0% found this document useful (0 votes)
18 views10 pages

Final Pro Max

Uploaded by

mk574412
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views10 pages

Final Pro Max

Uploaded by

mk574412
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Introduction to Aloha

in Computer Networks

Aloha is a fundamental multiple access protocol used in wireless communication


networks. It allows multiple users to share the same communication channel
without pre-coordination, enabling efficient and decentralized data transmission.

Presented by Varun Kotwal


(03-ite-2022)
Definition of Aloha
What is Aloha? Access Mechanism Simplicity
Aloha is a medium access Aloha allows nodes to The simplicity of Aloha
control (MAC) protocol used transmit data whenever they makes it easy to implement
in computer networks, have information ready, and suitable for networks with
particularly in wireless and without any coordination or low traffic or where
satellite communication scheduling with other nodes. centralized coordination is not
systems. feasible.
Types of Aloha
1. Pure Aloha: The original Aloha protocol where stations transmit data
whenever they have a packet ready, leading to a high risk of collisions.

2. Slotted Aloha: An improved version where time is divided into discrete


slots, and stations can only transmit at the beginning of a slot, reducing
the probability of collisions.

3. Reservation Aloha: Stations reserve a time slot for data transmission by


first sending a short reservation packet, reducing the likelihood of
collisions.
Pure Aloha
Pure Aloha is the simplest form of the Aloha protocol, a medium access control
(MAC) protocol used in early wireless computer networks. In Pure Aloha,
devices transmit data frames whenever they have data to send, without any
coordination or scheduling.

The key characteristic of Pure Aloha is that devices do not listen for other
transmissions before sending their own. This results in a higher likelihood of
collisions, where multiple devices transmit simultaneously, corrupting the data
frames.
Slotted Aloha
Time Slots 1
In slotted Aloha, time is divided into
discrete time slots, and transmissions can
only occur at the beginning of these slots. 2 Synchronized Transmissions
Slotted Aloha requires all stations to be
synchronized to the same time slots,
making it more efficient than pure Aloha.
Reduced Collisions 3
By restricting transmissions to the start of
time slots, slotted Aloha reduces the
probability of collisions compared to pure
Aloha.
Reservation Aloha
What is How does it Benefits of Applications of
Reservation work? Reservation Reservation
Aloha? Aloha Aloha
Users first request a
Reservation Aloha is a reservation from the Reservation Aloha Reservation Aloha is
modification of the central controller, offers improved commonly used in
basic Aloha protocol which then assigns throughput, reduced satellite
that aims to improve them a specific time latency, and better communications,
its efficiency and slot for transmission. fairness in channel mobile data networks,
reliability. In this This reservation-based access compared to and industrial
scheme, users reserve approach ensures that the original Aloha automation systems,
time slots in advance only one user is protocol. It is where the
to transmit their data, transmitting at a given particularly useful in coordination and
reducing the time, greatly reducing scenarios with high reliability of data
likelihood of the risk of packet traffic loads or where transmissions are
collisions. collisions. reliability is critical.
paramount.
Advantages of Aloha

1 Simplicity 2 Decentralized Access


Aloha protocols have a simple design, making Aloha allows for decentralized access to the
them easy to implement and understand. They shared communication channel, as each node
do not require complex scheduling or can transmit data independently without
coordination between nodes. needing permission from a central coordinator.

3 Low Overhead 4 Flexibility


Aloha protocols have minimal overhead, as Aloha can accommodate variable data packet
they do not require handshaking or sizes and can be used in a wide range of
acknowledgments, resulting in efficient use of network topologies and environments.
the available bandwidth.
Disadvantages of Aloha

Collision Issues Low Efficiency Increased Latency


Aloha protocols are prone to The random access nature of The need for retransmissions due
collisions, where multiple devices Aloha results in a relatively low to collisions can lead to increased
transmit data simultaneously, channel utilization, especially as latency, which is undesirable for
leading to data loss and the need the number of devices increases. time-sensitive applications.
for retransmissions.
+

Applications of Aloha
Aloha is widely used in various computer network applications due to its
simplicity and ease of implementation. It is commonly employed in wireless and
satellite communication systems, where the random access nature of Aloha is
well-suited for handling sporadic data transmissions.

One prominent application of Aloha is in RFID (Radio Frequency Identification)


systems, where it is used to coordinate the communication between RFID tags
and readers. Aloha's random access approach allows multiple tags to transmit
data without the need for centralized coordination.
Conclusion
In conclusion, Aloha protocols have played a significant role in the development
of computer networking by providing a simple and efficient way for devices to
share a common communication channel. While they have some limitations, their
advantages in terms of simplicity and flexibility have made them a valuable tool
in various applications, from early wireless networks to modern IoT systems.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy