource allocation). Since the con-strained virtual network embedding problem is NP–Hard, many existing approaches are not only static, but also propose heuristics by making simplifying assumptions, most of which would not apply in practical en-vironments. This PhD research proposes improvements to both virtual network embedding and dynamic resource allocation. The objective is to achieve an efficient utilisation of physical network resources. To this end, we propose a path generation-based approach for a one-shot, unsplittable flow virtual network embedding, and a reinforcement learning-based dy-namic alloc...
Abstract—Network virtualisation has received attention as a way to allow for sharing of physical ... more Abstract—Network virtualisation has received attention as a way to allow for sharing of physical network resources. Sharing resources involves mapping of virtual nodes and links onto physical nodes and links respectively, and thereafter managing the allocated resources to ensure efficient resource utilisation. In this paper, we apply artificial neural networks for a dynamic, decentralised and autonomous allocation of physical network resources to the virtual networks. The objective is to achieve better efficiency in the utilisation of substrate network resources while ensuring that the quality of service requirements of the virtual networks are not violated. The proposed approach is evaluated by comparison with two static resource allocation schemes and a reinforcement learning-based approach. Keywords—Artificial neural networks, network virtualisation, resource allocation, reinforcement learning, autonomous systems. I.
The so-called second generation P2P file-sharing applications have with no doubt a better perform... more The so-called second generation P2P file-sharing applications have with no doubt a better performance than the first implementations. The most remarkable difference is due to the file division into smaller pieces, where a receiving peer of any piece automatically becomes a new source to other peers. But a new question arises on how we distribute all the pieces provided by a seed peer to minimize the global and presumably individual download times. In this paper we summarize part of the work we have developed up until now to answer this general question, in particular, we will analyze how close the present second generation P2P file-sharing applications remain from an ideal solution with the theoretical best performance, that is, where all peers are interconnected with each other and all peers have an altruistic behavior always uploading its contents at any chance. Successive modifications of the ideal solution will lead us to more realistic scenarios. We will estimate the performanc...
2017 13th International Conference on Network and Service Management (CNSM)
IEEE Access, 2021
Network Service Providers (NSPs) envisage to support the divergent and stringent requirements of ... more Network Service Providers (NSPs) envisage to support the divergent and stringent requirements of future services by instantiating these services as service chains, commonly referred to as Service Function Chains (SFCs), that are customized and configured to meet specific service requirements. However, due to the limited footprint of the Infrastructure Providers (InPs), these SFCs may have to transcend multiple InPs/domains. In this regard, determining the optimal set of InPs in which to embed the SFC request emerges as a complex problem for several reasons. First, the large number of possible combinations for selecting the InPs to embed the different sub-chains of the request makes this problem computationally complex, rendering optimal solutions only after long computations, especially in large scale networks, which is unfeasible for delay sensitive applications. Second, the unwillingness of InPs to disclose their internal information, which may be vital for making embedding decisi...
IEEE Transactions on Network and Service Management, 2020
Network slicing has recently been proposed as one of the main enablers for 5G networks. The slici... more Network slicing has recently been proposed as one of the main enablers for 5G networks. The slicing concept consists of the partition of a physical network into several self-contained logical networks (slices) that can be tailored to offer different functional or performance requirements. In the context of 5G networks, we argue that existing ubiquitous WiFi technology can be exploited to cope with new requirements. Therefore, in this paper, we propose a novel mechanism to implement network slicing in WiFi Access Points. We formulate the resource allocation problem to the different slices as a stochastic optimization problem, where each slice can have bit rate, delay, and capacity requirements. We devise a solution to the problem above using the Lyapunov drift optimization theory, and we develop a novel queuing and scheduling algorithm. We have used MATLAB and Simulink to build a prototype of the proposed solution, whose performance has been evaluated in a typical slicing scenario.
2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), 2015
ABSTRACT User activity monitoring has a considerable potential for a whole range of new applicati... more ABSTRACT User activity monitoring has a considerable potential for a whole range of new applications in different environments: user surveillance, military purposes, health-care, etc. More precisely, in health-care there is an implicit potential application monitoring elderly people or patients suffering an illness. Besides, nowadays our society is more than ever exposed to an aging population, which is one of the main concerns of present administrations. Any technical approach alleviating the ever increasing health-care budget will be welcomed. Thankfully, recent progress in communication technologies and sensor miniaturization has opened the door to new approaches overcoming the above mentioned situation, involving, for example, remote supervision of home-confined elderly people. In particular, a real-time monitoring system of human activities would be an interesting solution to supervise aged people or people deserving medical attention. In the present paper we expose the development of a real-time monitoring system of human activities using a single cell phone equipped with some sensors. This way the monitoring system is reduced to the minimum expression, no especial hardware is required, as far as a conventional cell phone will monitor the user, classify the user activities with respect to a customized rule’s set and finally trigger the corresponding alerts when necessary Postprint (published version)
Universal Personal Communications …, 1996
... Polytechnic University of Catalonia. c/. Gran Capitan, s/n. Modulo C3. 08034 Barcelona. Spain... more ... Polytechnic University of Catalonia. c/. Gran Capitan, s/n. Modulo C3. 08034 Barcelona. Spain. Abstract ... Additionally, due to slow fadings, the received signal is decreased or reinforced, following a lognormal distribution with standard deviation G between 6 and 8 dB. ...
Electronics Letters, 2011
ABSTRACT Presented are two novel alternatives to implement an indoor location approach based on s... more ABSTRACT Presented are two novel alternatives to implement an indoor location approach based on signal-strength measurements for an uncoordinated environment, an environment where one does not have any control on the number of access points, their location, availability or transmitted power.
Network slicing has recently been proposed as one of the main enablers for 5G networks; it is bou... more Network slicing has recently been proposed as one of the main enablers for 5G networks; it is bound to cope with the increasing and heterogeneous performance requirements of these systems. To ``slice'' a network is to partition a shared physical network into several self-contained logical pieces (slices) that can be tailored to offer different functional or performance requirements. Moreover, a key characteristic of the slicing paradigm is to provide resource isolation as well as an efficient use of resources. In this context, a slice is envisioned as an end-to-end virtual network which permits that the infrastructure operators lease their resources to service providers (tenants) through the dynamic, and on-demand, deployment of slices. Tenants may have complete control over the slice functions and resources, and employ them to satisfy their client’s demands. Recent works on slicing for Radio Access Networks (RANs) just focus on general architectures and frameworks for the m...
2019 15th International Conference on Network and Service Management (CNSM)
Mobile Networks and Applications
IEEE Communications Magazine, 2000
IEEE Communications Magazine, 2016
2015 11th International Conference on Network and Service Management (CNSM), 2015
IEEE Communications Surveys & Tutorials, 2015