Education

Tampere University
2005 — 2010, Doctor, Department of Communications Engineering
The Bonch-Bruevich Saint-Petersburg State University of Telecommunications
2002 — 2005, Postgraduate, Information and communication networks and systems

Dissertations

2010, Doctorate , Системы, сети и устройства телекоммуникаций, 05.12.13
2005, Candidate , Системы, сети и устройства телекоммуникаций, 05.12.13
Svechnikov D., Dunaytsev R., Muthanna A., Aziz A.
2024-05-26 citations by CoLab: 0 Abstract  
One of the most crucial objectives of the current decade is the widespread implementation of new, highly promising telecommunication services, among which holographic communication technology with the use of volumetric replicas of a person, as well as devices for generating, transmitting, and reproducing three-dimensional images, undoubtedly belongs. However, the relatively limited material and technical base in the field of holography and existing constraints on the speed of point cloud export, processing, and transmission impose stringent requirements on the computational power of desktop devices and the performance of communication components used in holographic traffic transmission. As a result, it is necessary to formulate a list of requirements for future HTC services on communication networks.
Koucheryavy A.E., Makolkina M.A., Paramonov A.I., Vybornova A.I., Muthanna A.S., Dunaytsev R.A., Vladimirov S.S., Elagin V.S., Markelov O.A., Vorozheykina O.I., Marochkina A.V., Gorbacheva L.S., Pankov B.O., Anvarzhonov B.N.
2023-04-30 citations by CoLab: 1 Abstract  
A first-priority set of telepresence services is proposed, and the delay requirements and fault probabilities for these services are defined. The end-to-end latency and reliability requirements are derived from analysis of ITU-T, 3GPP, ETSI standards and recommendations. The characteristics of a next-generation model network for research and education in the field of telepresence services are discussed. The model network is based on a DWDM core, a variety of server equipment, holographic fans, 3D cameras and projectors, avatar robots and multifunctional robots, and augmented reality terminal devices. The results of the first tests on the model network are presented.
Dunaytsev R., Moltchanov D., Koucheryavy Y., Harju J.
2011-01-24 citations by CoLab: 16 Abstract  
SUMMARY In this paper, we propose an analytical cross-layer model for a Transmission Control Protocol (TCP) connection running over a covariance-stationary wireless channel with a completely reliable Automatic Repeat reQuest scheme combined with Forward Error Correction (FEC) coding. Since backbone networks today are highly overprovisioned, we assume that the wireless channel is the only one bottleneck in the system which causes packets to be buffered at the wired/wireless interface and dropped as a result of buffer overflow. We develop the model in two steps. At the first step, we consider the service process of the wireless channel and derive the probability distribution of the time required to successfully transmit an IP packet over the wireless channel. This distribution is used at the next step of the modeling, where we derive expressions for the TCP long-term steady-state throughput, the mean round-trip time, and the spurious timeout probability. The developed model allows to quantify the joint effect of many implementationspecific parameters on the TCP performance over both correlated and non-correlated wireless channels. We also demonstrate that TCP spurious timeouts, reported in some empirical studies, do not occur when wireless channel conditions are covariance-stationary and their presence in those measurements should be attributed to non-stationary behavior of the wireless channel characteristics. Copyright 2011 John Wiley & Sons, Ltd.
Moltchanov D., Dunaytsev R.
Wireless Networks scimago Q2 wos Q3
2009-12-20 citations by CoLab: 6 Abstract  
Providing reliable data communications over wireless channels is a challenging task because time-varying wireless channel characteristics often lead to bit errors. These errors result in loss of IP packets and, consequently, TCP segments encapsulated into these packets. Since TCP cannot distinguish packet losses due to bit corruption from those due to network congestion, any packet loss caused by wireless channel impairments leads to unnecessary execution of the TCP congestion control algorithms and, hence, sub-optimal performance. Automatic Repeat reQuest (ARQ) and Forward Error Correction (FEC) try to improve communication reliability and reduce packet losses by detecting and recovering corrupted bits. Most analytical models that studied the effect of ARQ and FEC on TCP performance assumed that the ARQ scheme is perfectly persistent (i.e., completely reliable), thus a frame is always successfully transmitted irrespective of the number of transmission attempts it takes. In this paper, we develop an analytical cross-layer model for a TCP connection running over a wireless channel with a semi-reliable ARQ scheme, where the amount of transmission attempts is limited by some number. The model allows to evaluate the joint effect of stochastic properties of the wireless channel characteristics and various implementation-specific parameters on TCP performance, which makes it suitable for performance optimization studies. The input parameters include the bit error rate, the value of the normalized autocorrelation function of bit error observations at lag 1, the strength of the FEC code, the persistency of ARQ, the size of protocol data units at different layers, the raw data rate of the wireless channel, and the bottleneck link buffer size.
Moltchanov D., Dunaytsev R., Koucheryavy Y.
2008-01-01 citations by CoLab: 4 Abstract  
We propose an analytical model for a TCP SACK connection running over a wireless channel with completely reliable ARQ/FEC. We develop the model in two steps. At the first step, we consider the service process of the wireless channel and derive the probability distribution function of the time required to successfully transmit a single IP packet over the wireless channel. This distribution is used at the next step of the modeling where we derive the expression for TCP SACK steady state goodput. The developed model allows to quantify the effect of many implementation-specific parameters on TCP performance in wireless domain. We also demonstrate that TCP spurious timeouts, reported in many empirical studies, do not occur when wireless channel conditions are stationary and their presence in empirical measurements should be attributed to non-stationary behavior of wireless channel characteristics.
Dunaytsev R., Avrachenkov K., Koucheryavy Y., Harju J.
2007-01-01 citations by CoLab: 1 Abstract  
Current standard defines two variants of TCP NewReno: the Slow-but-Steady and Impatient. While the behavior of various TCP implementations has been extensively studied over the last years, little attention has been paid to performance analysis of different variants of TCP NewReno. In this paper, we first develop an analytical model of the Impatient variant, which being combined with the earlier proposed model of the Slow-but-Steady variant gives a comprehensive analytical model of TCP NewReno throughput. We then make an analytical comparison of the Impatient and Slow-but-Steady throughputs in the presence of correlated losses. We show that, although neither of the two variants is optimal, the Impatient variant provides the same throughput as the Slow-but-Steady one in a wide range of network conditions and significantly outperforms it in case of large windows and multiple packet drops. This could be of special interest for networks with large bandwidth and long delay.
Dunaytsev R., Koucheryavy Y., Harju J.
Computer Communications scimago Q1 wos Q1
2006-08-01 citations by CoLab: 10 Abstract  
This paper presents an analytical model of TCP Reno throughput as a function of loss event rate, average round trip time, average retransmission timeout value, and receiver window size based on the model proposed by Padhye et al. (widely known as the PFTK-model in correspondence with the initials of the authors). The presented model refines previous work by careful examination of fast retransmit/fast recovery dynamics in the presence of correlated losses and taking into consideration slow start phase after timeout. The accuracy of the proposed model is validated against simulation results and compared with those of the PFTK-model. Simulation results show that the model gives a more accurate estimation of TCP Reno throughput in the presence of correlated losses than the PFTK-model.
Dunaytsev R., Koucheryavy Y., Harju J.
2005-01-01 citations by CoLab: 2 PDF Abstract  
This paper presents a simple and accurate analytical model of TCP Reno throughput as a function of loss rate, average round trip time and receiver window size based on PFTK-model. The presented model refines previous work by careful examination of fast retransmit/fast recovery dynamics in the presence of correlated losses and taking into consideration slow start phase after timeout. The accuracy of the proposed model is validated against simulation results and compared with those of PFTK-model. Simulation results show that our model gives a more accurate estimation of TCP Reno throughput in the presence of correlated losses than PFTK-model.
Agarwal N., Varvello M., Aucinas A., Bustamante F., Netravali R.
2020-11-23 citations by CoLab: 3 Abstract   Cites 1
The last three decades have seen much evolution in web and network protocols: amongst them, a transition from HTTP/1.1 to HTTP/2 and a shift from loss-based to delay-based TCP congestion control algorithms. This paper argues that these two trends come at odds with one another, ultimately hurting web performance. Using a controlled synthetic study, we show how delay-based congestion control protocols (e.g., BBR and CUBIC + Hybrid Slow Start) result in the underestimation of the available congestion window in mobile networks, and how that dramatically hampers the effectiveness of HTTP/2. To quantify the impact of such finding in the current web, we evolve the web performance toolbox in two ways. First, we develop Igor, a client-side TCP congestion control detection tool that can differentiate between loss-based and delay-based algorithms by focusing on their behavior during slow start. Second, we develop a Chromium patch which allows fine-grained control on the HTTP version to be used per domain. Using these new web performance tools, we analyze over 300 real websites and find that 67% of sites relying solely on delay-based congestion control algorithms have better performance with HTTP/1.1.
Pokhrel S.R., Choi J.
2020-08-01 citations by CoLab: 349 Abstract   Cites 1
We propose an autonomous blockchain-based federated learning (BFL) design for privacy-aware and efficient vehicular communication networking, where local on-vehicle machine learning (oVML) model updates are exchanged and verified in a distributed fashion. BFL enables oVML without any centralized training data or coordination by utilizing the consensus mechanism of the blockchain. Relying on a renewal reward approach, we develop a mathematical framework that features the controllable network and BFL parameters (e.g., the retransmission limit, block size, block arrival rate, and the frame sizes) so as to capture their impact on the system-level performance. More importantly, our rigorous analysis of oVML system dynamics quantifies the end-to-end delay with BFL, which provides important insights into deriving optimal block arrival rate by considering communication and consensus delays. We present a variety of numerical and simulation results highlighting various non-trivial findings and insights for adaptive BFL design. In particular, based on analytical results, we minimize the system delay by exploiting the channel dynamics and demonstrate that the proposed idea of tuning the block arrival rate is provably online and capable of driving the system dynamics to the desired operating point. It also identifies the improved dependency on other blockchain parameters for a given set of channel conditions, retransmission limits, and frame sizes. 1 However, a number of challenges (gaps in knowledge) need to be resolved in order to realise these changes. In particular, we identify key bottleneck challenges requiring further investigations, and provide potential future research directions. 1 An early version of this work has been accepted for presentation in IEEE WCNC Wksps 2020 [1].
Saedi T., El-Ocla H.
2020-05-18 citations by CoLab: 3 Abstract   Cites 1
Wireless communication is more prone to random loss than wired communication because of noise and mobility. Over years researchers have developed TCP variants that do not decrease the send window when random loss arises. Years ago it was introduced TCP CERL algorithm that proved to present a high performance compared to other protocols. Here, we test CERL assuming two-way transmission of relatively heavy load and compare with TCP BIC, TCP NewReno, TCP Westwood+, TCP NewJersey and TCP Illinois. Simulation Results show that TCP CERL gains a 145%, 137%, 120%, 97% and 125% throughput improvement over New Reno, Bic, Westwood+, New Jersey and Illinois, respectively.
Cao Y., Nejati J., Balasubramanian A., Gandhi A.
2019-10-21 citations by CoLab: 5 Abstract   Cites 2
Given the growing significance of network performance, it is crucial to examine how to make the most of available network options and protocols. We propose ECON, a model that predicts performance of applications under different protocols and network conditions to scalably make better network choices. ECON is built on an analytical framework to predict TCP performance, and uses the TCP model as a building block for predicting application performance. ECON infers a relationship between loss and congestion using empirical data that drives an online model to predict TCP performance. ECON then builds on the TCP model to predict latency and HTTP performance. Across four wired and one wireless network, our model outperforms seven alternative TCP models. We demonstrate how ECON (i) can be used by a Web server application to choose between HTTP/1.1 and HTTP/2 for a given Web page and network condition, and (ii) can be used by a video application to choose the optimal bitrate that maximizes video quality without rebuffering.
Bacco M., De Cola T., Giambene G., Gotta A.
2019-04-01 citations by CoLab: 23 Abstract   Cites 1
Provisioning of Internet of Things/machine-to-machine (M2M) services over satellite has been experiencing a continuous growth in the last few years, which is expected to further increase in the near future so as to meet the demands of users and enterprises. The design of a suitable network architecture is, hence, of paramount importance to properly take into account the requirements imposed by the technology available nowadays and to properly consider the interaction of the so-defined physical layer with transport and application layers. In this light, this paper analyzes the use case of TCP-based M2M services operating over DVB-RCS2 satellite links, where a contention resolution diversity slotted ALOHA access scheme is applied. The main goal of this paper is to provide a thorough understanding of the interactions of TCP and random access schemes, recognized as key elements to enable efficient M2M services over satellite. In this regard, this paper also develops a novel TCP throughput model, which has been validated through extensive simulation campaigns, proving the value of the proposed theoretical framework and its applicability to study the performance of M2M services in more general satellite scenarios.
Li Y., Jie D.
2017-10-01 citations by CoLab: 0 Abstract   Cites 1
LT codes have excellent average performance in capacity-achievability. It is difficult to ensure the LT codes always have stable excellent performance. This paper proposes an ideal model to make a more comprehensive description for rateless codes. A novel coding scheme based on efficiency-fairness principles is proposed to improve the stability which is mainly determined by the minimum variable-node degree. The coding scheme is composed of two stages. The first stage mainly considers efficiency, which aims to reduce redundant information, increase the number of recovered packets and improve the order recovery performance as much as possible. The second stage focuses on fairness, which aims to balance the variable-node degree. The simulation results show that the scheme has higher minimum variable-node degree and significant improvement in performance of code rate, order and uniformity recovery compared with existing schemes.
Khan S., Qadir M.A.
IEEE Access scimago Q1 wos Q2 Open Access
2017-05-15 citations by CoLab: 2 Abstract   Cites 1
The increase in the availability of multimode devices for ubiquitous network access and the need for larger bandwidth have created a thrust for the utilization of simultaneous network connections. Unfortunately, the standard transport layer protocols such as the transmission control protocol and user datagram protocol have structural constraints. As a result, an Internet application can use only one interface at a time. The stream control transmission protocol (SCTP) provides support for concurrent multipath transfer (SCTP-CMT). In this paper, we present the mathematical modeling of simultaneous multipath transmission (SMT) schemes using the deterministic time Markov chain (DTMC) model. In this DTMC model, receiver buffer size is used for the first time to estimate the sending data rate. The DTMC model of SMT schemes are compared with the SCTP-CMT using probability-based packet dropped scenarios. DTMC modeling is used to mathematically verify simulation results of SMT Schemes i.e., modified fast retransmit (SMT-MFR) and adaptive modified fast retransmit (SMT-AMFR). The analytical model results revealed that SMT-MFR outperformed SCTP-CMT by 8.54% gain in average throughput. SMT-AMFR outperformed the SCTP-CMT and SMT-MFR by 19.65% and 11.15% gain in average throughput, respectively.
Pokhrel S.R., Panda M., Vu H.L., Mandjes M.
2016-05-01 citations by CoLab: 39 Abstract   Cites 1
We propose an analytical model for a Wi-Fi network acting as a last-mile Internet access with multiple long-lived TCP connections on both the up and down links. Our model considers the joint impact of buffer losses at the access point, contention at the medium access control layer, and packet losses due to the wireless channel being erroneous. We show that the model accurately quantifies the probability of an arbitrary TCP packet being discarded, and the total throughput obtained on the up and down links. Furthermore, quantitative insights can be gained into the throughput that long-lived TCP flows achieve under the joint impact of all aforementioned types of losses. In particular, we find that the wireless channel errors and buffer overflows both lead to throughput unfairness, but that they do so in the opposite direction on the up and down links, respectively. We demonstrate that this insight can be exploited so as to significantly mitigate the throughput unfairness without compromising the total obtainable network throughput.
Liu Q., Xu K., Wang H., Xu L.
2015-11-02 citations by CoLab: 5 Abstract   Cites 1
Multi-Path Transmission Control Protocol (MPTCP) is emerging as a dominant paradigm that enables users to utilize multiple Network Interface Controllers (NICs) simultaneously. Due to the complexity of its protocol design, the steady-state performance of MPTCP still remains largely unclear through model analysis. This introduces severe challenges to quantitatively study the efficiency, fairness and stability of existing MPTCP implementations. In this paper, we for the first time investigate the modeling of coupled congestion control and flow control algorithms in MPTCP. By proposing a closed-form throughput model, we reveal the relationship between MPTCP throughput and subflow characters, such as Round Trip Time (RTT), packet loss rate and receive buffer size. The extensive NS2-based evaluation indicates that the proposed model can be applied to understand the throughput of MPTCP in various situations. In particular, when MPTCP subflows have similar RTTs, the average Error Rate (ER) of the proposed model is less than 8%. Even in the situation where huge RTT difference exists between subflows, the model can still behave well with average ER less than 10%.
Dalal P., Sarkar M., Kothari N., Dasgupta K.
2015-09-15 citations by CoLab: 2 Abstract   Cites 1
Summary Network utilization by legacy transmission control protocol (TCP) is determined by its round trip time (RTT) dependent mechanism for the growth of its sending rate. The RTT does not always reflect the actual network conditions, especially in the case of wireless local area network (WLAN). Consequently, it influences the RTT-dependent mechanism falsely. This paper proposes a novel cross-layer scheme between TCP and the Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) that compensates for any diminished growth of TCP's sending rate because of the inclusion of non-congestion delay component in RTT, if any. The proposed scheme has two refinements. The first refinement is at the MAC layer that notifies the additional propagation delay on account of link retransmission of a TCP packet. The second refinement is at the TCP layer in which the sender adapts the sending rate by relating the aforementioned additional propagation delay to the RTT estimation. To examine the benefits, the proposed scheme is evaluated after implementing it on top of representative TCP variants; Newreno and Westwood+ (TCPW). Simulation results showed that with the proposed scheme, network utilization by native TCP is improved by more than 35% in a dedicated WLAN environment, while the performance remained protected in a shared WLAN environment. Copyright © 2015 John Wiley & Sons, Ltd.
Koucheryavy A., Vladyko A., Kirichek R.
2015-08-12 citations by CoLab: 56 Abstract   Cites 2
The article deals with theoretical and practical directions of Public Flying Ubiquitous Sensor Networks (FUSN-P) research. Considered the distinctive features of this type of networks from the existing ones. A wide range of issues is covered: from the methods of calculation FUSN to the new types of testing and model network structure for such networks. Presented a model network for full-scale experiment and solutions for the Internet of Things.
Panda M., Vu H.L., Mandjes M., Pokhrel S.R.
2015-08-01 citations by CoLab: 18 Abstract   Cites 1
TCP NewReno is one of the most widely deployed TCP versions in today's Internet. However, a full understanding of the complex inter-dependencies between the losses due to wireless channel errors and those due to buffer overflows, and their (joint) impact on TCP NewReno's congestion control algorithm in wireless and wired-cum-wireless networks is still lacking. In this paper, we develop a comprehensive analytical model for, and study the performance of, TCP NewReno with a cellular last-mile access, taking into account both types of losses. We assume a frame-level Markovian loss model, and build a model that features the system's basic controllable parameters (such as the number of retransmissions and the buffer size), so as to study how they (jointly) affect the TCP-level throughput. We model certain finer aspects, e.g., correlations in wireless and buffer losses and their cross-correlation. We provide a summary of numerical results highlighting several non-trivial findings. In particular, we demonstrate that there exist optimal (i.e., TCP throughput maximizing) pairs of the number of retransmissions and the buffer size.
Komarov M.
2015-07-01 citations by CoLab: 0 Abstract   Cites 2
Big data is a term used to describe data sets so large and/or complex that traditional data processing algorithms and applications are inadequate. There are numerous challenges when handling these data including analysis, capture, search, sharing, storage, transfer, visualization and privacy. A significant portion of big data is expected to be generated by special types of networks -- wireless sensor systems. In this paper we first introduce the concept of big data and then proceed describing the current state-of-the-art in potential sources of big that may appear in the coming future including electromagnetic THz and bacterial micro- and nanoscale networks. We summarize the recent progress in these systems highlighting the problems that should be solved to make them realistic and contribute to the large big data picture.
A. Ateya A., Ali Alhussan A., A. Abdallah H., A. Al duailij M., Khakimov A., Muthanna A.
2023-01-01 citations by CoLab: 7 Abstract  
Next-generation cellular networks are expected to provide users with innovative gigabits and terabits per second speeds and achieve ultra-high reliability, availability, and ultra-low latency. The requirements of such networks are the main challenges that can be handled using a range of recent technologies, including multi-access edge computing (MEC), artificial intelligence (AI), millimeter-wave communications (mmWave), and software-defined networking. Many aspects and design challenges associated with the MEC-based 5G/6G networks should be solved to ensure the required quality of service (QoS). This article considers developing a complex MEC structure for fifth and sixth-generation (5G/6G) cellular networks. Furthermore, we propose a seamless migration technique for complex edge computing structures. The developed migration scheme enables services to adapt to the required load on the radio channels. The proposed algorithm is analyzed for various use cases, and a test bench has been developed to emulate the operator’s infrastructure. The obtained results are introduced and discussed.
Ateya A.A., Soliman N.F., Alkanhel R., Alhussan A.A., Muthanna A., Koucheryavy A.
2022-11-23 citations by CoLab: 9 Abstract  
Internet of Things (IoT) is one of the promising technologies, announced as one of the primary use cases of the fifth-generation cellular systems (5G). It has many applications that cover many fields, moving from indoor applications, e.g., smart homes, smart metering, and healthcare applications, to outdoor applications, including smart agriculture, smart city, and surveillance applications. This produces massive heterogeneous traffic that loads the IoT network and other integrated communication networks, e.g., 5G, which represents a significant challenge in designing IoT networks; especially, with dense deployment scenarios. To this end, this work considers developing a novel artificial intelligence (AI)-based framework for predicting traffic over IoT networks with dense deployment. This facilitates traffic management and avoids network congestion. The developed AI algorithm is a deep learning model based on the convolutional neural network, which is a lightweight algorithm to be implemented by a distributed edge computing node, e.g., a fog node, with limited computing capabilities. The considered IoT model deploys distributed edge computing to enable dense deployment, increase network availability, reliability, and energy efficiency, and reduce communication latency. The developed framework has been evaluated, and the results are introduced to validate the proposed prediction model.
КУЧЕРЯВЫЙ А.Е., МАТЮХИН А.Ю., ФАМ В.Д., ГОРБАЧЕВА Л.С.
2022-03-15 citations by CoLab: 2 Abstract  
Приведены результаты экспериментальных исследований по предоставлению услуг телеприсутствия на модельной сети. Исследования проводились с помощью многофункционального робота-манипулятора Dobot Magician при предоставлении через модельную сеть услуг по перемещению грузов и рисованию окружностей. Проведено имитирование различных условий по затуханию, задержкам, расстояниям, на которых оказывались услуги, и битовым ошибкам. Сделаны выводы о единообразии требований к сетевым параметрам при оказании разных услуг одним и тем же многофункциональным роботом-манипулятором и о целесообразности уточнения рекомендаций МСЭ-Тв части величины задержки на 1 км. The paper discusses the results of the experimental investigation on the provision of telepresence services on a model network. The investigation was carried out using the Dobot Magician multifunctional robotic arm, which provided services for moving loads and drawing circles through a model network. Various conditions for attenuation, delays, distances at which services were provided, and bit errors were simulated. Conclusions were drawn about the uniformity of requirements for network parameters when providing various services by the same multifunctional robotic arm and about the advisability of clarifying the ITU-T recommendations in terms of the delay per kilometer.
АНВАРЖОНОВ Б.Н., ПАНЬКОВ Б.О., ГОРБАЧЕВА Л.С., МАРОЧКИНА А.В., ФАМ В.Д., ЗАХАРОВ М.В., ВОРОЖЕЙКИНА О.И., ВЛАДИМИРОВ С.С., ДУНАЙЦЕВ Р.А., МАТЮХИН А.Ю., МУТХАННА А.С., ВЫБОРНОВА А.И., ПАРАМОНОВ А.И., МАКОЛКИНА М.А., КУЧЕРЯВЫЙ А.Е.
2022-02-03 citations by CoLab: 2 Abstract  
Рассматриваются архитектура и характеристики модельной сети нового поколения, предназначенной для исследований, обучения и тестирования в области услуг телеприсутствия. Для построения модельной сети используются: терабитное ядро, разнообразное серверное оборудование, голографические вентиляторы, 3й-камеры и проекторы, роботы-аватары и многофункциональные роботы, терминальные устройства дополненной реальности, а также интернет вещей для создания моделей сверхплотных сетей. Приводятся первые результаты испытаний, на основе которых в дальнейшем могут быть разработаны требования к параметрам качества обслуживания и восприятия при предоставлении услуг телеприсутствия. The paper presents the architecture and characteristics of a new generation model network designed for research, training, and testing in the field of telepresence services. To build a model network, the following are used: a terabit core, a variety of server equipment, holographic fans, 3D cameras and projectors, avatar robots and multifunctional robots, augmented reality terminal devices, as well as the Internet of Things equipment to create models of superdense networks. The first test results are presented, on the basis of which requirements for the parameters of quality of service and perception in the provision of telepresence services can be developed in the future.
Maier M.
2021-10-20 citations by CoLab: 6 Abstract  
This paper highlights some of the 6G driving trends and reports on early findings, starting from an optical fiber networks perspective all the way to human-avatar/robot collectives and extended reality in the 6G post-smartphone era.
Taleb T., Nadir Z., Flinck H., Song J.
2021-06-28 citations by CoLab: 28 Abstract  
This article provides an overview on extremely interactive and low-latency immersive services as well as the relevant industry and standardization activities. Immersive services immerse a viewer or the viewed digital objects into an environment that is either real, virtual, or a mixture of both. The applications are accordingly named virtual reality, augmented reality, extended reality, and holography applications. These applications benefit from the ongoing advances in user interfaces, computing technologies, and networking technologies. Such applications are expected to generate most of the traffic in the next generation networks, particularly 6G networks. In this article, the main relevant use cases are introduced along with their respective requirements. The article also provides insights on the relevant architectures and solutions, and highlights some research challenges and directions.
Al-Ansi A., Al-Ansi A.M., Muthanna A., Elgendy I.A., Koucheryavy A.
Future Internet scimago Q2 wos Q2 Open Access
2021-04-30 citations by CoLab: 91 PDF Abstract  
Intelligence Edge Computing (IEC) is the key enabler of emerging 5G technologies networks and beyond. IEC is considered to be a promising backbone of future services and wireless communication systems in 5G integration. In addition, IEC enables various use cases and applications, including autonomous vehicles, augmented and virtual reality, big data analytic, and other customer-oriented services. Moreover, it is one of the 5G technologies that most enhanced market drivers in different fields such as customer service, healthcare, education methods, IoT in agriculture and energy sustainability. However, 5G technological improvements face many challenges such as traffic volume, privacy, security, digitization capabilities, and required latency. Therefore, 6G is considered to be promising technology for the future. To this end, compared to other surveys, this paper provides a comprehensive survey and an inclusive overview of Intelligence Edge Computing (IEC) technologies in 6G focusing on main up-to-date characteristics, challenges, potential use cases and market drivers. Furthermore, we summarize research efforts on IEC in 5G from 2014 to 2021, in which the integration of IEC and 5G technologies are highlighted. Finally, open research challenges and new future directions in IEC with 6G networks will be discussed.
Paramonov A., Chistova N., Makolkina M., Koucheryavy A.
2020-12-22 citations by CoLab: 3 Abstract  
The paper presents the results of an analysis of the impact of requirements on the quality of service and traffic on the structure of the telecommunication networks of the fifth and beyond generations. Given the crucial role of the network in building an effective digital economy, the concept of a digital cluster is introduced. A model is proposed that allows you to choose the size of a digital cluster, taking into account the requirements for the quality of service of subscriber traffic and the distribution of users on the territory. The proposed model allows you to create a network structure of digital clusters, taking into account various requirements and user traffic. A method for the location of service delivery points is also proposed, using the proposed model to select the sizes of digital clusters. The results can be used in modeling and planning telecommunication networks of the fifth and beyond generations.
Clemm A., Vega M.T., Ravuri H.K., Wauters T., Turck F.D.
IEEE Communications Magazine scimago Q1 wos Q1
2020-01-27 citations by CoLab: 132 Abstract  
With significant advances in holographic display technology, a plethora of interactive applications, such as tele-conferencing and tele-surgery, are well on their way to integrating holographic technologies. However, hologram-based applications will place significant demands on networking infrastructure, which are not supported today. These include support for ultra-low delays, high bandwidth, and the ability to coordinate, synchronize, and dynamically adapt multiple data streams. This article articulates these challenges and points out gaps in existing networks that solutions must address. In addition, it provides an experimental analysis of novel network architectures that address one of these challenges, namely the ability to dynamically set up new flows with very low latency incurred by the first packet.
Artem V., Ateya A.A., Muthanna A., Koucheryavy A.
2019-09-11 citations by CoLab: 10 Abstract  
With the dramatic increase in the number of connected devices, the traffic generated by these devices puts high constraints on the design of fifth generation cellular systems (5G) and future networks. Furthermore, other requirements such as the mobility, reliability, scalability and quality of service (QoS) should be considered as well, while designing such networks. To achieve the announced requirements of the 5G systems and overcome the high traffic density problems, new technologies, such as the mobile edge computing (MEC) and software defined networking (SDN), and novel schemes, such as artificial intelligence (AI) algorithms and offloading algorithms, should be introduced. One main issue with the 5G networks is the heterogeneous traffic, since there are enormous number of applications and sub-networks. The main design challenge with the 5G network traffic is the recognition and classification of heterogeneous massive traffic, which cannot be performed by the current traditional methods. Instead, new reliable methods based on AI should be introduced. To this end, this work considers the problem of traffic recognition, controlling and management; mainly for ultra-dense 5G networks. In this paper, a novel AI algorithm is developed to detect and recognize the heterogeneous traffic at the core network. The algorithm is implemented at the control plane of the SDN network, located at the core network. The algorithm is based on the neural network. The system is simulated over a reliable environment for various considered cases and results are indicated.
Popovski P., Stefanovic C., Nielsen J.J., de Carvalho E., Angjelichinoski M., Trillingsgaard K.F., Bana A.
2019-08-01 citations by CoLab: 346 Abstract  
The future connectivity landscape, and notably, the 5G wireless systems will feature Ultra-Reliable Low Latency Communication (URLLC). The coupling of high reliability and low latency requirements in URLLC use cases makes the wireless access design very challenging, in terms of both the protocol design and of the associated transmission techniques. This paper aims to provide a broad perspective on the fundamental tradeoffs in URLLC, as well as the principles used in building access protocols. Two specific technologies are considered in the context of URLLC: massive MIMO and multi-connectivity, also termed interface diversity. This paper also touches on the importance of the proper statistical methodology for designing and assessing extremely high-reliability levels.
Cao C., Preda M., Zaharia T.
2019-07-26 citations by CoLab: 121 Abstract  
In recent years, 3D point clouds have enjoyed a great popularity for representing both static and dynamic 3D objects. When compared to 3D meshes, they offer the advantage of providing a simpler, denser and more close-to-reality representation. However, point clouds always carry a huge amount of data. For a typical example of a point cloud with 0.7 million points per 3D frame at 30 fps, the point cloud raw video needs a bandwidth around 500MB/s. Thus, efficient compression methods are mandatory for ensuring the storage/transmission of such data, which include both geometry and attribute information. In the last years, the issue of 3D point cloud compression (3D-PCC) has emerged as a new field of research. In addition, an ISO/MPEG standardization process on 3D-PCC is currently on-going. In this paper, a comprehensive overview of the 3D-PCC state-of-the-art methods is proposed. Different families of approaches are identified, described in details and summarized, including 1D traversal compression, 2D-oriented techniques, which take leverage of existing 2D image/video compression technologies and finally purely 3D approaches, based on a direct analysis of the 3D data.
Ashraf Ateya A.A., Muthanna A., Kirichek R., Hammoudeh M., Koucheryavy A.
IEEE Access scimago Q1 wos Q2 Open Access
2019-03-25 citations by CoLab: 57 Abstract  
One of the most promising use cases of 5G/IMT2020 is the unmanned aerial vehicle (UAV). Due to their small size, the UAVs are resource constraint devices. To this end, this paper proposes an offloading algorithm for UAVs to assist in the execution of computationally intensive tasks. The proposed algorithm provides two UAV offloading methods. The first offloading method is the air-offloading, where a UAV can offload its computing tasks to nearby UAVs that have available computing and energy resources. The second offloading method is the ground-offloading, which enables the offloading of tasks to an edge cloud server from the multi-level edge cloud units connected to ground stations. The proposed algorithm is energy- and latency-aware, i.e., it selects the execution device and the offloading method based on the latency and energy constraints. The intensive algorithm simulation over reliable conditions for various scenarios with different cases for each scenario is conducted and results are presented.
Yastrebova A., Kirichek R., Koucheryavy Y., Borodin A., Koucheryavy A.
2018-11-01 citations by CoLab: 99 Abstract  
New technologies are approaching with big footsteps. In the decades ahead it is expected significant changes in technologies regarding to new types of devices, system and functions that they perform. We are expecting new services with various requirements, and new applications such as holographic telepresence, instant data transmission, remote surgery, minimized IoT terminals, autonomous transportation system, etc. Wide adaptation of new applications depends on how good they are supported by the network infrastructure. That is why the estimation of next generation network architecture is required. By the year 2030 the applications of new technologies are expected to generate an enormous amount of traffic. The architecture of the future networks must consider all the gaps of already existing networks in order to ensure the highest robustness, extremely low latency, Ubiquitous coverage as new applications and services require.
Makolkina M., Pham V.D., Kirichek R., Gogol A., Koucheryavy A.
2018-09-28 citations by CoLab: 12 Abstract  
Currently, the active development of all industries occurs within the framework of the “Industry 4.0” concept. One of the key applications of this concept is the implementation of the Industrial Internet of things (IIoT) and applications that will help to reduce the labor costs and costs of enterprises. Among such applications, undoubtedly, we can highlight Internet of things (IoT) and Augmented Reality (AR). The article discusses the interaction of applications of augmented reality with the Internet of things using the example of visualization of plant data collected by sensors and stored in a cloud service. A laboratory testbed is developed to measure the delay in the delivery of data from the cloud platform to the Augmented Reality application. The mechanism for uploading data to the local cloud is used to optimize the quality parameters. It helps to reduce the delay by introducing a new architecture for implementing IoT/AR applications.
Total publications
11
Total citations
66
Citations per publication
6
Average publications per year
0.55
Average coauthors
3
Publications years
2005-2024 (20 years)
h-index
5
i10-index
3
m-index
0.25
o-index
9
g-index
8
w-index
1
Metrics description

Top-100

Fields of science

1
2
3
Computer Networks and Communications, 3, 27.27%
Electrical and Electronic Engineering, 2, 18.18%
Information Systems, 1, 9.09%
1
2
3

Citing journals

5
10
15
20
25
30
Journal not defined, 29, 43.94%
5
10
15
20
25
30

Publishers

1
2
3
4
5
6
1
2
3
4
5
6

Organizations from articles

1
2
3
4
5
6
Organization not defined, 3, 25%
1
2
3
4
5
6

Countries from articles

1
2
3
4
5
6
Finland, 6, 50%
Country not defined, 3, 25%
Russia, 2, 16.67%
France, 1, 8.33%
1
2
3
4
5
6

Citing organizations

5
10
15
20
25
30
Organization not defined, 30, 44.12%
Show all (1 more)
5
10
15
20
25
30

Citing countries

2
4
6
8
10
12
14
Finland, 13, 17.81%
Country not defined, 11, 15.07%
Russia, 6, 8.22%
USA, 6, 8.22%
India, 5, 6.85%
China, 4, 5.48%
Australia, 3, 4.11%
Germany, 2, 2.74%
France, 2, 2.74%
Jordan, 2, 2.74%
Canada, 2, 2.74%
Netherlands, 2, 2.74%
Oman, 2, 2.74%
Brazil, 1, 1.37%
Greece, 1, 1.37%
Egypt, 1, 1.37%
Iran, 1, 1.37%
Spain, 1, 1.37%
Italy, 1, 1.37%
Qatar, 1, 1.37%
Malaysia, 1, 1.37%
UAE, 1, 1.37%
Pakistan, 1, 1.37%
Republic of Korea, 1, 1.37%
Sweden, 1, 1.37%
Japan, 1, 1.37%
2
4
6
8
10
12
14
  • We do not take into account publications without a DOI.
  • Statistics recalculated daily.
This section displays the profiles of scientists registered on the platform. To display the full list, invite your colleagues to register.
Position
Associate professor
Employment type
Full time
Years
2013 — present
Company/Organization
Position
Research associate
Employment type
Full time
Years
2011 — 2013
Company/Organization
Position
Research associate
Employment type
Full time
Years
2010 — 2011
Company/Organization
Position
Researcher
Employment type
Part time
Years
2003 — 2010
Company/Organization
Position
Engineer
Employment type
Full time
Years
1999 — 2003