SlideShare a Scribd company logo
Sunil kumar uttam uttamsunil302@gmail.com 7800586302
TCP( Transaction control protocol ) : - TCP (Transmission Control Protocol) is a standard that
defines how to establish and maintain a network conversation via which application programs can exchange data. TCP
works with the Internet Protocol (IP), which defines how computers send packets ofdata to each other. Together, TCP and
IP are the basic rules defining the Internet. TCP is defined by the Internet Engineering Task Force (IETF) in the Request for
Comment (RFC) standards document number 793.
UDP (User Datagram Protocol ) :- The User Datagram Protocol (UDP) is simplest Transport Layer
communication protocol available of the TCP/IP protocol suite. It involves minimum amount of communication
mechanism. UDP is said to be an unreliable transport protocol but it uses IP services which provides best effort
delivery mechanism.
 UDP is used when acknowledgement of data does not hold any significance.
 UDP is good protocol for data flowing in one direction.
 UDP is simple and suitable for query based communications.
 UDP is not connection oriented.
 UDP does not provide congestion control mechanism.
 UDP does not guarantee ordered delivery of data.
 UDP is stateless.
IP ADDRESS :- The IP (Internet Protocol) is a protocol that uses datagrams to communicate over a packet-switched network.
The IP protocol operates at the network layer protocol of the OSI reference model and is a part of a suite of protocols known as TCP/IP. ...
Eachcomputer is identified by one or more gloablly unique IP addresses.Each computer is identified by one or more gloablly
unique IP addresses. The network layer PDUs are known as either "packets" or "datagrams". Each packet
carries theIP address of the sending computer and also the address of the intended recipient or recipients of
the packet. Other management information is also carried.The IPv4 protocol although widely used, is slowly
being superceded by IPv6 [RFC2460], a next-generation network-layer protocol. IPv6 is now widely
implemented, and deployed in many networks.
ALOHA:- ALOHA is a system for coordinating and arbitrating access to a shared communication Networks channel. It was
developed in the 1970s by Norman Abramson and his colleagues at the University of Hawaii. The original system used for ground
based radio broadcasting, but the system has been implemented in satellite communication systems.
Sunil kumar uttam uttamsunil302@gmail.com 7800586302
Pure ALOHA:-
• In pure ALOHA, the stations transmit frames whenever they have data to send.
• When two or more stations transmit simultaneously, there is collision and the frames are destroyed.
• In pure ALOHA, whenever any station transmits a frame, it expects the acknowledgement from the receiver.
• If acknowledgement is not received within specified time, the station assumes that the frame (or acknowledgement) has been
destroyed.
• If the frame is destroyed because of collision the station waits for a random amount of time and sends it again. This waiting time
must be random otherwise same frames will collide again and again.
• Therefore pure ALOHA dictates that when time-out period passes, each station must wait for a random amount of time before
resending its frame. This randomness will help avoid more collisions.
• Figure shows an example of frame collisions in pure ALOHA.
Slotted ALOHA:-
• Slotted ALOHA was invented to improve the efficiency of pure ALOHA as chances of collision in pure ALOHA are
very high.
• In slotted ALOHA, the time of the shared channel is divided into discrete intervals called slots.
• The stations can send a frame only at the beginning of the slot and only one frame is sent in each slot.
In slotted ALOHA, if any station is not able to place the frame onto the channel at the beginning of the slot i.e. it
misses the time slot then the station has to wait until the beginning of the next time slot.
• In slotted ALOHA, there is still a possibility of collision if two stations try to send at the beginning of the same time
slot as shown in fig.
• Slotted ALOHA still has an edge over pure ALOHA as chances of collision are reduced to one-half.

More Related Content

PDF
Lte random-access-procedure
DOC
RACH procedure in LTE
PPTX
LTE RACH Procedure
PPTX
Lte rach configuration and capacity
PPTX
RACH Procedures
PPTX
Aloha protocol in data communication and networking
PPTX
TCP/IP and UDP protocols
Lte random-access-procedure
RACH procedure in LTE
LTE RACH Procedure
Lte rach configuration and capacity
RACH Procedures
Aloha protocol in data communication and networking
TCP/IP and UDP protocols

What's hot (20)

DOCX
Rach procedure in lte
PPT
Medium Access PROTOCOL b yENGR. FAWAD KHAN UET BANNU KP PAKISTAN
PPTX
Multiple Access Protocal
PDF
Mobile transportlayer
PPT
Quality of Service(Queuing Methods)
PPT
TCP Over Wireless
PDF
LiveAction Spanning Tree Protocol (STP) Application Note
PPTX
Tcp and udp
PPTX
PPTX
Wireless Communications and a Priority Access Protocol for Multiple Mobile Te...
PPT
PPT
MULTIPLE ACCESS PROTOCOL COMPUTER NETWORKS
PPTX
Mobile Transpot Layer
PDF
IP Routing
PPT
11 Data Link_Control
PPT
Mobile transport layer
PDF
Mobile transport layer
PPTX
Link state routing protocol
PPT
Multi-Protocol Label Switching: Basics and Applications
PDF
Overview of Spanning Tree Protocol
Rach procedure in lte
Medium Access PROTOCOL b yENGR. FAWAD KHAN UET BANNU KP PAKISTAN
Multiple Access Protocal
Mobile transportlayer
Quality of Service(Queuing Methods)
TCP Over Wireless
LiveAction Spanning Tree Protocol (STP) Application Note
Tcp and udp
Wireless Communications and a Priority Access Protocol for Multiple Mobile Te...
MULTIPLE ACCESS PROTOCOL COMPUTER NETWORKS
Mobile Transpot Layer
IP Routing
11 Data Link_Control
Mobile transport layer
Mobile transport layer
Link state routing protocol
Multi-Protocol Label Switching: Basics and Applications
Overview of Spanning Tree Protocol
Ad

Similar to Computer network by uttam (20)

PPTX
Logical link protocols and service data.pptx
PPT
Mac sub layer
PDF
Unit-2 Media Access Protocols.pdf
PPTX
Packet radio protocol
PPTX
Computer Networks ppt for the following data base and it's analysis
PPT
datalink.ppt
DOCX
seminar report on multiple access control protocol submitted by munesh
DOCX
Internet protocol
PPT
Mac layer
PPT
18 internet protocols
PPTX
Web technologies: recap on TCP-IP
PDF
Aloha4thcsea 160719193815
PPTX
ALOHA Protocol (in detail)
PDF
21 Scheme_MODULE-2_CCN.pdf
PDF
Internet of things protocols for resource constrained applications
PDF
Lec9 on Computer Networks by Tarun Mangla.pdf
PPT
CS553_ST7_Ch18-InternetProtocols.ppt
PPT
Cs553 st7 ch18-internet_protocols
PPTX
Controlled Access Protocols
PPTX
Computer Networks
Logical link protocols and service data.pptx
Mac sub layer
Unit-2 Media Access Protocols.pdf
Packet radio protocol
Computer Networks ppt for the following data base and it's analysis
datalink.ppt
seminar report on multiple access control protocol submitted by munesh
Internet protocol
Mac layer
18 internet protocols
Web technologies: recap on TCP-IP
Aloha4thcsea 160719193815
ALOHA Protocol (in detail)
21 Scheme_MODULE-2_CCN.pdf
Internet of things protocols for resource constrained applications
Lec9 on Computer Networks by Tarun Mangla.pdf
CS553_ST7_Ch18-InternetProtocols.ppt
Cs553 st7 ch18-internet_protocols
Controlled Access Protocols
Computer Networks
Ad

Recently uploaded (20)

PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PDF
AI in Product Development-omnex systems
PPTX
ai tools demonstartion for schools and inter college
PPTX
Introduction to Artificial Intelligence
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PDF
Nekopoi APK 2025 free lastest update
PDF
medical staffing services at VALiNTRY
PPTX
Transform Your Business with a Software ERP System
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PDF
How Creative Agencies Leverage Project Management Software.pdf
PDF
Digital Strategies for Manufacturing Companies
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Which alternative to Crystal Reports is best for small or large businesses.pdf
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
wealthsignaloriginal-com-DS-text-... (1).pdf
Design an Analysis of Algorithms I-SECS-1021-03
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
AI in Product Development-omnex systems
ai tools demonstartion for schools and inter college
Introduction to Artificial Intelligence
Odoo POS Development Services by CandidRoot Solutions
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
Nekopoi APK 2025 free lastest update
medical staffing services at VALiNTRY
Transform Your Business with a Software ERP System
Operating system designcfffgfgggggggvggggggggg
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
How Creative Agencies Leverage Project Management Software.pdf
Digital Strategies for Manufacturing Companies
Upgrade and Innovation Strategies for SAP ERP Customers
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx

Computer network by uttam

  • 1. Sunil kumar uttam uttamsunil302@gmail.com 7800586302 TCP( Transaction control protocol ) : - TCP (Transmission Control Protocol) is a standard that defines how to establish and maintain a network conversation via which application programs can exchange data. TCP works with the Internet Protocol (IP), which defines how computers send packets ofdata to each other. Together, TCP and IP are the basic rules defining the Internet. TCP is defined by the Internet Engineering Task Force (IETF) in the Request for Comment (RFC) standards document number 793. UDP (User Datagram Protocol ) :- The User Datagram Protocol (UDP) is simplest Transport Layer communication protocol available of the TCP/IP protocol suite. It involves minimum amount of communication mechanism. UDP is said to be an unreliable transport protocol but it uses IP services which provides best effort delivery mechanism.  UDP is used when acknowledgement of data does not hold any significance.  UDP is good protocol for data flowing in one direction.  UDP is simple and suitable for query based communications.  UDP is not connection oriented.  UDP does not provide congestion control mechanism.  UDP does not guarantee ordered delivery of data.  UDP is stateless. IP ADDRESS :- The IP (Internet Protocol) is a protocol that uses datagrams to communicate over a packet-switched network. The IP protocol operates at the network layer protocol of the OSI reference model and is a part of a suite of protocols known as TCP/IP. ... Eachcomputer is identified by one or more gloablly unique IP addresses.Each computer is identified by one or more gloablly unique IP addresses. The network layer PDUs are known as either "packets" or "datagrams". Each packet carries theIP address of the sending computer and also the address of the intended recipient or recipients of the packet. Other management information is also carried.The IPv4 protocol although widely used, is slowly being superceded by IPv6 [RFC2460], a next-generation network-layer protocol. IPv6 is now widely implemented, and deployed in many networks. ALOHA:- ALOHA is a system for coordinating and arbitrating access to a shared communication Networks channel. It was developed in the 1970s by Norman Abramson and his colleagues at the University of Hawaii. The original system used for ground based radio broadcasting, but the system has been implemented in satellite communication systems.
  • 2. Sunil kumar uttam uttamsunil302@gmail.com 7800586302 Pure ALOHA:- • In pure ALOHA, the stations transmit frames whenever they have data to send. • When two or more stations transmit simultaneously, there is collision and the frames are destroyed. • In pure ALOHA, whenever any station transmits a frame, it expects the acknowledgement from the receiver. • If acknowledgement is not received within specified time, the station assumes that the frame (or acknowledgement) has been destroyed. • If the frame is destroyed because of collision the station waits for a random amount of time and sends it again. This waiting time must be random otherwise same frames will collide again and again. • Therefore pure ALOHA dictates that when time-out period passes, each station must wait for a random amount of time before resending its frame. This randomness will help avoid more collisions. • Figure shows an example of frame collisions in pure ALOHA. Slotted ALOHA:- • Slotted ALOHA was invented to improve the efficiency of pure ALOHA as chances of collision in pure ALOHA are very high. • In slotted ALOHA, the time of the shared channel is divided into discrete intervals called slots. • The stations can send a frame only at the beginning of the slot and only one frame is sent in each slot. In slotted ALOHA, if any station is not able to place the frame onto the channel at the beginning of the slot i.e. it misses the time slot then the station has to wait until the beginning of the next time slot. • In slotted ALOHA, there is still a possibility of collision if two stations try to send at the beginning of the same time slot as shown in fig. • Slotted ALOHA still has an edge over pure ALOHA as chances of collision are reduced to one-half.