SlideShare a Scribd company logo
1 of 19
CSMA/CA 802.11 and 802.15.4
Carrier Sense Multiple Access with
Collision Avoidance

In wireless communication it is not possible to
detect collisions during transmissions.
CSMA/CA vs. CSMA/CD
 In CSMA/CA, backoff before collision.
 In CSMA/CD, backoff after collision.
If the channel is sensed "idle" then the node is
permitted for transmission else the node defers
its transmission for a random period of time
called backoff.
2
IEEE 802.15.4
 IEEE 802.15.4 standard defines the characteristics of
the physical and MAC layers for LR-WPANs

3
IEEE 802.15.4 Main Characteristics
Low power consumption
CSMA/CA channel access

4
802.15.4 Physical Layer Operating
Frequency Bands

5
IEEE 802.15.4 PHY Layer
Packet Structure

An octet is a unit of digital information that consists of eight bits.
6
802.15.4 Modulation Scheme
Typical devices (1mW) are expected to cover a
10--20 m range.

7
Component of IEEE 802.15.4 LRWPAN
 Coordinator : Coordinator controls and monitor the established network.
 PAN Coordinator : A coordinator that is the principle coordinator of PAN.
 Cluster : A cluster is a small section of a bigger network, which has its
own coordinator.
 Device/End Node : A device is either a reduced/full function device. Any
device that is not a co-ordinator is an end node
 Personal Operating Space(POS) : It is the operating range of a node in all
directions.

8
IEEE 802.15.4 Network Devices
Full Function Device(FFD) : It is a device
which supports all the 49 primitives (14 PHY+
35 MAC) supported by the technology. It acts
as a PAN coordinator, a Coordinator, or just as
an end node (device).
Reduced Function Device(RFD) : It is a
device with reduced functionality which can
only function as an end device or node. It can
only communicate with the coordinator.
9
IEEE 802.15.4 Topologies

10
IEEE 802.15.4 MAC Layer
• Features

Simple and Flexible protocol
Extremely Low Cost
Ease of Implementation
Reliable Data Transfer
Short Range Operation
Very Low Power Consumption
11
IEEE 802.15.4 MAC Layer

12
IEEE 802.15.4 MAC SuperFrame
Structure

13
IEEE 802.15.4 – MAC Transmission –
UnSlotted CSMA

14
IEEE 802.15.4 – MAC Transmission –
Slotted CSMA

15
Medium Access Control CSMA/CA
802.11
• CSMA/CA: Carrier Sensing Multiple Access
with collision avoidance
• Carrier Sensing: Listen before talking.
Channel Contention 802.11 (Time
Domain)
Random Backoff = 11

Node 3

Node 2

Node 1
RB1=11

Random Backoff = 22

RB1=0

SIFS

DIFS

DATA

ACK
Time

DIFS

WAIT
Time
RB2=22

RB2=11
Channel Contention 802.11
(Frequency Domain)
• 802.11 a/g/n PHY adopt OFDM

Souvik Sen, Romit Roy Choudhury, and Srihari Nelakuditi “No time to countdown: migrating backoff to the frequency
domain” In Proceedings of the 17th annual international conference on Mobile computing and networking (MobiCom '11).
ACM, New York, NY, USA,
Channel Contention 802.11
(Frequency Domain) cont…
• Backoff within a Collision Domain

Souvik Sen, Romit Roy Choudhury, and Srihari Nelakuditi “No time to countdown: migrating backoff to the frequency
domain” In Proceedings of the 17th annual international conference on Mobile computing and networking (MobiCom '11).
ACM, New York, NY, USA,

More Related Content

What's hot

The mac layer
The mac layerThe mac layer
The mac layer
aazamk
 

What's hot (20)

HDLC, PPP and SLIP
HDLC, PPP and SLIPHDLC, PPP and SLIP
HDLC, PPP and SLIP
 
Transportlayer tanenbaum
Transportlayer tanenbaumTransportlayer tanenbaum
Transportlayer tanenbaum
 
Ethernet protocol
Ethernet protocolEthernet protocol
Ethernet protocol
 
Sigtran protocol
Sigtran protocolSigtran protocol
Sigtran protocol
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
Tcp
TcpTcp
Tcp
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Point to-point protocol (ppp)
Point to-point protocol (ppp)Point to-point protocol (ppp)
Point to-point protocol (ppp)
 
Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1
 
csma ca
 csma ca csma ca
csma ca
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
 
OSI model (7 layer )
OSI model (7 layer ) OSI model (7 layer )
OSI model (7 layer )
 
VPLS Fundamental
VPLS FundamentalVPLS Fundamental
VPLS Fundamental
 
Named Data Networking
Named Data NetworkingNamed Data Networking
Named Data Networking
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
Cs8591 Computer Networks - UNIT V
Cs8591 Computer Networks - UNIT VCs8591 Computer Networks - UNIT V
Cs8591 Computer Networks - UNIT V
 
OSI Model
OSI ModelOSI Model
OSI Model
 
TCP/IP
TCP/IPTCP/IP
TCP/IP
 
The mac layer
The mac layerThe mac layer
The mac layer
 

Viewers also liked

3.Medium Access Control
3.Medium Access Control3.Medium Access Control
3.Medium Access Control
Sonali Chauhan
 
Csmaca
CsmacaCsmaca
Csmaca
lyndyv
 
Spread the aloha to kids charity
Spread the aloha to kids charitySpread the aloha to kids charity
Spread the aloha to kids charity
Peter Pham
 
Wierless networks ch3 (1)
Wierless networks ch3 (1)Wierless networks ch3 (1)
Wierless networks ch3 (1)
bheemsain
 
9 multiple access
9 multiple access9 multiple access
9 multiple access
ampas03
 
Chankaya’s time management techniques
Chankaya’s time management techniquesChankaya’s time management techniques
Chankaya’s time management techniques
Sanjay Patil
 
C07 wireless la-ns
C07 wireless la-nsC07 wireless la-ns
C07 wireless la-ns
Rio Nguyen
 

Viewers also liked (20)

CSMA/CA
CSMA/CACSMA/CA
CSMA/CA
 
3.Medium Access Control
3.Medium Access Control3.Medium Access Control
3.Medium Access Control
 
Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)
 
Medium Access Control
Medium Access ControlMedium Access Control
Medium Access Control
 
Multiple access control protocol
Multiple access control protocol Multiple access control protocol
Multiple access control protocol
 
Csmaca
CsmacaCsmaca
Csmaca
 
Spread the aloha to kids charity
Spread the aloha to kids charitySpread the aloha to kids charity
Spread the aloha to kids charity
 
Wierless networks ch3 (1)
Wierless networks ch3 (1)Wierless networks ch3 (1)
Wierless networks ch3 (1)
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
9 multiple access
9 multiple access9 multiple access
9 multiple access
 
Chankaya’s time management techniques
Chankaya’s time management techniquesChankaya’s time management techniques
Chankaya’s time management techniques
 
Csma
CsmaCsma
Csma
 
Ch 13
Ch 13Ch 13
Ch 13
 
C07 wireless la-ns
C07 wireless la-nsC07 wireless la-ns
C07 wireless la-ns
 
Unit 2
Unit 2Unit 2
Unit 2
 
Iso osi and tcp-ip reference models
Iso osi and tcp-ip reference modelsIso osi and tcp-ip reference models
Iso osi and tcp-ip reference models
 
Token ring
Token ringToken ring
Token ring
 
M.A.C (Medium Access Control)
M.A.C (Medium Access Control)M.A.C (Medium Access Control)
M.A.C (Medium Access Control)
 
Token ring
Token ringToken ring
Token ring
 
Token ring 802.5
Token ring 802.5Token ring 802.5
Token ring 802.5
 

Similar to Csmaca

dokumen.tips_ericsson-lte-throughput-troubleshooting-techniques_SUPERRRRRRR.ppt
dokumen.tips_ericsson-lte-throughput-troubleshooting-techniques_SUPERRRRRRR.pptdokumen.tips_ericsson-lte-throughput-troubleshooting-techniques_SUPERRRRRRR.ppt
dokumen.tips_ericsson-lte-throughput-troubleshooting-techniques_SUPERRRRRRR.ppt
LibaBali
 
dokumen.tips_ericsson-lte-throughput-troubleshooting-techniquesppt.ppt
dokumen.tips_ericsson-lte-throughput-troubleshooting-techniquesppt.pptdokumen.tips_ericsson-lte-throughput-troubleshooting-techniquesppt.ppt
dokumen.tips_ericsson-lte-throughput-troubleshooting-techniquesppt.ppt
LibaBali
 
Wifi Vs Wimax By Dr Walter Green
Wifi Vs Wimax By Dr Walter GreenWifi Vs Wimax By Dr Walter Green
Wifi Vs Wimax By Dr Walter Green
Engineers Australia
 

Similar to Csmaca (20)

80211
8021180211
80211
 
Zigbee 802-15-4
Zigbee 802-15-4Zigbee 802-15-4
Zigbee 802-15-4
 
WSN protocol 802.15.4 together with cc2420 seminars
WSN protocol 802.15.4 together with cc2420 seminars WSN protocol 802.15.4 together with cc2420 seminars
WSN protocol 802.15.4 together with cc2420 seminars
 
Chap.1 ethernet introduction
Chap.1 ethernet introductionChap.1 ethernet introduction
Chap.1 ethernet introduction
 
IT8602 Mobile Communication - Unit III
IT8602 Mobile Communication  - Unit IIIIT8602 Mobile Communication  - Unit III
IT8602 Mobile Communication - Unit III
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Shortest path bridging 802.1 aq
Shortest path bridging 802.1 aqShortest path bridging 802.1 aq
Shortest path bridging 802.1 aq
 
802.11 Computer Networks
802.11 Computer Networks802.11 Computer Networks
802.11 Computer Networks
 
Can network development using arm cortex m3
Can network development using arm cortex m3Can network development using arm cortex m3
Can network development using arm cortex m3
 
Can network development using arm cortex m3
Can network development using arm cortex m3Can network development using arm cortex m3
Can network development using arm cortex m3
 
Demystifying the JESD204B High-speed Data Converter-to-FPGA interface
Demystifying the JESD204B High-speed Data Converter-to-FPGA interfaceDemystifying the JESD204B High-speed Data Converter-to-FPGA interface
Demystifying the JESD204B High-speed Data Converter-to-FPGA interface
 
Samsung_EnodeLSMR__Integration_Module__V1.pdf (1).pdf
Samsung_EnodeLSMR__Integration_Module__V1.pdf (1).pdfSamsung_EnodeLSMR__Integration_Module__V1.pdf (1).pdf
Samsung_EnodeLSMR__Integration_Module__V1.pdf (1).pdf
 
awsn module 1.ppt
awsn module 1.pptawsn module 1.ppt
awsn module 1.ppt
 
dokumen.tips_ericsson-lte-throughput-troubleshooting-techniques_SUPERRRRRRR.ppt
dokumen.tips_ericsson-lte-throughput-troubleshooting-techniques_SUPERRRRRRR.pptdokumen.tips_ericsson-lte-throughput-troubleshooting-techniques_SUPERRRRRRR.ppt
dokumen.tips_ericsson-lte-throughput-troubleshooting-techniques_SUPERRRRRRR.ppt
 
dokumen.tips_ericsson-lte-throughput-troubleshooting-techniquesppt.ppt
dokumen.tips_ericsson-lte-throughput-troubleshooting-techniquesppt.pptdokumen.tips_ericsson-lte-throughput-troubleshooting-techniquesppt.ppt
dokumen.tips_ericsson-lte-throughput-troubleshooting-techniquesppt.ppt
 
Wifi Vs Wimax By Dr Walter Green
Wifi Vs Wimax By Dr Walter GreenWifi Vs Wimax By Dr Walter Green
Wifi Vs Wimax By Dr Walter Green
 
Presentation8
Presentation8Presentation8
Presentation8
 
Ethernet technology
Ethernet technologyEthernet technology
Ethernet technology
 
NET1.PPT
NET1.PPTNET1.PPT
NET1.PPT
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
 

More from Oka Danil

More from Oka Danil (9)

Remote Monitoring of Lead-Acid Battery Based on WLAN
Remote Monitoring of Lead-Acid Battery Based on WLANRemote Monitoring of Lead-Acid Battery Based on WLAN
Remote Monitoring of Lead-Acid Battery Based on WLAN
 
Parametric Study on Signal Reconstruction in Wireless Capsule Endoscopy using...
Parametric Study on Signal Reconstruction in Wireless Capsule Endoscopy using...Parametric Study on Signal Reconstruction in Wireless Capsule Endoscopy using...
Parametric Study on Signal Reconstruction in Wireless Capsule Endoscopy using...
 
Network-based Wireless for Remote Monitoring Lead-Acid Battery
Network-based Wireless for Remote Monitoring Lead-Acid BatteryNetwork-based Wireless for Remote Monitoring Lead-Acid Battery
Network-based Wireless for Remote Monitoring Lead-Acid Battery
 
Superframe Scheduling with Beacon Enable Mode in Wireless Industrial Networks
Superframe Scheduling with Beacon Enable Mode in Wireless Industrial NetworksSuperframe Scheduling with Beacon Enable Mode in Wireless Industrial Networks
Superframe Scheduling with Beacon Enable Mode in Wireless Industrial Networks
 
Deadline Monotonic Scheduling to Reduce Overhead of Superframe in ISA100.11a
Deadline Monotonic Scheduling to Reduce Overhead of Superframe in ISA100.11aDeadline Monotonic Scheduling to Reduce Overhead of Superframe in ISA100.11a
Deadline Monotonic Scheduling to Reduce Overhead of Superframe in ISA100.11a
 
Wireless communication class_oka_131218
Wireless communication class_oka_131218Wireless communication class_oka_131218
Wireless communication class_oka_131218
 
The Fast Fourier Transform (FFT)
The Fast Fourier Transform (FFT)The Fast Fourier Transform (FFT)
The Fast Fourier Transform (FFT)
 
Modeling and Roll, Pitch and Yaw Simulation of Quadrotor.
Modeling and Roll, Pitch and Yaw Simulation of Quadrotor.Modeling and Roll, Pitch and Yaw Simulation of Quadrotor.
Modeling and Roll, Pitch and Yaw Simulation of Quadrotor.
 
Wireless Channels Capacity
Wireless Channels CapacityWireless Channels Capacity
Wireless Channels Capacity
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Csmaca

  • 2. Carrier Sense Multiple Access with Collision Avoidance In wireless communication it is not possible to detect collisions during transmissions. CSMA/CA vs. CSMA/CD  In CSMA/CA, backoff before collision.  In CSMA/CD, backoff after collision. If the channel is sensed "idle" then the node is permitted for transmission else the node defers its transmission for a random period of time called backoff. 2
  • 3. IEEE 802.15.4  IEEE 802.15.4 standard defines the characteristics of the physical and MAC layers for LR-WPANs 3
  • 4. IEEE 802.15.4 Main Characteristics Low power consumption CSMA/CA channel access 4
  • 5. 802.15.4 Physical Layer Operating Frequency Bands 5
  • 6. IEEE 802.15.4 PHY Layer Packet Structure An octet is a unit of digital information that consists of eight bits. 6
  • 7. 802.15.4 Modulation Scheme Typical devices (1mW) are expected to cover a 10--20 m range. 7
  • 8. Component of IEEE 802.15.4 LRWPAN  Coordinator : Coordinator controls and monitor the established network.  PAN Coordinator : A coordinator that is the principle coordinator of PAN.  Cluster : A cluster is a small section of a bigger network, which has its own coordinator.  Device/End Node : A device is either a reduced/full function device. Any device that is not a co-ordinator is an end node  Personal Operating Space(POS) : It is the operating range of a node in all directions. 8
  • 9. IEEE 802.15.4 Network Devices Full Function Device(FFD) : It is a device which supports all the 49 primitives (14 PHY+ 35 MAC) supported by the technology. It acts as a PAN coordinator, a Coordinator, or just as an end node (device). Reduced Function Device(RFD) : It is a device with reduced functionality which can only function as an end device or node. It can only communicate with the coordinator. 9
  • 11. IEEE 802.15.4 MAC Layer • Features Simple and Flexible protocol Extremely Low Cost Ease of Implementation Reliable Data Transfer Short Range Operation Very Low Power Consumption 11
  • 12. IEEE 802.15.4 MAC Layer 12
  • 13. IEEE 802.15.4 MAC SuperFrame Structure 13
  • 14. IEEE 802.15.4 – MAC Transmission – UnSlotted CSMA 14
  • 15. IEEE 802.15.4 – MAC Transmission – Slotted CSMA 15
  • 16. Medium Access Control CSMA/CA 802.11 • CSMA/CA: Carrier Sensing Multiple Access with collision avoidance • Carrier Sensing: Listen before talking.
  • 17. Channel Contention 802.11 (Time Domain) Random Backoff = 11 Node 3 Node 2 Node 1 RB1=11 Random Backoff = 22 RB1=0 SIFS DIFS DATA ACK Time DIFS WAIT Time RB2=22 RB2=11
  • 18. Channel Contention 802.11 (Frequency Domain) • 802.11 a/g/n PHY adopt OFDM Souvik Sen, Romit Roy Choudhury, and Srihari Nelakuditi “No time to countdown: migrating backoff to the frequency domain” In Proceedings of the 17th annual international conference on Mobile computing and networking (MobiCom '11). ACM, New York, NY, USA,
  • 19. Channel Contention 802.11 (Frequency Domain) cont… • Backoff within a Collision Domain Souvik Sen, Romit Roy Choudhury, and Srihari Nelakuditi “No time to countdown: migrating backoff to the frequency domain” In Proceedings of the 17th annual international conference on Mobile computing and networking (MobiCom '11). ACM, New York, NY, USA,