Performance Analysis of CSMA/CA Based on D2D Communication
DOI:
https://doi.org/10.26438/ijcse/v7i2.652657Keywords:
CSMA/CA, P-Persistent, D2D (device to device), IEEE 802.15.4Abstract
This paper offers a complete idea and information about carrier sense multiple access with collisionavoidance (CSMA/CA) protocol. Firstly, what is the carrier sense multiple access protocol? and what is his job? Secondly, what is the collisionavoidance technique? and What is the effect of adding this technique to such protocol? Thirdly, knowing how to model an exact analysis to describe the protocol with it is techniques and the performance of the multiple random access method with ppersistent carrier sense multiple access and with collisionavoidance (CSMA/CA) protocol for highspeed and realizing fullydistributed (D2D) device to device communication based on IEEE 802.15.4. The collisionavoidance portion of CSMA/CA in this model is performed with a random pulse transmission procedure, in which a user with a packet ready to transmit initially sends some pulse signals with random intervals within a collisionavoidance period before transmitting the packet to verify a clear channel. The system model consists of a finite number of users to efficiently share a common channel. The time axis is slotted, and a time frame has a large number of slots and includes two parts: the collisionavoidance period and the packettransmission period. A discretetime Markov process is used to model the system operation. Also, it will be described by it is transmission state.
References
[1] B. Bellalta, “IEEE 802.11ax: High-Efficiency WLAN s”, IEEE Wireless Communications, Vol.23 , Issue.1 ,pp. 38-46, 2016
[2] Neeraj Paliwal , "Relevance Multipath Forwarding in Intended Wireless Mesh Networks", International Journal of Scientific Research in Computer Science and Engineering, Vol.3, Issue.2, pp.5-10, 2015
[3] Amr M. Kishk, Nagy W. Messiha, Nawal A. El-Fishawy, Abdelrahman A. Alkafs, Ahmed H. Madian, "Proposed Jamming Removal Technique for Wireless Sensor Network", International Journal of Scientific Research in Network Security and Communication, Vol.3, Issue.2, pp.1-14, 2015
[4] X. Cao, L. Liu, Y. Cheng, L. X. Cai, and C. Sun, “On Optimal Device-to-Device Resource Allocationfor Minimizing End-to-End Delay in VANETs”, IEEE Transactions On Vehicular Technology, Vol. 65, No. 10, pp. 7905-7916, 2016
[5] R. Doost-Mohammady, M. Y. Naderi, and K.R. Chowdhury, “Performance Analysis of CSMA/CA basedMedium Access in Full Duplex Wireless Communications”, IEEE Transactions on Mobile Computing ,Vol.15 , Issue. 6 ,pp. 1457–1470, 2016
[6] E. Datsika, A. Antonopoulos, N. Zorba, C. Verikoukis, “Cross-Network Performance Analysis of NetworkCoding Aided Cooperative Outband D2D Communications”, IEEE Transactions on Wireless Communications ,Vol.16 , Issue.5 , pp.3176–3188, 2017
[7] A. Festag, “Standards for vehicularcommunication—from IEEE 802.11p to 5G”, e & i Elektrotechnik und Informationstechnik, Vol.132, Issue.7, pp. 409–416, 2015
[8] S.Li, , E. Ekici, and N. Shroff, “Throughput-Optimal Queue Length Based CSMA/CA Algorithm for Cognitive Radio Networks”, IEEE Transactions on Mobile Computing, Vol.14 , Issue.5 , pp.1098–1108, 2015
[9] M. Michalopoulou, and P.Mahonen , “A Mean Field Analysis of CSMA/CA Throughput”, IEEE Transactions on Mobile Computing, Vol.16 , Issue.8 , pp.2093–2104, 2017
[10] J. Mišić and V. B. Mišić, “Adapting LTE/LTE-A to M2M and D2D Communications”, IEEE Network, Vol.31 , Issue.3 , pp.63 - 69 , 2017
[11] H. Zhang, Y. Liao, and L.Song, ”D2D-U: Device-to-Device Communications inUnlicensed Bands for 5G System”, IEEE Transactions on Wireless Communications , Vol.16 , Issue.6 , pp.3507-3519, 2017
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
