Albert Banchs

Albert Banchs
  • University Carlos III de Madrid

About

218
Publications
49,308
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
6,601
Citations
Current institution
University Carlos III de Madrid

Publications

Publications (218)
Article
As upcoming, beyond-5G (B5G) wireless network generations are expected to deliver much better performance than existing solutions, Reconfigurable intelligent surfaces (RISs) are gaining relevance as one of the new key technologies able to facilitate such improvement. Interestingly, they can redesign how the propagation environment is conceived by g...
Article
Zero-touch network management is one of the most ambitious yet strongly required paradigms for beyond 5G and 6G mobile communication systems. Achieving full automation requires a closed loop that combines (i) network status data collection and processing, (ii) predictive capabilities based on such data to anticipate upcoming needs, and (iii) effect...
Article
The evolution of communication networks toward self-configuring systems requires the development of anticipatory approaches for network management to realize the envisioned concept of a zero-touch network orchestration. Current anticipatory network intelligence solutions rely on a well-defined loss function, which means that they require perfect kn...
Article
Network slicing is a key capability for next generation mobile networks. It enables infrastructure providers to cost effectively customize logical networks over a shared infrastructure. A critical component of network slicing is resource allocation, which needs to ensure that slices receive the resources needed to support their services while optim...
Article
Digital Twins (DTs) create fully-synchronized virtual representations of real-world systems, which can serve as interactive counterparts for artificial intelligence (AI) and machine learning (ML) algorithms, and hold significant importance for the upcoming 6G mobile networks. In this paper, we argue that DTs can improve all phases of the intelligen...
Preprint
Full-text available
Reconfigurable Intelligent Surfaces (RISs) are expected to play a crucial role in reaching the key performance indicators (KPIs) for future 6G networks. Their competitive edge over conventional technologies lies in their ability to control the wireless environment propagation properties at will, thus revolutionizing the traditional communication pa...
Article
Next-generation mobile networks will rely on their autonomous operation. Virtual Network Functions empowered by Artificial Intelligence (AI) and Machine Learning (ML) can adapt to varying environments that encompass both network conditions and the cloud platform executing them. In this view, it becomes paramount to understand why AI/ML algorithms...
Article
The softwarization of mobile networks enables an efficient use of resources, by dynamically scaling and re-assigning them following variations in demand. Given that the activation of additional servers is not immediate, scaling up resources should anticipate traffic demands to prevent service disruption. At the same time, the activation of more ser...
Article
Full-text available
Fifth generation (5G) and beyond systems require flexible and efficient monitoring platforms to guarantee optimal key performance indicators (KPIs) in various scenarios. Their applicability in Edge computing environments requires lightweight monitoring solutions. This work evaluates different candidate technologies to implement a monitoring platfor...
Preprint
Full-text available
Fifth generation (5G) and beyond systems require flexible and efficient monitoring platforms to guarantee optimal key performance indicators (KPIs) in various scenarios. Their applicability in Edge computing environments requires lightweight monitoring solutions. This work evaluates different candidate technologies to implement a monitoring platfor...
Preprint
Full-text available
Fifth generation (5G) and beyond systems require flexible and efficient monitoring platforms to guarantee optimal key performance indicators (KPIs) in various scenarios. Their applicability in Edge computing environments requires lightweight monitoring solutions. This work evaluates different candidate technologies to implement a monitoring platfor...
Preprint
Full-text available
The roll-out phase of the next generation of mobile networks (5G) has started and operators are required to devise deployment solutions while pursuing localization accuracy maximization. Enabling location-based services is expected to be a unique selling point for service providers now able to deliver critical mobile services, e.g., autonomous driv...
Article
The roll-out phase of the next generation of mobile networks (5G) has started and operators are required to devise deployment solutions while pursuing localization accuracy maximization. Enabling location-based services is expected to be a unique selling point for service providers now able to deliver critical mobile services, e.g., autonomous...
Article
Full-text available
The fifth generation (5G) of mobile networks is designed to accommodate different types of use cases, each of them with different and stringent requirements and key performance indicators (KPIs). To support the optimization of the network performance and validation of the KPIs, there exist the necessity of a flexible and efficient monitoring system...
Article
The virtualization of radio access networks (vRAN) is the last milestone in the NFV revolution. However, the complex relationship between computing and radio dynamics make vRAN resource control particularly daunting. We present vrAIn , a resource orchestrator for vRANs based on deep reinforcement learning. First, we use an autoencoder to project...
Article
While the application of artificial intelligence (Ai) to 5G networks has raised strong interest, standard solutions to bring Ai into 5G systems are still in their infancy and have a long way to go before they can be used to build an operational system. in this article, we contribute to bridging the gap between standards and a working solution by de...
Preprint
Full-text available
The Fifth-Generation (5G) of mobile networks is designed to accommodate different types of use cases, each of them with different and stringent requirements and Key Performance Indicators (KPIs). To support the optimization of the network performance and validation of the KPIs, there exists the necessity of a flexible and efficient monitoring syste...
Conference Paper
Full-text available
With network slicing, operators can acquire and manage virtual instances of a mobile network, tailored to a given service, in this way maximizing flexibility while increasing the overall resource utilization. However, the currently used tunnelling protocol, i.e., GTP, might not be the most appropriate choice for the envisioned scenarios, given its...
Conference Paper
Full-text available
Document Sections I. Introduction II. Evolution of Cloud and Mobile Networking III. Serverless Mobile Architectures IV. Challenges To Address V. Summary Authors Figures References Keywords Metrics Abstract: The softwarization of communication networks provides notable benefits, such as flexibility, improved resource efficiency, and commoditization....
Article
Network Function Virtualization enables network slicing as a novel paradigm for service provisioning. With network slicing, Virtual Network Functions (VNFs) can be instantiated at different locations of the infrastructure, choosing their optimal placement based on parameters such as the requirements of the service or the resources available. One li...
Article
5G and beyond are not only sophisticated and difficult to manage, but must also satisfy a wide range of stringent performance requirements and adapt quickly to changes in traffic and network state. Advances in machine learning and parallel computing underpin new powerful tools that have the potential to tackle these complex challenges. In this arti...
Article
Full-text available
Network slicing is an emerging paradigm in mobile networks that leverages NFV to enable the instantiation of multiple virtual networks -- named slices -- over the same physical network infrastructure. The operator can allocate to each slice dedicated resources and customized functions that allow meeting the highly heterogeneous and stringent requir...
Article
Full-text available
Anonymous communication tools, such as Tor, are extensively employed by users who want to keep their web activity private. But recent works have shown that when a local, passive adversary observes nothing more than the timestamp, size and direction (incoming or outgoing) of the packets, it can still identify with high accuracy the website accessed...
Preprint
Full-text available
Network slicing is a key capability for next generation mobile networks. It enables one to cost effectively customize logical networks over a shared infrastructure. A critical component of network slicing is resource allocation, which needs to ensure that slices receive the resources needed to support their mobiles/services while optimizing network...
Article
Full-text available
This paper provides a survey of resource allocation for network slicing. We focus on two classes of existing solutions: ( $i$ ) reservation-based approaches, which allocate resources on a reservation basis, and ( $ii$ ) share-based approaches, which allocate resources based on static overall shares associated to individual slices. We identify the...
Article
Full-text available
The telecom industry is moving from a "horizontal" service delivery model, where services are defined independent of their consumers, toward a "vertical" delivery model, where the provided services are tailored to specific industry sectors and verticals. In order to enable this transition, an end-to-end comprehensive 5G architecture is needed, with...
Article
Full-text available
The dynamic management of network resources is both a critical and challenging task in upcoming multi-tenant mobile networks, which requires allocating capacity to individual network slices so as to accommodate future time-varying service demands. Such an anticipatory resource configuration process must be driven by suitable predictors that take in...
Article
Full-text available
Network slicing is considered one of the main pillars of the upcoming 5G networks. Indeed, the ability to slice a mobile network and tailor each slice to the needs of the corresponding tenant is envisioned as a key enabler for the design of future networks. However, this novel paradigm opens up to new challenges, such as isolation between network s...
Article
Full-text available
The economic sustainability of future mobile networks will largely depend on the strong specialization of its offered services. Network operators will need to provide added value to their tenants, by moving from the traditional one-size-fits-all strategy to a set of virtual end-to-end instances of a common physical infrastructure, named network...
Conference Paper
Full-text available
The virtualization of radio access networks (vRAN) is the last milestone in the NFV revolution. However, the complex dependencies between computing and radio resources make vRAN resource control particularly daunting. We present vrAIn, a dynamic resource controller for vRANs based on deep reinforcement learning. First, we use an autoencoder to proj...
Conference Paper
Full-text available
While the application of the NFV paradigm into the network is proceeding full steam ahead, there is still one last mile- stone to be achieved in this context: the virtualization of the radio access network (vRAN). Due to the very complex de- pendency between the radio conditions and the computing resources needed to provide the baseband processing...
Conference Paper
Network slicing is a new paradigm for future 5G networks where the network infrastructure is divided into slices devoted to different services and customized to their needs. With this paradigm, it is essential to allocate to each slice the needed resources, which requires the ability to forecast their respective demands. To this end, we present Dee...
Article
It is now commonly agreed that future 5G Networks will build upon the network slicing concept. The ability to provide virtual, logically independent “slices” of the network will also have an impact on the models that will sustain the business ecosystem. Network slicing will open the door to new players: the infrastructure provider, which is the own...
Book
* Provides a survey on the technologies, protocols and architectures that are widely used in practice to implement networked multimedia services. * Presents the background and basic concepts behind multimedia networking, and provides a detailed analysis of how multimedia services work, reviewing the diverse network protocols that are of common use...
Conference Paper
By providing especially tailored instances of a virtual network,network slicing allows for a strong specialization of the offered services on the same shared infrastructure. Network slicing has profound implications on resource management, as it entails an inherent trade-off between: (i) the need for fully dedicated resources to support service cus...
Article
In a virtualized radio access network (RAN), baseband processing is performed by software running in cloud-computing platforms. However, current protocol stacks were not designed to run in this kind of environment; the high variability on the computational resources consumed by RAN functions may lead to eventual computational outages (where frames...
Article
Full-text available
This paper proposes a novel semi-distributed and practical ICIC scheme based on the Almost Blank SubFrame (ABSF) approach specified by 3GPP. We define two mathematical programming problems for the cases of guaranteed and best-effort traffic, and use game theory to study the properties of the derived ICIC distributed schemes, which are compared in d...
Article
Network slicing represents a new paradigm to operate mobile networks. With network slicing, the underlying infrastructure is "sliced" into logically separate networks that can be customized to the specific needs of their tenant. Hands-on experiments on this technology are essential to understand its benefits and limits, and to validate the design a...
Article
Technologies to enable network slicing are expected to be a key component of next generation mobile networks. Their promise lies in enabling tenants (such as mobile operators and/or services) to reap the cost and performance benefits of sharing resources while retaining the ability to customize their own allocations. When employing dynamic sharing...
Article
5G networks will be characterized by their diversity in terms of traffic patterns, multi-tenancy and heterogeneous and stringent traffic requirements. Network softwarization is a key enabler to cope with such management burden, as it provides the ability to control all networking functions through (re)programming, thus providing higher flexibility...
Conference Paper
We investigate how individual mobile services are consumed at a national scale, by studying data collected in a 3G/4G mobile network deployed over a major European country. Through correlation and clustering analyses, our study unveils a strong heterogeneity in the demand for different mobile services, both in time and space. In particular, we show...
Article
We are currently observing the softwarization of communication networks, where network functions are translated from monolithic pieces of equipment to programs running over a shared pool of computational, storage, and communication resources. While it is clear that almost any softwarization improves flexibility (eg, the ability to instantiate more...
Article
Full-text available
The articles in this special section focus on network slicing for 5G mobile communication. The emerging fifth generation (5G) networks are expected to support a plethora of different services and applications with diverse and often conflicting performance requirements. Network slicing enables network operators to allocate logical self-contained net...
Article
Full-text available
Rate adaptation and transmission power control in 802.11 WLANs have received a lot of attention from the research community, with most of the proposals aiming at maximising throughput based on network conditions. Considering energy consumption, an implicit assumption is that optimality in throughput implies optimality in energy efficiency, but this...
Article
Full-text available
In this paper, we revisit the idea of putting interfaces to sleep during 'packet overhearing' (i.e., when there are ongoing transmissions addressed to other stations) from a practical standpoint. To this aim, we perform a robust experimental characterisation of the timing and consumption behaviour of a commercial 802.11 card. We design $\mu$Nap, a...
Preprint
Rate adaptation and transmission power control in 802.11 WLANs have received a lot of attention from the research community, with most of the proposals aiming at maximising throughput based on network conditions. Considering energy consumption, an implicit assumption is that optimality in throughput implies optimality in energy efficiency, but this...
Article
There is a wide consensus by the research community and the industry that it will not be possible to satisfy future mobile traffic demand and application requirements by simply evolving the current fourth-generation architecture. Instead, there is a need for a considerable revision of the mobile network system: such an effort is commonly referred t...
Conference Paper
Full-text available
The emerging network slicing paradigm for 5G provides new business opportunities by enabling multi-tenancy support. At the same time, new technical challenges are introduced, as novel resource allocation algorithms are required accommodating different business models. In particular, infrastructure providers need to implement radically new admission...
Conference Paper
Full-text available
In addition to providing substantial performance enhancements, future 5G networks will also change the mobile network ecosystem. Building on the network slicing concept, 5G allows to "slice" the network infrastructure into separate logical networks that may be operated independently and targeted at specific services. This opens the market to new pl...
Article
Full-text available
Next generation wireless architectures are expected to enable slices of shared wireless infrastructure which are customized to specific mobile operators/services. Given infrastructure costs and stochastic nature of mobile services' spatial loads, it is highly desirable to achieve efficient statistical multiplexing amongst network slices. We study a...
Article
Full-text available
The articles in this special section focus on the technologies, applications, and services supported by 5G mobile commuincations.
Preprint
Next generation wireless architectures are expected to enable slices of shared wireless infrastructure which are customized to specific mobile operators/services. Given infrastructure costs and the stochastic nature of mobile services' spatial loads, it is highly desirable to achieve efficient statistical multiplexing amongst such slices. We study...
Article
Full-text available
Mobile network operators can track subscribers via passive or active monitoring of device locations. The recorded trajectories offer an unprecedented outlook on the activities of large user populations, which enables developing new networking solutions and services, and scaling up studies across research disciplines. Yet, the disclosure of individu...
Article
Full-text available
Network slicing to enable resource sharing among multiple tenants --network operators and/or services-- is considered a key functionality for next generation mobile networks. This paper provides an analysis of a well-known model for resource sharing, the 'share-constrained proportional allocation' mechanism, to realize network slicing. This mechani...
Preprint
Network slicing to enable resource sharing among multiple tenants --network operators and/or services-- is considered a key functionality for next generation mobile networks. This paper provides an analysis of a well-known model for resource sharing, the 'share-constrained proportional allocation' mechanism, to realize network slicing. This mechani...
Article
Increasing the density of access points is one of the most effective mechanisms to cope with the growing traffic demand in wireless networks. To prevent energy wastage at low loads, a resource-on-demand (RoD) scheme is required to opportunistically (de)activate access points as network traffic varies. While previous publications have analytically m...
Article
Full-text available
Rate adaptation in 802.11 WLANs has received a lot of attention from the research community, with most of the proposals aiming at maximising throughput based on network conditions. Considering energy consumption, an implicit assumption is that optimality in throughput implies optimality in energy efficiency, but this assumption has been recently pu...
Preprint
Rate adaptation in 802.11 WLANs has received a lot of attention from the research community, with most of the proposals aiming at maximising throughput based on network conditions. Considering energy consumption, an implicit assumption is that optimality in throughput implies optimality in energy efficiency, but this assumption has been recently pu...
Article
This article provides an overview on objectives and first results of the Horizon 2020 project 5G NOvel Radio Multiservice adaptive network Architecture (5GNORMA). With 5G NORMA, leading players in the mobile ecosystem aim to underpin Europe's leadership position in 5G. The key objective of 5G NORMA is to develop a conceptually novel, adaptive and f...
Article
Full-text available
Opportunistic traffic offloading has been proposed to tackle overload problems in cellular networks. However, existing proposals only address D2D-based offload-ing techniques with deadline-based data propagation, and neglect content injection procedures. In contrast, we tackle the offloading issue from another perspective: the base station interfer...
Article
Full-text available
This paper addresses the slicing of Radio Access Network (RAN) resources by multiple tenants, e.g., virtual wireless operators and service providers. We consider a criterion for dynamic resource allocation amongst tenants, based on a weighted proportionally fair objective, which achieves desirable fairness/protection across the network slices of th...
Article
Power-line communications are employed in home networking to provide easy and high-throughput connectivity. The IEEE 1901, the MAC protocol for power-line networks, employs a CSMA/CA protocol similar to that of 802.11, but is substantially more complex, which probably explains why little is known about its performance. One of the key differences be...
Article
Power-line communications (PLC) are becoming a key component in home networking, because they provide easy and high-throughput connectivity. The dominant MAC protocol for high data-rate PLC, the IEEE 1901, employs a CSMA/CA mechanism similar to the backoff process of 802.11. Existing performance evaluation studies of this protocol assume that the b...
Article
As a chain is as strong as its weakest element, so are the efficiency, flexibility, and robustness of a mobile network, which relies on a range of different functional elements and mechanisms. Indeed, the mobile network architecture needs particular attention when discussing the evolution of 3GPP EPS because it is the architecture that integrates t...
Conference Paper
While substantial effort has been devoted to understand fraudulent activity in traditional online advertising (search and banner), more recent forms such as video ads have received little attention. The understanding and identification of fraudulent activity (i.e., fake views) in video ads for advertisers, is complicated as they rely exclusively on...
Article
Full-text available
Offloading traffic through opportunistic communications has been recently proposed as a way to relieve the current overload of cellular networks. Opportunistic communication can occur when mobile device users are (temporarily) in each other's proximity, such that the devices can establish a local peer-to-peer connection (e.g., via Bluetooth). Since...
Article
Full-text available
Offloading traffic through opportunistic communications has been recently proposed as a way to relieve the current overload of cellular networks. Opportunistic communication can occur when mobile device users are (temporarily) in each other's proximity, such that the devices can establish a local peer-to-peer connection (e.g., via Bluetooth). Since...
Article
Full-text available
While substantial effort has been devoted to understand fraudulent activity in traditional online advertising (search and banner), more recent forms such as video ads have received little attention. The understanding and identification of fraudulent activity (i.e., fake views on videos) in video ads for advertisers, is complicated as they rely excl...
Article
Full-text available
To cope with the growing traffic demand, future mobile networks will be denser and integrate heterogeneous technologies. However, if not properly engineered, such networks may incur huge energy waste when there is little traffic, and may suffer from an unbearable management burden caused by the variety of technologies integrated. In this article, w...
Article
Full-text available
This paper proposes a conceptually novel, adaptive and future-proof 5G mobile network architecture. The proposed architecture enables unprecedented levels of network customisability, ensuring stringent performance, security, cost and energy requirements to be met; as well as providing an API-driven architectural openness, fuelling economic growth t...
Article
This paper focuses on the practical implementation of a Cloud-RAN architecture in the context of future 5G systems, with particular emphasis on different aspects of the functional split between the cloud platform and the radio access points. First, we provide a comprehensive overview of implementation aspects and how different hardware options impa...
Conference Paper
Full-text available
Inter-Cell Interference Coordination (ICIC) has been identified for LTE as the main instrument for interference control. With ICIC, quality requirements can be guaranteed while avoiding the complexity of coordinated baseband processing approaches. However, most ICIC schemes proposed so far rely on centralized multi-cell scheduling algorithms that i...
Conference Paper
Full-text available
The traditional model of single ownership of the mobile network infrastructure is being challenged by the forecasted mobile data tsunami and the resulting CAPEX and OPEX costs. In this context, the sharing of network infrastructure among operators has emerged as a way to ensure operators' future cost competitiveness. While the elementary concepts r...
Article
Full-text available
Distributed Opportunistic Scheduling (DOS) techniques have been recently proposed to improve the throughput performance of wireless networks. With DOS, each station contends for the channel with a certain access probability. If a contention is successful, the station measures the channel conditions and transmits in case the channel quality is above...
Article
Full-text available
Power-line communications are becoming a key component in home networking. The dominant MAC protocol for high data-rate power-line communications, IEEE 1901, employs a CSMA/CA mechanism similar to the back off process of 802.11. Existing performance evaluation studies of this protocol assume that the back off processes of the stations are independe...
Article
Power-line communications are employed in home networking to provide easy and high-throughput connectivity. IEEE 1901, the MAC protocol for power-line networks, employs a CSMA/CA protocol similar to that of 802.11, but is substantially more complex, which probably explains why little is known about its performance. One of the key differences betwee...

Network

Cited By