José Ruíz-Mas

ORCID: 0000-0003-4690-6089
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Traffic and Congestion Control
  • Peer-to-Peer Network Technologies
  • Wireless Networks and Protocols
  • Caching and Content Delivery
  • IPv6, Mobility, Handover, Networks, Security
  • Advanced Wireless Network Optimization
  • Internet Traffic Analysis and Secure E-voting
  • Software-Defined Networks and 5G
  • Interconnection Networks and Systems
  • Wireless Communication Networks Research
  • IoT and Edge/Fog Computing
  • Multimedia Communication and Technology
  • Image and Video Quality Assessment
  • IoT Networks and Protocols
  • Cooperative Communication and Network Coding
  • Mobile Ad Hoc Networks
  • Cryptography and Data Security
  • Customer Service Quality and Loyalty
  • Advanced Malware Detection Techniques
  • Educational Innovations and Technology
  • E-Learning and Knowledge Management
  • Advanced Optical Network Technologies
  • Technology Adoption and User Behaviour
  • Advanced Authentication Protocols Security
  • Video Coding and Compression Technologies

Universidad de Granada
2012-2023

Royal Institute and Observatory of the Spanish Navy
2023

Universidad de Zaragoza
2013-2022

Institute of Engineering
2013

Guardia Civil
2012

Hampshire Constabulary
2012

Instituto de Lengua Literatura y Antropología
2012

Instituto Tecnológico de Aragón
2011

In this letter the development and testing of an open enterprise Wi-Fi solution based on virtual APs, managed by a central WLAN controller is presented. It allows seamless handovers between APs in different channels, maintaining QoS real-time services. The potential scalability issues associated to beacon generation channel assignment have been addressed. A battery tests has run real environment, results are reported terms packet loss delay.

10.1109/lcomm.2016.2623602 article EN IEEE Communications Letters 2016-11-01

We present Wi-5, a spectrum programming architecture for radio resource management in unlicensed frequency bands. It introduces control plane that offers fine grained allocation of resources, flexible configuration and wireless networking parameters, continuous monitoring the network status. These features, along with centralized nature this architecture, can effectively address congestion which often occurs To demonstrate Wi-5's capabilities, we show results obtained from emulating various...

10.1109/mcom.2018.1800246 article EN IEEE Communications Magazine 2018-11-14

This paper presents a novel software-defined wireless network architecture that integrates coordination mechanisms to enhance the capabilities of set central managed Wi-Fi access points (APs). The global is presented in detail, where handoff mechanism integrated with active and passive monitoring tools other functionalities, resulting solution able provide smart functionalities using low-cost commercial APs. framework includes controller has all information available, therefore make...

10.1109/access.2018.2844088 article EN cc-by IEEE Access 2018-01-01

Frame aggregation is widely used in 802.11 WLANs order to provide a significant throughput improvement. However, the latency increase that comes as counterpart can reduce quality experienced by users of applications with real-time constraints. This letter explores versus tradeoff context central controlled solutions (e.g. SDWN-based). First, scenario single Access Point (AP) illustrate problem and propose two possible solutions. Then, centralized algorithm dynamically (de)activates tested...

10.1109/lcomm.2017.2741940 article EN IEEE Communications Letters 2017-08-21

Due to the Increasing deployment of real-time multimedia services like IPTV and videoconferencing, Internet has new Challenges. These Applications require a reliable performance network so as provide good Quality Service (QoS) it is important for providers estimate quality offered; regardless transport know perceived by user. For this have tools evaluate service provided. This paper presents system assessment. will allow us study user's different codecs, bit rates, frame rates video...

10.1145/2382016.2382026 article EN 2012-10-04

Real-time services are very challenging for current network infrastructures. One of these is online gaming, which has acquired more importance in the last years. The quality experienced by users could be improved use a smarter network, includes some proxies near players order to transfer intelligence from game server borders. Proxies have been largely used other services, such as web browsing and VoIP. First Person Shooters popular genre games that generate high rates small packets. This...

10.1109/mcom.2011.6069728 article EN IEEE Communications Magazine 2011-11-01

This work presents a study of RTP multiplexing schemes, which are compared with the normal use RTP, in terms ITU R-factor quality estimator. The bandwidth saving different schemes is studied, and some tests VoIP traffic carried out order to compare using three router buffer policies. Network delays added an adequate statistical distribution. show savings multiplexing, also importance packet size time-limited customer experience improvement can be achieved measured R-factor, showing that...

10.1109/ccnc.2011.5766495 article EN 2011-01-01

Many Massively Multiplayer Online Role-Playing Games (MMORPGs) use TCP flows for communication between the server and game clients. The utilization of TCP, which was not initially designed (soft) real-time services, has many implications competing traffic flows. In this paper we present a series studies explore competition MMORPG other For that aim, first extend source-based model, based on player’s activities during day, to also incorporate impact number players sharing (server population)...

10.1155/2014/602403 article EN cc-by International Journal of Computer Games Technology 2014-01-01

This work presents a simulation study of the influence multiplexing method on parameters that define subjective quality for online games, mainly delay, jitter and packet loss. The results an available estimator from literature are also shown. Two buffer implementations, each one with two sizes, tested in order to mutual influences router quality. show small buffers more adequate maintain delay acceptable levels, but they increase Multiplexing shows clear advantage when using which size is...

10.1109/ccnc.2012.6181001 article EN 2012-01-01

The use of robust security solutions is a must for the Internet Things (IoT) devices and their applications: regulators in different countries are creating frameworks certifying those with an acceptable level. However, even already certified devices, protocols have to be updated when breach found or certain version becomes obsolete. Many approaches securing IoT applications nowadays based on integration layer [e.g., using transport security, (TLS)], but this may result difficulties upgrading...

10.1109/access.2019.2900939 article EN cc-by-nc-nd IEEE Access 2019-01-01

This work presents a test called "sizogram" which characterizes the packet loss vs. size behavior of router. graph can help us to take some decisions about traffic, e.g. multiplexing or not, number samples frames be included in packet, etc. In addition, it useful have better idea internal architecture Simulations been carried out using different buffer implementations and sizes, results show usefulness this test.

10.1109/ccnc.2012.6181115 article EN 2012-01-01

This paper proposes a method for optimizing bandwidth usage in Software Defined Networks (SDNs) based on OpenFlow. Flows of small packets presenting high overhead, as the ones generated by emerging services, can be identified SDN controller, order to remove header fields that are common any packet flow, only during their way through SDN. At same time, several multiplexed together frame, thus reducing overall number frames. The useful providing QoS while traversing Four kinds small-packet...

10.4304/jnw.10.4.176-187 article EN Journal of Networks 2015-04-14

This paper proposes a method for optimizing bandwidth usage in Software Defined Networks (SDNs) based on OpenFlow. Flows of small packets presenting high overhead, as the ones generated by emerging services, can be identified SDN controller, order to remove header fields that are common any packet flow, only during their way through SDN. At same time, several multiplexed together frame, thus reducing number sent frames. Four kinds small-packet traffic flows considered (VoIP, UDP and...

10.1109/spects.2014.6879992 article EN 2014-07-01

This letter compares different policies for multiplexing the traffic of online games. In order to achieve bandwidth savings and alleviate high packet rate, headers are compressed a number native packets included into bigger one, using PPPMux an L2TP tunnel. Small controlled delays jitter added due retention at queue multiplexer. The compared real traces popular game, results show that significant, while impairments not severe.

10.1109/lcomm.2011.080811.111160 article EN IEEE Communications Letters 2011-08-25

The increase of Internet penetration in the last years is boosting popularity eVoting systems. However, order to have a security level similar that an in-person voting, series requisites be accomplished. This article describes secure protocol based on ring signatures. implementation details and different modules voting platform including this signature are presented. In addition, special characteristic has been included protocol: during process parameter called "linking tag" generated, able...

10.5296/npa.v6i2.5390 article EN Network Protocols and Algorithms 2014-06-30

The rise of new real-time interactive services, in which consumers demand high subjective quality, makes it necessary to define network mechanisms that can dynamically adapt traffic variations. Cooperation between the different actors is required order traditional infrastructure these patterns while guaranteeing delay requirements. Thus, standardization needed make cooperation possible. A method for tunneling compressed multiplexed flows (TCMTF) proposed as an update TCRTP, current practice...

10.1109/mcom.2013.6658664 article EN IEEE Communications Magazine 2013-11-01

The complex and ever-changing Internet of Things (IoT) domain could benefit from standardization a higher degree autonomy between different layers: standard approaches defining the relationship security communication software functionalities, hardware, applications will allow more efficient, flexible, secure communication. To this end, techniques in which IoT devices is decoupled they run can provide significant benefits enable development new strategies. This article presents study provided...

10.1109/jiot.2019.2951306 article EN IEEE Internet of Things Journal 2019-11-05

A Video Surveillance System (VSS) is of primary importance in public transport hubs such as airports, train or bus stations but also inside the vehicle itself. In this paper, we present a heuristic architecture model for on-board video surveillance system based on Internet Things (IoVT) devices which addresses need delivering smart vehicles (e.g., buses) minimizing impact network performance. proof-of-concept was implemented using Cloud Service Provider (CSP) and two Raspberry Pi edge...

10.1109/tla.2021.9477277 article EN IEEE Latin America Transactions 2021-07-08

In this paper we explain the deployment of a testbed that emulates network by means virtualization, allowing us to implement set virtual nodes in one physical machine or small LAN. Nodes participating communication are machines adequately connected. The system is hybrid

10.4108/icst.simutools2010.8635 article EN 2010-01-01
Coming Soon ...