- Software-Defined Networks and 5G
- Caching and Content Delivery
- Peer-to-Peer Network Technologies
- Software System Performance and Reliability
- IoT and Edge/Fog Computing
- Opportunistic and Delay-Tolerant Networks
- Network Security and Intrusion Detection
- Cloud Computing and Resource Management
- Service-Oriented Architecture and Web Services
- Advanced Software Engineering Methodologies
- Distributed and Parallel Computing Systems
- IPv6, Mobility, Handover, Networks, Security
- Smart Grid Security and Resilience
- Advanced Optical Network Technologies
- Cooperative Communication and Network Coding
- Distributed systems and fault tolerance
- Mobile Agent-Based Network Management
- Advanced Computing and Algorithms
- IoT Networks and Protocols
- Digital Transformation in Industry
- Network Traffic and Congestion Control
- Advanced Data Storage Technologies
- Internet Traffic Analysis and Secure E-voting
- Advanced Data Processing Techniques
- Advanced Wireless Communication Technologies
National Institute of Information and Communications Technology
2016-2025
Technische Universität Berlin
2022
British Transplantation Society
2022
Intel (Ireland)
2022
Orange (France)
2022
Universidad de Murcia
2010-2019
Machine learning has the capability to provide simpler solutions complex problems by analyzing a huge volume of data in short time, for adapting its functionality dynamically changing environments, and predicting near future events with reasonably good accuracy. The 5G communication networks are getting due emergence unprecedentedly number new connected devices types services. Moreover, requirements creating virtual network slices suitable optimal services diverse users applications posing...
Self-organizing networks (SONs) need to be endowed with self-coordination capabilities manage the complex relations between their internal components and avoid destructive interactions. Existing communication technologies commonly implement responsive mechanisms that can very slow in dynamic situations. The sixth generation (6G) networks, being early stages of research standardization activities, open new opportunities opt for a design-driven approach when developing capabilities. This...
Internet of Things (IoT) is presenting an enormous growing, in numbers, it estimated that over 50 billion devices will be connected to by 2020. Therefore, presents a high scalability requirement manage every resource the network. It required capability for autonomous registration and discovery resources services. In addition, should dynamically adapted with inclusion new network changes existing ones. Nowadays, most extended architecture Domain Name Systems (DNS), which offering through...
In this paper we discuss the experimentation results obtained from performing video streaming in Internet of Things (IoT) scenarios built on top Content Centric Networking (CCN) architecture. More precisely, used Dynamic Adaptive Streaming over HTTP (DASH) mechanism to split videos into multiple pieces, also offering bit-rates. Such pieces are then streamed by a DASH client typical server through CCN network. HTTP/CCN adapters translate requests interests and responses content objects. The...
5G communication networks will be complex due to the emergence of an unprecedented huge number new types connected devices and services. Moreover, on-demand creation virtual network slices, each suitable for a different application, is posing challenges efficient management resources, while optimally satisfying quality service requirements in time-varying workloads conditions. This article, which tutorial nature, introduces slices (from point view non-wireless part network) elaborates...
The next generation communication networks are going to be composed of virtualized node and link resources, which can divided into various slices. Different virtual network slices configured with different amounts resources so that each slice able optimally satisfy the quality service requirements given category Internet Things services. Virtualized resource allocated dynamically adjusted adapt capability varying workload. In this article, we present our ongoing research on autonomous...
Unprecedentedly, a massive number of devices are getting connected to the network in new era Internet Things. For discovery, authentication,, secure access and management these Things devices, an directory service is needed. Its responsibility would be store provide attributes such as identifier, location, owner's name, generated data types, security parameters. In this article, we present architectural design that capable storing huge records providing functions for their fast lookup...
We propose to enhance the Next Generation Internet by creating a secure and scalable communication infrastructure that mirrors structure of real world: people talk people, objects, objects between themselves and, in general, entities denoted digital identities communicating with each other. start from identity create view sphere which is singular, unique, optimized for particular identity, building an plane allows address other "identity identity" approach. use stackable overlay networks...
Current network service requirements are increasing the pressure on level of flexibility and reliability that must be provided by virtual computer systems host them while enforcing close-to-optimum resource allocations to minimize both monetary operational costs. A key requirement is fast detection adaptation workload changes, which beyond human abilities, so operation automated. To do we propose use an autonomic control architecture. In this paper, formalize architecture discuss how it able...
Network automation has become crucial in supporting services 6G networks. This mainly derives from the complexity of composition numerous distributed virtual network functions (VNFs) creating highly flexible services. Therefore, a service system is key technology enabler for 6G. However, added renders systems particularly sensitive to faults, some which cause outages that harm smooth operation basic societal Current state-of-the-art (SotA) solutions fault detection can barely detect hidden...
The use of IP addresses as host IDs and locators in the present day Internet protocols imposes constraints on designing efficient solutions for mobility, multihoming, renumbering, security. To eliminate constraints, different approaches introducing ID/locator split into future network architectures have been discussed recently. HIMALIS is such an architecture, which uses distinct sets values identifiers allows layer to change without requiring upper layers identifiers. One major challenges...
In this paper, we propose a method for automatic virtual resource allocation by using multi-target classification-based scheme (MTCAS). our method, an Infrastructure Provider (InP) bundles its CPU, memory, storage, and bandwidth resources as Network Elements (NEs) categorizes them into several types in accordance to their function, capabilities, location, energy consumption, price, etc. MTCAS is used the InP optimally allocate set of NEs Virtual Operator (VNO). Such will be subject some...
In the present paper we discuss concepts on which is based GEMBus framework, a multi-domain, federated Enterprise Service Bus. Then, show certain production scenarios as general use-cases, and brief analysis of selected platforms for basis framework. Furthermore, role that Autonomic Computing (AC) services play showing representative scenario where AC may be used to improve functionality other applications.