Real-time performance analysis of non-saturated and non-slotted Ethernet based on a two-dimensional collision state model
Ronggang BAI, Jiqiang XIA, Qingfeng MAN
Real-time performance analysis of non-saturated and non-slotted Ethernet based on a two-dimensional collision state model
This paper proposes a new method to analyze Ethernet performance. Currently, most studies on Ethernet performance assume that the channel is divided into time slots, or the network load is saturated with little attention to a non-slotted channel and the non-saturation status. However, this situation is more consistent with the practical application of Ethernet. This paper first calculates the original collision probability and the retransmission collision probability in the original load, then obtains the retransmission load of the network based on those two collision probabilities, and finally acquires the actual load of the network by an iterative method. In addition, the accuracy of the analysis is checked against simulation results.
BEB / Ethernet networks / MAC / performance analysis / collision probability / two-dimensional collision state model
[1] |
Metcalfe R M, Boggs D R. Ethernet: distributed packet switching for local computer networks. Communications of the ACM, 1976, 19(7): 395―404
CrossRef
Google scholar
|
[2] |
IEEE Standard 802.3, Carrier sense multiple access with collision detection (CSMA/CD) access method and physical layer specifications, 2008
|
[3] |
IEEE Standard 802.11, Wireless LAN medium access control (MAC) and physical layer (PHY) specifications, 1999
|
[4] |
Bianchi G, Performance analysis of the IEEE 802.11 distributed coordination function. IEEE Journal on Selected Areas in Communications, 2000, 18(3): 535―547
CrossRef
Google scholar
|
[5] |
Kwak B J, Song N O, Miller L E. Performance analysis of exponential backoff. IEEE/ACM Transactions on Networking, 2005, 13(2): 343―355
CrossRef
Google scholar
|
[6] |
Kleinrock L, Tobagi F A. Packet switching in radio channels Part Icarrier sense multiple-access modes and their throughput-delay characteristics. IEEE Transactions on Communications, 1975, 23(12): 1400―1416
CrossRef
Google scholar
|
[7] |
Aldous D J. Ultimate instability of exponential back-off protocol for acknowledgment-based transmission control of random access communication channels. IEEE Transactions on Information Theory, 1987, 33(2): 219―223
CrossRef
Google scholar
|
[8] |
Kelly F, Macphee I M. The number of packets transmitted by collision detect random access schemes. The Annals of Probability, 1987, 15(4): 1557―1568
CrossRef
Google scholar
|
[9] |
Goodman J, Greenberg A G, Madras N, March P. Stability of binary exponential backoff. Journal of the ACM, 1988, 35(3): 579―602
CrossRef
Google scholar
|
[10] |
Almes G T, Lazowska E D. The behavior of Ethernet-like computer communications networks. In: Proceedings of the 9th ACM Symposium on Operating Systems Principles. 1979: 66―81
CrossRef
Google scholar
|
[11] |
Lukyanenko A, Gurtov A. Performance analysis of general backoff protocals. Journal of Communications Software and Systems, 2008, 4(1): 13―21
|
[12] |
Wu H T, Peng Y, Long K P, Cheng S D, Ma J. Performance of reliable transport protocol over IEEE 802.11 wireless LAN: analysis and enhancement. In: Proceedings of IEEE INFOCOM. 2002, 2: 599―607
|
[13] |
Wong P K, Yin D J, Lee T T. Performance analysis of markov modulated 1-persistent CSMA/CA protocols with exponential backoff scheduling. Wireless Networks, 2011, 17(8): 1763―1774
CrossRef
Google scholar
|
[14] |
Wong P K, Yin D J, Lee T T. Analysis of non-persistent CSMA protocols with exponential backoff scheduling. IEEE Transactions on Communications, 2011, 59(8): 2206―2214
CrossRef
Google scholar
|
[15] |
Ken D, David M, Douglas L. Modeling the 802.11 distributed coordination function in non-saturated conditions. IEEE Communications Letters, 2005, 9(8): 715―717
CrossRef
Google scholar
|
[16] |
Alizadeh-Shabdiz F, Subramaniam S. A finite load analytical model for the IEEE 802.11 distributed coordinated function MAC. In: Proceedings of Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks. 2003: 321―322
|
[17] |
Zhang X M, A New method for analyzing nonsaturated IEEE 802.11 DCF networks. IEEE Wireless Communications Letters, 2013, 2(2): 243―246
CrossRef
Google scholar
|
[18] |
Dong W X, Zhang W Y, Chen X H, Guo W. A new load equation for 802.11 MAC performance evaluation under non-saturated conditions. IEEE International Conference on Digital Object Communications in China, 2012: 428―432
CrossRef
Google scholar
|
[19] |
Nguyen S H, Vu H L, Andrew L L H. Performance analysis of IEEE 802.11 WLANs with saturated and unsaturated sources. IEEE Transactions on Vehicular Technology, 2012, 61(1): 333―345
CrossRef
Google scholar
|
[20] |
Zhao Q L, Tsang D H K, Sakurai H T. A simple and approximate model for nonsaturated IEEE 802.11 DCF. IEEE Transactions on Mobile Computing, 2009, 8(11): 1539―1553
CrossRef
Google scholar
|
[21] |
Garg V. Wireless Communications and Networking. Burlington: Morgan Kaufmann, 2007: 179
|
[22] |
Nghia D T. Modelling 802.11 Networks for Multimedia Applications. Sydney: School of Electrical Engineering and Telecommunications The University of New South Wales, 2008: 21
|
[23] |
Schneider S, Pardo-Castellote G, Hamilton M. Can Ethernet be real time? Real-Time Innovations, 2006, 406: 1―10
|
/
〈 | 〉 |