Furthermore, we adopt a discrete 2-dimensional Markov chain model to analyze the MPAB algorithm performance, and show its performance advantage over the Binary Exponential Backoff
(BEB) algorithm through extensive simulations.
With r = 2, this procedure is called binary exponential backoff
Stability of Binary Exponential Backoff
Jonathan Goodman, Albert G.
Modifications to these schemes were then proposed, such as using acknowledgment, using Request-for-Request-to-Send packet by a busy RTS receiver after finishing its transaction, employing waiting intervals other than the backoff time providing priority levels for wireless channel access as used in the IEEE802.11  distributed coordination function, and using variations in backoff time computation method such as binary exponential backoff
, multiplicative increase and linear decrease, balanced backoff algorithm, and waiting time based backoff.
It employs a combination of the carrier sense multiple access with collision avoidance (CSMA/CA) and the binary exponential backoff
(BEB) to resolve channel contentions among competing flows.
At the end of this waiting period, the station adds another waiting period by invoking the BEB (Binary Exponential Backoff
) procedure if it is not already invoked.
The probability [tau] can subsequently be derived using the default contention resolution algorithm, i.e., binary exponential backoff
The backoff states group describes the binary exponential backoff
If the buffer is empty, the following time is virtually slotted, once a new packet arrives during a virtual slot time the binary exponential backoff
process will be activated at the end of the virtual slot time, otherwise the station will keep in the state (-1,0) and wait for the next virtual slot time.