Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Performance analysis of general backoff protocols

View through CrossRef
In this paper, we analyze backoff protocols, such as the one used in Ethernet. We examine a general backoff function(GBF) rather than just the binary exponential backoff (BEB) used by Ethernet. Under some mild assumptions we find stability and optimality conditions for a wide class of backoff protocols with GBF. In particular, it is proved that the maximal throughput rate over the class of backoff protocols is a fixed function of the number of stations (N) and the optimal average service time is about Ne for large N. The reasons of the instability of the BEB protocol (for a big enough input rate) are explained. Additionally, the paper introduces novel procedure for analyzing bounded backoff protocols, which is useful for creating new protocols or improving existing, as no protocol can use unbounded counters.
Croatian Communications and Information Society
Title: Performance analysis of general backoff protocols
Description:
In this paper, we analyze backoff protocols, such as the one used in Ethernet.
We examine a general backoff function(GBF) rather than just the binary exponential backoff (BEB) used by Ethernet.
Under some mild assumptions we find stability and optimality conditions for a wide class of backoff protocols with GBF.
In particular, it is proved that the maximal throughput rate over the class of backoff protocols is a fixed function of the number of stations (N) and the optimal average service time is about Ne for large N.
The reasons of the instability of the BEB protocol (for a big enough input rate) are explained.
Additionally, the paper introduces novel procedure for analyzing bounded backoff protocols, which is useful for creating new protocols or improving existing, as no protocol can use unbounded counters.

Related Results

Optimizing IETF multimedia signaling protocols and architectures in 3GPP networks : an evolutionary approach
Optimizing IETF multimedia signaling protocols and architectures in 3GPP networks : an evolutionary approach
Signaling in Next Generation IP-based networks heavily relies in the family of multimedia signaling protocols defined by IETF. Two of these signaling protocols are RTSP and SIP, wh...
Proportional Fairness for Long-Term Evolution-Licensed Assisted Access (LTE-LAA) with Wi-Fi Coexistence in Unlicensed Spectrum
Proportional Fairness for Long-Term Evolution-Licensed Assisted Access (LTE-LAA) with Wi-Fi Coexistence in Unlicensed Spectrum
Long-Term Evaluation-Licensed Assisted Access (LTE-LAA) has good potential for fair coexistence with Wi-Fi in an unlicensed spectrum. Though the LTE-LAA utilizes the same listen be...
Impact of imperfections on correlation-based quantum information protocols
Impact of imperfections on correlation-based quantum information protocols
Quantum information science is a rapidly evolving field both from the theoretical and the experimental viewpoint, motivated by the fact that protocols exploiting quantum resources ...
Congestion Control in CoAP Observe Group Communication
Congestion Control in CoAP Observe Group Communication
The Constrained Application Protocol (CoAP) is a simple and lightweight machine-to-machine (M2M) protocol for constrained devices for use in lossy networks which offers a small mem...
A Review of Cluster Based Energy Efficient Routing Protocols for Wireless Sensor Networks
A Review of Cluster Based Energy Efficient Routing Protocols for Wireless Sensor Networks
In recent times wireless sensor networks have grown extremely and become increasingly striking in big variety of applications due to their low cost, low power, small in size, self-...
Platform-Agnostic CellNet (PACNet) enables cross-study meta-analysis of cell fate engineering protocols
Platform-Agnostic CellNet (PACNet) enables cross-study meta-analysis of cell fate engineering protocols
SummaryThe optimization of cell fate engineering protocols requires evaluating their fidelity, efficiency, or both. We previously adopted CellNet, a computational tool to quantitat...
Image reconstruction parameters and the standardized uptake value ratios in brain amyloid PET
Image reconstruction parameters and the standardized uptake value ratios in brain amyloid PET
Objectives The present study investigated various image reconstruction protocols for amyloid PET using phantom test criteria published by the Japanese Society of Nuclea...

Back to Top