Skip to main content
Log in

Real-time performance analysis of non-saturated and non-slotted Ethernet based on a two-dimensional collision state model

  • Research Article
  • Published:
Frontiers of Computer Science Aims and scope Submit manuscript

Abstract

This paper proposes a new method to analyze Ethernet performance. Currently, most studies on Ethernet performance assume that the channel is divided into time slots, or the network load is saturated with little attention to a non-slotted channel and the non-saturation status. However, this situation is more consistent with the practical application of Ethernet. This paper first calculates the original collision probability and the retransmission collision probability in the original load, then obtains the retransmission load of the network based on those two collision probabilities, and finally acquires the actual load of the network by an iterative method. In addition, the accuracy of the analysis is checked against simulation results.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Metcalfe R M, Boggs D R. Boggs, Ethernet: distributed packet switching for local computer networks. Communications of the ACM, 1976, 19(7): 395–404

    Article  Google Scholar 

  2. IEEE Standard 802.3, Carrier sense multiple access with collision detection (CSMA/CD) access method and physical layer specifications, 2008

    Google Scholar 

  3. IEEE Standard 802.11, Wireless LAN medium access control (MAC) and physical layer (PHY) specifications, 1999

    Google Scholar 

  4. Bianchi G, Performance analysis of the IEEE 802.11 distributed coordination function. IEEE Journal on Selected Areas in Communications, 2000, 18(3): 535–547

    Article  Google Scholar 

  5. Kwak B J, Song N O, Miller L E. Performance analysis of exponential backoff. IEEE/ACM Transactions on Networking, 2005, 13(2): 343–355

    Article  Google Scholar 

  6. Kleinrock L, Tobagi F A. Packet switching in radio channels Part Icarrier sense multiple-access modes and their throughput-delay characteristics. IEEE Transactions on Communications, 1975, 23(12): 1400–1416

    Article  MATH  Google Scholar 

  7. Aldous D J. Ultimate instability of exponential back-off protocol for acknowledgment-based transmission control of random access communication channels. IEEE Transactions on Information Theory, 1987, 33(2): 219–223

    Article  MATH  MathSciNet  Google Scholar 

  8. Kelly F, Macphee I M. The number of packets transmitted by collision detect random access schemes. The Annals of Probability, 1987, 15(4): 1557–1568

    Article  MATH  MathSciNet  Google Scholar 

  9. Goodman J, Greenberg A G, Madras N, March P. Stability of binary exponential backoff. Journal of the ACM, 1988, 35(3): 579–602

    Article  MathSciNet  Google Scholar 

  10. Almes G T, Lazowska E D. The behavior of Ethernet-like computer communications networks. In: Proceedings of the 9th ACM Symposium on Operating Systems Principles. 1979: 66–81

    Google Scholar 

  11. Lukyanenko A, Gurtov A. Performance analysis of general backoff protocals. Journal of Communications Software and Systems, 2008, 4(1): 13–21

    Google Scholar 

  12. Wu H T, Peng Y, Long K P, Cheng S D, Ma J. Performance of reliable transport protocol over IEEE 802.11 wireless LAN: analysis and enhancement. In: Proceedings of IEEE INFOCOM 2002, 2: 599–607

    Google Scholar 

  13. Wong P K, Yin D J, Lee T T. Performance analysis of markov modulated 1-persistent CSMA/CA protocols with exponential backoff scheduling. Wireless Networks, 2011, 17(8): 1763–1774

    Article  Google Scholar 

  14. Wong P K, Yin D J, Lee T T. Analysis of non-persistent CSMA protocols with exponential backoff scheduling. IEEE Transactions on Communications, 2011, 59(8): 2206–2214

    Article  Google Scholar 

  15. Ken D, David M, Douglas L. Modeling the 802.11 distributed coordination function in non-saturated conditions. IEEE Communications Letters, 2005, 9(8): 715–717

    Article  Google Scholar 

  16. Alizadeh-Shabdiz F, Subramaniam S. A finite load analytical model for the IEEE 802.11 distributed coordinated function MAC. In: Proceedings of Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks. 2003: 321–322

    Google Scholar 

  17. Zhang X M, A New method for analyzing nonsaturated IEEE 802.11 DCF networks. IEEE Wireless Communications Letters, 2013, 2(2): 243–246

    Article  Google Scholar 

  18. Dong W X, Zhang W Y, Chen X H, Guo W. A new load equation for 02.11 MAC performance evaluation under non-saturated conditions. IEEE International Conference on Digital Object Communications in China, 2012: 428–432

    Google Scholar 

  19. Nguyen S H, Vu H L, Andrew L L H. Performance analysis of IEEE 802.11 WLANs with saturated and unsaturated sources. IEEE Transactions on Vehicular Technology, 2012, 61(1): 333–345

    Article  Google Scholar 

  20. Zhao Q L, Tsang D H K, Sakurai H T. A simple and approximate model for nonsaturated IEEE 802.11 DCF. IEEE Transactions on Mobile Computing, 2009, 8(11): 1539–1553

    Article  Google Scholar 

  21. Garg V. Wireless Communications and Networking. Burlington: Morgan Kaufmann, 2007: 179

    Google Scholar 

  22. Nghia D T. Modelling 802.11 Networks for Multimedia Applications. Sydney: School of Electrical Engineering and Telecommunications The University of New South Wales, 2008: 21

    Google Scholar 

  23. Schneider S, Pardo-Castellote G, Hamilton M. Can Ethernet be real time? Real-Time Innovations, 2006, 406: 1–10

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ronggang Bai.

Additional information

Ronggang Bai received his BS in electronic information engineering from the University of Science and Technology of China, in 2004. He received his PhD in communication and information systems from the same university in 2009. From 2010 to 2013, he worked as a postdoctor at Beihang University, China. Since 2013, he has been working as a lecturer in the School of Information Science and Technology at Beijing Forestry University, China. His research interests include wireless sensor networks, MAC protocols, and embedded systems.

Jiqiang Xia received his BE and PhD in mechanical manufacturing from the Harbin Institute of Technology, China in 1992 and 1997, respectively. From 1997 to 1999, he worked as a postdoctor at Beihang University, China. Since 1999, he has been with the School of Mechanical Engineering and Automation at Beihang University, where he is now an associate professor. His research interests include industrial communication, intelligent instruments, and embedded systems.

Qingfeng Man received his BE and MS in mechanical and electronic engineering from Beihang University, China in 1981 and 1992, respectively. Since 1981, he has been with the School of Mechanical Engineering and Automation at Beihang University, where he is now a Professor. His research interests include industrial control systems, field bus, and embedded systems.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bai, R., Xia, J. & Man, Q. Real-time performance analysis of non-saturated and non-slotted Ethernet based on a two-dimensional collision state model. Front. Comput. Sci. 9, 788–805 (2015). https://doi.org/10.1007/s11704-015-3306-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11704-015-3306-z

Keywords

Navigation