Wilson Ramírez

Learn More
—The exponential growth of Internet traffic gives no respite to the telecommunications industry , and is visibly shortening the life-cycle of the technologies used for core networking. To cope with the traffic demand , the industry has primarily fo-cused on the evolution of the data and control planes , and has rapidly made progress in both subjects.(More)
—The recent advances in optical technologies pave the way to the deployment of high-bandwidth services. As reliability becomes a mandatory requirement for some of these services, network providers must endow their networks with resilience capabilities. In recent years, network coding protection (NCP) has emerged as a tentative solution aiming at enabling(More)
—Optical technologies are the foundations supporting the current telecommunication network backbones due to the high speed transmissions achieved in fiber optical networks. Traditional optical networks consist of a fixed 50 GHz grid, resulting in a low optical spectrum (OS) utilization, specifically with transmission rates above 100 Gbps. This issue is(More)
—IP/MPLS and Optical technologies are the foundations of current Carrier-Grade Networks (CGNs), due to both the flexibility of IP/MPLS to provide services with distinct requirements and the high transport capacity offered by new Optical technologies, such as Elastic Optical Networks (EONs). However, despite of the widespread adoption of these two(More)
—Hybrid Software-Defined Networks (SDNs) are growing at a remarkable speed , so network administrators need to deal with the configuration of a plethora of devices including OpenFlow elements , traditional equipment , and nodes supporting both OpenFlow and traditional features. The OpenFlow Management and Configuration Protocol (OF-CONFIG) is positioned as(More)
—A route leak can be defined as a security gap that occurs due to the infringement of the routing policies that any two Autonomous Systems (ASes) have agreed upon. Route leaks are seemingly simple , but hard to resolve since the ASes keep their routing policies confidential. Indeed , the traditional palliatives , such as the utilization of route filters ,(More)