Langbahn Team – Weltmeisterschaft

Carrier-sense multiple access with collision avoidance

Carrier-sense multiple access with collision avoidance (CSMA/CA) in computer networking, is a network multiple access method in which carrier sensing is used, but nodes attempt to avoid collisions by beginning transmission only after the channel is sensed to be "idle".[1][2] When they do transmit, nodes transmit their packet data in its entirety.

It is particularly important for wireless networks, where the alternative with collision detection CSMA/CD, is not possible due to wireless transmitters desensing (turning off) their receivers during packet transmission.

CSMA/CA is unreliable due to the hidden node problem.[3][4]

CSMA/CA is a protocol that operates in the data link layer.

Simplified algorithm of CSMA/CA

Details

Collision avoidance is used to improve the performance of the CSMA method by attempting to divide the channel somewhat equally among all transmitting nodes within the collision domain.

  1. Carrier Sense: prior to transmitting, a node first listens to the shared medium (such as listening for wireless signals in a wireless network) to determine whether another node is transmitting or not. Note that the hidden node problem means another node may be transmitting which goes undetected at this stage.
  2. Collision Avoidance: if another node was heard, we wait for a period of time (usually random) for the node to stop transmitting before listening again for a free communications channel.
  • Request to Send/Clear to Send (RTS/CTS) may optionally be used at this point to mediate access to the shared medium. This goes some way to alleviating the problem of hidden nodes because, for instance, in a wireless network, the Access Point only issues a Clear to Send to one node at a time. However, wireless 802.11 implementations do not typically implement RTS/CTS for all transmissions; they may turn it off completely, or at least not use it for small packets (the overhead of RTS, CTS and transmission is too great for small data transfers).
  • Transmission: if the medium was identified as being clear or the node received a CTS to explicitly indicate it can send, it sends the frame in its entirety. Unlike CSMA/CD, it is very challenging for a wireless node to listen at the same time as it transmits (its transmission will dwarf any attempt to listen). Continuing the wireless example, the node awaits receipt of an acknowledgement packet from the Access Point to indicate the packet was received and checksummed correctly. If such acknowledgement does not arrive in a timely manner, it assumes the packet collided with some other transmission, causing the node to enter a period of binary exponential backoff prior to attempting to re-transmit.

Although CSMA/CA has been used in a variety of wired communication systems, it is particularly beneficial in a wireless LAN due to a common problem of multiple stations being able to see the Access Point, but not each other. This is due to differences in transmit power, and receive sensitivity, as well as distance, and location with respect to the AP.[5] This will cause a station to not be able to 'hear' another station's broadcast. This is the so-called 'hidden node', or 'hidden station' problem.[6] Devices utilizing 802.11 based standards can enjoy the benefits of collision avoidance (RTS / CTS handshake, also Point coordination function), although they do not do so by default. By default they use a Carrier sensing mechanism called exponential backoff (or Distributed coordination function), that relies upon a station attempting to 'listen' for another station's broadcast before sending. CA, or PCF relies upon the AP (or the 'receiver' for Ad hoc networks) granting a station the exclusive right to transmit for a given period of time after requesting it (Request to Send / Clear to Send).[7]

CSMA-CA requires a determination of whether a channel is 'idle', even when incompatible standards and overlapping transmission frequencies are used. Per the standards, for 802.11/Wi-Fi transmitters on the same channel, transmitters must take turns to transmit if they can detect each other even 3 dB above the noise floor (the thermal noise floor is around -101 dBm for 20 MHz channels).[8] On the other hand, transmitters will ignore transmitters with incompatible standards or on overlapping channels if the received signal strength from them is below a threshold Pth which, for non Wi-Fi 6 systems, is between -76 and -80 dBm.[9]

IEEE 802.11 RTS/CTS Exchange

CSMA/CA can optionally be supplemented by the exchange of a Request to Send (RTS) packet sent by the sender S, and a Clear to Send (CTS) packet sent by the intended receiver R. Thus alerting all nodes within range of the sender, receiver or both, to not transmit for the duration of the main transmission. This is known as the IEEE 802.11 RTS/CTS exchange. Implementation of RTS/CTS helps to partially solve the hidden node problem that is often found in wireless networking.[10][11]

Performance

CSMA/CA performance is based largely upon the modulation technique used to transmit the data between nodes. Studies show that under ideal propagation conditions (simulations), direct-sequence spread spectrum (DSSS) provides the highest throughput for all nodes on a network when used in conjunction with CSMA/CA and the IEEE 802.11 RTS/CTS exchange under light network load conditions. Frequency hopping spread spectrum (FHSS) follows distantly behind DSSS with regard to throughput with a greater throughput once network load becomes substantially heavy. However, the throughput is generally the same under real world conditions due to radio propagation factors.[4]

Usage

See also

References

  1. ^ "Federal Standard 1037C". Its.bldrdoc.gov. Retrieved 2012-09-09.
  2. ^ "American National Standard T1.523-2001, Telecom Glossary 2000". Atis.org. Archived from the original on 2008-03-02. Retrieved 2012-09-09.
  3. ^ "Study of different CSMA/CA IEEE 802.11-based implementations, Universitat Politècnica de Catalunya" (PDF). Archived from the original (PDF) on 2012-03-06. Retrieved 2012-09-09.
  4. ^ a b Viral V. Kapadia; Sudarshan N. Patel; Rutvij H. Jhaveri (2010). "Comparative study of hidden node problem and solution using different techniques and protocols, Journal of Computing". arXiv:1003.4070 [cs.NI].
  5. ^ Kaixin Xu; Mario Gerla; Sang Bae. "How Effective is the IEEE 802.11 RTS/CTS Handshake in Ad Hoc Networks?" (PDF). UCLA. Retrieved 28 September 2012.
  6. ^ "How does Carrier Sensing and Interference impact Wi-Fi performance?" (PDF). Retrieved 15 March 2023.
  7. ^ Park, Kihong. "Wireless Lecture Notes" (PDF). Purdue. Retrieved 28 September 2012.
  8. ^ "Channel Bonding in WiFi and Radio Frequency Physics | Network Computing".
  9. ^ Effect of adjacent-channel interference in IEEE 802.11 WLANs - Eduard Garcia Villegas; Elena Lopez-Aguilera; Rafael Vidal; Josep Paradells (2007)
  10. ^ Comer, Douglas. (2009). Computer Networks and Internets. Upper Saddle River, NJ: Pearson Education Inc. ISBN 0-13-504583-5.
  11. ^ "MIT Lecture - Communication Systems Engineering. Dr. Eytan Modiano" (PDF). Archived (PDF) from the original on 2010-06-13. Retrieved 2012-09-09.
  • Computer Networks: a Systems Approach. Peterson & Davie. Morgan Kaufmann, Burlington, MA, USA. ISBN 978-0-12-385138-3. pp128–139