The data link layer is responsible for node-to-node communication and transforming the physical layer into a reliable link. It handles framing, addressing, error control, flow control, and media access. The data link layer provides services like unacknowledged connectionless, acknowledged connectionless, and acknowledged connection-oriented to the network layer. Framing groups the physical layer bit stream into discrete frames using techniques like character counting, flag bytes with stuffing, or encoding violations.
The sender initializes the checksum to 0 and adds all data items and the checksum. However, 36 cannot be expressed in 4 bits. The extra two bits are wrapped and added with the sum to create the wrapped sum value 6. The sum is then complemented, resulting in the checksum value 9 (15 − 6 = 9).
The sender initializes the checksum to 0 and adds all data items and the checksum. However, 36 cannot be expressed in 4 bits. The extra two bits are wrapped and added with the sum to create the wrapped sum value 6. The sum is then complemented, resulting in the checksum value 9 (15 − 6 = 9).
TRANSPORT LAYER OF OSI MODEL
WHAT IS OSI MODEL?
LAYERS OF OSI MODEL
Data format of “OSI” Layers
Benefits of the OSI Model
WHAT IS TRANSPORT LAYER?
WORKING OF TRANSPORT LAYER
SERVICES BY TRANSPORT LAYER
Protocols of transport layer
USER DATAGRAM PROTOCOL (UDP)
TRANSMISSION CONTROL PROTOCOL(TCP)
Sliding window Control or 3-Way Handshake
Functions of TCP
The data link layer, or layer 2, is the second layer of the seven-layer OSI model of computer networking. This layer is the protocol layer that transfers data between adjacent network nodes in a wide area network (WAN) or between nodes on the same local area network (LAN) segment.
It consists of switches & their structures.
Space Division Switch, Time Division switch, Time Space Time Division switch, Cross Bar Switch, Multistage switch, Banyan switch, Batcher BAnyan Switch etc.
TRANSPORT LAYER OF OSI MODEL
WHAT IS OSI MODEL?
LAYERS OF OSI MODEL
Data format of “OSI” Layers
Benefits of the OSI Model
WHAT IS TRANSPORT LAYER?
WORKING OF TRANSPORT LAYER
SERVICES BY TRANSPORT LAYER
Protocols of transport layer
USER DATAGRAM PROTOCOL (UDP)
TRANSMISSION CONTROL PROTOCOL(TCP)
Sliding window Control or 3-Way Handshake
Functions of TCP
The data link layer, or layer 2, is the second layer of the seven-layer OSI model of computer networking. This layer is the protocol layer that transfers data between adjacent network nodes in a wide area network (WAN) or between nodes on the same local area network (LAN) segment.
It consists of switches & their structures.
Space Division Switch, Time Division switch, Time Space Time Division switch, Cross Bar Switch, Multistage switch, Banyan switch, Batcher BAnyan Switch etc.
Data Link Layer
The main goal of this layer is providing reliability to the layers above it.
3.1 DLL Design Issues
What are the services provided by DLL?
3.2 Error Detection and Correction
Adding redundancy in order to find and correct errors.
3.3 DLL Protocols
xxx
3.4 Sliding Window Protocols
xxx
3.5 Protocol Specification and Verification
xxx.
3.6 Examples
Data Link Layer, Error correction and detection like LRC, VRC, CRC, checksum and Hamming coding, Data link protocols, stop and wait ARQ, sliding window ARQ, Petrinet models, HDLC, etc
Frame relay is a packet-switching telecommunication service designed for cost-efficient data transmission for intermittent traffic between local area networks (LANs) and between endpoints in wide area networks (WANs).
Protocol layer
OSI model description details
post office protocol version 3 (pop3)
these three topics are describe in this slide.
this slide made by zakirul islam.
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
2. OVERVIEW OF DLL
• The data link layer transforms the physical
layer, a raw transmission facility, to a link
responsible for node-to-node (hop-to-hop)
communication.
• Specific responsibilities of the data link layer
include framing, addressing, flow control,error
control, and media access control.
3.
4. DLL DESIGN ISSUES
1) Services Provided to the Network Layer:
• The network layer wants to be able to send packets to its neighbors without
worrying about the details of getting it there in one piece.
2) Framing:
• Group the physical layer bit stream into units called frames. Frames are
nothing more than "packets" or "messages". By convention, we use the
term "frames" when discussing DLL.
3) Error Control:
• Sender checksums the frame and transmits checksum together with
data. Receiver re-computes the checksum and compares it with the
received value.
4) Flow Control:
• Prevent a fast sender from overwhelming a slower receiver.
5. DATA LINK LAYER DESIGN ISSUES
• Providing a well-defined service interface to
the network layer.
• Dealing with transmission errors.
• Regulating the flow of data so that slow
receivers are not swamped by fast senders.
6. • For this, the data link layer takes the packets it gets from the
network layer and encapsulates them into frames for
transmission.
• Each frame contains a frame header, a payload field for
holding the packet, and a frame trailer.
7. SERVICES PROVIDED TO THE
NETWORK LAYER
• The function of the data link layer is to provide services to the
network layer.
• The principal service is transferring data from the network layer
on the source machine to the network layer on the destination
machine.
• The data link layer can be designed to offer various services.
• The actual services offered can vary from system to system.
• Three reasonable possibilities that are commonly provided are
• 1) Unacknowledged Connectionless service
• 2) Acknowledged Connectionless service
• 3) Acknowledged Connection-Oriented service
8. UNACKNOWLEDGED CONNECTIONLESS
SERVICE
• Unacknowledged connectionless service consists of having
the source machine send independent frames to the
destination machine without having the destination machine
acknowledge them.
• No logical connection is established beforehand or released
afterward. If a frame is lost due to noise on the line, no
attempt is made to detect the loss or recover from it in the
data link layer.
• This class of service is appropriate when the error rate is very
low so that recovery is left to higher layers. It is also
appropriate for realtime traffic, such as voice, in which late
data are worse than bad data.
Most LANs use unacknowledged connectionless service in the
data link layer.
9. ACKNOWLEDGED CONNECTIONLESS SERVICE
• When this service is offered, there are still no logical connections
used, but each frame sent is individually acknowledged.
• In this way, the sender knows whether a frame has arrived correctly.
• If it has not arrived within a specified time interval, it can be sent
again. This service is useful over unreliable channels, such as wireless
systems.
• Adding Ack in the DLL rather than in the Network Layer is just an
optimization and not a requirement. If individual frames are
acknowledged and retransmitted, entire packets get through much
faster.
• On reliable channels, such as fiber, the overhead of a heavyweight
data link protocol may be unnecessary, but on wireless channels,
with their inherent unreliability, it is well worth the cost.
10. ACKNOWLEDGED CONNECTION-ORIENTED SERVICE
• Here, the source and destination machines establish a connection before
any data are transferred. Each frame sent over the connection is numbered,
and the data link layer guarantees that each frame sent is indeed received.
• Furthermore, it guarantees that each frame is received exactly once and that
all frames are received in the right order.
• When connection-oriented service is used, transfers go through three
distinct phases.
• In the first phase, the connection is established by having both sides
initialize variables and counters needed to keep track of which frames have
been received and which ones have not.
• In the second phase, one or more frames are actually transmitted.
• In the third and final phase, the connection is released, freeing up the
variables, buffers, and other resources used to maintain the connection.
12. • FRAMING:
• DLL translates the physical layer's raw bit stream into
discrete units (messages) called frames.
• How can frame be transmitted so the receiver can detect
frame boundaries? That is, how can the receiver
recognize the start and end of a frame?
• Types of Framing:
• Character Count
• Flag byte with Byte Stuffing
• Starting and ending flag with bite stuffing
• Encoding Violations.
13.
14. FRAMING – CHARACTER COUNT
• The first framing method uses a field in the
header to specify the number of characters in
the frame.
• When the data link layer at the destination
sees the character count, it knows how many
characters follow and hence where the end of
the frame is.
15.
16. FRAMING – BYTE STUFFING
• Use reserved characters to indicate the start and end of a frame.
• For instance, use the two-character sequence DLE STX (Data-Link Escape,
Start of Text) to signal the beginning of a frame, and the sequence DLE ETX
(End of TeXt) to flag the frame's end.
• The second framing method, Starting and ending character stuffing, gets
around the problem of resynchronization after an error by having each
frame start with the ASCII character sequence DLE STX and end with the
sequence DLE ETX.
• Problem: What happens if the two-character sequence DLE ETX happens
to appear in the frame itself?
• Solution: Use character stuffing; within the frame, replace every
occurrence of DLE with the two-character sequence DLE DLE.
17. The receiver reverses the processes, replacing every occurrence of DLE DLE
with a single DLE.
• Example: If the frame contained ``A B DLE D E DLE'', the characters
• transmitted over the channel would be ``DLE STX A B DLE DLE D E DLE
• DLE DLE ETX''.
• Disadvantage: character is the smallest unit that can be operated on; not
all
• architectures are byte oriented.
20. FRAMING – BIT STUFFING
• This technique allows data frames to contain an arbitrary number of bits
and
• allows character codes with an arbitrary number of bits per character. It
• works like this. Each frame begins and ends with a special bit pattern,
• 01111110 (in fact, a flag byte).
• Whenever the sender's data link layer encounters five consecutive 1s in
the
• data, it automatically stuffs a 0 bit into the outgoing bit stream.
• This bit stuffing is analogous to byte stuffing, in which an escape byte is
• stuffed into the outgoing character stream before a flag byte in the data.
• When the receiver sees five consecutive incoming 1 bits, followed by a 0
bit,
• it automatically destuffs (i.e., deletes) the 0 bit