Unicast Multicast and Broadcast
Unicast Multicast and Broadcast
For example: Suppose you have to send a stream of packets to all the devices over the network that your reside,
this broadcasting comes in handy. For this to achieve, it will append 255.255.255.255 (all the 32 bits of IP address
set to 1) called Limited Broadcast Address in the destination address of the datagram (packet) header which is reserved for
information transfer to all the recipients from a single client (sender) over the network.
More secure because data Less secure because data Moderately secure
Security is sent to a specific is sent to all devices in the because data is sent to a
recipient network specific group of devices
1)It can generate an end to end connection between the senders to the receiver before sending the data over the same or multiple
networks.
2) It generates a virtual path between the sender and the receiver.
3) It needed a higher bandwidth to transmit the data packets.
4)There is no congestion as it supports an end-to-end connection between sender and receiver during data transmission.
5) It is a more dependable connection service because it assures data packets transfer from one end to the other end with a
connection.
Connectionless-Service
In connectionless service, a router treats each packet individually. The packets are routed through different paths through the
network according to the decisions made by routers. The network or communication channel does not guarantee data delivery
from the host machine to the destination machine in connectionless service.
The data to be transmitted is broken into packets. These independent packets are called datagrams in analogy with telegrams.
The packets contain the address of the destination machine. Connectionless service is equivalent to the postal system. In the
postal system, a letter is put in an envelope that contains the address of the destination. It is then placed in a letterbox.
The letter finally delivers to the destination through the postal network. However, it does not guarantee to appear in the
addressee's letterbox.
•It can transfer the data packets between senders to the receiver without creating any connection.
•It does not make any virtual connection or path between the sender and the receiver.
•It requires low bandwidth to share the data packets.
•There can be congestion due to not providing an end-to-end connection between the source and receiver to transmit data
packets.
•It is not a dependent connection service because it does not ensure the share of data packets from one end to another for
supporting a connection.
ALOHA Random Access Protocol
It is designed for wireless LAN (Local Area Network) but can also be used in a shared medium to transmit data. Using this
method, any station can transmit data across a network simultaneously when a data frameset is available for transmission.
Aloha Rules
1.Any station can transmit data to a channel at any time.
2.It does not require any carrier sensing.
3.Collision and data frames may be lost during the transmission of data through multiple stations.
4.Acknowledgment of the frames exists in Aloha. Hence, there is no collision detection.
5.It requires retransmission of data after some random amount of time.
Pure Aloha
Whenever data is available for sending over a channel at stations, we use Pure
Aloha. In pure Aloha, when each station transmits data to a channel without
checking whether the channel is idle or not, the chances of collision may
occur, and the data frame can be lost. When any station transmits the data
frame to a channel, the pure Aloha waits for the receiver's acknowledgment.
If it does not acknowledge the receiver end within the specified time, the
station waits for a random amount of time, called the backoff time (Tb). And
the station may assume the frame has been lost or destroyed. Therefore, it
retransmits the frame until all the data are successfully transmitted to the
receiver.
1.The total vulnerable time of pure Aloha is 2 * Tfr.
2.Maximum throughput occurs when G = 1/ 2 that is 18.4%.
3.Successful transmission of data frame is S = G * e ^ - 2 G.
As we can see in the figure above, there are four stations for
accessing a shared channel and transmitting data frames. Some
frames collide because most stations send their frames at the
same time. Only two frames, frame 1.1 and frame 3.2, are
successfully transmitted to the receiver end. At the same time,
other frames are lost or destroyed. Whenever two frames fall on
a shared channel simultaneously, collisions can occur, and both
will suffer damage. If the new frame's first bit enters the channel
before finishing the last bit of the second frame. Both frames are
completely finished, and both stations must retransmit the data
frame.
Slotted Aloha
The slotted Aloha is designed to overcome the pure Aloha's efficiency because pure Aloha has a very high possibility of frame
hitting. In slotted Aloha, the shared channel is divided into a fixed time interval called slots. So that, if a station wants to send a
frame to a shared channel, the frame can only be sent at the beginning of the slot, and only one frame is allowed to be sent to each
slot. And if the stations are unable to send data to the beginning of the slot, the station will have to wait until the beginning of the
slot for the next time. However, the possibility of a collision remains when trying to send a frame at the beginning of two or more
station time slot.
1.Maximum throughput occurs in the slotted Aloha when G = 1 that is 37%.
2.The probability of successfully transmitting the data frame in the slotted Aloha is S = G * e ^ - 2 G.
3.The total vulnerable time required in slotted Aloha is Tfr.
Key Pure Aloha Slotted Aloha
Time Slot In Pure Aloha, any station In Slotted Aloha, any
can transmit data at any station can transmit data
time. only at the beginning of a
time slot.