scispace - formally typeset
Search or ask a question
Author

Jose Saldana

Bio: Jose Saldana is an academic researcher from University of Zaragoza. The author has contributed to research in topics: Network packet & Quality of service. The author has an hindex of 13, co-authored 77 publications receiving 468 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: In this letter, the development and testing of an open enterprise Wi-Fi solution based on virtual access points, managed by a central WLAN controller is presented, which allows seamless handovers between APs in different channels, maintaining the QoS of real-time services.
Abstract: In this letter, the development and testing of an open enterprise Wi-Fi solution based on virtual access points (APs), managed by a central WLAN controller is presented. It allows seamless handovers between APs in different channels, maintaining the QoS of real-time services. The potential scalability issues associated to the beacon generation and channel assignment have been addressed. A battery of tests has been run in a real environment, and the results are reported in terms of packet loss and delay.

51 citations

Journal ArticleDOI
TL;DR: Wi-5 is presented, a spectrum programming architecture for radio resource management in unlicensed frequency bands that offers fine grained allocation of radio resources, flexible configuration of radio and wireless networking parameters, and continuous monitoring of the wireless network status.
Abstract: We present Wi-5, a spectrum programming architecture for radio resource management in unlicensed frequency bands. It introduces a spectrum control plane that offers fine grained allocation of radio resources, flexible configuration of radio and wireless networking parameters, and continuous monitoring of the wireless network status. These features, along with the centralized nature of this architecture, can effectively address spectrum congestion which often occurs in unlicensed frequency bands. To demonstrate Wi-5's capabilities, we show results obtained from emulating various use case scenarios on our open source proof-of-concept.

24 citations

Journal ArticleDOI
TL;DR: A global classification and a summary of the main characteristics of different Alternative Network deployments that have arisen in recent years with an aim to provide Internet services in places where mainstream network deployments do not exist or are not adequate solutions are presented.
Abstract: It is often said that the Internet is ubiquitous in our daily lives, but this holds true only for those who can easily access it In fact, billions of people are still digitally disconnected, as bringing connectivity to certain zones does not make a good business case The only solution for these unsatisfied potential users is to directly undertake the building of the infrastructure required to obtaining access to the Internet, typically forming groups in order to share the corresponding cost This article presents a global classification and a summary of the main characteristics of different Alternative Network deployments that have arisen in recent years with an aim to provide Internet services in places where mainstream network deployments do not exist or are not adequate solutions The "Global Access to the Internet for All" Research Group of the Internet Research Task Force, where all authors actively participate, is interested in documenting these emerging deployments As an outcome of this work, a classification has converged by consensus, where five criteria have been identified and, based on them, four different types of Alternative Networks have been identified and described with real-world examples Such a classification is useful for a deeper understanding of the common characteristics behind existing and emerging Alternative Networks

21 citations

Journal ArticleDOI
TL;DR: The results show that aggregation parameters can be tuned in order to keep latency in low levels, with a low throughput penalty.
Abstract: Frame aggregation is widely used in 802.11 WLANs in order to provide a significant throughput improvement. However, the latency increase that comes as a counterpart can reduce the quality experienced by the users of applications with real-time constraints. This letter explores the throughput versus latency tradeoff in the context of central controlled solutions (e.g. SDWN-based). First, a scenario with a single Access Point (AP) is used to illustrate the problem and to propose two possible solutions. Then, a centralized algorithm that dynamically (de)activates aggregation is tested in a scenario with a number of APs. The results show that aggregation parameters can be tuned in order to keep latency in low levels, with a low throughput penalty.

20 citations

11 Dec 2015
TL;DR: This document surveys a set of recommendations about the maximum latency tolerated by the users of delay-constrained services, and a summary of the latency limits for each service is finally provided.
Abstract: Network delay is one of the main factors which can degrade the Quality of Experience (QoE) of the users of network services. This document surveys a set of recommendations about the maximum latency tolerated by the users of delay-constrained services. Some recommendations already exist for VoIP, but emerging services as e.g. online gaming, have different requirements. Different papers in the literature reporting these constraints are surveyed, and a summary of the latency limits for each service is finally provided.

19 citations


Cited by
More filters
Journal Article
TL;DR: The continuing convergence of the digital marketing and sales funnels has created a strategic continuum from digital lead generation to digital sales, which identifies the current composition of this digital continuum while providing opportunities to evaluate sales and marketing digital strategies.
Abstract: MKT 6009 Marketing Internship (0 semester credit hours) Student gains experience and improves skills through appropriate developmental work assignments in a real business environment. Student must identify and submit specific business learning objectives at the beginning of the semester. The student must demonstrate exposure to the managerial perspective via involvement or observation. At semester end, student prepares an oral or poster presentation, or a written paper reflecting on the work experience. Student performance is evaluated by the work supervisor. Pass/Fail only. Prerequisites: (MAS 6102 or MBA major) and department consent required. (0-0) S MKT 6244 Digital Marketing Strategy (2 semester credit hours) Executive Education Course. The course explores three distinct areas within marketing and sales namely, digital marketing, traditional sales prospecting, and executive sales organization and strategy. The continuing convergence of the digital marketing and sales funnels has created a strategic continuum from digital lead generation to digital sales. The course identifies the current composition of this digital continuum while providing opportunities to evaluate sales and marketing digital strategies. Prerequisites: MKT 6301 and instructor consent required. (2-0) Y MKT 6301 (SYSM 6318) Marketing Management (3 semester credit hours) Overview of marketing management methods, principles and concepts including product, pricing, promotion and distribution decisions as well as segmentation, targeting and positioning. (3-0) S MKT 6309 Marketing Data Analysis and Research (3 semester credit hours) Methods employed in market research and data analysis to understand consumer behavior, customer journeys, and markets so as to enable better decision-making. Topics include understanding different sources of data, survey design, experiments, and sampling plans. The course will cover the techniques used for market sizing estimation and forecasting. In addition, the course will cover the foundational concepts and techniques used in data visualization and \"story-telling\" for clients and management. Corequisites: MKT 6301 and OPRE 6301. (3-0) Y MKT 6310 Consumer Behavior (3 semester credit hours) An exposition of the theoretical perspectives of consumer behavior along with practical marketing implication. Study of psychological, sociological and behavioral findings and frameworks with reference to consumer decision-making. Topics will include the consumer decision-making model, individual determinants of consumer behavior and environmental influences on consumer behavior and their impact on marketing. Prerequisite: MKT 6301. (3-0) Y MKT 6321 Interactive and Digital Marketing (3 semester credit hours) Introduction to the theory and practice of interactive and digital marketing. Topics covered include: online-market research, consumer behavior, conversion metrics, and segmentation considerations; ecommerce, search and display advertising, audiences, search engine marketing, email, mobile, video, social networks, and the Internet of Things. (3-0) T MKT 6322 Internet Business Models (3 semester credit hours) Topics to be covered are: consumer behavior on the Internet, advertising on the Internet, competitive strategies, market research using the Internet, brand management, managing distribution and supply chains, pricing strategies, electronic payment systems, and developing virtual organizations. Further, students learn auction theory, web content design, and clickstream analysis. Prerequisite: MKT 6301. (3-0) Y MKT 6323 Database Marketing (3 semester credit hours) Techniques to analyze, interpret, and utilize marketing databases of customers to identify a firm's best customers, understanding their needs, and targeting communications and promotions to retain such customers. Topics

5,537 citations

Journal ArticleDOI
TL;DR: In this article, the authors provide a taxonomy and survey of the state of the art in IoT security research, and offer a roadmap of concrete research challenges related to the application of machine learning and software-defined networking to address existing and next-generation IoT security threats.
Abstract: The Internet of Things (IoT) realizes a vision where billions of interconnected devices are deployed just about everywhere, from inside our bodies to the most remote areas of the globe. As the IoT will soon pervade every aspect of our lives and will be accessible from anywhere, addressing critical IoT security threats is now more important than ever. Traditional approaches where security is applied as an afterthought and as a "patch" against known attacks are insufficient. Indeed, next-generation IoT challenges will require a new secure-by-design vision, where threats are addressed proactively and IoT devices learn to dynamically adapt to different threats. To this end, machine learning and software-defined networking will be key to provide both reconfigurability and intelligence to the IoT devices. In this paper, we first provide a taxonomy and survey the state of the art in IoT security research, and offer a roadmap of concrete research challenges related to the application of machine learning and software-defined networking to address existing and next-generation IoT security threats.

91 citations

01 Jun 2015
TL;DR: This paper presents and evaluates OpenSDWN, a novel WiFi architecture based on an SDN/NFV approach that exploits datapath programmability to enable service differentiation and fine-grained transmission control, facilitating the prioritization of critical applications.
Abstract: The quickly growing demand for wireless networks and the numerous application-specific requirements stand in stark contrast to today’s inflexible management and operation of WiFi networks. In this paper, we present and evaluate OPENSDWN, a novel WiFi architecture based on an SDN/NFV approach. OPENSDWN exploits datapath programmability to enable service differentiation and fine-grained transmission control, facilitating the prioritization of critical applications. OPENSDWN implements per-client virtual access points and per-client virtual middleboxes, to render network functions more flexible and support mobility and seamless migration. OPENSDWN can also be used to out-source the control over the home network to a participatory interface or to an Internet Service Provider.

87 citations

01 Jan 2007
TL;DR: The journal not only will address research topics related to networking and communications theory, but will also consider the standardization, economic, and engineering aspects of P2P technologies, and their impacts on software engineering, computer engineering, networked communication, and security.
Abstract: Aims & Scope Peer-to-Peer Networking and Applications (P2PNA) has received significant attention from both academia and industry in recent years. The aim of the Peer-to-Peer Networking and Applications journal is to disseminate state-of-the-art research and development results in this rapidly growing research area, to facilitate the deployment of P2P networking and applications, and to bring together the academic and industry communities, with the goal of fostering interaction to promote further research interests and activities, thus enabling new P2P applications and services. The journal not only will address research topics related to networking and communications theory, but will also consider the standardization, economic, and engineering aspects of P2P technologies, and their impacts on software engineering, computer engineering, networked communication, and security.

76 citations

Journal ArticleDOI
TL;DR: This paper surveys the articles which have been published by Springer, IEEE, Elsevier, and ACM to extract the performance improvement solutions and resources which are required for performance control and the metrics to evaluate the network performance.
Abstract: Due to the development of the Internet and the smart end systems such as smartphones, portable laptop, and other smart mobile devices, as well as the emergence of concepts such as cloud computing, social networks, and Internet of Things, 4G and 5G have changed network requirements. A software-defined network (SDN) is a new architecture to support new network requirements. This architecture is composed of three layers, data, control, and application plane. A lot of papers have been published in well-known journals to improve network performance, so we classify the solutions for performance improvement based on three SDN layers and three SDN-based spheres which are (a) SDN-data center, (b) wireless networks, and (c) software-defined wide area network. This paper surveys the articles which have been published by Springer, IEEE, Elsevier, and ACM. We extract the performance improvement solutions and resources which are required for performance control and the metrics to evaluate the network performance. This article can help network enthusiasts to better understand, investigate, and improve the performance of SDN-based networks.

68 citations