Performance analysis of exponential backoff

New analytical results are given for the performance of the exponential backoff (EB) algorithm. Most available studies on EB focus on the stability of the algorithm and little attention has been paid to the performance analysis of EB. In this paper, we analyze EB and obtain saturation throughput and medium access delay of a packet for a given number of nodes N. The analysis considers the general case of EB with backoff factor r; binary exponential backoff (BEB) algorithm is the special case with r=2. We also derive the analytical performance of EB with maximum retry limit M (EB-M), a practical version of EB. The accuracy of the analysis is checked against simulation results.

[1]  Leslie Ann Goldberg,et al.  An Improved Stability Bound for Binary Exponential Backoff , 2001, Theory of Computing Systems.

[2]  Ieee Standards Board IEEE standards for local and metropolitan area networks : supplement to Carrier Sense Multiple Access with Collision Detection (CSMA/CD) access method and physical layer specifications : layer management (section 5) , 1991 .

[3]  Leslie Ann Goldberg,et al.  Binary Exponential Backoff Is Stable for High Arrival Rates , 2000, STACS.

[4]  Katsumi Sakakibara,et al.  The effect of limiting the number of retransmission trials on the stability of slotted ALOHA systems , 2000, IEEE Trans. Veh. Technol..

[5]  Leslie Ann Goldberg,et al.  Analysis of practical backoff protocols for contention resolution with multiple servers , 1996, SODA '96.

[6]  Jeffrey C. Mogul,et al.  Measured capacity of an Ethernet: myths and reality , 1988, CCRV.

[7]  Peter March,et al.  Stability of binary exponential backoff , 1988, JACM.

[8]  Frank Thomson Leighton,et al.  Analysis of backoff protocols for multiple access channels , 1987, STOC '87.

[9]  A. Girotra,et al.  Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .

[10]  K. K. Ramakrishnan,et al.  The Ethernet capture effect: analysis and solution , 1994, Proceedings of 19th Conference on Local Computer Networks.

[11]  Wha Sook Jeon,et al.  Performance of an exponential backoff scheme for slotted-ALOHA protocol in local wireless environment , 1995 .

[12]  Robert Metcalfe,et al.  Ethernet: distributed packet switching for local computer networks , 1988, CACM.

[13]  Frank Thomson Leighton,et al.  Analysis of Backoff Protocols for Multiple Access Channels , 1996, SIAM J. Comput..

[14]  Y.-C. Jenq On the Stability of Slotted ALOHA Systems , 1980, IEEE Trans. Commun..

[15]  David J. Aldous Ultimate instability of exponential back-off protocol for acknowledgment-based transmission control of random access communication channels , 1987, IEEE Trans. Inf. Theory.

[16]  Haitao Wu,et al.  Performance of reliable transport protocol over IEEE 802.11 wireless LAN: analysis and enhancement , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[17]  I. MacPhee,et al.  The Number of Packets Transmitted by Collision Detect Random Access Schemes , 1987 .

[18]  John F. Shoch,et al.  Measured performance of an Ethernet local network , 1980, CACM.

[19]  A. M. Abdullah,et al.  Wireless lan medium access control (mac) and physical layer (phy) specifications , 1997 .