SlideShare a Scribd company logo
6
Most read
8
Most read
9
Most read
VISVESVARAYA TECHNOLOGICAL UNIVERSITY
BELAGAVI – 590018
GOVERNMENT ENGINEERING COLLEGE,
KUSHALNAGARA 571234
Department of Electronics And Communication Engineering
SUBJECT: Computer Communication Network [21EC53]
TOPIC : Slotted Aloha and CSMA
PRESENTED BY;
Akshatha M
USN:4GL21EC002
PRESENTED TO;
PROF.Roopa
INDEX
 MULTIPLE Access protocol
 Aloha
 Pure Aloha
 Slotted aloha
 CSMA protocol
 Types of CSMA protocol
Multiple Access Protocol
Random Access
Protocols
Controlled Access
Protocols
Channelization
Protocols
ALOHA
What is aloha?
 Aloha is a random access protocol.
 It was actually designed for WLAN but it is also applicable for shared
medium
 In this, mulyiple stations can transmit data at the same time and can
hence lead to collision & data being garbled
TYPES
 Pure Aloha
 Slotted Aloha
PURE ALOHA
SLOTTED ALOHA
It was developed just to improve the efficiency of pure aloha as the
chances for collision in pure aloha are high.
The time of the shared channel is divided into discrete time
intervals called slots.
Sending of data is allowed only at the beginning of these slots.
If a station misses out the allowed time, it must wait for the next
slot. This reduces the probability of collision.
Vulnerable Time= Frame Transmission Time
Throughput = G x e^-G; Where G is the number of stations wish to
transmit in the same time.
Maximum Throughput = 0.368 gor G=1.
SLOTTED ALOHA
PURE ALOHA V/S SLOTTED ALOHA
Pure Aloha Slotted Aloha
Any Station can transmit the data at any time. Any station can transmit the data at the beginning
of any time slot.
The time is continuous and not globally
synchronized.
The time is discret and globally synchronized.
Vulnerable time in which collision may occur=2 x Tfr Vulnerable time in which collision may occur = Tfr
Probability of successful transmission of data packet
=G x e^-2G
Probability of successful transmission of data
packet=G x e^-G
Maximum efficiency=18.4%(occurs at G=1/2) Maximum efficiency = 36.8% (occurs at G=1)
Main advantage: Simplicity in implementation. Main advantage : It reduces the number of
collisions to half and doubles the efficiency of pure
aloha
CSMA PROTOCOL
• CSMA Stands for Carrier Sense Multiple Access.
• To minimize the chance of collision and, therefore, increase the
performance, the CSMA method was developed.
• Principle of CSMA :”Sense before transmit” or “listen before talk”.
• Carrier busy = Transmission is taking place.
• Carrier idle = No transmission currently taking place.
• The possibility of collision still exist because of propagation delay; a station
may sense the medium and find it idle,only because the first bit sent by
another station has not yet been received.
Space /time model of collision in CSMA
Vulnerable time in CSMA
What are the types of CSMA?
1-persistent CSMA
• The 1-persistent method is simple and straightforward.
• In this method, after the station finds the line idle, it sends its frame immediately
with probability 1.
• This method has the highest chance of collision because two or more stations may
find the line idle
Nonpersistent
• In the nonpersistent method, a station that has a frame to send senses the
line.
• If the line is idle, it sends immediately.
• If the line is not idle, it waits a random amount of time and then senses the
line again.
• The nonpersistent approach reduces the chance of collision
• This method reduces the efficiency of the network
p-Persistent
• The p-persistent method is used if the channel has time slots with a slot
duration equal to or greater than the maximum propagation time.
• It reduces the chance of collision and improves efficiency.
• In this method, after the station finds the line idle it follows these steps:
• 1. With probability p, the station sends its frame.
2. With probability q = 1 − p, the station waits for the beginning of the next
time slot and checks the line again.
a. If the line is idle, it goes to step 1.
b. If the line is busy, it acts as though a collision has occurred and uses the
backoff procedure.
Behaviour of three persistence methods
Flow diagrams of three persistence methods
THANK YOU

More Related Content

PPTX
Pure aloha
HarshithGade
 
PPT
Csma
myrajendra
 
PPTX
Framing in data link layer
Ahtesham Ullah khan
 
PPTX
Csma cd and csma-ca
kazim Hussain
 
PDF
CSMA /CD PPT ON SLIDESHARE
Khushboo Pal
 
PPTX
Media Access Control
VijayaLakshmi514
 
PPTX
Carrier-sense multiple access with collision avoidance CSMA/CA
Soumen Santra
 
PPTX
Computer network switching
Shivani Godha
 
Pure aloha
HarshithGade
 
Framing in data link layer
Ahtesham Ullah khan
 
Csma cd and csma-ca
kazim Hussain
 
CSMA /CD PPT ON SLIDESHARE
Khushboo Pal
 
Media Access Control
VijayaLakshmi514
 
Carrier-sense multiple access with collision avoidance CSMA/CA
Soumen Santra
 
Computer network switching
Shivani Godha
 

What's hot (20)

PPTX
Computer networks - Channelization
Elambaruthi Elambaruthi
 
PPSX
Issues in Data Link Layer
selvakumar_b1985
 
PPTX
ALOHA Protocol (in detail)
Hinal Lunagariya
 
PPTX
Sliding window protocol(ARQ technique)
shilpa patel
 
PPTX
Stop-and-Wait ARQ Protocol
praneetayargattikar
 
PPTX
Csma protocols
Manal Shah
 
PPT
data-link layer protocols
BE Smârt
 
PPTX
The medium access sublayer
Lal Bahadur Gehlot
 
PPT
Data link control
Iffat Anjum
 
PPTX
Multiple Access Protocal
tes31
 
PPSX
Multiple access control protocol
meenamunesh
 
PPTX
Go back-n protocol
STEFFY D
 
PPTX
Congestion control
Aman Jaiswal
 
PPTX
TCP and UDP
Ramesh Giri
 
PPT
Sliding window protocol
Shehara Abeythunga
 
PPTX
Synchronous and Asynchronous Transmission
Adeel Rasheed
 
PPT
Chapter 4 data link layer
Naiyan Noor
 
PPT
aloha
DeepikaT13
 
PDF
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Kaushik Panta
 
PPTX
Multiple access protocol
Merlin Florrence
 
Computer networks - Channelization
Elambaruthi Elambaruthi
 
Issues in Data Link Layer
selvakumar_b1985
 
ALOHA Protocol (in detail)
Hinal Lunagariya
 
Sliding window protocol(ARQ technique)
shilpa patel
 
Stop-and-Wait ARQ Protocol
praneetayargattikar
 
Csma protocols
Manal Shah
 
data-link layer protocols
BE Smârt
 
The medium access sublayer
Lal Bahadur Gehlot
 
Data link control
Iffat Anjum
 
Multiple Access Protocal
tes31
 
Multiple access control protocol
meenamunesh
 
Go back-n protocol
STEFFY D
 
Congestion control
Aman Jaiswal
 
TCP and UDP
Ramesh Giri
 
Sliding window protocol
Shehara Abeythunga
 
Synchronous and Asynchronous Transmission
Adeel Rasheed
 
Chapter 4 data link layer
Naiyan Noor
 
aloha
DeepikaT13
 
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Kaushik Panta
 
Multiple access protocol
Merlin Florrence
 
Ad

Similar to SLOTTED ALOHA and pure aloha are the category of aloha (20)

PPTX
Unit 3 - Data Link Layer - Part B
Chandan Gupta Bhagat
 
PPTX
Computer Networks ppt for the following data base and it's analysis
canyouclosethatdoor
 
PDF
CN R16 -UNIT-4.pdf
Joshuaeeda1
 
PPT
mux aloha csma schemes in networking world
circularsuom
 
PPTX
Multiple access protocol
IndrajaMeghavathula
 
PPTX
module 2 ppt.pptx
Divya Mani
 
PPT
Multiple Access Techniques
inayat khan
 
PPT
Unit 1 mac vsd
SHUBHAM MORGAONKAR
 
PPT
multiple access techniquesch12-multiple-access.ppt
bandiprathyu
 
PPTX
RANDOM ACCESS PROTOCOL IN COMMUNICATION
AMOGHA A K
 
PPTX
Lecture 10
Anwal Mirza
 
PPT
Forouzan _ Multiple access protocols.ppt
drmerinskariah
 
PPTX
MAC COMPUTER NETWORK DATA LINK LAYER PROTOCOLS.pptx
troqia
 
PPTX
computer__networks .pptx
chmanvitha2
 
PPT
kamalaveni.ppt
PoituErmawantia1
 
PPTX
Media Access Control (MAC Layer)
Meenakshi Paul
 
PPT
Chapt-06.ppt
SureshChavhan9
 
PPT
the Multiple Access SLIDE for university students
novrain1
 
PPT
lecture5aseel.pptsssssssssssssssssssssssss
MrMohammedZakirBELEC
 
PDF
Dc ch09 : high speed la ns and wireless lans
Syaiful Ahdan
 
Unit 3 - Data Link Layer - Part B
Chandan Gupta Bhagat
 
Computer Networks ppt for the following data base and it's analysis
canyouclosethatdoor
 
CN R16 -UNIT-4.pdf
Joshuaeeda1
 
mux aloha csma schemes in networking world
circularsuom
 
Multiple access protocol
IndrajaMeghavathula
 
module 2 ppt.pptx
Divya Mani
 
Multiple Access Techniques
inayat khan
 
Unit 1 mac vsd
SHUBHAM MORGAONKAR
 
multiple access techniquesch12-multiple-access.ppt
bandiprathyu
 
RANDOM ACCESS PROTOCOL IN COMMUNICATION
AMOGHA A K
 
Lecture 10
Anwal Mirza
 
Forouzan _ Multiple access protocols.ppt
drmerinskariah
 
MAC COMPUTER NETWORK DATA LINK LAYER PROTOCOLS.pptx
troqia
 
computer__networks .pptx
chmanvitha2
 
kamalaveni.ppt
PoituErmawantia1
 
Media Access Control (MAC Layer)
Meenakshi Paul
 
Chapt-06.ppt
SureshChavhan9
 
the Multiple Access SLIDE for university students
novrain1
 
lecture5aseel.pptsssssssssssssssssssssssss
MrMohammedZakirBELEC
 
Dc ch09 : high speed la ns and wireless lans
Syaiful Ahdan
 
Ad

More from AkshathaM29 (8)

PPTX
Laser security final yea projectsss.pptx
AkshathaM29
 
PPTX
3rd sem socialconnectivityand responsibility.pptx
AkshathaM29
 
PPTX
Terahertz_Communication_Presentation.pptx
AkshathaM29
 
PPTX
Detailed_Terahertz_Communication_Presentation.pptx
AkshathaM29
 
PPTX
Terahertz_Communication_Presentation.pptx
AkshathaM29
 
PPTX
Detailed_Terahertz_Communication_Presentation.pptx
AkshathaM29
 
PPTX
Detailed_Terahertz_Communication_Presentation.pptx
AkshathaM29
 
PPTX
Terahertz band communication Presentation (1).pptx
AkshathaM29
 
Laser security final yea projectsss.pptx
AkshathaM29
 
3rd sem socialconnectivityand responsibility.pptx
AkshathaM29
 
Terahertz_Communication_Presentation.pptx
AkshathaM29
 
Detailed_Terahertz_Communication_Presentation.pptx
AkshathaM29
 
Terahertz_Communication_Presentation.pptx
AkshathaM29
 
Detailed_Terahertz_Communication_Presentation.pptx
AkshathaM29
 
Detailed_Terahertz_Communication_Presentation.pptx
AkshathaM29
 
Terahertz band communication Presentation (1).pptx
AkshathaM29
 

Recently uploaded (20)

PDF
Zero Carbon Building Performance standard
BassemOsman1
 
PPTX
Civil Engineering Practices_BY Sh.JP Mishra 23.09.pptx
bineetmishra1990
 
PPTX
easa module 3 funtamental electronics.pptx
tryanothert7
 
PDF
Chad Ayach - A Versatile Aerospace Professional
Chad Ayach
 
PDF
Biodegradable Plastics: Innovations and Market Potential (www.kiu.ac.ug)
publication11
 
PDF
Software Testing Tools - names and explanation
shruti533256
 
PDF
Introduction to Data Science: data science process
ShivarkarSandip
 
PPTX
Module2 Data Base Design- ER and NF.pptx
gomathisankariv2
 
PPTX
22PCOAM21 Session 2 Understanding Data Source.pptx
Guru Nanak Technical Institutions
 
PPTX
Introduction of deep learning in cse.pptx
fizarcse
 
PDF
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
PPTX
database slide on modern techniques for optimizing database queries.pptx
aky52024
 
PDF
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
PDF
top-5-use-cases-for-splunk-security-analytics.pdf
yaghutialireza
 
PDF
July 2025: Top 10 Read Articles Advanced Information Technology
ijait
 
PPT
Ppt for engineering students application on field effect
lakshmi.ec
 
PDF
Principles of Food Science and Nutritions
Dr. Yogesh Kumar Kosariya
 
PDF
Unit I Part II.pdf : Security Fundamentals
Dr. Madhuri Jawale
 
PDF
Traditional Exams vs Continuous Assessment in Boarding Schools.pdf
The Asian School
 
PDF
Cryptography and Information :Security Fundamentals
Dr. Madhuri Jawale
 
Zero Carbon Building Performance standard
BassemOsman1
 
Civil Engineering Practices_BY Sh.JP Mishra 23.09.pptx
bineetmishra1990
 
easa module 3 funtamental electronics.pptx
tryanothert7
 
Chad Ayach - A Versatile Aerospace Professional
Chad Ayach
 
Biodegradable Plastics: Innovations and Market Potential (www.kiu.ac.ug)
publication11
 
Software Testing Tools - names and explanation
shruti533256
 
Introduction to Data Science: data science process
ShivarkarSandip
 
Module2 Data Base Design- ER and NF.pptx
gomathisankariv2
 
22PCOAM21 Session 2 Understanding Data Source.pptx
Guru Nanak Technical Institutions
 
Introduction of deep learning in cse.pptx
fizarcse
 
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
database slide on modern techniques for optimizing database queries.pptx
aky52024
 
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
top-5-use-cases-for-splunk-security-analytics.pdf
yaghutialireza
 
July 2025: Top 10 Read Articles Advanced Information Technology
ijait
 
Ppt for engineering students application on field effect
lakshmi.ec
 
Principles of Food Science and Nutritions
Dr. Yogesh Kumar Kosariya
 
Unit I Part II.pdf : Security Fundamentals
Dr. Madhuri Jawale
 
Traditional Exams vs Continuous Assessment in Boarding Schools.pdf
The Asian School
 
Cryptography and Information :Security Fundamentals
Dr. Madhuri Jawale
 

SLOTTED ALOHA and pure aloha are the category of aloha

  • 1. VISVESVARAYA TECHNOLOGICAL UNIVERSITY BELAGAVI – 590018 GOVERNMENT ENGINEERING COLLEGE, KUSHALNAGARA 571234 Department of Electronics And Communication Engineering SUBJECT: Computer Communication Network [21EC53] TOPIC : Slotted Aloha and CSMA PRESENTED BY; Akshatha M USN:4GL21EC002 PRESENTED TO; PROF.Roopa
  • 2. INDEX  MULTIPLE Access protocol  Aloha  Pure Aloha  Slotted aloha  CSMA protocol  Types of CSMA protocol
  • 3. Multiple Access Protocol Random Access Protocols Controlled Access Protocols Channelization Protocols
  • 4. ALOHA What is aloha?  Aloha is a random access protocol.  It was actually designed for WLAN but it is also applicable for shared medium  In this, mulyiple stations can transmit data at the same time and can hence lead to collision & data being garbled TYPES  Pure Aloha  Slotted Aloha
  • 6. SLOTTED ALOHA It was developed just to improve the efficiency of pure aloha as the chances for collision in pure aloha are high. The time of the shared channel is divided into discrete time intervals called slots. Sending of data is allowed only at the beginning of these slots. If a station misses out the allowed time, it must wait for the next slot. This reduces the probability of collision.
  • 7. Vulnerable Time= Frame Transmission Time Throughput = G x e^-G; Where G is the number of stations wish to transmit in the same time. Maximum Throughput = 0.368 gor G=1.
  • 9. PURE ALOHA V/S SLOTTED ALOHA Pure Aloha Slotted Aloha Any Station can transmit the data at any time. Any station can transmit the data at the beginning of any time slot. The time is continuous and not globally synchronized. The time is discret and globally synchronized. Vulnerable time in which collision may occur=2 x Tfr Vulnerable time in which collision may occur = Tfr Probability of successful transmission of data packet =G x e^-2G Probability of successful transmission of data packet=G x e^-G Maximum efficiency=18.4%(occurs at G=1/2) Maximum efficiency = 36.8% (occurs at G=1) Main advantage: Simplicity in implementation. Main advantage : It reduces the number of collisions to half and doubles the efficiency of pure aloha
  • 10. CSMA PROTOCOL • CSMA Stands for Carrier Sense Multiple Access. • To minimize the chance of collision and, therefore, increase the performance, the CSMA method was developed. • Principle of CSMA :”Sense before transmit” or “listen before talk”. • Carrier busy = Transmission is taking place. • Carrier idle = No transmission currently taking place. • The possibility of collision still exist because of propagation delay; a station may sense the medium and find it idle,only because the first bit sent by another station has not yet been received.
  • 11. Space /time model of collision in CSMA
  • 13. What are the types of CSMA? 1-persistent CSMA • The 1-persistent method is simple and straightforward. • In this method, after the station finds the line idle, it sends its frame immediately with probability 1. • This method has the highest chance of collision because two or more stations may find the line idle Nonpersistent • In the nonpersistent method, a station that has a frame to send senses the line. • If the line is idle, it sends immediately. • If the line is not idle, it waits a random amount of time and then senses the line again. • The nonpersistent approach reduces the chance of collision • This method reduces the efficiency of the network
  • 14. p-Persistent • The p-persistent method is used if the channel has time slots with a slot duration equal to or greater than the maximum propagation time. • It reduces the chance of collision and improves efficiency. • In this method, after the station finds the line idle it follows these steps: • 1. With probability p, the station sends its frame. 2. With probability q = 1 − p, the station waits for the beginning of the next time slot and checks the line again. a. If the line is idle, it goes to step 1. b. If the line is busy, it acts as though a collision has occurred and uses the backoff procedure.
  • 15. Behaviour of three persistence methods
  • 16. Flow diagrams of three persistence methods