Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Carrier-sense multiple access with collision avoidance

From Wikipedia, the free encyclopedia
Computer network multiple access method

Carrier-sense multiple access with collision avoidance (CSMA/CA) incomputer networking, is alink layermultiple access method in whichcarrier sensing is used. Under CSMA/CA,nodes attempt to avoid collisions by beginning transmission only after the channel is sensed to have no traffic.[1][2] When they do transmit, nodes transmit frames in their entirety.

This technique is primarily used in wireless networks, where the alternative with collision detectionCSMA/CD is not possible due to wireless transmitters that cannot effectively detect other transmissions while they themselves are transmitting.

CSMA/CA is unreliable due to thehidden node problem.[3][4]

Simplified algorithm of CSMA/CA

Details

[edit]

Collision avoidance is used to improve the performance of theCSMA method by attempting to divide the channel somewhat equally among all transmitting nodes within the collision domain.

  1. Carrier Sense: prior to transmitting, a node first listens to the shared medium (such as listening for wireless signals in a wireless network) to determine whether another node is transmitting or not. Note that thehidden node problem means another node may be transmitting which goes undetected at this stage.
  2. Collision Avoidance: if another node was heard, we wait for a period of time (usually random) for the node to stop transmitting before listening again for a free communications channel.
  • Request to Send/Clear to Send (RTS/CTS) may optionally be used at this point to mediate access to the shared medium. This goes some way to alleviating the problem of hidden nodes because, for instance, in a wireless network, the Access Point only issues aClear to Send to one node at a time. However, wireless802.11 implementations do not typically implement RTS/CTS for all transmissions; they may turn it off completely, or at least not use it for small packets (the overhead of RTS, CTS and transmission is too great for small data transfers).
  • Transmission: if the medium was identified as being clearor the node received a CTS to explicitly indicate it can send, it sends the frame in its entirety. UnlikeCSMA/CD, it is very challenging for a wireless node to listen at the same time as it transmits (its transmission will dwarf any attempt to listen). Continuing the wireless example, the node awaits receipt of an acknowledgement packet from the Access Point to indicate the packet was received and checksummed correctly. If such acknowledgement does not arrive in a timely manner, it assumes the packet collided with some other transmission, causing the node to enter a period ofbinary exponential backoff prior to attempting to re-transmit.

Although CSMA/CA has been used in a variety of wired communication systems, it is particularly beneficial in awireless LAN due to a common problem of multiple stations being able to see the Access Point, but not each other. This is due to differences in transmit power, and receive sensitivity, as well as distance, and location with respect to the AP.[5] This will cause a station to not be able tohear another station's broadcast. This is the so-called 'hidden node', or 'hidden station' problem. Devices utilizing802.11 based standards can enjoy the benefits of collision avoidance (RTS / CTS handshake, alsoPoint coordination function), although they do not do so by default. By default, they use a Carrier sensing mechanism calledexponential backoff (orDistributed coordination function), that relies upon a station attempting to 'listen' for another station's broadcast before sending. CA, or PCF relies upon the AP (or thereceiver for Ad hoc networks) granting a station the exclusive right to transmit for a given period of time after requesting it (Request to Send / Clear to Send).[6]

CSMA-CA requires a determination of whether a channel is 'idle', even when incompatible standards and overlapping transmission frequencies are used. Per the standards, for 802.11/Wi-Fi transmitters on the same channel, transmitters must take turns to transmit if they can detect each other even 3 dB above thenoise floor (the thermal noise floor is around -101 dBm for 20 MHz channels).[7] On the other hand, transmitters will ignore transmitters with incompatible standards or on overlapping channels if the received signal strength from them is below a threshold Pth which, for nonWi-Fi 6 systems, is between -76 and -80 dBm.[8]

IEEE 802.11 RTS/CTS Exchange

[edit]

CSMA/CA can optionally be supplemented by the exchange of aRequest to Send (RTS) packet sent by the sender S, and aClear to Send (CTS) packet sent by the intended receiver R. This alerts all nodes within range of the sender, receiver or both, to not transmit for the duration of the main transmission. This is known as theIEEE 802.11 RTS/CTS exchange. Implementation of RTS/CTS helps to partially solve thehidden node problem that is often found in wireless networking.[9][10]

Performance

[edit]

CSMA/CA performance is based largely upon the modulation technique used to transmit the data between nodes. Studies show that under ideal propagation conditions (simulations),direct-sequence spread spectrum (DSSS) provides the highest throughput for all nodes on a network when used in conjunction with CSMA/CA and the IEEE 802.11 RTS/CTS exchange under light network load conditions.Frequency hopping spread spectrum (FHSS) follows distantly behind DSSS with regard to throughput, with a greater throughput once network load becomes substantially heavy. However, the throughput is generally the same under real-world conditions due to radio propagation factors.[4]

Usage

[edit]

See also

[edit]

References

[edit]
  1. ^"Federal Standard 1037C". Its.bldrdoc.gov. Retrieved2012-09-09.
  2. ^"American National Standard T1.523-2001, Telecom Glossary 2000". Atis.org. Archived fromthe original on 2008-03-02. Retrieved2012-09-09.
  3. ^"Study of different CSMA/CA IEEE 802.11-based implementations, Universitat Politècnica de Catalunya"(PDF). Archived fromthe original(PDF) on 2012-03-06. Retrieved2012-09-09.
  4. ^abViral V. Kapadia; Sudarshan N. Patel; Rutvij H. Jhaveri (2010). "Comparative study of hidden node problem and solution using different techniques and protocols, Journal of Computing".arXiv:1003.4070 [cs.NI].
  5. ^Kaixin Xu; Mario Gerla; Sang Bae."How Effective is the IEEE 802.11 RTS/CTS Handshake in Ad Hoc Networks?"(PDF). UCLA. Retrieved28 September 2012.
  6. ^Park, Kihong."Wireless Lecture Notes"(PDF). Purdue. Retrieved28 September 2012.
  7. ^"Channel Bonding in WiFi and Radio Frequency Physics | Network Computing".
  8. ^Effect of adjacent-channel interference in IEEE 802.11 WLANs - Eduard Garcia Villegas; Elena Lopez-Aguilera; Rafael Vidal; Josep Paradells (2007)
  9. ^Comer, Douglas. (2009). Computer Networks and Internets. Upper Saddle River, NJ: Pearson Education Inc.ISBN 0-13-504583-5.
  10. ^"MIT Lecture - Communication Systems Engineering. Dr. Eytan Modiano"(PDF).Archived(PDF) from the original on 2010-06-13. Retrieved2012-09-09.

External links

[edit]
Channel-based
FDMA
TDMA
CDMA
SDMA
PDMA
PAMA
Packet-based
Collision recovery
Collision avoidance
Collision-free
Delay and disruption tolerant
Duplexing methods
Retrieved from "https://en.wikipedia.org/w/index.php?title=Carrier-sense_multiple_access_with_collision_avoidance&oldid=1333414572"
Category:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp