Evaluasi Carrier Sense Multiple Access/Collision Avoidance Berbasis Opportunistic Random Access

Reza Firsandaya Malik, Erick Okvanty Haris

Abstract


Makalah ini memaparkan mengenai pengiriman data dengan proses CSMA/CA berbasis Opportunistic Random Access. Adapun yang menjadi latar belakang penulisan ini karena sering adanya proses pengiriman data yang hilang sebelum sampai atau packet lost. Evaluasi yang dilakukan menggunakan tools Omnet++. Skenario yang dilakukan dengan menggunakan 2 jenis node dan 2 jenis variasi kecepatan. Parameter – parameter Quality of Service seperti Delay, Throughput, Jitter, dan Routing Overhead digunakan dalam evaluasi kinerja algoritma Opportunistic Random Access dalam proses CSMA/CA. Hasil simulasi didapatkan bahwa proses  CSMA/CA menggunakan Opportunistic Random Acces memberikan efisiensi terhadap waktu dan efisiensi paket terhadap proses yang hanya menggunakan CSMA/CA saja.

Keywords


CSMA/CA, Quality of Service, Opportunistic Random Access

Full Text:

PDF

References


Sidhu, N., & Rani, S. (2013). Improved Optimal Slotted CSMA / CA Protocol. International Journal of Computer Applications, 79(October), pages 43–47. https://doi.org/10.5120/13749-1569

. Tang, C., Song, L., Balasubramani, J., Wu, S., Biaz, S., Yang, Q., & Wang, H. (2014). Comparative investigation on CSMA/CA-based opportunistic random access for Internet of Things. IEEE Internet of Things Journal, vol 1(2), pages 171–179. https://doi.org/10.1109/JIOT.2014.2302534

. Chatzimisios, P., Boucouvalas, A. C., & Vitsas, V. (2014). Optimisation of RTS / CTS handshake in IEEE 802 . 11 Wireless LANs for maximum performance, International Journal of Computer Applications, vol 1 ,pages 270–275. https://doi.org/ 10.1109/GLOCOMW.2004.1417586

. Balasubramani, J. (2013). Opportunistic Random Access in CSMA/CA based Wireless Networks. IEEE Internet of Things Journal, vol 1, pages 12–17. Retrieved from http://hdl.handle.net/10415/3854

Hwang, C. S., & Cioffi, J. M. (2009). Opportunistic CSMA/CA for achieving multi-user diversity in wireless LAN. IEEE Transactions on Wireless Communications, vol 8(6), pages2972–2982. https://doi.org/10.1109/TWC.2009.080134

. Malik, R. F., Rahman, T. A., Ngah, R., Zaiton, S., & Hashim, M. (2012). The New Multipoint Relays Selection in OLSR using Particle Swarm Optimization, 10(2), 343–352.

Climent, S., Sanchez, A., Capella, J. V., Meratnia, N., & Serrano, J. J. (2014). Underwater acousticwireless sensor networks: Advances and future trends in physical, MAC and routing layers. Sensors (Switzerland), vol 14(1), pages 795–833. https://doi.org/10.3390/s140100795

Kamesh, & Sakthi Priya, N. (2014). Security enhancement of authenticated RFIDgeneration. International Journal of Applied Engineering Research, vol 9(22), pages 5968–5974. https://doi.org/10.1002/sec.946

Kumaravel, K., & Marimuthu, A. (2014). An optimal mesh MASH routing topology using mesh in wireless sensor networks. Proceeding of the IEEE International Conference on Green Computing, Communication and Electrical Engineering, ICGCCEE 2014, 1(2), 10–11. https://doi.org/10.1109/ICGCCEE.2014.6922412

Student, P. G., & Engg, C. (2017). Simulation and performance evaluation of AODV Protocol with QoS using Network Simulator 3 ( NS3 ),vol 3(04), pages 3-5. https://doi.org/10.3390/info8030088

Katkar, P. S. (2016). Comparative Study of Network Simulator : NS2 and NS3. International Journal of Advanced Research in Computer Science and Software Engineering, 6(3), 608–612. https://doi.org/10.5120/ijca2016910918

Henry, A. J., & Burton, E. M. (2011). Author: Jerome Henry Editor: Marcus Burton, vol 1(November), pages 1–30. https://doi.org/10.13140/RG.2.1.2546.7607

Dipobagio, M. (n.d.) (2014). An Overview on Ad Hoc Networks, IEEE Communications Magazine vol 1(2) pages1–9. https://doi.org/ 10.1109/MCOM.2014.6710069


Refbacks

  • There are currently no refbacks.