SlideShare a Scribd company logo
1 of 40
RANDOM ACCESS
PROTOCOL IN
COMMUNICATION
BY: AMOGHA.A.K.
ELECTRICAL AND ELECTRONICS ENGINEERING DEPARTMENT
• Introduction
• Problem Statement
• History
• Need for Random access
• Functions
• What is ALOHA & CSMA?
• Flow Chart
• Simulated Graphs
• Advantages
• Limitations
• Applications
• Future Scope
• Conclusion
• References
Contents
 In random access ,each station has right to send the data.
However , if more than one station tries to send ,collision
will occur .To avoid this collision , protocols came into
existence.
 In random access method , no stations are superior &
none is assigned the control over the other .
 When a station has a data to send , it uses a procedure
defined by a protocol whether to send or not .
Introduction
When 2 users transmit the data packets at the
same time , collision occurs & these packets
are destroyed .
To avoid this , random access protocol has
been adopted .
Problem Statement
 The development of ALOHA network
commenced in 1968 at the University of
Hawaii by Norman Abramson.
 It became operational in 1971 .
 During 1980’s the frequencies were assigned
for mobile medium .
 In 1985, frequencies were made available for
WIFI facilities .
History of ALOHA
Need For Protocol
When two computers are connected via
single connection , the data collision takes
place .
Hence to avoid , a set of rules & regulations
are needed which are called the protocols.
Describes the rules that govern
the transmission of data over the
communication network.
Provides a method for orderly and
efficient exchange of data between the
sender and the receiver.
Functions of Protocol
ALOHA is for coordinating & accessing to
share communication in network channel.
It is the simplest collision resolution
protocol .
What is ALOHA ?
1.Pure Aloha:
 This is the original version of Aloha .
2.Slotted Aloha:
 This is the modified version of pure
Aloha.
Types of Aloha
What is Pure Aloha ?
 Whenever a station has a data , it transmits.
 When 2 or more stations transmit data at same time ,
there is a collision .Hence, the sender waits a random
amount of time & then re-transmit the data again .
 The waiting time is random , otherwise the same packet
will collide again .
What is Slotted Aloha ?
 Slotted ALOHA was invented to improve the efficiency of
pure ALOHA as collisions in Pure ALOHA are very high .
 In slotted ALOHA , the time is divided into discrete intervals
called slots .
 Station can send a frame only at the beginning of the slot &
only one frame is sent in each slot .
Principle of Aloha without collision
Principle of Aloha with collision
FRAMES IN PURE ALOHA
NETWORK
VULNERABLE TIME FOR PURE
ALOHA PROTOCOL
FLOW CHART FOR PURE ALOHA
FRAMES IN SLOTTED ALOHA
NETWORK
VULNERABLE TIME FOR
SLOTTED ALOHA PROTOCOL
FLOW CHART FOR SLOTTED
ALOHA
Simulated Performance of Pure
ALOHA
Simulated Performance of Slotted
ALOHA
Efficiency of Slotted v/s Pure Aloha
Comparison between Pure &
Slotted Aloha
The chances of collisions are more in
Pure ALOHA as compared to Slotted
ALOHA .
Slotted ALOHA is more efficient as
compared to Pure ALOHA .
Advantages of ALOHA
 Packet contention technique
 Single active node can continuously transmit at full
rate .
 Highly decentralized
 Simple protocol
Disadvantages of ALOHA
 Collisions
 Idle slots
 Clock synchronization
What is CSMA ?
 CSMA protocol was developed to overcome the
problem found in ALOHA i.e. to minimize the chances
of collision to improve the performance .
 CSMA is a network access method used on shared
network topologies .
 It is based on the principle of ‘carrier sense ’ .
Space / Time Model of Collision in
CSMA
Vulnerable Time in CSMA
 If the channel is idle, station transmits the frame, if busy
senses the channel after random time.
 This protocol reduces the chance of collision but longer
delays.
 It is a non - aggressive transmission algorithm.
Non- Persistence
 This protocol is called 1 – Persistence because the station
transmits with probability of 1. When it finds the
channel idle without any collision , station continuously
sense the channel until it becomes free.
 It is an aggressive transmission algorithm.
1 - Persistence
Flow Chart of Non-Persistent
Flow Chart of 1-Persistence
Channel Busy ?
Simulation of Non-Persistence
Simulation Performance of 1-
Persistence
Out of these 2-types of CSMA it is found
that Non-persistence CSMA performs the
best.
Summary of CSMA
 Low-data-rate tactical satellite communications networks by
military forces.
 In subscriber-based satellite communications networks.
 Mobile telephony call setup
 Set-top box communications
 In the contactless RFID technologies.
Applications
 Research is to be made to avoid any security
breach & improvement in packet delivery
efficiency .
Future Scope
Conclusions
Computer networks & protocols have
changed the humans working &
communication.
The digital network is empowering us for
future.
References
 www.My reading room/aloha protocol.com
 Protocol – oriented programming , Jon Hoffman
 www.searchnetworking.techtarget.com
 ALOHA Random Access that Operates as a
 Rateless Code domir Stefanovi´c, Member, IEEE, Petar Popovski,
Senior Member, IEEE 7-Aug,2013
 Throughput Analysis of Wireless Relay Slotted ALOHA Systems
with Network Coding Daisuke Umehara, Tomoya Hirano, Satoshi
Denno, and Masahiro Morikura Graduate School of Informatics,
Kyoto University Yoshida-honmachi, Sakyo-ku, Kyoto 606-8501,
Japan-IEEE -2016
 http://users.cs.cf.ac.uk/Dave.Marshall/Internet/node41.html
THANK YOU ALL & HAVE
A NICE DAY

More Related Content

What's hot

Congestion control
Congestion controlCongestion control
Congestion controlAman Jaiswal
 
Flow & Error Control
Flow & Error ControlFlow & Error Control
Flow & Error Controltameemyousaf
 
Controlled Access Protocols
Controlled Access ProtocolsControlled Access Protocols
Controlled Access ProtocolsPruthviraj Konu
 
Framming data link layer
Framming data link layerFramming data link layer
Framming data link layerPREMAL GAJJAR
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocaltes31
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11Keshav Maheshwari
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layerNaiyan Noor
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)k33a
 
Multiplexing in mobile computing
Multiplexing in mobile computingMultiplexing in mobile computing
Multiplexing in mobile computingZituSahu
 
Multiple access control protocol
Multiple access control protocol Multiple access control protocol
Multiple access control protocol meenamunesh
 
ENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGMohammad Adil
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network LayerManoj Kumar
 
Selective repeat protocol
Selective repeat protocolSelective repeat protocol
Selective repeat protocolManusha Dilan
 
HDLC(High level Data Link Control)
HDLC(High level Data Link Control)HDLC(High level Data Link Control)
HDLC(High level Data Link Control)sonangrai
 

What's hot (20)

Transport layer
Transport layer Transport layer
Transport layer
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Flow & Error Control
Flow & Error ControlFlow & Error Control
Flow & Error Control
 
Controlled Access Protocols
Controlled Access ProtocolsControlled Access Protocols
Controlled Access Protocols
 
Framming data link layer
Framming data link layerFramming data link layer
Framming data link layer
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
The medium access sublayer
 The medium  access sublayer The medium  access sublayer
The medium access sublayer
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
GO BACK N PROTOCOL
GO BACK N PROTOCOLGO BACK N PROTOCOL
GO BACK N PROTOCOL
 
Multiplexing in mobile computing
Multiplexing in mobile computingMultiplexing in mobile computing
Multiplexing in mobile computing
 
Multiple access control protocol
Multiple access control protocol Multiple access control protocol
Multiple access control protocol
 
ENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELING
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 
Point to-point protocol (ppp)
Point to-point protocol (ppp)Point to-point protocol (ppp)
Point to-point protocol (ppp)
 
Selective repeat protocol
Selective repeat protocolSelective repeat protocol
Selective repeat protocol
 
Token ring
Token ringToken ring
Token ring
 
HDLC(High level Data Link Control)
HDLC(High level Data Link Control)HDLC(High level Data Link Control)
HDLC(High level Data Link Control)
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 

Similar to RANDOM ACCESS PROTOCOL IN COMMUNICATION

Media Access Control
Media Access ControlMedia Access Control
Media Access ControlHusnainHadi
 
SLOTTED ALOHA and pure aloha are the category of aloha
SLOTTED ALOHA and pure aloha are the category of alohaSLOTTED ALOHA and pure aloha are the category of aloha
SLOTTED ALOHA and pure aloha are the category of alohaAkshathaM29
 
Unit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdfUnit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdfSmtPArunaKumari
 
the Multiple Access SLIDE for university students
the Multiple Access SLIDE for university studentsthe Multiple Access SLIDE for university students
the Multiple Access SLIDE for university studentsnovrain1
 
Computer Network MAC Layer Notes as per RGPV syllabus
Computer Network MAC Layer Notes as per RGPV syllabusComputer Network MAC Layer Notes as per RGPV syllabus
Computer Network MAC Layer Notes as per RGPV syllabusNANDINI SHARMA
 
UNIT-V Wireless Communication.pdf
UNIT-V Wireless Communication.pdfUNIT-V Wireless Communication.pdf
UNIT-V Wireless Communication.pdfvadasairaju143
 
CN R16 -UNIT-4.pdf
CN R16 -UNIT-4.pdfCN R16 -UNIT-4.pdf
CN R16 -UNIT-4.pdfJoshuaeeda1
 
M.A.C (Medium Access Control)
M.A.C (Medium Access Control)M.A.C (Medium Access Control)
M.A.C (Medium Access Control)JaironLanda
 
MEDIUM-ACCESS CONTROL SUB LAYER.ppt
MEDIUM-ACCESS CONTROL SUB LAYER.pptMEDIUM-ACCESS CONTROL SUB LAYER.ppt
MEDIUM-ACCESS CONTROL SUB LAYER.pptDrTThendralCompSci
 
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptxComputer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptxPravinbhargav
 
9 multiple access
9 multiple access9 multiple access
9 multiple accessampas03
 

Similar to RANDOM ACCESS PROTOCOL IN COMMUNICATION (20)

Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
SLOTTED ALOHA and pure aloha are the category of aloha
SLOTTED ALOHA and pure aloha are the category of alohaSLOTTED ALOHA and pure aloha are the category of aloha
SLOTTED ALOHA and pure aloha are the category of aloha
 
Unit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part BUnit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part B
 
Unit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdfUnit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdf
 
the Multiple Access SLIDE for university students
the Multiple Access SLIDE for university studentsthe Multiple Access SLIDE for university students
the Multiple Access SLIDE for university students
 
CN.pptx
CN.pptxCN.pptx
CN.pptx
 
Computer Network MAC Layer Notes as per RGPV syllabus
Computer Network MAC Layer Notes as per RGPV syllabusComputer Network MAC Layer Notes as per RGPV syllabus
Computer Network MAC Layer Notes as per RGPV syllabus
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
UNIT-V Wireless Communication.pdf
UNIT-V Wireless Communication.pdfUNIT-V Wireless Communication.pdf
UNIT-V Wireless Communication.pdf
 
aloha
alohaaloha
aloha
 
CN R16 -UNIT-4.pdf
CN R16 -UNIT-4.pdfCN R16 -UNIT-4.pdf
CN R16 -UNIT-4.pdf
 
dcn.pdf
dcn.pdfdcn.pdf
dcn.pdf
 
Mac sub layer
Mac sub layerMac sub layer
Mac sub layer
 
M.A.C (Medium Access Control)
M.A.C (Medium Access Control)M.A.C (Medium Access Control)
M.A.C (Medium Access Control)
 
MEDIUM-ACCESS CONTROL SUB LAYER.ppt
MEDIUM-ACCESS CONTROL SUB LAYER.pptMEDIUM-ACCESS CONTROL SUB LAYER.ppt
MEDIUM-ACCESS CONTROL SUB LAYER.ppt
 
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptxComputer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
 
9 multiple access
9 multiple access9 multiple access
9 multiple access
 
Unit 1 mac vsd
Unit 1 mac vsdUnit 1 mac vsd
Unit 1 mac vsd
 
MAC
MACMAC
MAC
 
kamalaveni.ppt
kamalaveni.pptkamalaveni.ppt
kamalaveni.ppt
 

Recently uploaded

Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 

Recently uploaded (20)

Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 

RANDOM ACCESS PROTOCOL IN COMMUNICATION

  • 1. RANDOM ACCESS PROTOCOL IN COMMUNICATION BY: AMOGHA.A.K. ELECTRICAL AND ELECTRONICS ENGINEERING DEPARTMENT
  • 2. • Introduction • Problem Statement • History • Need for Random access • Functions • What is ALOHA & CSMA? • Flow Chart • Simulated Graphs • Advantages • Limitations • Applications • Future Scope • Conclusion • References Contents
  • 3.  In random access ,each station has right to send the data. However , if more than one station tries to send ,collision will occur .To avoid this collision , protocols came into existence.  In random access method , no stations are superior & none is assigned the control over the other .  When a station has a data to send , it uses a procedure defined by a protocol whether to send or not . Introduction
  • 4. When 2 users transmit the data packets at the same time , collision occurs & these packets are destroyed . To avoid this , random access protocol has been adopted . Problem Statement
  • 5.  The development of ALOHA network commenced in 1968 at the University of Hawaii by Norman Abramson.  It became operational in 1971 .  During 1980’s the frequencies were assigned for mobile medium .  In 1985, frequencies were made available for WIFI facilities . History of ALOHA
  • 6. Need For Protocol When two computers are connected via single connection , the data collision takes place . Hence to avoid , a set of rules & regulations are needed which are called the protocols.
  • 7. Describes the rules that govern the transmission of data over the communication network. Provides a method for orderly and efficient exchange of data between the sender and the receiver. Functions of Protocol
  • 8. ALOHA is for coordinating & accessing to share communication in network channel. It is the simplest collision resolution protocol . What is ALOHA ?
  • 9. 1.Pure Aloha:  This is the original version of Aloha . 2.Slotted Aloha:  This is the modified version of pure Aloha. Types of Aloha
  • 10. What is Pure Aloha ?  Whenever a station has a data , it transmits.  When 2 or more stations transmit data at same time , there is a collision .Hence, the sender waits a random amount of time & then re-transmit the data again .  The waiting time is random , otherwise the same packet will collide again .
  • 11. What is Slotted Aloha ?  Slotted ALOHA was invented to improve the efficiency of pure ALOHA as collisions in Pure ALOHA are very high .  In slotted ALOHA , the time is divided into discrete intervals called slots .  Station can send a frame only at the beginning of the slot & only one frame is sent in each slot .
  • 12. Principle of Aloha without collision
  • 13. Principle of Aloha with collision
  • 14. FRAMES IN PURE ALOHA NETWORK
  • 15. VULNERABLE TIME FOR PURE ALOHA PROTOCOL
  • 16. FLOW CHART FOR PURE ALOHA
  • 17. FRAMES IN SLOTTED ALOHA NETWORK
  • 18. VULNERABLE TIME FOR SLOTTED ALOHA PROTOCOL
  • 19. FLOW CHART FOR SLOTTED ALOHA
  • 21. Simulated Performance of Slotted ALOHA
  • 22. Efficiency of Slotted v/s Pure Aloha
  • 23. Comparison between Pure & Slotted Aloha The chances of collisions are more in Pure ALOHA as compared to Slotted ALOHA . Slotted ALOHA is more efficient as compared to Pure ALOHA .
  • 24. Advantages of ALOHA  Packet contention technique  Single active node can continuously transmit at full rate .  Highly decentralized  Simple protocol
  • 25. Disadvantages of ALOHA  Collisions  Idle slots  Clock synchronization
  • 26. What is CSMA ?  CSMA protocol was developed to overcome the problem found in ALOHA i.e. to minimize the chances of collision to improve the performance .  CSMA is a network access method used on shared network topologies .  It is based on the principle of ‘carrier sense ’ .
  • 27. Space / Time Model of Collision in CSMA
  • 29.  If the channel is idle, station transmits the frame, if busy senses the channel after random time.  This protocol reduces the chance of collision but longer delays.  It is a non - aggressive transmission algorithm. Non- Persistence
  • 30.  This protocol is called 1 – Persistence because the station transmits with probability of 1. When it finds the channel idle without any collision , station continuously sense the channel until it becomes free.  It is an aggressive transmission algorithm. 1 - Persistence
  • 31. Flow Chart of Non-Persistent
  • 32. Flow Chart of 1-Persistence Channel Busy ?
  • 34. Simulation Performance of 1- Persistence
  • 35. Out of these 2-types of CSMA it is found that Non-persistence CSMA performs the best. Summary of CSMA
  • 36.  Low-data-rate tactical satellite communications networks by military forces.  In subscriber-based satellite communications networks.  Mobile telephony call setup  Set-top box communications  In the contactless RFID technologies. Applications
  • 37.  Research is to be made to avoid any security breach & improvement in packet delivery efficiency . Future Scope
  • 38. Conclusions Computer networks & protocols have changed the humans working & communication. The digital network is empowering us for future.
  • 39. References  www.My reading room/aloha protocol.com  Protocol – oriented programming , Jon Hoffman  www.searchnetworking.techtarget.com  ALOHA Random Access that Operates as a  Rateless Code domir Stefanovi´c, Member, IEEE, Petar Popovski, Senior Member, IEEE 7-Aug,2013  Throughput Analysis of Wireless Relay Slotted ALOHA Systems with Network Coding Daisuke Umehara, Tomoya Hirano, Satoshi Denno, and Masahiro Morikura Graduate School of Informatics, Kyoto University Yoshida-honmachi, Sakyo-ku, Kyoto 606-8501, Japan-IEEE -2016  http://users.cs.cf.ac.uk/Dave.Marshall/Internet/node41.html
  • 40. THANK YOU ALL & HAVE A NICE DAY