Juan Gorricho | Universitat Politecnica de Catalunya (original) (raw)

Papers by Juan Gorricho

Research paper thumbnail of Contributions to Efficient Resource Management in Virtual Networks

Abstract. Network virtualisation is a promising technique for a better future Internet by allowin... more Abstract. Network virtualisation is a promising technique for a better future Internet by allowing for network resource sharing. However, re-source sharing requires that virtual nodes and links be embedded onto substrate nodes and links (virtual network embedding), and thereafter the allocated resources dynamically managed throughout the lifetime of the virtual network (dynamic resource allocation). Since the con-strained virtual network embedding problem is NP–Hard, many existing approaches are not only static, but also propose heuristics by making simplifying assumptions, most of which would not apply in practical en-vironments. This PhD research proposes improvements to both virtual network embedding and dynamic resource allocation. The objective is to achieve an efficient utilisation of physical network resources. To this end, we propose a path generation-based approach for a one-shot, unsplittable flow virtual network embedding, and a reinforcement learning-based dy-namic alloc...

Research paper thumbnail of Neural Network-based Autonomous Allocation of Resources in Virtual Networks

Abstract—Network virtualisation has received attention as a way to allow for sharing of physical ... more Abstract—Network virtualisation has received attention as a way to allow for sharing of physical network resources. Sharing resources involves mapping of virtual nodes and links onto physical nodes and links respectively, and thereafter managing the allocated resources to ensure efficient resource utilisation. In this paper, we apply artificial neural networks for a dynamic, decentralised and autonomous allocation of physical network resources to the virtual networks. The objective is to achieve better efficiency in the utilisation of substrate network resources while ensuring that the quality of service requirements of the virtual networks are not violated. The proposed approach is evaluated by comparison with two static resource allocation schemes and a reinforcement learning-based approach. Keywords—Artificial neural networks, network virtualisation, resource allocation, reinforcement learning, autonomous systems. I.

Research paper thumbnail of Doctoral student

The so-called second generation P2P file-sharing applications have with no doubt a better perform... more The so-called second generation P2P file-sharing applications have with no doubt a better performance than the first implementations. The most remarkable difference is due to the file division into smaller pieces, where a receiving peer of any piece automatically becomes a new source to other peers. But a new question arises on how we distribute all the pieces provided by a seed peer to minimize the global and presumably individual download times. In this paper we summarize part of the work we have developed up until now to answer this general question, in particular, we will analyze how close the present second generation P2P file-sharing applications remain from an ideal solution with the theoretical best performance, that is, where all peers are interconnected with each other and all peers have an altruistic behavior always uploading its contents at any chance. Successive modifications of the ideal solution will lead us to more realistic scenarios. We will estimate the performanc...

Research paper thumbnail of Resource allocation for network slicing in WiFi access points

2017 13th International Conference on Network and Service Management (CNSM)

Research paper thumbnail of A Multi-Stage Graph Aided Algorithm for Distributed Service Function Chain Provisioning Across Multiple Domains

Research paper thumbnail of A Multi-Stage Graph Aided Algorithm for Distributed Service Function Chain Provisioning Across Multiple Domains

IEEE Access, 2021

Network Service Providers (NSPs) envisage to support the divergent and stringent requirements of ... more Network Service Providers (NSPs) envisage to support the divergent and stringent requirements of future services by instantiating these services as service chains, commonly referred to as Service Function Chains (SFCs), that are customized and configured to meet specific service requirements. However, due to the limited footprint of the Infrastructure Providers (InPs), these SFCs may have to transcend multiple InPs/domains. In this regard, determining the optimal set of InPs in which to embed the SFC request emerges as a complex problem for several reasons. First, the large number of possible combinations for selecting the InPs to embed the different sub-chains of the request makes this problem computationally complex, rendering optimal solutions only after long computations, especially in large scale networks, which is unfeasible for delay sensitive applications. Second, the unwillingness of InPs to disclose their internal information, which may be vital for making embedding decisi...

Research paper thumbnail of End-to-end Virtual Resource Management across Heterogeneous Networks and Services (EVANS)

Research paper thumbnail of Slicing With Guaranteed Quality of Service in WiFi Networks

IEEE Transactions on Network and Service Management, 2020

Network slicing has recently been proposed as one of the main enablers for 5G networks. The slici... more Network slicing has recently been proposed as one of the main enablers for 5G networks. The slicing concept consists of the partition of a physical network into several self-contained logical networks (slices) that can be tailored to offer different functional or performance requirements. In the context of 5G networks, we argue that existing ubiquitous WiFi technology can be exploited to cope with new requirements. Therefore, in this paper, we propose a novel mechanism to implement network slicing in WiFi Access Points. We formulate the resource allocation problem to the different slices as a stochastic optimization problem, where each slice can have bit rate, delay, and capacity requirements. We devise a solution to the problem above using the Lyapunov drift optimization theory, and we develop a novel queuing and scheduling algorithm. We have used MATLAB and Simulink to build a prototype of the proposed solution, whose performance has been evaluated in a typical slicing scenario.

Research paper thumbnail of An intelligent two-agent self-configuration approach for radio resource management

2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), 2015

Research paper thumbnail of User activity monitoring using conventional cell phones for IMCIC 2010

ABSTRACT User activity monitoring has a considerable potential for a whole range of new applicati... more ABSTRACT User activity monitoring has a considerable potential for a whole range of new applications in different environments: user surveillance, military purposes, health-care, etc. More precisely, in health-care there is an implicit potential application monitoring elderly people or patients suffering an illness. Besides, nowadays our society is more than ever exposed to an aging population, which is one of the main concerns of present administrations. Any technical approach alleviating the ever increasing health-care budget will be welcomed. Thankfully, recent progress in communication technologies and sensor miniaturization has opened the door to new approaches overcoming the above mentioned situation, involving, for example, remote supervision of home-confined elderly people. In particular, a real-time monitoring system of human activities would be an interesting solution to supervise aged people or people deserving medical attention. In the present paper we expose the development of a real-time monitoring system of human activities using a single cell phone equipped with some sensors. This way the monitoring system is reduced to the minimum expression, no especial hardware is required, as far as a conventional cell phone will monitor the user, classify the user activities with respect to a customized rule’s set and finally trigger the corresponding alerts when necessary Postprint (published version)

Research paper thumbnail of Evaluation of the soft handover benefits on CDMA systems

Universal Personal Communications …, 1996

... Polytechnic University of Catalonia. c/. Gran Capitan, s/n. Modulo C3. 08034 Barcelona. Spain... more ... Polytechnic University of Catalonia. c/. Gran Capitan, s/n. Modulo C3. 08034 Barcelona. Spain. Abstract ... Additionally, due to slow fadings, the received signal is decreased or reinforced, following a lognormal distribution with standard deviation G between 6 and 8 dB. ...

Research paper thumbnail of Indoor location on uncoordinated environments

Electronics Letters, 2011

ABSTRACT Presented are two novel alternatives to implement an indoor location approach based on s... more ABSTRACT Presented are two novel alternatives to implement an indoor location approach based on signal-strength measurements for an uncoordinated environment, an environment where one does not have any control on the number of access points, their location, availability or transmitted power.

Research paper thumbnail of Resource allocation and management techniques for network slicing in wifi networks

Network slicing has recently been proposed as one of the main enablers for 5G networks; it is bou... more Network slicing has recently been proposed as one of the main enablers for 5G networks; it is bound to cope with the increasing and heterogeneous performance requirements of these systems. To ``slice'' a network is to partition a shared physical network into several self-contained logical pieces (slices) that can be tailored to offer different functional or performance requirements. Moreover, a key characteristic of the slicing paradigm is to provide resource isolation as well as an efficient use of resources. In this context, a slice is envisioned as an end-to-end virtual network which permits that the infrastructure operators lease their resources to service providers (tenants) through the dynamic, and on-demand, deployment of slices. Tenants may have complete control over the slice functions and resources, and employ them to satisfy their client’s demands. Recent works on slicing for Radio Access Networks (RANs) just focus on general architectures and frameworks for the m...

Research paper thumbnail of A Reinforcement Learning Based Approach for 5G Network Slicing Across Multiple Domains

2019 15th International Conference on Network and Service Management (CNSM)

Research paper thumbnail of A multi-stage graph based algorithm for survivable Service Function Chain orchestration with backup resource sharing

Research paper thumbnail of A Multi-Domain VNE Algorithm Based on Load Balancing in the IoT Networks

Mobile Networks and Applications

Research paper thumbnail of Challenges to support edge-as-a-service

IEEE Communications Magazine, 2000

Research paper thumbnail of Management and orchestration challenges in network functions virtualization

IEEE Communications Magazine, 2016

Research paper thumbnail of Server placement and assignment in virtualized radio access networks

2015 11th International Conference on Network and Service Management (CNSM), 2015

Research paper thumbnail of Network Function Virtualization: State-of-the-art and Research Challenges

IEEE Communications Surveys & Tutorials, 2015

Research paper thumbnail of Contributions to Efficient Resource Management in Virtual Networks

Abstract. Network virtualisation is a promising technique for a better future Internet by allowin... more Abstract. Network virtualisation is a promising technique for a better future Internet by allowing for network resource sharing. However, re-source sharing requires that virtual nodes and links be embedded onto substrate nodes and links (virtual network embedding), and thereafter the allocated resources dynamically managed throughout the lifetime of the virtual network (dynamic resource allocation). Since the con-strained virtual network embedding problem is NP–Hard, many existing approaches are not only static, but also propose heuristics by making simplifying assumptions, most of which would not apply in practical en-vironments. This PhD research proposes improvements to both virtual network embedding and dynamic resource allocation. The objective is to achieve an efficient utilisation of physical network resources. To this end, we propose a path generation-based approach for a one-shot, unsplittable flow virtual network embedding, and a reinforcement learning-based dy-namic alloc...

Research paper thumbnail of Neural Network-based Autonomous Allocation of Resources in Virtual Networks

Abstract—Network virtualisation has received attention as a way to allow for sharing of physical ... more Abstract—Network virtualisation has received attention as a way to allow for sharing of physical network resources. Sharing resources involves mapping of virtual nodes and links onto physical nodes and links respectively, and thereafter managing the allocated resources to ensure efficient resource utilisation. In this paper, we apply artificial neural networks for a dynamic, decentralised and autonomous allocation of physical network resources to the virtual networks. The objective is to achieve better efficiency in the utilisation of substrate network resources while ensuring that the quality of service requirements of the virtual networks are not violated. The proposed approach is evaluated by comparison with two static resource allocation schemes and a reinforcement learning-based approach. Keywords—Artificial neural networks, network virtualisation, resource allocation, reinforcement learning, autonomous systems. I.

Research paper thumbnail of Doctoral student

The so-called second generation P2P file-sharing applications have with no doubt a better perform... more The so-called second generation P2P file-sharing applications have with no doubt a better performance than the first implementations. The most remarkable difference is due to the file division into smaller pieces, where a receiving peer of any piece automatically becomes a new source to other peers. But a new question arises on how we distribute all the pieces provided by a seed peer to minimize the global and presumably individual download times. In this paper we summarize part of the work we have developed up until now to answer this general question, in particular, we will analyze how close the present second generation P2P file-sharing applications remain from an ideal solution with the theoretical best performance, that is, where all peers are interconnected with each other and all peers have an altruistic behavior always uploading its contents at any chance. Successive modifications of the ideal solution will lead us to more realistic scenarios. We will estimate the performanc...

Research paper thumbnail of Resource allocation for network slicing in WiFi access points

2017 13th International Conference on Network and Service Management (CNSM)

Research paper thumbnail of A Multi-Stage Graph Aided Algorithm for Distributed Service Function Chain Provisioning Across Multiple Domains

Research paper thumbnail of A Multi-Stage Graph Aided Algorithm for Distributed Service Function Chain Provisioning Across Multiple Domains

IEEE Access, 2021

Network Service Providers (NSPs) envisage to support the divergent and stringent requirements of ... more Network Service Providers (NSPs) envisage to support the divergent and stringent requirements of future services by instantiating these services as service chains, commonly referred to as Service Function Chains (SFCs), that are customized and configured to meet specific service requirements. However, due to the limited footprint of the Infrastructure Providers (InPs), these SFCs may have to transcend multiple InPs/domains. In this regard, determining the optimal set of InPs in which to embed the SFC request emerges as a complex problem for several reasons. First, the large number of possible combinations for selecting the InPs to embed the different sub-chains of the request makes this problem computationally complex, rendering optimal solutions only after long computations, especially in large scale networks, which is unfeasible for delay sensitive applications. Second, the unwillingness of InPs to disclose their internal information, which may be vital for making embedding decisi...

Research paper thumbnail of End-to-end Virtual Resource Management across Heterogeneous Networks and Services (EVANS)

Research paper thumbnail of Slicing With Guaranteed Quality of Service in WiFi Networks

IEEE Transactions on Network and Service Management, 2020

Network slicing has recently been proposed as one of the main enablers for 5G networks. The slici... more Network slicing has recently been proposed as one of the main enablers for 5G networks. The slicing concept consists of the partition of a physical network into several self-contained logical networks (slices) that can be tailored to offer different functional or performance requirements. In the context of 5G networks, we argue that existing ubiquitous WiFi technology can be exploited to cope with new requirements. Therefore, in this paper, we propose a novel mechanism to implement network slicing in WiFi Access Points. We formulate the resource allocation problem to the different slices as a stochastic optimization problem, where each slice can have bit rate, delay, and capacity requirements. We devise a solution to the problem above using the Lyapunov drift optimization theory, and we develop a novel queuing and scheduling algorithm. We have used MATLAB and Simulink to build a prototype of the proposed solution, whose performance has been evaluated in a typical slicing scenario.

Research paper thumbnail of An intelligent two-agent self-configuration approach for radio resource management

2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), 2015

Research paper thumbnail of User activity monitoring using conventional cell phones for IMCIC 2010

ABSTRACT User activity monitoring has a considerable potential for a whole range of new applicati... more ABSTRACT User activity monitoring has a considerable potential for a whole range of new applications in different environments: user surveillance, military purposes, health-care, etc. More precisely, in health-care there is an implicit potential application monitoring elderly people or patients suffering an illness. Besides, nowadays our society is more than ever exposed to an aging population, which is one of the main concerns of present administrations. Any technical approach alleviating the ever increasing health-care budget will be welcomed. Thankfully, recent progress in communication technologies and sensor miniaturization has opened the door to new approaches overcoming the above mentioned situation, involving, for example, remote supervision of home-confined elderly people. In particular, a real-time monitoring system of human activities would be an interesting solution to supervise aged people or people deserving medical attention. In the present paper we expose the development of a real-time monitoring system of human activities using a single cell phone equipped with some sensors. This way the monitoring system is reduced to the minimum expression, no especial hardware is required, as far as a conventional cell phone will monitor the user, classify the user activities with respect to a customized rule’s set and finally trigger the corresponding alerts when necessary Postprint (published version)

Research paper thumbnail of Evaluation of the soft handover benefits on CDMA systems

Universal Personal Communications …, 1996

... Polytechnic University of Catalonia. c/. Gran Capitan, s/n. Modulo C3. 08034 Barcelona. Spain... more ... Polytechnic University of Catalonia. c/. Gran Capitan, s/n. Modulo C3. 08034 Barcelona. Spain. Abstract ... Additionally, due to slow fadings, the received signal is decreased or reinforced, following a lognormal distribution with standard deviation G between 6 and 8 dB. ...

Research paper thumbnail of Indoor location on uncoordinated environments

Electronics Letters, 2011

ABSTRACT Presented are two novel alternatives to implement an indoor location approach based on s... more ABSTRACT Presented are two novel alternatives to implement an indoor location approach based on signal-strength measurements for an uncoordinated environment, an environment where one does not have any control on the number of access points, their location, availability or transmitted power.

Research paper thumbnail of Resource allocation and management techniques for network slicing in wifi networks

Network slicing has recently been proposed as one of the main enablers for 5G networks; it is bou... more Network slicing has recently been proposed as one of the main enablers for 5G networks; it is bound to cope with the increasing and heterogeneous performance requirements of these systems. To ``slice'' a network is to partition a shared physical network into several self-contained logical pieces (slices) that can be tailored to offer different functional or performance requirements. Moreover, a key characteristic of the slicing paradigm is to provide resource isolation as well as an efficient use of resources. In this context, a slice is envisioned as an end-to-end virtual network which permits that the infrastructure operators lease their resources to service providers (tenants) through the dynamic, and on-demand, deployment of slices. Tenants may have complete control over the slice functions and resources, and employ them to satisfy their client’s demands. Recent works on slicing for Radio Access Networks (RANs) just focus on general architectures and frameworks for the m...

Research paper thumbnail of A Reinforcement Learning Based Approach for 5G Network Slicing Across Multiple Domains

2019 15th International Conference on Network and Service Management (CNSM)

Research paper thumbnail of A multi-stage graph based algorithm for survivable Service Function Chain orchestration with backup resource sharing

Research paper thumbnail of A Multi-Domain VNE Algorithm Based on Load Balancing in the IoT Networks

Mobile Networks and Applications

Research paper thumbnail of Challenges to support edge-as-a-service

IEEE Communications Magazine, 2000

Research paper thumbnail of Management and orchestration challenges in network functions virtualization

IEEE Communications Magazine, 2016

Research paper thumbnail of Server placement and assignment in virtualized radio access networks

2015 11th International Conference on Network and Service Management (CNSM), 2015

Research paper thumbnail of Network Function Virtualization: State-of-the-art and Research Challenges

IEEE Communications Surveys & Tutorials, 2015