How to Fix Exponential Backoff

نویسندگان

  • Michael A. Bender
  • Jeremy T. Fineman
  • Seth Gilbert
  • Maxwell Young
چکیده

Randomized exponential backoff is a widely deployed technique for coordinating access to a shared resource. A good backoff protocol should, arguably, satisfy three natural properties: (i) it should provide constant throughput, wasting as little time as possible; (ii) it should require few failed access attempts, minimizing the amount of wasted effort; and (iii) it should be robust, continuing to work efficiently even if some of the access attempts fail for spurious reasons. Unfortunately, exponential backoff has some well-known limitations in two of these areas: it provides poor (sub-constant) throughput (in the worst case), and is not robust (to resource acquisition failures). The goal of this paper is to “fix” exponential backoff by making it scalable, particularly focusing on the case where processes arrive in an on-line, worst-case fashion. We present a relatively simple backoff protocol RE-BACKOFF that has, at its heart, a version of exponential backoff. It guarantees expected constant throughput with dynamic process arrivals and requires only an expected polylogarithmic number of access attempts per process. RE-BACKOFF is also robust to periods where the shared resource is unavailable for a period of time. If it is unavailable for D time slots, RE-BACKOFF provides the following guarantees. When the number of packets is a finite n, the average expected number of access attempts for successfully sending a packet is O(log(n+D)). In the infinite case, the average expected number of access attempts for successfully sending a packet is O(log(η) + log(D)) where η is the maximum number of processes that are ever in the system concurrently. This research was supported in part by NSF grants CCF 1114809, CCF 1217708, CCF 1218188, IIS 1247726, IIS 1251137, CNS 1408695, CCF 1439084, CNS-1318294, and CCF-1420911. ar X iv :1 40 2. 52 07 v4 [ cs .D C ] 1 2 Ju l 2 01 5

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

How to Scale Exponential Backoff: Constant Throughput, Polylog Access Attempts, and Robustness

Randomized exponential backoff is a widely deployed technique for coordinating access to a shared resource. A good backoff protocol should, arguably, satisfy three natural properties: (i) it should provide constant throughput, wasting as little time as possible; (ii) it should require few failed access attempts, minimizing the amount of wasted effort; and (iii) it should be robust, continuing t...

متن کامل

Effect of exponential backoff scheme and retransmission cutoff on the stability of frequency-hopping slotted ALOHA systems

The combinatorial effect of an exponential backoff scheme and retransmission cutoff on the stability of frequencyhopping slotted ALOHA systems with finite population is investigated in terms of the catastrophe theory. In the systems, the packet retransmission probabilities are geometrically distributed with respect to the number of experienced unsuccessful transmissions and a packet will be dis...

متن کامل

A History-Based Backoff Algorithm for Mobile Ad Hoc Networks

the standard IEEE 802.11 Medium Access Control protocol uses the Binary Exponential Backoff algorithm. The Binary Exponential Backoff makes exponential increments to contention window sizes. This work has studied the effect of choosing a combination between linear, exponential and logarithmic increments to contention windows. Results have shown that choosing the right increment based on network...

متن کامل

A Comparative Study of the Traditional Model of Ieee 802.15.4 and Non-overlapping Binary Exponential Backoff Ieee 802.15.4

This paper introduces a performance model of a recently proposed backoff technique named Nonoverlapping binary exponential backoff algorithm over IEEE 802.15.4, which is designed for LRWPAN. To reduce the collision rate in highly populated wireless networks, non-overlapping binary exponential backoff tries to evenly distribute the random backoff delay by distinguishing the new range of backoff ...

متن کامل

Adaptive Backoff Algorithm for Wireless Internet

The standard IEEE 802.11 MAC protocol uses the Binary Exponential Backoff algorithm. The Binary Exponential Backoff makes exponential increments to contention window sizes. This work has studied the effect of choosing a combination between linear, exponential and logarithmic increments to contention windows. Results have shown that choosing the right increment based on network status enhances t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014