SlideShare a Scribd company logo
1 of 46
Digital communication
Data Link Control
Flow Control
• Ensuring the sending entity does not overwhelm
the receiving entity
—Preventing buffer overflow
• Transmission time
—Time taken to emit all bits into medium
• Propagation time
—Time for a bit to traverse the link
Figure 1. Model of Frame
Transmission
Stop and Wait
• Source transmits frame
• Destination receives frame and replies with
acknowledgement
• Source waits for ACK before sending next frame
• Destination can stop flow by not send ACK
• Works well for a few large frames
Fragmentation
• Large block of data may be split into small
frames
—Limited buffer size
—Errors detected sooner (when whole frame received)
—On error, retransmission of smaller frames is needed
—Prevents one station occupying medium for long
periods
• Stop and wait becomes inadequate
Sliding Windows Flow Control
• Allow multiple frames to be in transit
• Receiver has buffer W long
• Transmitter can send up to W frames without
ACK
• Each frame is numbered
• ACK includes number of next frame expected
• Sequence number bounded by size of field (k)
—Frames are numbered modulo 2k
Figure 2. Sliding Window
Depiction
Figure 3. Example of a Sliding
Window Protocol
Sliding Window Enhancements
• Receiver can acknowledge frames without
permitting further transmission (Receive Not
Ready)
• Must send a normal acknowledge to resume
• If duplex, use piggybacking
—If no data to send, use acknowledgement frame
—If data but no acknowledgement to send, send last
acknowledgement number again, or have ACK valid
flag (TCP)
Error Control
• Error detection
• Error correction
• Single bit errors
• Burst errors
Error Detection
• Additional bits added by transmitter for error
detection code
• Parity
—Value of parity bit is such that character has even
(even parity) or odd (odd parity) number of ones
—Even number of bit errors goes undetected
Figure 4 Error Detection
Process
Cyclic Redundancy Check
• For a block of k bits transmitter generates n bit
sequence
• Transmit k+n bits which is exactly divisible by
some number
• Receive divides frame by that number
—If no remainder, assume no error
Error Control
• Detection and correction of errors
• Lost frames
• Damaged frames
• Automatic repeat request
—Error detection
—Positive acknowledgment
—Retransmission after timeout
—Negative acknowledgement and retransmission
Automatic Repeat Request
(ARQ)
• Stop and wait
• Go back N
• Selective reject (selective retransmission)
Stop and Wait
• Source transmits single frame
• Wait for ACK
• If received frame damaged, discard it
—Transmitter has timeout
—If no ACK within timeout, retransmit
• If ACK damaged,transmitter will not recognize it
—Transmitter will retransmit
—Receive gets two copies of frame
—Use ACK0 and ACK1
Figure 5
Stop-and-Wait ARQ
Stop and Wait - Pros and Cons
• Simple
• Inefficient
Go Back N (1)
• Based on sliding window
• If no error, ACK as usual with next frame
expected
• Use window to control number of outstanding
frames
• If error, reply with rejection
—Discard that frame and all future frames until error
frame received correctly
—Transmitter must go back and retransmit that frame
and all subsequent frames
Go Back N - Damaged Frame
• Receiver detects error in frame i
• Receiver sends rejection-i
• Transmitter gets rejection-i
• Transmitter retransmits frame i and all
subsequent
Go Back N - Lost Frame (1)
• Frame i lost
• Transmitter sends i+1
• Receiver gets frame i+1 out of sequence
• Receiver send reject i
• Transmitter goes back to frame i and
retransmits
Go Back N - Lost Frame (2)
• Frame i lost and no additional frame sent
• Receiver gets nothing and returns neither
acknowledgement nor rejection
• Transmitter times out and sends
acknowledgement frame with P bit set to 1
• Receiver interprets this as command which it
acknowledges with the number of the next
frame it expects (frame i )
• Transmitter then retransmits frame i
Go Back N - Damaged
Acknowledgement
• Receiver gets frame i and send
acknowledgement (i+1) which is lost
• Acknowledgements are cumulative, so next
acknowledgement (i+n) may arrive before
transmitter times out on frame i
• If transmitter times out, it sends
acknowledgement with P bit set as before
• This can be repeated a number of times before
a reset procedure is initiated
Go Back N - Damaged Rejection
• As for lost frame (2)
Figure 6
Go-Back-N ARQ
Protocol
High Level Data Link Control
• HDLC
• ISO 33009, ISO 4335
HDLC Station Types
• Primary station
—Controls operation of link
—Frames issued are called commands
—Maintains separate logical link to each secondary
station
• Secondary station
—Under control of primary station
—Frames issued called responses
• Combined station
—May issue commands and responses
HDLC Link Configurations
• Unbalanced
—One primary and one or more secondary stations
—Supports full duplex and half duplex
• Balanced
—Two combined stations
—Supports full duplex and half duplex
HDLC Transfer Modes
Normal Response Mode NRM
• Unbalanced configuration
• Primary initiates transfer to secondary
• Secondary may only transmit data in response
to command from primary
• Used on multi-drop lines
• Host computer as primary
• Terminals as secondary
HDLC Transfer Modes
Asynchronous Balanced Mode ABM
• Balanced configuration
• Either station may initiate transmission without
receiving permission
• Most widely used
• No polling overhead
HDLC Transfer Modes
Asynchronous Response Mode ARM
• Unbalanced configuration
• Secondary may initiate transmission without
permission form primary
• Primary responsible for line
• Rarely used
Frame Structure
• Synchronous transmission
• All transmissions in frames
• Single frame format for all data and control
exchanges
Figure 7 HDLC Frame Structure
Flag Fields
• Delimit frame at both ends
• 01111110
• May close one frame and open another
• Receiver hunts for flag sequence to synchronize
• Bit stuffing used to avoid confusion with data containing
01111110
— 0 inserted after every sequence of five 1s
— If receiver detects five 1s it checks next bit
— If 0, it is deleted
— If 1 and seventh bit is 0, accept as flag
— If sixth and seventh bits 1, sender is indicating abort
Figure 8 Bit Stuffing
Address Field
• Identifies secondary station that sent or will receive
frame
• Usually 8 bits long
• May be extended to multiples of 7 bits
— LSB of each octet indicates that it is the last octet (1) or not (0)
• All ones (11111111) is broadcast
Control Field
• Different for different frame type
—Information - data to be transmitted to user (next
layer up)
• Flow and error control piggybacked on information frames
—Supervisory - ARQ when piggyback not used
—Unnumbered - supplementary link control
• First one or two bits of control filed identify
frame type
• Remaining bits explained later
Control Field Diagram
Poll/Final Bit
• Use depends on context
• Command frame
—P bit
—1 to solicit (poll) response from peer
• Response frame
—F bit
—1 indicates response to soliciting command
Information Field
• Only in information and some unnumbered
frames
• Must contain integral number of octets
• Variable length
Frame Check Sequence Field
• FCS
• Error detection
• 16 bit CRC
• Optional 32 bit CRC
HDLC Operation
• Exchange of information, supervisory and
unnumbered frames
• Three phases
—Initialization
—Data transfer
—Disconnect
Initialization
• Initialization requested by either side
• Issue one of six set-mode commands
—Signals other side that initialization is requested
—Specifies mode (NRM, ABM, ARM)
—Specifies 3- or 7-bit sequence numbers
• If request accepted HDLC module on other side
transmits unnumbered acknowledged (UA)
frame
• If request rejected, disconnected mode (DM)
sent
Data Transfer
• Both sides may begin to send user data in I-frames
— Starting with sequence number 0
— N(S) and N(R) fields of I-frame are sequence numbers
— Sequential, modulo 8 or 128, (3- or 7-bit)
— In N(S)
— N(R) acknowledgment for I-frames received
— I-frame expected next
• S-frames also used for flow and error control
— Receive ready (RR) frame acknowledges last I-frame received
• Indicating next I-frame expected
• Used when no reverse data
— Receive not ready (RNR) acknowledges, but also asks peer to suspend
transmission of I-frames
— When ready, send RR to restart
— REJ initiates go-back-N ARQ
• Indicates last I-frame received has been rejected
• Retransmission beginning with N(R) required
— Selective reject (SREJ) requests retransmission of single frame
Disconnect
• Either HDLC module can initiate disconnect
• Own initiative
—Fault
• At request of higher-layer user
• Send disconnect (DISC) frame
• Remote entity must accept by replying with UA
—Inform layer 3 user connection terminated
• Outstanding unacknowledged I-frames may be
lost
—Recovery left to higher layers
Figure 9 Examples of HDLC
Operation

More Related Content

Similar to Data Link Control.ppt

Unit IV_Flow.pptx
Unit IV_Flow.pptxUnit IV_Flow.pptx
Unit IV_Flow.pptxTejasRao8
 
New framing-protocols
New framing-protocolsNew framing-protocols
New framing-protocolsNitesh Singh
 
Module15: Sliding Windows Protocol and Error Control
Module15: Sliding Windows Protocol and Error Control Module15: Sliding Windows Protocol and Error Control
Module15: Sliding Windows Protocol and Error Control gondwe Ben
 
Dcn ppt by roma
Dcn ppt by romaDcn ppt by roma
Dcn ppt by romaboraroma
 
Dcn ppt on data link layer
Dcn ppt on data link layerDcn ppt on data link layer
Dcn ppt on data link layerroma bora
 
High level data link control and point to point protocol
High level data link control and point to point protocolHigh level data link control and point to point protocol
High level data link control and point to point protocolsandhyakiran10
 
Computer network slides for easy prepration
Computer network slides for easy preprationComputer network slides for easy prepration
Computer network slides for easy preprationmqasimsheikh5
 
8th lec flow and error control
8th lec   flow and error control8th lec   flow and error control
8th lec flow and error controlInocentshuja Ahmad
 
Chapter 7 - Data Link Control Protocols 9e
Chapter 7 - Data Link Control Protocols 9eChapter 7 - Data Link Control Protocols 9e
Chapter 7 - Data Link Control Protocols 9eadpeer
 
PCCN DATA LINK LAYER UNIT 4 NOTES
PCCN DATA LINK LAYER UNIT 4 NOTESPCCN DATA LINK LAYER UNIT 4 NOTES
PCCN DATA LINK LAYER UNIT 4 NOTESsirishayerraboina
 
Osi model
Osi model Osi model
Osi model maha tce
 
UNIT II.ppt Computer networks protocol explanation
UNIT II.ppt Computer networks protocol explanationUNIT II.ppt Computer networks protocol explanation
UNIT II.ppt Computer networks protocol explanationssuseree2f04
 

Similar to Data Link Control.ppt (20)

Unit IV_Flow.pptx
Unit IV_Flow.pptxUnit IV_Flow.pptx
Unit IV_Flow.pptx
 
New framing-protocols
New framing-protocolsNew framing-protocols
New framing-protocols
 
Module15: Sliding Windows Protocol and Error Control
Module15: Sliding Windows Protocol and Error Control Module15: Sliding Windows Protocol and Error Control
Module15: Sliding Windows Protocol and Error Control
 
Flow control main
Flow control mainFlow control main
Flow control main
 
Dcn ppt by roma
Dcn ppt by romaDcn ppt by roma
Dcn ppt by roma
 
Ppp
PppPpp
Ppp
 
Dcn ppt on data link layer
Dcn ppt on data link layerDcn ppt on data link layer
Dcn ppt on data link layer
 
High level data link control and point to point protocol
High level data link control and point to point protocolHigh level data link control and point to point protocol
High level data link control and point to point protocol
 
Ntdd
NtddNtdd
Ntdd
 
Ntdd
NtddNtdd
Ntdd
 
datalink.ppt
datalink.pptdatalink.ppt
datalink.ppt
 
Computer network slides for easy prepration
Computer network slides for easy preprationComputer network slides for easy prepration
Computer network slides for easy prepration
 
Introduction to TCP
Introduction to TCPIntroduction to TCP
Introduction to TCP
 
document.pdf
document.pdfdocument.pdf
document.pdf
 
8th lec flow and error control
8th lec   flow and error control8th lec   flow and error control
8th lec flow and error control
 
Chapter 7 - Data Link Control Protocols 9e
Chapter 7 - Data Link Control Protocols 9eChapter 7 - Data Link Control Protocols 9e
Chapter 7 - Data Link Control Protocols 9e
 
PCCN DATA LINK LAYER UNIT 4 NOTES
PCCN DATA LINK LAYER UNIT 4 NOTESPCCN DATA LINK LAYER UNIT 4 NOTES
PCCN DATA LINK LAYER UNIT 4 NOTES
 
Osi model
Osi model Osi model
Osi model
 
UNIT II.ppt Computer networks protocol explanation
UNIT II.ppt Computer networks protocol explanationUNIT II.ppt Computer networks protocol explanation
UNIT II.ppt Computer networks protocol explanation
 
DATA LINK LAYER.pdf
DATA LINK LAYER.pdfDATA LINK LAYER.pdf
DATA LINK LAYER.pdf
 

More from Teshome48

installandmanagenetworkprotocols.pptx
installandmanagenetworkprotocols.pptxinstallandmanagenetworkprotocols.pptx
installandmanagenetworkprotocols.pptxTeshome48
 
Chapter 4 EThics, CSR, Sustainability, & Governance.pptx
Chapter 4 EThics, CSR, Sustainability, & Governance.pptxChapter 4 EThics, CSR, Sustainability, & Governance.pptx
Chapter 4 EThics, CSR, Sustainability, & Governance.pptxTeshome48
 
Chapter 1 Overview of OB.ppt
Chapter 1 Overview of OB.pptChapter 1 Overview of OB.ppt
Chapter 1 Overview of OB.pptTeshome48
 
Chapter 5 The External, Industry, and Competitive Analysis.ppt
Chapter 5 The External, Industry, and Competitive Analysis.pptChapter 5 The External, Industry, and Competitive Analysis.ppt
Chapter 5 The External, Industry, and Competitive Analysis.pptTeshome48
 
Chapter_5_New_Market_Segmentation,_Targeting_and_Positioning.pptx
Chapter_5_New_Market_Segmentation,_Targeting_and_Positioning.pptxChapter_5_New_Market_Segmentation,_Targeting_and_Positioning.pptx
Chapter_5_New_Market_Segmentation,_Targeting_and_Positioning.pptxTeshome48
 
Chapter 1_ Overview of International Business.pptx
Chapter 1_ Overview of International Business.pptxChapter 1_ Overview of International Business.pptx
Chapter 1_ Overview of International Business.pptxTeshome48
 
Chapter 2 Globalization.pptx
Chapter 2 Globalization.pptxChapter 2 Globalization.pptx
Chapter 2 Globalization.pptxTeshome48
 
Research Methodology(1).pptx
Research Methodology(1).pptxResearch Methodology(1).pptx
Research Methodology(1).pptxTeshome48
 
Entrepreneurship PPT - Yohannes.pptx
Entrepreneurship PPT - Yohannes.pptxEntrepreneurship PPT - Yohannes.pptx
Entrepreneurship PPT - Yohannes.pptxTeshome48
 
QA CHAPTER I.pptx
QA CHAPTER I.pptxQA CHAPTER I.pptx
QA CHAPTER I.pptxTeshome48
 
Operations Management PPT RVU 2022.ppt
Operations Management  PPT RVU   2022.pptOperations Management  PPT RVU   2022.ppt
Operations Management PPT RVU 2022.pptTeshome48
 
Zelalem final power point..pptx
Zelalem final power point..pptxZelalem final power point..pptx
Zelalem final power point..pptxTeshome48
 
QA CHAPTER III and IV(1)(1).pdf
QA CHAPTER III and IV(1)(1).pdfQA CHAPTER III and IV(1)(1).pdf
QA CHAPTER III and IV(1)(1).pdfTeshome48
 
is chap 6.pptx
is chap 6.pptxis chap 6.pptx
is chap 6.pptxTeshome48
 
Chapter 2Management Theories.ppt
Chapter 2Management Theories.pptChapter 2Management Theories.ppt
Chapter 2Management Theories.pptTeshome48
 
journal.docx
journal.docxjournal.docx
journal.docxTeshome48
 
amtreuf.docx
amtreuf.docxamtreuf.docx
amtreuf.docxTeshome48
 
fra'ool ass.pptx
fra'ool ass.pptxfra'ool ass.pptx
fra'ool ass.pptxTeshome48
 
ababa pre.pptx
ababa pre.pptxababa pre.pptx
ababa pre.pptxTeshome48
 
The Staffing Function_Yohannes.pptx
The Staffing Function_Yohannes.pptxThe Staffing Function_Yohannes.pptx
The Staffing Function_Yohannes.pptxTeshome48
 

More from Teshome48 (20)

installandmanagenetworkprotocols.pptx
installandmanagenetworkprotocols.pptxinstallandmanagenetworkprotocols.pptx
installandmanagenetworkprotocols.pptx
 
Chapter 4 EThics, CSR, Sustainability, & Governance.pptx
Chapter 4 EThics, CSR, Sustainability, & Governance.pptxChapter 4 EThics, CSR, Sustainability, & Governance.pptx
Chapter 4 EThics, CSR, Sustainability, & Governance.pptx
 
Chapter 1 Overview of OB.ppt
Chapter 1 Overview of OB.pptChapter 1 Overview of OB.ppt
Chapter 1 Overview of OB.ppt
 
Chapter 5 The External, Industry, and Competitive Analysis.ppt
Chapter 5 The External, Industry, and Competitive Analysis.pptChapter 5 The External, Industry, and Competitive Analysis.ppt
Chapter 5 The External, Industry, and Competitive Analysis.ppt
 
Chapter_5_New_Market_Segmentation,_Targeting_and_Positioning.pptx
Chapter_5_New_Market_Segmentation,_Targeting_and_Positioning.pptxChapter_5_New_Market_Segmentation,_Targeting_and_Positioning.pptx
Chapter_5_New_Market_Segmentation,_Targeting_and_Positioning.pptx
 
Chapter 1_ Overview of International Business.pptx
Chapter 1_ Overview of International Business.pptxChapter 1_ Overview of International Business.pptx
Chapter 1_ Overview of International Business.pptx
 
Chapter 2 Globalization.pptx
Chapter 2 Globalization.pptxChapter 2 Globalization.pptx
Chapter 2 Globalization.pptx
 
Research Methodology(1).pptx
Research Methodology(1).pptxResearch Methodology(1).pptx
Research Methodology(1).pptx
 
Entrepreneurship PPT - Yohannes.pptx
Entrepreneurship PPT - Yohannes.pptxEntrepreneurship PPT - Yohannes.pptx
Entrepreneurship PPT - Yohannes.pptx
 
QA CHAPTER I.pptx
QA CHAPTER I.pptxQA CHAPTER I.pptx
QA CHAPTER I.pptx
 
Operations Management PPT RVU 2022.ppt
Operations Management  PPT RVU   2022.pptOperations Management  PPT RVU   2022.ppt
Operations Management PPT RVU 2022.ppt
 
Zelalem final power point..pptx
Zelalem final power point..pptxZelalem final power point..pptx
Zelalem final power point..pptx
 
QA CHAPTER III and IV(1)(1).pdf
QA CHAPTER III and IV(1)(1).pdfQA CHAPTER III and IV(1)(1).pdf
QA CHAPTER III and IV(1)(1).pdf
 
is chap 6.pptx
is chap 6.pptxis chap 6.pptx
is chap 6.pptx
 
Chapter 2Management Theories.ppt
Chapter 2Management Theories.pptChapter 2Management Theories.ppt
Chapter 2Management Theories.ppt
 
journal.docx
journal.docxjournal.docx
journal.docx
 
amtreuf.docx
amtreuf.docxamtreuf.docx
amtreuf.docx
 
fra'ool ass.pptx
fra'ool ass.pptxfra'ool ass.pptx
fra'ool ass.pptx
 
ababa pre.pptx
ababa pre.pptxababa pre.pptx
ababa pre.pptx
 
The Staffing Function_Yohannes.pptx
The Staffing Function_Yohannes.pptxThe Staffing Function_Yohannes.pptx
The Staffing Function_Yohannes.pptx
 

Recently uploaded

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 

Recently uploaded (20)

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 

Data Link Control.ppt

  • 2. Flow Control • Ensuring the sending entity does not overwhelm the receiving entity —Preventing buffer overflow • Transmission time —Time taken to emit all bits into medium • Propagation time —Time for a bit to traverse the link
  • 3. Figure 1. Model of Frame Transmission
  • 4. Stop and Wait • Source transmits frame • Destination receives frame and replies with acknowledgement • Source waits for ACK before sending next frame • Destination can stop flow by not send ACK • Works well for a few large frames
  • 5. Fragmentation • Large block of data may be split into small frames —Limited buffer size —Errors detected sooner (when whole frame received) —On error, retransmission of smaller frames is needed —Prevents one station occupying medium for long periods • Stop and wait becomes inadequate
  • 6. Sliding Windows Flow Control • Allow multiple frames to be in transit • Receiver has buffer W long • Transmitter can send up to W frames without ACK • Each frame is numbered • ACK includes number of next frame expected • Sequence number bounded by size of field (k) —Frames are numbered modulo 2k
  • 7. Figure 2. Sliding Window Depiction
  • 8. Figure 3. Example of a Sliding Window Protocol
  • 9. Sliding Window Enhancements • Receiver can acknowledge frames without permitting further transmission (Receive Not Ready) • Must send a normal acknowledge to resume • If duplex, use piggybacking —If no data to send, use acknowledgement frame —If data but no acknowledgement to send, send last acknowledgement number again, or have ACK valid flag (TCP)
  • 10. Error Control • Error detection • Error correction • Single bit errors • Burst errors
  • 11. Error Detection • Additional bits added by transmitter for error detection code • Parity —Value of parity bit is such that character has even (even parity) or odd (odd parity) number of ones —Even number of bit errors goes undetected
  • 12. Figure 4 Error Detection Process
  • 13. Cyclic Redundancy Check • For a block of k bits transmitter generates n bit sequence • Transmit k+n bits which is exactly divisible by some number • Receive divides frame by that number —If no remainder, assume no error
  • 14. Error Control • Detection and correction of errors • Lost frames • Damaged frames • Automatic repeat request —Error detection —Positive acknowledgment —Retransmission after timeout —Negative acknowledgement and retransmission
  • 15. Automatic Repeat Request (ARQ) • Stop and wait • Go back N • Selective reject (selective retransmission)
  • 16. Stop and Wait • Source transmits single frame • Wait for ACK • If received frame damaged, discard it —Transmitter has timeout —If no ACK within timeout, retransmit • If ACK damaged,transmitter will not recognize it —Transmitter will retransmit —Receive gets two copies of frame —Use ACK0 and ACK1
  • 18. Stop and Wait - Pros and Cons • Simple • Inefficient
  • 19. Go Back N (1) • Based on sliding window • If no error, ACK as usual with next frame expected • Use window to control number of outstanding frames • If error, reply with rejection —Discard that frame and all future frames until error frame received correctly —Transmitter must go back and retransmit that frame and all subsequent frames
  • 20. Go Back N - Damaged Frame • Receiver detects error in frame i • Receiver sends rejection-i • Transmitter gets rejection-i • Transmitter retransmits frame i and all subsequent
  • 21. Go Back N - Lost Frame (1) • Frame i lost • Transmitter sends i+1 • Receiver gets frame i+1 out of sequence • Receiver send reject i • Transmitter goes back to frame i and retransmits
  • 22. Go Back N - Lost Frame (2) • Frame i lost and no additional frame sent • Receiver gets nothing and returns neither acknowledgement nor rejection • Transmitter times out and sends acknowledgement frame with P bit set to 1 • Receiver interprets this as command which it acknowledges with the number of the next frame it expects (frame i ) • Transmitter then retransmits frame i
  • 23. Go Back N - Damaged Acknowledgement • Receiver gets frame i and send acknowledgement (i+1) which is lost • Acknowledgements are cumulative, so next acknowledgement (i+n) may arrive before transmitter times out on frame i • If transmitter times out, it sends acknowledgement with P bit set as before • This can be repeated a number of times before a reset procedure is initiated
  • 24. Go Back N - Damaged Rejection • As for lost frame (2)
  • 26. High Level Data Link Control • HDLC • ISO 33009, ISO 4335
  • 27. HDLC Station Types • Primary station —Controls operation of link —Frames issued are called commands —Maintains separate logical link to each secondary station • Secondary station —Under control of primary station —Frames issued called responses • Combined station —May issue commands and responses
  • 28. HDLC Link Configurations • Unbalanced —One primary and one or more secondary stations —Supports full duplex and half duplex • Balanced —Two combined stations —Supports full duplex and half duplex
  • 29. HDLC Transfer Modes Normal Response Mode NRM • Unbalanced configuration • Primary initiates transfer to secondary • Secondary may only transmit data in response to command from primary • Used on multi-drop lines • Host computer as primary • Terminals as secondary
  • 30. HDLC Transfer Modes Asynchronous Balanced Mode ABM • Balanced configuration • Either station may initiate transmission without receiving permission • Most widely used • No polling overhead
  • 31. HDLC Transfer Modes Asynchronous Response Mode ARM • Unbalanced configuration • Secondary may initiate transmission without permission form primary • Primary responsible for line • Rarely used
  • 32. Frame Structure • Synchronous transmission • All transmissions in frames • Single frame format for all data and control exchanges
  • 33. Figure 7 HDLC Frame Structure
  • 34. Flag Fields • Delimit frame at both ends • 01111110 • May close one frame and open another • Receiver hunts for flag sequence to synchronize • Bit stuffing used to avoid confusion with data containing 01111110 — 0 inserted after every sequence of five 1s — If receiver detects five 1s it checks next bit — If 0, it is deleted — If 1 and seventh bit is 0, accept as flag — If sixth and seventh bits 1, sender is indicating abort
  • 35. Figure 8 Bit Stuffing
  • 36. Address Field • Identifies secondary station that sent or will receive frame • Usually 8 bits long • May be extended to multiples of 7 bits — LSB of each octet indicates that it is the last octet (1) or not (0) • All ones (11111111) is broadcast
  • 37. Control Field • Different for different frame type —Information - data to be transmitted to user (next layer up) • Flow and error control piggybacked on information frames —Supervisory - ARQ when piggyback not used —Unnumbered - supplementary link control • First one or two bits of control filed identify frame type • Remaining bits explained later
  • 39. Poll/Final Bit • Use depends on context • Command frame —P bit —1 to solicit (poll) response from peer • Response frame —F bit —1 indicates response to soliciting command
  • 40. Information Field • Only in information and some unnumbered frames • Must contain integral number of octets • Variable length
  • 41. Frame Check Sequence Field • FCS • Error detection • 16 bit CRC • Optional 32 bit CRC
  • 42. HDLC Operation • Exchange of information, supervisory and unnumbered frames • Three phases —Initialization —Data transfer —Disconnect
  • 43. Initialization • Initialization requested by either side • Issue one of six set-mode commands —Signals other side that initialization is requested —Specifies mode (NRM, ABM, ARM) —Specifies 3- or 7-bit sequence numbers • If request accepted HDLC module on other side transmits unnumbered acknowledged (UA) frame • If request rejected, disconnected mode (DM) sent
  • 44. Data Transfer • Both sides may begin to send user data in I-frames — Starting with sequence number 0 — N(S) and N(R) fields of I-frame are sequence numbers — Sequential, modulo 8 or 128, (3- or 7-bit) — In N(S) — N(R) acknowledgment for I-frames received — I-frame expected next • S-frames also used for flow and error control — Receive ready (RR) frame acknowledges last I-frame received • Indicating next I-frame expected • Used when no reverse data — Receive not ready (RNR) acknowledges, but also asks peer to suspend transmission of I-frames — When ready, send RR to restart — REJ initiates go-back-N ARQ • Indicates last I-frame received has been rejected • Retransmission beginning with N(R) required — Selective reject (SREJ) requests retransmission of single frame
  • 45. Disconnect • Either HDLC module can initiate disconnect • Own initiative —Fault • At request of higher-layer user • Send disconnect (DISC) frame • Remote entity must accept by replying with UA —Inform layer 3 user connection terminated • Outstanding unacknowledged I-frames may be lost —Recovery left to higher layers
  • 46. Figure 9 Examples of HDLC Operation