2003
DOI: 10.6028/jres.108.027
|View full text |Cite
|
Sign up to set email alerts
|

On the stability of exponential backoff

Abstract: Random access schemes for packet networks featuring distributed control require algorithms and protocols for resolving packet collisions that occur as the uncoordinated terminals contend for the channel. A widely used collision resolution protocol is the exponential backoff (EB). New analytical results for the stability of the (binary) EB are given. Previous studies on the stability of the (binary) EB have produced contradictory results instead of a consensus: some proved instability, others showed stability u… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

6
18
0

Year Published

2009
2009
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 43 publications
(24 citation statements)
references
References 15 publications
6
18
0
Order By: Relevance
“…Most of what we know about WLAN is based on the conventional collision model, where packet collisions occur when two or more stations transmit at the same time [1], [2]. With advanced PHY-layer signal processing techniques, it is possible for an access point (AP) to detect multiple concurrently transmitted packets through, for example, multiuser detection (MUD) techniques [3], [4].…”
Section: A Motivation and Contributionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Most of what we know about WLAN is based on the conventional collision model, where packet collisions occur when two or more stations transmit at the same time [1], [2]. With advanced PHY-layer signal processing techniques, it is possible for an access point (AP) to detect multiple concurrently transmitted packets through, for example, multiuser detection (MUD) techniques [3], [4].…”
Section: A Motivation and Contributionsmentioning
confidence: 99%
“…A station transmits an RTS packet when its backoff timer reaches zero. Previous work in [1], [2], [5] has shown that the backoff process yields an equivalent transmission probability τ at which a station transmits in a generic (randomly chosen) time slot. When the number of stations, K, is large, it is reasonable to assume that the number of transmissions in a generic time slot follows a Poisson distribution with parameter λ = Kτ [5].…”
Section: B Multi-round Contention In Ieee 80211 Wlanmentioning
confidence: 99%
“…Infinitely-many user model is known to highlight the limiting performance metrics of the algorithm, whereas finitely-many user model provides insight to the practical applicability of the algorithm. Finally, the operation of the BEB algorithm in the saturation conditions, where every network user always has pending data packets, was investigated by means of Markov models in [5] and [6].…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore as the embedded epoch happens at least by α time earlier as the end of the contention-based transmission opportunities the above delay part is upper bounded by α(K − 1) + (i − 1)τ . Taking this term into account in the scheduling packet delay, expressing the sum of the reservation and the scheduling packet delays by applying Little's formula and using (6) results in the upper bound on overall packet delay in the considered wireless broadband network as:…”
mentioning
confidence: 99%
See 1 more Smart Citation