Figure 2From: Exploring random access and handshaking techniques in underwater wireless acoustic networks RTS/CTS Example 2. Back to article page