Loading content...
In Pure ALOHA, we established that collisions are inevitable when multiple stations share a channel without coordination. But to understand ALOHA's efficiency—or more accurately, its inefficiency—we need to answer a deceptively subtle question:
Exactly when can a collision occur?
The answer lies in a concept called the vulnerable period—the time window during which a transmitted frame is susceptible to being destroyed by overlapping transmissions. This concept is so fundamental that understanding it is prerequisite to any meaningful analysis of random access protocols.
At first glance, you might think: "A collision happens when two stations transmit at the same time." But this intuition is dangerously incomplete. Frames don't need to start at the same time to collide—they merely need to overlap. And this overlap requirement creates a vulnerability window that is surprisingly larger than most newcomers expect.
By the end of this page, you will deeply understand the vulnerable period concept—its precise mathematical definition, geometric visualization, timing implications, and why Pure ALOHA's vulnerable period of 2T (twice the frame transmission time) fundamentally limits the protocol's maximum achievable throughput. This understanding is essential for deriving ALOHA efficiency.
Before we can understand the vulnerable period, we must precisely define what constitutes a collision in Pure ALOHA.
The Collision Condition:
A collision occurs when any portion of one frame overlaps with any portion of another frame at the receiver. Even a single bit of overlap is sufficient to corrupt both frames, rendering them unreadable.
This definition has profound implications:
| Scenario | Result |
|---|---|
| Two frames start simultaneously | Collision |
| Frame B starts while Frame A is 90% complete | Collision |
| Frame B starts 1 bit-time before Frame A ends | Collision |
| Frame B starts exactly as Frame A ends | No collision (but dangerously close) |
Why Complete Destruction?
In radio systems, when two signals arrive at a receiver simultaneously, they interfere with each other. The receiver sees a superposition—a jumbled mix of both signals—and cannot extract either original message. Unlike some physical phenomena where signals might partially survive, digital frames are an all-or-nothing affair: any corruption invalidates the entire frame.
Collisions destroy ALL involved frames, not just one. If frames A and B collide, BOTH must be retransmitted. This mutual destruction is what makes collisions so costly—a single collision wastes twice the channel time (or more, with multiple colliding frames).
Receiver-Centric View:
It's crucial to understand that collisions are defined at the receiver, not the transmitter. Two stations might begin transmission at different absolute times, but their frames collide if they arrive at the receiver during overlapping intervals. In systems with minimal propagation delay (like a single room), transmitter and receiver timing are nearly identical. In systems with significant propagation delay (like satellite links or the original ALOHAnet), this distinction becomes more important.
For simplicity, our analysis typically assumes negligible propagation delay, meaning transmission start times directly determine collision occurrence.
Now we can precisely define the vulnerable period:
Definition:
The vulnerable period for a frame is the total time interval during which the transmission of another frame would result in a collision.
Let's think about this from the perspective of a frame we're trying to transmit successfully—call it Frame X. Frame X starts transmission at time $t_0$ and completes at time $t_0 + T$, where T is the frame transmission time.
Question: During what time interval must no other frame begin transmitting to ensure Frame X succeeds?
Answer: No other frame can begin transmitting from time $(t_0 - T)$ to time $(t_0 + T)$.
This gives us a vulnerable period of 2T—twice the frame transmission time.
Why 2T? The Two-Frame Intuition:
Let's trace through the logic carefully:
Case 1: Another frame starts BEFORE Frame X (but after $t_0 - T$)
Suppose Frame Y starts at time $t_0 - T + \epsilon$ (a small time after $t_0 - T$). Frame Y finishes at time $t_0 + \epsilon$. Since Frame X starts at $t_0$ and Frame Y ends at $t_0 + \epsilon$, Frame Y's final portion overlaps with Frame X's initial portion → Collision
Case 2: Another frame starts DURING Frame X's transmission
If Frame Y starts anywhere between $t_0$ and $t_0 + T$, it clearly overlaps with Frame X → Collision
Case 3: Another frame starts AFTER Frame X ends
If Frame Y starts at or after $t_0 + T$, Frame X has already completed. No overlap → No collision
Combining these cases: the danger zone extends from $(t_0 - T)$ to $(t_0 + T)$, a total duration of 2T.
From Frame X's viewpoint, it must 'hope' that no frame started in the T time units before it, AND that no frame starts during its own T time units of transmission. Total vulnerable time = T + T = 2T.
A timeline diagram makes the vulnerable period crystal clear. Consider the following scenarios:
Timeline Representation:
Time →
t₀-T t₀ t₀+T t₀+2T
| | | |
|← T →|← Frame X →| |
| | | |
|←───── Vulnerable Period ─────→|
(2T total)
Any frame that begins during the vulnerable period window [t₀-T, t₀+T) will collide with Frame X.
Scenario Analysis:
Let's visualize several collision and success scenarios:
Scenario A: Frame Y starts at t₀ - 0.8T (COLLISION)
Time →
t₀-T t₀ t₀+T
| | |
|←── Frame Y ──→|
|←── Frame X ──→|
↑
Overlap zone
Frame Y ends at t₀ + 0.2T, overlapping with Frame X's first 0.2T → Collision
Scenario B: Frame Y starts at t₀ + 0.5T (COLLISION)
Time →
t₀ t₀+T t₀+2T
| | |
|←── Frame X ──→|
|←── Frame Y ──→|
↑
Overlap zone
Frame Y begins mid-transmission of Frame X → Collision
Scenario C: Frame Y starts at exactly t₀ + T (NO COLLISION)
Time →
t₀ t₀+T t₀+2T
| | |
|←── Frame X ──→|
|←── Frame Y ──→|
↑
No overlap
Frame Y begins exactly as Frame X ends → Success (both frames)
The vulnerable period extends BACKWARD in time (T units before Frame X starts) as well as forward (during Frame X's transmission). This backward vulnerability is what makes Pure ALOHA's vulnerable period twice as long as Slotted ALOHA's—and why Slotted ALOHA achieves twice the maximum throughput.
Let's formalize the vulnerable period concept mathematically, which will set up our efficiency derivation.
Setup:
Success Condition:
Frame X succeeds if and only if:
Combined: No frame (other than Frame X) can start in the interval $(t_0 - T, t_0 + T)$
Probability Calculation:
Since arrivals follow a Poisson process with rate G per time T:
The expected number of arrivals in time interval 2T is: $\lambda \cdot 2T = G \cdot \frac{2T}{T} = 2G$
The probability of zero arrivals (other than Frame X itself) in time 2T is:
$$P(\text{no collision}) = P(0 \text{ other arrivals in } 2T) = e^{-2G}$$
| Offered Load G | E[arrivals in 2T] | P(success) = e^(-2G) | P(collision) |
|---|---|---|---|
| 0.1 | 0.2 | 0.819 | 0.181 (18.1%) |
| 0.25 | 0.5 | 0.607 | 0.393 (39.3%) |
| 0.5 | 1.0 | 0.368 | 0.632 (63.2%) |
| 1.0 | 2.0 | 0.135 | 0.865 (86.5%) |
| 2.0 | 4.0 | 0.018 | 0.982 (98.2%) |
Notice how rapidly success probability drops as load increases. At G=0.5 (half a frame attempt per frame time), already ~63% of frames collide. At G=1, over 86% collide. This extreme sensitivity to load is a fundamental characteristic of Pure ALOHA.
The 2G Factor:
The factor of 2 in the exponent ($e^{-2G}$ rather than $e^{-G}$) comes directly from the vulnerable period being 2T rather than T. This factor of 2 is what distinguishes Pure ALOHA from Slotted ALOHA, where synchronization reduces the vulnerable period to exactly T.
Key Equation:
$$P(\text{successful transmission}) = e^{-2G}$$
This is the foundation for deriving Pure ALOHA's throughput, which we'll complete in the next page.
Understanding the details of collision mechanics illuminates why 2T is the exact vulnerable period—no more, no less.
Boundary Conditions:
Let's examine the exact boundaries of the vulnerable period:
At exactly $t_0 - T$: If Frame Y starts at exactly $t_0 - T$, it ends at exactly $t_0$. Frame X starts at $t_0$. Do they collide?
In the mathematical idealization, the frames are exactly adjacent—Frame Y's last bit and Frame X's first bit occupy adjacent instants with no gap and no overlap. In this idealized model: no collision.
In practice: any timing jitter would likely cause overlap, so this boundary is treated conservatively.
Just after $t_0 - T$ (e.g., at $t_0 - T + \epsilon$): Frame Y ends at $t_0 + \epsilon$, overlapping with Frame X's first $\epsilon$ time → collision.
This analysis confirms: the vulnerable period is the open interval $(t_0 - T, t_0 + T)$, with length exactly 2T.
Multi-Frame Collisions:
While we've analyzed pairwise collisions, in reality, multiple frames can be involved:
Propagation Delay Effects:
In systems with non-negligible propagation delay τ:
For our analysis, we assume τ ≈ 0, so vulnerable period = 2T exactly.
Our analysis assumes all frames have identical transmission time T. With variable-length frames, the vulnerable period for each frame would vary, significantly complicating the mathematics. This is why early ALOHA systems used fixed frame sizes.
The 2T vulnerable period is not just a theoretical concern—it has profound implications for protocol design and efficiency.
The Fundamental Efficiency Limit:
Because each frame 'occupies' 2T of vulnerable time while only transmitting for time T, there's inherent inefficiency:
Design Implications:
| Protocol | Vulnerable Period | Relative Efficiency | Key Mechanism |
|---|---|---|---|
| Pure ALOHA | 2T | Baseline (18.4%) | None—random access |
| Slotted ALOHA | T | 2× Pure (36.8%) | Slot synchronization |
| CSMA (ideal) | ~2τ | Higher | Carrier sensing |
| CSMA/CD (Ethernet) | ~2τ | Higher still | Sensing + collision detection |
| TDMA | 0 | Near 100% | Scheduled access |
Reducing the vulnerable period always requires adding complexity: synchronization (Slotted ALOHA), sensing (CSMA), or full scheduling (TDMA). Pure ALOHA lives at the extreme 'simple but inefficient' end of the spectrum—which is exactly its intended design point for low-traffic, hardware-constrained scenarios.
Let's develop intuition for how the vulnerable period translates into collision probability across different load levels.
The Exponential Decay:
Success probability $P_s = e^{-2G}$ is an exponentially decaying function of offered load G:
| G | P_s = e^{-2G} | Interpretation |
|---|---|---|
| 0 | 1.000 | Zero traffic → all frames succeed (vacuously) |
| 0.1 | 0.819 | Very light load → ~82% success |
| 0.25 | 0.607 | Light load → ~61% success |
| 0.5 | 0.368 | Moderate load → only ~37% success |
| 1.0 | 0.135 | Heavy load → only ~14% success |
| 2.0 | 0.018 | Overload → less than 2% success |
Exponential Decay Intuition:
The exponential form arises from Poisson statistics: for a frame to succeed, no other frames can start in the 2T window. Each potential interferer is an independent event, and the probability of all of them 'not happening' multiplies, yielding the exponential.
Throughput Curve Shape:
The throughput S = G × e^{-2G} (which we'll derive fully next page) has a distinctive shape:
Rising phase (G < 0.5): As load increases from 0, throughput increases—more attempts mean more successes, even though collision rate is rising
Peak (G = 0.5): Maximum throughput occurs when the marginal benefit of another transmission attempt exactly equals the marginal cost of increased collisions
Falling phase (G > 0.5): Collision rate increases faster than traffic, so actual throughput decreases even as more attempts are made
This non-monotonic behavior is characteristic of contention-based protocols and creates the possibility of throughput collapse under overload.
When offered load exceeds the optimal point (G > 0.5), adding more traffic DECREASES throughput. This counter-intuitive behavior—where more effort yields less output—is called 'throughput collapse' or 'congestion collapse.' It's a fundamental instability in uncoordinated multiple access.
Practical Implications:
Real Pure ALOHA systems must:
The vulnerable period concept is the key to understanding all of these design constraints.
The vulnerable period is the conceptual cornerstone for understanding Pure ALOHA efficiency. Let's consolidate:
What's Next:
With the vulnerable period firmly understood, we're now ready to derive Pure ALOHA's throughput equation and prove that maximum efficiency is exactly 1/(2e) ≈ 18.4%. In the next page, we'll complete this classic derivation and understand why Pure ALOHA can never exceed this fundamental limit.
You now have a rigorous understanding of the vulnerable period—the time window during which collisions can occur in Pure ALOHA. This 2T window, arising from both backward and forward vulnerability, is the key to understanding why Pure ALOHA's maximum throughput is limited to 18.4%.