Data communication protocols can be asynchronous or synchronous handling respective data formats. Asynchronous protocols are character oriented while synchronous protocols can be either character oriented or bit oriented protocols. Most commonly used Asynchronous character oriented protocol is IBM's asynchronous data link protocol 83B. Most commonly used Synchronous character oriented protocol is IBM's BISYNC which is addressed in this presentation while most common bit oriented portals are SDLC and HDLC which are addressed in next presentation.
Chap 8 The stack and introduction to procedures & Chapter 9 multiplication an...warda aziz
this pdf covers solution to chapter 8 and 9 of assembly language and organization of the IBM PC. if you find any mistakes in my writing , please disccuss with me.
Chap 8 The stack and introduction to procedures & Chapter 9 multiplication an...warda aziz
this pdf covers solution to chapter 8 and 9 of assembly language and organization of the IBM PC. if you find any mistakes in my writing , please disccuss with me.
chapter 7 Logic, shift and rotate instructionswarda aziz
this is a solution to exercise of chapter 7 from Assembly language programming and organization of the IBM PC.
If you find any mistakes in my solution , please discuss with me. as i am also a human and can do mistakes.
Introduction to ibm pc assembly languagewarda aziz
The Solution manual of COAL
Chapter NO 4. exercise
if anyone has Questions Regarding this exercise.
contact me on my given Email-ID.
i will guide you. Thank you!
The 8086 instruction set consists of the following instructions: Data Transfer Instructions move, copy, load, exchange, input, and output. Arithmetic Instructions add, subtract, increment, decrement, convert byte/word and compare. Logical Instructions AND, OR, exclusive OR, shift/rotate and test
instruction set of 8086 microprocessor has following categories:
-Data transfer instructions
-Arithmetic instructions
-Logical instructions
-Flag manipulation instructions
-shift and rotate instructions
-String instructions
-8086 assembler directives
One pass assembler, Two pass assembler,
Advanced Assembler Directives
Index
------
One-pass assembler
Forward Reference
Two-pass assembler using variant-I
Two-pass assembler using variant-II
Advanced Assembler Directives
Design of two pass assembler
The line control unit LCU has several important functions. LCU at primary station serves as an interface between the host computer and the circuit it serves. The LCU directs the flow of input and output data between the different data communications links and their respective applications program. The LCU performs parallel-to-serial and serial-to-parallel conversion of data and transfers to modem serially. LCU also performs error detection and correction apart from inserting and deleting data link control characters.
SDLC is synchronous bit oriented protocol developed by IBM for serial-by-bit information transfer over a data communication channel. Using EBCDIC, data is transferred in frames. Primary station controls data transfer and issues command while secondary station receives command responses to primary.
HDLC is superset of SDLC. Hence, it gives added facilities of extended addressing, CRC-16, extended control field, where 127 frames can be sent together without receiving an acknowledgement. It also allows balance mode of operation analogous to point to point communication...
chapter 7 Logic, shift and rotate instructionswarda aziz
this is a solution to exercise of chapter 7 from Assembly language programming and organization of the IBM PC.
If you find any mistakes in my solution , please discuss with me. as i am also a human and can do mistakes.
Introduction to ibm pc assembly languagewarda aziz
The Solution manual of COAL
Chapter NO 4. exercise
if anyone has Questions Regarding this exercise.
contact me on my given Email-ID.
i will guide you. Thank you!
The 8086 instruction set consists of the following instructions: Data Transfer Instructions move, copy, load, exchange, input, and output. Arithmetic Instructions add, subtract, increment, decrement, convert byte/word and compare. Logical Instructions AND, OR, exclusive OR, shift/rotate and test
instruction set of 8086 microprocessor has following categories:
-Data transfer instructions
-Arithmetic instructions
-Logical instructions
-Flag manipulation instructions
-shift and rotate instructions
-String instructions
-8086 assembler directives
One pass assembler, Two pass assembler,
Advanced Assembler Directives
Index
------
One-pass assembler
Forward Reference
Two-pass assembler using variant-I
Two-pass assembler using variant-II
Advanced Assembler Directives
Design of two pass assembler
The line control unit LCU has several important functions. LCU at primary station serves as an interface between the host computer and the circuit it serves. The LCU directs the flow of input and output data between the different data communications links and their respective applications program. The LCU performs parallel-to-serial and serial-to-parallel conversion of data and transfers to modem serially. LCU also performs error detection and correction apart from inserting and deleting data link control characters.
SDLC is synchronous bit oriented protocol developed by IBM for serial-by-bit information transfer over a data communication channel. Using EBCDIC, data is transferred in frames. Primary station controls data transfer and issues command while secondary station receives command responses to primary.
HDLC is superset of SDLC. Hence, it gives added facilities of extended addressing, CRC-16, extended control field, where 127 frames can be sent together without receiving an acknowledgement. It also allows balance mode of operation analogous to point to point communication...
Advanced Encryption Standard, Multiple Encryption and Triple DES, Block Cipher Modes of
operation, Stream Ciphers and RC4, Confidentiality using Symmetric Encryption, Introduction
to Number Theory: Prime Numbers, Fermat’s and Euler’s Theorems, Testing for Primality, The
Chinese Remainder Theorem, Discrete Logarithms, Public-Key Cryptography and RSA
INTRODUCTION: Fibre optical sensors offer number of distinct advantages which makes them unique for many applications where conventional sensors are difficult or impossible to deploy or can not provide the same wealth of information. They are completely passive, hence can be used in explosive environment. Immunity to electromagnetic interference makes it ideal for microwave environment. They are resistant to high temperatures and chemically reactive environment, ideal for harsh and hostile environment. Small size makes it ideal for embedding and surface mounting. Has high degree of biocompatibility, non-intrusive nature and electromagnetic immunity, ideal for medical applications like intra-aortic balloon pumping. They can monitor a wide range of physical and chemical parameters. It has potential for very high sensitivity, range and resolution. Complete electrical insulation from high electrostatic potential and Remote operation over several km lengths without any lead sensitivity makes it ideal for deployment in boreholes or measurements in hazardous environment. Unique multiplexed and distributed sensors provide measurements at large number of points along single optical cable, ideal for minimising cable deployment and cable weight, monitoring extended structures like pipelines, dams.
Various types of sensors are Point sensors, Integrated Sensors, Quasidistributed multiplexed sensors, Distributed sensors. Examples of such sensors are Fabry-Perot sensors, Single Fibre Bragg Grating sensors, Integrated strain sensor, Intruder Pressure sensor, Strain/Force sensor, Position sensor, Temperature sensor, Deformation sensor etc.
Orthogonal Frequency Division Multiplexing, OFDM uses a large number of narrow sub-carriers for multi-carrier transmission to overcome the effect of multi path fading problem. LTE uses OFDM for the downlink, from base station to terminal to transmit the data over many narrow band careers of 180 KHz each instead of spreading one signal over the complete 5MHz career bandwidth. OFDM meets the LTE requirement for spectrum flexibility and enables cost-efficient solutions for very wide carriers with high peak rates.
The primary advantage of OFDM over single-carrier schemes is its ability to cope with severe channel conditions. Channel equalization is simplified. The low symbol rate makes the use of a guard interval between symbols affordable, making it possible to eliminate inter symbol interference (ISI).
Small cells are Low-powered radio access nodes, Operate in licensed and unlicensed spectrum, Short range mobile phone base stations, Range from very compact residential femto-cells of area 10 meters to larger equipment used inside commercial offices or outdoor public spaces of area 1 or 2 kilometers, "small" compared to a mobile macro cell, with range of a few tens of kilometers, Complements mobile phone service from larger macro cell towers, Offer excellent mobile phone coverage and data speeds at home, in the office and public areas for both voice and data, Developed for both 3G and the newer 4G/LTE radio technologies.
Femto cells are Initially designed for residential and small business use with a short range and a limited number of channels. Femtocell devices use licenced radio spectrum. Femto cells must be operated and controlled by a mobile phone company, One cell with one mobile phone operator. When in range, the mobile phone will detect cell and use it in preference to the larger macrocell sites. Calls are made and received in exactly the same way as macrocell. Except, the signals are sent encrypted from the small cell via the public or private broadband IP network to one of the mobile operators main switching centres.
Light Fidelity (Li-Fi) is a bidirectional, high speed , fully networked wireless communication technology similar to Wi-Fi. Li-Fi was first put forward by Professor Harald Haas,University of Edinburgh, during a TED Talk in 2011. Li-Fi is a form of visible light communication and a subset of optical wireless communications (OWC) and could be a complement to RF communication (Wi-Fi or Cellular network), or even a replacement in contexts of data broadcasting. It is so far measured to be about 100 times faster than some Wi-Fi implementations, reaching speeds of 224 gigabits per second.
Optical Fiber Communication Part 3 Optical Digital ReceiverMadhumita Tamhane
Current generated by photodetector is very weak and is adversely effected by random noises associated with photo detection process. When amplified, this signal further gets corrupted by amplifiers. Noise considerations are thus important in designing optical receivers.
Most meaningful criteria for measuring performance of a digital communication system is average error probability, and in analog system, it is peak signal to rms noise ratio. ...
Optical fiber communication Part 2 Sources and DetectorsMadhumita Tamhane
For optical fiber communication, major light sources are hetero-junction-structured semiconductor laser diode and light emitting diodes. Heterojunction consists of two adjoining semiconductor materials with different bandgap energies. They have adequate power for wide range of applications. Detectors used are PiN diode and Avalanche Photodiode. Being very small in size and feeding to small core optical fiber, it is very important to study emission characteristics of sources and their coupling to fiber. As it can operate for low power over a long distance, received power is very small, hence study of noise characteristics of detectors is very essential...
Optical fiber communication Part 1 Optical Fiber FundamentalsMadhumita Tamhane
Optical fiber systems grew from combination of semiconductor technology, which provided necessary light sources and photodetectors and optical waveguide technology. It has significant inherent advantages over conventional copper systems- low transmission loss, wide BW, light weight and size, immunity to interferences, signal security to name a few. One principle characteristic of optical fiber is its attenuation as a function of wavelength. Hence it is operated in two major low attenuation wavelength windows 800-900nm and 1100-1600nm . Light travels inside optical fiber waveguide on principle of total internal reflection. Fiber is available as single mode and multiple mode, step index and graded index depending on applications and expenditures. Principle of fiber can be understood by ray theory or mode theory. ...
Main constraint for colour TV was compatibility with existing monochrome system. It should produce normal black and white picture on monochrome receiver without any modification on receiver circuitry. Moreover colour receiver must produce a black and white picture if transmission is monochrome.
Hence it should have same - bandwidth, location & spacing of sound and video frequencies, luminance information as a monochromatic signal. Colour information in signal should not effect picture on a monochrome receiver. Other circuit details of colour receiver should be same as that of monochromatic receiver..
Fundamental aim of Television is to extend the sense of sight beyond its natural limits, along with associated sound. It is radio communication of sound along with picture details. The picture signal is amplitude modulated sound signal frequency modulated before transmission. Carrier frequencies are suitably spaced so that combined signal can be radiated through a common antenna. Each broadcasting station can have its own carrier frequency and receiver can be tuned to select desired stations by tuning to respective frequency...
Field of telecommunications has evolved from crudest form of communications to electrical, radio and electro-optical communications. From manual exchange like local battery, central battery exchange, to crossbar switching, director system and to common control systems, telephone communications had started evolving to cater to better and better specifications and needs. Touch tone dial telephone opened a new horizon in the field of end to end signalling. Then came computerised stored program control systems, various multiplexing techniques. With increase in traffic there was a need to study traffic and blocking capabilities....
X.25 is a packet-switched network, developed by ITU-T as an interface between data terminal equipment DTE and data circuit-terminating equipment DCE for terminal operation in packet mode on public data network. It is an end-to-end protocol, but actual movement of packet through the network is invisible to the user.The user sees the network as a cloud through which each packet passes on its way to the receiving DTE.
It defines how a packet-mode terminal can be connected to a packet network for exchange of data. It describes procedures necessary for establishing, maintaining and terminating connections. It uses virtual network approach to packet switching, SVC and PVC and uses asynchronous TDM to multiplex data...
When a device has multiple paths to reach a destination, it always selects one path by preferring it over others. This selection process is termed as Routing. Routing is done by special network devices called routers or it can be done by means of software processes.The software based routers have limited functionality and limited scope.In case there are multiple path existing to reach the same destination, router can make decision based on Hop Count, Bandwidth, Metric, Prefix-length or Delay. Routing decision in networks, are mostly taken on the basis of cost between source and destination. Hop count plays major role here. Shortest path is a technique which uses various algorithms to decide a path with minimum number of hops. Common shortest path algorithms are Dijkstra's algorithm, Bellman Ford algorithm or Floyd algorithm. This presentation simplifies Floyd's algorithm with pictures and example.
A digital signal is a sequence of discrete, discontinuous voltage pulses. Each pulse is a signal element. Binary data '0' and '1' are transmitted over digital channel by encoding each data bit into signal elements. Encoding scheme is mapping from data bits to signal elements. Line coding is done to prevent DC wandering and loss of synchronisation on long strings of '0' and '1'. It may give some amount of error detection as in AMT.
Developed by ITU-T, ISDN is a set of protocols that combines digital telephony and data transport services to digitise the telephone network to permit the transmission of audio, video and text over existing telephone line. ISDN is an effort to standardise subscriber services, provide user or network interface and facilitate the inter-networking capabilities of existing voice and data networks. The goal of ISDN is to form a wide area network that provides universal end-to-end connectivity over digital media by integrating separate transmission services into one without adding new links or subscriber links.
Asynchronous Transfer Mode ATM is the cell relay protocol designed by ATM Forum and adopted by the ITU-T. Cell, a small fixed size block of information with asynchronous TDM ensures high speed real time transmission with efficient and cheaper technology. Instead of user addresses, it uses virtual circuit identifier and virtual path identifier, which can be repeated at unrelated locations. This technology ensures connectivity to much more users than normal packet switching networks.
ATM and ISDN-B combination allows high-speed interconnection of world's network.
An artificial Neural Network (ANN) is an efficient approach for solving a variety of tasks using teaching methods and sample data on the principal of training. With proper training, ANN are capable of generalizing and recognizing similarity among different input patterns.The main problem in using ANN is parameter setting, because there is no definite and explicit method to select optimal parameters of the ANN. There are a number pf parameters that must be decided upon like number of layers, number of neurons per layer, number of training iteration, number of samples etc...
Weight enumerators of block codes and the mc williamsMadhumita Tamhane
Best possible error control codes of a certain rate and block length can be adjudged depending on bounds such that no codes can exist beyond the bounds and codes are sure to exist within the bounds. This presentation gives composition structure of Block codes and the probability of decoding error and of decoding failure.Mac William's Identities is relationship between weight distribution of a linear code and weight distribution of its dual code, which hold for any linear code and are based on vector space structure of linear codes and on the fact that dual code of a code is the orthogonal compliment of the code...
Justesen codes are created by tilting (n,k) Reed Solomon codes over GF(2^m) into (mn,mk) binary codes for multiple burst error correction. They are very good for long block lengths. Alternant codes are variation of BCH codes with fixed rate and large minimum distance.They are subfield-subcode of a Reed-Solomon codes over GF(q^m).Goppa codes are designed distance d have additional property over Alternant codes that inverse frequency template has width d...
Viterbi decoding algorithm is a complete decoding algorithm with zero probability of decoding failure, but larger probability of decoding error than an incomplete decoder. It is practical for binary codes of small constraint length. Stack algorithm reduces computational work by keeping track of paths it has already traversed...
Bch and reed solomon codes generation in frequency domainMadhumita Tamhane
Digital signal processing is permeated with application of Fourier Transforms. When time variable is continuous, study of real-valued or complex valued signals rely heavily on Fourier transforms. Fourier Transforms also exist on the vector space of n-tuples over the Galois field GF(q) for many values of n, i.e. code-words. Cyclic codes can be defined as codes whose code-words have certain specific spectral components equal to zero. Conjugacy constraints provide an analogous condition for a finite field. BCH and Reed Solomon codes can be easily generated in frequency domain based on conjugacy constraints.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
2. DATA COMMUNICATION PROTOCOLS in Centralised Networks
(in Master/slave environment)
✓Set of rules governing orderly exchange of information.
✓LCU controls the flow of data between application programs and
remote terminal.
✓Set of rules LCU follows are called Data Link Protocols.
✓Polling: An invitation from primary to secondary to transmit
message.
✓ A secondary can not poll a primary.
✓Selection: When primary has a data to send to a secondary, it
identifies the secondary by ‘selecting’ it.
✓ It is interrogation of secondary to determine its status
✓ - whether ready to receive a message or not.
✓ Secondary can not select a primary.
✓Secondary transmits to primary only, while primary transmits to
all.
3. Asynchronous Protocols
✓Use asynchronous data format and asynchronous modems.
✓Character oriented protocols.
✓Like ‘end of transmission (EOT)’ and ‘start of text (STX).
✓Character occurring anywhere can not be anything but mean the
action designated to them.
✓ e.g. 04H (EOT) if received by secondary , it clears all operations
and comes into line-monitor mode.
✓Data link characters must never occur in data.
✓Secondary station limited to single terminal/printer pair.
✓Commonly used protocols are:
✓ Bell System’s SELECTIVE CALLING SYSTEM(8A1/8B1).
✓ IBM’s ASYNCHRONOUS DATA LINK PROTOCOLS(83B).
4. Asynchronous Protocols
✓Polling Sequence:
!
!
!
✓3 character sequence.
✓EOT-
✓ a clearing character, clears all actions of secondary.
✓ Precedes all polling sequences.
✓ Brings all secondaries in line monitor mode.
✓DC3 –
✓ Indicates that next character is the polling address of station.
!
✓A , the polled secondary, must respond now.
E
O
T
D
C
3
A ASCII Codes
EOT – End of transmission – 00000100 – 04H
DC3 – Device control 3 -- 00010011 - 13H
5. Acknowledgement sequences to Polling
✓ 1.
!
✓ No message to transmit but ready to receive.
!
!
✓2.
!
✓ No message to transmit, not ready to receive either.
!
!
✓3. Formatted data sent
A
C
K
6. Asynchronous Protocols
✓Selection Sequence:
!
!
!
✓2 character sequence.
✓EOT-
✓ A clearing character, clears all actions of secondary.
✓ Precedes all selection sequences.
✓ Brings all secondaries in line monitor mode.
✓X , the selected secondary, must respond now.
E
O
T
X
7. Acknowledgement sequences to Selection
✓ 1.Ready to receive.
!
!
!
✓ 2.Not ready to receive. Terminal in local or printer mode
!
!
!
✓ 3. Not ready to receive but has a formatted data to transmit.
A
C
K
* *
8. Message format
!
!
!
✓SOH is start of header.
✓Header can include special data e.g. date, time, message number,
message priority till STX is received.
✓STX is start of text.
✓ It terminates header and starts data.
✓STX blinds other stations to the data. Only EOT can bring them to line
monitor mode.
S
O
H
Heading
S
T
X
Message
E
O
T
Message format-
9. Acknowledgement to message
A
C
K
1. Acknowledged.
No error--
N
A
K
2. Not Acknowledged.
Message has error
C
A
N
3. Cancel or abort
transmission
10. Asynchronous Protocols – TYPES
XMODEM
✓By Ward Christiansen in 1979.
✓FTP for telephone line communication between PC’s.
✓Half Duplex.
✓Stop/wait ARQ.
✓Message divided into characters.
✓Each character contains start bit and stop bits.
✓CRC for data only.
✓CAN sent to abort transmission.
SOH CRC
Header 128 bytes data
Start bit Stop bit
11. Asynchronous Protocols – TYPES
YMODEM
✓Same as XMODEM except…
✓Data 1024 bytes.
✓2 CAN sent to abort transmission.
✓2 Bytes CRC-16.
✓Multiple frames can be sent simultaneously.
!
!
!
✓Exercise: Find details for other asynchronous modems and
submit.
12. Synchronous Protocols
!
!
✓Use synchronous data format and synchronous modems.
✓Can be Character oriented protocol or Bit oriented protocol.
✓ Secondary station LCU can serve up to 50 terminal/printer pair.
✓Commonly used protocols are:
✓Character oriented protocol –
✓ e.g. IBM’s 3270 Binary Synchronous Communication
Protocol(BSC or Bisync).
✓Bit oriented protocol –
✓ e.g. IBM’s Synchronous Data Link Communication
Protocol(SDLC).
13. IBM’s Bisync Protocol (BSC)
!
!
✓Point to point or multipoint.
✓Half duplex mode using stop and wait ARQ and flow
control.
✓Does not support full duplex mode or sliding window
protocol.
✓Bisync because sync characters are sent in pair.
14. IBM’s Bisync Protocol (BSC)
!
!
!
!
!
✓PAD in beginning is called leading pad.
✓PAD can be 55H(01010101) or AAH(10101010).
✓Used for CLK recovery at receiver for bit synchronization.
!
✓2 SYNC characters required for CLK recovery at receiver
for character synchronization.
✓SYNC can be 16H in ASCII ( 00010110)
OR 32H in EBCDIC repeated twice.
P
A
D
S
Y
N
S
P
A
S
P
A
S
Y
N
E
O
T
P
A
D
S
Y
N
S
Y
N
P
A
D
E
N
Q
“ “
General
Polling
Sequence
15. IBM’s Bisync Protocol (BSC)
!
!
!
!
!
✓EOT, a clearing character, brings all secondaries to line
monitor mode.
!
✓PAD is all 1’s string, gives enough time to secondaries to
clear their assignments and come to line monitor mode.
!
✓2 SYNC characters available further to synchronize if PAD
disturbs synchronization.
P
A
D
S
Y
N
S
P
A
S
P
A
S
Y
N
E
O
T
P
A
D
S
Y
N
S
Y
N
P
A
D
E
N
Q
“ “
General
Polling
Sequence
16. IBM’s Bisync Protocol (BSC)
!
!
!
!
!
✓SPA will hold secondary station’s polling address in ASCII.
✓Transmitted twice to avoid any spurious sequence
initiating a poll.
✓Each secondary has unique SPA.
✓ “ is used as it is twice to indicate that it is a general poll.
✓Any device connected to secondary can transmit the data.
(keyboard, Scanner etc.)
✓If more than one ready, secondary’s LCU decides the
transmitter.
P
A
D
S
Y
N
S
P
A
S
P
A
S
Y
N
E
O
T
P
A
D
S
Y
N
S
Y
N
P
A
D
E
N
Q
“ “
General
Polling
Sequence
17. IBM’s Bisync Protocol (BSC)
!
!
!
!
!
✓ENQ – request for response – format line turn around
character is an enquiry character.
✓Ending polling sequence, primary now wants a response.
✓H/D transmission.
✓ PAD at end is trailing pad.
✓7FH or DEL character.
✓Ensures that RLSD is kept active long enough for the DTE
to receive all character correctly from DCE.
✓Low RLSD will eliminate carrier and RD pin will be inactive.
P
A
D
S
Y
N
S
P
A
S
P
A
S
Y
N
E
O
T
P
A
D
S
Y
N
S
Y
N
P
A
D
E
N
Q
“ “
General
Polling
Sequence
18. IBM’s Bisync Protocol (BSC)
!
!
!
!
!
✓It is not general poll, hence “ is not used.
✓A specific device with address mentioned in field DA ,
under station with address mentioned under SPA, is
polled.
P
A
D
S
Y
N
S
P
A
S
P
A
S
Y
N
E
O
T
P
A
D
S
Y
N
S
Y
N
P
A
D
E
N
Q
D
A
D
A
Specific
Polling
Sequence
19. IBM’s Bisync Protocol (BSC)
!
!
!
!
✓Station polling address is replaced by station selection
address.
✓Selection is always specific.
✓It is for the station to divert the incoming data to
appropriate device.
P
A
D
S
Y
N
S
S
A
S
S
A
S
Y
N
E
O
T
P
A
D
S
Y
N
S
Y
N
P
A
D
E
N
Q
D
A
!
D
A
Selection
Sequence
20. IBM’s Bisync Protocol (BSC) Acknowledgement to
polling!
!
!
!
!
✓Handshake is negative acknowledgement to polling.
✓It has no formatted data to transmit.
P
A
D
S
Y
N
S
Y
N
E
O
T
P
A
D
1. Handshake
21. IBM’s Bisync Protocol (BSC) Acknowledgement to
polling
!
!
!
!
!
✓Data 128 bytes minimum.
✓BCC is block check sequence.
✓1 byte LRC for ASCII or 2 bytes CRC for EBCDIC.
✓BCC is done between SOH and ETX, excluding the two.
P
A
D
S
Y
N
S
Y
N
S
O
H
header
2. Formatted Message
S
T
X
Data
P
A
D
B
C
C
E
T
X
22. IBM’s Bisync Protocol (BSC) Acknowledgement to
polling
!
!
!
!
!
!
!
✓ Message can be broken into Multiple blocks and accommodated in
one frame.
✓ ITB - intermediate text block.
✓ BCC done on smaller blocks is always preferred.
✓ Finally frame will be terminated by ETX.
Multi-block frame
P
A
D
S
Y
N
S
Y
N
S
O
H
header
S
T
X
Data
S
T
X
B
C
C
I
T
B
Data
P
A
D
B
C
C
E
T
X
23. IBM’s Bisync Protocol (BSC) Acknowledgement to
polling
!
!
!
!
!
!
!
!
✓If message too long to accommodate in one frame.
✓Multiple frames transmitted.
✓All frames except last, will be terminated in ETB.( More to come)
✓Last frame terminated in ETX.(End of message)
Multi-frame block
P
A
D
S
Y
N
S
Y
N
S
O
H
header
S
T
X
Data
S
T
X
B
C
C
I
T
B
Data
P
A
D
B
C
C
E
T
B
P
A
D
S
Y
N
S
Y
N
S
O
H
header
S
T
X
Data
S
T
X
B
C
C
I
T
B
Data
P
A
D
B
C
C
E
T
X
ACK
More frames and ACK…
24. IBM’s Bisync Protocol (BSC) Acknowledgement to
selection
!
!
!
!
!
!
✓ Ready to receive first frame using ACK0.
✓ DLE is data link escape character.
✓ DLE 0 will be taken as number 0.
✓ ASCII for ACK0 is DLE and 0
P
A
D
S
Y
N
S
Y
N
D
L
E
0
1. Positive
acknowledgement
P
A
D
25. IBM’s Bisync Protocol (BSC) Acknowledgement to
selection
✓
2.Negative acknowledgement- not ready to
receive
P
A
D
S
Y
N
S
Y
N
N
A
K
P
A
D
P
A
D
S
Y
N
S
Y
N
D
L
E
3.Reverse Interrupt (RVI) – Not ready to receive,
but has urgent message to transmit.
<
P
A
D
26. IBM’s Bisync Protocol (BSC) Acknowledgement to
DATA
!
!
!
!
!
!
!
!
!
!
✓Stop and wait error control.
✓DLE0 for all even frame correct reception.
✓DLE 1 for all odd frames correct reception.
1.Positive acknowledgement- No error
P
A
D
S
Y
N
S
Y
N
D
L
E
0
P
A
D
P
A
D
S
Y
N
S
Y
N
D
L
E
1
P
A
D
or
2. Negative acknowledgement- Error
P
A
D
S
Y
N
S
Y
N
N
A
K
P
A
D
27. IBM’s Bisync Protocol (BSC) Some more on BISYNC
1.Point to point
connection asked
S
Y
N
S
Y
N
E
N
Q
2.Wait and ACK- ACK but not
ready to receive more.
S
Y
N
S
Y
N
W
A
C
K
3.Temporary delay S
Y
N
S
Y
N
T
T
D
4.Connection
termination
S
Y
N
S
Y
N
E
O
T
28. TRANSPARENCY
✓LCU look-alike characters appearing in data force the LCU to go
into control mode.
✓Data 03H appearing in data block will be taken as ETX and block will
be terminated at receiver.
✓LCU is made transparent to data by DLE(Data link escape).
✓LCU will not search for data link control characters in the block of
data encapsulated by 2 DLE’s.
✓DLE STX places LCU in transparent mode.
✓DLE ETX, DLE ITB, and DLE ETB brings LCU out of transparent
mode.
✓DLE DLE if ASCII of DLE appears in data.
✓DLE SYN used only with transparent messages more than 1second
long. Two SYN characters to ensure character synchronization at
receiver.