Implementation of CSMA/CA and ALOHA random-access protocols for packetizing wireless networks with model-based design

Authors

DOI:

https://doi.org/10.15587/1729-4061.2022.260092

Keywords:

ad-hoc networks, wireless LANs, Carrier Sense Multiple Access (CSMA), collision avoidance

Abstract

Because of the reliability of deployment, cost efficiency, and flexibility of ad-hoc wireless local networks (WLAN). These wireless networks have grown to be the everywhere connection solution in residential and public access networking protocols. It is important to know which strategy performs better with the least amount of delay. The Multiple Access Control protocols (MAC) that are relied on ALOHA, and Carrier Sense Multiple Access with collision avoidance (CSMA/CA) as random access techniques, have substantially aided the rapid growth of such wireless access networks. This work provides a model-based design approach for modeling CSMA/CA and ALOHA random-access protocols for packetizing wireless networks. We analyze the TX and Back-off waveforms of the PHY/MAC transceiver of three radio nodes under CSMA/CA and ALOHA operation modes and compare the obtained results of the PHY/MAC Transceiver for the network nodes according to these modes. Every node is within a range such that the communication between each couple of nodes can be interfered with and received data from the third node. The MAC layer and the logical link control function composed the data link layer. Since the same radio band is used for TX and RX, the MAC function employed here is CSMA/CA and ALOHA, which had also called a random back-off. The MAC layer sends a control signal to the TX block to transmit either a data frame or an acknowledgment frame. The frame contents are loaded in the look-up tables. The contents can be changed in the workspace. The output of this block is a complex baseband IQ signal. The obtained results show the effectiveness of CSMA/CA over ALOHA modes when comparing the corresponding Back-off waveforms and when calculating the throughput values of the three network nodes

Author Biographies

Baida'a Abdul Qader Khudor, University of Basrah

Department of Computer Science

College of Information Technology

Abdulmalik Adil Abdulzahra, University of Basrah

Department of Computer Science

College of Information Technology

Nagham Mumtaz Kudhair, University of Basrah

Master of Information Technology

Department of Computer Science

References

  1. Naveen Raj, R., Nayak, A., Kumar, M. S. (2019). A Survey and Performance Evaluation of Reinforcement Learning Based Spectrum Aware Routing in Cognitive Radio Ad Hoc Networks. International Journal of Wireless Information Networks, 27 (1), 144–163. doi: http://doi.org/10.1007/s10776-019-00463-6
  2. Abramson, N. (2009). The Alohanet – surfing for wireless data [History of Communications]. IEEE Communications Magazine, 47 (12), 21–25. doi: http://doi.org/10.1109/mcom.2009.5350363
  3. Shijer, S. S., Sabry, A. H. (2021). Analysis of performance parameters for wireless network using switching multiple access control method. Eastern-European Journal of Enterprise Technologies, 4 (9 (112)), 6–14. doi: http://doi.org/10.15587/1729-4061.2021.238457
  4. Beltramelli, L., Mahmood, A., Osterberg, P., Gidlund, M. (2021). LoRa Beyond ALOHA: An Investigation of Alternative Random Access Protocols. IEEE Transactions on Industrial Informatics, 17 (5), 3544–3554. doi: http://doi.org/10.1109/tii.2020.2977046
  5. Lim, J.-T., Han, Y. (2018). Spreading Factor Allocation for Massive Connectivity in LoRa Systems. IEEE Communications Letters, 22(4), 800–803. doi: http://doi.org/10.1109/lcomm.2018.2797274
  6. Clazzer, F., Kissling, C., Marchese, M. (2018). Enhancing Contention Resolution ALOHA Using Combining Techniques. IEEE Transactions on Communications, 66 (6), 2576–2587. doi: http://doi.org/10.1109/tcomm.2017.2759264
  7. Politis, A. C., Anastassiu, H. T. (2020). Performance Analysis of Resource Sharing During Downlink Multi-User Transmissions in CSMA/ECA Full Duplex WLANs. Transport and Telecommunication Journal, 21 (1), 61–68. doi: http://doi.org/10.2478/ttj-2020-0005
  8. Jiao, W., Sheng, M., Shi, Y., Li, Y. (2014). End-to-end delay estimation for multi-hop wireless networks with random access policy. Science China Information Sciences, 57 (6), 1–13. doi: http://doi.org/10.1007/s11432-014-5103-y
  9. Yun, F., Liu, B., Zou, L., Chen, C. W. (2017). Performance Analysis of IEEE 802.15.6 MAC Protocol in WBAN with Energy Harvesting Nodes. Proceedings of the 11th International Conference on Body Area Networks. doi: http://doi.org/10.4108/eai.15-12-2016.2267671
  10. Katila, C. J., Buratti, C., Abrignani, M. D., Verdone, R. (2017). Neighbors-Aware Proportional Fair scheduling for future wireless networks with mixed MAC protocols. EURASIP Journal on Wireless Communications and Networking, 2017 (1). doi: http://doi.org/10.1186/s13638-017-0875-6
  11. Kaynia, M., Jindal, N. (2008). Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks. 2008 IEEE International Conference on Communications, 1108–1112. doi: http://doi.org/10.1109/icc.2008.216
  12. Singh, R. P., Sangwan, A., Godara, K. (2019). Modified-PRMA MAC Protocol for Cognitive Radio Networks. Wireless Personal Communications, 107 (2), 869–885. doi: http://doi.org/10.1007/s11277-019-06306-0
  13. Alkhayyat, A., Thabit, A. A., Ali, A. A. (2019). WBAN health care-based: Modeling Signal to Interference ratio with Different MAC Protocols. 2019 2nd International Conference on Engineering Technology and Its Applications (IICETA). doi: http://doi.org/10.1109/iiceta47481.2019.9012969
  14. Israr, I., Yaqoob, M. M., Javaid, N., Qasim, U., Khan, Z. A. (2012). Simulation Analysis of Medium Access Techniques. 2012 Seventh International Conference on Broadband, Wireless Computing, Communication and Applications. doi: http://doi.org/10.1109/bwcca.2012.105

Downloads

Published

2022-06-30

How to Cite

Khudor, B. A. Q., Abdulzahra, A. A., & Kudhair, N. M. (2022). Implementation of CSMA/CA and ALOHA random-access protocols for packetizing wireless networks with model-based design . Eastern-European Journal of Enterprise Technologies, 3(9 (117), 36–43. https://doi.org/10.15587/1729-4061.2022.260092

Issue

Section

Information and controlling system