SlideShare une entreprise Scribd logo
1  sur  22
Multiple Access Techniques For
Wireless Communication
Dr. V.Umadevi M.sc (CS&IT),M.Tech (IT), M.Phil.,
PhD., D.Lit.,
Director
Jairams Arts and Science College, Karur
• Introduction
• History
• Multiple Access Techniques
– FDMA
– TDMA
– CDMA
– SDMA
– CSMA
• Wireless Access Collision Avoidance
INTRODUCTION
• Multiple access schemes allow many users
to share a finite amount of radio spectrum
in efficient manner
• As the spectrum is limited, so the sharing is
required to increase the capacity of cell or
over a geographical area by allowing the
available bandwidth to be used at the same
time by different users.
HISTORY
WIRELESS COMMUNICATION :
Wireless communications is a type of data communication
that is performed and delivered wirelessly
In 1894 Guglielmo Marconi began
developing a wireless telegraph (first
transatlantic wireless messages) system using
radio waves
Later wireless applications, including
broadcasting (both audio and video), radar,
and mobile telephony came into existence
Alexander Graham Bell Made a first
Wireless Phone That Ran on Sunshine
This was the initial multiple-access technique for cellular systems in which each
individual user is assigned a pair of frequencies while making or receiving a call
Applications of FDMA
FDMA is used variety of applications such as telephone systems, radio systems, TV
Advantages of FDMA
1.Simple to implement
2.Efficient with small base population
Disadvantages of FDMA
1.Network and spectrum planning are time consuming
2.Channels are dedicated to single user
In FDMA, the available bandwidth of the common channel
is divided into bands that are separated by guard bands.
Continuous transmission
Narrow bandwidth
Low overhead
Simple hardware at mobile unit and BS : (1) no digital processing needed (2) ease of
framing and synchronization.
FDMA can be used with both analogue and digital signal.
FDMA requires high-performing filters in the radio hardware, in contrast to TDMA
and CDMA.
FDMA is not vulnerable to the timing problems that TDMA has.
 Due to the frequency filtering, FDMA is not sensitive to near far problem.
TDMA is digital transmission technology that allows a number of users to access a single
radio-frequency (RF) channel without interference by allocating unique time slots to each
user within each channel.
TDMA divides each cellular channel into three time slots in order to increase the amount of
data that can be carried.
Applications of TDMA
TDMA is used variety of applications such as 2G cellular system,GSM
Advantages of TDMA
1. TDMA can easily adapt to transmission of data as well as
voice communication
2.Ability to carry 64 kbps to 120 Mbps of data rates
3.Most cost effective technology to convert an analog
system to digital.
Disadvantages of TDMA
1.Dropped calls are possible
2.Higher costs due greater equipment
In TDMA, the bandwidth is just one channel that is
timeshared between different stations.
In CDMA, one channel carries all transmissions
simultaneously.
“CLOCK” is required for TDMA.
All transmitters and receivers must be aware of this ``clock'' to schedule
their transmissions and receptions and transmissions are synchronized.
In cellular telephone systems a clock signal indicates the beginning of
timeslots is transmitted by the base stations. From this signals, mobile
stations can determine when their turn comes up.
Features
Shares single carrier frequency with multiple users.
Non-continuous transmission. This results in low battery consumption
since the subscriber transmitter can be turned OFF when not in use.
Slots can be assigned on demand in dynamic TDMA.
Global Systems for Mobile communications (GSM) uses the TDMA
technique.
CDMA is a form of multiplexing, which allows numerous signals to occupy a single
transmission channel, optimizing the use of available bandwidth. The technology is used
in ultra-high-frequency (UHF) cellular telephone systems in the 800-MHz and 1.9-GHz
bands.
Applications of CDMA
CDMA is used variety of applications such as 3G cellular system , LTE , Satellite
communication, Data security, GPS
Advantages of CDMA
1.Better signal quality
2.High data rates
3.Impossible for hackers to decipher the code sent.
Disadvantages of CDMA
1. Self-jamming(if sync not done b/w users)
2. As the number of users increases, the overall quality of service decreases
CDMA is Full Duplex
Eliminates need to engineer reuse pattern
Increases Capacity by about 6 times
Multipath reception improves voice clarity
Security or Interference rejection : Cross-correlating the code signal with a
narrowband signal spreads the power of the narrowband signal, thereby reducing the
interfering information bandwidth.
Forward Link Power Control :
The BTS independently adjusts the power
based on the information it receives from
the mobile.
Reverse Link Power Control:
Open Loop: Prior to any transmission, the mobile monitors the total power
received by the base station.
Closed Loop: The base station provides continuous feedback to each mobile
so that the mobile varies its power accordingly.
Forward Link Channels
Reverse Link Channels
Consists of the following components
Mobile user/subscriber (MS)
Base Trans/Receive Station (BTS) & Antennae
Mobile Switching Center (MSC)
Authentication Center (AC)
Operation, Administration & Maintenance (OAM)
IOS: Interoperability Specification
IWF: Interworking Function
There are four stages or modes
in CDMA call processing
Land to Mobile Call
Mobile to Land Call
Mobile to Mobile
Call in different
network
SDMA serves different users by using spot beam (A spot beam, in
telecommunications parlance, is a satellite signal that is specially
concentrated in power (i.e. sent by a high-gain antenna) so that it will cover
only a limited geographic area on Earth) antenna , sectorized antennas can
be thought as SDMA
Applications of SDMA
OPTOELECTRONICS, Satellite communication
Advantages of SDMA
1.Increses channel capacity and transmission quality
2.High data rates Tb/sec throughput
3.Purely optical signal path
Disadvantages of SDMA
1. Interfacing problem
Carrier sense multiple access (CSMA) is a probabilistic media access control (MAC)
protocol in which a node verifies the absence of other traffic before transmitting on
transmission medium.
CSMA is set of rule that which the device attached to the network first determine
whether the channel or carrier is in use or free and then act accordingly.
Type of CSMA:
Persistence CSMA
Non-persistence CSMA
Multiple Access Collision Avoidance
Multiple Access with Collision Avoidance (MACA) is a protocol for slotted media access
control used in wireless LAN data transmission. MACA is used to avoid data collisions
caused by hidden station problems as well as simplifying known exposed station problems.
Thank you!

Contenu connexe

Tendances

Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Pallepati Vasavi
 

Tendances (20)

Multiplexing in mobile computing
Multiplexing in mobile computingMultiplexing in mobile computing
Multiplexing in mobile computing
 
Multiple access techniques for wireless communications
Multiple access techniques for wireless communicationsMultiple access techniques for wireless communications
Multiple access techniques for wireless communications
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 
2.2 frequency division multiple access
2.2   frequency division multiple access2.2   frequency division multiple access
2.2 frequency division multiple access
 
Evolution of mobile radio communication
Evolution of mobile radio communicationEvolution of mobile radio communication
Evolution of mobile radio communication
 
Multiple Access
Multiple AccessMultiple Access
Multiple Access
 
Radio propagation
Radio propagationRadio propagation
Radio propagation
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
 
Examples of wireless communication systems
Examples of wireless communication systemsExamples of wireless communication systems
Examples of wireless communication systems
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
 
SPACE DIVISION MULTIPLEXING (SDMA)
SPACE DIVISION MULTIPLEXING (SDMA)SPACE DIVISION MULTIPLEXING (SDMA)
SPACE DIVISION MULTIPLEXING (SDMA)
 
FDMA-TDMA-CDMA
FDMA-TDMA-CDMAFDMA-TDMA-CDMA
FDMA-TDMA-CDMA
 
Frequency Division Multiplexing Access (FDMA)
Frequency Division Multiplexing Access (FDMA)Frequency Division Multiplexing Access (FDMA)
Frequency Division Multiplexing Access (FDMA)
 
Fdma tdma-cdma-151223125532
Fdma tdma-cdma-151223125532Fdma tdma-cdma-151223125532
Fdma tdma-cdma-151223125532
 
TDMA Time Division Multiple Access
TDMA Time Division Multiple AccessTDMA Time Division Multiple Access
TDMA Time Division Multiple Access
 
Unit 2
Unit 2Unit 2
Unit 2
 
Handoff in Mobile Communication
Handoff in Mobile CommunicationHandoff in Mobile Communication
Handoff in Mobile Communication
 
FDMA
FDMAFDMA
FDMA
 
2.3 time division multiple access
2.3   time division multiple access2.3   time division multiple access
2.3 time division multiple access
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 

Similaire à Multiple access techniques for wireless communication

Cellular concept
Cellular conceptCellular concept
Cellular concept
getvibha
 
tdma-120520122131-phpapp02.pdf
tdma-120520122131-phpapp02.pdftdma-120520122131-phpapp02.pdf
tdma-120520122131-phpapp02.pdf
Prince500060
 

Similaire à Multiple access techniques for wireless communication (20)

Multiple access communication
Multiple access communicationMultiple access communication
Multiple access communication
 
04_20.pptx
04_20.pptx04_20.pptx
04_20.pptx
 
Cellular concept
Cellular conceptCellular concept
Cellular concept
 
tdma-120520122131-phpapp02.pdf
tdma-120520122131-phpapp02.pdftdma-120520122131-phpapp02.pdf
tdma-120520122131-phpapp02.pdf
 
Unit i
Unit iUnit i
Unit i
 
CDMA- INTRO BASICS
CDMA- INTRO BASICSCDMA- INTRO BASICS
CDMA- INTRO BASICS
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
W cdma
W cdmaW cdma
W cdma
 
4G
4G4G
4G
 
GSM
GSM GSM
GSM
 
GSM & CDMA TECHNOL
GSM & CDMA TECHNOLGSM & CDMA TECHNOL
GSM & CDMA TECHNOL
 
GSM & CDMA
GSM & CDMAGSM & CDMA
GSM & CDMA
 
CDMA Presentation
CDMA PresentationCDMA Presentation
CDMA Presentation
 
Different multiple access technologies.
Different multiple access technologies.Different multiple access technologies.
Different multiple access technologies.
 
2gppt410
2gppt4102gppt410
2gppt410
 
Time division multiple access
Time division multiple accessTime division multiple access
Time division multiple access
 
Tech_Talk__Institute_Of_Technology_University_Of_Moratuwa_For_Sales_Team.pdf
Tech_Talk__Institute_Of_Technology_University_Of_Moratuwa_For_Sales_Team.pdfTech_Talk__Institute_Of_Technology_University_Of_Moratuwa_For_Sales_Team.pdf
Tech_Talk__Institute_Of_Technology_University_Of_Moratuwa_For_Sales_Team.pdf
 
doc_raj.docx
doc_raj.docxdoc_raj.docx
doc_raj.docx
 
Compare Between CDMA,TDMA and GSM
Compare Between CDMA,TDMA and GSMCompare Between CDMA,TDMA and GSM
Compare Between CDMA,TDMA and GSM
 
MULTIPLE ACCESS TECHNIQUE-2.pptx
MULTIPLE ACCESS TECHNIQUE-2.pptxMULTIPLE ACCESS TECHNIQUE-2.pptx
MULTIPLE ACCESS TECHNIQUE-2.pptx
 

Plus de Dr.Umadevi V (12)

Data Structures 8
Data Structures 8Data Structures 8
Data Structures 8
 
Data Structures 7
Data Structures 7Data Structures 7
Data Structures 7
 
Data Structures 6
Data Structures 6Data Structures 6
Data Structures 6
 
Data Structures 5
Data Structures 5Data Structures 5
Data Structures 5
 
Data Structures 4
Data Structures 4Data Structures 4
Data Structures 4
 
Data Structures 3
Data Structures 3Data Structures 3
Data Structures 3
 
Data Structures 2
Data Structures 2Data Structures 2
Data Structures 2
 
Data Structures
Data StructuresData Structures
Data Structures
 
computer architecture 4
computer architecture 4 computer architecture 4
computer architecture 4
 
Computer architecture 3
Computer architecture 3Computer architecture 3
Computer architecture 3
 
computer architecture
computer architecture computer architecture
computer architecture
 
computer architecture
computer architecture computer architecture
computer architecture
 

Dernier

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
fonyou31
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 

Dernier (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 

Multiple access techniques for wireless communication

  • 1. Multiple Access Techniques For Wireless Communication Dr. V.Umadevi M.sc (CS&IT),M.Tech (IT), M.Phil., PhD., D.Lit., Director Jairams Arts and Science College, Karur
  • 2. • Introduction • History • Multiple Access Techniques – FDMA – TDMA – CDMA – SDMA – CSMA • Wireless Access Collision Avoidance
  • 3. INTRODUCTION • Multiple access schemes allow many users to share a finite amount of radio spectrum in efficient manner • As the spectrum is limited, so the sharing is required to increase the capacity of cell or over a geographical area by allowing the available bandwidth to be used at the same time by different users.
  • 4. HISTORY WIRELESS COMMUNICATION : Wireless communications is a type of data communication that is performed and delivered wirelessly In 1894 Guglielmo Marconi began developing a wireless telegraph (first transatlantic wireless messages) system using radio waves Later wireless applications, including broadcasting (both audio and video), radar, and mobile telephony came into existence Alexander Graham Bell Made a first Wireless Phone That Ran on Sunshine
  • 5. This was the initial multiple-access technique for cellular systems in which each individual user is assigned a pair of frequencies while making or receiving a call Applications of FDMA FDMA is used variety of applications such as telephone systems, radio systems, TV Advantages of FDMA 1.Simple to implement 2.Efficient with small base population Disadvantages of FDMA 1.Network and spectrum planning are time consuming 2.Channels are dedicated to single user
  • 6. In FDMA, the available bandwidth of the common channel is divided into bands that are separated by guard bands.
  • 7. Continuous transmission Narrow bandwidth Low overhead Simple hardware at mobile unit and BS : (1) no digital processing needed (2) ease of framing and synchronization. FDMA can be used with both analogue and digital signal. FDMA requires high-performing filters in the radio hardware, in contrast to TDMA and CDMA. FDMA is not vulnerable to the timing problems that TDMA has.  Due to the frequency filtering, FDMA is not sensitive to near far problem.
  • 8. TDMA is digital transmission technology that allows a number of users to access a single radio-frequency (RF) channel without interference by allocating unique time slots to each user within each channel. TDMA divides each cellular channel into three time slots in order to increase the amount of data that can be carried. Applications of TDMA TDMA is used variety of applications such as 2G cellular system,GSM Advantages of TDMA 1. TDMA can easily adapt to transmission of data as well as voice communication 2.Ability to carry 64 kbps to 120 Mbps of data rates 3.Most cost effective technology to convert an analog system to digital. Disadvantages of TDMA 1.Dropped calls are possible 2.Higher costs due greater equipment
  • 9. In TDMA, the bandwidth is just one channel that is timeshared between different stations.
  • 10. In CDMA, one channel carries all transmissions simultaneously.
  • 11. “CLOCK” is required for TDMA. All transmitters and receivers must be aware of this ``clock'' to schedule their transmissions and receptions and transmissions are synchronized. In cellular telephone systems a clock signal indicates the beginning of timeslots is transmitted by the base stations. From this signals, mobile stations can determine when their turn comes up. Features Shares single carrier frequency with multiple users. Non-continuous transmission. This results in low battery consumption since the subscriber transmitter can be turned OFF when not in use. Slots can be assigned on demand in dynamic TDMA. Global Systems for Mobile communications (GSM) uses the TDMA technique.
  • 12. CDMA is a form of multiplexing, which allows numerous signals to occupy a single transmission channel, optimizing the use of available bandwidth. The technology is used in ultra-high-frequency (UHF) cellular telephone systems in the 800-MHz and 1.9-GHz bands. Applications of CDMA CDMA is used variety of applications such as 3G cellular system , LTE , Satellite communication, Data security, GPS Advantages of CDMA 1.Better signal quality 2.High data rates 3.Impossible for hackers to decipher the code sent. Disadvantages of CDMA 1. Self-jamming(if sync not done b/w users) 2. As the number of users increases, the overall quality of service decreases
  • 13. CDMA is Full Duplex Eliminates need to engineer reuse pattern Increases Capacity by about 6 times Multipath reception improves voice clarity Security or Interference rejection : Cross-correlating the code signal with a narrowband signal spreads the power of the narrowband signal, thereby reducing the interfering information bandwidth.
  • 14. Forward Link Power Control : The BTS independently adjusts the power based on the information it receives from the mobile. Reverse Link Power Control: Open Loop: Prior to any transmission, the mobile monitors the total power received by the base station. Closed Loop: The base station provides continuous feedback to each mobile so that the mobile varies its power accordingly.
  • 16. Consists of the following components Mobile user/subscriber (MS) Base Trans/Receive Station (BTS) & Antennae Mobile Switching Center (MSC) Authentication Center (AC) Operation, Administration & Maintenance (OAM) IOS: Interoperability Specification IWF: Interworking Function
  • 17. There are four stages or modes in CDMA call processing Land to Mobile Call Mobile to Land Call Mobile to Mobile Call in different network
  • 18. SDMA serves different users by using spot beam (A spot beam, in telecommunications parlance, is a satellite signal that is specially concentrated in power (i.e. sent by a high-gain antenna) so that it will cover only a limited geographic area on Earth) antenna , sectorized antennas can be thought as SDMA Applications of SDMA OPTOELECTRONICS, Satellite communication Advantages of SDMA 1.Increses channel capacity and transmission quality 2.High data rates Tb/sec throughput 3.Purely optical signal path Disadvantages of SDMA 1. Interfacing problem
  • 19. Carrier sense multiple access (CSMA) is a probabilistic media access control (MAC) protocol in which a node verifies the absence of other traffic before transmitting on transmission medium. CSMA is set of rule that which the device attached to the network first determine whether the channel or carrier is in use or free and then act accordingly. Type of CSMA: Persistence CSMA Non-persistence CSMA
  • 20.
  • 21. Multiple Access Collision Avoidance Multiple Access with Collision Avoidance (MACA) is a protocol for slotted media access control used in wireless LAN data transmission. MACA is used to avoid data collisions caused by hidden station problems as well as simplifying known exposed station problems.