What is the purpose of 802.11n Greenfield mode? Will it cause problems for existing wireless networks?
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
A device that uses 802.11n high throughput (HT) mode -- also known as Greenfield mode -- assumes that there are no 802.11a/b/g stations using the same channel. 802.11a/b/g devices cannot communicate with a Greenfield AP. Instead, their transmissions are likely to collide, causing errors and retransmissions for both parties.
Normally, 802.11 devices share channels by sensing when another device is transmitting, using a back-off timer to wait until the channel is free. However, because an 802.11a/b/g device cannot tell that a Greenfield device is transmitting, it will go right ahead and transmit. To avoid this, the 802.11n standard also defines an HT mixed mode.
A device using HT mixed mode prepares to transmit in both the old 802.11a/b/g fashion and the new 802.11n fashion. Specifically, HT mixed mode devices transmit a legacy format preamble, followed by an HT format preamble. An HT mixed mode device must also send legacy format CTS-to-Self or RTS/CTS (Request to Send/Clear to Send) frames before transmitting. These "protection mechanisms" let nearby 802.11a/b/g devices -- including those not connected to the HT mixed AP -- sense when the channel is busy.
Of course, these protection mechanisms significantly reduce an 802.11n WLAN's throughput. But they are a price that must be paid to coexist peacefully with 802.11a/b/g neighbors.
Dig Deeper on Wireless LAN Implementation
Related Q&A from Lisa Phifer
The enterprise mobility management market for wearable devices is in its infancy, but IT can still use existing EMM tools to manage wearables.continue reading
Wireless expert Lisa A. Phifer explains to what extent WEP cracking remains a worrisome issue. It all depends on your company's WLAN security policy.continue reading
Wireless expert Lisa A. Phifer explains why you shouldn't stop using 802.1X authentication methods for enterprise WLAN access control.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.