[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article
Free access

Stability of binary exponential backoff

Published: 01 June 1988 Publication History

Abstract

Binary exponential backoff is a randomized protocol for regulating transmissions on a multiple-access broadcast channel. Ethernet, a local-area network, is built upon this protocol. The fundamental theoretical issue is stability: Does the backlog of packets awaiting transmission remain bounded in time, provided the rates of new packet arrivals are small enough? It is assumed n ≥ 2 stations share the channel, each having an infinite buffer where packets accumulate while the station attempts to transmit the first from the buffer. Here, it is established that binary exponential backoff is stable if the sum of the arrival rates is sufficiently small. Detailed results are obtained on which rates lead to stability when n = 2 stations share the channel. In passing, several other results are derived bearing on the efficiency of the conflict resolution process. Simulation results are reported that, in particular, indicate alternative retransmission protocols can significantly improve performance.

References

[1]
ALDOUS, D. Ultimate instability of exponential back-off protocol for acknowledgement-based transmission control of random access communication channels. IEEE Trans. Inf. Theory IT-33, 2 (Nov. 1987), 219-233.
[2]
CAPETANAKIS, J. I. Tree algorithms for packet broadcast channels. IEEE Trans. Inf. Theory IT-25, 5 (Sept. 1979), 505-515.
[3]
COTTRELL, M., FORT, J.-C., AND MALGOUYRES, G. Large deviations and rare events in the study of stochastic algorithms. IEEE Trans. Automatic Cont. AC-28, 9 (1983), 907-920.
[4]
FAYOLLE, G., GELEMBE, E., AND LABETOULLE, J. Stability and optimal control of a packet switching broadcast channel. J. ACM 24 (July 1977), 375-386.
[5]
FLAJOLET, P. Approximate counting: A detailed analysis. BIT 25 (1985), 113-134.
[6]
GALLAGER, R.G. A perspective on multiaccess channels. IEEE Trans. Inf. Theory IT-31, 2 (Mar. 1985), 124-142.
[7]
GOODMAN, J., GREENBERG, A., MADRAS, N., AND MARCH, P. On the stability of the Ethernet. In Proceedings of the 17th Annual A CM Symposium on Theory of Computing (Providence, R.I., May). ACM, New York, 1985, pp. 379-387.
[8]
GREENBERG, A. G., FLAJOLET, P., AND LADNER, R.E. Estimating the multiplicities of conflicts to speed their resolution in multiple access channels. J. ACM 34, 2 (Apr. 1987), 289-326.
[9]
HAJEK, B., AND VAN I.A:)ON, T. Decentralized dynamic control of a multiaccess broadcast channel. IEEE Trans. Automatic Cont. AC-27, 3 (June 1982), 559-569.
[10]
HASTAD, J., LEIGHTON, T., AND ROGOFF, B. Analysis of backoff protocols for multiple access channels. In Proceedings of the 19th Annual ACM Symposium on Theory of Computing (New York City, N.Y., May). ACM, New York, 1987, pp. 241-253.
[11]
HAYES, J. F. An adaptive technique for local distribution. IEEE Trans. Commun. COM-29, 6 (June 1978), 1178-1186.
[12]
KARLIN, S. h First Course in Stochastic Processes, 1st ed. Academic Press, Orlando, Fla., 1966.
[13]
KELLY, F.P. Stochastic models of computer communication systems. J. Roy. Stat. Soc., Ser. B 47, 3 (1985), 379-395.
[14]
KUMAR, e. R. S., AND MERAKOS, L. Distributed control of broadcast channels with acknowledgement feedback: Stability and performance. In Proceedings of the IEEE Control and Decision Conference (Las Vegas, Nev., Dec.). IEEE, New York, 1984.
[15]
LAM, S. A carrier sense multiple access protocol for local networks. Comput. Netw. 4 (Feb. 1980), 21-32.
[16]
MATHYS, P., AND FLAJOLET, P. Q-ary collision resolution algorithms in random-access systems with free or blocked channel access. IEEE Trans. Inf. Theory IT-31, 2 (March 1985), 217-243.
[17]
METCALFE, R. M., AND BOGGS, D.R. Ethernet: Distributed packet switching for local computer networks. Commun. ACM 19, 7 (July 1976), 395-404.
[18]
MIKHAILOV, V.A. Methods of random multiple access. Candidate English thesis. Moscow institute of Physics and Technology, Moscow, USSR, 1979.
[19]
RIVEST, R. L. Network control by Bayesian broadcast. Tech. Rep. TM-287, Laboratory for Computer Science, Massachusetts Institute of Technology, Cambridge, Mass., Sept. 1985.
[20]
ROSENKRANTZ, W. Approximate Counting: A martingale approach. Stochastics 27, 1987, 111-120.
[21]
ROSENKRANTZ, W. A., AND TOWSLEY, n. On the instability of the slotted ALOHA multiaccess algorithm. IEEE Trans. Automatic Cont. AC-28, 10 (1984), 994-996.
[22]
SHENKER, S. Some conjectures on the behavior of acknowledgment based transmission control of random access communication channels. In Proceedings of the Sigmetrics "87 Conference on Measurement and Modelling of Computer Systems (Banff, Alberta, Canada). ACM, New York, 1987.
[23]
SHOCH, J. R., AND HUPP, J.A. Measured performance of an Ethernet local network. Commun. ACM 23, 12 (Dec. 1980), 711-721.
[24]
SZPANKOWSKI, W., AND REGO, V. Instability conditions arising in analysis of some multiaccess protocols. Tech. Rep. CSD-TR-577. Purdue Univ., Lafayette, Ind., Feb. 1986.
[25]
TANNENBAUM, A.S. Computer Networks. Prentice Hall, Englewood Cliffs, N.J., 1981.
[26]
TSYBAKOV, B. S., AND MIKHAILOV, V.A. Free synchronous packet access in a broadcast channel with feedback. Probl. Inf. Transm. 14, 4 (April 1979), 259-280 (translated from Russian original in ProbL Peredachi Inf. 14, 4 (Oct.-Dec. 1978), 32-59).
[27]
TSYBAKOV, B. S., AND MIKHAILOV, V.A. Ergodicity of a slotted Aloha system. ProbL Inf. Transm. 15, 4 (April 1980) (translated from Russian original in ProbL Peredachi Inf. 15, 4 (Oct.-Dec. 1979), 72-87).
[28]
TSYBAKOV, B. S., AND VVENDENSKAYA, N.D. Random multiple-access stack algorithm. ProbL Inf. Transm. I6, 3 (Jan. 1982), 230-243 (translated from Russian original in Probl. Peredachi Inf. 16, 3 (July-Sept. 1980), 80-94).
[29]
WEISS, A., AND GREENBERG, A.G. An analysis of aloha systems via large deviations, preprint (June 1986).

Cited By

View all
  • (2024)Fully Energy-Efficient Randomized Backoff: Slow Feedback Loops Yield Fast Contention ResolutionProceedings of the 43rd ACM Symposium on Principles of Distributed Computing10.1145/3662158.3662807(231-242)Online publication date: 17-Jun-2024
  • (2024)K-Backup: Load- and TCAM-Aware Multi-Backup Fast Failure Recovery in SDNsIEEE/ACM Transactions on Networking10.1109/TNET.2024.338609132:4(3347-3360)Online publication date: Aug-2024
  • (2023)Dynamic task allocation approaches for coordinated exploration of Subterranean environmentsAutonomous Robots10.1007/s10514-023-10142-447:8(1559-1577)Online publication date: 1-Dec-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Journal of the ACM
Journal of the ACM  Volume 35, Issue 3
July 1988
280 pages
ISSN:0004-5411
EISSN:1557-735X
DOI:10.1145/44483
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 June 1988
Published in JACM Volume 35, Issue 3

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)164
  • Downloads (Last 6 weeks)25
Reflects downloads up to 14 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Fully Energy-Efficient Randomized Backoff: Slow Feedback Loops Yield Fast Contention ResolutionProceedings of the 43rd ACM Symposium on Principles of Distributed Computing10.1145/3662158.3662807(231-242)Online publication date: 17-Jun-2024
  • (2024)K-Backup: Load- and TCAM-Aware Multi-Backup Fast Failure Recovery in SDNsIEEE/ACM Transactions on Networking10.1109/TNET.2024.338609132:4(3347-3360)Online publication date: Aug-2024
  • (2023)Dynamic task allocation approaches for coordinated exploration of Subterranean environmentsAutonomous Robots10.1007/s10514-023-10142-447:8(1559-1577)Online publication date: 1-Dec-2023
  • (2023)Production-Run Noise DetectionPerformance Analysis of Parallel Applications for HPC10.1007/978-981-99-4366-1_8(199-224)Online publication date: 19-Jun-2023
  • (2022)VaproProceedings of the 27th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming10.1145/3503221.3508411(150-162)Online publication date: 2-Apr-2022
  • (2022)Robust and Optimal Contention Resolution without Collision DetectionProceedings of the 34th ACM Symposium on Parallelism in Algorithms and Architectures10.1145/3490148.3538592(107-118)Online publication date: 11-Jul-2022
  • (2022)Contention Resolution for Coded Radio NetworksProceedings of the 34th ACM Symposium on Parallelism in Algorithms and Architectures10.1145/3490148.3538573(119-130)Online publication date: 11-Jul-2022
  • (2022)Deep Reinforcement Learning for Random Access in Machine-Type Communication2022 IEEE Wireless Communications and Networking Conference (WCNC)10.1109/WCNC51071.2022.9771953(2553-2558)Online publication date: 10-Apr-2022
  • (2022)Detecting Performance Variance for Parallel Applications Without Source CodeIEEE Transactions on Parallel and Distributed Systems10.1109/TPDS.2022.318179933:12(4239-4255)Online publication date: 1-Dec-2022
  • (2022)A Theoretical Framework for Random Access: Stability Regions and Transmission ControlIEEE/ACM Transactions on Networking10.1109/TNET.2022.316445830:5(2173-2200)Online publication date: Oct-2022
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media