Aloha (Aloha method)

Aloha, also called the Aloha method, refers toa simple communications scheme in which each source (transmitter) in a network sends data wheneverthere is a frame to send. If the framesuccessfully reaches the destination (receiver), the next frame is sent. If theframe fails to be received at the destination, it is sent again. This protocol wasoriginally developed at the University of Hawaii for use with satellite communication systems in the Pacific.

In a wireless broadcast systemor a half-duplex two-way link, Aloha works perfectly. But as networks become morecomplex, for example in an Ethernet systeminvolving multiple sources and destinations that share a common data path,trouble occurs because data frames collide (conflict). The heavier thecommunications volume, the worse the collision problems become. The result isdegradation of system efficiency, because when two frames collide, the data contained inboth frames is lost.

To minimize the number of collisions, thereby optimizing networkefficiency and increasing the number of subscribers that can use a given network, a schemecalled slotted Aloha was developed. This system employs signals called beacons that are sentat precise intervals and tell each source when the channel is clear to send aframe. Further improvement can be realized by a more sophisticated protocol called Carrier Sense Multiple Access withCollision Detection (CSMA/CD).

This was last updated in September 2005

Continue Reading About Aloha (Aloha method)

Dig Deeper on Network protocols and standards

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

Hi, I want to know that aloha is used nowdays or it is legacy protocol?


File Extensions and File Formats




  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...