Fact-checked by Grok 2 weeks ago

Carrier-sense multiple access

Carrier-sense multiple access (CSMA) is a probabilistic media access control (MAC) protocol used in computer networks to manage shared transmission media, in which nodes sense the carrier signal to verify that the channel is idle before initiating data transmission, thereby minimizing the risk of collisions between multiple users. CSMA was originally developed for packet-switched radio networks, with foundational work by Leonard Kleinrock and Fouad A. Tobagi in 1975, who analyzed its throughput-delay performance under various access modes, demonstrating its efficiency in environments with high propagation delays. The protocol operates on the principle of carrier sensing, where a station listens to the medium; if no signal is detected for a specified time, it transmits, but persistent or slotted variants introduce timing mechanisms to further reduce overlap risks. Key variants of CSMA include CSMA/CD () and CSMA/CA (), which adapt the base protocol to specific network types. CSMA/CD, employed in early Ethernet implementations, allows nodes to detect collisions during transmission by simultaneously monitoring the channel in half-duplex mode and employs algorithms for retransmission retries, as standardized in IEEE 802.3-1985 for local area networks operating at speeds up to 10 Mb/s. In contrast, CSMA/CA, which is the core MAC mechanism in wireless LANs (), prioritizes avoidance over detection due to the challenges of collision sensing in half-duplex radio environments; it incorporates mechanisms like request-to-send/clear-to-send () handshakes and distributed inter-frame spacing to mitigate hidden terminal problems and ensure fair access. These adaptations have made CSMA variants foundational to modern networking, supporting everything from wired LANs to ubiquitous wireless communications while addressing issues like channel contention and latency in multi-user scenarios.

Introduction

Definition and Core Principles

Carrier-sense multiple access (CSMA) is a probabilistic media access control (MAC) designed for multi-access networks, in which multiple s share a common such as a bus or . In CSMA, a attempting to transmit first listens to the medium—referred to as the —to determine if it is idle before proceeding, thereby reducing the likelihood of collisions that occur when two or more s transmit simultaneously. This approach contrasts with non-sensing s like by incorporating carrier sensing to improve utilization efficiency in environments prone to contention. The core principles of CSMA revolve around the carrier sensing process and conditional rules. A senses the for ongoing activity; if the medium is detected as idle for a minimum duration—such as a time in slotted variants or a propagation delay in unslotted ones—the initiates . If the is busy, the defers its according to predefined rules, preventing immediate attempts that could exacerbate collisions. These principles aim to coordinate access in shared topologies, ensuring that transmissions are attempted only when the medium is available, though the exact deferral behavior varies across implementations. Key components of CSMA include physical sensing, typically achieved through signal detection mechanisms like detection or to identify transmissions, and logical elements such as interframe spacing to enforce or recovery periods between frames. In bus topologies, sensing relies on electrical signal , while in wireless setups, it depends on detection within the station's range. These components collectively prevent simultaneous transmissions by synchronizing attempts, though they assume ideal sensing conditions. A basic model for in CSMA can be represented by a probability, where the transmission probability P_{tx} is 1 if the carrier is idle and 0 otherwise, reflecting the sensing-based decision process in its simplest form. However, CSMA is vulnerable to issues arising from non-ideal sensing in real-world deployments. The hidden node problem occurs when two stations cannot detect each other's s due to limited sensing range or obstacles, leading to undetected overlaps and collisions at the receiver. Similarly, the exposed terminal problem arises when a station unnecessarily defers because it senses a nearby ongoing that does not interfere with its intended recipient, resulting in underutilized . These vulnerabilities highlight the protocol's sensitivity to characteristics in or extended bus networks.

Historical Development

Carrier-sense multiple access (CSMA) was first proposed in 1973 by at PARC as part of the Ethernet design to interconnect personal computers, adapting concepts from the packet radio network to a medium. , demonstrated in 1971, was the first operational network, using a pure ALOHA random access method that achieved low throughput due to frequent collisions on its UHF channels connecting island-based computers. This system served as a key precursor, highlighting the need for improved collision avoidance in multi-access environments and inspiring subsequent wired and wireless innovations. Metcalfe's implementation on the Alto network, prototyped that year at 2.94 Mbps, incorporated binary exponential backoff for retransmissions, marking an early practical deployment in a wired bus topology. Theoretical foundations were advanced by Leonard Kleinrock, whose queueing theory work in the 1960s laid the groundwork for packet switching efficiency, and formalized in the 1975 paper by Kleinrock and Fouad Tobagi, which analyzed CSMA modes (1-persistent, non-persistent, and p-persistent) for radio channels, demonstrating throughput improvements up to five times over pure ALOHA. Key standardization milestones followed, with the Digital-Intel-Xerox (DIX) consortium publishing the Ethernet specification in 1980, specifying CSMA with (CSMA/CD) for 10 Mbps local area networks using . The standard, ratified in 1983, adopted and expanded this for broader industry use, including fiber optic options, establishing CSMA/CD as the dominant access method for wired Ethernet. Adaptation to occurred with in 1997, introducing CSMA with collision avoidance (CSMA/CA) to handle hidden terminal problems in ad-hoc radio networks, prioritizing avoidance over detection due to propagation challenges. CSMA evolved from shared wired bus topologies in the to wireless ad-hoc networks by the , enabling scalable medium access in diverse environments like early LANs and systems. However, by the 2000s, the rise of full-duplex switched Ethernet and fiber optic backbones in high-speed LANs diminished reliance on CSMA/CD, as switches eliminated shared collision domains and supported simultaneous bidirectional transmission without sensing. IEEE and IETF processes further refined these protocols through ongoing standards updates, ensuring CSMA's legacy in foundational networking while transitioning to point-to-point links in modern infrastructures.

Basic Operation

Carrier Sensing Mechanism

In carrier-sense multiple access (CSMA), the carrier sensing mechanism enables stations to detect ongoing transmissions on the shared medium before attempting to transmit, thereby reducing the likelihood of collisions. This process involves monitoring the channel for activity, typically by assessing signal levels against predefined thresholds. The foundational concept was introduced in the context of networks, where sensing the helps multiplex multiple users efficiently. Carrier sensing in basic CSMA primarily relies on physical detection, which directly measures the medium's state by declaring the busy if detected exceeds a threshold, often denoted as S > \eta, where S is the received signal power and \eta is the sensing threshold calibrated to the expected noise level. Modern implementations, such as those in , may incorporate virtual carrier sensing using higher-layer information to reserve the medium logically. Implementation varies between wired and wireless environments. In wired networks, such as early Ethernet using CSMA/CD, carrier sensing detects voltage levels or signal presence on or twisted-pair cables, ensuring the medium is idle before transmission. In wireless settings, physical sensing typically employs energy detection thresholds. Virtual sensing, where used, complements physical sensing by allowing power-saving during extended reservations. Key timing parameters govern the sensing process to account for propagation delays and ensure fairness. The interframe space requires the medium to remain for a minimum before a can proceed. Slot time, an estimate of round-trip delay plus turnaround, sets the for contention; the medium must be for at least one time to confirm availability. A minimum time, often one , must elapse to mitigate immediate retransmissions. Challenges in carrier sensing arise primarily from propagation delays, creating a "" where distant stations may sense the as idle and transmit simultaneously, leading to collisions. This window equals twice the maximum propagation delay across the network, as analyzed in early CSMA models for radio . or can further degrade sensing accuracy by elevating the perceived , causing false busy detections and reduced throughput.

Transmission and Deferral Rules

In carrier-sense multiple access (CSMA), the transmission process initiates with a station performing carrier sensing to assess the medium's state. If the medium is detected as idle, the station transmits its frame immediately; if busy, it enters a deferral state by continuously monitoring the until it becomes idle. During deferral, stations persist in sensing the medium to detect when it turns idle, at which point they apply contention resolution rules—specific to the access mode—to stagger their transmission attempts and mitigate the risk of synchronized by multiple stations. These rules typically involve randomized delays to desynchronize contending stations, ensuring fairer medium without immediate collisions upon channel clearance. In basic CSMA, collisions are not detected during ; success is typically confirmed via acknowledgments at higher layers. Despite sensing, collisions remain possible because of delay across the network: multiple s may independently the medium as idle and begin transmitting nearly simultaneously, but their signals arrive overlapping at a distant due to varying times, creating a vulnerable period equal to twice the maximum delay.

Access Modes

1-Persistent CSMA

1-Persistent CSMA, also referred to as fully persistent CSMA, operates on the principle that a with a frame ready for continuously monitors the shared medium. If the is sensed as idle, the transmits the frame immediately with probability 1. If the medium is busy, the persists in sensing until it detects idleness and then transmits without delay. This aggressive approach ensures that no opportunity for is missed once the channel clears, but it relies on accurate sensing to mitigate overlaps. In operation, stations engage in persistent carrier sensing throughout busy periods, deferring only until the exact moment the channel becomes available. This immediate transmission behavior, however, introduces the risk of , where queued frames at multiple stations synchronize their attempts post-busy period, potentially causing all to collide. The protocol's simplicity stems from its binary decision rule—no randomization or slotting is involved—making it suitable for environments with reliable sensing. It builds on general CSMA deferral by enforcing full persistence, contrasting with less aggressive modes like p-persistent CSMA that incorporate probabilistic delays. The primary advantage of 1-persistent CSMA lies in its ability to maximize channel utilization under low traffic loads, as stations quickly seize idle periods without unnecessary waits, approaching the more closely than deferential protocols. However, under heavy traffic, it suffers from elevated collision probabilities due to the tendency of multiple deferred stations to transmit in unison immediately after a busy ends, exacerbating . This mode was utilized in early Ethernet prototypes, where collisions could occur within a window equivalent to twice the end-to-end delay, allowing a second to initiate transmission before the first's signal arrives. For a large number of active s, the collision probability can be approximated as P_{\coll} \approx 1 - e^{-[G](/page/G)}, where [G](/page/G) represents the total offered load.

Non-Persistent CSMA

Non-persistent CSMA represents a conservative variant of the carrier sense multiple access , characterized by zero persistence in . In this mode, a wishing to transmit first senses the carrier; if the is idle, it proceeds with transmission immediately. However, if the is busy, the does not continue sensing but instead defers transmission by waiting a random amount of time before reattempting to sense the . The operation relies on a random backoff to schedule retries. Specifically, upon detecting a busy , the station draws a backoff from a and waits until it expires before re-sensing the . This process repeats until the is found idle, at which point occurs. The random delay, often assumed to have a much larger than the packet time, helps stagger attempts across multiple stations. A key advantage of non-persistent CSMA is its ability to reduce collision probability through desynchronization of retry attempts, thereby avoiding the synchronization issues inherent in 1-persistent CSMA. By introducing variability in wait times, it limits the likelihood of multiple stations transmitting simultaneously upon channel clearance. Despite this benefit, non-persistent CSMA incurs disadvantages such as increased from unnecessary waits, even if the channel becomes idle before the backoff expires, resulting in lower throughput compared to more aggressive persistent modes under moderate loads. This protocol finds application in environments with significant propagation delays, such as certain satellite networks, where the random deferral accommodates long round-trip times without exacerbating collisions. Under the assumption of a backoff distribution over the duration of the busy period T_{busy}, the expected wait time E[W] is given by: E[W] = \frac{T_{busy}}{2} This reflects the average residual busy time in renewal-theoretic models of channel occupancy.

p-Persistent CSMA

p-Persistent CSMA, also known as partial persistent CSMA, operates in slotted time-division systems where stations synchronize to discrete time slots. Upon sensing an idle slot, a ready station transmits its packet with probability p (where $0 < p < 1), or defers with probability $1 - p and reattempts in the subsequent slot. If the slot is busy, the station waits for the next slot before sensing again. This probabilistic approach combines elements of persistence and deferral to control access in multi-station environments. The protocol is typically analyzed in bit-map or slotted reservation contexts, where the value of p is selected to optimize system throughput based on the offered load G and number of contending stations. For instance, in networks with n known stations, p = 1/n provides a balanced transmission probability that approximates fair access while reducing collision risks. More generally, the optimal p is determined numerically to maximize throughput. This mode offers advantages in tunable collision control, allowing adaptation to specific network sizes or loads for improved efficiency over fully persistent variants, particularly when station counts are known or estimable. It performs well in scenarios like reservation-based systems using polynomial coding for error detection in slotted access, as explored in early analyses. Despite these benefits, p-persistent CSMA requires tight slot synchronization across distributed stations, which adds overhead and vulnerability to timing errors. Additionally, misestimation of p can lead to suboptimal performance, such as increased collisions if p is too high or channel underutilization if too low.

0-Persistent CSMA

0-Persistent CSMA represents a deterministic variant of protocols, distinguished by its lack of persistence in transmission attempts. In this mode, a station ready to transmit senses the channel; if it detects activity, the station completely defers without immediate retry, instead waiting for its predefined turn in an ordered sequence, such as the next slot in a round-robin cycle. This approach integrates carrier sensing with structured scheduling to ensure orderly access, differing from probabilistic methods by enforcing strict deferral until the assigned opportunity arrives. The operation of 0-persistent CSMA typically relies on centralized or distributed polling mechanisms to coordinate access. A controller or distributed algorithm assigns specific time slots to each station in a cyclic manner, akin to round-robin polling. Upon reaching its slot, the station performs carrier sensing to verify the channel is idle before initiating transmission; if idle, it proceeds, but if not (due to synchronization issues or errors), it may defer to the next cycle. This hybrid structure combines the collision avoidance of carrier sensing with the predictability of polling, making it suitable for environments requiring bounded delays and fairness. In distributed implementations, stations may synchronize via beacons or tokens to maintain the polling order without a central authority. Key advantages of 0-persistent CSMA include the complete elimination of collisions in fully synchronized systems, as each station transmits exclusively in its allocated slot after sensing confirms availability, and inherent fairness through equal slot assignments in the round-robin cycle. This ensures every station receives periodic access opportunities, promoting equitable bandwidth distribution. However, the protocol suffers from notable disadvantages, such as elevated latency in networks with a large number of stations (N), where a station may wait up to a full cycle for its turn, and reduced efficiency under dynamic traffic loads, as fixed slots can lead to idle time when some stations have no data to send. These issues make it less adaptable to bursty or asymmetric traffic patterns compared to more flexible contention-based modes. Practical examples of 0-persistent CSMA appear in hybrid protocols that blend token-passing for cycle enforcement with carrier sensing for collision checks, or in early TDMA integrations for packet radio networks, where slotted access is augmented by CSMA to handle variable loads in wired bus topologies. In such systems with N stations and fixed slot times, the cycle time under perfect synchronization and zero collisions is expressed as: T_{\text{cycle}} = N \times \text{slot\_time} This formula highlights the predictable periodicity, though actual performance depends on synchronization accuracy and polling overhead. As the limiting case of p-persistent CSMA with transmission probability p=0, 0-persistent mode prioritizes full deferral over probabilistic attempts, aligning with structured polling in wired environments like early bus networks.

Protocol Modifications

CSMA with Collision Detection (CSMA/CD)

CSMA/CD extends the basic CSMA protocol by incorporating active collision detection during transmission, allowing stations to monitor the channel simultaneously while sending data and to abort transmission immediately upon detecting a collision, followed by a backoff period before retrying. This enhancement addresses the inefficiency of pure CSMA, where stations might complete transmitting a collided frame without awareness, wasting channel time. In operation, CSMA/CD employs transceivers that allow stations to transmit data while simultaneously monitoring the medium for collisions. If a station senses the channel as idle, it begins transmission; during transmission, it continuously compares the transmitted signal with the received signal to detect discrepancies indicative of a collision from another station. Upon detection—typically within one round-trip propagation time—a station ceases transmission and broadcasts a fixed-length jam signal, such as 32 bits of a predefined pattern, to ensure all involved stations recognize the collision and abort their attempts. After the jam signal, the station waits a random backoff time before reattempting transmission, using truncated binary exponential backoff to reduce the probability of repeated collisions. Key parameters in CSMA/CD include the slot time, defined as twice the maximum propagation delay across the network plus the jam signal transmission time, which ensures collisions are detectable before a frame transmission completes. For standard Ethernet, this corresponds to 512 bit times at 10 Mbps, equating to approximately 51.2 μs. The minimum frame size is set to match this slot time (64 bytes including headers), guaranteeing that any collision occurring at the start of transmission is detected before the frame ends, thus allowing timely abort. CSMA/CD significantly improves channel efficiency in shared bus topologies by minimizing the duration of collision wastes compared to non-detection protocols, enabling higher utilization in local area networks like early implementations. However, it requires a wired, collision-prone medium such as coaxial cable and operates exclusively in half-duplex mode, limiting its applicability to modern full-duplex switched networks. Performance analysis of CSMA/CD, building on foundational CSMA models, approximates the maximum efficiency as S_{\max} \approx \frac{1}{1 + 6.44 a}, where a is the ratio of propagation delay to frame transmission time; this yields efficiencies up to 80-90% under low a values typical of short networks. A prominent example is the IEEE 802.3 standard for 10BASE5 Ethernet, which uses thick coaxial cable in a bus topology and implements CSMA/CD with a 32-bit jam signal, 512-bit slot time, and truncated binary exponential backoff limited to 16 retries before frame discard.

CSMA with Collision Avoidance (CSMA/CA)

CSMA/CA is a media access control protocol designed for wireless networks, where collision detection is impractical due to the difficulty of simultaneously transmitting and listening on the same channel. It employs proactive mechanisms to avoid collisions, primarily through the Request to Send (RTS) and Clear to Send (CTS) handshake, along with the Network Allocation Vector (NAV) to virtually reserve the channel and mitigate the hidden terminal problem. By broadcasting the intended transmission duration in these control frames, nearby stations update their NAV timers to defer access, ensuring the channel is cleared for the sender without physical carrier sensing alone. This approach is particularly suited to environments like wireless LANs, where signal attenuation and interference make traditional collision detection unreliable. The operation of CSMA/CA begins with physical carrier sensing to check if the channel is idle for a Distributed Inter-Frame Space (DIFS) period. If idle, the station may optionally initiate an RTS frame to reserve the channel, especially for larger data frames exceeding a predefined threshold; the receiver responds with a CTS frame after a Short Inter-Frame Space (SIFS), which is shorter than DIFS to prioritize control exchanges. Upon receiving CTS, the sender transmits the data frame, followed by an ACK from the receiver after another SIFS to confirm successful delivery. If the channel is busy or no ACK is received, the station enters a backoff phase, selecting a random slot from the contention window (CW) and waiting before retrying. This process repeats with binary exponential backoff, doubling the CW after each failure up to a maximum. The RTS/CTS mechanism is optional in basic access mode but recommended for hidden terminal scenarios. A key feature of CSMA/CA is its integration into the Distributed Coordination Function (DCF) of the IEEE 802.11 standard, which governs contention-based access in wireless networks. The contention window is adjusted dynamically as \text{CW} = \text{CW}_{\min} \times 2^k, where k is the number of consecutive failures (starting from 0), \text{CW}_{\min} = 31 slots for most variants, and \text{CW} resets to \text{CW}_{\min} on success. In the Bianchi analytical model for saturated networks, the steady-state probability p that a station transmits in a slot approximates the transmission attempt rate as p = \frac{2}{\text{CW} + 1}, providing a basis for evaluating collision probabilities and throughput under high load. CSMA/CA offers significant advantages in wireless settings by mitigating the hidden and exposed node problems through channel reservation, reducing the likelihood of collisions from unseen transmitters. It also supports Quality of Service (QoS) extensions via IEEE 802.11e, which enhances DCF with Enhanced Distributed Channel Access (EDCA) using prioritized access categories and adjustable inter-frame spaces. However, it introduces overhead from frequent control frames like RTS, CTS, and ACKs, which can degrade efficiency in low-contention scenarios or with small packets. Additionally, the protocol is vulnerable to denial-of-service (DoS) attacks, such as flooding with fake RTS frames to exhaust NAV timers and block legitimate access. In practice, CSMA/CA forms the core of Wi-Fi networks under IEEE 802.11b, 802.11g, and 802.11n standards, enabling reliable data exchange in the 2.4 GHz and 5 GHz bands. It can operate in a hybrid mode with the Point Coordination Function (PCF), where the access point alternates between contention-free polling periods and DCF-based contention to balance throughput and latency in infrastructure networks.

CSMA with Collision Resolution (CSMA/CR)

CSMA with Collision Resolution (CSMA/CR) enhances basic CSMA protocols by integrating structured collision resolution techniques, such as binary tree splitting or stack algorithms, to systematically resolve multi-station collisions during transmission without aborting the entire event and requiring full packet retransmissions. These methods allow partial recovery of collided packets by organizing contending stations into a logical tree structure, where feedback from the channel guides the splitting process to isolate successful transmissions. The approach originated in analyses of packet broadcast channels, where tree algorithms were shown to provide stable access under varying loads. In operation, when a collision is detected—typically through ternary feedback indicating idle, success, or collision— the involved stations are virtually divided into subsets (e.g., based on the least significant bit of their addresses for binary splitting). Each subset attempts transmission in subsequent slots; successful single transmissions are acknowledged and removed from contention, while collisions trigger further recursive splitting of the subset until all stations are resolved. This forms a collision resolution interval (CRI) that continues until the channel feedback indicates no further contenders. The process requires a feedback channel for real-time collision detection and can incorporate carrier sensing to defer new arrivals during resolution. The primary advantages of CSMA/CR include significantly higher throughput in high-load scenarios compared to persistent CSMA variants, as it reduces wasted slots by resolving multiple collisions within a single interval rather than through repeated deferrals or backoffs; for instance, the binary tree algorithm achieves a maximum throughput of approximately 0.346 packets per slot under gated access. It also improves efficiency by enabling partial packet recovery, minimizing the impact of bursty traffic. However, disadvantages encompass increased implementation complexity due to the need for synchronized splitting logic and precise feedback mechanisms, as well as potential overhead from the extended CRI in low-collision environments; additionally, it often necessitates a dedicated feedback channel, which may not be feasible in all networks. Examples of CSMA/CR applications include variants like Collision Resolution Diversity ALOHA (CRDA), which combines tree splitting with diversity reception for improved performance in satellite and multi-hop wireless systems, and tree-based protocols in RFID networks for efficient tag identification during reader queries. In these contexts, the algorithm resolves collisions among numerous low-power devices without excessive energy waste. The expected length of the resolution interval E[R] for n collided stations using a binary tree algorithm is given asymptotically by E[R] \approx 2.886 n slots, where the constant reflects the overhead of collision and idle slots in addition to successful transmissions.

Virtual Time CSMA

Virtual Time CSMA (VT-CSMA) is a variant of the carrier sense multiple access protocol that employs logical timestamps, known as virtual times, assigned to packets upon arrival to enforce ordered access and minimize collisions in shared medium networks. Each station maintains two clocks—a real-time clock synchronized across the network and a virtual-time clock that advances only during channel idle periods—to determine transmission eligibility based on the earliest virtual timestamp among queued packets. This approach ensures that stations defer transmission if their packet's virtual time is not the smallest detectable, integrating carrier sensing to check channel idle status before attempting access. In operation, stations increment an epoch counter upon each channel idle period and assign virtual timestamps to incoming packets relative to this counter, effectively ordering transmissions as if in a first-in-first-out (FIFO) queue without centralized coordination. The virtual clock freezes during busy periods and resets to the real clock value when the channel becomes idle, allowing nodes to compute a virtual start time for their packet and transmit only if it aligns with or precedes the current virtual clock reading. If multiple stations sense the channel idle simultaneously, the one with the minimal virtual timestamp proceeds, while others defer until their timestamp becomes eligible, thus avoiding collisions through prioritized logical ordering. The virtual time advances according to the formula V(t) = \min\{\text{arrival times}\} + \text{service time}, where transmissions are ordered by increasing V, approximating ideal FIFO service in low-propagation-delay environments. This mechanism provides advantages such as improved fairness in access among stations and bounded message delays, particularly in dynamic networks where traditional CSMA may suffer from excessive deferrals under load. By decoupling logical ordering from physical time, VT-CSMA achieves higher throughput-delay performance compared to standard persistent CSMA variants, while enabling decentralized approximation of centralized scheduling disciplines like FIFO. However, VT-CSMA introduces overhead from managing virtual timestamps and epoch counters at each station, which can increase protocol complexity and packet header size. Synchronization challenges arise due to reliance on loosely coupled real-time clocks across distributed nodes, potentially leading to minor discrepancies in virtual time alignment that affect ordering accuracy in highly dynamic or large-scale networks. The protocol was originally proposed by Molle and Kleinrock in their 1985 work, which demonstrated its efficacy through analysis and simulation for broadcast channels. Extensions of VT-CSMA have been applied in hard real-time systems, such as distributed control environments, and in wireless sensor networks requiring prioritized, collision-free access for time-sensitive data.

Performance Analysis

Throughput and Efficiency Metrics

In carrier sense multiple access (CSMA) protocols, throughput S represents the fraction of time the channel is used for successful packet transmissions and is expressed as S = G (1 - P_{\text{coll}}), where G is the offered load (average number of transmission attempts per packet duration) and P_{\text{coll}} is the probability of a collision during a transmission attempt. Efficiency in CSMA is primarily affected by propagation delay (parameter a = \tau / T, with \tau as the end-to-end propagation delay and T as the average packet transmission time), the number of active stations n, and the offered load G; as n increases under finite population models, collision rates rise, reducing overall efficiency, while higher G amplifies contention. The maximum throughput is constrained by these factors, approximating S_{\max} \approx 1/(2a + 1) in propagation-limited scenarios akin to slotted variants, where delays extend the vulnerable period for collisions. Key performance metrics include channel utilization (equivalent to S) and delay variance, which analytical models bound using renewal processes, with simulations confirming close matches to these bounds under Poisson arrivals and infinite populations; for finite n, variance increases due to burstier traffic patterns. Persistence levels influence these metrics distinctly: 1-persistent CSMA achieves rapid throughput growth at low G by immediate transmission upon sensing idle but saturates prematurely at higher loads due to elevated collision risks, whereas non-persistent variants maintain better efficiency across a broader load range by deferring attempts. The seminal Kleinrock-Tobagi analysis derives the throughput for non-persistent CSMA as S = G e^{-G} \left(1 - \left(1 + G + \frac{G^{2}}{2}\right) e^{-G}\right), which highlights vulnerability to overlapping arrivals during sensing and transmission phases under idealized zero-propagation delay. Protocol modifications, such as collision detection in CSMA/CD, can enhance these metrics by truncating failed transmissions and reducing wasted channel time.

Collision Probability Models

In carrier-sense multiple access (CSMA) protocols, collision probability models quantify the likelihood of simultaneous transmissions from multiple stations, which degrade channel efficiency. These models typically assume an infinite population of stations generating packets according to a Poisson process with offered load G (in packets per packet transmission time), geometric retransmission attempts upon failure, and a constant packet length. Seminal derivations by Tobagi and Kleinrock establish the foundational framework for unslotted and slotted variants across persistence levels, incorporating factors like propagation delay a = \tau / T (where \tau is the end-to-end propagation delay and T is the packet duration). Under the infinite population assumption, the basic model computes channel states as follows: the probability of an idle channel is P_{\text{idle}} = e^{-G}, reflecting no arrivals during the observation interval. The success probability P_{\text{success}} accounts for no interfering arrivals during the vulnerable period, which spans the propagation delay and potential transmission start. For non-persistent unslotted , P_{\text{success}} = e^{-aG}, as a new transmission only commences after sensing idle for the propagation time. The collision probability is then P_{\text{coll}} = 1 - P_{\text{idle}} - P_{\text{success}}, capturing overlaps from unsynchronized attempts. These probabilities feed into throughput as S = G \cdot P_{\text{success}}, but the model highlights how collisions dominate at high G > 1. Persistence and significantly influence collision risks. In 1-persistent CSMA, stations transmit immediately upon sensing , increasing P_{\text{coll}} due to higher aggressiveness; for unslotted with negligible a, an yields P_{\text{success}} \approx G e^{-2G}, akin to pure but adjusted for sensing benefits in low-load regimes. Slotted CSMA reduces the vulnerable period to one , halving collision exposure compared to unslotted, yielding P_{\text{success}} = e^{-G} for non-persistent cases under perfect . p-Persistent variants randomize transmission with probability p, lowering P_{\text{coll}} by balancing persistence (optimal p \approx 0.5 minimizes overlaps). Assumptions of geometric retransmissions ensure steady-state analysis, where each retry succeeds with fixed probability independent of history. Advanced models employ to capture finite populations and backoff dynamics, particularly in CSMA/CA with binary exponential backoff. Bianchi's models the backoff stage and counter for each station under (always packets pending). The steady-state transmission probability \tau (probability of attempting transmission in a ) satisfies: \tau = \frac{2(1-2p)(1-p^m)}{W(1-(2p)^m)(1-p) + (1-2p)(1-p^{m+1})} where p is the conditional collision probability, m is the maximum backoff stage, and W is the initial contention window. For n stations, p = 1 - (1 - \tau)^{n-1}, assuming independent attempts and no capture. This bidirectional fixed-point solution reveals how backoff contention amplifies p at high n, with geometric retransmissions implicit in the constant p. The model assumes ideal channel conditions without hidden terminals. In wireless CSMA deployments, the hidden node problem—where stations cannot sense each other due to range limits—multiplies collision probability beyond the basic model, as carrier sensing fails to prevent overlaps from unsensed transmissions. Tobagi and Kleinrock first quantified this effect, showing it extends the effective vulnerable period and elevates P_{\text{coll}} by a topology-dependent factor (e.g., up to 2-3 times in linear networks).

Applications

In Wired Networks

Carrier-sense multiple access with (CSMA/CD) found its primary application in early Ethernet local area networks (LANs), where it managed access to shared media such as cables (e.g., thick or thin ) and twisted-pair wiring (e.g., 10BASE-T). In these setups, multiple devices connected to a common bus or via /hubs, requiring CSMA/CD to detect and resolve collisions arising from simultaneous transmissions on the shared medium. This protocol ensured fair access while minimizing idle time, forming the backbone of wired LANs from the onward. Adaptations of CSMA/CD in wired networks included its use with half-duplex hubs, which extended shared collision domains across multiple segments of twisted-pair cabling. However, the protocol's relevance declined sharply in the with the widespread adoption of Ethernet switches and full-duplex operation, which eliminated shared media and collisions entirely by providing dedicated point-to-point links. Full-duplex Ethernet, standardized in , further accelerated this shift, rendering CSMA/CD obsolete for most general-purpose LANs as switched networks became dominant. Despite its decline in standard office environments, CSMA variants retain niche relevance in industrial and automotive applications. In automotive networks, the employs a variant of CSMA with , akin to CSMA/CD principles, to enable collision-free message priority resolution on shared twisted-pair wiring among electronic control units. These adaptations prioritize reliability in harsh, multi-node environments over the pure collision-detection model of . Key challenges in deploying CSMA/CD over wired media include limitations on cable length due to delays, which must be less than half the minimum time to ensure reliable across the network diameter. For instance, 10 Mbps Ethernet restricted segment lengths to about 500 meters for or 100 meters for twisted-pair to accommodate these delays. In noisy settings, electrical can trigger false collisions or corrupt jam signals, necessitating robust shielding and error-checking mechanisms to maintain integrity. Representative examples include the 10 Mbps Ethernet standard (), which relied on CSMA/CD for bus-based topologies, and its 100 Mbps extension (100BASE-TX), which supported half-duplex CSMA/CD operation in legacy shared-hub configurations before full-duplex prevailed. Integration with bridges allowed CSMA/CD networks to connect disparate segments, such as linking 10 Mbps coaxial buses to 100 Mbps twisted-pair LANs, by filtering traffic and reducing effective collision domains without altering the core access protocol.

In Wireless Networks

In wireless networks, Carrier Sense Multiple Access (CSMA) is primarily adapted through variants like CSMA with Collision Avoidance (CSMA/CA) to handle the inherent challenges of radio propagation, such as shared spectrum and node mobility. The IEEE 802.11 standard for Wi-Fi employs CSMA/CA as its core medium access mechanism in the distributed coordination function (DCF), where stations sense the channel before transmitting and use mechanisms like Request-to-Send/Clear-to-Send (RTS/CTS) handshakes to mitigate collisions in local area networks (WLANs). Similarly, the IEEE 802.15.4 standard underlying Zigbee uses an unslotted or slotted CSMA/CA for low-power ad-hoc and sensor networks, enabling devices in personal area networks (WPANs) to access channels with randomized backoffs to reduce interference in applications like home automation and industrial monitoring. Key adaptations of CSMA for wireless environments include multi-channel extensions to exploit spectrum availability and reduce contention. In multi-channel CSMA protocols, nodes dynamically select from multiple frequency bands based on local sensing, improving throughput in dense deployments by allowing parallel transmissions while maintaining collision avoidance. For Internet of Things (IoT) applications, energy-efficient sensing modifies traditional CSMA by incorporating adaptive backoff periods and duty-cycling, where nodes intermittently sense the channel to minimize idle listening overhead in battery-constrained sensor networks. Wireless CSMA faces significant challenges from the hidden terminal problem, where nodes cannot detect each other's transmissions due to limited radio range, leading to increased collisions despite carrier sensing. Signal fading, caused by and mobility, further degrades sensing reliability, prompting adaptations like hybrid physical-virtual carrier sensing to maintain . To address power constraints, protocols implement modes such as doze (low-power sleep) and listen (periodic checks), as in IEEE 802.11's power save mode, allowing stations to conserve energy while synchronizing via beacons without missing transmissions. Recent trends extend CSMA principles to advanced systems, including New Radio (NR) sidelink, where performs channel sensing to select unoccupied resources autonomously, akin to CSMA's listen-before-talk to support (V2X) and device-to-device communications. In vehicular networks, (DSRC) based on applies CSMA/CA for safety messaging, with backoff adjustments to handle high-mobility interference. Practical examples include WLAN access points coordinating multiple clients via CSMA/CA in enterprise settings, and mesh networks employing virtual carrier sensing—using Network Allocation Vector () updates from —to enable multi-hop relaying while protecting against hidden nodes.

References

  1. [1]
    Carrier Sense Multiple Access - an overview | ScienceDirect Topics
    Carrier Sense Multiple Access (CSMA) is a network protocol where nodes listen for ongoing transmissions before sending, reducing data collisions.
  2. [2]
  3. [3]
    802.3-1985 - IEEE Standards for Local Area Networks: Carrier ...
    The carrier sense multiple access with collision detection (CSMA/CD) media access method is the means by which two or more stations share a common bus ...
  4. [4]
  5. [5]
    Packet Switching in Radio Channels: Part II - The Hidden Terminal ...
    Dec 31, 1975 · In this paper we show that the existence of hidden terminals significantly degrades the performance of CSMA.
  6. [6]
  7. [7]
  8. [8]
    [PDF] Packet Switching Principles - Leonard Kleinrock - UCLA
    CSMA/CD is a method for using a multi-access channel in which a device listens to the channel before transmitting and will refrain from transmitting if any ...
  9. [9]
    [PDF] A Local Area Network - Data Link Layer
    Sep 30, 1980 · This document contains the specification of the Ethernet, a local area network developed jointly by Digital Equipment Corporation, Intel ...
  10. [10]
    Ethernet Through the Years: Celebrating the Technology's 50th Year ...
    The IEEE 802.3 Ethernet standard is released for Local Area Networks (CSMA/CD), featuring two coaxial sizes and a fiber medium option with a data rate of 10 ...
  11. [11]
    [PDF] Selecting Transmit Powers and Carrier Sense Thresholds for CSMA ...
    Thus we see that the carrier sense threshold being used is the interference margin at the receiver divided by k.
  12. [12]
    [PDF] Wireless Networking | Carnegie Mellon University
    802.11 uses both physical and virtual carrier sensing: •. Physical carrier sense provided by PHY. •. Virtual carrier sense provided by MAC. Virtual carrier ...
  13. [13]
    [PDF] Tuning the carrier sensing range of IEEE 802.11 MAC
    The DCF utilizes a Carrier Sensing Multiple Access with. Collision Avoidance (CSMA/CA) scheme, which uses physical carrier sensing and, optionally, virtual ...
  14. [14]
    [PDF] Carrier Sense Multiple Access with Collision Detection
    CSMA/CD is a carrier sense multiple access method with collision detection, used as a bus access method in local area networks.
  15. [15]
    What is a Clear Channel Assessment (CCA)? - Extreme Networks
    Jun 19, 2017 · The SD threshold is sometimes referred to as the preamble carrier sense threshold. The signal detect (SD) threshold is statistically around 4 ...Missing: equation | Show results with:equation
  16. [16]
    [PDF] 802.11 Arbitration - CWNP
    So, if the selected backoff value is seven, then the WM must be idle for the duration of seven slot times before the station can transmit a frame.
  17. [17]
    [PDF] Carrier Sense and Medium Access
    Higher-priority traffic uses a shorter interframe space (AFS) to access the medium. ○ Lower-priority traffic uses a longer interframe space, ensuring a longer ...
  18. [18]
    [PDF] 4. Media Access Control - IEEE 802
    The slot time is determined by the parameters of the implementation, see 4.4. ... The transmitting station fills the interframe spacing interval with ...
  19. [19]
    [PDF] CSMA/CN: Carrier Sense Multiple Access With Collision Notification
    CSMA/CN is a wireless protocol where the receiver detects a collision and notifies the transmitter, who then aborts the transmission.
  20. [20]
    [PDF] Packet Switching in Radio Channels: Part I-Carrier Sense Multiple ...
    J.: AFIPS Press, 1975, pp. [4] L. Kleinrock and F. Tobagi, “Random access techniques for. Nat. Comput. Conf.
  21. [21]
    [PDF] Wireless Networks - Rutgers University
    CSMA Protocol Transmission rules. Nonpersistent. If medium is idle, transmit ... 802.11 slightly modifies the CSMA/CA access deferral algorithm, Section 3.3.
  22. [22]
  23. [23]
    Hybrid TDMA/CSMA protocol for self managing packet radio networks
    This paper details work on a hybrid channel access protocol being undertaken at DRA Malvern. The protocol is based on both carrier sense multiple access and ...
  24. [24]
    [PDF] Chapter 6 Medium Access Control Protocols and Local Area Networks
    ○ In CSMA collisions result in wastage of X seconds spent transmitting an ... ○ Assume polling order is round robin. ○ Time is “wasted” polling ...
  25. [25]
    Polling Mechanism In Wireless Network and ISMA - GeeksforGeeks
    Jul 23, 2025 · Advantages. Unlike in TDMA or CSMA, no slot is ever wasted. It provides maximum efficiency and bandwidth utilization. Disadvantages.
  26. [26]
    SESAM: A semi-synchronous, energy savvy, application-aware MAC
    ... 0-persistent CSMA,. rescheduling their transmission in a later time. Contrary to. 0-persistent CSMA, however, the goal of the transmission. rescheduling is not ...<|control11|><|separator|>
  27. [27]
  28. [28]
    Ethernet: distributed packet switching for local computer networks
    Ethernet is a branching broadcast system for carrying digital data packets among local computing stations, using a shared medium with distributed control.
  29. [29]
    Performance analysis of carrier sense multiple access with collision ...
    In this paper we extend an analysis of CSMA to accommodate collision detection. The analysis provides the throughput-delay performance of CSMA-CD.
  30. [30]
    [PDF] IEEE 802.11 MAC −→ CSMA/CA with exponential backoff
    Backoff: • If due to timeout, double contention window (CW). • Else wait until channel is idle plus an additional DIFS. • Choose random waiting time between ...
  31. [31]
    [PDF] Computer Networking Overview IEEE 802.11 MAC Protocol: CSMA/CA
    802.11 CSMA: sender. - If sense channel idle for. DIFS (Distributed Inter. Frame Space) then transmit entire frame. (no collision detection).
  32. [32]
    [PDF] Performance analysis of the IEEE 802.11 distributed coordination ...
    DCF is a CSMA/CA scheme with binary exponential backoff. It uses basic access and RTS/CTS. This paper analyzes its throughput performance.
  33. [33]
    CSMA/CA - Carrier Sense Multiple Access with Collision Avoidance
    Feb 20, 2023 · CSMA/CA is a method for multiple participants to communicate on a shared medium, using carrier sense, multiple access, and collision avoidance ...
  34. [34]
    Tree algorithms for packet broadcast channels
    Insufficient relevant content. The provided content (https://ieeexplore.ieee.org/document/1056093) only includes a title and a broken link placeholder, with no accessible text or details about the paper.
  35. [35]
    [PDF] Conflict Resolution Algorithms and their Performance Analysis
    An even simpler limited stack depth algorithm inspired by the ''tree pruning'' rule is the ''Two-Cell'' Algo- rithm (2CA), mentioned in [Tsyba85] and ...
  36. [36]
    [PDF] Collision Avoidance and Resolution Multiple Access - DTIC
    a collision - resolution algorithm based on a deterministic tree - splitting algorithm to resolve ... CSMA), an etiquette based on such an approach would ...Missing: seminal | Show results with:seminal
  37. [37]
  38. [38]
    (PDF) Virtual Time CSMA: Why Two Clocks are Better than One
    Aug 6, 2025 · A new carrier sense multiple access (CSMA) algorithm, called virtual time CSMA, is described and analyzed. This algorithm uses a novel ...
  39. [39]
    [PDF] A Virtual Time CSMA Protocol for Hard Real Time Communication
    In this protocol, each node maintains two clocks: a real time clock and a virtual time clock. When- ever a node finds the channel to be idle, it resets its ...
  40. [40]
    Virtual Time Carrier Sensed Multiple Access (VT-CSMA)
    Jul 12, 2025 · VT-CSMA is used in real-time systems for efficient signal transfer, using a virtual clock (VC) that freezes when busy, and a real clock (RC) ...
  41. [41]
    Virtual Time CSMA Protocols for Hard Real-Time Communication
    In this class of CSMA protocols, each node maintains two clocks; a real time clock and a virtual time clock. Whenever a node finds the channel to be idle, it ...
  42. [42]
  43. [43]
    Ethernet - CSMA/CD, collision domain, duplex - SAMURAJ-cz.com
    Aug 3, 2007 · Initially, the transmission medium used was a thick coaxial cable (10Base-5 or thin coaxial cable 10Base-2) in a shared bus configuration.Missing: primary | Show results with:primary
  44. [44]
    CSMA/CD: Explanation of the process - IONOS
    Aug 30, 2019 · This results in a slot time of 51.2 μs (microseconds). The slot time describes the length of time a signal may take to the end of the collision ...
  45. [45]
  46. [46]
    [PDF] Lecture 17: Medium Access Control V
    Today we will look at the Ethernet protocol. Ethernet is the most widely used. LAN technology; the original version of Ethernet was based on a CSMA/CD.
  47. [47]
    [PDF] IEEE 802.3 Ethernet, Current Status and Future Prospects at the LHC
    Oct 20, 2000 · In addition the distance limitations of CSMA-CD are removed. Full duplex operation of Ethernet was standardized in 1997 along with a standard ...
  48. [48]
    [PDF] Industrial Ethernet Technologies: Overview and Comparison
    Industrial Ethernet technologies are grouped into three classes: Class A uses standard Ethernet, Class B uses dedicated protocols, and Class C uses dedicated ...Missing: hybrids | Show results with:hybrids
  49. [49]
    [PDF] Introduction to the Controller Area Network (CAN) (Rev. B)
    CSMA means that each node on a bus must wait for a prescribed period of inactivity before attempting to send a message. CD+AMP means that collisions are.Missing: variants | Show results with:variants
  50. [50]
    CAN and CAN FD - a brief tutorial for Embedded Engineers
    The CAN protocol uses a modified version of the Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) technique used on Ethernet. Should two messages ...Message Formats · Can Fd Data Frames · Variants
  51. [51]
    [PDF] CS4450 - Cornell: Computer Science
    • Need transmission time > 2 * propagation delay. 24. Limits on CSMA/CD Network Length and Frame Size. Page 25. Limits on CSMA/CD Network Length and Frame Size.Missing: vulnerability | Show results with:vulnerability
  52. [52]
    [PDF] CSMA, CSMA/CD and Ethernet - MIT
    T(n) ~ β + (1 - e-g(n) ). • Thus the success rate per unit time is ... S = (e-1)2τ + D. Tp. + τ. • Efficiency = D. Tp. /S = D. Tp. / (D. Tp. + τ + 2τ(e-1)). • Let ...Missing: Kleinrock 5G/
  53. [53]
    Ethernet Tutorial - Part I: Networking Basics - Lantronix
    A standard Ethernet network can transmit data at a rate up to 10 Megabits per second (10 Mbps). Other LAN types include Token Ring, Fast Ethernet, Gigabit ...
  54. [54]
    [PDF] Lecture 9: Bridging - UCSD CSE
    Uses CSMA/CD for access to each LAN (acts like a host). ♢. Can accommodate different speed interfaces (issues?) ♢. Separate CDs improves throughput (why ...Missing: integration | Show results with:integration
  55. [55]
    802.11 Tutorial
    Mar 1, 1996 · – CSMA/CA for Broadcast frames. • Parameterized use of RTS / CTS to provide a Virtual Carrier Sense function to protect against Hidden Nodes.
  56. [56]
  57. [57]
    CC2650: Does Carrier-sense multiple access(CSMA) technique is ...
    Aug 28, 2019 · Is there a CSMA/CA scheme which does the trick, or is it simple TDMA(Time-division multiple access) without any knowledge at the sending side ...
  58. [58]
    Performance of multichannel CSMA networks - IEEE Xplore
    It is shown that a multichannel CSMA network can be almost as efficient in utilizing the bandwidth available to the network as an equivalent single channel CSMA ...Missing: paper | Show results with:paper
  59. [59]
    (PDF) Energy Efficient and Throughput Optimal CSMA Scheme
    Carrier Sense Multiple Access (CSMA) is widely used as a Medium Access Control (MAC) in wireless networks thanks to its simplicity and distributive nature.<|separator|>
  60. [60]
    Revisiting the Hidden Terminal Problem in a CSMA/CA Wireless ...
    Jul 31, 2008 · In this paper we argue that an accurate analysis of the effect of hidden nodes in the performance of a random access protocol is still an open ...
  61. [61]
    [PDF] MEDIUM ACCESS CONTROL PROTOCOLS FOR AD-HOC ...
    Even though a radio may have sufficient channel bandwidth, factors such as multiple access, signal fading, and noise and interference can cause the effective.Missing: IoT | Show results with:IoT
  62. [62]
    IEEE 802.11 wireless networks
    The basic access method of the IEEE 802.11 standard is a variation of CSMA with collision avoidance (CSMA/CA), which is not suitable for supporting voice ...
  63. [63]
    [PDF] Integrating Sensing and Communication in Cellular Networks via ...
    Sep 15, 2021 · The NR Release 16 sidelink design assumes two frequency ranges, up-to 6 GHz and a Subcarrier Spacing (SCS) of 15 KHz, 30 KHz and 60 KHz, as ...
  64. [64]
    Dynamic virtual carrier sensing and interference aware routing ...
    In order to solve the hidden terminal problem, virtual carrier sensing using RTS/CTS has been proposed as a solution. However, this mechanism potentially ...