skip to main content
article

Performance analysis of exponential backoff

Published: 01 April 2005 Publication History

Abstract

New analytical results are given for the performance of the exponential backoff (EB) algorithm. Most available studies on EB focus on the stability of the algorithm and little attention has been paid to the performance analysis of EB. In this paper, we analyze EB and obtain saturation throughput and medium access delay of a packet for a given number of nodes N. The analysis considers the general case of EB with backoff factor r; binary exponential backoff (BEB) algorithm is the special case with r = 2. We also derive the analytical performance of EB with maximum retry limit M(EB-M), a practical version of EB. The accuracy of the analysis is checked against simulation results.

References

[1]
{1} R. M. Metcalfe and D. R. Boggs, "Ethernet: distributed packet switching for local computer networks," Commun. ACM, vol. 19, no. 7, pp. 395-404, Jul. 1976.]]
[2]
{2} P802.11, IEEE Standard for Wireless Lan Medium Access Control (MAC) and Physical Layer (PHY) Specifications, Nov. 1997.]]
[3]
{3} D. J. Aldous, "Ultimate instability of exponential back-off protocol for acknowledgment-based transmission control of random access communication channels," IEEE Trans. Inform. Theory, vol. 33, no. 2, pp. 219-223, Mar. 1987.]]
[4]
{4} J. Goodman, A. G. Greenberg, N. Madras, and P. March, "Stability of binary exponential backoff," J. ACM, vol. 35, no. 3, pp. 579-602, 1988.]]
[5]
{5} J. R. Shoch and J. A. Hupp, "Measured performance of an ethernet local network," Commun. ACM, vol. 23, no. 12, pp. 711-721, Dec. 1980.]]
[6]
{6} J. Håstad, T. Leighton, and B. Rogoff, "Analysis of backoff protocols for multiple access channels," SIAM J. Comput., vol. 25, no. 4, pp. 740-744, 1996.]]
[7]
{7} D. R. Boggs, J. C. Mogul, and C. A. Kent, "Measured capacity of an ethernet: myths and reality," in Proc. ACM Symp. Commun. Architecture and Protocols (SIGCOMM 88), 1988, pp. 222-234.]]
[8]
{8} K. K. Ramakrishnan and H. Yang, "The ethernet capture effect: analysis and solution," in Proc. 19th Conf. Local Computer Networks, 1994, pp. 228-240.]]
[9]
{9} D. G. Jeong and W. S. Jeon, "Performance of an exponential backoff scheme for slotted-ALOHA protocol in local wireless environment," IEEE Trans. Veh. Technol., vol. 44, no. 3, pp. 470-479, Aug. 1995.]]
[10]
{10} K. Sakakibara, H. Muta, and Y. Yuba, "The effect of limiting the number of retransmission trials on the stability of slotted ALOHA systems," IEEE Trans. Veh. Technol., vol. 49, no. 4, pp. 1449-1453, Jul. 2000.]]
[11]
{11} K. Sakakibara, T. Seto, D. Yoshimura, and J. Yamakita, "On the stability of slotted ALOHA systems with exponential backoff and retransmission cutoff in slow-frequency-hopping channels," in Proc. 4th Int. Symp. Wireless Personal Multimedia Communications, Aalborg, Denmark, Sep. 2001.]]
[12]
{12} G. Bianchi, "Performance analysis of the IEEE 802.11 distributed coordination function," J. Select. Areas Commun., vol. 18, no. 3, pp. 535-547, Mar. 2000.]]
[13]
{13} F. P. Kelly and I. M. MacPhee, "The number of packets transmitted by collision detect random access schemes," Ann. Probabil., vol. 15, pp. 1557-1568, 1987.]]
[14]
{14} H. Al-Ammal, L. A. Goldberg, and P. MacKenzie, "Binary exponential backoff is stable for high arrival rates," in Proc. 17th Int. Symp. Theoretical Aspects of Computer Science, Lille, France, Feb. 2000.]]
[15]
{15} H. Al-Ammal, "An improved stability bound for binary exponential backoff," Theory Comput. Syst., vol. 30, pp. 229-244, 2001.]]
[16]
{16} L. A. Goldberg and P. D. MacKenzie, "Analysis of practical backoff protocols for contention resolution with multiple servers," J. Comput. Syst. Sci., vol. 58, no. 1, pp. 232-258, 1999.]]
[17]
{17} H. Wu, Y. Pang, K. Long, S. Cheng, and J. Ma, "Performance of reliable transport protocol over IEEE 802.11 wireless lan: analysis and enhancement," in Proc. IEEE INFOCOM, vol. 2, Jun. 2002, pp. 599-607.]]
[18]
{18} P802.3, Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Access Method and Physical Layer Specifications, Mar. 1991.]]

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image IEEE/ACM Transactions on Networking
IEEE/ACM Transactions on Networking  Volume 13, Issue 2
April 2005
238 pages

Publisher

IEEE Press

Publication History

Published: 01 April 2005
Published in TON Volume 13, Issue 2

Author Tags

  1. BEB
  2. backoff algorithm
  3. exponential backoff
  4. medium access delay
  5. performance analysis
  6. throughput

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)1
Reflects downloads up to 05 Feb 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media