Skip to main content

Part of the book series: Computer Communications and Networks ((CCN))

  • 747 Accesses

Abstract

The ultimate task of a communication system is the exchange of payload messages among a set of nodes via a physical medium. If the medium is shared among these nodes, methods controlling medium occupancy called medium access schemes are applied.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 64.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Even if a message type is assigned to a mode and a slot, this does not imply that in every such slot, a message of this type is to be sent. Especially sporadic messages are only sent from time to time. In particular, in some occurrences of slot s14, there may be no message to be sent.

  2. 2.

    In a variant of IEEE 802.11, the point coordinator can also contend for medium access during the contention period. This extension is referred to as Hybrid Coordination Function (HCF).

  3. 3.

    The risk of collisions is further reduced by exchanging an RTS-CTS sequence before the actual data transmission. Since we are focusing on medium access schemes, we will not discuss this further.

Literature

Chair for Networked Systems

  1. Gotzhein R (2014) ProNet 4.0—a wireless real-time communication system for Industry 4.0. White Paper, Networked Systems Group, Department of Computer Science, University of Kaiserslautern. http://vs.informatik.uni-kl.de/publications/2014/Go14/whitePaperEN-ProNet4.0.pdf. Last accessed: Aug 27 2019

  2. Braun T, Gotzhein R, Kuhn T (2014) Mode-based scheduling with fast mode-signaling—a method for efficient usage of network time slots. In: Proceedings of the 6th international conference on computer science and information technology (ICCSIT 2013), Paris, France, 20–21 Dec 2013. Journal of Advances in Computer Networks (JACN) 2(1):48–57

    Article  Google Scholar 

  3. Gotzhein R, Kuhn T (2012) Zeit-und Prioritäts-gesteuerter Sende/Empfangsknoten, Deutsches Patent-und Markenamt, Az 10 2010 039 488, June 6, 2012 (date of granting)

    Google Scholar 

  4. Braun T (2016) Reliable mode-based communication and virtual prototyping in the development of distributed real-time systems, PhD Thesis (in German), Computer Science Department, University of Kaiserslautern

    Google Scholar 

  5. Braun T, Gotzhein R (2017) Zeit-und Prioritäts-gesteuerter Sende/Empfangsknoten—Technische Realisierungen mit FlexRay und LIN, Deutsches Patent-und Markenamt, Az 10 2012 200 475, Oct 17, 2013 (date of granting); European Patent Register, EP2614996 B1, Nov 11, 2017 (date of granting)

    Google Scholar 

Further References

  1. Etschberger K (2001) Controller area network—basics, protocols, chips, and applications. IXXAT Press

    Google Scholar 

  2. Chipcon AS (2019) CC2420 ZigBee-ready RF transceiver. http://www-inst.eecs.berkeley.edu/~cs150/Documents/CC2420.pdf. Last accessed: 27 Aug 2019

  3. Chen D, Nixon M, Mok A (2010) WirelessHART™—real-time mesh network for industrial automation. Springer

    Google Scholar 

  4. FlexRay Consortium (2011) FlexRay communications system—protocol specification v3.0.1

    Google Scholar 

  5. Führer T, Müller B, Dieterle W, Hartwich F, Hugel R, Walther M (2000) Time triggered communication on CAN (Time Triggered CAN—TTCAN). In: 7th international CAN conference, Amsterdam

    Google Scholar 

  6. Institute of Electrical and Electronics Engineers (2012) IEEE Standard 802 part 11: wireless LAN medium access control (MAC) and physical layer (PHY) specifications. IEEE Computer Society, New York, NY, USA, Feb 2012

    Google Scholar 

  7. Institute of Electrical and Electronics Engineers (2011) IEEE Standard 802 part 15.4: low-rate wireless personal area networks (LR-WPANs). IEEE Computer Society, New York, USA, Sep 2011

    Google Scholar 

  8. MEMSIC Inc (2019) Imote 2 datasheet. https://vs.cs.uni-kl.de/downloads/Imote2NET_ED_Datasheet.pdf. Last accessed: 27 Aug 2019

  9. Kopetz H, Grünsteidl G (1993) TTP—a time-triggered protocol for fault-tolerant real-time systems, Digest of papers, 23rd international symposium on fault-tolerant computing (FTCS-23), Toulouse, France, 22–24 June 1993, pp 524–533

    Google Scholar 

  10. Pal A, Dogan A, Özgüner F (2002) MAC layer protocols for real-time traffic in ad-hoc wireless networks. In: Proceedings of the IEEE international conference on parallel processing (ICPP’02), Washington DC, USA, 2002, pp 539–546

    Google Scholar 

  11. International Electrotechnical Commission (IEC) (2010) Industrial communication networks—wireless communication network and communication profiles—WirelessHART (IEC 62591 ed 1.0), Geneva, Switzerland, April 2010

    Google Scholar 

  12. ZigBee™ Alliance (2005) ZigBee specification, version 1.0, June 2005, 378p. www.zigbee.org. Last accessed 27 Aug 2019

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Reinhard Gotzhein .

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Gotzhein, R. (2020). Medium Access Schemes. In: Real-time Communication Protocols for Multi-hop Ad-hoc Networks. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-030-33319-5_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-33319-5_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-33318-8

  • Online ISBN: 978-3-030-33319-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics