
- DCN Tutorial
- Data Comm & Networks Home
- DCN - Overview
- DCN - Computer Network Types
- DCN - Network LAN Technologies
- DCN - Computer Network Topologies
- DCN - Computer Network Models
- DCN - Computer Network Security
- Physical Layer
- DCN - Physical Layer Introduction
- DCN - Digital Transmission
- DCN - Analog Transmission
- DCN - Transmission media
- DCN - Wireless Transmission
- DCN - Multiplexing
- DCN - Network Switching
- Data Link Layer
- DCN - Data Link Layer Introduction
- DCN - Error detection and Correction
- DCN - Data Link Control & Protocols
- Network Layer
- DCN - Network Layer Introduction
- DCN - Network Addressing
- DCN - Routing
- DCN - Internetworking
- DCN - Network Layer Protocols
- Transport Layer
- DCN - Transport Layer Introduction
- DCN - Transmission Control Protocol
- DCN - User Datagram Protocol
- Application Layer
- DCN - Application Layer Introduction
- DCN - Client-Server Model
- DCN - Application Protocols
- DCN - Network Services
- DCN Useful Resources
- DCN - Quick Guide
- DCN - Useful Resources
Multiple Access with Collision Avoidance (MACA)
Multiple Access with Collision Avoidance (MACA) is a medium access control (MAC) layer protocol used in wireless networks, with a view to solve the hidden terminal problem. It also provides solution to the exposed terminal problem. The MAC layer protocol IEEE 802.11 RTS/CTS has been adopted from MACA.
Working Principle
The MACA protocol works with the condition that the stations are synchronized and frame sizes and data speed are the same. It involves transmission of two frames called RTS and CTS prior to data transmission. RTS stands for Request to Send and CTS stands for Clear to Send.
Let us consider that a transmitting station STA has data frame to send to a receiving station STB. The operation works as follows:
Station STA sends a RTS frame to the receiving station.
On receiving the RTS, station STB replies by sending a CTS frame.
On receipt of CTS frame, station STA begins transmitting its data frame.
After successful receipt of the data frame, station STB sends an ACK frame (acknowledgement frame).
The sequence is illustrated as follows:
Any station than can hear RTS is close to the transmitting station and remains silent long enough for the CTS, or waits for a certain time period. If the RTS is not followed by a CTS, the maximum waiting time is the RTS propagation time.
Any station that can hear the CTS is close to the receiving station and remains silent during the data transmission. It attempts for transmission after hearing the ACK.
MACA is a non-persistent slotted protocol. This implies that if the medium is detected as busy, a station waits for a random time period after the beginning of a time slot and then it sends an RTS. This assures fair access to the medium.
- Related Articles
- What is CSMA with collision avoidance?
- CSMA with Collision Avoidance (CSMA/CA)\n
- What are collision avoidance techniques(DBMS)?
- Deadlock Avoidance
- Multiple Access Protocols in Computer Networks
- What is CSMA with collision detection?
- What is Carrier Sense Multiple Access (CSMA)?
- What is carrier sense multiple access protocols?
- CSMA with Collision Detection (CSMA/CD)\n
- What are different types of multiple access protocols?
- Collision Theory
- CDMA (Code Division Multiple Access) and its Java Implementation
- Avoidance Learning: Meaning And Significance
- Escape Learning Vs. Avoidance Learning
- Collision-Free Protocols
