The data link layer, or layer 2, is the second layer of the seven-layer OSI model of computer networking. This layer is the protocol layer that transfers data between adjacent network nodes in a wide area network (WAN) or between nodes on the same local area network (LAN) segment.
Carrier-sense multiple access with collision detection (CSMA/CD) is a media access control method used most notably in early Ethernet technology for local area networking.Carrier-sense multiple access with collision detection is a media access control method used most notably in early Ethernet technology for local area networking. It uses carrier-sensing to defer transmissions until no other stations are transmitting.
The data link layer, or layer 2, is the second layer of the seven-layer OSI model of computer networking. This layer is the protocol layer that transfers data between adjacent network nodes in a wide area network (WAN) or between nodes on the same local area network (LAN) segment.
Carrier-sense multiple access with collision detection (CSMA/CD) is a media access control method used most notably in early Ethernet technology for local area networking.Carrier-sense multiple access with collision detection is a media access control method used most notably in early Ethernet technology for local area networking. It uses carrier-sensing to defer transmissions until no other stations are transmitting.
TCP/IP have 5 layers, whereas OSI model have 7 layers in its Model. TCP/IP is known for the secured connection and comunication. I have explained all functions and definitions of layers in TCP/IP Model
In this we discuss about DATA RATE LIMITS
Two theoretical formulas were developed to calculate the data rate:
Nyquist bit rate for a noiseless channel
BitRate = 2 * bandwidth * log 2 L
2: Shannon Capacity for a noisy channel
Capacity = bandwidth * log 2 (1 + SNR)
...............
PERFORMANCE (Network PERFORMANCE) :
Bandwidth: ( Bandwidth in Hertz and Bandwidth in Bits per Seconds) :
Throughput:
These above topics covered in this slide
Thanks You!
In block coding, we divide our message into blocks, each of k bits, called datawords. We add r redundant bits to each block to make the length n = k + r. The resulting n-bit blocks are called codewords.
Parity checking, Cyclic redundancy checking (CRC) and Hamming codes are some error detection techniques that I discussed here.
UNIT II MEDIA ACCESS & INTERNETWORKING 9
Media access control – Ethernet (802.3) – Wireless LANs – 802.11 – Bluetooth – Switching and bridging – Basic Internetworking (IP, CIDR, ARP, DHCP,ICMP )
TCP/IP have 5 layers, whereas OSI model have 7 layers in its Model. TCP/IP is known for the secured connection and comunication. I have explained all functions and definitions of layers in TCP/IP Model
In this we discuss about DATA RATE LIMITS
Two theoretical formulas were developed to calculate the data rate:
Nyquist bit rate for a noiseless channel
BitRate = 2 * bandwidth * log 2 L
2: Shannon Capacity for a noisy channel
Capacity = bandwidth * log 2 (1 + SNR)
...............
PERFORMANCE (Network PERFORMANCE) :
Bandwidth: ( Bandwidth in Hertz and Bandwidth in Bits per Seconds) :
Throughput:
These above topics covered in this slide
Thanks You!
In block coding, we divide our message into blocks, each of k bits, called datawords. We add r redundant bits to each block to make the length n = k + r. The resulting n-bit blocks are called codewords.
Parity checking, Cyclic redundancy checking (CRC) and Hamming codes are some error detection techniques that I discussed here.
UNIT II MEDIA ACCESS & INTERNETWORKING 9
Media access control – Ethernet (802.3) – Wireless LANs – 802.11 – Bluetooth – Switching and bridging – Basic Internetworking (IP, CIDR, ARP, DHCP,ICMP )
Binary addition, Binary subtraction, Negative number representation, Subtraction using 1’s complement and 2’s complement, Binary multiplication and division, Arithmetic in octal, hexadecimal number system, BCD and Excess – 3 arithmetic
INTERNET PROTOCOL (IP)
, Datagram Format
, Fragmentation
, Options
, Security of IPv4 Datagrams
,ICMPv4
, MESSAGES
, Debugging Tools
, ICMP Checksum
, MOBILE IP
, Addressing
, Agents
, Three Phases
, Inefficiency in Mobile IP
Numbering system, binary number system, octal number system, decimal number system, hexadecimal number system.
Code conversion, Conversion from one number system to another, floating point numbers
Introduction to the Data Link Layer, Types of errors, redundancy and coding. Block coding, Error detection, error correction. Linear block codes. Cyclic codes(CRC), Checksum method.
Theory building, What Is a Theory? , What Are the Goals of Theory?, Research Concepts, Constructs, Propositions, Variables, and Hypotheses, Research Concepts and Constructs, Research Propositions and Hypotheses, Understanding Theory, Verifying Theory, Theory Building, The Scientific Method
Information Systems and Knowledge ManagementMeenakshi Paul
Information Systems and Knowledge
Management, Information, data and Intelligence, The Characteristics of Valuable Information, Relevance, Quality, Timeliness, Completeness, Knowledge Management, Global Information Systems, Decision Support Systems, Databases and Data Warehousing, Input Management, Computerized Data Archives Networks and Electronic Data Interchange, The Internet and Research
The Role of Business Research, The Nature of Business Research, Business Research Defined, Applied and Basic Business Research , The Scientific method, Managerial Value of business Research, Identifying Problems or Opportunities, Diagnosing and Assessing Problems or Opportunities, Selecting and Implementing a Course of Action, Evaluating the Course of Action, When Is Business Research Needed?, Time Constraints, Availability of Data, Nature of the Decision, Benefits versus Costs, Business Research in the Twenty-First Century, Communication Technologies, Global Business Research
Analog Transmission, data communication
Digital-to-analog conversion, analog-to-analog conversion, Digital to Digital conversion, Analog to Digital Conversion, Amplitude Shift Keying , Frequency Shift Keying, Phase Shift Keying,Quadrature Amplitude Modulation, Amplitude Modulation (AM), Frequency Modulation (FM), Phase Modulation (PM)
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
2. OUTLINE
11.1 DLC SERVICES
11.1.1 Framing
11.1.2 Flow and Error Control
11.1.3 Connectionless and Connection-Oriented
11.2 DATA-LINK LAYER PROTOCOLS
11.2.1 Simple Protocol
11.2.2 Stop-and-Wait Protocol
11.2.3 Piggybacking
11.3 HDLC
11.3.1 Configurations and Transfer Modes
11.3.2 Framing
11.4 POINT-TO-POINT PROTOCOL (PPP)
11.4.1 Services
11.4.2 Framing
2
3. 11.1 DLC SERVICES
The data-link layer is divided into two sub-layers
Logical Link Control (LLC)/DLC
Media Access Control (MAC)
The LLC sub-layer handles error control, flow
control, framing, and MAC sub-layer addressing.
The MAC sub-layer is the lower of the two sub-
layers of the Data Link Layer.
MAC handles access to shared media, such as
Token passing or Ethernet. 3
4. 11.1.1 FRAMING
It is process of wrapping data with certain info before
sending out.
Frame size can be variable or fixed.
In fixed-size framing, there is no need of delimiter.
In variable-size framing, there is need of delimiter.
This can be done using two approaches
Character-Oriented Approach
Bit-Oriented Approach
4
5. 11.1.1 FRAMING
CONTD..
Character-Oriented Framing(or Byte-Oriented):
In COF framing, data carried 8-bit characters from a coding system
such as ASCII.
A frame typically consists of
Data from the upper layer
Flag: indication for start and end of a frame, composed of special
characters (1-byte)
Header: source/destination addresses, as well as other control
information
Trailer: error detection/correction code
5
6. BYTE STUFFING
Process of adding extra byte whenever there is an
escape or a flag character in the data
6
7. BIT-ORIENTED FRAMING
In bit-oriented framing, data is transmitted as a
sequence of bits that can be interpreted in the upper
layers.
Need a delimiter to separate one frame from the other.
Each frame begins and ends with special bit pattern
called flag byte (01111110).
7
8. BIT STUFFING
Process of adding extra bit to ensure flag sequence does not appear in the
data.
When sender’s DLL finds 5 consecutive 1’s in data stream, stuffs 0.
When receiver sees 5 1’s followed by 0, de-stuffs.
8
01111110
9. BYTE VS. BIT ORIENTED
Framing in byte-oriented protocols
Framing in bit-oriented protocols
9
10. FLOW CONTROL AND ERROR
CONTROL
Flow control
It is the process of managing the rate of data transmission
It prevent a fast sender from overwhelming a slow
receiver.
Error control
It is the process of detecting and correcting data frames that
have been corrupted or lost during transmission.
Retransmission of frames whenever error is detected or
frame is lost.
Allows receiver to inform sender of lost or duplicate frames
10
11. 11.1.3 CONNECTIONLESS AND CONNECTION-
ORIENTED
A DLC protocol can be either connectionless
or connection-oriented.
Connectionless Protocol
No connection is established between two nodes.
Each frame is independent.
There is no connection between frames.
Frames are not numbered
Connection-Oriented Protocol
A logical connection must be established between the two nodes( setup,
data transfer and teardown)
The frames are numbered and sent in order
11
12. 11.2 DATA-LINK LAYER PROTOCOLS
Data link layer have four protocols
Simple,
Stop-and-Wait,
Go-Back-N, and
Selective-Repeat that deal with flow and error control
First two protocols still are used at the data-link
layer
12
13. 11.2.1 SIMPLE PROTOCOL
A simple protocol with neither flow nor error control.
We assume that the receiver can immediately handle any frame it receives.
The receiver can never be overwhelmed with incoming frames.
The DLL sender gets a packet from its network layer, makes a frame out of it, and
sends the frame.
The DLL at the receiver receives a frame from the link, extracts the packet from the
frame, and delivers the packet to its network layer.
The data-link layers of the sender and receiver provide transmission services for their
network layers.
13
14. FLOW DIAGRAM SIMPLE PROTOCOL
It is very simple.
The sender sends frames one after another without even
thinking about the receiver.
14
15. 11.2.2 STOP-AND-WAIT
PROTOCOL
It uses both flow and error control.
The sender will send one frame at a time.
The sender will stop and wait for the acknowledgment (ACK) from the
receiver.
After receiving ACK sender send the next packet to receiver.
Receiver responds with an ACK when it successfully receives a frame
Both Data and ACK frames must be numbered
When sender does not receive an ack within certain time, it assumes
frame is lost, then retransmits the same frame.
15
17. 11.2.3 PIGGYBACKING
Piggybacking is the process of converting two
way process to one way process.
In this sender send both (Data+ACK) to the
receiver.
Data and acknowledgement are send in a single
frame is called Piggybacking.
Piggybacking saves bandwidth.
17
19. 11.3 HDLC
High-level Data Link Control
Bit-oriented protocol
Support both
Point-to-point links
Multipoint links
It implements the Stop-and-Wait protocol
HDLC provides two common transfer modes
Normal Response Mode (NRM)
Asynchronous Balanced Mode (ABM)
19
20. NORMAL RESPONSE MODE
(NRM)
In NRM, the configuration is unbalanced.
Have one primary station and multiple secondary stations.
A primary station can send commands; a secondary station can only
respond.
Used in both point-to-point and multi-point link
20
21. ASYNCHRONOUS BALANCE MODE (ABM)
In ABM, the configuration is balanced
Supports only point-to-point links
Each station is both primary and secondary
21
22. 11.3.2 HDLC FRAMES
HDLC defines three types of frames:
Information frames (I-frames)
Supervisory frames (S-frames)
Unnumbered frames (U-frames)
I-frames are used to data-link user data and control information relating to user data
(piggybacking).
S-frames are used only to transport control information.
U-frames are reserved for system management. Information carried by U-frames is
intended for managing the link itself. 22
23. 11.3.2 HDLC FRAMES
HDLC frame may contain up to six fields
A beginning flag field, an address field, a control field, an information field, a
frame check sequence (FCS) field, and an ending flag field.
Information frame (I-frame)
Supervisory frame (S-frame)
Unnumbered frame (U-frame)
23
Frame Check Sequence
(error detection code)
24. 11.3.2 HDLC FRAMES
Flag field.
This field contains synchronization pattern 01111110, which identifies both the beginning and the end of
a frame.
Address field.
This field contains the address of the secondary station.
If a primary station created the frame, it contains a to address.
If a secondary station creates the frame, it contains a from address.
The address field can be one byte or several bytes long, depending on the needs of the network.
Control field.
The control field is one or two bytes used for flow and error control.
Information field.
The information field contains the user’s data from the network layer or management information.
Its length can vary from one network to another.
FCS field.
The frame check sequence (FCS) is the HDLC error detection field.
It can contain either a 2- or 4-byte CRC.
24
25. CONTROL FIELD FOR I-FRAMES
I-frames carry user data from the network layer
Can carry flow- and error-control information (piggybacking)
0, 1 bit, means the frame is an I-frame
N(S), 3 bits, define the sequence number (0 to 7) of the frame
N(R), 3 bits, acknowledgment number when piggybacking is used
P/F field is a single bit with a dual purpose
when it is set (bit = 1) and can mean poll or final
poll when the frame is sent by a primary station to a secondary
final when the frame is sent by a secondary to a primary
25
26. CONTROL FIELD FOR S-FRAMES
Receive ready (RR).
00 is code
This kind of frame acknowledges the receipt of a safe and sound frame or group of
frames.
N(R) field defines the acknowledgment number.
Receive not ready (RNR).
10 is code, It gives acknowledgment of frames
It also announces that the receiver is busy and cannot receive more frames ask
sender to slow down.
Reject (REJ).
01 is code, this is a NAK frame which can be used in Go-Back-N-ARQ
Selective reject (SREJ).
11 is code, This Nak is used in Selective Repeat ARQ
26
27. CONTROL FIELD FOR U-FRAMES
Unnumbered frames are used to exchange session management
and control information
Do not contain N(S) or N(R) in control field.
U-frame contains two code fields, one two bit and other three bit.
These five bits can create upto 32 different U-frames.
Purpose of P/F bit is same
27
29. 11.4 POINT-TO-POINT PROTOCOL (PPP)
Point-to-Point Protocol
Byte-oriented protocol
Most common protocol for point-to-point access
Dial-up access
ADSL (Asymmetric Digital Subscriber Line)
29
30. 11.4.1 SERVICES PROVIDED BY PPP
Defining the frame format of the data to be transmitted.
Defining the procedure of establishing link between two points and
exchange of data.
Stating the method of encapsulation of network layer data in the frame.
Stating authentication rules of the communicating devices.
Providing address for network communication.
Providing connections over multiple links.
Supporting a variety of network layer protocols by providing a range os
services.
30
31. 11.4.1 SERVICES NOT PROVIDED BY PPP
PPP does not provide flow control
A sender send frames one after another without concern of receiver.
PPP has a very simple mechanism for error control.
A CRC field is used to detect errors.
If the frame is corrupted, it is silently discarded; the upper-layer protocol needs to
take care of the problem.
Lack of error control and sequence numbering may cause a packet to be received
out of order.
PPP does not provide a sophisticated addressing mechanism to handle frames in
a multipoint configuration.
31
32. 11.4.2 PPP FRAME FORMAT
The fields of a PPP frame are −
Flag − 1 byte that marks the beginning and the end of the frame. The bit pattern of the flag is 01111110.
Address − 1 byte which is set to 11111111 in case of broadcast.
Control − 1 byte set to a constant value of 11000000.
Protocol − 1 or 2 bytes that define the type of data contained in the payload field.
Payload − This carries the data from the network layer. The maximum length of the payload field is 1500
bytes. However, this may be negotiated between the endpoints of communication.
FCS − It is a 2 byte or 4 bytes frame check sequence for error detection. The standard code used is CRC
(cyclic redundancy code)
32