SlideShare a Scribd company logo
1 of 16
DATA LINK CONTROL
 Frame synchronization. Data are sent in blocks called frames.
 Flow control. The sending station must not send frames at a rate faster then the
receiving station can absorb them.
 Error control. Any bit errors introduced by the transmission system must be
corrected.
 Addressing. On a multipoint line, such as a local area network (LAN), the identity of
the two stations involved in a transmission must be specified.
 Control and data on same link. It is usually not desirable to have a physically
separate communications path for control information.
 Link management. The initiation, maintenance, and termination of sustained data
exchange requires a fair amount of coordination and cooperation among stations.
FLOW CONTROL
Flow control is the process of managing the rate data
transmission between two nodes to prevent a fast
sender from overwhelming a slow receiver. Flow
control should be distinguished from congestion
control, which is used for controlling the flow of data
when congestion has actually occur.
STOP-AND-WAIT FLOW
CONTROL
Stop-and-wait flow control is the simplest form of flow
control. In this method the message is broken into
multiple frames, and the receiver indicates its readiness to
receive a frame of data. The sender waits for a receipt
acknowledgement (ACK) after every frame for a specified
time (called a time out).
SLIDING-WINDOW FLOW
CONTROL
It allows the sender to send multiple frames before
needing acknowledgements. Sender slides its window on
receiving the acknowledgements for the sent frames. This
allows the sender to send more frames.
ERROR DETECTION
Error detection means to decide whether the received
data is correct or not without having a copy of the
original message. Error detection uses the concept of
redundancy, which means adding extra bits for detecting
errors at the destination.
ERROR CONTROL  Error control refers to mechanisms to
detect and correct errors that occur in
the transmission of frames.
Two types of errors:
 Lost frame. A frame fails to arrive at the other side. For
example, a noise burst may damage a frame to the
extent that the receiver is not aware that a frame has
been transmitted.
 Damaged frame. A recognizable frame does arrive, but
some of the bits are in error (have been altered during
transmission).
The most common techniques for error control are based on some or all of the following ingredients:
• Error detection. As discussed in the preceding section.
• Positive acknowledgment. The destination returns a positive acknowledgment to successfully
received, error-free frames.
• Retransmission after timeout. The source retransmits a frame that has not been acknowledged
a predetermined amount of time.
• Negative acknowledgment and retransmission. The destination returns a negative
to frames in which an error is detected. The source retransmits such frames.
AUTOMATIC REPEAT REQUEST
(ARQ)
The effect of ARQ is to turn an unreliable data link into
reliable one.
Three version of ARQ have been standardized:
• Stop-and-wait ARQ
• Go-back-N ARQ
• Selective-reject ARQ
STOP-AND-WAIT ARQ
Stop-and-wait ARQ is based on the stop-and-wait flow
control technique. The source station transmits a single
frame and then must await an acknowledgment (ACK). No
other data frames can be sent until the destination
station’s reply arrives at the source station.
GO-BACK-N ARQ
The form of error control based on sliding-window flow
control that is most commonly called go-back-N ARQ.
In go-back-N ARQ, a station may send a series of frames
sequentially numbered modulo some maximum value.
SELECTIVE-REJECT ARQ
With selective-reject ARQ, the only frames retransmitted
are those that receive a negative acknowledgment, in this
case called SREJ, or that time-out.
HIGH-LEVEL DATA LINK
CONTROL (HDLC)
The most important data link control protocol is HDLC (ISO 33009, ISO 4335). Not
only is HDLC widely used, but it is the basis for many other important data link
control protocols, which use the same or similar formats and the same
mechanisms as employed in HDLC.
The three station types are;
• Primary station. Has the responsibility for controlling the operation of the link. Frames issued by the primary are
called commands.
• Secondary station. Operates under the control of the primary station. Frames issued by a secondary are called
responses.
• Combined station. Combines the features of primary and secondary. A combined station may issue both commands
and responses.
The two link configurations are:
• Unbalanced configuration. Consists of one primary and one or more secondary stations and supports both full-
duplex and half-duplex transmission.
• Balanced configuration. Consists of two combined stations and supports both full-duplex and half-duplex
transmission.
The three data transfer modes are:
• Normal response mode (NRM). Used with an unbalanced configuration. The primary may initiate data transfer to a
secondary, but a secondary may only transmit data in response to a command from the primary.
• Asynchronous balanced mode (ABM). Used with a balanced configuration. Either combined station may initiate
transmission without receiving permission from the other combined station.
• Asynchronous response mode (ARM). Used with an unbalanced configuration. The secondary may initiate
transmission without explicit permission of the primary.
FRAME STRUCTURE
HDLC uses synchronous transmission. All transmission are
in the form of frames, and a single frame format suffices
for all types of data and control exchanges.
Flag Fields
Flag fields delimit the frame at both ends with unique pattern 01111110. A single flag may be
used as the closing flag for one frame and the opening flag for the next.
Address Field
The address field identifies the secondary station that transmitted or is to receive the frame. This
field is not needed for point-to-point links, but is always included for the sake of uniformity.
Control Field
HDLC defines three types of frames, each with a different control field format. Information frames
frames (I-frames) carry the data to be transmitted for the user. Supervisory frames (S-frames) provide the
ARQ mechanism when piggybacking is not used. Unnumbered frames (U-frames) provide supplemental
link control functions.
Information Field
The information field is present only in I-frames and some U-frames. The field can contain any
sequence of bits but must consist of an integral number of octets.
Frame Check Sequence Field
The frame check sequence (FCS) is an error-detecting code calculated from the the remaining
bits of the frame, exclusive of flags.

More Related Content

Similar to DATA LINK CONTROL.pptx

Similar to DATA LINK CONTROL.pptx (20)

Hdlc
HdlcHdlc
Hdlc
 
Chapter 7 - Data Link Control Protocols 9e
Chapter 7 - Data Link Control Protocols 9eChapter 7 - Data Link Control Protocols 9e
Chapter 7 - Data Link Control Protocols 9e
 
DLL
DLLDLL
DLL
 
DATA LINK LAYER.pdf
DATA LINK LAYER.pdfDATA LINK LAYER.pdf
DATA LINK LAYER.pdf
 
09 Data Link LayerFlow Control.ppt
09 Data Link LayerFlow Control.ppt09 Data Link LayerFlow Control.ppt
09 Data Link LayerFlow Control.ppt
 
Ppp
PppPpp
Ppp
 
Data Link Control
Data Link ControlData Link Control
Data Link Control
 
datalinklayermukesh-150130061041-conversion-gate01.pptx
datalinklayermukesh-150130061041-conversion-gate01.pptxdatalinklayermukesh-150130061041-conversion-gate01.pptx
datalinklayermukesh-150130061041-conversion-gate01.pptx
 
07 data linkcontrol
07 data linkcontrol07 data linkcontrol
07 data linkcontrol
 
High level data link control and point to point protocol
High level data link control and point to point protocolHigh level data link control and point to point protocol
High level data link control and point to point protocol
 
datalinklayermukesh
datalinklayermukeshdatalinklayermukesh
datalinklayermukesh
 
Data link layer
Data link layer Data link layer
Data link layer
 
Unit 2
Unit 2Unit 2
Unit 2
 
Unit 3 - Data Link Layer - Part A
Unit 3 - Data Link Layer - Part AUnit 3 - Data Link Layer - Part A
Unit 3 - Data Link Layer - Part A
 
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptxU2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
 
Hdlc
HdlcHdlc
Hdlc
 
Data link layer
Data link layerData link layer
Data link layer
 
Different protocols for data communication networks
Different protocols for data communication networks Different protocols for data communication networks
Different protocols for data communication networks
 
Data link layer
Data link layerData link layer
Data link layer
 
III_UNIT.pptx
III_UNIT.pptxIII_UNIT.pptx
III_UNIT.pptx
 

More from ODINARARCH

cloudcomputingsimpleppt-141114085742-conversion-gate01.pptx
cloudcomputingsimpleppt-141114085742-conversion-gate01.pptxcloudcomputingsimpleppt-141114085742-conversion-gate01.pptx
cloudcomputingsimpleppt-141114085742-conversion-gate01.pptxODINARARCH
 
Overview of System Integration and Architecture.pptx
Overview of System Integration and Architecture.pptxOverview of System Integration and Architecture.pptx
Overview of System Integration and Architecture.pptxODINARARCH
 
Operating System Concepts ( PDFDrive ).pptx
Operating System Concepts ( PDFDrive ).pptxOperating System Concepts ( PDFDrive ).pptx
Operating System Concepts ( PDFDrive ).pptxODINARARCH
 
0578-computer-fundamentals.pptx
0578-computer-fundamentals.pptx0578-computer-fundamentals.pptx
0578-computer-fundamentals.pptxODINARARCH
 
data transmission
data transmissiondata transmission
data transmissionODINARARCH
 
Presentation in Computer Assembly.pptx
Presentation  in Computer Assembly.pptxPresentation  in Computer Assembly.pptx
Presentation in Computer Assembly.pptxODINARARCH
 
Communication Process
Communication ProcessCommunication Process
Communication ProcessODINARARCH
 
Components of the System Unit.pdf
Components of the System Unit.pdfComponents of the System Unit.pdf
Components of the System Unit.pdfODINARARCH
 
system administration.pptx
system administration.pptxsystem administration.pptx
system administration.pptxODINARARCH
 
Network system.docx
Network system.docxNetwork system.docx
Network system.docxODINARARCH
 
Networking Concepts.pdf
Networking Concepts.pdfNetworking Concepts.pdf
Networking Concepts.pdfODINARARCH
 

More from ODINARARCH (13)

cloudcomputingsimpleppt-141114085742-conversion-gate01.pptx
cloudcomputingsimpleppt-141114085742-conversion-gate01.pptxcloudcomputingsimpleppt-141114085742-conversion-gate01.pptx
cloudcomputingsimpleppt-141114085742-conversion-gate01.pptx
 
Overview of System Integration and Architecture.pptx
Overview of System Integration and Architecture.pptxOverview of System Integration and Architecture.pptx
Overview of System Integration and Architecture.pptx
 
Operating System Concepts ( PDFDrive ).pptx
Operating System Concepts ( PDFDrive ).pptxOperating System Concepts ( PDFDrive ).pptx
Operating System Concepts ( PDFDrive ).pptx
 
0578-computer-fundamentals.pptx
0578-computer-fundamentals.pptx0578-computer-fundamentals.pptx
0578-computer-fundamentals.pptx
 
Unit V.pptx
Unit V.pptxUnit V.pptx
Unit V.pptx
 
quiz pat.pptx
quiz pat.pptxquiz pat.pptx
quiz pat.pptx
 
data transmission
data transmissiondata transmission
data transmission
 
Presentation in Computer Assembly.pptx
Presentation  in Computer Assembly.pptxPresentation  in Computer Assembly.pptx
Presentation in Computer Assembly.pptx
 
Communication Process
Communication ProcessCommunication Process
Communication Process
 
Components of the System Unit.pdf
Components of the System Unit.pdfComponents of the System Unit.pdf
Components of the System Unit.pdf
 
system administration.pptx
system administration.pptxsystem administration.pptx
system administration.pptx
 
Network system.docx
Network system.docxNetwork system.docx
Network system.docx
 
Networking Concepts.pdf
Networking Concepts.pdfNetworking Concepts.pdf
Networking Concepts.pdf
 

Recently uploaded

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Recently uploaded (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

DATA LINK CONTROL.pptx

  • 1. DATA LINK CONTROL  Frame synchronization. Data are sent in blocks called frames.  Flow control. The sending station must not send frames at a rate faster then the receiving station can absorb them.  Error control. Any bit errors introduced by the transmission system must be corrected.  Addressing. On a multipoint line, such as a local area network (LAN), the identity of the two stations involved in a transmission must be specified.  Control and data on same link. It is usually not desirable to have a physically separate communications path for control information.  Link management. The initiation, maintenance, and termination of sustained data exchange requires a fair amount of coordination and cooperation among stations.
  • 2. FLOW CONTROL Flow control is the process of managing the rate data transmission between two nodes to prevent a fast sender from overwhelming a slow receiver. Flow control should be distinguished from congestion control, which is used for controlling the flow of data when congestion has actually occur.
  • 3.
  • 4. STOP-AND-WAIT FLOW CONTROL Stop-and-wait flow control is the simplest form of flow control. In this method the message is broken into multiple frames, and the receiver indicates its readiness to receive a frame of data. The sender waits for a receipt acknowledgement (ACK) after every frame for a specified time (called a time out).
  • 5. SLIDING-WINDOW FLOW CONTROL It allows the sender to send multiple frames before needing acknowledgements. Sender slides its window on receiving the acknowledgements for the sent frames. This allows the sender to send more frames.
  • 6. ERROR DETECTION Error detection means to decide whether the received data is correct or not without having a copy of the original message. Error detection uses the concept of redundancy, which means adding extra bits for detecting errors at the destination.
  • 7. ERROR CONTROL  Error control refers to mechanisms to detect and correct errors that occur in the transmission of frames. Two types of errors:  Lost frame. A frame fails to arrive at the other side. For example, a noise burst may damage a frame to the extent that the receiver is not aware that a frame has been transmitted.  Damaged frame. A recognizable frame does arrive, but some of the bits are in error (have been altered during transmission).
  • 8. The most common techniques for error control are based on some or all of the following ingredients: • Error detection. As discussed in the preceding section. • Positive acknowledgment. The destination returns a positive acknowledgment to successfully received, error-free frames. • Retransmission after timeout. The source retransmits a frame that has not been acknowledged a predetermined amount of time. • Negative acknowledgment and retransmission. The destination returns a negative to frames in which an error is detected. The source retransmits such frames.
  • 9. AUTOMATIC REPEAT REQUEST (ARQ) The effect of ARQ is to turn an unreliable data link into reliable one. Three version of ARQ have been standardized: • Stop-and-wait ARQ • Go-back-N ARQ • Selective-reject ARQ
  • 10. STOP-AND-WAIT ARQ Stop-and-wait ARQ is based on the stop-and-wait flow control technique. The source station transmits a single frame and then must await an acknowledgment (ACK). No other data frames can be sent until the destination station’s reply arrives at the source station.
  • 11. GO-BACK-N ARQ The form of error control based on sliding-window flow control that is most commonly called go-back-N ARQ. In go-back-N ARQ, a station may send a series of frames sequentially numbered modulo some maximum value.
  • 12. SELECTIVE-REJECT ARQ With selective-reject ARQ, the only frames retransmitted are those that receive a negative acknowledgment, in this case called SREJ, or that time-out.
  • 13. HIGH-LEVEL DATA LINK CONTROL (HDLC) The most important data link control protocol is HDLC (ISO 33009, ISO 4335). Not only is HDLC widely used, but it is the basis for many other important data link control protocols, which use the same or similar formats and the same mechanisms as employed in HDLC.
  • 14. The three station types are; • Primary station. Has the responsibility for controlling the operation of the link. Frames issued by the primary are called commands. • Secondary station. Operates under the control of the primary station. Frames issued by a secondary are called responses. • Combined station. Combines the features of primary and secondary. A combined station may issue both commands and responses. The two link configurations are: • Unbalanced configuration. Consists of one primary and one or more secondary stations and supports both full- duplex and half-duplex transmission. • Balanced configuration. Consists of two combined stations and supports both full-duplex and half-duplex transmission. The three data transfer modes are: • Normal response mode (NRM). Used with an unbalanced configuration. The primary may initiate data transfer to a secondary, but a secondary may only transmit data in response to a command from the primary. • Asynchronous balanced mode (ABM). Used with a balanced configuration. Either combined station may initiate transmission without receiving permission from the other combined station. • Asynchronous response mode (ARM). Used with an unbalanced configuration. The secondary may initiate transmission without explicit permission of the primary.
  • 15. FRAME STRUCTURE HDLC uses synchronous transmission. All transmission are in the form of frames, and a single frame format suffices for all types of data and control exchanges.
  • 16. Flag Fields Flag fields delimit the frame at both ends with unique pattern 01111110. A single flag may be used as the closing flag for one frame and the opening flag for the next. Address Field The address field identifies the secondary station that transmitted or is to receive the frame. This field is not needed for point-to-point links, but is always included for the sake of uniformity. Control Field HDLC defines three types of frames, each with a different control field format. Information frames frames (I-frames) carry the data to be transmitted for the user. Supervisory frames (S-frames) provide the ARQ mechanism when piggybacking is not used. Unnumbered frames (U-frames) provide supplemental link control functions. Information Field The information field is present only in I-frames and some U-frames. The field can contain any sequence of bits but must consist of an integral number of octets. Frame Check Sequence Field The frame check sequence (FCS) is an error-detecting code calculated from the the remaining bits of the frame, exclusive of flags.