Publications by authors named "Evgeny Khorov"

Many emerging applications, such as factory automation, electric power distribution, and intelligent transportation systems, require multicast Ultra-Reliable Low-Latency Communications (mURLLC). Since 3GPP Release 17, 5G systems natively support multicast functionality, including multicast Hybrid Automatic Repeat Request and various feedback schemes. Although these features can be promising for mURLLC, the specifications and existing studies fall short in offering guidance on their efficient usage.

View Article and Find Full Text PDF

NB-Fi (Narrow Band Fidelity) is a promising protocol for low-power wide-area networks. NB-Fi networks use license-exempt Industrial, Scientific, and Medical (ISM) bands and, thus, NB-Fi devices can work in two modes: with and without Listen Before Talk (LBT). This paper compares these modes with different implementations of LBT in terms of packet loss rate (PLR), delay, energy consumption, and throughput.

View Article and Find Full Text PDF

To provide limited delays for remote sensing and control, gaming, and virtual reality applications, the Wi-Fi 7 standard introduces the Restricted Target Wake Time (R-TWT) mechanism, which reserves time intervals for particular stations with such real-time traffic. As legacy stations do not support R-TWT, the access point forbids channel access during these intervals for legacy stations. Quiet Intervals have been announced for this purpose.

View Article and Find Full Text PDF

Network slicing is considered a key feature of 5G and beyond cellular systems. It opens the door for new business models of mobile operators, enables new services, reduces costs with advanced infrastructure-sharing techniques, and improves heterogeneous traffic service. With slicing, the operators can tailor the network resources to the requirements of specific verticals, applications, and corresponding traffic types.

View Article and Find Full Text PDF

LPWANs are a promising solution for wireless sensor networks. To compete with such widespread technologies as LoRaWAN and Sigfox, recently a new LPWAN technology called NB-Fi has been developed. In a short time, many NB-Fi networks have been deployed in various countries.

View Article and Find Full Text PDF

This paper studies the usage of orthogonal frequency division multiple access (OFDMA) for uplink transmissions in IEEE 802.11ax networks. OFDMA enables simultaneous multi-user transmissions in Wi-Fi, but its usage requires efficient resource allocation algorithms.

View Article and Find Full Text PDF

The recent Wi-Fi HaLow technology focuses on adopting Wi-Fi for the needs of the Internet of Things. A key feature of Wi-Fi HaLow is the Restricted Access Window (RAW) mechanism that allows an access point to divide the sensors into groups and to assign each group to an exclusively reserved time interval where only the stations of a particular group can transmit. In this work, we study how to optimally configure RAW in a scenario with a high number of energy harvesting sensor devices.

View Article and Find Full Text PDF

LoRaWAN infrastructure has become widely deployed to provide wireless communications for various sensor applications. These applications generate different traffic volumes and require different quality of service (QoS). The paper presents an accurate mathematical model of low-power data transmission in a LoRaWAN sensor network, which allows accurate validation of key QoS indices, such as network capacity and packet loss ratio.

View Article and Find Full Text PDF

Minimizing the energy consumption is one of the main challenges in iot networks. Recently, the IEEE 802.11ah standard has been released as a new low-power Wi-Fi solution.

View Article and Find Full Text PDF

Wi-Fi HaLow is an adaptation of the widespread Wi-Fi technology for the Internet of Things scenarios. Such scenarios often involve numerous wireless stations connected to a shared channel, and contention for the channel significantly affects the performance in such networks. Wi-Fi HaLow contains numerous solutions aimed at handling the contention between stations, two of which, namely, the Centralized Authentication Control (CAC) and the Distributed Authentication Control (DAC), address the contention reduction during the link set-up process.

View Article and Find Full Text PDF

IEEE 802.11ah, marketed as Wi-Fi HaLow, extends Wi-Fi to the sub-1 GHz spectrum. Through a number of physical layer (PHY) and media access control (MAC) optimizations, it aims to bring greatly increased range, energy-efficiency, and scalability.

View Article and Find Full Text PDF

A PHP Error was encountered

Severity: Warning

Message: fopen(/var/lib/php/sessions/ci_sessione56a4gbomr0t43nl5ejnokuugqdq1cl7): Failed to open stream: No space left on device

Filename: drivers/Session_files_driver.php

Line Number: 177

Backtrace:

File: /var/www/html/index.php
Line: 316
Function: require_once

A PHP Error was encountered

Severity: Warning

Message: session_start(): Failed to read session data: user (path: /var/lib/php/sessions)

Filename: Session/Session.php

Line Number: 137

Backtrace:

File: /var/www/html/index.php
Line: 316
Function: require_once