Fact-checked by Grok 2 weeks ago

Carrier-sense multiple access with collision avoidance

Carrier-sense multiple access with collision avoidance (CSMA/CA) is a probabilistic media access control (MAC) protocol designed for local area networks (WLANs), particularly those adhering to the standards, to manage shared channel access and minimize packet collisions without relying on . In CSMA/CA, stations perform carrier sensing to check if the medium is idle before attempting transmission; if busy, they defer and initiate a random backoff period to reduce the likelihood of collisions upon retry. This approach contrasts with wired Ethernet's CSMA/CD, as wireless transceivers cannot simultaneously transmit and detect collisions effectively, making avoidance the primary strategy. The protocol's core relies on the Distributed Coordination Function (DCF), the fundamental access method in IEEE 802.11, which combines physical and virtual carrier sensing with exponential backoff. Physical carrier sensing involves listening to the radio signal to detect ongoing transmissions, while virtual sensing uses the Network Allocation Vector (NAV) updated by control frames to reserve the medium. Interframe spacing intervals prioritize traffic: the Short Interframe Space (SIFS, typically 10 μs) allows high-priority acknowledgments (ACKs) and control frames to follow immediately, while the Distributed Interframe Space (DIFS, e.g., 50 μs in 802.11b) precedes data transmissions after the medium is idle. If a collision occurs (inferred from missing ACKs), the contention window (CW) doubles exponentially—from a minimum of 31 slots to a maximum of 1023—before selecting a new random backoff counter decremented only when the channel is idle. To address the hidden terminal problem, where nodes cannot sense each other's transmissions due to range limitations, CSMA/CA optionally employs a handshake. The sender broadcasts a short , prompting the receiver to reply with CTS after SIFS, silencing nearby stations via updates and reserving the channel for the impending data . Though effective for reducing collisions in dense environments, adds overhead and is typically used only for frames exceeding a configurable (e.g., 2346 bytes in some implementations). Overall, CSMA/CA enables reliable, decentralized access in WLANs, achieving throughputs up to 6-8 Mb/s under moderate loads in early 802.11 variants, though performance degrades with increasing node density due to higher collision probabilities.

Introduction

Definition and Purpose

Carrier-sense multiple access with collision avoidance (CSMA/CA) is a medium access control (MAC) protocol used in wireless local area networks (WLANs), particularly in the IEEE 802.11 standard, where stations sense the shared wireless channel before transmitting to prevent packet collisions. As a variation of the carrier-sense multiple access (CSMA) protocol, CSMA/CA incorporates mechanisms such as physical and virtual carrier sensing, randomized backoff timers, and optional request-to-send/clear-to-send (RTS/CTS) handshakes to probabilistically coordinate access among multiple devices on a contention-based medium. This approach is implemented through the distributed coordination function (DCF) in IEEE 802.11, enabling asynchronous data transmission without a central coordinator. The primary purpose of CSMA/CA is to allow multiple devices to efficiently share a common radio while minimizing the risk of data collisions and , particularly in environments prone to the hidden terminal problem where nodes cannot directly detect each other's transmissions. By deferring transmission when the is busy and using after potential collisions, the protocol promotes fair access opportunities among contending stations, reducing the likelihood of prolonged compared to pure contention methods like . It is particularly suited for half-duplex transceivers, which cannot simultaneously transmit and receive, making it ideal for battery-powered devices in or infrastructure-based WLANs. In contrast to CSMA with (CSMA/CD), which is employed in wired Ethernet networks to detect and recover from collisions during transmission, CSMA/CA proactively avoids collisions because wireless hardware constraints prevent reliable detection of ongoing collisions while sending. This avoidance strategy relies on acknowledgments (ACKs) and optional handshakes to infer successful delivery rather than direct collision sensing, adapting to the asymmetric and error-prone nature of channels.

Historical Context

The origins of Carrier-sense multiple access with collision avoidance (CSMA/CA) lie in the early networks of the 1970s, building on foundational random access protocols. The ALOHA protocol, developed by Norman Abramson at the University of and first described in 1970, enabled remote computer access over radio channels using pure random transmission without prior sensing, but it suffered from high collision rates limiting throughput to about 18%. To address these inefficiencies, carrier sensing was introduced in CSMA protocols, drawing inspiration from Robert Metcalfe's 1973 work at Xerox PARC on Ethernet, which employed CSMA with (CSMA/CD) for wired local area networks. These early developments for packet-switched radio systems laid the groundwork for handling shared media contention, particularly in environments prone to interference. A pivotal challenge identified in wireless CSMA was the hidden terminal problem, where distant nodes cannot detect each other's transmissions, leading to frequent collisions and degraded performance. In 1975, Fouad A. Tobagi and analyzed this issue in their seminal work on over radio , demonstrating through simulations that hidden terminals could reduce CSMA throughput by up to 50% compared to ideal conditions, and they proposed a busy-tone solution on a separate to signal ongoing transmissions and avoid overlaps. This research underscored the limitations of in settings—due to signal and half-duplex radios—and emphasized the need for proactive collision avoidance strategies, influencing subsequent designs. CSMA/CA as a distinct mechanism emerged in the late 1980s amid growing interest in wireless local area networks. In 1990, Phil Karn developed MACA (Multiple Access with Collision Avoidance) for amateur networks, incorporating request-to-send (RTS) and clear-to-send (CTS) control frames to resolve and exposed issues without relying on , which proved unreliable over radio links. Karn's approach prioritized avoidance through handshaking, reducing collision risks in ad-hoc topologies. The protocol gained formal standardization with the IEEE 802.11-1997 specification, which adopted CSMA/CA as the core (MAC) method for wireless LANs operating in the 2.4 GHz ISM band, supporting data rates up to 2 Mbps in both ad-hoc and infrastructure modes. This marked a shift from earlier experimental systems to commercial viability, with the Alliance's formation in 1999 accelerating certification and adoption for consumer devices. Over time, CSMA/CA evolved through amendments: IEEE 802.11e (2005) introduced Enhanced Distributed Channel Access (EDCA), enhancing QoS by assigning priority-based contention parameters to traffic classes like voice and video. More recently, IEEE 802.11ax (, approved 2021) integrated (OFDMA) to complement CSMA/CA, enabling multi-user scheduling in dense and enterprise settings while retaining carrier sensing for single-user access. In parallel, CSMA/CA principles have influenced cellular technologies for unlicensed spectrum. The 3GPP Release 16 (finalized 2020) introduced New Radio Unlicensed (NR-U), incorporating listen-before-talk (LBT) mechanisms akin to CSMA/CA to ensure fair coexistence with in 5 GHz bands, supporting 5G deployments in industrial and private networks.

Core Principles

Carrier Sensing

Carrier sensing in () is a fundamental mechanism employed by devices in wireless networks, such as those defined in the standards, to assess the availability of the shared medium before initiating transmission. This process helps minimize the probability of collisions by ensuring that a device only transmits when the channel is deemed idle, thereby promoting efficient medium access in decentralized environments. Physical carrier sensing operates at the (PHY) by continuously monitoring the (RSSI) or aggregate energy levels on the channel to detect ongoing activity. This is achieved through Assessment (CCA), which determines the medium state as idle or busy based on predefined s. CCA incorporates two primary detection modes: energy detect (ED), which identifies any energy exceeding a (e.g., -76 dBm in 802.11b DSSS to capture non-802.11 ), and preamble detect (PD), which specifically recognizes the preamble of an 802.11 signal if it surpasses a lower (e.g., -94 dBm, corresponding to the minimum receive sensitivity for 1 Mbps basic rate in 802.11b). If either ED or PD indicates activity, the medium is considered busy, prompting the device to defer transmission. Virtual carrier sensing complements physical sensing by providing a logical mechanism to account for transmissions that may not be directly detectable. It relies on the Network Allocation Vector (), a maintained by each that tracks the anticipated busy period of the medium based on the Duration/ID field in received packet headers, such as those in , data, or acknowledgment frames. The NAV value, capped at 32,767 microseconds, counts down in ; a non-zero NAV defers access even if physical sensing shows the channel as idle, effectively protecting ongoing exchanges from interference. This approach enhances collision avoidance by announcing future occupancy, particularly useful in multi-hop scenarios. In operation, carrier sensing requires the medium to remain idle for a Distributed Inter-Frame Space (DIFS) duration—calculated as the Short Inter-Frame Space (SIFS) plus twice the slot time (e.g., 50 μs for 2.4 GHz DSSS PHY)—before a device can attempt transmission or enter a backoff phase. This inter-frame spacing ensures higher-priority traffic (like acknowledgments) completes first and provides a contention window for fair access. If the medium is busy during this sensing period, the device waits until it becomes idle for the full DIFS. Despite its effectiveness, carrier sensing in wireless environments faces inherent limitations due to propagation delays, which can cause asynchronous detections across devices, and the hidden node problem, where out of mutual sensing range may transmit simultaneously. These imperfections necessitate additional avoidance strategies beyond sensing alone, as physical detection may fail to capture all potential interferers, and virtual reservations depend on accurate header information.

Collision Avoidance Strategies

In CSMA/CA, the random backoff algorithm serves as a primary mechanism to stagger transmission attempts and reduce collision probabilities among contending stations. After determining the channel is idle for a specified interframe space, a station selects a random backoff from 0 to CW-1, where CW is the current contention window size expressed in times (typically μs in ). The station then decrements this only while the channel remains idle; transmission occurs when the reaches zero. The initial CW is set to a minimum value (CWmin, often 31 slots), and upon a collision, CW is doubled for subsequent retries, up to a maximum (CWmax, typically 1023 slots), before resetting to CWmin after a successful transmission. Interframe spacing further enhances collision avoidance by enforcing priority-based deferral and ensuring orderly channel access. Key intervals include the Short Interframe Space (SIFS, 10 μs), which allows high-priority frames like acknowledgments to access the channel immediately after transmission; the Distributed Interframe Space (DIFS, 50 μs, equivalent to SIFS plus two slot times), used by contending stations for data frames; and the Point coordination Interframe Space (PIFS, between SIFS and DIFS), reserved for point coordination functions to prioritize control traffic. These spacings promote fairness by preventing lower-priority stations from interrupting ongoing exchanges while allowing time for propagation and delays. The acknowledgment (ACK) policy mandates positive acknowledgments for unicast data frames to verify successful reception and trigger timely recovery from potential collisions or errors. Upon receiving a data frame, the destination station responds with an ACK frame after a SIFS interval, confirming delivery without errors. If the sender does not receive the ACK within a timeout period (typically the frame's propagation time plus SIFS and ACK duration), it assumes a collision or loss and immediately invokes the backoff procedure for retransmission, thereby minimizing the impact of undetected failures in the wireless medium. Binary (BEB) underlies the adaptive nature of these avoidance techniques, building on foundational modes in CSMA protocols to dynamically respond to . In 1-persistent mode, a station transmits immediately upon sensing an idle channel, which can lead to high collision rates in dense environments; p-persistent mode introduces probabilistic transmission with probability p in each slot after sensing idle, balancing aggressiveness and caution. BEB refines this by using the exponentially growing CW to estimate load: low contention keeps CW small for quick access, while collisions trigger CW doubling to spread retries over longer intervals, reducing the likelihood of repeated overlaps until success resets the window. This adaptation helps maintain throughput under varying loads without explicit coordination. While these strategies effectively mitigate many collisions, they do not fully resolve hidden terminal problems, where distant stations cannot sense each other but interfere at the receiver; mechanisms like handshakes address this limitation by reserving the in advance.

Protocol Operation

Basic Access Procedure

The basic access procedure in with collision avoidance (CSMA/CA) is the fundamental mechanism used by s in networks to transmit data frames under the (DCF). A first performs carrier sensing to determine if the medium is . Specifically, upon having a frame to transmit, the waits until the medium has been for a Distributed Interframe Space (DIFS) period; if the medium is busy during this sensing, the defers and continuously monitors the until it detects an period of at least DIFS. This DIFS duration is calculated as SIFS plus two slot times, ensuring higher-priority traffic (such as acknowledgments) can access the medium first. If the medium remains idle for the full DIFS, the initiates a backoff to further reduce collision among multiple contending . In this , the selects a random backoff from a uniform over the range [0, CW-1], where CW is the current contention window size, initially set to a minimum value (CWmin, 15 slots for OFDM PHY in 802.11a/g or 31 slots for DSSS PHY in 802.11b). The backoff decrements by one for each idle slot time following the DIFS; if the medium becomes busy, the freezes and resumes decrementing only after the medium is idle again for another DIFS. Once the backoff reaches zero, the immediately transmits the . Following transmission, the station waits for an acknowledgment (ACK) from the recipient to confirm successful reception. The recipient, if it receives the correctly, responds with an after a Short Interframe Space (SIFS) period, which is shorter than DIFS to prioritize the over new transmissions. If no is received within a specified timeout (typically SIFS plus the transmission time plus a propagation delay margin), the transmission is considered unsuccessful, the station increments its retry counter, expands the contention window (CW = min(2 × CW, CWmax)), and restarts the access procedure from carrier sensing. The timing of the basic access procedure can be illustrated as follows, showing the sequence for a successful transmission:
Idle Medium
    |
    | DIFS
    +-------------------
    |                   |
    |   Backoff Slots   | Data Frame
    | (decrementing)    +----------------> Transmission
    +-------------------+ 
                    | SIFS
                    +-------------------
                                | ACK Frame
                                +---------------->
In this diagram, the process begins with carrier sensing during DIFS, followed by one or more backoff slots if selected, immediate data transmission upon backoff expiration, a brief SIFS, and finally the ACK. Virtual carrier sensing via the Network Allocation Vector (NAV), updated from frame duration fields, may defer access if indicated busy, but physical carrier sensing remains primary. This basic access mode serves as the default in DCF for unicast data transmissions, contrasting with the optional mode that inserts control handshakes for larger frames to mitigate hidden node issues.

Backoff and Retry Mechanisms

In CSMA/CA protocols, particularly as implemented in the (DCF), the binary exponential backoff (BEB) algorithm manages contention by dynamically adjusting the contention window (CW) size to reduce the likelihood of repeated collisions. The CW begins at a minimum value, CWmin (15 slots for OFDM PHY in 802.11a/g, 31 slots for DSSS PHY in 802.11b), and after each transmission failure, it is updated using the formula CW = min(CWmax, CWmin × 2retry_count), where CWmax is usually 1023 slots and retry_count increments with each failure. A station then selects a backoff slot time uniformly at random from the interval [0, CW-1], multiplying this value by the slot time duration (e.g., 9 μs in 802.11a and 802.11g short slot time, 20 μs in 802.11b) to determine the deferral period before attempting transmission. To prevent indefinite retries and resource exhaustion, employs separate retry counters: a short retry counter for frames like RTS or data frames transmitted without , and a long retry counter for data frames using . The short retry limit is typically set to 7, after which the frame is dropped if unsuccessful, while the long retry limit defaults to 4, incrementing only after the short counter exhausts for frames requiring the full . These limits ensure bounded retransmission attempts, balancing reliability with efficiency in error-prone wireless environments. Congestion avoidance is achieved by resetting the CW to CWmin upon successful transmission (confirmed by ACK receipt), which mitigates the risk of for stations that experience prolonged backoffs during high contention. This reset mechanism promotes medium access opportunities for all stations over time, preventing the CW from remaining at maximum values indefinitely. The BEB algorithm approximates long-term fairness by equalizing access probabilities through random selection within the CW, but it can exhibit short-term unfairness and capture effects in high-load scenarios, where a station that successfully transmits resets to a small CW while others retain larger windows, allowing the "capturing" station to dominate access temporarily. This behavior arises because the exponential doubling penalizes colliding stations more severely, potentially leading to throughput imbalances until all CWs converge. The backoff and retry process can be invoked after channel deferral (due to ongoing transmissions sensed via physical or virtual carrier sensing, including inter-frame spaces like DIFS) or after a transmission failure (no ACK received within timeout). Below is pseudocode outlining the core BEB invocation and update logic in IEEE 802.11 DCF:
Initialize: CW = CW_min, retry_count = 0, backoff_counter = random(0, CW-1)

While frame pending:
    Wait for channel idle for DIFS (or appropriate inter-frame space)
    If channel busy:
        Defer and freeze backoff_counter
    Else:
        Set backoff_counter = random(0, CW-1)
        While backoff_counter > 0 and channel idle:
            Decrement backoff_counter by 1 each slot time
            If channel busy during decrement:
                Freeze backoff_counter and defer
        If backoff_counter == 0:
            Transmit frame
            Start ACK timeout timer
            If ACK received:
                Reset CW = CW_min
                retry_count = 0
                Break (success)
            Else:  // Failure (timeout or collision inferred)
                retry_count += 1
                If retry_count > retry_limit:  // Short or long limit based on frame type
                    Drop frame
                    Break
                Else:
                    CW = min(CW_max, CW_min * 2^retry_count)
                    // Resume or restart backoff as needed
This illustrates the invocation after deferral (resuming frozen counter) or failure (updating CW and retry_count before reselecting backoff).

RTS/CTS Mechanism

Handshake Process

The Request to Send/Clear to Send () handshake in CSMA/CA serves as an optional mechanism to reserve the shared medium before transmitting data frames larger than a configurable , often set to 2347 bytes in implementations (which effectively disables it, as the maximum frame size is 2346 bytes), where the sender initiates the process after sensing the channel idle for a Distributed Inter-Frame Space (DIFS) period plus a random backoff. The RTS frame, which is 20 bytes long, includes key fields such as the Frame Control (FC) field indicating the frame type, a 2-byte field specifying the expected time (in microseconds) for the subsequent CTS, data transmission, , and associated Short Inter-Frame Spaces (SIFS), the Receiver Address (RA) identifying the intended recipient, and the Transmitter Address (TA) identifying the sender, followed by a Frame Check Sequence (FCS) for error detection. Upon receiving the RTS, neighboring nodes update their Network Allocation Vector (NAV)—a component of virtual carrier sensing—with the value to defer their own transmissions. If the remains clear at the , it responds with a CTS frame after a SIFS interval (10 μs in 802.11b/g), which is shorter than DIFS to prioritize the response. The CTS frame, 14 bytes in length, mirrors essential s from the RTS but simplifies the addressing: it contains the FC field, a field adjusted to account for the remaining time needed for data transmission, , and two SIFS (subtracting the CTS transmission time and one SIFS from the original RTS ), and an RA set to the TA from the RTS, with no TA field of its own, ending in an FCS. Neighbors overhearing the CTS, including those that may not have heard the RTS, similarly update their NAV based on the CTS , ensuring broader reservation. In a successful exchange, the sender proceeds to transmit the data frame immediately after receiving the CTS, followed by the receiver sending an ACK frame after another SIFS if the data is received correctly; all nodes within range defer access to the medium according to their updated NAV values until the reservation expires. This process particularly addresses the hidden terminal problem, where a node (e.g., node C) cannot hear the sender (node A) but is within interference range of the receiver (node B): the CTS broadcast by B informs such hidden nodes of the ongoing transmission, prompting them to defer and prevent collisions at B.

Integration with Basic Operation

The handshake augments the core CSMA/CA procedure by providing an optional reservation phase prior to data transmission, activated when the frame size exceeds a configurable known as dot11RTSThreshold, which is often set to 2347 bytes to balance the overhead of frames against the risk of collisions for larger payloads (effectively disabling it for typical frames up to 2346 bytes). This ensures that the mechanism is reserved for transmissions where the potential collision cost justifies the added , while smaller frames proceed via basic access to avoid unnecessary delays. In terms of timing integration, the process begins with the sender performing carrier sensing followed by a Distributed Interframe Space (DIFS) plus random backoff before transmitting the RTS, mirroring the contention resolution in basic CSMA/CA. Upon receiving the CTS, the sender waits a Short Interframe Space (SIFS)—shorter than DIFS to grant priority—before sending the data frame, and the receiver similarly uses SIFS before issuing the , thereby protecting the entire exchange from external interruptions. Should the CTS not arrive within the timeout period, the sender interprets this as a equivalent to a collision and falls back to the access procedure after invoking the backoff mechanism, potentially retrying the transmission without RTS/CTS if retry counters permit. This fallback ensures seamless continuity with the core protocol while minimizing disruptions from incomplete handshakes. The integration is enabled in scenarios like dense environments, where it enhances reliability by mitigating hidden terminals through medium reservation, but is typically disabled for short packets to reduce overall from the extra overhead. In such cases, the access method suffices, as the low collision probability for small frames does not warrant the handshake's cost. Across both modes, error handling remains consistent, with duplicate detection achieved via the Sequence Control field in the MAC header to discard repeated , and retry limits—such as the default short retry limit of 7 attempts for frames under the RTS threshold and long retry limit of 4 for larger ones—applied to prevent indefinite retransmissions. Backoff procedures following CTS failures follow the same exponential rules outlined in the protocol's mechanisms.

Implementations

IEEE 802.11 Wi-Fi Standards

Carrier-sense multiple access with collision avoidance (CSMA/CA) forms the core of the (DCF), the primary contention-based (MAC) mechanism in the standards for wireless local area networks (WLANs). DCF enables asynchronous data transmission in both infrastructure mode, where an access point (AP) coordinates stations, and ad-hoc mode, where stations communicate peer-to-peer, by requiring stations to sense the channel before transmitting to minimize collisions. This approach relies on physical carrier sensing via clear channel assessment (CCA) and virtual carrier sensing through Network Allocation Vector (NAV) updates from frame duration fields. Key timing parameters in DCF govern the CSMA/CA operation and vary by (PHY) specification. The slot time, a fundamental unit for backoff intervals, is 20 μs for (DSSS) in 802.11b and 9 μs for (OFDM) in 802.11a. The DCF Interframe Space (DIFS) ensures priority for acknowledgments and control frames, calculated as DIFS = SIFS + 2 × slot time, where the Short Interframe Space (SIFS) is 10 μs for DSSS and 16 μs for OFDM. The contention window (CW) starts at a minimum value (CWmin), typically 31 (2^5 - 1) for DSSS PHYs, and doubles after each collision up to a maximum (CWmax) of 1023 (2^10 - 1), with backoff slots chosen randomly from 0 to CW. These parameters balance fairness and efficiency in channel access. The IEEE 802.11 standards evolved from their initial 1997 release, where CSMA/CA via DCF was established as the mandatory access method alongside an optional Point Coordination Function (PCF) for contention-free service using centralized polling by the AP. In 802.11e (2005), the Hybrid Coordination Function (HCF) introduced quality-of-service (QoS) enhancements, including the Enhanced Distributed Channel Access (EDCA) mechanism, which refines CSMA/CA with prioritized access categories (ACs) such as voice (AC_VO), video (AC_VI), best effort (AC_BE), and background (AC_BK). EDCA uses AC-specific parameters, including Arbitration Interframe Space (AIFS) values (e.g., AIFSN=2 for AC_VO, derived as AIFS = AIFSN × slot time + SIFS), differentiated CWmin/CWmax (e.g., smaller for higher-priority ACs), and transmission opportunity (TXOP) limits to allow burst transmissions. This evolution maintains backward compatibility while supporting multimedia traffic. In , CSMA/CA applies to all frame types transmitted via DCF: data frames for payload delivery, management frames for network maintenance (e.g., beacons, association requests), and control frames for coordination (e.g., acknowledgments, though is optional for basic operation). Compliance with DCF and CSMA/CA is mandatory for certified devices, ensuring interoperability and adherence to the core protocol across PHY variants.

Applications in Other Protocols

CSMA/CA principles have been adapted in various protocols beyond IEEE 802.11 to suit specific requirements of low-power, low-rate, or unlicensed spectrum environments. In IEEE 802.15.4, which underpins standards like ZigBee for low-rate wireless personal area networks (WPANs), a slotted variant of CSMA/CA operates within a superframe structure defined by periodic beacons from the coordinator. This slotted mechanism aligns backoff periods and carrier sensing to superframe slots, reducing energy consumption in battery-powered devices; the backoff exponent ranges from 3 to 5, resulting in a contention window of 8 to 32 unit backoff periods (each 20 symbols long). Deferred backoff allows devices to pause and resume sensing across superframes if the channel remains busy, enhancing reliability in dense, low-duty-cycle networks. In 3GPP NR-U for unlicensed 5G spectrum access, CSMA/CA-like listen-before-talk (LBT) mechanisms ensure fair coexistence with other technologies like Wi-Fi by performing energy detection before transmission. LBT operates in four categories with varying sensing durations and thresholds: Category 1 allows immediate transmission after a 16 μs gap without sensing; Category 2 uses a 25 μs fixed sensing; Category 3 employs random backoff up to 16 μs; and Category 4, the most conservative, uses exponential backoff similar to CSMA/CA with energy detection thresholds around -72 dBm for 5 GHz bands. These adaptations prioritize regulatory compliance while supporting high-throughput 5G deployments in shared spectrum. IoT protocols such as and incorporate tailored CSMA/CA variants for duty-cycled, long-range networks. LoRaWAN's recent CSMA recommendation (TR013-1.0.0) enables devices to sense the channel before transmission, adapting CSMA to sub-GHz bands with low receive sensitivity; devices listen for ongoing LoRa signals exceeding a configurable (e.g., -90 dBm) and defer if detected, minimizing collisions in asynchronous, duty-limited setups without altering the core ALOHA-based access. , built on , employs unslotted CSMA/CA for in , where devices sense the 2.4 GHz channel and apply random backoffs (with min BE=3) to share bandwidth among IPv6-enabled nodes, complemented by link-layer acknowledgments for reliability. Key differences in these low-power variants include shorter contention windows to conserve energy—e.g., 802.15.4's maximum of slots versus 802.11's up to —allowing quicker access in sparse traffic while integrating with TDMA hybrids like superframes for guaranteed slots in contention access periods. These modifications balance collision avoidance with power efficiency in resource-constrained and WPAN scenarios.

Performance Analysis

Efficiency Metrics

Throughput in CSMA/CA represents the maximum sustainable data rate achievable under network load, quantified as the fraction of channel time used for successful transmission. This metric is particularly influenced by overhead from the binary exponential backoff procedure, which introduces delays to resolve contentions, and acknowledgment (ACK) frames, which confirm receptions but consume additional slots. In saturation conditions—where nodes always have packets to transmit—the protocol's efficiency diminishes as node count increases, with backoff and ACKs reducing the effective fraction. Latency, or access delay, measures the average time from packet arrival at a to its successful , encompassing queuing delays at the node and deferral periods due to sensing and backoff. Queuing occurs when packets await amid contention, while deferral arises from sensing and interframe spaces like DIFS and SIFS, exacerbating delays under high traffic. Delay , the variation in these latencies between successive packets, further impacts applications, with analytical models showing that higher contention window sizes prolong both mean delay and jitter. Channel utilization measures the proportion of time the shared medium is busy with transmissions above a signal detection , reflecting overall occupancy including productive , frames, and contention overheads. However, it does not distinguish between successful high-rate transmissions and inefficient retries or collisions, limiting its utility for detailed ; backoff and sensing periods contribute to idle or busy fractions without direct . In practice, high utilization often correlates with increased deferrals and collisions, eroding , though specific vary by and . Fairness index evaluates the equity of channel access among competing nodes, with Jain's fairness index serving as a standard metric defined as F = \frac{(\sum_{i=1}^n x_i)^2}{n \sum_{i=1}^n x_i^2}, where x_i is the throughput allocated to node i and n is the number of nodes; values range from $1/n (worst fairness) to 1 (perfect equity). In CSMA/CA networks, this index quantifies short-term access disparities caused by asynchronous backoffs and varying node positions, often revealing biases in multi-hop topologies where boundary nodes suffer reduced shares. Studies show that while the promotes long-term fairness through resets, short-term inequities persist under bursty traffic. Vulnerability to denial-of-service (DoS) attacks highlights CSMA/CA's susceptibility to backoff manipulation, where malicious nodes select minimal backoff times to monopolize the channel, starving legitimate users of access. This exploits the distributed nature of the protocol, allowing attackers to repeatedly win contentions without adhering to standard random backoff, effectively reducing for others by up to orders of magnitude in ad hoc settings. Game-theoretic analyses model such attacks as non-cooperative scenarios, underscoring the need for countermeasures like randomized strategies to restore equity.

Factors Affecting Throughput

The throughput of CSMA/CA in saturated conditions, where all nodes always have packets to transmit, can be modeled using a approach that captures the backoff process and collision dynamics. The saturation throughput S is given by
S = \frac{P_s P_{tr} E[P]}{P_{tr} T_s + P_{tr} (1 - P_s) T_c + (1 - P_{tr}) \sigma},
where P_{tr} = 1 - (1 - \tau)^n is the probability of at least one in a , P_s = \frac{n \tau (1 - \tau)^{n-1}}{P_{tr}} is the probability of a successful given an , E[P] is the size, T_s and T_c are the times for successful and collided transmissions respectively, \sigma is the time, n is the number of contending s, and \tau is the probability that a node transmits in a given . This model simplifies the overhead from interframe spaces like DIFS, backoff s, and acknowledgments into the time components T_s and T_c, with P_s representing the success probability that scales throughput relative to utilization.
A key parameter in this model is the collision probability p, approximated as p = 1 - (1 - \tau)^{n-1}, which assumes collisions occur independently for each transmission attempt. The attempt probability \tau is derived from the binary exponential backoff mechanism via fixed-point analysis of the Markov chain, yielding \tau = \frac{2(1-2p)(1-p)(1-(2p)^m)}{(1-2p)(W_0+1) + p W_0 [1 - (2p)^m] [1 - p (1 - (2p)^m) / (1 - 2p)]} for finite retry limits m, where W_0 is the initial contention window size (CW_min); a common approximation for large CW is \tau \approx \frac{2}{W_0 + 1}. This collision probability directly influences \tau, creating a nonlinear fixed-point equation solved iteratively to compute steady-state performance. Node density, represented by n, significantly impacts throughput by increasing p, which in turn reduces \tau and elevates backoff overhead, leading to lower S. For instance, as n grows from low values (e.g., 1-5 nodes), S initially rises due to better utilization but peaks and then declines, with throughput dropping below 0.7 for n > 20 in basic access mode under ideal conditions. Optimal tuning of the contention window size , particularly CW_min, mitigates this by adjusting \tau to balance collision risk and idle slots; analytical optimization shows maximum S occurs when \tau is tuned to approximately $1/n, achievable by setting CW_min proportional to n. The mechanism introduces additional overhead from the exchange, adding roughly 586 bits ( frames plus interframe spaces) to each successful transmission compared to basic access. This latency is beneficial only for packets exceeding a threshold size, typically 820-10,000 bits depending on the bit rate and node count, as it shortens collision durations for long frames and mitigates hidden terminal effects; below this threshold, the overhead reduces throughput by up to 20% relative to basic access. Analytical and simulation results from the model indicate typical maximum throughput of around 80% of in saturated conditions with enabled across varying node densities, compared to 74% for basic access at low to moderate loads; in low-load scenarios (unsaturated traffic), efficiency approaches 90-95% but is not fully captured by the saturation model.

Usage and Applications

Wireless Local Area Networks

In local area networks (WLANs), with Collision Avoidance (CSMA/CA) operates within an infrastructure mode where an access point (AP) serves as the central coordinator for communication between stations. The AP manages associations and broadcasts beacons to synchronize the network, but both the AP and associated stations independently employ CSMA/CA to contend for the shared medium. For uplink transmissions from stations to the AP, CSMA/CA ensures stations listen for an idle before attempting to send , using mechanisms like physical and carrier sensing to minimize collisions. Downlink transmissions from the AP to stations follow the same CSMA/CA process, allowing fair access despite the centralized . Common challenges in WLAN deployments arise from , particularly in dense environments such as offices or apartments where multiple operate on the same . This causes stations to erroneously sense the as busy, leading to increased backoff times and reduced access opportunities under CSMA/CA. During handoffs, when a station transitions between to maintain , fast transition mechanisms like 802.11r help preserve protocol continuity, potentially introducing brief delays. Network administrators configure CSMA/CA parameters on the to optimize , such as setting the Request to Send (RTS) threshold, which determines when stations initiate the to mitigate hidden node issues—typically adjustable from 0 to 2347 bytes, with higher values disabling the mechanism in low-density setups. Additionally, the can dynamically adjust contention window (CW) sizes via enhanced distributed channel (EDCA) parameters broadcast in frames, allowing finer control over priorities for different classes and adapting to load variations. In real-world WLANs, CSMA/CA contributes to typical channel utilization of 50-70% in home and office settings under moderate load, reflecting overhead from carrier sensing, acknowledgments, and backoffs that limit aggregate throughput to about half the physical layer rate. Tools like iPerf enable testing of this efficiency by measuring end-to-end throughput between stations and the AP, helping identify bottlenecks from CSMA/CA contention. Security integrations, such as WPA3, introduce additional overhead through encrypted management frames and robust authentication, which may slightly affect effective throughput compared to WPA2.

Emerging and Specialized Uses

In the realm of () and sensor networks, adaptations of CSMA/CA have been tailored for low-duty cycle operations in standards like IEEE 802.15.4g, which supports Smart Utility Networks (SUN) for applications such as s. These modifications emphasize energy-saving mechanisms, including adaptive collision resolution to minimize backoff retries and suspendable CSMA/CA processes that pause during low-activity periods, thereby reducing power consumption in battery-constrained devices. For instance, in deployments, nodes operate at duty cycles below 1% while maintaining reliable data transmission for metering and monitoring. Vehicular ad-hoc networks (VANETs) leverage CSMA/CA within the standard to facilitate vehicle-to-vehicle (V2V) communication amid high mobility scenarios. This implementation addresses challenges like rapid changes by prioritizing short backoff windows for safety-critical messages, ensuring low-latency exchanges for collision avoidance and traffic coordination. Simulations indicate that while CSMA/CA in 802.11p supports effective throughput in dense traffic, mobility-induced unfairness can degrade performance, prompting optimizations such as enhanced distributed channel access (EDCA) to balance access fairness. In unlicensed spectrum for and environments, CSMA/CA integrates with multi-user multiple-input multiple-output (MU-MIMO) and (OFDMA) under IEEE 802.11ax, shifting reliance from pure contention-based to scheduled multi-user transmissions. This approach allows access points to allocate units via OFDMA triggers, reducing the frequency of CSMA/CA handshakes in dense deployments and improving for uplink and downlink traffic. As a result, networks achieve higher concurrency, with OFDMA enabling simultaneous small-packet transmissions that complement CSMA/CA's collision avoidance in legacy compatibility modes. Despite these advancements, CSMA/CA faces scalability challenges in massive IoT scenarios with over 1,000 nodes, where contention overhead leads to increased collisions and . Power efficiency tweaks, such as asynchronous backoff mechanisms that decouple sensing from synchronized slots, help mitigate drain in ultra-dense networks by allowing nodes to enter sleep modes more flexibly. Research highlights that traditional CSMA/CA throughput drops significantly beyond 1,000 devices, necessitating hybrid protocols like asynchronous pulse code multiple access to support up to 30,000 nodes with better profiles. Looking ahead, post-2020 research points to the integration of (AI) for dynamic parameter tuning in CSMA/CA, enabling adaptive adjustments to backoff exponents and contention windows based on real-time network conditions. Reinforcement learning-based approaches, for example, optimize persistent CSMA variants to enhance utilization in varying loads, while models predict spectrum occupancy to preemptively tune access parameters. These AI-driven trends promise more resilient MAC protocols for future heterogeneous networks, with prototypes demonstrating improved efficiency in simulated and environments.

References

  1. [1]
    [PDF] CSMA/CA
    CSMA/CA. IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol.
  2. [2]
    [PDF] IEEE 802.11 MAC −→ CSMA/CA with exponential backoff
    Backoff: • If due to timeout, double contention window (CW). • Else wait until channel is idle plus an additional DIFS. • Choose random waiting time between ...
  3. [3]
    [PDF] Computer Networking Overview IEEE 802.11 MAC Protocol: CSMA/CA
    802.11 CSMA: sender. - If sense channel idle for. DIFS (Distributed Inter. Frame Space) then transmit entire frame. (no collision detection).<|control11|><|separator|>
  4. [4]
    None
    ### Summary of CSMA/CA in Wireless Networks
  5. [5]
    THE ALOHA SYSTEM: another alternative for computer ...
    In this report we describe a remote-access computer system---THE ALOHA SYSTEM---under development as part of that research program and discuss some advantages.
  6. [6]
    Milestones:Ethernet Local Area Network (LAN), 1973-1985
    May 17, 2024 · The Ethernet standard, also known as CSMA/CD (“carrier-sense multiple access with collision detection”), was essentially taken from the Ethernet ...
  7. [7]
    Packet Switching in Radio Channels: Part II - The Hidden Terminal ...
    Dec 31, 1975 · In this paper we show that the existence of hidden terminals significantly degrades the performance of CSMA.
  8. [8]
    IEEE P802.11, Main General Info Page
    IEEE Std 802.11-1997 specifies a single Medium Access Control (MAC) sub ... The MAC protocol is Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA).
  9. [9]
  10. [10]
    [PDF] IEEE 802.11ax: HIgH-EffIcIEncy WLans - Clemson University
    IEEE 802.11ax-2019 is a high-throughput WLAN amendment replacing older standards, with new technical features and network functionalities.
  11. [11]
    Release 16 - 3GPP
    Release 16 is a major release for the project, not least because it brings our IMT-2020 submission - for an initial full 3GPP 5G system - to its completion.Missing: U CA
  12. [12]
    [PDF] ANSI/IEEE Std 802.11, 1999 Edition (ISO/IEC 8802-11 ... - PDOS-MIT
    Aug 20, 1999 · ... IEEE 802.11 work- ing group had the following voting members: Victor ... ED threshold described in 15.4.8.4 shall be present at the ...
  13. [13]
    [PDF] Increasing Spectral Efficiency in WiFi6 Networks using OBSS/PD ...
    Aug 31, 2021 · The default preamble detection and RxSensitivity thresholds that NS-3 uses are adjusted to -82 dBm, and the energy detection threshold CCA/ED is ...
  14. [14]
    [PDF] Carrier Sense and Medium Access - Candela Technologies
    CSMA/CD and CSMA/CA are the media access methods that govern how a device can transmit data to the network. CSMA/CD stands for Carrier Sense Multiple Access / ...
  15. [15]
    [PDF] Performance analysis of the IEEE 802.11 distributed coordination ...
    By means of the proposed model, in this paper we pro- vide an extensive throughput performance evaluation of both ac- cess mechanisms of the 802.11 protocol.
  16. [16]
    Performance analysis of the IEEE 802.11 distributed coordination ...
    The DCF is a carrier sense multiple access with collision avoidance (CSMA/CA) scheme with binary slotted exponential backoff.Missing: definition | Show results with:definition
  17. [17]
    [PDF] IEEE 802.11 Packet Delay - A Finite Retry Limit Analysis
    The short retry count indicates the maximum number of retransmission attempts of a. RTS packet or of a data packet when RTS/CTS is not used. The long retry ...
  18. [18]
    Modeling the short-term unfairness of IEEE 802.11 in presence of ...
    IEEE 802.11 exhibits both short-term and long-term unfairness. The short-term fairness automatically gives rise to long-term fairness, but not vice versa.<|control11|><|separator|>
  19. [19]
    [PDF] Effectiveness of RTS/CTS handshake in IEEE 802.11 based ad hoc ...
    The effectiveness of RTS/CTS can be improved by the physical carrier sensing (CSMA part of. IEEE 802.11 MAC which is known as CSMA/CA) performed at each node ...
  20. [20]
    [DOC] doc.: IEEE 802.11-07/2089r1
    The use of the RTS/CTS mechanism is under control of the dot11RTSThreshold and the dot11RTSThresholdDur attributes. These attributes may be set on a per-STA ...Missing: activation | Show results with:activation
  21. [21]
    OID_802_11_RTS_THRESHOLD (Windows Drivers) | Microsoft Learn
    Jun 18, 2017 · An RTS threshold value of 0 indicates that the NIC must transmit all packets using RTS/CTS. The minimum threshold value is 0, and the maximum is ...
  22. [22]
    [PDF] CSMA/CA and IEEE 802.11
    The collision detected procedure: - keep transmitting a jamming signal for one slot. This way everybody detects the collision. - check if you are ...
  23. [23]
    OID_802_11_STATISTICS (Windows Drivers) | Microsoft Learn
    The number of duplicate frames that the NIC received. The sequence control field in the frame identifies duplicate frames. ReceivedFragmentCount. The number of ...
  24. [24]
    [PDF] Performance Analysis of Priority Schemes for IEEE 802.11 and IEEE ...
    This paper studies backoff-based priority schemes for IEEE 802.11 and the emerging IEEE 802.11e standard by differentiating the minimum backoff window size, the.
  25. [25]
    [PDF] An Overview of Wireless LAN Standards IEEE 802.11 and IEEE ...
    PIFS consists of a. SIFS plus one slot time and DIFS consists of a SIFS plus two slot times. ... The default values of CWmin and CWmax parameters for each of the ...
  26. [26]
    [PDF] Analysis of the 802.11e Enhanced Distributed Channel Access ...
    In this paper, we confine our analysis to the EDCA scheme, which uses Carrier Sense Multiple Access with Collision. Avoidance (CSMA/CA) and slotted Binary ...
  27. [27]
    802.11 Frame Types and Formats - How I WI-FI
    Jul 13, 2020 · There are three types of 802.11 frames: management, control, and data. Management frames are used to mange the BSS, control frames control access to the medium.
  28. [28]
    [PDF] IEEE Std 802.15.4-2003, IEEE Standard for Information technology
    Oct 1, 2003 · Abstract: This standard defines the protocol and compatible interconnection for data communication devices using low data rate, ...
  29. [29]
  30. [30]
    [PDF] ETSI TS 137 213 V17.1.0 (2022-04)
    3GPP TS 37.213 version 17.1.0 Release 17​​ This Technical Specification has been produced by the 3rd Generation Partnership Project (3GPP). The contents of the ...Missing: categories U
  31. [31]
    [PDF] New Radio Beam-based Access to Unlicensed Spectrum - 5G LENA
    Abstract—This paper elaborates on the design challenges, opportunities, and solutions for New Radio-based access to Unli- censed spectrum (NR-U) by taking ...
  32. [32]
    TR013-1.0.0 Carrier Sense Multiple Access (CSMA) - LoRa Alliance
    Sep 15, 2023 · This document provides recommendations for LoRaWAN devices to minimize collisions even under heavy congestion by enabling Carrier Sense Multiple Access (CSMA) ...
  33. [33]
    None
    ### Summary of CSMA/CA Usage in Thread Protocol for IoT
  34. [34]
    [PDF] Analysis of Slotted CSMA/CA OF IEEE 802.15.4 - IRJET
    - IEEE 802.15.4 standard is specifically intended for low Rate Wireless Personal Area Network (LR-WPAN) with low information rate and low power capacities.
  35. [35]
    Decoding CSMA/CA and CSMA/CD: Key Contrasts in Network ...
    Wireless Local Area Networks (WLANs): CSMA/CA remains foundational, with enhancements like 802.11e for QoS and 802.11ax (Wi-Fi 6) introducing OFDMA and MU-MIMO ...
  36. [36]
    [PDF] Analysis of Access Delay and Delay Jitter for the CSMA/CA ...
    The access delay and delay jitter are two of most important quality of service (QoS) metrics. EE-CSMA/CA inevitably experiences the tortures bred from its delay ...
  37. [37]
    CSMA/CA performance under high traffic conditions: throughput and ...
    Feb 15, 2002 · Bianchi [5] presents a simple analysis to compute the saturation throughput performance of CSMA/CA using the assumption of ideal channel ...
  38. [38]
    [PDF] How to Use Channel Utilization in Wi-Fi (tl;dr Ignore It) - Cloudfront.net
    Channel utilization is the percentage of time a channel is used*. In Wi-Fi, a ... • 802.11 CSMA/CA makes it so new devices/data can always use the channel.
  39. [39]
    [PDF] Analyzing the Short-Term Fairness of IEEE 802.11 in Wireless Multi ...
    Jain's Fairness Index: Jain's fairness index is the stan- dard traditional measure of network fairness. Jain's index is defined[5] as follows: FJ = PN i=1 i.<|separator|>
  40. [40]
    Playing CSMA/CA Game to Deter Backoff Attacks in Ad Hoc ...
    The IEEE 802.11 MAC protocol is vulnerable to selfish backoff attacks exploiting the constituent CSMA/CA mechanism. Administrative prevention of such ...
  41. [41]
    Radio Resource Management White Paper - Wireless - Cisco
    Jun 14, 2016 · The result is higher consumption of air time and less throughput. This is commonly known as co-channel interference. Assuming that all wireless ...
  42. [42]
    High Density Wi-Fi Deployments - Cisco Meraki Documentation
    Apr 22, 2024 · 802.11r (Fast BSS Transition) - 802.11r allows encryption keys to be stored on all of the APs in a network. This way, a client doesn't need ...
  43. [43]
    Cisco IOS Wireless LAN Command Reference - fragment-threshold ...
    Oct 12, 2007 · To set the size at which packets are fragmented, use the fragment-threshold command in interface configuration mode.
  44. [44]
    [PDF] IEEE 802.11e Contention-Based Channel Access (EDCF ...
    The values of AIFS[AC], CWmin[AC], and CWmax[AC], which are referred to as the EDCF parameters, are announced by the AP via beacon frames. The AP can adapt ...
  45. [45]
    What is considered high channel utilization? - Extreme Networks
    Mar 30, 2016 · Typically you want to see about 50 to 60% or lower on the average column. You also want to check the amount of clients per the radio that is showing high ...Missing: 50-70 | Show results with:50-70
  46. [46]
    April 2011 IEEE 802.15-10-0668-05-004g
    Apr 1, 2011 · While typical network device may operate at duty cycle as low as below 1%, the coordinators may operate at duty cycle of around 10%, as ...
  47. [47]
    [PDF] Improve IEEE 802.15.4 Network Reliability by Suspendable CSMA/CA
    Apr 23, 2024 · The left part illustrates standard CSMA/CA for non-slotted and slotted IEEE 802.15.4 modes, respectively. The Suspendable. CSMA/CA algorithm ...
  48. [48]
    An adaptive collision resolution scheme for energy efficient ...
    To enhance energy efficiency and throughput of sensor nodes, many CSMA/CA schemes based on IEEE 802.15. 4 have been proposed.Missing: saving | Show results with:saving
  49. [49]
    [PDF] Reliable IEEE 802.15.4g-based Smart Utility Networks via Adaptive ...
    In this thesis work we propose and evaluate a strategy to improve transmission in IEEE 802.15.4g SUN networks. This kind of network.
  50. [50]
    Mobility impact in IEEE 802.11p infrastructureless vehicular networks
    Extensive simulation results demonstrate a significant impact of mobility on the IEEE 802.11p MAC performance, the unfairness problem in the vehicle-to-vehicle ...
  51. [51]
    [PDF] Performance of Vehicle-to-Vehicle Communication using IEEE ...
    Scalability issues for the MAC methods STDMA and CSMA/CA of IEEE 802.11p when used in VANETs. IEEE International Conference on. Communications (ICC2010), 2010.
  52. [52]
    An Enhancement for IEEE 802.11p to Provision Quality of Service ...
    Oct 19, 2021 · In this layer, VANET uses IEEE 802.11p that follows carrier sense multiple access (CSMA/CA) as the channel access standard for communication ...
  53. [53]
    [PDF] Improving EDCA for Efficient Channel Access in Vehicular ...
    IEEE 802.11p is a standard protocol designed for low latency and high mobility of vehicular communications. How- ever, the Enhanced Distributed Channel Access.
  54. [54]
    Hybrid OFDMA and CSMA/CA-based transmission strategy for ...
    Aug 6, 2025 · Hybrid OFDMA and CSMA/CA-based transmission strategy for providing high throughput and low delay in IEEE 802.11ax wireless LANs · Abstract · No ...
  55. [55]
    A Survey of Wi-Fi 6: Technologies, Advances, and Challenges - MDPI
    It achieves current expectations thanks to wider channels, MU OFDMA for channel access, uplink (UL) MU MIMO to improve capacity, SR for spectral efficiency, ...
  56. [56]
    An example of MU-RTS/CTS procedure. - ResearchGate
    For backward compatibility, OFDMA transmission in IEEE 802.11ax is used in cooperation with carrier sense multiple access with collision avoidance (CSMA/CA).
  57. [57]
    (PDF) Scalability Challenges and Solutions in Massive IoT Networks
    Dec 16, 2024 · This paper explores the primary scalability challenges associated with massive IoT networks, including data management, network congestion, and ...
  58. [58]
    Enabling Scalability in Asynchronous and Bidirectional ... - arXiv
    In this paper, we enable massive scalability, higher energy efficiency, and decreased latency in both uplink and downlink communications in SNOW as follows.
  59. [59]
    [PDF] Dynamic-Persistent CSMA: A Reinforcement Learning Approach for ...
    In this paper, we detail our distinctive skill-based rein- forcement learning technique, emphasizing how its unique structure facilitates more efficient channel ...
  60. [60]
  61. [61]
    A deep-learning-based MAC for integrating channel access, rate ...
    This paper proposes a deep-learning-based MAC paradigm, dubbed DL-MAC, which leverages spectrum data readily available from energy detection modules in ...
  62. [62]
    A deep-learning-based MAC for integrating channel access, rate ...
    Jun 4, 2024 · This paper proposes a deep-learning-based MAC paradigm, dubbed DL-MAC, which leverages spectrum sensing data readily available from energy detection modules in ...<|control11|><|separator|>