SlideShare a Scribd company logo
1 of 43
Chapter 11 Data Link Control and Protocols
11.1  Flow and Error Control Flow Control Error Control
Flow control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. Note :
Error control in the data link layer is based on automatic repeat request, which is the retransmission of data.  Note :
11.2  Stop-and-Wait ARQ Operation Bidirectional Transmission
11.1   Normal operation
11.2   Stop-and-Wait ARQ, lost frame
11.3   Stop-and-Wait ARQ, lost ACK frame
In Stop-and-Wait ARQ, numbering frames prevents the retaining of duplicate frames. Note :
11.4   Stop-and-Wait ARQ, delayed ACK
Numbered acknowledgments are needed if an acknowledgment is delayed and the next frame is lost.  Note :
11.5   Piggybacking
11.3  Go-Back-N ARQ Sequence Number Sender and Receiver Sliding Window Control Variables and Timers Acknowledgment Resending Frames Operation
11.6   Sender sliding window
11.7   Receiver sliding window
11.8   Control variables
11.9   Go-Back-N ARQ, normal operation
11.10   Go-Back-N ARQ, lost frame
11.11   Go-Back-N ARQ: sender window size
In Go-Back-N ARQ, the size of the sender window must be less than 2m; the size of the receiver window is always 1. Note :
11.4  Selective-Repeat ARQ Sender and Receiver Windows Operation Sender Window Size Bidirectional Transmission Pipelining
11.12   Selective Repeat ARQ, sender and receiver windows
11.13   Selective Repeat ARQ, lost frame
In Selective Repeat ARQ, the size of the sender and receiver window must be at most one-half of 2 m .  Note :
11.14   Selective Repeat ARQ, sender window size
Example 1 In a Stop-and-Wait ARQ system, the bandwidth of the line is 1 Mbps, and 1 bit takes 20 ms to make a round trip. What is the bandwidth-delay product? If the system data frames are 1000 bits in length, what is the utilization percentage of the link? Solution The bandwidth-delay product is 1    10 6     20    10 -3  = 20,000 bits The system can send 20,000 bits during the time it takes for the data to go from the sender to the receiver and then back again. However, the system sends only 1000 bits. We can say that the link utilization is only 1000/20,000, or 5%. For this reason, for a link with high bandwidth or long delay, use of Stop-and-Wait ARQ wastes the capacity of the link.
Example 2 What is the utilization percentage of the link in Example 1 if the link uses Go-Back-N ARQ with a 15-frame sequence? Solution The bandwidth-delay product is still 20,000. The system can send up to 15 frames or 15,000 bits during a round trip. This means the utilization is 15,000/20,000, or 75 percent. Of course, if there are damaged frames, the utilization percentage is much less because frames have to be resent.
11.5  HDLC Configurations and Transfer Modes Frames Frame Format Examples Data Transparency
11.15   NRM
11.16   ABM
11.17   HDLC frame
11.18   HDLC frame types
11.19   I-frame
11.20   S-frame control field in HDLC
11.21   U-frame control field in HDLC
Table 11.1  U-frame control command and response Request information mode RIM Set initialization mode SIM Reset RSET Exchange ID XID Frame reject FRMR Unnumbered information UI Unnumbered acknowledgment UA Request disconnect RD Disconnect DISC Disconnect mode DM Unnumbered poll UP Set asynchronous balanced mode (extended) SABME Set asynchronous balanced mode SABM Set normal response mode (extended) SNRME Set normal response mode Meaning SNRM Command/response
Example 3 Figure 11.22 shows an exchange using piggybacking where is no error. Station A begins the exchange of information with an I-frame numbered 0 followed by another I-frame numbered 1. Station B piggybacks its acknowledgment of both frames onto an I-frame of its own. Station B’s first I-frame is also numbered 0 [N(S) field] and contains a 2 in its N(R) field, acknowledging the receipt of A’s frames 1 and 0 and indicating that it expects frame 2 to arrive next. Station B transmits its second and third I-frames (numbered 1 and 2) before accepting further frames from station A. Its N(R) information, therefore, has not changed: B frames 1 and 2 indicate that station B is still expecting A frame 2 to arrive next.
11.22   Example 3
Example 4 In Example 3, suppose frame 1 sent from station B to station A has an error. Station A informs station B to resend frames 1 and 2 (the system is using the Go-Back-N mechanism). Station A sends a reject supervisory frame to announce the error in frame 1. Figure 11.23 shows the exchange.
11.23   Example 4
Bit stuffing is the process of adding one extra 0 whenever there are five consecutive 1s in the data so that the receiver does not mistake the  data for a flag. Note :
11.24   Bit stuffing and removal
11.25   Bit stuffing in HDLC

More Related Content

What's hot

Chapter 6 bandwidth utilization -multiplexing and spreading_computer_network
Chapter 6   bandwidth utilization -multiplexing and spreading_computer_networkChapter 6   bandwidth utilization -multiplexing and spreading_computer_network
Chapter 6 bandwidth utilization -multiplexing and spreading_computer_networkDhairya Joshi
 
Naming in Distributed Systems
Naming in Distributed SystemsNaming in Distributed Systems
Naming in Distributed SystemsNandakumar P
 
Asynchronous Transfer Mode
Asynchronous Transfer ModeAsynchronous Transfer Mode
Asynchronous Transfer ModeNishant Munjal
 
Connection( less & oriented)
Connection( less & oriented)Connection( less & oriented)
Connection( less & oriented)ymghorpade
 
Distributed system architecture
Distributed system architectureDistributed system architecture
Distributed system architectureYisal Khan
 
Chapter 11: Data Link Control
Chapter 11: Data Link ControlChapter 11: Data Link Control
Chapter 11: Data Link ControlJeoffnaRuth
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)k33a
 
Unit 2 data link control
Unit 2 data link controlUnit 2 data link control
Unit 2 data link controlVishal kakade
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Dr. SELVAGANESAN S
 
Network architecture
Network architectureNetwork architecture
Network architectureOnline
 
distributed Computing system model
distributed Computing system modeldistributed Computing system model
distributed Computing system modelHarshad Umredkar
 

What's hot (20)

Snooping TCP
Snooping TCPSnooping TCP
Snooping TCP
 
Chapter 6 bandwidth utilization -multiplexing and spreading_computer_network
Chapter 6   bandwidth utilization -multiplexing and spreading_computer_networkChapter 6   bandwidth utilization -multiplexing and spreading_computer_network
Chapter 6 bandwidth utilization -multiplexing and spreading_computer_network
 
Chapter 14
Chapter 14Chapter 14
Chapter 14
 
go back n protocol
go back n protocolgo back n protocol
go back n protocol
 
Ipv4
Ipv4Ipv4
Ipv4
 
Naming in Distributed Systems
Naming in Distributed SystemsNaming in Distributed Systems
Naming in Distributed Systems
 
Asynchronous Transfer Mode
Asynchronous Transfer ModeAsynchronous Transfer Mode
Asynchronous Transfer Mode
 
Connection( less & oriented)
Connection( less & oriented)Connection( less & oriented)
Connection( less & oriented)
 
Distributed system architecture
Distributed system architectureDistributed system architecture
Distributed system architecture
 
Frame relay
Frame relayFrame relay
Frame relay
 
Chapter 11: Data Link Control
Chapter 11: Data Link ControlChapter 11: Data Link Control
Chapter 11: Data Link Control
 
Transport Protocols
Transport ProtocolsTransport Protocols
Transport Protocols
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
Unit 2 data link control
Unit 2 data link controlUnit 2 data link control
Unit 2 data link control
 
Token ring
Token ringToken ring
Token ring
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer
 
Congestion control in TCP
Congestion control in TCPCongestion control in TCP
Congestion control in TCP
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
distributed Computing system model
distributed Computing system modeldistributed Computing system model
distributed Computing system model
 

Similar to Data Link Protocols - Flow, Error Control, ARQ Types Explained

chapter 11(Data link Control)in CN .ppt
chapter 11(Data link Control)in CN  .pptchapter 11(Data link Control)in CN  .ppt
chapter 11(Data link Control)in CN .pptanjubala996089
 
3a data link layer
3a data link layer 3a data link layer
3a data link layer kavish dani
 
Unit I Data Link Control.ppt
Unit I Data Link Control.pptUnit I Data Link Control.ppt
Unit I Data Link Control.pptMSANDHYARANI3
 
11 Data Link_Control
11 Data Link_Control11 Data Link_Control
11 Data Link_ControlAhmar Hashmi
 
Networks-part9-DLL-Flowcontrol.pptx
Networks-part9-DLL-Flowcontrol.pptxNetworks-part9-DLL-Flowcontrol.pptx
Networks-part9-DLL-Flowcontrol.pptxraju005raju005
 
SYBSC IT COMPUTER NETWORKS UNIT III Data Link Control
SYBSC IT COMPUTER NETWORKS UNIT III Data Link ControlSYBSC IT COMPUTER NETWORKS UNIT III Data Link Control
SYBSC IT COMPUTER NETWORKS UNIT III Data Link ControlArti Parab Academics
 
Flow Control (1).ppt
Flow Control (1).pptFlow Control (1).ppt
Flow Control (1).pptsarthakgithub
 
3a data link layer continued
3a data link layer continued3a data link layer continued
3a data link layer continuedkavish dani
 
Link-Level Flow and Error Control Chapter11
Link-Level Flow and Error Control Chapter11Link-Level Flow and Error Control Chapter11
Link-Level Flow and Error Control Chapter11daniel ayalew
 
DataLinkControl.ppt
DataLinkControl.pptDataLinkControl.ppt
DataLinkControl.pptMaddalaSeshu
 
session -7 - Sliding Window Protocol 1- N oisy Channels.ppt
session -7 - Sliding Window Protocol 1- N oisy Channels.pptsession -7 - Sliding Window Protocol 1- N oisy Channels.ppt
session -7 - Sliding Window Protocol 1- N oisy Channels.pptnanisrikar276711
 
Transport layer TCP and UDP.ppt
Transport layer TCP and UDP.pptTransport layer TCP and UDP.ppt
Transport layer TCP and UDP.pptAlliVinay1
 
09 Data Link LayerFlow Control.ppt
09 Data Link LayerFlow Control.ppt09 Data Link LayerFlow Control.ppt
09 Data Link LayerFlow Control.pptShaliniKumariGupta1
 

Similar to Data Link Protocols - Flow, Error Control, ARQ Types Explained (20)

DLL Part_1.ppt
DLL Part_1.pptDLL Part_1.ppt
DLL Part_1.ppt
 
chapter 11(Data link Control)in CN .ppt
chapter 11(Data link Control)in CN  .pptchapter 11(Data link Control)in CN  .ppt
chapter 11(Data link Control)in CN .ppt
 
dl_frames.ppt
dl_frames.pptdl_frames.ppt
dl_frames.ppt
 
Data Link Control.ppt
Data Link Control.pptData Link Control.ppt
Data Link Control.ppt
 
3a data link layer
3a data link layer 3a data link layer
3a data link layer
 
Unit I Data Link Control.ppt
Unit I Data Link Control.pptUnit I Data Link Control.ppt
Unit I Data Link Control.ppt
 
Ch11
Ch11Ch11
Ch11
 
11 Data Link_Control
11 Data Link_Control11 Data Link_Control
11 Data Link_Control
 
Ch11
Ch11Ch11
Ch11
 
Networks-part9-DLL-Flowcontrol.pptx
Networks-part9-DLL-Flowcontrol.pptxNetworks-part9-DLL-Flowcontrol.pptx
Networks-part9-DLL-Flowcontrol.pptx
 
SYBSC IT COMPUTER NETWORKS UNIT III Data Link Control
SYBSC IT COMPUTER NETWORKS UNIT III Data Link ControlSYBSC IT COMPUTER NETWORKS UNIT III Data Link Control
SYBSC IT COMPUTER NETWORKS UNIT III Data Link Control
 
Flow Control (1).ppt
Flow Control (1).pptFlow Control (1).ppt
Flow Control (1).ppt
 
3a data link layer continued
3a data link layer continued3a data link layer continued
3a data link layer continued
 
Link-Level Flow and Error Control Chapter11
Link-Level Flow and Error Control Chapter11Link-Level Flow and Error Control Chapter11
Link-Level Flow and Error Control Chapter11
 
DataLinkControl.ppt
DataLinkControl.pptDataLinkControl.ppt
DataLinkControl.ppt
 
07 data linkcontrol
07 data linkcontrol07 data linkcontrol
07 data linkcontrol
 
Ch11
Ch11Ch11
Ch11
 
session -7 - Sliding Window Protocol 1- N oisy Channels.ppt
session -7 - Sliding Window Protocol 1- N oisy Channels.pptsession -7 - Sliding Window Protocol 1- N oisy Channels.ppt
session -7 - Sliding Window Protocol 1- N oisy Channels.ppt
 
Transport layer TCP and UDP.ppt
Transport layer TCP and UDP.pptTransport layer TCP and UDP.ppt
Transport layer TCP and UDP.ppt
 
09 Data Link LayerFlow Control.ppt
09 Data Link LayerFlow Control.ppt09 Data Link LayerFlow Control.ppt
09 Data Link LayerFlow Control.ppt
 

More from soumya ranjan mohanty (20)

Ch 30
Ch 30Ch 30
Ch 30
 
Ch 31
Ch 31Ch 31
Ch 31
 
Ch 29
Ch 29Ch 29
Ch 29
 
Ch 28
Ch 28Ch 28
Ch 28
 
Ch 26
Ch 26Ch 26
Ch 26
 
Ch 27
Ch 27Ch 27
Ch 27
 
Ch 25
Ch 25Ch 25
Ch 25
 
Ch 24
Ch 24Ch 24
Ch 24
 
Ch 23
Ch 23Ch 23
Ch 23
 
Ch 22
Ch 22Ch 22
Ch 22
 
Ch 21
Ch 21Ch 21
Ch 21
 
Ch 20
Ch 20Ch 20
Ch 20
 
Ch 17
Ch 17Ch 17
Ch 17
 
Ch 19
Ch 19Ch 19
Ch 19
 
Ch 18
Ch 18Ch 18
Ch 18
 
Ch 16
Ch 16Ch 16
Ch 16
 
Ch 12
Ch 12Ch 12
Ch 12
 
Ch 14
Ch 14Ch 14
Ch 14
 
Ch 13
Ch 13Ch 13
Ch 13
 
Ch 15
Ch 15Ch 15
Ch 15
 

Recently uploaded

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 

Recently uploaded (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 

Data Link Protocols - Flow, Error Control, ARQ Types Explained

  • 1. Chapter 11 Data Link Control and Protocols
  • 2. 11.1 Flow and Error Control Flow Control Error Control
  • 3. Flow control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. Note :
  • 4. Error control in the data link layer is based on automatic repeat request, which is the retransmission of data. Note :
  • 5. 11.2 Stop-and-Wait ARQ Operation Bidirectional Transmission
  • 6. 11.1 Normal operation
  • 7. 11.2 Stop-and-Wait ARQ, lost frame
  • 8. 11.3 Stop-and-Wait ARQ, lost ACK frame
  • 9. In Stop-and-Wait ARQ, numbering frames prevents the retaining of duplicate frames. Note :
  • 10. 11.4 Stop-and-Wait ARQ, delayed ACK
  • 11. Numbered acknowledgments are needed if an acknowledgment is delayed and the next frame is lost. Note :
  • 12. 11.5 Piggybacking
  • 13. 11.3 Go-Back-N ARQ Sequence Number Sender and Receiver Sliding Window Control Variables and Timers Acknowledgment Resending Frames Operation
  • 14. 11.6 Sender sliding window
  • 15. 11.7 Receiver sliding window
  • 16. 11.8 Control variables
  • 17. 11.9 Go-Back-N ARQ, normal operation
  • 18. 11.10 Go-Back-N ARQ, lost frame
  • 19. 11.11 Go-Back-N ARQ: sender window size
  • 20. In Go-Back-N ARQ, the size of the sender window must be less than 2m; the size of the receiver window is always 1. Note :
  • 21. 11.4 Selective-Repeat ARQ Sender and Receiver Windows Operation Sender Window Size Bidirectional Transmission Pipelining
  • 22. 11.12 Selective Repeat ARQ, sender and receiver windows
  • 23. 11.13 Selective Repeat ARQ, lost frame
  • 24. In Selective Repeat ARQ, the size of the sender and receiver window must be at most one-half of 2 m . Note :
  • 25. 11.14 Selective Repeat ARQ, sender window size
  • 26. Example 1 In a Stop-and-Wait ARQ system, the bandwidth of the line is 1 Mbps, and 1 bit takes 20 ms to make a round trip. What is the bandwidth-delay product? If the system data frames are 1000 bits in length, what is the utilization percentage of the link? Solution The bandwidth-delay product is 1  10 6  20  10 -3 = 20,000 bits The system can send 20,000 bits during the time it takes for the data to go from the sender to the receiver and then back again. However, the system sends only 1000 bits. We can say that the link utilization is only 1000/20,000, or 5%. For this reason, for a link with high bandwidth or long delay, use of Stop-and-Wait ARQ wastes the capacity of the link.
  • 27. Example 2 What is the utilization percentage of the link in Example 1 if the link uses Go-Back-N ARQ with a 15-frame sequence? Solution The bandwidth-delay product is still 20,000. The system can send up to 15 frames or 15,000 bits during a round trip. This means the utilization is 15,000/20,000, or 75 percent. Of course, if there are damaged frames, the utilization percentage is much less because frames have to be resent.
  • 28. 11.5 HDLC Configurations and Transfer Modes Frames Frame Format Examples Data Transparency
  • 29. 11.15 NRM
  • 30. 11.16 ABM
  • 31. 11.17 HDLC frame
  • 32. 11.18 HDLC frame types
  • 33. 11.19 I-frame
  • 34. 11.20 S-frame control field in HDLC
  • 35. 11.21 U-frame control field in HDLC
  • 36. Table 11.1 U-frame control command and response Request information mode RIM Set initialization mode SIM Reset RSET Exchange ID XID Frame reject FRMR Unnumbered information UI Unnumbered acknowledgment UA Request disconnect RD Disconnect DISC Disconnect mode DM Unnumbered poll UP Set asynchronous balanced mode (extended) SABME Set asynchronous balanced mode SABM Set normal response mode (extended) SNRME Set normal response mode Meaning SNRM Command/response
  • 37. Example 3 Figure 11.22 shows an exchange using piggybacking where is no error. Station A begins the exchange of information with an I-frame numbered 0 followed by another I-frame numbered 1. Station B piggybacks its acknowledgment of both frames onto an I-frame of its own. Station B’s first I-frame is also numbered 0 [N(S) field] and contains a 2 in its N(R) field, acknowledging the receipt of A’s frames 1 and 0 and indicating that it expects frame 2 to arrive next. Station B transmits its second and third I-frames (numbered 1 and 2) before accepting further frames from station A. Its N(R) information, therefore, has not changed: B frames 1 and 2 indicate that station B is still expecting A frame 2 to arrive next.
  • 38. 11.22 Example 3
  • 39. Example 4 In Example 3, suppose frame 1 sent from station B to station A has an error. Station A informs station B to resend frames 1 and 2 (the system is using the Go-Back-N mechanism). Station A sends a reject supervisory frame to announce the error in frame 1. Figure 11.23 shows the exchange.
  • 40. 11.23 Example 4
  • 41. Bit stuffing is the process of adding one extra 0 whenever there are five consecutive 1s in the data so that the receiver does not mistake the data for a flag. Note :
  • 42. 11.24 Bit stuffing and removal
  • 43. 11.25 Bit stuffing in HDLC