Skip to main content

Medium Access Etiquettes and Protocols

  • Chapter
  • First Online:
Sharing RF Spectrum with Commodity Wireless Technologies

Part of the book series: Signals and Communication Technology ((SCT))

  • 669 Accesses

Abstract

Accommodating multiple access to spectrum resources is fundamental to wireless networks. In many cases, these access mechanisms operate in the time dimension, sometimes in combination with adaptive selection of the operating frequency. Conventional time-based sharing mechanisms such as TDMA do not fit well with consumer usage, which is generally unstructured. Instead, self-organization based on distributed control is preferable for commodity wireless technologies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Roberts [109].

  2. 2.

    Its cousin is Detect And Avoid – it operates in the frequency domain.

  3. 3.

    Actual throughput depends on the randomization factor as well as on protocol overhead.

  4. 4.

    MCS31 in a 20 MHz channel.

  5. 5.

    Known as the Unlicensed Information Infrastructure bands in the US.

  6. 6.

    This list is an inclusive generalization; not all bands are available in all countries of the world. Support for other frequency bands – e.g. the TV White Space frequencies in the UHF band–is being developed.

  7. 7.

    RTS/CTS is spectrally inefficient and it does not work in a static environment – see also Chap. 7, Sect. 7.6.

  8. 8.

    See IEEE 802.11-2007, Clause 9, MAC sublayer, functional description.

  9. 9.

    This type of sensing allows the 802.11 MAC to be spectrum etiquette compatible.

  10. 10.

    See e.g. Tae-Suk [118].

  11. 11.

    If multiple transmission events are taken into account together, differentiation between transmission errors and collisions becomes possible.

  12. 12.

    See above, Sect. 6.2.1, under Basics.

  13. 13.

    Under the rules of the EDCA and HCCA, a client can request the Access Point to reserve the medium for up to 8,192 μs.

  14. 14.

    Much effort has been invested in developing such a mechanism, but success has been elusive. This should come as no surprise: the coordination effort has to take into account an infinite series of potential interfering BSSes. Operating each BSS on its own channel avoids this problem.

  15. 15.

    In licensed systems, such central coordination is less complex because there is very little unpredictable interference.

  16. 16.

    Lindgren et al. [85] and Barry et al. [19].

  17. 17.

    These have been developed in 802.11 Task Groups 11 k and 11v.

  18. 18.

    See Sect. 6.2.1, under Basics.

  19. 19.

    See Camp [31].

  20. 20.

    See e.g. Zhu [129].

  21. 21.

    See Chap. 4, Sect. 4.2.2 for more details.

  22. 22.

    Fairness in the context of medium access is a very difficult subject – if only because of the many ways in which medium utilization can be measured. See chapter 12.2.5, Fairness.

  23. 23.

    See Xu and Saadawi [126].

  24. 24.

    With such antennas, SNR improves linearly with the number of antenna elements. See also Liu and Li [87].

  25. 25.

    An “exposed node” is a node prevented for transmitting, although that transmission would not interfere with the transmission for which it has to defer.

  26. 26.

    See Ramanathan [105] and Spyropoulos and Raghavendra [114].

  27. 27.

    See Neufeld and Grunwald [99].

  28. 28.

    The deafness issue may be considered a special case of RF coupling asymmetries that can interfere with protocol effectiveness. See also Chap. 7, Sect. 7.2 Legacy Wireless LANs.

  29. 29.

    See Choudhury and Vaidya [39] and Huang et al. [69].

  30. 30.

    See http://www.bluetooth.com/English/SIG/Pages/default.aspx

  31. 31.

    See 802.15.2-2003-Part 15.2: Coexistence of Wireless Personal Area Networks with Other Wireless Devices Operating in Unlicensed Frequency Bands.

  32. 32.

    Some saw it as yet another wireless standard that was destined to join other little used standards in the background of the industry standards scene.

  33. 33.

    The actual difference in performance and spectral efficiency between these two modes of operation is subject to much debate. In general, the price paid for the improved flexibility offered by the TDD is a lower spectral efficiency.

  34. 34.

    See also Chap. 7, Sect. 7.2.4 Frequency Sharing in the family.

  35. 35.

    See also Chap. 11, Sect. 12.2.5 Fairness.

References

  1. M. Barry et al., Distributed control algorithm for service differentiation in wireless frame networks, Proceedings of IEEE INFOCOM (2001)

    Google Scholar 

  2. J. Camp et al., A Measurement Study of Multiplicative Overhead Effects in Wireless Networks. Mobicom (2007)

    Google Scholar 

  3. R. R. Choudhury, N. H. Vaidya, Deafness: A MAC problem in ad hoc networks when using directional antennas, IEEE International Conference on Network Protocols (ICNP) (Berlin, Oct 2004)

    Google Scholar 

  4. Z. Huang et al., A busy-tone based directional MAC protocol for ad hoc networks, Mobicom (2002)

    Google Scholar 

  5. A. Lindgren et al., Evaluation of quality of service schemes for IEEE 802.11wireless LANs, Proceedings of IEEE LCN’2001 (2001)

    Google Scholar 

  6. H. Liu, G. Li, OFDM-Based Broadband Wireless Networks: Design and Optimization (Wiley, Malden, 2005)

    Book  Google Scholar 

  7. M. Neufeld, D. Grunwald, Deafness and virtual carrier sensing with directional Antenna in 802.11 networks, Technical Report CU-CS-971-04, University of Colorado At Boulder, May (2004)

    Google Scholar 

  8. R. Ramanathan, On the performance of Ad hoc networks with beamforming antennas, ACM MobiHoc (2001)

    Google Scholar 

  9. L.G. Roberts, ALOHA packet system with and without slots and capture. Comp. Commun. Rev. 5(2), 28–42 (1975)

    Article  Google Scholar 

  10. A. Spyropoulos, C. Raghavendra, Capacity bounds for adhoc networks using directional antennas, ICC 2003

    Google Scholar 

  11. Tae-Suk, e.a. Improving Spatial Reuse through Tuning Transmit Power, Carrier Sense Threshold, and Data Rate in Multihop Wireless Networks (Mobicom 2006)

    Google Scholar 

  12. S. Xu, T. Saadawi, Does the IEEE 802.11MAC protocol work well in multi-hop wireless ad hoc networks, IEEE Comm. Mag. (2001)

    Google Scholar 

  13. J. Zhu et al., Adaptive CSMA for Scalable Network Capacity in High-Density WLAN: A Hardware Prototyping Approach, IEEE Infocom (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jan Kruys .

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media B.V.

About this chapter

Cite this chapter

Kruys, J., Qian, L. (2011). Medium Access Etiquettes and Protocols. In: Sharing RF Spectrum with Commodity Wireless Technologies. Signals and Communication Technology. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-1585-1_6

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-1585-1_6

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-1584-4

  • Online ISBN: 978-94-007-1585-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics