33:
567:
140:) is introduced to extend the function of MACA. It requires nodes sending acknowledgements after each successful frame transmission, as well as the additional function of Carrier sense.
133:
Meanwhile, a node that hears RTS should remain silent to avoid conflict with CTS; a node that hears CTS should keep silent until the data transmission is complete.
17:
440:
407:
430:
180:
123:
makes an announcement before it sends the data frame to inform other nodes to keep silent. When a node wants to transmit, it sends a signal called
62:
260:
223:
265:
308:
546:
425:
608:
541:
127:(RTS) with the length of the data frame to send. If the receiver allows the transmission, it replies the sender a signal called
336:
173:
240:
210:
627:
445:
303:
84:
455:
55:
235:
582:
417:
379:
298:
218:
166:
318:
632:
435:
351:
275:
252:
601:
533:
450:
514:
45:
509:
49:
41:
158:
113:
594:
519:
109:
66:
504:
193:
189:
488:
105:
8:
228:
574:
387:
483:
397:
201:
470:
370:
108:
protocol used in wireless LAN data transmission to avoid collisions caused by the
578:
136:
WLAN data transmission collisions may still occur, and the MACA for
Wireless (
621:
120:
153:
478:
566:
460:
154:
MACA - A New
Channel Access Method for Packet Radio (Phil Karn, KA9Q)
149:
392:
293:
188:
288:
326:
283:
402:
137:
131:(CTS) with the length of the frame that is about to receive.
619:
54:but its sources remain unclear because it lacks
602:
174:
609:
595:
181:
167:
85:Learn how and when to remove this message
98:Multiple access with collision avoidance
18:Multiple Access with Collision Avoidance
14:
620:
162:
119:The basic idea of MACA is a wireless
561:
26:
24:
25:
644:
143:
565:
31:
13:
1:
498:Delay and disruption tolerant
581:. You can help Knowledge by
7:
10:
649:
560:
532:
497:
469:
416:
378:
369:
350:
335:
317:
274:
251:
209:
200:
628:Telecommunications stubs
573:This article related to
40:This article includes a
114:exposed station problem
69:more precise citations.
520:Dynamic Source Routing
190:Channel access methods
110:hidden station problem
633:Media access control
194:media access control
106:media access control
418:Collision avoidance
575:telecommunications
380:Collision recovery
42:list of references
590:
589:
555:
554:
534:Duplexing methods
528:
527:
365:
364:
95:
94:
87:
16:(Redirected from
640:
611:
604:
597:
569:
562:
376:
375:
207:
206:
183:
176:
169:
160:
159:
112:and to simplify
90:
83:
79:
76:
70:
65:this article by
56:inline citations
35:
34:
27:
21:
648:
647:
643:
642:
641:
639:
638:
637:
618:
617:
616:
615:
558:
556:
551:
524:
493:
465:
412:
361:
346:
331:
313:
270:
247:
196:
187:
146:
132:
125:Request-To-Send
104:) is a slotted
91:
80:
74:
71:
60:
46:related reading
36:
32:
23:
22:
15:
12:
11:
5:
646:
636:
635:
630:
614:
613:
606:
599:
591:
588:
587:
570:
553:
552:
550:
549:
544:
538:
536:
530:
529:
526:
525:
523:
522:
517:
512:
507:
501:
499:
495:
494:
492:
491:
486:
481:
475:
473:
471:Collision-free
467:
466:
464:
463:
458:
453:
448:
443:
438:
433:
428:
422:
420:
414:
413:
411:
410:
405:
400:
395:
390:
384:
382:
373:
367:
366:
363:
362:
360:
359:
356:
354:
348:
347:
345:
344:
341:
339:
333:
332:
330:
329:
323:
321:
315:
314:
312:
311:
306:
301:
296:
291:
286:
280:
278:
272:
271:
269:
268:
263:
257:
255:
249:
248:
246:
245:
244:
243:
233:
232:
231:
226:
215:
213:
204:
198:
197:
186:
185:
178:
171:
163:
157:
156:
145:
144:External links
142:
93:
92:
50:external links
39:
37:
30:
9:
6:
4:
3:
2:
645:
634:
631:
629:
626:
625:
623:
612:
607:
605:
600:
598:
593:
592:
586:
584:
580:
576:
571:
568:
564:
563:
559:
548:
545:
543:
540:
539:
537:
535:
531:
521:
518:
516:
513:
511:
508:
506:
503:
502:
500:
496:
490:
487:
485:
482:
480:
477:
476:
474:
472:
468:
462:
459:
457:
454:
452:
449:
447:
444:
442:
439:
437:
434:
432:
429:
427:
424:
423:
421:
419:
415:
409:
406:
404:
401:
399:
396:
394:
393:Slotted ALOHA
391:
389:
386:
385:
383:
381:
377:
374:
372:
368:
358:
357:
355:
353:
349:
343:
342:
340:
338:
334:
328:
325:
324:
322:
320:
316:
310:
307:
305:
302:
300:
297:
295:
292:
290:
287:
285:
282:
281:
279:
277:
273:
267:
264:
262:
259:
258:
256:
254:
250:
242:
239:
238:
237:
234:
230:
227:
225:
222:
221:
220:
217:
216:
214:
212:
208:
205:
203:
202:Channel-based
199:
195:
191:
184:
179:
177:
172:
170:
165:
164:
161:
155:
151:
148:
147:
141:
139:
134:
130:
129:Clear-To-Send
126:
122:
117:
115:
111:
107:
103:
99:
89:
86:
78:
68:
64:
58:
57:
51:
47:
43:
38:
29:
28:
19:
583:expanding it
572:
557:
371:Packet-based
135:
128:
124:
121:network node
118:
101:
97:
96:
81:
75:January 2024
72:
61:Please help
53:
67:introducing
622:Categories
479:Token Ring
484:Token bus
461:CSMA/CARP
150:Phil Karn
489:MS-ALOHA
294:TD-SCDMA
441:CSMA/CA
408:CSMA/CD
398:R-ALOHA
327:HC-SDMA
309:MC-CDMA
304:FH-CDMA
299:DS-CDMA
289:TD-CDMA
261:MF-TDMA
229:SC-FDMA
63:improve
284:W-CDMA
577:is a
510:VANET
505:MANET
431:MACAW
403:AX.25
388:ALOHA
266:STDMA
224:OFDMA
138:MACAW
48:, or
579:stub
436:CSMA
426:MACA
352:PAMA
337:PDMA
319:SDMA
276:CDMA
253:TDMA
241:WDMA
211:FDMA
192:and
102:MACA
547:FDD
542:TDD
515:DTN
456:HCF
451:PCF
446:DCF
236:WDM
219:FDM
624::
152::
116:.
52:,
44:,
610:e
603:t
596:v
585:.
182:e
175:t
168:v
100:(
88:)
82:(
77:)
73:(
59:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.