词条 | Carrier-sense multiple access with collision avoidance |
释义 |
Carrier-sense multiple access with collision avoidance (CSMA/CA) in computer networking, is a network multiple access method in which carrier sensing is used, but nodes attempt to avoid collisions by beginning transmission only after the channel is sensed to be "idle".[1][2] When they do transmit, nodes transmit their packet data in its entirety. It is particularly important for wireless networks, where the collision detection of the alternative CSMA/CD is not possible due to wireless transmitters desensing their receivers during packet transmission. CSMA/CA is unreliable due to the hidden node problem.[3][4] CSMA/CA is a protocol that operates in the Data Link Layer (Layer 2) of the OSI model. DetailsCollision avoidance is used to improve the performance of the CSMA method by attempting to divide the channel somewhat equally among all transmitting nodes within the collision domain.
Although CSMA/CA has been used in a variety of wired communication systems, it is particularly beneficial in a wireless LAN due to a common problem of multiple stations being able to see the Access Point, but not each other. This is due to differences in transmit power, and receive sensitivity, as well as distance, and location with respect to the AP.[5] This will cause a station to not be able to 'hear' another station's broadcast. This is the so-called 'hidden node', or 'hidden station' problem. Devices utilizing 802.11 based standards can enjoy the benefits of collision avoidance (RTS / CTS handshake, also Point coordination function), although they do not do so by default. By default they use a Carrier sensing mechanism called 'exponential backoff', or (Distributed coordination function) that relies upon a station attempting to 'listen' for another station's broadcast before sending. CA, or PCF relies upon the AP (or the 'receiver' for Ad hoc networks) granting a station the exclusive right to transmit for a given period of time after requesting it (Request to Send / Clear to Send).[6] IEEE 802.11 RTS/CTS ExchangeCSMA/CA can optionally be supplemented by the exchange of a Request to Send (RTS) packet sent by the sender S, and a Clear to Send (CTS) packet sent by the intended receiver R. Thus alerting all nodes within range of the sender, receiver or both, to not transmit for the duration of the main transmission. This is known as the IEEE 802.11 RTS/CTS exchange. Implementation of RTS/CTS helps to partially solve the hidden node problem that is often found in wireless networking.[7][8] PerformanceCSMA/CA performance is based largely upon the modulation technique used to transmit the data between nodes. Studies show that under ideal propagation conditions (simulations), direct-sequence spread spectrum (DSSS) provides the highest throughput for all nodes on a network when used in conjunction with CSMA/CA and the IEEE 802.11 RTS/CTS exchange under light network load conditions. Frequency hopping spread spectrum (FHSS) follows distantly behind DSSS with regard to throughput with a greater throughput once network load becomes substantially heavy. However, the throughput is generally the same under real world conditions due to radio propagation factors.[4] Usage
See also
References1. ^{{cite web|url=http://www.its.bldrdoc.gov/fs-1037/fs-1037c.htm |title=Federal Standard 1037C |publisher=Its.bldrdoc.gov |date= |accessdate=2012-09-09}} 2. ^{{cite web |url=http://www.atis.org/tg2k/ |title=American National Standard T1.523-2001, Telecom Glossary 2000 |publisher=Atis.org |date= |accessdate=2012-09-09 |deadurl=yes |archiveurl=https://web.archive.org/web/20080302071329/http://www.atis.org/tg2k/ |archivedate=2008-03-02 |df= }} 3. ^{{cite web |url=http://www.eunice-forum.org/eunice99/027.pdf |title=Study of different CSMA/CA IEEE 802.11-based implementations, Universitat Politècnica de Catalunya |format=PDF |date= |accessdate=2012-09-09 |archive-url=https://web.archive.org/web/20120306051958/http://www.eunice-forum.org/eunice99/027.pdf# |archive-date=2012-03-06 |dead-url=yes |df= }} 4. ^1 {{cite web|url=https://arxiv.org/ftp/arxiv/papers/1003/1003.4070.pdf |title=Comparative study of hidden node problem and solution using different techniques and protocols, Journal of Computing |format=PDF |date=2010 |accessdate=2016-01-05|author1=Viral V. Kapadia |author2=Sudarshan N. Patel |author3=Rutvij H. Jhaveri }} 5. ^{{cite web|title=How Effective is the IEEE 802.11 RTS/CTS Handshake in Ad Hoc Networks?|url=http://www.cs.purdue.edu/homes/park/cs536-wireless-3.pdf|publisher=UCLA|accessdate=28 September 2012|author1=Kaixin Xu |author2=Mario Gerla |author3=Sang Bae }} 6. ^{{cite web|last=Park|first=Kihong|title=Wireless Lecture Notes|url=http://www.cs.purdue.edu/homes/park/cs536-wireless-3.pdf|publisher=Purdue|accessdate=28 September 2012}} 7. ^Comer, Douglas. (2009). Computer Networks and Internets. Upper Saddle River, NJ: Pearson Education Inc. {{ISBN|0-13-504583-5}}. 8. ^{{cite web|url=http://ocw.mit.edu/courses/aeronautics-and-astronautics/16-36-communication-systems-engineering-spring-2009/lecture-notes/MIT16_36s09_lec21_22.pdf |title=MIT Lecture - Communication Systems Engineering. Dr. Eytan Modiano |format=PDF |date= |accessdate=2012-09-09}}
External links
1 : IEEE 802.11 |
随便看 |
|
开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。