Real-time performance analysis of non-saturated and non-slotted Ethernet based on a two-dimensional collision state model

Ronggang BAI, Jiqiang XIA, Qingfeng MAN

PDF(1249 KB)
PDF(1249 KB)
Front. Comput. Sci. ›› 2015, Vol. 9 ›› Issue (5) : 788-805. DOI: 10.1007/s11704-015-3306-z
RESEARCH ARTICLE

Real-time performance analysis of non-saturated and non-slotted Ethernet based on a two-dimensional collision state model

Author information +
History +

Abstract

This paper proposes a new method to analyze Ethernet performance. Currently, most studies on Ethernet performance assume that the channel is divided into time slots, or the network load is saturated with little attention to a non-slotted channel and the non-saturation status. However, this situation is more consistent with the practical application of Ethernet. This paper first calculates the original collision probability and the retransmission collision probability in the original load, then obtains the retransmission load of the network based on those two collision probabilities, and finally acquires the actual load of the network by an iterative method. In addition, the accuracy of the analysis is checked against simulation results.

Keywords

BEB / Ethernet networks / MAC / performance analysis / collision probability / two-dimensional collision state model

Cite this article

Download citation ▾
Ronggang BAI, Jiqiang XIA, Qingfeng MAN. Real-time performance analysis of non-saturated and non-slotted Ethernet based on a two-dimensional collision state model. Front. Comput. Sci., 2015, 9(5): 788‒805 https://doi.org/10.1007/s11704-015-3306-z

References

[1]
Metcalfe R M, Boggs D R. Ethernet: distributed packet switching for local computer networks. Communications of the ACM, 1976, 19(7): 395―404
CrossRef Google scholar
[2]
IEEE Standard 802.3, Carrier sense multiple access with collision detection (CSMA/CD) access method and physical layer specifications, 2008
[3]
IEEE Standard 802.11, Wireless LAN medium access control (MAC) and physical layer (PHY) specifications, 1999
[4]
Bianchi G, Performance analysis of the IEEE 802.11 distributed coordination function. IEEE Journal on Selected Areas in Communications, 2000, 18(3): 535―547
CrossRef Google scholar
[5]
Kwak B J, Song N O, Miller L E. Performance analysis of exponential backoff. IEEE/ACM Transactions on Networking, 2005, 13(2): 343―355
CrossRef Google scholar
[6]
Kleinrock L, Tobagi F A. Packet switching in radio channels Part Icarrier sense multiple-access modes and their throughput-delay characteristics. IEEE Transactions on Communications, 1975, 23(12): 1400―1416
CrossRef Google scholar
[7]
Aldous D J. Ultimate instability of exponential back-off protocol for acknowledgment-based transmission control of random access communication channels. IEEE Transactions on Information Theory, 1987, 33(2): 219―223
CrossRef Google scholar
[8]
Kelly F, Macphee I M. The number of packets transmitted by collision detect random access schemes. The Annals of Probability, 1987, 15(4): 1557―1568
CrossRef Google scholar
[9]
Goodman J, Greenberg A G, Madras N, March P. Stability of binary exponential backoff. Journal of the ACM, 1988, 35(3): 579―602
CrossRef Google scholar
[10]
Almes G T, Lazowska E D. The behavior of Ethernet-like computer communications networks. In: Proceedings of the 9th ACM Symposium on Operating Systems Principles. 1979: 66―81
CrossRef Google scholar
[11]
Lukyanenko A, Gurtov A. Performance analysis of general backoff protocals. Journal of Communications Software and Systems, 2008, 4(1): 13―21
[12]
Wu H T, Peng Y, Long K P, Cheng S D, Ma J. Performance of reliable transport protocol over IEEE 802.11 wireless LAN: analysis and enhancement. In: Proceedings of IEEE INFOCOM. 2002, 2: 599―607
[13]
Wong P K, Yin D J, Lee T T. Performance analysis of markov modulated 1-persistent CSMA/CA protocols with exponential backoff scheduling. Wireless Networks, 2011, 17(8): 1763―1774
CrossRef Google scholar
[14]
Wong P K, Yin D J, Lee T T. Analysis of non-persistent CSMA protocols with exponential backoff scheduling. IEEE Transactions on Communications, 2011, 59(8): 2206―2214
CrossRef Google scholar
[15]
Ken D, David M, Douglas L. Modeling the 802.11 distributed coordination function in non-saturated conditions. IEEE Communications Letters, 2005, 9(8): 715―717
CrossRef Google scholar
[16]
Alizadeh-Shabdiz F, Subramaniam S. A finite load analytical model for the IEEE 802.11 distributed coordinated function MAC. In: Proceedings of Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks. 2003: 321―322
[17]
Zhang X M, A New method for analyzing nonsaturated IEEE 802.11 DCF networks. IEEE Wireless Communications Letters, 2013, 2(2): 243―246
CrossRef Google scholar
[18]
Dong W X, Zhang W Y, Chen X H, Guo W. A new load equation for 802.11 MAC performance evaluation under non-saturated conditions. IEEE International Conference on Digital Object Communications in China, 2012: 428―432
CrossRef Google scholar
[19]
Nguyen S H, Vu H L, Andrew L L H. Performance analysis of IEEE 802.11 WLANs with saturated and unsaturated sources. IEEE Transactions on Vehicular Technology, 2012, 61(1): 333―345
CrossRef Google scholar
[20]
Zhao Q L, Tsang D H K, Sakurai H T. A simple and approximate model for nonsaturated IEEE 802.11 DCF. IEEE Transactions on Mobile Computing, 2009, 8(11): 1539―1553
CrossRef Google scholar
[21]
Garg V. Wireless Communications and Networking. Burlington: Morgan Kaufmann, 2007: 179
[22]
Nghia D T. Modelling 802.11 Networks for Multimedia Applications. Sydney: School of Electrical Engineering and Telecommunications The University of New South Wales, 2008: 21
[23]
Schneider S, Pardo-Castellote G, Hamilton M. Can Ethernet be real time? Real-Time Innovations, 2006, 406: 1―10

RIGHTS & PERMISSIONS

2014 Higher Education Press and Springer-Verlag Berlin Heidelberg
AI Summary AI Mindmap
PDF(1249 KB)

Accesses

Citations

Detail

Sections
Recommended

/