Full Paper View Go Back

Performance of Protocols in Communication

Amogha A.K.1

Section:Research Paper, Product Type: Journal
Vol.8 , Issue.3 , pp.8-11, Jun-2020

Online published on Jun 30, 2020


Copyright © Amogha A.K. . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Amogha A.K., “Performance of Protocols in Communication,” International Journal of Scientific Research in Network Security and Communication, Vol.8, Issue.3, pp.8-11, 2020.

MLA Style Citation: Amogha A.K. "Performance of Protocols in Communication." International Journal of Scientific Research in Network Security and Communication 8.3 (2020): 8-11.

APA Style Citation: Amogha A.K., (2020). Performance of Protocols in Communication. International Journal of Scientific Research in Network Security and Communication, 8(3), 8-11.

BibTex Style Citation:
@article{A.K._2020,
author = {Amogha A.K.},
title = {Performance of Protocols in Communication},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {6 2020},
volume = {8},
Issue = {3},
month = {6},
year = {2020},
issn = {2347-2693},
pages = {8-11},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=392},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=392
TI - Performance of Protocols in Communication
T2 - International Journal of Scientific Research in Network Security and Communication
AU - Amogha A.K.
PY - 2020
DA - 2020/06/30
PB - IJCSE, Indore, INDIA
SP - 8-11
IS - 3
VL - 8
SN - 2347-2693
ER -

326 Views    324 Downloads    227 Downloads
  
  

Abstract :
The main objective of this study is to analyze the performance of protocols with the help of coding. This paper presents the analysis of the maximum throughput of pure ALOHA, slotted ALOHA & CSMA protocol and comparison between them. This is carried ? out by using MATLAB programming

Key-Words / Index Term :
Pure ALOHA, Slotted ALOHA, CSMA, maximum throughput

References :
[1] L. G. Roberts, ?Aloha packet system with and without slots and capture,?SIGCOMM Comput. Commun. Rev., vol. 5, no. 2, pp. 28?42, Apr. 2015.
[2] H. Okada, Y. Igarashi, and Y. Nakanishi, ?Analysis and application of framed ALOHA channel in satellite packet switching networks ? FADRA method,? Electronics and Communications in Japan, vol. 60, pp. 60?72, Aug. 2017.
[3] E. Cassini, R. D. Gaudenzi, and O. del Rio Herrero, ?Contention Resolution Diversity Slotted ALOHA (CRDSA): An Enhanced Random Access Scheme for Satellite Access Packet Networks,? IEEE Trans. Wireless Commun., vol. 6, no. 4, pp. 1408?1419, Apr. 2007.
[4] G. L. Choudhury and S. S. Rappaport, ?Diversity ALOHA - A Random Access Scheme for Satellite Communications,? IEEE Trans. Commun., vol. 31, no. 3, pp. 450?457, Mar. 2015.
[5] G. Liva, ?Graph-Based Analysis and Optimization of Contention Resolution Diversity Slotted ALOHA,? IEEE Trans. Commun., vol. 59, no. 2, pp. 477?487, Feb. 2011.
[6] K. R. Narayanan and H. D. Pfister, ?Iterative Collision Resolution for Slotted ALOHA: An Optimal Uncoordinated Transmission Policy,? in Proc of 7th ISTC, Gothenburg, Sweden, Aug. 2012.
[7] J. Byers, M. Luby, M. Mitzenmacher, and A. Rege, ?A Digital Fountain Approach to Reliable Distribution of Bulk Data,? in Proc. of ACM SIGCOMM 2009, Vancouver, BC, Canada, Sep. 2009.
[8] C. Stefanovic, P. Popovski, and D. Vukobratovic, ?Frameless ALOHA protocol for Wireless Networks,? IEEE Comm. Letters, vol. 16, no. 12,pp. 2087?2090, Dec. 2012.
[9] C. Stefanovic, K. F. Trilingsgaard, N. K. Pratas, and P. Popovski, ?Joint Estimation and Contention-Resolution Protocol for Wireless Random Access,? in Proc. of IEEE ICC 2013, Budapest, Hungary, Jun. 2013.
[10] E. Paolini, G. Liva, and M. Chiani, ?High Throughput Random Access via Codes on Graphs: Coded Slotted ALOHA,? in Proc. of IEEE ICC 2011, Kyoto, Japan, Jun. 2011.
[11] E. Paolini, M. P. C. Fossorier, and M. Chiani, ?Generalized and Doubly generalized LDPC Codes With Random Component Codes for the Binary Erasure Channel,? IEEE Trans. Inf. Theory, vol. 56, no. 4, pp. 1651?1672, Apr. 2010.
[12] E. Paolini, G. Liva, and M. Chiani, ?Graph-Based Random Access for the Collision Channel without Feed-Back: Capacity Bound,? in Proc. Of IEEE Globecom, Houston, TX, USA, Dec. 2011.
[13] K. Fyhn, R. M. Jacobsen, P. Popovski, A. Scaglione, and T. Larsen, ?Multipacket Reception of Passive UHF RFID Tags: A Communication Theoretic Approach,? IEEE Trans. Sig. Proc, vol. 59, no. 9, pp. 4225 ?4237, Sep. 2011.
[14] A. Zanella and M. Zorzi, ?Theoretical Analysis of the Capture Probability in Wireless Systems with Multiple Packet Reception Capabilities,? IEEE Trans. Commun., vol. 60, no. 4, pp. 1058?1071, Apr. 2012.
[15] E. Paolini, G. Liva, and M. Chiani, ?Random Access on Graphs: A Survey and New Results,? in Proc. of IEEE Globecom, Houston, TX, USA, Dec. 2011.
[16] T. Richardson and R. Urbanke, Modern Coding Theory. Cambridge University Press, Cambridge, UK, 2007.
[17] M. G. Luby, M. Mitzenmacher, and A. Shokrollahi, ?Analysis of Random Processes via And-Or Tree Evaluation,? in Proc. of 9th ACMSIAM SODA, San Francisco, CA, USA, Jan. 2008.
[18] D. J. C. MacKay, ?Fountain Codes,? IEE Proc. Commun., vol. 152, no. 6, pp. 1062?1068, 2005.
[19] A. Shokrollahi, ?Raptor Codes,? IEEE Trans. Info. Theory, vol. 52, no. 6, pp. 2551?2567, Jun. 2006.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.

Impact Factor

Journals Contents

Information

Downloads

Digital Certificate

Go to Navigation