Papers by flaminio borgonovo
5th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Wireless Networks - Catching the Mobile Future.
Abstract There is a rapidly growing demand for low-cost packet data services in GSM networks. The... more Abstract There is a rapidly growing demand for low-cost packet data services in GSM networks. Therefore, the ETSI is considering the possible introduction of a general packet radio service (GPRS) in GSM. We propose an enhancement of a GPRS proposal which improves the utilization of the radio resource. In particular, we consider a random access technique, that is very close to the PRMA, and allows mobile stations to share all data traffic channels available in the cell. In this context, the performance of typical data applications, ...
Proceedings of the 6th IEEE Workshop on Local and Metropolitan Area Networks
5th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Wireless Networks - Catching the Mobile Future.
Abstract The paper presents a new cellular architecture for radio access, CDPA, that can be appli... more Abstract The paper presents a new cellular architecture for radio access, CDPA, that can be applied to present and future cellular systems, independently of the cell size. It poses as an appealing alternative to systems based on classical bandwidth-subdivision methods, namely TDMA, FDMA or CDMA. In these systems, parallelism of communications is achieved by subdividing the bandwidth “a priori” among cells. In CDPA no bandwidth subdivision is operated. All cells and terminals use a single frequency channel and ...
Journal of Communications Software and Systems, 2016
In this paper a new analysis is presented that allowsto investigate the asymptotic behavior of so... more In this paper a new analysis is presented that allowsto investigate the asymptotic behavior of some backlog estimation procedures for Dynamic Frame Aloha (DFA) in Radio Frequency Identification (RFID) environment. Although efficiency e-1 can theoretically be reached, none of the solution proposed in the literature has been shown to reach such value. Here we analyze first the Schoute’s backlog estimate, which is very attractive for its simplicity, and formally show that its asymptotic efficiency is 0:311 for any finite initial frame length. Since the analysis shows how the Schoute’s estimate impairment can be avoided, wefurther propose the Asymptotic Efficient Estimate (AE2), an improvement of the Schoute’s one, that exploits the Frame Restart property of the standard and that is proved to asymptotically reach efficiency e-1.
IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications, 2016
The stability and throughput of the Slotted Aloha protocol have been studied at length, yielding ... more The stability and throughput of the Slotted Aloha protocol have been studied at length, yielding results that depend on the environment and channel assumptions, in many cases indicating e-1 as the S-Aloha capacity. When users can detect only their own collisions, and the number of users N goes to infinity, no definite capacity result exists. Approximated models have been introduced to study the exponential back-off mechanism, which seem to indicate an asymptotic capacity of ln(2)/2 when binary back-off is used, and again e-1 when the exponential base is optimized. Here we introduce a more accurate and flexible model that shows that past results miss their mark. In fact, we prove that with binary back-off the capacity is practically 0.370, slightly greater than e-1; furthermore, and more important, we prove that using 1.35 as exponential back-off base, the capacity reaches 0.4303 with an infinite number of users, and up to 0.496 with N = 2 users.
Consideration is given to code-division-multiple-access systems which use binary codes of nonorth... more Consideration is given to code-division-multiple-access systems which use binary codes of nonorthogonal address and codes which involve mutual interference between the various links. It is shown that useful results can be obtained when error correcting codes are used in synchronous CDMA applications. In this case, the number of active users is much less than the number of passive users.
1999 IEEE 49th Vehicular Technology Conference (Cat. No.99CH36363)
The Kluwer International Series in Engineering and Computer Science, 1996
Lecture Notes in Computer Science, 2001
In this paper we describe a novel endpoint admission control mechanism for IP telephony: the PCP-... more In this paper we describe a novel endpoint admission control mechanism for IP telephony: the PCP-DV which is characterized by two fundamental features. First, it does not rely on any additional procedure in internal network routers other than the capability to apply different service priority to probing and data packets. Second, the triggering mechanism for the connection admission decision is based on the analysis of the delay variation statistics over the probing flow. Numerical results for an IP telephony traffic scenario prove that 99th ...
1999 IEEE International Conference on Communications (Cat. No. 99CH36311)
[Proceedings] 1992 International Zurich Seminar on Digital Communications@m_Intelligent Networks and Their Applications
The authors present a new access control scheme for dual bus networks which is absolutely fair in... more The authors present a new access control scheme for dual bus networks which is absolutely fair in bandwidth sharing and can replace the DQDB access protocol without changes in the transmission system apart from the protocol machine. The mechanism retains all the positive features of DQDB including simplicity, robustness, flexibility, 100% bandwidth utilization and zero access delay at very low
[Conference Record] GLOBECOM '92 - Communications for Global Users: IEEE
A two-level bandwidth negotiation algorithm used in fiber distributed data interface (FDDI) bridg... more A two-level bandwidth negotiation algorithm used in fiber distributed data interface (FDDI) bridges to obtain a dynamically adaptive bandwidth in the wide area backbone is analyzed and optimized. On the basis of a set of reasonable assumptions on the features of asynchronous transfer mode (ATM) networks, it is shown how cross-connection costs can be optimized if steady-state user behavior is
Proceedings IEEE International Conference on Communications ICC '95
A new method for achieving spectrum reuse in cellular systems, called capture-division packetized... more A new method for achieving spectrum reuse in cellular systems, called capture-division packetized access (CDPA), has been introduced by Borgonovo, Fratta and Zorzi (see Proc. of ICCC Wireless Computer Networks '94, The Hague, Netherlands, Sept. 1994). The method is based on packet switching and uses a single frequency in all cells. Mobiles belonging to the same cell transmit packets using
Proceedings of INFOCOM '94 Conference on Computer Communications
Deflection routing plays a prominent role in many optical network architectures, because it can b... more Deflection routing plays a prominent role in many optical network architectures, because it can be implemented with modest packet-buffering requirements. From the practical perspective, however, the implementation of deflection routing, which is normally based on global time slotting, might pose challenges. The authors develop approaches to the implementation of both slotted and unslotted deflection-routing optical networks. They analyse important tradeoffs
Lecture Notes in Computer Science, 1973
Uploads
Papers by flaminio borgonovo