scispace - formally typeset
Proceedings ArticleDOI

THE ALOHA SYSTEM: another alternative for computer communications

N. Abramson
- pp 281-285
TLDR
A remote-access computer system under development as part of a research program to investigate the use of radio communications for computer-computer and console-computer links and a novel form of random-access radio communications developed for use within THE ALOHA SYSTEM is described.
Abstract
In September 1968 the University of Hawaii began work on a research program to investigate the use of radio communications for computer-computer and console-computer links. In this report we describe a remote-access computer system---THE ALOHA SYSTEM---under development as part of that research program and discuss some advantages of radio communications over conventional wire communications for interactive users of a large computer system. Although THE ALOHA SYSTEM research program is composed of a large number of research projects, in this report we shall be concerned primarily with a novel form of random-access radio communications developed for use within THE ALOHA SYSTEM.

read more

Content maybe subject to copyright    Report

Citations
More filters
Book

Wireless Communications

Proceedings ArticleDOI

GPSR: greedy perimeter stateless routing for wireless networks

TL;DR: Greedy Perimeter Stateless Routing is presented, a novel routing protocol for wireless datagram networks that uses the positions of routers and a packet's destination to make packet forwarding decisions and its scalability on densely deployed wireless networks is demonstrated.
Proceedings ArticleDOI

Versatile low power media access for wireless sensor networks

TL;DR: B-MAC's flexibility results in better packet delivery rates, throughput, latency, and energy consumption than S-MAC, and the need for flexible protocols to effectively realize energy efficient sensor network applications is illustrated.
Journal ArticleDOI

Secure routing in wireless sensor networks: attacks and countermeasures

TL;DR: This work proposes security goals for routing in sensor networks, shows how attacks against ad-hoc and peer-to-peer networks can be adapted into powerful attacks against sensors, and introduces two classes of novel attacks against sensor networks sinkholes and HELLO floods.
Book

Network Information Theory

TL;DR: In this article, a comprehensive treatment of network information theory and its applications is provided, which provides the first unified coverage of both classical and recent results, including successive cancellation and superposition coding, MIMO wireless communication, network coding and cooperative relaying.
References
More filters
Journal ArticleDOI

Cyclic Codes for Error Detection

TL;DR: The potentialities of these codes for error detection and the equipment required for implementing error detection systems using cyclic codes are described in detail.
Proceedings ArticleDOI

Multiple computer networks and intercomputer communication

TL;DR: Three other more important reasons for computer networks exist, at least with respect to scientific computer applications, are defined.
Proceedings ArticleDOI

A study of multiaccess computer communications

TL;DR: The results of a study of multiaccess computer communications based on a model of the user-computer interactive process and on data that were collected from operating computer systems are presented.