• Home
  • Pedro A. Aranda Gutiérrez
Pedro A. Aranda Gutiérrez

Pedro A. Aranda Gutiérrez
U3CM

Dr. rer, nat.

About

52
Publications
6,051
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
374
Citations
Additional affiliations
January 2004 - December 2010
Telefónica I+D
Position
  • Consultant
September 2010 - February 2013
Telefónica I+D, Spain, Madrid
Position
  • SAIL
Description
  • E.U. FP7, Cloud Networking, Open Connectivity Services
January 2010 - December 2012
Paderborn University
Description
  • PhD research, BGP-4 analysis
Education
January 2009 - January 2013
Paderborn University
Field of study
  • Informatics
September 1982 - January 1990
Universidad Politécnica de Madrid, ETSIT
Field of study
  • Telecommunication

Publications

Publications (52)
Chapter
Network functions virtualization (NFV) is consolidating as one of the base technologies for the design, deployment, and operation of network services. NFV can be seen as a natural evolution of the trend to cloud technologies in IT, and hence perceived as bringing them to the network provider environments. While this can be true for the simplest cas...
Preprint
This paper evaluates the impact of a RD signal on traffic crossing the mobile network through a set of experiments in a simulated 5G network scenario built with ns-3. In our experiments, we compare a scenario with no RD treatment (i.e. a single best--effort EPS bearer) with scenarios with RD treatment (i.e. separate EPS bearers to carry RD--partiti...
Preprint
There are two seemingly contradicting trends in the current Internet: increased deployment of end-to-end encryption and growth in the use of in-network functions to support specific services. Attempts to interact with or integrate middlebox functionality in end-to-end encryption environments has resulted in developments and standardisation contribu...
Article
Given the current expansion of cloud computing, the expected advent of the Internet of Things, and the requirements of future fifth-generation network infrastructures, significantly larger pools of computational and storage resources will soon be required. This emphasizes the need for more scalable data centers that are capable of providing such an...
Article
Full-text available
SDN promises to overcome vendor lock-in by enabling a multi-vendor hardware and software ecosystem in operator networks. However, we observe that this is currently not happening. A framework allowing to compose SDN applications combining different frameworks can help revert the trend. In this paper, we analyze the challenges in the current SDN land...
Conference Paper
With the proliferation of cloud computing and the expected requirements of future Internet of Things (IoT) and 5G network scenarios, more efficient and scalable Data Centers (DCs) will be required, offering very large pools of computational resources and storage capacity cost-effectively. Looking at todays’ commercial DCs, they tend to rely on well...
Conference Paper
Full-text available
The Software-Defined Networking (SDN) ecosystem is still characterized by a multitude of different controller platforms, each with its own programming model, execution model, and capabilities. This creates a danger of a controller lock-in for both developers of SDN control applications and operators of SDN networks. Since no single controller platf...
Conference Paper
In this paper we define the notion of composition for software-defined network applications and show the theoretical and practical approaches to composition in software-defined networks and explain the challenges associated with it. We explore the feasibility of OpenFlow as an Application Programming Interface (API) for a composition engine and arg...
Article
In this article we present a novel solution to transfer users between IMS network elements. This solution enables a home operator to perform an appropriate redistribution of load among the call session control functions of the IMS, which can be deployed as virtualized network functions or over dedicated machines. This way, the operator is enabled t...
Conference Paper
The ecosystem of software-defined networking (SDN) is still characterized by a multitude of different controller platforms, each with its own programming model, execution model, and capabilities. This creates a danger of a controller lock-in for both developers of SDN control applications and operators of SDN networks. Since no single controller pl...
Conference Paper
Full-text available
The Software-Defined Networking (SDN) paradigm allows networking hardware to be made “malleable” and remotely manageable by the so-called SDN controllers. However, the current SDN landscape is extremely fragmented. Different open and closed source controller frameworks such as OpenDaylight, Ryu, Floodlight, etc. exist. Porting SDN applications from...
Patent
The present invention relates to a method for distributing routing information for redundant connection. The method is implemented in hierarchical IPv6 Internet protocol (IP) networks comprising a plurality of different autonomous systems (AS) which use a border gateway routing protocol (BGP-4) to communicate, which protocol does not allow routing...
Conference Paper
Full-text available
Nowadays, while most of the programmable network apparatus vendors support OpenFlow, a number of fragmented control plane solutions exist for proprietary Software - Defined Networks. Thus, network applications developers are forced to re-implement their solutions every time they encounter a new network controller. Moreover, different network develo...
Article
Mission critical applications used in heterogeneous inter-domain Internet infrastructures in different areas, for instance crisis and disaster, emergency, health, public safety, civil protection, fire-fighting, evacuation and military, require high level of intelligence of communication services in order to guarantee reliability, availability, secu...
Thesis
The BGP-4 protocol controls the routing information exchange between the independent networks or Autonomous Systems that form the Internet. It is also the main tool for controlling the traffic exchange between them. To control this traffic, routing policies are used.At the same time, the use of routing policies makes BGP-4 become metastable, making...
Conference Paper
The explosion of the Internet’s routing tables has been a concern in the last years. Specially after IANA assigned the last /8 prefixes on the 3rd of February, 2011, two fronts are open for the Internet community: the growth of the IPv4 routing table due to fragmentation introduced by the last assignments made by RIR and the strategy to follow for...
Article
This paper studies the effect of disaggregation on the size of the routing table in the Internet’s Default Free Zone (DFZ). Current practises for traffic balancing and protection against prefix hijacking in the Internet are based in disaggregating prefixes that cause an increase in size of the Internet’s core routing table. I propose an algorithm t...
Article
Full-text available
A new network architecture for the Internet needs ingredients from three approaches: information- centric networking, cloud computing integrated with networking, and open connectivity. Information-centric networking considers pieces of information as first-class entities of a networking architecture, rather than only indirectly identifying and mani...
Article
Full-text available
SAIL is a Framework Programme 7 project that aims at providing scal-able and adaptive solutions to enhance the Internet Although not a formal continuation of the 4WARD project, SAIL integrates many of the advanced concepts developed there. One of the focuses of the project, Cloud networking (CloNe), can be conceived as the successor of the Virtual...
Conference Paper
This paper studies the effect of simple Traffic Engineering techniques on the size of the Internet’s default free routing table. Current best practises for traffic balancing in the Internet are based in disaggregating prefixes that cause an increase in size of the Internet’s core routing table. An algorithm to show the impact of these techniques on...
Conference Paper
The Internet has evolved to become one of the most critical communication infrastructures in the planet. And yet, some of its underlying concepts and protocols do not provide the adequate level of reliability for such an essential role in global communications. The inter-domain routing protocol of the Internet, Border Gateway Protocol (BGP-4), is b...
Article
This paper proposes analysis techniques to discriminate between Traffic Engineering related activity from responses of the Internet to protocol interaction or infrastructure failures. These techniques can be practically applied to dispute settling between Internet Service Providers. The prefixes analysed using these techniques were obtained from BG...
Article
RFC4893 defines the transition mechanisms to use 4 byte Autonomous System numbers. This RFC has some inconsistencies and has not been implemented correctly by all vendors. As a result, several major Internet incidents related with the handling of bogus 4 byte Autonomous System Numbers (ASNs) have ocurred. The last one was registered between the 17t...
Article
Mission critical applications used in heterogeneous inter-domain Internet infrastructures in different areas, for instance crisis and disaster, emergency, health, public safety, civil protection, fire-fighting, evacuation and military, require high level of intelligence of communication services in order to guarantee reliability, availability, secu...
Conference Paper
The Internet is in a transition phase. Migrating to IPv6 is currently the centre of many studies, since the IPv4 address space exhaustion is starting to be noticeable by facts like the slowdown in the growth of the IPv4 routing table. Another less advertised but equally important challenge for the Internet is the exhaustion of the current 16 bit Au...
Conference Paper
BGP-4 is the routing protocol which holds the Internet together. Additionally and in the absence of a better solution, it is being used for traffic engineering purposes. In the absence of standardised procedures, each autonomous system in the Internet implements traffic engineering based on non-collaborative goals and using trial and error techniqu...
Conference Paper
The Border Gateway Protocol governs the overall routing in the Internet. With the time, it has been overloaded with functions which is was not initially designed for. The main example is Traffic Engineering. Internet Service Providers need to adjust the traffic on their peerings and in absence of a better alternative, use Trial and Error techniques...
Article
This paper is focussed on the NETQOS architecture for automated QoS policy provisioning, which can be used in Future Internet scenarios by the different actors (i.e. network operators, service providers, and users) for flexible QoS configuration over combinations of mobile, fixed, sensor and broadcast networks. The NETQOS policy management architec...
Conference Paper
In heterogeneous Internet access network environments (UMTS, WLAN, WIMAX, WLAN DVB-T, DVB-H) there is a challenge for automated configuration and adaptation of policies aimed at management of quality of service (QoS) guarantees and resource usage. The paper is focussed on a QoS policy management architecture, which allows interaction and adaptation...
Conference Paper
Full-text available
To support QoS guarantee and resource usage in heterogeneous access network environments more efficiently (UMTS, WIMAX, WLAN DVB-T, DVB-H), there is the challenge of automated configuration and adaptation of policies for QoS-aware applications. A policy management architecture is required, which allows interaction and adaptation of QoS policies of...
Article
Quality of Service Routing is at present an active and remarkable research area, since most emerging network services require specialized Quality of Service (QoS) functionalities that cannot be provided by the current QoS-unaware routing protocols. The provisioning of QoS based network services is in general terms an extremely complex problem, and...
Article
Full-text available
The paper proposes meta-data models for information about public repositories of measurement and monitoring data and tools. The meta-data model consists of a set of attributes, which describe the features of the actual data of interest. The discussed meta-data models constitute a base for the advanced meta-repository of measurement tools and data,...
Article
Full-text available
This paper presents the INTERMON dynamic monitoring architecture for spatio-temporal QoS and traffic mapping in inter-domain environment considering inter-domain routing (BGP-4 protocol) behaviour. The monitoring architecture is based on the collection of different types of time series data: QoS parameter time series data ,border router traffic dat...
Article
Full-text available
This paper presents InterRoute, a technology for inter-domain routing monitoring, topology discovery and analysis that has been developed in the scope of the INTERMON IST project. InterRoute is designed to track BGP-4 routing activity at intermediate points on an active end-to-end path in the Internet and to obtain inter-domain topology and metrics...
Article
Full-text available
Abstract The INTERMON project aims at inter-domain IP QoS monitoring, measurement and modelling. An important part of this project is exploring the use of inter-domain data in these tasks. Inter-domain topology information provides a level of abstraction, which is much higher than at intra-domain level. The impact of inter-domain routing events on...
Conference Paper
Full-text available
For enhanced Quality of Service (QoS) provision of multimedia applications in Internet environment, there is a need of data mining tools supporting the automated analysis of QoS behaviour and dependencies for the purpose of modelling and forecasting, QoS planning and anomaly detection. This paper presents a data mining technology for spatio-tempora...
Article
Full-text available
This paper is aimed to describe the INTERMON approach for inter-domain BGP-4 analysis based on pattern matching on public BGP-4 route repository data. An overview of different BGP-4 protocol analysis methodologies is presented and compared with the approach followed in the INTERMON project. The paper presents the usage of the pattern analysis techn...
Article
Full-text available
This paper is focussed on Quality of Service (QoS) analysis of applications in inter-domain environment using different monitoring tools in "policy" based manner to study the impact of specific performance factors such as inter-domain routing and topology on the end-to-end QoS. Integration of active end-to-end QoS monitoring with topology probing a...
Article
Full-text available
Quality of Service (QoS) analysis in inter-domain environment based on discovery of effects of topology and traffic on end-to-end QoS parameter is a feature of the advanced inter-domain QoS analysis architecture, developed in the framework of the European IST Project INTERMON (see (1)). INTERMON is based on interaction and coordination of different...

Network

Cited By