SlideShare a Scribd company logo
1 of 16
A Presentation on
Random Access
Protocols
Subject :- Computer Networks
Course Code:- CS44113
Presented by:-
1. Vishal Kumar(2206008)
2. Shivam Kumar(2206027)
3. Utkarsh Dixit(2206033)
Table Contents:-
• Introduction to Random Access Protocol
• Aloha :-
a) Pure Aloha
b) Slotted Aloha
• CSMA(Carrier Sense Multiple Access)
• CSMA/CD(CSMA with collision detection)
• CSMA/CA(CSMA with collision avoidance)
Random Access Protocol
In this, all stations have same superiority that is no
station has more priority than another station. Any
station can send data depending on medium’s state( idle
or busy).
It has two features:
1. There is no fixed time for sending data.
2. There is no fixed sequence of stations sending data.
Random Access Protocol Specifies :-
-how to detect collisions.
-how to recover from collisions(via delayed retransmissions)
The Random Access protocols are further
subdivided as:-
a) ALOHA-It was designed for wireless LAN but
is also applicable for shared medium. In this,
multiple stations can transmit data at the
same time and can hence lead to collision and
data being garbled.
Vulnerable Time = 2* Frame transmission
time Throughput = G exp{-2*G}
Maximum throughput = 0.184 for G=0.5
Vulnerable Time = Frame transmission
Time Throughput = G exp{-*G}
Maximum throughput = 0.368 for G=1
References :-
-Behrouz A. Forouzon,
2007(Fourth Edition)
-
THANK YOU

More Related Content

Similar to Random Access Protocols presentation 4th Sem

Unit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdfUnit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdf
SmtPArunaKumari
 
9 multiple access
9 multiple access9 multiple access
9 multiple access
ampas03
 
Class work 7,computer_network_317
Class work 7,computer_network_317Class work 7,computer_network_317
Class work 7,computer_network_317
Khondoker Sadia
 

Similar to Random Access Protocols presentation 4th Sem (20)

Unit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdfUnit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdf
 
Computer networks lan
Computer networks lanComputer networks lan
Computer networks lan
 
9 multiple access
9 multiple access9 multiple access
9 multiple access
 
06 access methods
06 access methods06 access methods
06 access methods
 
Multiple Access in Computer Network
Multiple Access in Computer NetworkMultiple Access in Computer Network
Multiple Access in Computer Network
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)
 
dcn.pdf
dcn.pdfdcn.pdf
dcn.pdf
 
Unit_3_WSN.pptx
Unit_3_WSN.pptxUnit_3_WSN.pptx
Unit_3_WSN.pptx
 
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptxComputer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
 
Mac sub layer
Mac sub layerMac sub layer
Mac sub layer
 
Computer networks unit ii
Computer networks    unit iiComputer networks    unit ii
Computer networks unit ii
 
Class work 7,computer_network_317
Class work 7,computer_network_317Class work 7,computer_network_317
Class work 7,computer_network_317
 
Mac
MacMac
Mac
 
Bus aribration
Bus aribrationBus aribration
Bus aribration
 
CN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptxCN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptx
 
MultipleAccess.ppt
MultipleAccess.pptMultipleAccess.ppt
MultipleAccess.ppt
 
Mac
MacMac
Mac
 
Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)
 
Mac protocol for wmn
Mac protocol for wmnMac protocol for wmn
Mac protocol for wmn
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 

Recently uploaded

21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
rahulmanepalli02
 
Performance enhancement of machine learning algorithm for breast cancer diagn...
Performance enhancement of machine learning algorithm for breast cancer diagn...Performance enhancement of machine learning algorithm for breast cancer diagn...
Performance enhancement of machine learning algorithm for breast cancer diagn...
IJECEIAES
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..
MaherOthman7
 
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
drjose256
 

Recently uploaded (20)

21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
 
Geometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdfGeometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdf
 
Performance enhancement of machine learning algorithm for breast cancer diagn...
Performance enhancement of machine learning algorithm for breast cancer diagn...Performance enhancement of machine learning algorithm for breast cancer diagn...
Performance enhancement of machine learning algorithm for breast cancer diagn...
 
Dynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxDynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptx
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...
 
CLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalCLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference Modal
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..
 
Research Methodolgy & Intellectual Property Rights Series 2
Research Methodolgy & Intellectual Property Rights Series 2Research Methodolgy & Intellectual Property Rights Series 2
Research Methodolgy & Intellectual Property Rights Series 2
 
Diploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfDiploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdf
 
Raashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashid final report on Embedded Systems
Raashid final report on Embedded Systems
 
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
 
What is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, FunctionsWhat is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, Functions
 
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptx
 
Filters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsFilters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility Applications
 
Linux Systems Programming: Semaphores, Shared Memory, and Message Queues
Linux Systems Programming: Semaphores, Shared Memory, and Message QueuesLinux Systems Programming: Semaphores, Shared Memory, and Message Queues
Linux Systems Programming: Semaphores, Shared Memory, and Message Queues
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 
Introduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AIIntroduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AI
 
Passive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.pptPassive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.ppt
 
Software Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdfSoftware Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdf
 

Random Access Protocols presentation 4th Sem

  • 1. A Presentation on Random Access Protocols Subject :- Computer Networks Course Code:- CS44113 Presented by:- 1. Vishal Kumar(2206008) 2. Shivam Kumar(2206027) 3. Utkarsh Dixit(2206033)
  • 2. Table Contents:- • Introduction to Random Access Protocol • Aloha :- a) Pure Aloha b) Slotted Aloha • CSMA(Carrier Sense Multiple Access) • CSMA/CD(CSMA with collision detection) • CSMA/CA(CSMA with collision avoidance)
  • 3. Random Access Protocol In this, all stations have same superiority that is no station has more priority than another station. Any station can send data depending on medium’s state( idle or busy). It has two features: 1. There is no fixed time for sending data. 2. There is no fixed sequence of stations sending data. Random Access Protocol Specifies :- -how to detect collisions. -how to recover from collisions(via delayed retransmissions)
  • 4. The Random Access protocols are further subdivided as:- a) ALOHA-It was designed for wireless LAN but is also applicable for shared medium. In this, multiple stations can transmit data at the same time and can hence lead to collision and data being garbled.
  • 5.
  • 6.
  • 7. Vulnerable Time = 2* Frame transmission time Throughput = G exp{-2*G} Maximum throughput = 0.184 for G=0.5
  • 8.
  • 9.
  • 10. Vulnerable Time = Frame transmission Time Throughput = G exp{-*G} Maximum throughput = 0.368 for G=1
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. References :- -Behrouz A. Forouzon, 2007(Fourth Edition) -