Abstract
This paper proposes a new method to analyze Ethernet performance. Currently, most studies on Ethernet performance assume that the channel is divided into time slots, or the network load is saturated with little attention to a non-slotted channel and the non-saturation status. However, this situation is more consistent with the practical application of Ethernet. This paper first calculates the original collision probability and the retransmission collision probability in the original load, then obtains the retransmission load of the network based on those two collision probabilities, and finally acquires the actual load of the network by an iterative method. In addition, the accuracy of the analysis is checked against simulation results.
Similar content being viewed by others
References
Metcalfe R M, Boggs D R. Boggs, Ethernet: distributed packet switching for local computer networks. Communications of the ACM, 1976, 19(7): 395–404
IEEE Standard 802.3, Carrier sense multiple access with collision detection (CSMA/CD) access method and physical layer specifications, 2008
IEEE Standard 802.11, Wireless LAN medium access control (MAC) and physical layer (PHY) specifications, 1999
Bianchi G, Performance analysis of the IEEE 802.11 distributed coordination function. IEEE Journal on Selected Areas in Communications, 2000, 18(3): 535–547
Kwak B J, Song N O, Miller L E. Performance analysis of exponential backoff. IEEE/ACM Transactions on Networking, 2005, 13(2): 343–355
Kleinrock L, Tobagi F A. Packet switching in radio channels Part Icarrier sense multiple-access modes and their throughput-delay characteristics. IEEE Transactions on Communications, 1975, 23(12): 1400–1416
Aldous D J. Ultimate instability of exponential back-off protocol for acknowledgment-based transmission control of random access communication channels. IEEE Transactions on Information Theory, 1987, 33(2): 219–223
Kelly F, Macphee I M. The number of packets transmitted by collision detect random access schemes. The Annals of Probability, 1987, 15(4): 1557–1568
Goodman J, Greenberg A G, Madras N, March P. Stability of binary exponential backoff. Journal of the ACM, 1988, 35(3): 579–602
Almes G T, Lazowska E D. The behavior of Ethernet-like computer communications networks. In: Proceedings of the 9th ACM Symposium on Operating Systems Principles. 1979: 66–81
Lukyanenko A, Gurtov A. Performance analysis of general backoff protocals. Journal of Communications Software and Systems, 2008, 4(1): 13–21
Wu H T, Peng Y, Long K P, Cheng S D, Ma J. Performance of reliable transport protocol over IEEE 802.11 wireless LAN: analysis and enhancement. In: Proceedings of IEEE INFOCOM 2002, 2: 599–607
Wong P K, Yin D J, Lee T T. Performance analysis of markov modulated 1-persistent CSMA/CA protocols with exponential backoff scheduling. Wireless Networks, 2011, 17(8): 1763–1774
Wong P K, Yin D J, Lee T T. Analysis of non-persistent CSMA protocols with exponential backoff scheduling. IEEE Transactions on Communications, 2011, 59(8): 2206–2214
Ken D, David M, Douglas L. Modeling the 802.11 distributed coordination function in non-saturated conditions. IEEE Communications Letters, 2005, 9(8): 715–717
Alizadeh-Shabdiz F, Subramaniam S. A finite load analytical model for the IEEE 802.11 distributed coordinated function MAC. In: Proceedings of Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks. 2003: 321–322
Zhang X M, A New method for analyzing nonsaturated IEEE 802.11 DCF networks. IEEE Wireless Communications Letters, 2013, 2(2): 243–246
Dong W X, Zhang W Y, Chen X H, Guo W. A new load equation for 02.11 MAC performance evaluation under non-saturated conditions. IEEE International Conference on Digital Object Communications in China, 2012: 428–432
Nguyen S H, Vu H L, Andrew L L H. Performance analysis of IEEE 802.11 WLANs with saturated and unsaturated sources. IEEE Transactions on Vehicular Technology, 2012, 61(1): 333–345
Zhao Q L, Tsang D H K, Sakurai H T. A simple and approximate model for nonsaturated IEEE 802.11 DCF. IEEE Transactions on Mobile Computing, 2009, 8(11): 1539–1553
Garg V. Wireless Communications and Networking. Burlington: Morgan Kaufmann, 2007: 179
Nghia D T. Modelling 802.11 Networks for Multimedia Applications. Sydney: School of Electrical Engineering and Telecommunications The University of New South Wales, 2008: 21
Schneider S, Pardo-Castellote G, Hamilton M. Can Ethernet be real time? Real-Time Innovations, 2006, 406: 1–10
Author information
Authors and Affiliations
Corresponding author
Additional information
Ronggang Bai received his BS in electronic information engineering from the University of Science and Technology of China, in 2004. He received his PhD in communication and information systems from the same university in 2009. From 2010 to 2013, he worked as a postdoctor at Beihang University, China. Since 2013, he has been working as a lecturer in the School of Information Science and Technology at Beijing Forestry University, China. His research interests include wireless sensor networks, MAC protocols, and embedded systems.
Jiqiang Xia received his BE and PhD in mechanical manufacturing from the Harbin Institute of Technology, China in 1992 and 1997, respectively. From 1997 to 1999, he worked as a postdoctor at Beihang University, China. Since 1999, he has been with the School of Mechanical Engineering and Automation at Beihang University, where he is now an associate professor. His research interests include industrial communication, intelligent instruments, and embedded systems.
Qingfeng Man received his BE and MS in mechanical and electronic engineering from Beihang University, China in 1981 and 1992, respectively. Since 1981, he has been with the School of Mechanical Engineering and Automation at Beihang University, where he is now a Professor. His research interests include industrial control systems, field bus, and embedded systems.
Rights and permissions
About this article
Cite this article
Bai, R., Xia, J. & Man, Q. Real-time performance analysis of non-saturated and non-slotted Ethernet based on a two-dimensional collision state model. Front. Comput. Sci. 9, 788–805 (2015). https://doi.org/10.1007/s11704-015-3306-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11704-015-3306-z