Professional Documents
Culture Documents
Random Access Protocol
Random Access Protocol
Random Access Protocol
Efficiency
The efficiency of the Pure ALOHA is as given below where G
denotes the number of stations that are willing to transmit the
data.
The maximum efficiency of the Pure ALOHA is very less
because of the large number of collisions. And the maximum
efficiency comes out as 18.4% on putting G=(1/2).
Vulnerable time
It is the time when there is the possibility of collision.
And the Vulnerable time in the case of Pure ALOHA is:
2 x T fr
Slotted ALOHA
• the slotted ALOHA the time of the shared channel is simply divided
into discrete intervals that are commonly known as Time Slots.
• In Slotted ALOHA it is imposed on each station to send the data only
at the beginning of the time slot.
• As a station is allowed to send the data only at the beginning of the
time slot, in case if any station misses this moment then it must have
to wait until the beginning of the next time slot.
• In case if two stations try to send at the beginning of the same time
slot then there are chances for the occurrence of the collision
Efficiency
The efficiency of the slotted ALOHA is as given below:
In the Pure ALOHA, the station can transmit the data frame whenever the In this, the station can transmit the data only at the beginning of the time
station has data to send. slot.
In the case of Pure ALOHA, the time is continuous In the case of Slotted ALOHA, the time is discrete and is in the form of
time slots.
One of the main advantages of using the slotted ALOHA is that there is a
One of the main advantages of using Pure ALOHA is that the reduction in the number of collisions and there is an increase in
implementation of this method is simple. efficiency as compared to Pure ALOHA. In simple terms, collisions are
reduced to half while the efficiency increases to double.
The efficiency offered by the Pure ALOHA is 18.4%. The Efficiency offered by the slotted ALOHA is 36.8%
The probability of the successful transmission of the data packet is equals The probability of the successful transmission of the data packet is equals
to G x e-2G to G x e-G
The Vulnerable time offered by the Pure ALOHA is 2 x T fr The Vulnerable time offered by the slotted ALOHA is T fr
Carrier Sense Multiple Access
• On the shared medium, whenever any channel has a data frame to transmit, then the station attempts to detect the
presence of any carrier signal from the other stations that are connected to the shared medium.
• In case the station detects any carrier signal on the shared medium then it means that another transmission is in the
progress on the shared medium.
• After that, the station waits until the ongoing transmission completes, and then after the completion, the station
then initiates its own transmission. Generally, the transmission by the station is received by all other stations that are
connected to the channel/link.
• As in CSMA, all stations detect before sending their own frames this leads to the reduction in the collision of frames.
Example:If the shared medium is detected as idle by the two stations and they both initiate the transmission
simultaneously then it will lead to the collision of frames.
Example, if station A wants to send data, it will first sense the medium.If it finds the channel idle, it will start sending
data. However, by the time the first bit of data is transmitted (delayed due to propagation delay) from station A, if
station B requests to send data and senses the medium it will also find it idle and will also send data. This will result in
collision of data from station A and B.
CSMA access modes-
• 1-persistent: The node senses the channel, if idle it sends the data, otherwise it
continuously keeps on checking the medium for being idle and transmits
unconditionally(with 1 probability) as soon as the channel gets idle.
• Non-Persistent: The node senses the channel, if idle it sends the data, otherwise it
checks the medium after a random amount of time (not continuously) and transmits
when found idle.
• P-persistent: The node senses the medium, if idle it sends the data with p probability.
If the data is not transmitted ((1-p) probability) then it waits for some time and checks
the medium again, now if it is found idle then it send with p probability. This repeat
continues until the frame is sent. It is used in Wifi and packet radio systems.
• O-persistent: Superiority of nodes is decided beforehand and transmission occurs in
that order. If the medium is idle, node waits for its time slot to send data.
In this method, once the station finds that the medium is idle
then it immediately sends the frame. By using this method
there are higher chances for collision because it is possible that
two or more stations find the shared medium idle at the same
time and then they send their frames immediately.