This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
The Expected (Not Worst-Case) Throughput of the Ethernet Protocol
March 1991 (vol. 40 no. 3)
pp. 245-252

The Ethernet protocol is analyzed using a space-time model in which the occurrence of a collision is determined not only by frame arrival times but also by locations of nodes. The space-time model is described, and the expected throughput of the Ethernet protocol is derived assuming that frames arrive by a Poisson process. Numerical results show that the expected throughput can be significantly higher than earlier time-domain results when the spatial dimension a<0.01. This result is attributed to, among other factors, a significant reduction of the vulnerable area.

[1] S. S. Lam, "A carrier sense multiple access protocol for local networks,"Comput. Networks, North Holland, Feb. 1980.
[2] F. A. Tobagi and V. B. Hunt, "Performance analysis of carrier sense multiple access with collision detection,"Comput. Networks, North Holland, Feb. 1980.
[3] L. Kleinrock, "Channel efficiency for LANs," inLocal Area&Multiple Access Networks, R. L. Pickholtz, Ed. Rockville, MD: Computer Science Press, 1986.
[4] B. W. Stuck, "Calculating the maximum data rate in local area networks,"IEEE Comput. Mag., May 1983.
[5] W. Bux, "Local-area subnetworks: A performance comparison,"IEEE Trans. Commun., Oct. 1981.
[6] J. L. Hammond and P. J. P. O'Reilly,Performance Analysis of Local Computer Networks. Reading, MA: Addison-Wesley, 1986.
[7] N. Shacham and V. B. Hunt, "Performance evaluation of the CSMA/CD (1-persistent) channel-access protocol in common-channel local networks," inLocal Computer Networks. New York: North-Holland, 1982.
[8] M. L. Molle, K. Sohraby, and A. N. Venetsanopoulos, "Space-time models of asynchronous CSMA protocols for local area networks,"IEEE J. Select. Areas Commun., July 1987.
[9] K. Sohraby, M. L. Molle, and A. N. Venetsanopoulos, "Why analytical models of Ethernet-like local networks are so pessimistic," inProc. GLOBECOM, Nov. 1984.
[10] D. R. Boggs, J. C. Mogul, and C. A. Kent, "Measured capacity of an Ethernet; Myths and reality," inProc. ACM Data Commun. Symp., Stanford, CA, Aug. 1988.
[11] T. A. Gonsalves and F. A. Tobagi, "On the performance effects of station locations and access protocol parameters in Ethernet networks,"IEEE Trans. Commun., Apr. 1988.
[12] J. S. Meditch and C.-T. A. Lea, "Stability and optimization of the CSMA and CSMA/CD channels,"IEEE Trans. Commun., June 1983.
[13] S. C. A. Thomopoulos, "A simple and versatile decentralized control for slotted ALOHA, reservation ALOHA, and local area networks,"IEEE Trans. Commun., June 1988.
[14] M. Gerla and L. Kleinrock, "Closed loop stability controls for S-ALOHA satellite communications," inProc. 5th Data Comm. Symp., Snowbird, UT, Sept. 1977.
[15] D. K. Choi, "Space-time analyses of asynchronous random access protocols," D.Sc. dissertation, Univ. of Lowell, 1989.
[16] H. Kobayashi,Modeling and Analysis. Reading, MA: Addison-Wesley, 1978.
[17] M. K. Molloy, "Comments on 'A note on the performance of ENET II',"IEEE J. Select. Areas Commun., Apr. 1989.

Index Terms:
collision occurrence, node location; LAN; Ethernet protocol; space-time model; frame arrival times; expected throughput; Poisson process; spatial dimension; vulnerable area; local area networks; performance evaluation; protocols; queueing theory.
Citation:
Dug-Kyoo Choi, B.G. Kim, "The Expected (Not Worst-Case) Throughput of the Ethernet Protocol," IEEE Transactions on Computers, vol. 40, no. 3, pp. 245-252, March 1991, doi:10.1109/12.76401
Usage of this product signifies your acceptance of the Terms of Use.