Open Access   Article Go Back

Performance Analysis of CSMA/CA Based on D2D Communication

Hazem Noori Abdulrazzak1 , Aya Ayad Hussein2

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-2 , Page no. 652-657, Feb-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i2.652657

Online published on Feb 28, 2019

Copyright © Hazem Noori Abdulrazzak, Aya Ayad Hussein . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Hazem Noori Abdulrazzak, Aya Ayad Hussein, “Performance Analysis of CSMA/CA Based on D2D Communication,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.652-657, 2019.

MLA Style Citation: Hazem Noori Abdulrazzak, Aya Ayad Hussein "Performance Analysis of CSMA/CA Based on D2D Communication." International Journal of Computer Sciences and Engineering 7.2 (2019): 652-657.

APA Style Citation: Hazem Noori Abdulrazzak, Aya Ayad Hussein, (2019). Performance Analysis of CSMA/CA Based on D2D Communication. International Journal of Computer Sciences and Engineering, 7(2), 652-657.

BibTex Style Citation:
@article{Abdulrazzak_2019,
author = {Hazem Noori Abdulrazzak, Aya Ayad Hussein},
title = {Performance Analysis of CSMA/CA Based on D2D Communication},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2019},
volume = {7},
Issue = {2},
month = {2},
year = {2019},
issn = {2347-2693},
pages = {652-657},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3721},
doi = {https://doi.org/10.26438/ijcse/v7i2.652657}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i2.652657}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3721
TI - Performance Analysis of CSMA/CA Based on D2D Communication
T2 - International Journal of Computer Sciences and Engineering
AU - Hazem Noori Abdulrazzak, Aya Ayad Hussein
PY - 2019
DA - 2019/02/28
PB - IJCSE, Indore, INDIA
SP - 652-657
IS - 2
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
322 455 downloads 117 downloads
  
  
           

Abstract

This paper offers a complete idea and information about carrier sense multiple access with collision‐avoidance (CSMA/CA) protocol. Firstly, what is the carrier sense multiple access protocol? and what is his job? Secondly, what is the collision‐avoidance technique? and What is the effect of adding this technique to such protocol? Thirdly, knowing how to model an exact analysis to describe the protocol with it is techniques and the performance of the multiple random access method with p‐persistent carrier sense multiple access and with collision‐avoidance (CSMA/CA) protocol for high‐speed and realizing fully‐distributed (D2D) device to device communication based on IEEE 802.15.4. The collision‐avoidance portion of CSMA/CA in this model is performed with a random pulse transmission procedure, in which a user with a packet ready to transmit initially sends some pulse signals with random intervals within a collision‐avoidance period before transmitting the packet to verify a clear channel. The system model consists of a finite number of users to efficiently share a common channel. The time axis is slotted, and a time frame has a large number of slots and includes two parts: the collision‐avoidance period and the packet‐transmission period. A discrete‐time Markov process is used to model the system operation. Also, it will be described by it is transmission state.

Key-Words / Index Term

CSMA/CA, P-Persistent, D2D (device to device), IEEE 802.15.4

References

[1] B. Bellalta, “IEEE 802.11ax: High-Efficiency WLAN s”, IEEE Wireless Communications, Vol.23 , Issue.1 ,pp. 38-46, 2016
[2] Neeraj Paliwal , "Relevance Multipath Forwarding in Intended Wireless Mesh Networks", International Journal of Scientific Research in Computer Science and Engineering, Vol.3, Issue.2, pp.5-10, 2015
[3] Amr M. Kishk, Nagy W. Messiha, Nawal A. El-Fishawy, Abdelrahman A. Alkafs, Ahmed H. Madian, "Proposed Jamming Removal Technique for Wireless Sensor Network", International Journal of Scientific Research in Network Security and Communication, Vol.3, Issue.2, pp.1-14, 2015
[4] X. Cao, L. Liu, Y. Cheng, L. X. Cai, and C. Sun, “On Optimal Device-to-Device Resource Allocationfor Minimizing End-to-End Delay in VANETs”, IEEE Transactions On Vehicular Technology, Vol. 65, No. 10, pp. 7905-7916, 2016
[5] R. Doost-Mohammady, M. Y. Naderi, and K.R. Chowdhury, “Performance Analysis of CSMA/CA basedMedium Access in Full Duplex Wireless Communications”, IEEE Transactions on Mobile Computing ,Vol.15 , Issue. 6 ,pp. 1457–1470, 2016
[6] E. Datsika, A. Antonopoulos, N. Zorba, C. Verikoukis, “Cross-Network Performance Analysis of NetworkCoding Aided Cooperative Outband D2D Communications”, IEEE Transactions on Wireless Communications ,Vol.16 , Issue.5 , pp.3176–3188, 2017
[7] A. Festag, “Standards for vehicularcommunication—from IEEE 802.11p to 5G”, e & i Elektrotechnik und Informationstechnik, Vol.132, Issue.7, pp. 409–416, 2015
[8] S.Li, , E. Ekici, and N. Shroff, “Throughput-Optimal Queue Length Based CSMA/CA Algorithm for Cognitive Radio Networks”, IEEE Transactions on Mobile Computing, Vol.14 , Issue.5 , pp.1098–1108, 2015
[9] M. Michalopoulou, and P.Mahonen , “A Mean Field Analysis of CSMA/CA Throughput”, IEEE Transactions on Mobile Computing, Vol.16 , Issue.8 , pp.2093–2104, 2017
[10] J. Mišić and V. B. Mišić, “Adapting LTE/LTE-A to M2M and D2D Communications”, IEEE Network, Vol.31 , Issue.3 , pp.63 - 69 , 2017
[11] H. Zhang, Y. Liao, and L.Song, ”D2D-U: Device-to-Device Communications inUnlicensed Bands for 5G System”, IEEE Transactions on Wireless Communications , Vol.16 , Issue.6 , pp.3507-3519, 2017