Implementation of CSMA/CA and ALOHA random-access protocols for packetizing wireless networks with model-based design
DOI:
https://doi.org/10.15587/1729-4061.2022.260092Keywords:
ad-hoc networks, wireless LANs, Carrier Sense Multiple Access (CSMA), collision avoidanceAbstract
Because of the reliability of deployment, cost efficiency, and flexibility of ad-hoc wireless local networks (WLAN). These wireless networks have grown to be the everywhere connection solution in residential and public access networking protocols. It is important to know which strategy performs better with the least amount of delay. The Multiple Access Control protocols (MAC) that are relied on ALOHA, and Carrier Sense Multiple Access with collision avoidance (CSMA/CA) as random access techniques, have substantially aided the rapid growth of such wireless access networks. This work provides a model-based design approach for modeling CSMA/CA and ALOHA random-access protocols for packetizing wireless networks. We analyze the TX and Back-off waveforms of the PHY/MAC transceiver of three radio nodes under CSMA/CA and ALOHA operation modes and compare the obtained results of the PHY/MAC Transceiver for the network nodes according to these modes. Every node is within a range such that the communication between each couple of nodes can be interfered with and received data from the third node. The MAC layer and the logical link control function composed the data link layer. Since the same radio band is used for TX and RX, the MAC function employed here is CSMA/CA and ALOHA, which had also called a random back-off. The MAC layer sends a control signal to the TX block to transmit either a data frame or an acknowledgment frame. The frame contents are loaded in the look-up tables. The contents can be changed in the workspace. The output of this block is a complex baseband IQ signal. The obtained results show the effectiveness of CSMA/CA over ALOHA modes when comparing the corresponding Back-off waveforms and when calculating the throughput values of the three network nodes
References
- Naveen Raj, R., Nayak, A., Kumar, M. S. (2019). A Survey and Performance Evaluation of Reinforcement Learning Based Spectrum Aware Routing in Cognitive Radio Ad Hoc Networks. International Journal of Wireless Information Networks, 27 (1), 144–163. doi: http://doi.org/10.1007/s10776-019-00463-6
- Abramson, N. (2009). The Alohanet – surfing for wireless data [History of Communications]. IEEE Communications Magazine, 47 (12), 21–25. doi: http://doi.org/10.1109/mcom.2009.5350363
- Shijer, S. S., Sabry, A. H. (2021). Analysis of performance parameters for wireless network using switching multiple access control method. Eastern-European Journal of Enterprise Technologies, 4 (9 (112)), 6–14. doi: http://doi.org/10.15587/1729-4061.2021.238457
- Beltramelli, L., Mahmood, A., Osterberg, P., Gidlund, M. (2021). LoRa Beyond ALOHA: An Investigation of Alternative Random Access Protocols. IEEE Transactions on Industrial Informatics, 17 (5), 3544–3554. doi: http://doi.org/10.1109/tii.2020.2977046
- Lim, J.-T., Han, Y. (2018). Spreading Factor Allocation for Massive Connectivity in LoRa Systems. IEEE Communications Letters, 22(4), 800–803. doi: http://doi.org/10.1109/lcomm.2018.2797274
- Clazzer, F., Kissling, C., Marchese, M. (2018). Enhancing Contention Resolution ALOHA Using Combining Techniques. IEEE Transactions on Communications, 66 (6), 2576–2587. doi: http://doi.org/10.1109/tcomm.2017.2759264
- Politis, A. C., Anastassiu, H. T. (2020). Performance Analysis of Resource Sharing During Downlink Multi-User Transmissions in CSMA/ECA Full Duplex WLANs. Transport and Telecommunication Journal, 21 (1), 61–68. doi: http://doi.org/10.2478/ttj-2020-0005
- Jiao, W., Sheng, M., Shi, Y., Li, Y. (2014). End-to-end delay estimation for multi-hop wireless networks with random access policy. Science China Information Sciences, 57 (6), 1–13. doi: http://doi.org/10.1007/s11432-014-5103-y
- Yun, F., Liu, B., Zou, L., Chen, C. W. (2017). Performance Analysis of IEEE 802.15.6 MAC Protocol in WBAN with Energy Harvesting Nodes. Proceedings of the 11th International Conference on Body Area Networks. doi: http://doi.org/10.4108/eai.15-12-2016.2267671
- Katila, C. J., Buratti, C., Abrignani, M. D., Verdone, R. (2017). Neighbors-Aware Proportional Fair scheduling for future wireless networks with mixed MAC protocols. EURASIP Journal on Wireless Communications and Networking, 2017 (1). doi: http://doi.org/10.1186/s13638-017-0875-6
- Kaynia, M., Jindal, N. (2008). Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks. 2008 IEEE International Conference on Communications, 1108–1112. doi: http://doi.org/10.1109/icc.2008.216
- Singh, R. P., Sangwan, A., Godara, K. (2019). Modified-PRMA MAC Protocol for Cognitive Radio Networks. Wireless Personal Communications, 107 (2), 869–885. doi: http://doi.org/10.1007/s11277-019-06306-0
- Alkhayyat, A., Thabit, A. A., Ali, A. A. (2019). WBAN health care-based: Modeling Signal to Interference ratio with Different MAC Protocols. 2019 2nd International Conference on Engineering Technology and Its Applications (IICETA). doi: http://doi.org/10.1109/iiceta47481.2019.9012969
- Israr, I., Yaqoob, M. M., Javaid, N., Qasim, U., Khan, Z. A. (2012). Simulation Analysis of Medium Access Techniques. 2012 Seventh International Conference on Broadband, Wireless Computing, Communication and Applications. doi: http://doi.org/10.1109/bwcca.2012.105
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Baida'a Abdul Qader Khudor, Abdulmalik Adil Abdulzahra, Nagham Mumtaz Kudhair
This work is licensed under a Creative Commons Attribution 4.0 International License.
The consolidation and conditions for the transfer of copyright (identification of authorship) is carried out in the License Agreement. In particular, the authors reserve the right to the authorship of their manuscript and transfer the first publication of this work to the journal under the terms of the Creative Commons CC BY license. At the same time, they have the right to conclude on their own additional agreements concerning the non-exclusive distribution of the work in the form in which it was published by this journal, but provided that the link to the first publication of the article in this journal is preserved.
A license agreement is a document in which the author warrants that he/she owns all copyright for the work (manuscript, article, etc.).
The authors, signing the License Agreement with TECHNOLOGY CENTER PC, have all rights to the further use of their work, provided that they link to our edition in which the work was published.
According to the terms of the License Agreement, the Publisher TECHNOLOGY CENTER PC does not take away your copyrights and receives permission from the authors to use and dissemination of the publication through the world's scientific resources (own electronic resources, scientometric databases, repositories, libraries, etc.).
In the absence of a signed License Agreement or in the absence of this agreement of identifiers allowing to identify the identity of the author, the editors have no right to work with the manuscript.
It is important to remember that there is another type of agreement between authors and publishers – when copyright is transferred from the authors to the publisher. In this case, the authors lose ownership of their work and may not use it in any way.