SlideShare a Scribd company logo
1 of 17
Download to read offline
Communication
Networks
Module – 2
Media Access and
Internetworking
Concepts of Framing
What do you study in this course?
This course will cover the following modules
TRANSPORT
LAYER
APPLICATION
LAYER
FUNDAMENTALS OF
NETWORKS
➢ Over view of
communication
➢ Network basics and
types
➢ Network Layering
➢ OSI Model
➢ Data and Signals
➢ Data Link Layer and
Its Functions
MEDIA ACCESS &
INTERNETWORKING
➢ Overview of media
access control
➢ Ethernet Standard
➢ Wireless LANS
➢ Bluetooth LE
➢ WiFi
➢ Zigbee
➢ IPv4
➢ Network Layer
Protocols
ROUTING
➢ Unicast and multicast
routing
➢ Algorithms and
Protocols
➢ Intra Domain and
Inter Domain
Protocols
➢ Overview of IPv6
➢ Transition from IPv4
to IPv6
➢ Overview of
Transport Layer
Protocols
➢ TCP and UDP
➢ Flow control
➢ Error Control
➢ Congestion Control
➢ Congestion Avoidance
➢ QoS
➢ Client Server
Programming
➢ WWW
➢ HTTP
➢ DNS
➢ E mail
➢ Peer to Peer
Networks
➢ Security Aspects
Visit www.youtube.com/GURUKULA for Lecture Videos
Brief Recap of Data Link Layer in Module 1
The MAC layer is responsible for
moving data packets to and from
one Network Interface Card (NIC)
to another across a shared channel.
The LLC sublayer acts as an
interface between the media access
control (MAC) sublayer and the
network layer.
Visit www.youtube.com/GURUKULA for Lecture Videos
Data Link Layer Functions:
•Media Access Control:
• Physical Addressing (MAC Address)
• Framing
•Logical Link Control:
• Flow Control – Controlling the Flow of Packets in the
network
• Error Control – Controlling the occurrence of Errors
during Transmission
• Access Control – Controlling the Nodes accessing the
Channel
Visit www.youtube.com/GURUKULA for Lecture Videos
Overview of Module - 2
• Framing
• What is Framing
• Types of Framing
• Methods for identifying the
boundaries
• Flow Control
• What is flow control
• Types of flow control
• Access Control
• What is access control
• Types of access control
• Ethernet – IEEE 802.3
• Evolution of Ethernet
• Frame Format of Ethernet
• Access Control for Ethernet
• Performance Evaluation of Ethernet
• WLAN – IEEE 802.11
• Architecture
• Bluetooth
• WIFI
• Zigbee
• 6LowPan
• Network Layer Services
• IPv4
• Packet switching
• Network Layer Protocols
Visit www.youtube.com/GURUKULA for Lecture Videos
Framing - Understanding
Hi Ganesh,
Hope this post finds you
in good health and
prosper. I am coming to
your home next week.
Please make all the
necessary arrangements
To:
Mr.Ganesh
8/20, SBI Colony
Salem - 636001
Mr.Jai, Avadi Chennai, 600109
DATA
SOURCE
DESTINATION
STAMPVALUE
Visit www.youtube.com/GURUKULA for Lecture Videos
Framing - Understanding
DATASOURCE DESTINATION STAMPVALUE
HEADER DATA TRAILER
Visit www.youtube.com/GURUKULA for Lecture Videos
Frame Format of Ethernet for Example
Frame Format of WLAN for Example
Visit www.youtube.com/GURUKULA for Lecture Videos
Types of Framing:
•There are 2 types of framing
➢Fixed length framing.
➢Variable length framing.
Header
(10bits)
Data
(20 bits)
Trailer
(10bits)
Header
(10bits)
Data
(variable)
Trailer
(10bits)
If I have 100 bits of data to transmit?
How many frames will be transmitted in FIXED LENGTH Framing? →
How many frames will be transmitted in VARIABLE LENGTH Framing? →
In case of variable length framing, How to identify the boundaries of the frame?
Identifying the Boundaries of the Frame
•Byte Oriented Framing
•Bit Oriented Framing
Visit www.youtube.com/GURUKULA for Lecture Videos
Byte Oriented Framing
• Normally the frame from the upper layer comes with the header and
trailer information .
• Header contains source and destination address
• Trailer contains error detection and correction information
• In order to identify the frame boundaries an 8 bit flag is added at
both the ends
• These flag may contain protocol dependent special characters.
Problems with Flags
• This method is generally suited for text transmission, but in case
of audio and video transmission any flag value can be a part of
the data.
• If the pattern is as same as the flag, then the receiver may
misinterpret that it is the end of the frame
• This problem can be addressed by BYTE Stuffing.
• In this method an extra byte is added to the data section if the
pattern is as same as the flag. These bytes are usually referred to
as Escape Characters (ESC)
Visit www.youtube.com/GURUKULA for Lecture Videos
Byte Oriented Framing
Visit www.youtube.com/GURUKULA for Lecture Videos
Bit Oriented Framing
• In this type of framing flag uses an constant 8 bit sequence
“01111110” as the delimiter to indicate the boundaries of the frames.
• These flags may also create the same problem as Byte oriented
protocols.
• To overcome this problem we stuff 1 bit to the data to prevent the
pattern from looking as same as flag.
• This strategy is called as BIT Stuffing.
Bit Stuffing
Visit www.youtube.com/GURUKULA for Lecture Videos
Session Summary
• What is Framing ?
• It is the process of adding Redundant information (Header and Trailer) to
the data units received from upper layer.
• Types of Framing ?
• Fixed Length Framing [Easy to process, Not Suitable for Larger Data]
• Variable Length Framing [ Best for Larger data, Difficult to identify the
Boundaries]
• Identifying the Boundaries of the Frame?
• Byte Stuffing [Flag is Added, Possibility of occurrence of Flag in Data,
Introduced ESC ]
• Bit Stuffing [Flags are kept constant, 1 bit is stuffed if 5 consecutive 1’s are
encountered]
Visit www.youtube.com/GURUKULA for Lecture Videos
References:
• Behrouz A. Forouzan, ―Data communication and Networking, Fifth
Edition, Tata McGraw – Hill, 2013
• Larry L. Peterson, Bruce S. Davie, ―Computer Networks: A Systems
Approach, Fifth Edition, Morgan Kaufmann Publishers, 2011.
• Few online References (Will be Mentioned in the description Section)
Thank You…

More Related Content

What's hot

Wi-Fi For Beginners - Module 3 - Access Points (APs)
Wi-Fi For Beginners - Module 3 - Access Points (APs)Wi-Fi For Beginners - Module 3 - Access Points (APs)
Wi-Fi For Beginners - Module 3 - Access Points (APs)Nigel Bowden
 
The Transport Layer
The Transport LayerThe Transport Layer
The Transport Layeradil raja
 
Switching Techniques
Switching TechniquesSwitching Techniques
Switching Techniquestameemyousaf
 
SYBSC IT COMPUTER NETWORKS UNIT III Wired LANS: Ethernet
SYBSC IT COMPUTER NETWORKS UNIT III Wired LANS: EthernetSYBSC IT COMPUTER NETWORKS UNIT III Wired LANS: Ethernet
SYBSC IT COMPUTER NETWORKS UNIT III Wired LANS: EthernetArti Parab Academics
 
peer to peer and client server model
peer to peer and client server modelpeer to peer and client server model
peer to peer and client server modelBharath Nair
 
Switching techniques
Switching techniquesSwitching techniques
Switching techniquesGupta6Bindu
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionShubham Khedekar
 
7. data link layer error detection and correction codes - parity and checksum
7. data link layer   error detection and correction codes - parity and checksum7. data link layer   error detection and correction codes - parity and checksum
7. data link layer error detection and correction codes - parity and checksumJAIGANESH SEKAR
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networkingicanhasfay
 
Types of clouds in cloud computing
Types of clouds in cloud computingTypes of clouds in cloud computing
Types of clouds in cloud computingMahesh Chemmala
 
Network topologies
Network topologiesNetwork topologies
Network topologiesNorah Saad
 

What's hot (20)

Wi-Fi For Beginners - Module 3 - Access Points (APs)
Wi-Fi For Beginners - Module 3 - Access Points (APs)Wi-Fi For Beginners - Module 3 - Access Points (APs)
Wi-Fi For Beginners - Module 3 - Access Points (APs)
 
OSI Model
OSI ModelOSI Model
OSI Model
 
The Transport Layer
The Transport LayerThe Transport Layer
The Transport Layer
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
Chapter 8: Switching
Chapter 8: SwitchingChapter 8: Switching
Chapter 8: Switching
 
Switching Techniques
Switching TechniquesSwitching Techniques
Switching Techniques
 
Transport layer
Transport layer Transport layer
Transport layer
 
SYBSC IT COMPUTER NETWORKS UNIT III Wired LANS: Ethernet
SYBSC IT COMPUTER NETWORKS UNIT III Wired LANS: EthernetSYBSC IT COMPUTER NETWORKS UNIT III Wired LANS: Ethernet
SYBSC IT COMPUTER NETWORKS UNIT III Wired LANS: Ethernet
 
Topic Packet switching
Topic Packet switchingTopic Packet switching
Topic Packet switching
 
The mfn 3
The mfn 3The mfn 3
The mfn 3
 
peer to peer and client server model
peer to peer and client server modelpeer to peer and client server model
peer to peer and client server model
 
Switching techniques
Switching techniquesSwitching techniques
Switching techniques
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
7. data link layer error detection and correction codes - parity and checksum
7. data link layer   error detection and correction codes - parity and checksum7. data link layer   error detection and correction codes - parity and checksum
7. data link layer error detection and correction codes - parity and checksum
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networking
 
OSI reference model
OSI reference modelOSI reference model
OSI reference model
 
Wireless LANs PPT.ppt
Wireless LANs PPT.pptWireless LANs PPT.ppt
Wireless LANs PPT.ppt
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Types of clouds in cloud computing
Types of clouds in cloud computingTypes of clouds in cloud computing
Types of clouds in cloud computing
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 

Similar to 2.1 framing

2.8 bluetooth ieee 802.15
2.8 bluetooth   ieee 802.152.8 bluetooth   ieee 802.15
2.8 bluetooth ieee 802.15JAIGANESH SEKAR
 
Future services on Janet
Future services on JanetFuture services on Janet
Future services on JanetJisc
 
Final_IoT_Protocol Stack.pptx
Final_IoT_Protocol Stack.pptxFinal_IoT_Protocol Stack.pptx
Final_IoT_Protocol Stack.pptxjainam bhavsar
 
Chapter 10 network for PG PAWSN
Chapter 10 network for PG PAWSNChapter 10 network for PG PAWSN
Chapter 10 network for PG PAWSNDhaya kanthavel
 
Ccnp presentation day 4 sd-access vs traditional network architecture
Ccnp presentation   day 4  sd-access vs traditional network architectureCcnp presentation   day 4  sd-access vs traditional network architecture
Ccnp presentation day 4 sd-access vs traditional network architectureSagarR24
 
Osi Model Interview Questions & Answers
Osi Model Interview Questions & AnswersOsi Model Interview Questions & Answers
Osi Model Interview Questions & AnswersAll About Testing
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 6
CCNA (R & S) Module 02 - Connecting Networks - Chapter 6CCNA (R & S) Module 02 - Connecting Networks - Chapter 6
CCNA (R & S) Module 02 - Connecting Networks - Chapter 6Waqas Ahmed Nawaz
 
7 layers of osi models
7 layers of osi models7 layers of osi models
7 layers of osi modelsSathish Kumar
 
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMINGA HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMINGijp2p
 
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMINGA HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMINGijp2p
 
Communication Technologies in IOT.pptx
Communication Technologies in IOT.pptxCommunication Technologies in IOT.pptx
Communication Technologies in IOT.pptx20CE112YASHPATEL
 
A hybrid push pull overlay network for
A hybrid push pull overlay network forA hybrid push pull overlay network for
A hybrid push pull overlay network forijp2p
 

Similar to 2.1 framing (20)

2.6 ethernet ieee 802.3
2.6 ethernet   ieee 802.32.6 ethernet   ieee 802.3
2.6 ethernet ieee 802.3
 
2.8 bluetooth ieee 802.15
2.8 bluetooth   ieee 802.152.8 bluetooth   ieee 802.15
2.8 bluetooth ieee 802.15
 
Future services on Janet
Future services on JanetFuture services on Janet
Future services on Janet
 
IOT - Unit 3.pptx
IOT - Unit 3.pptxIOT - Unit 3.pptx
IOT - Unit 3.pptx
 
Slideshare
SlideshareSlideshare
Slideshare
 
Final_IoT_Protocol Stack.pptx
Final_IoT_Protocol Stack.pptxFinal_IoT_Protocol Stack.pptx
Final_IoT_Protocol Stack.pptx
 
Chapter 10 network for PG PAWSN
Chapter 10 network for PG PAWSNChapter 10 network for PG PAWSN
Chapter 10 network for PG PAWSN
 
Ccnp presentation day 4 sd-access vs traditional network architecture
Ccnp presentation   day 4  sd-access vs traditional network architectureCcnp presentation   day 4  sd-access vs traditional network architecture
Ccnp presentation day 4 sd-access vs traditional network architecture
 
Osi Model Interview Questions & Answers
Osi Model Interview Questions & AnswersOsi Model Interview Questions & Answers
Osi Model Interview Questions & Answers
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 6
CCNA (R & S) Module 02 - Connecting Networks - Chapter 6CCNA (R & S) Module 02 - Connecting Networks - Chapter 6
CCNA (R & S) Module 02 - Connecting Networks - Chapter 6
 
7 layers of osi models
7 layers of osi models7 layers of osi models
7 layers of osi models
 
Structured Cabling Technologies
Structured Cabling TechnologiesStructured Cabling Technologies
Structured Cabling Technologies
 
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMINGA HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
 
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMINGA HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
 
6 lowpan
6 lowpan6 lowpan
6 lowpan
 
Communication Technologies in IOT.pptx
Communication Technologies in IOT.pptxCommunication Technologies in IOT.pptx
Communication Technologies in IOT.pptx
 
QSpiders - Dod Model
QSpiders - Dod ModelQSpiders - Dod Model
QSpiders - Dod Model
 
A hybrid push pull overlay network for
A hybrid push pull overlay network forA hybrid push pull overlay network for
A hybrid push pull overlay network for
 
Ccna routing and_switching_chapter-4-5
Ccna routing and_switching_chapter-4-5Ccna routing and_switching_chapter-4-5
Ccna routing and_switching_chapter-4-5
 
5 IEEE standards
5  IEEE standards5  IEEE standards
5 IEEE standards
 

More from JAIGANESH SEKAR

Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank JAIGANESH SEKAR
 
2.3b access control random access methods - part 3 - csma ca
2.3b access control   random access methods - part 3 - csma ca2.3b access control   random access methods - part 3 - csma ca
2.3b access control random access methods - part 3 - csma caJAIGANESH SEKAR
 
2.10b network layer services i pv4 - variable length subnetting
2.10b network layer services  i pv4 - variable length subnetting2.10b network layer services  i pv4 - variable length subnetting
2.10b network layer services i pv4 - variable length subnettingJAIGANESH SEKAR
 
2.10a network layer services i pv4 - fixed length subnetting
2.10a network layer services  i pv4 - fixed length subnetting2.10a network layer services  i pv4 - fixed length subnetting
2.10a network layer services i pv4 - fixed length subnettingJAIGANESH SEKAR
 
2.10 network layer services i pv4
2.10 network layer services  i pv42.10 network layer services  i pv4
2.10 network layer services i pv4JAIGANESH SEKAR
 
2.9 network layer services packet switching
2.9 network layer services   packet switching2.9 network layer services   packet switching
2.9 network layer services packet switchingJAIGANESH SEKAR
 
2.5 access control channelization methods
2.5 access control   channelization methods2.5 access control   channelization methods
2.5 access control channelization methodsJAIGANESH SEKAR
 
2.4 access control controlled access methods
2.4 access control   controlled access methods2.4 access control   controlled access methods
2.4 access control controlled access methodsJAIGANESH SEKAR
 
2.3a access control random access methods - part 2 - csma cd
2.3a access control   random access methods - part 2 - csma cd2.3a access control   random access methods - part 2 - csma cd
2.3a access control random access methods - part 2 - csma cdJAIGANESH SEKAR
 
2.3 access control random access methods - part 1
2.3 access control   random access methods - part 12.3 access control   random access methods - part 1
2.3 access control random access methods - part 1JAIGANESH SEKAR
 
9. data link layer error correction codes - hamming code
9. data link layer   error correction codes - hamming code9. data link layer   error correction codes - hamming code
9. data link layer error correction codes - hamming codeJAIGANESH SEKAR
 
8. data link layer error detection and correction codes - crc
8. data link layer   error detection and correction codes - crc8. data link layer   error detection and correction codes - crc
8. data link layer error detection and correction codes - crcJAIGANESH SEKAR
 
6. data link layer physical addressing
6. data link layer   physical addressing6. data link layer   physical addressing
6. data link layer physical addressingJAIGANESH SEKAR
 
2. overview of data communication part 1
2. overview of data communication   part 12. overview of data communication   part 1
2. overview of data communication part 1JAIGANESH SEKAR
 
3. overview of data communication part 2
3. overview of data communication   part 23. overview of data communication   part 2
3. overview of data communication part 2JAIGANESH SEKAR
 
1. introduction to communication networks subject introduction
1. introduction to communication networks   subject introduction1. introduction to communication networks   subject introduction
1. introduction to communication networks subject introductionJAIGANESH SEKAR
 
Ever Noticed the Rings on Your Head Phone Jack - Explainer
Ever Noticed the Rings on Your Head Phone Jack - ExplainerEver Noticed the Rings on Your Head Phone Jack - Explainer
Ever Noticed the Rings on Your Head Phone Jack - ExplainerJAIGANESH SEKAR
 

More from JAIGANESH SEKAR (20)

Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank
 
2.3b access control random access methods - part 3 - csma ca
2.3b access control   random access methods - part 3 - csma ca2.3b access control   random access methods - part 3 - csma ca
2.3b access control random access methods - part 3 - csma ca
 
2.10b network layer services i pv4 - variable length subnetting
2.10b network layer services  i pv4 - variable length subnetting2.10b network layer services  i pv4 - variable length subnetting
2.10b network layer services i pv4 - variable length subnetting
 
2.10a network layer services i pv4 - fixed length subnetting
2.10a network layer services  i pv4 - fixed length subnetting2.10a network layer services  i pv4 - fixed length subnetting
2.10a network layer services i pv4 - fixed length subnetting
 
2.10 network layer services i pv4
2.10 network layer services  i pv42.10 network layer services  i pv4
2.10 network layer services i pv4
 
2.9 network layer services packet switching
2.9 network layer services   packet switching2.9 network layer services   packet switching
2.9 network layer services packet switching
 
2.7 wlan ieee 802.11
2.7 wlan   ieee 802.112.7 wlan   ieee 802.11
2.7 wlan ieee 802.11
 
2.5 access control channelization methods
2.5 access control   channelization methods2.5 access control   channelization methods
2.5 access control channelization methods
 
2.4 access control controlled access methods
2.4 access control   controlled access methods2.4 access control   controlled access methods
2.4 access control controlled access methods
 
2.3a access control random access methods - part 2 - csma cd
2.3a access control   random access methods - part 2 - csma cd2.3a access control   random access methods - part 2 - csma cd
2.3a access control random access methods - part 2 - csma cd
 
2.3 access control random access methods - part 1
2.3 access control   random access methods - part 12.3 access control   random access methods - part 1
2.3 access control random access methods - part 1
 
2.2 flow control
2.2 flow control2.2 flow control
2.2 flow control
 
9. data link layer error correction codes - hamming code
9. data link layer   error correction codes - hamming code9. data link layer   error correction codes - hamming code
9. data link layer error correction codes - hamming code
 
8. data link layer error detection and correction codes - crc
8. data link layer   error detection and correction codes - crc8. data link layer   error detection and correction codes - crc
8. data link layer error detection and correction codes - crc
 
6. data link layer physical addressing
6. data link layer   physical addressing6. data link layer   physical addressing
6. data link layer physical addressing
 
5. protocol layering
5. protocol layering5. protocol layering
5. protocol layering
 
2. overview of data communication part 1
2. overview of data communication   part 12. overview of data communication   part 1
2. overview of data communication part 1
 
3. overview of data communication part 2
3. overview of data communication   part 23. overview of data communication   part 2
3. overview of data communication part 2
 
1. introduction to communication networks subject introduction
1. introduction to communication networks   subject introduction1. introduction to communication networks   subject introduction
1. introduction to communication networks subject introduction
 
Ever Noticed the Rings on Your Head Phone Jack - Explainer
Ever Noticed the Rings on Your Head Phone Jack - ExplainerEver Noticed the Rings on Your Head Phone Jack - Explainer
Ever Noticed the Rings on Your Head Phone Jack - Explainer
 

Recently uploaded

Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 

Recently uploaded (20)

Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 

2.1 framing

  • 1. Communication Networks Module – 2 Media Access and Internetworking Concepts of Framing
  • 2. What do you study in this course? This course will cover the following modules TRANSPORT LAYER APPLICATION LAYER FUNDAMENTALS OF NETWORKS ➢ Over view of communication ➢ Network basics and types ➢ Network Layering ➢ OSI Model ➢ Data and Signals ➢ Data Link Layer and Its Functions MEDIA ACCESS & INTERNETWORKING ➢ Overview of media access control ➢ Ethernet Standard ➢ Wireless LANS ➢ Bluetooth LE ➢ WiFi ➢ Zigbee ➢ IPv4 ➢ Network Layer Protocols ROUTING ➢ Unicast and multicast routing ➢ Algorithms and Protocols ➢ Intra Domain and Inter Domain Protocols ➢ Overview of IPv6 ➢ Transition from IPv4 to IPv6 ➢ Overview of Transport Layer Protocols ➢ TCP and UDP ➢ Flow control ➢ Error Control ➢ Congestion Control ➢ Congestion Avoidance ➢ QoS ➢ Client Server Programming ➢ WWW ➢ HTTP ➢ DNS ➢ E mail ➢ Peer to Peer Networks ➢ Security Aspects Visit www.youtube.com/GURUKULA for Lecture Videos
  • 3. Brief Recap of Data Link Layer in Module 1 The MAC layer is responsible for moving data packets to and from one Network Interface Card (NIC) to another across a shared channel. The LLC sublayer acts as an interface between the media access control (MAC) sublayer and the network layer. Visit www.youtube.com/GURUKULA for Lecture Videos
  • 4. Data Link Layer Functions: •Media Access Control: • Physical Addressing (MAC Address) • Framing •Logical Link Control: • Flow Control – Controlling the Flow of Packets in the network • Error Control – Controlling the occurrence of Errors during Transmission • Access Control – Controlling the Nodes accessing the Channel Visit www.youtube.com/GURUKULA for Lecture Videos
  • 5. Overview of Module - 2 • Framing • What is Framing • Types of Framing • Methods for identifying the boundaries • Flow Control • What is flow control • Types of flow control • Access Control • What is access control • Types of access control • Ethernet – IEEE 802.3 • Evolution of Ethernet • Frame Format of Ethernet • Access Control for Ethernet • Performance Evaluation of Ethernet • WLAN – IEEE 802.11 • Architecture • Bluetooth • WIFI • Zigbee • 6LowPan • Network Layer Services • IPv4 • Packet switching • Network Layer Protocols Visit www.youtube.com/GURUKULA for Lecture Videos
  • 6. Framing - Understanding Hi Ganesh, Hope this post finds you in good health and prosper. I am coming to your home next week. Please make all the necessary arrangements To: Mr.Ganesh 8/20, SBI Colony Salem - 636001 Mr.Jai, Avadi Chennai, 600109 DATA SOURCE DESTINATION STAMPVALUE Visit www.youtube.com/GURUKULA for Lecture Videos
  • 7. Framing - Understanding DATASOURCE DESTINATION STAMPVALUE HEADER DATA TRAILER Visit www.youtube.com/GURUKULA for Lecture Videos
  • 8. Frame Format of Ethernet for Example Frame Format of WLAN for Example Visit www.youtube.com/GURUKULA for Lecture Videos
  • 9. Types of Framing: •There are 2 types of framing ➢Fixed length framing. ➢Variable length framing. Header (10bits) Data (20 bits) Trailer (10bits) Header (10bits) Data (variable) Trailer (10bits) If I have 100 bits of data to transmit? How many frames will be transmitted in FIXED LENGTH Framing? → How many frames will be transmitted in VARIABLE LENGTH Framing? → In case of variable length framing, How to identify the boundaries of the frame?
  • 10. Identifying the Boundaries of the Frame •Byte Oriented Framing •Bit Oriented Framing Visit www.youtube.com/GURUKULA for Lecture Videos
  • 11. Byte Oriented Framing • Normally the frame from the upper layer comes with the header and trailer information . • Header contains source and destination address • Trailer contains error detection and correction information • In order to identify the frame boundaries an 8 bit flag is added at both the ends • These flag may contain protocol dependent special characters.
  • 12. Problems with Flags • This method is generally suited for text transmission, but in case of audio and video transmission any flag value can be a part of the data. • If the pattern is as same as the flag, then the receiver may misinterpret that it is the end of the frame • This problem can be addressed by BYTE Stuffing. • In this method an extra byte is added to the data section if the pattern is as same as the flag. These bytes are usually referred to as Escape Characters (ESC) Visit www.youtube.com/GURUKULA for Lecture Videos
  • 13. Byte Oriented Framing Visit www.youtube.com/GURUKULA for Lecture Videos
  • 14. Bit Oriented Framing • In this type of framing flag uses an constant 8 bit sequence “01111110” as the delimiter to indicate the boundaries of the frames. • These flags may also create the same problem as Byte oriented protocols. • To overcome this problem we stuff 1 bit to the data to prevent the pattern from looking as same as flag. • This strategy is called as BIT Stuffing.
  • 16. Session Summary • What is Framing ? • It is the process of adding Redundant information (Header and Trailer) to the data units received from upper layer. • Types of Framing ? • Fixed Length Framing [Easy to process, Not Suitable for Larger Data] • Variable Length Framing [ Best for Larger data, Difficult to identify the Boundaries] • Identifying the Boundaries of the Frame? • Byte Stuffing [Flag is Added, Possibility of occurrence of Flag in Data, Introduced ESC ] • Bit Stuffing [Flags are kept constant, 1 bit is stuffed if 5 consecutive 1’s are encountered] Visit www.youtube.com/GURUKULA for Lecture Videos
  • 17. References: • Behrouz A. Forouzan, ―Data communication and Networking, Fifth Edition, Tata McGraw – Hill, 2013 • Larry L. Peterson, Bruce S. Davie, ―Computer Networks: A Systems Approach, Fifth Edition, Morgan Kaufmann Publishers, 2011. • Few online References (Will be Mentioned in the description Section) Thank You…