Knowledge

Multiple access with collision avoidance

Source 📝

33: 567: 140:) is introduced to extend the function of MACA. It requires nodes sending acknowledgements after each successful frame transmission, as well as the additional function of Carrier sense. 133:
Meanwhile, a node that hears RTS should remain silent to avoid conflict with CTS; a node that hears CTS should keep silent until the data transmission is complete.
17: 440: 407: 430: 180: 123:
makes an announcement before it sends the data frame to inform other nodes to keep silent. When a node wants to transmit, it sends a signal called
62: 260: 223: 265: 308: 546: 425: 608: 541: 127:(RTS) with the length of the data frame to send. If the receiver allows the transmission, it replies the sender a signal called 336: 173: 240: 210: 627: 445: 303: 84: 455: 55: 235: 582: 417: 379: 298: 218: 166: 318: 632: 435: 351: 275: 252: 601: 533: 450: 514: 45: 509: 49: 41: 158: 113: 594: 519: 109: 66: 504: 193: 189: 488: 105: 8: 228: 574: 387: 483: 397: 201: 470: 370: 108:
protocol used in wireless LAN data transmission to avoid collisions caused by the
578: 136:
WLAN data transmission collisions may still occur, and the MACA for Wireless (
621: 120: 153: 478: 566: 460: 154:
MACA - A New Channel Access Method for Packet Radio (Phil Karn, KA9Q)
149: 392: 293: 188: 288: 326: 283: 402: 137: 131:(CTS) with the length of the frame that is about to receive. 619: 54:but its sources remain unclear because it lacks 602: 174: 609: 595: 181: 167: 85:Learn how and when to remove this message 98:Multiple access with collision avoidance 18:Multiple Access with Collision Avoidance 14: 620: 162: 119:The basic idea of MACA is a wireless 561: 26: 24: 25: 644: 143: 565: 31: 13: 1: 498:Delay and disruption tolerant 581:. You can help Knowledge by 7: 10: 649: 560: 532: 497: 469: 416: 378: 369: 350: 335: 317: 274: 251: 209: 200: 628:Telecommunications stubs 573:This article related to 40:This article includes a 114:exposed station problem 69:more precise citations. 520:Dynamic Source Routing 190:Channel access methods 110:hidden station problem 633:Media access control 194:media access control 106:media access control 418:Collision avoidance 575:telecommunications 380:Collision recovery 42:list of references 590: 589: 555: 554: 534:Duplexing methods 528: 527: 365: 364: 95: 94: 87: 16:(Redirected from 640: 611: 604: 597: 569: 562: 376: 375: 207: 206: 183: 176: 169: 160: 159: 112:and to simplify 90: 83: 79: 76: 70: 65:this article by 56:inline citations 35: 34: 27: 21: 648: 647: 643: 642: 641: 639: 638: 637: 618: 617: 616: 615: 558: 556: 551: 524: 493: 465: 412: 361: 346: 331: 313: 270: 247: 196: 187: 146: 132: 125:Request-To-Send 104:) is a slotted 91: 80: 74: 71: 60: 46:related reading 36: 32: 23: 22: 15: 12: 11: 5: 646: 636: 635: 630: 614: 613: 606: 599: 591: 588: 587: 570: 553: 552: 550: 549: 544: 538: 536: 530: 529: 526: 525: 523: 522: 517: 512: 507: 501: 499: 495: 494: 492: 491: 486: 481: 475: 473: 471:Collision-free 467: 466: 464: 463: 458: 453: 448: 443: 438: 433: 428: 422: 420: 414: 413: 411: 410: 405: 400: 395: 390: 384: 382: 373: 367: 366: 363: 362: 360: 359: 356: 354: 348: 347: 345: 344: 341: 339: 333: 332: 330: 329: 323: 321: 315: 314: 312: 311: 306: 301: 296: 291: 286: 280: 278: 272: 271: 269: 268: 263: 257: 255: 249: 248: 246: 245: 244: 243: 233: 232: 231: 226: 215: 213: 204: 198: 197: 186: 185: 178: 171: 163: 157: 156: 145: 144:External links 142: 93: 92: 50:external links 39: 37: 30: 9: 6: 4: 3: 2: 645: 634: 631: 629: 626: 625: 623: 612: 607: 605: 600: 598: 593: 592: 586: 584: 580: 576: 571: 568: 564: 563: 559: 548: 545: 543: 540: 539: 537: 535: 531: 521: 518: 516: 513: 511: 508: 506: 503: 502: 500: 496: 490: 487: 485: 482: 480: 477: 476: 474: 472: 468: 462: 459: 457: 454: 452: 449: 447: 444: 442: 439: 437: 434: 432: 429: 427: 424: 423: 421: 419: 415: 409: 406: 404: 401: 399: 396: 394: 393:Slotted ALOHA 391: 389: 386: 385: 383: 381: 377: 374: 372: 368: 358: 357: 355: 353: 349: 343: 342: 340: 338: 334: 328: 325: 324: 322: 320: 316: 310: 307: 305: 302: 300: 297: 295: 292: 290: 287: 285: 282: 281: 279: 277: 273: 267: 264: 262: 259: 258: 256: 254: 250: 242: 239: 238: 237: 234: 230: 227: 225: 222: 221: 220: 217: 216: 214: 212: 208: 205: 203: 202:Channel-based 199: 195: 191: 184: 179: 177: 172: 170: 165: 164: 161: 155: 151: 148: 147: 141: 139: 134: 130: 129:Clear-To-Send 126: 122: 117: 115: 111: 107: 103: 99: 89: 86: 78: 68: 64: 58: 57: 51: 47: 43: 38: 29: 28: 19: 583:expanding it 572: 557: 371:Packet-based 135: 128: 124: 121:network node 118: 101: 97: 96: 81: 75:January 2024 72: 61:Please help 53: 67:introducing 622:Categories 479:Token Ring 484:Token bus 461:CSMA/CARP 150:Phil Karn 489:MS-ALOHA 294:TD-SCDMA 441:CSMA/CA 408:CSMA/CD 398:R-ALOHA 327:HC-SDMA 309:MC-CDMA 304:FH-CDMA 299:DS-CDMA 289:TD-CDMA 261:MF-TDMA 229:SC-FDMA 63:improve 284:W-CDMA 577:is a 510:VANET 505:MANET 431:MACAW 403:AX.25 388:ALOHA 266:STDMA 224:OFDMA 138:MACAW 48:, or 579:stub 436:CSMA 426:MACA 352:PAMA 337:PDMA 319:SDMA 276:CDMA 253:TDMA 241:WDMA 211:FDMA 192:and 102:MACA 547:FDD 542:TDD 515:DTN 456:HCF 451:PCF 446:DCF 236:WDM 219:FDM 624:: 152:: 116:. 52:, 44:, 610:e 603:t 596:v 585:. 182:e 175:t 168:v 100:( 88:) 82:( 77:) 73:( 59:. 20:)

Index

Multiple Access with Collision Avoidance
list of references
related reading
external links
inline citations
improve
introducing
Learn how and when to remove this message
media access control
hidden station problem
exposed station problem
network node
MACAW
Phil Karn
MACA - A New Channel Access Method for Packet Radio (Phil Karn, KA9Q)
v
t
e
Channel access methods
media access control
Channel-based
FDMA
FDM
OFDMA
SC-FDMA
WDM
WDMA
TDMA
MF-TDMA
STDMA

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.