SlideShare a Scribd company logo
1 of 124
Download to read offline
2013-4-6 1
www.i-world-tech.blogspot.in
Guided By
Mr. A. K. Khan
Assistant Professor
Dept. of Information Technology
Assam University , Silchar
Presented By
Deepak Gupta (31320025)
Ankur Adhyapak(31320032)
Medini Brahma(31320016)
Suraj Prakash Maurya(31320020)
1. Introduction
2. Error Control
3. Physical Address
4. Multiple Access
5. Framing
6. Flow Control
7. Summary
8. Bibliography
9. Website Visited
2013-4-6 2
www.i-world-tech.blogspot.in
2013-4-6 3
www.i-world-tech.blogspot.in
๏ƒ˜ Data Link Layer is the Second Layer in the OSI Model.
๏ƒ˜ Data Link Layer Receives The Service From Physical Layer and
gives Service to the Network Layer.
๏ƒ˜ It makes the physical layer appears error-free to the upper
layer (Network Layer).
๏ƒ˜ The data Link Layer is responsible for the Moving frames from
one hop (node) to the next.
2013-4-6 4
www.i-world-tech.blogspot.in
2013-4-6 5
www.i-world-tech.blogspot.in
1. Single-bit error
2013-4-6 6
www.i-world-tech.blogspot.in
2. Multiple-bit error
3. Burst Error
2013-4-6 7
www.i-world-tech.blogspot.in
๏ƒ˜ Errors Caused by Signal Attenuation , Noise.
๏ƒ˜ Receiver Detects Presence of Errors.
๏ƒ˜ Possible Actions
๏ฑ Signal Sender For Re-Transmission.
๏ฑ Drops Frame.
๏ฑ Correct bit Errors if Possible and Continue.
2013-4-6 8
www.i-world-tech.blogspot.in
DDee
Errors Detection uses The Concept of redundancy, which
Means adding Extra bits at The End of Each Unit of data.
2013-4-6 9
www.i-world-tech.blogspot.in
Three Types of Redundancy Check are Common :
1. Parity Check
(A). Simple Parity Check
(B). Two Dimensional Parity Check
2. Cyclic Redundancy Check (CRC)
3. Check Sum.
2013-4-6 10
www.i-world-tech.blogspot.in
๏ƒ˜ In This Technique , a Redundant bit, Called a Parity bit is
Added To The Every data Unit so That The Total Number of 1s
(including The Parity bit) in The Unit becomes Even (or Odd).
2013-4-6 11
www.i-world-tech.blogspot.in
๏ƒ˜ Ex :
The data Unit 100100 becomes 110110
Then in both data Unit Number of 1 is even.
So we can conclude ,
1. simple parity check can detect All single bit errors.
2. It Can detect burst errors only if the total number of
errors in each data unit is odd.
2013-4-6 12
www.i-world-tech.blogspot.in
๏ƒ˜ In This Method, First We Calculate The Parity bit For Each
Data Unit.
Ex : As in Figure We have Four Data Unit. Then We Calculate
The Parity bit For Each Column.
2013-4-6 13
www.i-world-tech.blogspot.in
The Sender Send
11001111 10111011 01110010 01010011 01010101
Suppose The Receiver Receive
11111111 10110111 01110010 01010011 01010101
Lets Check The Parity bits
11111111 10110111 01110010 01010011 01101001
2013-4-6 14
www.i-world-tech.blogspot.in
But If--->
Sender Send
11001111 10111011 01110010 01010011 01010101
Suppose The Receiver Receive
01001101 00111001 01110010 01010011 01010101
Lets Check The Parity bits
01001101 00111001 01110010 01010011 01010101
So, if 2 bits in One Data Unit Damaged and 2 bits in Exactly The Same
Positions in Another data Unit are Also Damaged, The Checker Will
Not Detect an Error.
2013-4-6 15
www.i-world-tech.blogspot.in
๏ƒ˜ The Third and Most Powerful Technique of Error Detection is
Cyclic Redundancy Check (CRC). It based on Binary Division.
2013-4-6 16
www.i-world-tech.blogspot.in
๏ƒ˜ The Divisor of Size n is Predefined and Agreed Upon The both
Sender and Receiver.
๏ƒ˜Then , The Size of Redundant bits Should be n-1.
Ex : Sender
2013-4-6 17
www.i-world-tech.blogspot.in
Receiver
2013-4-6 18
www.i-world-tech.blogspot.in
๏ƒ˜ The Last Error Detection Method , We Discuss here is Called
The Checksum.
๏ƒ˜The checksum is Used in The Internet by Several Protocols
Although not at The Data Link Layer.
๏ƒ˜Like The Others it is Also based on Redundancy.
๏ƒ˜ Traditionally, The Internet has been Using a 16-bit Checksum.
2013-4-6 19
www.i-world-tech.blogspot.in
The Sender Calculates The Checksum by Following These Stepsโ€ฆ.
Sender Side :
1. The message is divided into 16-bit words.
2. The value of the checksum word is set to 0.
3. All words including the checksum are added using
Oneโ€™s Complement addition.
4. The Sum is Complemented and becomes The Checksum.
5. The Checksum is Sent With The Data.
2013-4-6 20
www.i-world-tech.blogspot.in
The Receiver Uses The Following Steps For Error Detection.
Receiver site
1. The Message (including Checksum) is Divided into
16-bit Words.
2. All Words are Added Using Oneโ€™s Complement Addition.
3. The Sum is Complemented and becomes The New
Checksum.
4. If The Value of Checksum is 0, The Message is
Accepted ; Otherwise, it is Rejected.
2013-4-6 21
www.i-world-tech.blogspot.in
Ex : here We Use 4 bit Checksum.
Suppose We have To Send The Set of Data (7, 11, 12, 0, 6)
2013-4-6 22
www.i-world-tech.blogspot.in
2013-4-6 23
www.i-world-tech.blogspot.in
๏ƒ˜ Two methods
1. Error correction by Retransmission
2. Forward error correction (FEC)
2013-4-6 24
www.i-world-tech.blogspot.in
๏ƒ˜ It Allows The Receiver To inform The Sender of Any Frame Lost
or Damaged in Transmission.
๏ƒ˜ Coordinates The Re-Transmission of Those Frames by The
Sender. This Process is Called Automatic Repeat Request (ARQ).
For This We Use Three Common Flow Control Mechanisms :
1. Stop-and-Wait ARQ
2. Go-back-N ARQ
3. Selective-Repeat ARQ
2013-4-6 25
www.i-world-tech.blogspot.in
๏ƒ˜ Receiver Can Use an Error Correcting Code , Which Automatically
Correct Certain Errors.
Hamming Code :
๏ฑ Single bit Error
๏ฑ Burst bit Error
๏ƒ˜ Hamming Code is Mainly Used To Solve Single bit Error.
๏ƒ˜ We Can Solve Burst bit Error Using The Concept of Single
bit Error.
2013-4-6 26
www.i-world-tech.blogspot.in
๏ƒ˜ Receiver Reads a 1 bit as a 0 or 0 bit as a 1.
๏ƒ˜ To Correct This Error, The Receiver Simply Reverses The Value
of The Altered bit. To do so We Must Know Which bit is in error.
๏ƒ˜ To Calculate The Number of Redundant bit r To Correct an data
bit of Length m we Must Know The Relationship between r and
m.
So, if Data bit is m and Redundant bit is r, Then
We have To Satisfy The Relation
Single bit Error
2^r >= m+r+1
2013-4-6 27
www.i-world-tech.blogspot.in
Ex : If The Value of m is 7, The Relation will Satisfy if The Minimum
Value of r is 4. 2^4 = 16 > 7+4+1
2013-4-6 28
www.i-world-tech.blogspot.in
If The Number of Data bit is 7, Then The Position of Redundant
bits Are :
2^0=1 2^1=2
2^2=4 2^3=8
2013-4-6 29
www.i-world-tech.blogspot.in
2013-4-6 30
www.i-world-tech.blogspot.in
2013-4-6 31
www.i-world-tech.blogspot.in
Let Receiver receives 10010100101
2013-4-6 32
www.i-world-tech.blogspot.in
๏ƒ˜ Hamming Code Cannot Correct a burst Error Directly.
๏ƒ˜ it is Possible To Rearrange The Data and Then Apply The code.
๏ƒ˜ Instead of Sending All the bits in The data Unit Together, we can organize
N units in a column.
๏ƒ˜ Send The First bits of Each Followed by The Second bit of each, and so
on.
๏ƒ˜ In This Way, if a burst Error of M bit Occurs (M<N), Then The Error does
not Corrupt M bit of Single Unit, it Corrupt Only 1 bit of Unit.
๏ƒ˜ Then We Can Correct it Using Hamming Code Scheme.
Burst Error Correction
2013-4-6 33
www.i-world-tech.blogspot.in
2013-4-6 34
www.i-world-tech.blogspot.in
2013-4-6 35
www.i-world-tech.blogspot.in
Four Levels of Addressing
Physical
Addresses
Logical
Addresses
Port
Addresses
Specific
Addresses
Data Link Layer Network layer Transport Layer Application Layer
2013-4-6 36
www.i-world-tech.blogspot.in
๏ƒ˜ Physical Address is Also Known As Link Address.
๏ƒ˜ It is the Address of a node as defined by its LAN or WAN.
๏ƒ˜ It is Included in The Frame used by the Data Link Layer.
๏ƒ˜ It is The Lowest Level Address.
๏ƒ˜The Size and Format of These Address vary , depending
on The Network.
2013-4-6 37
www.i-world-tech.blogspot.in
๏ƒ˜ Ethernet uses a 6-byte (48 bits) Physical Address That is
Imprinted on The Network Interface card (NIC) .
Ex :
Most LAN Use a 48-bit (6 byte) Physical Address Written as 12
hexadecimal digits , Every byte (2 hexadecimal digits) is
Separated by a Colon , As Shown below..
07:01:02:01:2C:4B
A 6 byte (12 hexadecimal digits ) Physical Address.
2013-4-6 38
www.i-world-tech.blogspot.in
2013-4-6 39
www.i-world-tech.blogspot.in
2013-4-6 40
www.i-world-tech.blogspot.in
๏ฑ When nodes or stations are connected and use a common link , called a
multipoint or broadcast link , we need a multiple-access protocol to coordinate
access to the link.
TAXANOMY OF MULTIPLE-ACCESS PROTOCOLS
2013-4-6 www.i-world-tech.blogspot.in 41
๏ฑIn random access or contention method , no station is superior to another
station and none is assigned the control over another.
๏ฑAt each instance a station that has a data to send uses a procedure
defined by the protocol to make a decision on whether or not to send . The
decision depends on the state of the medium (idle or busy ).
๏ฑTwo features give this method its name:
๏ถ there is no scheduled time for a station to transmit (i.e random access)
๏ถNo rules specify which station should travel next(i.e called contention
method)
2013-4-6 www.i-world-tech.blogspot.in 42
๏ฑ Earliest random access protocol developed in early
1970.
๏ฑ It was designed for radio wireless Lan.
๏ฑThe medium was shared between stations .
๏ฑWhen a station sends the data , another
station may do at the same time .
๏ฑThe data from the two stations collide and become
garbled.
2013-4-6 www.i-world-tech.blogspot.in 43
๏ฑ The original ALOHA protocol is called pure ALOHA .
๏ฑ Each stations sends a frame when ever it has a frame to send .
๏ฑ Since there is only one channel to share , the is a possibility of
collisions between frames from different stations .
FRAMES IN Pure ALOHA NETWORK
2013-4-6 www.i-world-tech.blogspot.in 44
Procedure for pure aloha protocol
2013-4-6 www.i-world-tech.blogspot.in 45
VULNERABLE TIME : is the time in which there is a possibility of
collision.
fig:- Vulnerable time in pure ALOHA protocol
2013-4-6 www.i-world-tech.blogspot.in 46
THROUGHTPUT :- is the average number of successful
transmission.
o FOR pure ALOHA
S=G*e-2G
where G is the average number of frames generated by the
system .
2013-4-6 www.i-world-tech.blogspot.in 47
๏ฑ In slotted ALOHA we divide the time into slots of Tfr s and
force the stations to send only one at the beginning of the time slot.
2013-4-6 www.i-world-tech.blogspot.in 48
VULNERABLE TIME :- is now reduced to one half i.e T fr
Fig :- Vulnerable time for slotted ALOHA protocol .
2013-4-6 www.i-world-tech.blogspot.in 49
Throughput :- the average number of successful transmission
for slotted ALOHA is
S=G*e-G
The maximum number throughput Smax =0.368 when G=1.
2013-4-6 www.i-world-tech.blogspot.in 50
๏ฑCSMA requires that each station first lisens to the medium
before sending .
๏ฑThe possibility of collision still exist because of propagation delay
; when a station sends a frame, it still takes time for the first bit to
reach every station and for every station to sense it.
2013-4-6 www.i-world-tech.blogspot.in 51
Vulnerable time :- for CSMA is the propagation time Tp .
2013-4-6 www.i-world-tech.blogspot.in 52
Persistence methods :- tells what a station should do if
the channel is idle .
3 types of persistence methods
๏ฑ 1-persistent
๏ฑ non persistent
๏ฑp-persistent
2013-4-6 www.i-world-tech.blogspot.in 53
2013-4-6 www.i-world-tech.blogspot.in 54
CSMA/CD augments the algorithm to handle the collision .Here a station
monitors the medium after it sends a frame to see if the transmission was
successful . If so the station is finished . If however there is a collision , the frame
is send again .
2013-4-6 www.i-world-tech.blogspot.in 55
Flow diagram
2013-4-6 www.i-world-tech.blogspot.in 56
In wired network the received signal has almost the same energy as the sent
signal because the length of the cable is short or there are repeaters that amplify
the energy between the sende and the receiver . This means that in a collision
, the detected energy almost doubles .
Collisions are avoided through the use of CSMA/CAโ€™s three strategies :-
๏ฑThe interframe space (IFS)
๏ฑThe contention window
๏ฑacknowwledgements
2013-4-6 www.i-world-tech.blogspot.in 57
FLOW DIAGRAM
2013-4-6 www.i-world-tech.blogspot.in 58
๏ฑ In controlled access , the stations consult one another to find
which station has the right to send .
๏ฑ 3 popular controlled access methods are :
1. reservation
2. Polling
3. Token passing
2013-4-6 www.i-world-tech.blogspot.in 59
๏ฑ In reservation method , a station needs to make a reservation before sending
the data .In each interval , a reservation frame precedes the data frame in that
interval.
๏ฑ If there are N stations in the system , the are exactly N reservation minis lots
in the reservation frame . Each minis lot belong to a station . When a station
needs to send a data frame , it makes a reservation in its own minis lot.
2013-4-6 www.i-world-tech.blogspot.in 60
๏ฑPolling works with topologies in which one device is
designated as a primary station and the other devices are
secondary stations.
๏ฑAll data exchanges must be made through the primary device
even when the ultimate destination is a secondary device.
๏ฑ The primary device controls the link.
๏ฑ The secondary devices follow its instructions.
2013-4-6 www.i-world-tech.blogspot.in 61
Select Function
Poll Function
๏ฑThe select function is used whenever the primary device has something to
send.
๏ฑ Remember that the primary controls the link. If the primary is neither sending
nor receiving data, it knows the link is available.
๏ฑThe poll function is used by the primary device to solicit transmissions from the
secondary devices.
๏ฑ When the primary is ready to receive data, it must ask (poll) each
device in turn if it has anything to send.
2013-4-6 www.i-world-tech.blogspot.in 62
2013-4-6 www.i-world-tech.blogspot.in 63
Logical Ring:
๏ฑ In a token-passing network, stations do not have to be
physically connected in a ring. the ring can be a logical one.
2013-4-6 www.i-world-tech.blogspot.in 64
๏ฑIn the token-passing method, the stations in a network are
organized in a logical ring.
๏ฑ In other words, for each station, there is a predecessor and a
successor.
๏ฑ The predecessor is the station which is logically before the
station in the ring;
๏ฑ the successor is the station which is after the station in the
ring.
2013-4-6 65
www.i-world-tech.blogspot.in
2013-4-6 66
www.i-world-tech.blogspot.in
๏ƒ˜ The transmitted bit stream by the physical layer is not
guaranteed to be error free.
๏ƒ˜It is up to the data-link layer to detect, and if necessary, to
correct errors.
๏ƒ˜The data-link layer breaks the bit stream up into discrete
frames and compute the checksum for each frame.
๏ƒ˜When a frame arrives at the destination, the checksum is
recomputed.
2013-4-6 67
www.i-world-tech.blogspot.in
๏ƒ˜Frames Are The Small data Units Created By Data Link
Layer And The Process Of Creating Frames By The Data
Link Layer Is Known As Framing.
๏ƒ˜The easiest way to achieve framing is to insert time gaps
between frames.
๏ƒ˜ Networks rarely make any guarantees about timing.
2013-4-6 68
www.i-world-tech.blogspot.in
1. Character Count.
2. Starting & Ending Characters With Character Stuffing.
3. Starting & ending Flags With Bit Stuffing.
4. Physical Layer Coding Violation.
2013-4-6 69
www.i-world-tech.blogspot.in
๏ƒ˜ This Method Specifies The Number Of Characters That Are
Present In particular Frame.
๏ƒ˜ This Information Is specified By using a Special Field In the
Header Frame.
๏ƒ˜ The problem with Character count algorithm is that the
count can be distorted by a transmission error.
2013-4-6 70
www.i-world-tech.blogspot.in
๏ƒ˜ In this Method Frame Starts & End With a special Character
That Mark The Beginning & End Of Frame.
๏ƒ˜ Each character Begins With the ASCII Character Sequence DLE
STX (data link Escape Start Of Text ) And End With ASCII Character
Sequence DLE ETX (data link escape End Of text)
2013-4-6 71
www.i-world-tech.blogspot.in
2013-4-6 72
www.i-world-tech.blogspot.in
๏ƒ˜ In this Method , Each Begins & Ends With a Special Bit pattern
01111110 Called Flags.
๏ƒ˜ There for Each frame starts With 01111110& also Ends with
01111110.
๏ƒ˜ The Main Problem arises in this Method When The Flag byte
01111110 Appear as data.
๏ƒ˜ This Problem Is Handled By technique called Bit stuffing That
Is similar To character stuffing.
2013-4-6 73
www.i-world-tech.blogspot.in
2013-4-6 74
www.i-world-tech.blogspot.in
๏ƒ˜ This Framing Method Is Used only In those network In which
Encoding On The Physical Medium Contain some Redundancy.
๏ƒ˜ Some LANs Encode Each Bit Of Data By using two Physical Bit
i.e. Manchester coding is Used.
๏ƒ˜ In this method Bit 1 Is encoded into high-low(10) Pair And Bit 0
Is Encoded Into low-high(01)pair shown in figure.
2013-4-6 75
www.i-world-tech.blogspot.in
TDMA โ€“ Time Division Multiple Access
FDMA โ€“ Frequency Division Multiple Access
CDMA โ€“ Code Division Multiple Access
2013-4-6 76
www.i-world-tech.blogspot.in
FDMA - Large room divided up into small rooms. Each pair of
people takes turns speaking.
TDMA โ€“ Large room divided up into small rooms. Three pairs of
people per room, however, each pair gets 20 seconds to speak.
CDMA โ€“ No small rooms. Everyone is speaking in different
languages. If voice volume is minimized, the number of people
is maximized.
Efficiency of TDMA frame:
2013-4-6 77
www.i-world-tech.blogspot.in
๏ƒ˜ Flexible bit rate
๏ƒ˜ No frequency guard band required
๏ƒ˜ No need for precise narrowband filters
๏ƒ˜ Easy for mobile or base stations to initiate and execute hands
off
๏ƒ˜ Extended battery life
๏ƒ˜ TDMA installations offer savings in base station
equipment, space and maintenance
๏ƒ˜ The most cost-effective technology for upgrading a current
analog system to digital
2013-4-6 78
www.i-world-tech.blogspot.in
2013-4-6 79
www.i-world-tech.blogspot.in
๏ƒ˜Requires network-wide timing synchronization
๏ƒ˜ Requires signal processing fro matched filtering and
correlation detection
๏ƒ˜ Demands high peak power on uplink in transient mode
๏ƒ˜ Multipath distortion
2013-4-6 80
www.i-world-tech.blogspot.in
Number of FDMA Channels
In the U.S. each cellular carrier is allocated 416 channels where:
๏ƒ˜ If channel is not in use, it sits idle
๏ƒ˜ Channel bandwidth is relatively narrow (30kHz)
๏ƒ˜ Simple algorithmically, and from a hardware standpoint
๏ƒ˜ Fairly efficient when the number of stations is small and
the traffic is uniformly constant
๏ƒ˜ Capacity increase can be obtained by reducing the
information bit rate and using efficient digital code
๏ƒ˜ No need for network timing
๏ƒ˜ No restriction regarding the type of baseband or type of
modulation
2013-4-6 81
www.i-world-tech.blogspot.in
๏ƒ˜ The presence of guard bands
๏ƒ˜ Requires right RF filtering to minimize adjacent channel
interference
๏ƒ˜ Maximum bit rate per channel is fixed
๏ƒ˜ Small inhibiting flexibility in bit rate capability
๏ƒ˜ Does not differ significantly from analog system
2013-4-6 82
www.i-world-tech.blogspot.in
2013-4-6 83
www.i-world-tech.blogspot.in
Spread Spectrum Multiple Access Technologies
2013-4-6 84
www.i-world-tech.blogspot.in
๏ƒ˜Many users of CDMA use the same frequency, TDD or FDD may
be used
๏ƒ˜ Multipath fading may be substantially reduced because of
large signal bandwidth
๏ƒ˜ No absolute limit on the number of users
๏ƒ˜ Easy addition of more users
๏ƒ˜ Impossible for hackers to decipher the code sent
๏ƒ˜ Better signal quality
๏ƒ˜ No sense of handoff when changing cells
2013-4-6 85
www.i-world-tech.blogspot.in
๏ƒ˜As the number of users increases, the overall quality of
service decreases
๏ƒ˜ Self-jamming
๏ƒ˜ Near- Far- problem arises
2013-4-6 86
www.i-world-tech.blogspot.in
2013-4-6 87
www.i-world-tech.blogspot.in
๏ƒ˜ Flow control refers to a set of procedures (protocols)
used to restrict the amount of data that the sender can
send before waiting for acknowledgment.
๏ƒ˜ It is one of the most important duties of the data
link layer.
2013-4-6 88
www.i-world-tech.blogspot.in
๏ƒ˜ Now let us see how the data link layer can combine
framing, flow control, and error control by using protocols to
achieve the delivery of data from one node to another.
๏ƒ˜ We divide the discussion of protocols as follows -
2013-4-6 89
www.i-world-tech.blogspot.in
๏ƒ˜All the protocols we discuss are unidirectional.
๏ƒ˜ Although special frames, called acknowledgment (ACK)
and negative acknowledgment(NAK) can flow in the opposite
direction for flow and error control purposes, data flow in only
one direction.
2013-4-6 90
www.i-world-tech.blogspot.in
๏ƒ˜ An ideal channel in which no frames are
lost, duplicated, or corrupted.
๏ƒ˜We introduce two protocols for this type of channel.
1. Simplest Protocol
2. Stop-and-wait
2013-4-6 91
www.i-world-tech.blogspot.in
๏ƒ˜ We assume that the receiver can immediately handle any
frame it receives with a processing time that is small
enough to be negligible.
๏ƒ˜ The data link layer of the receiver immediately removes
the header from the frame and hands the data packet to its
network layer, which can also accept the packet
immediately.
2013-4-6 92
www.i-world-tech.blogspot.in
Sender-site algorithm
2013-4-6 93
www.i-world-tech.blogspot.in
Receiver-site algorithm
2013-4-6 94
www.i-world-tech.blogspot.in
The sender sends one frame, stops until it receives confirmation
from the receiver (okay to go ahead), and then sends the next frame.
2013-4-6 95
www.i-world-tech.blogspot.in
Sender-site algorithm
2013-4-6 96
www.i-world-tech.blogspot.in
Sender-site algorithm
2013-4-6 97
www.i-world-tech.blogspot.in
Receiver-site algorithm
2013-4-6 98
www.i-world-tech.blogspot.in
๏ƒ˜ Although the Stop-and-Wait Protocol gives us an idea of
how to add flow control to its predecessor, noiseless channels
are nonexistent.
๏ƒ˜We discuss three protocols in this section that use error
control.
1. Stop-and-Wait Automatic Repeat Request
2. Go-Back-N Automatic Repeat Request
3. Selective Repeat Automatic Repeat Request
๏ƒ˜ Adds a simple error control mechanism to the Stop-and-Wait
Protocol.
๏ƒ˜ When the frame arrives at the receiver site, it is checked and if
it is corrupted, it is silently discarded. The detection of errors
in this protocol is manifested by the silence of the receiver.
๏ƒ˜ The corrupted and lost frames need to be resent in this
protocol.
2013-4-6 99
www.i-world-tech.blogspot.in
2013-4-6 100
www.i-world-tech.blogspot.in
๏ƒ˜ To identify a frame we number the frames.
๏ƒ˜ Error correction in Stop-and-Wait ARQ is done by
keeping a copy of the sent frame and retransmitting of the
frame when the timer expires.
๏ƒ˜ The ACK frame for this protocol has a sequence number
field.
2013-4-6 101
www.i-world-tech.blogspot.in
๏ƒ˜ Sequence number
In Stop-and-Wait ARQ, we use sequence numbers to number the
frames. The sequence numbers are based on modulo-2 arithmetic.
๏ƒ˜ Acknowledgement number
In Stop-and-Wait ARQ, the acknowledgment number always
announces in modulo-2 arithmetic the sequence number of the next
frame expected.
2013-4-6 102
www.i-world-tech.blogspot.in
Sender-site algorithm
2013-4-6 103
www.i-world-tech.blogspot.in
Sender-site algorithm
2013-4-6 104
www.i-world-tech.blogspot.in
Receiver-site algorithm
2013-4-6 105
www.i-world-tech.blogspot.in
2013-4-6 106
www.i-world-tech.blogspot.in
๏ƒ˜ In this protocol we can send several frames before receiving
acknowledgments; we keep a copy of these frames until the
acknowledgments arrive.
Sequence number
๏ƒ˜ In the Go-Back-N Protocol, the sequence numbers are
modulo 2 raise to the power m, where m is the size of the
sequence number field in bits.
2013-4-6 107
www.i-world-tech.blogspot.in
Sliding Window
In this protocol, the sliding window is an abstract concept that defines the range
of sequence numbers that is the concern of the sender and receiver.
The range which is the concern of the sender is called the send sliding window;
the range that is the concern of the receiver is called the receive sliding window.
2013-4-6 108
www.i-world-tech.blogspot.in
Sliding Window
The send window is an abstract concept defining an imaginary box of size 2m-
1 with three variables: Sf, Sn and Ssize.
The send window can slide one or more slots when a valid acknowledgment
arrives.
2013-4-6 109
www.i-world-tech.blogspot.in
Sliding Window
The receive window is an abstract concept defining an imaginary box of size
1 with one single variable Rnโ€ข The window slides when a correct frame has
arrived; sliding occurs one slot at a time.
2013-4-6 110
www.i-world-tech.blogspot.in
Send Window Size
For m=2
2013-4-6 111
www.i-world-tech.blogspot.in
Sender-site algorithm
2013-4-6 112
www.i-world-tech.blogspot.in
Sender-site algorithm
2013-4-6 113
www.i-world-tech.blogspot.in
Sender-site algorithm
2013-4-6 114
www.i-world-tech.blogspot.in
๏ƒ˜ This protocol does not resend N frames when just one frame is damaged.
๏ƒ˜ It is more efficient for noisy links, but the processing at the receiver is
more complex.
Windows
๏ƒ˜ The send window maximum size can be 2 raise to the power (m-1)
2013-4-6 115
www.i-world-tech.blogspot.in
๏ƒ˜ The size of the receive window is the same as the size of the send
window (2m- I ).
๏ƒ˜ The Selective Repeat Protocol allows as many frames as the size of the
receive window to arrive out of order and be kept until there is a set of in-
order frames to be delivered to the network layer.
2013-4-6 116
www.i-world-tech.blogspot.in
Window Sizes
For m=2
2013-4-6 117
www.i-world-tech.blogspot.in
Sender-site algorithm
2013-4-6 118
www.i-world-tech.blogspot.in
Sender-site algorithm
2013-4-6 119
www.i-world-tech.blogspot.in
Receiver-site algorithm
2013-4-6 120
www.i-world-tech.blogspot.in
Receiver-site algorithm
2013-4-6 121
www.i-world-tech.blogspot.in
๏ƒ˜Data Link Layer makes the physical layer appears error-free to the
upper layer (Network Layer).
๏ƒ˜ The data Link Layer is responsible for the Moving frames from
one hop (node) to the next.
๏ƒ˜ The data Link Layer adds reliability to the physical layer by
adding mechanisms to detect and retransmit or lost frames.
๏ƒ˜ it also uses a mechanism to recognize duplicate frames.
๏ƒ˜ Ethernet uses a 6-byte (48 bits) Physical Address That is
Imprinted on The Network Interface card (NIC) .
2013-4-6 122
www.i-world-tech.blogspot.in
๏ƒ˜When nodes or stations are connected and use a common link
, called a multipoint or broadcast link , we need a multiple-access
protocol to coordinate access to the link.
๏ƒ˜ The data-link layer breaks the bit stream up into discrete frames
and compute the checksum for each frame.
๏ƒ˜ Flow control refers to a set of procedures (protocols) used to
restrict the amount of data that the sender can send before waiting
for acknowledgment.
๏ƒ˜ Although the Stop-and-Wait Protocol gives us an idea of how to
add flow control to its predecessor, noiseless channels are
nonexistent.
2013-4-6 123
www.i-world-tech.blogspot.in
๏ƒ˜Data Communication and Networking Fourth Edition
Behrouz A. Forouzan and Sophia Chung Fegan
๏ƒ˜ Computer Network 4th Edition
By Tanenbaum
๏ƒ˜www.wikipedia.com
๏ƒ˜ www.google.com
2013-4-6 124
www.i-world-tech.blogspot.in
Thank You

More Related Content

Similar to datalinklayer-130407001728-phpapp01.pdf sa

35d70683c4fd405d89db4a5287aa4b89
35d70683c4fd405d89db4a5287aa4b8935d70683c4fd405d89db4a5287aa4b89
35d70683c4fd405d89db4a5287aa4b89Abdisalam A. Mohamed
ย 
Data link layer
Data link layerData link layer
Data link layerHassanein Alwan
ย 
Cisco Activity
Cisco ActivityCisco Activity
Cisco ActivityAshley Davis
ย 
Data Link Layer
Data Link Layer Data Link Layer
Data Link Layer Mukesh Tekwani
ย 
computer network-unit 2
computer network-unit 2computer network-unit 2
computer network-unit 2sharmilas38
ย 
5-LEC- 5.pptxTransport Layer. Transport Layer Protocols
5-LEC- 5.pptxTransport Layer.  Transport Layer Protocols5-LEC- 5.pptxTransport Layer.  Transport Layer Protocols
5-LEC- 5.pptxTransport Layer. Transport Layer ProtocolsZahouAmel1
ย 
III_UNIT_ErrorCorrecting.pptx
III_UNIT_ErrorCorrecting.pptxIII_UNIT_ErrorCorrecting.pptx
III_UNIT_ErrorCorrecting.pptxShantanuDharekar
ย 
Design and implementation of single bit error correction linear block code sy...
Design and implementation of single bit error correction linear block code sy...Design and implementation of single bit error correction linear block code sy...
Design and implementation of single bit error correction linear block code sy...TELKOMNIKA JOURNAL
ย 
CN UNIT II.pptx
CN UNIT II.pptxCN UNIT II.pptx
CN UNIT II.pptxVISWANATHAN R V
ย 
I slip algorithm for low latency on hybrid noc architecture
I slip algorithm for low latency on hybrid noc architectureI slip algorithm for low latency on hybrid noc architecture
I slip algorithm for low latency on hybrid noc architectureeSAT Publishing House
ย 
Lecture20 tcp
Lecture20 tcpLecture20 tcp
Lecture20 tcpH K
ย 
CCNA project-report
CCNA project-reportCCNA project-report
CCNA project-reportSagar Shashank
ย 
Data link layer tutorial
Data link layer tutorialData link layer tutorial
Data link layer tutorialSwapnadeep Reloaded
ย 
Introduction to data link layer
Introduction to data link layerIntroduction to data link layer
Introduction to data link layerShashank HP
ย 
opnet lab report
opnet lab reportopnet lab report
opnet lab reportSadia Shachi
ย 
Ccna 4 chapter 8 v4.0 answers 2011
Ccna 4 chapter 8 v4.0 answers 2011Ccna 4 chapter 8 v4.0 answers 2011
Ccna 4 chapter 8 v4.0 answers 2011Dรขn Chฦกi
ย 
The Role Of Software And Hardware As A Common Part Of The...
The Role Of Software And Hardware As A Common Part Of The...The Role Of Software And Hardware As A Common Part Of The...
The Role Of Software And Hardware As A Common Part Of The...Sheena Crouch
ย 

Similar to datalinklayer-130407001728-phpapp01.pdf sa (20)

Ch5
Ch5Ch5
Ch5
ย 
35d70683c4fd405d89db4a5287aa4b89
35d70683c4fd405d89db4a5287aa4b8935d70683c4fd405d89db4a5287aa4b89
35d70683c4fd405d89db4a5287aa4b89
ย 
Data link layer
Data link layerData link layer
Data link layer
ย 
Cisco Activity
Cisco ActivityCisco Activity
Cisco Activity
ย 
COMPUTER NETWORKS UNIT 2
COMPUTER NETWORKS UNIT 2COMPUTER NETWORKS UNIT 2
COMPUTER NETWORKS UNIT 2
ย 
Data Link Layer
Data Link Layer Data Link Layer
Data Link Layer
ย 
computer network-unit 2
computer network-unit 2computer network-unit 2
computer network-unit 2
ย 
5-LEC- 5.pptxTransport Layer. Transport Layer Protocols
5-LEC- 5.pptxTransport Layer.  Transport Layer Protocols5-LEC- 5.pptxTransport Layer.  Transport Layer Protocols
5-LEC- 5.pptxTransport Layer. Transport Layer Protocols
ย 
III_UNIT_ErrorCorrecting.pptx
III_UNIT_ErrorCorrecting.pptxIII_UNIT_ErrorCorrecting.pptx
III_UNIT_ErrorCorrecting.pptx
ย 
Design and implementation of single bit error correction linear block code sy...
Design and implementation of single bit error correction linear block code sy...Design and implementation of single bit error correction linear block code sy...
Design and implementation of single bit error correction linear block code sy...
ย 
CN UNIT II.pptx
CN UNIT II.pptxCN UNIT II.pptx
CN UNIT II.pptx
ย 
I slip algorithm for low latency on hybrid noc architecture
I slip algorithm for low latency on hybrid noc architectureI slip algorithm for low latency on hybrid noc architecture
I slip algorithm for low latency on hybrid noc architecture
ย 
OSI MODELS.pptx
OSI  MODELS.pptxOSI  MODELS.pptx
OSI MODELS.pptx
ย 
Lecture20 tcp
Lecture20 tcpLecture20 tcp
Lecture20 tcp
ย 
CCNA project-report
CCNA project-reportCCNA project-report
CCNA project-report
ย 
Data link layer tutorial
Data link layer tutorialData link layer tutorial
Data link layer tutorial
ย 
Introduction to data link layer
Introduction to data link layerIntroduction to data link layer
Introduction to data link layer
ย 
opnet lab report
opnet lab reportopnet lab report
opnet lab report
ย 
Ccna 4 chapter 8 v4.0 answers 2011
Ccna 4 chapter 8 v4.0 answers 2011Ccna 4 chapter 8 v4.0 answers 2011
Ccna 4 chapter 8 v4.0 answers 2011
ย 
The Role Of Software And Hardware As A Common Part Of The...
The Role Of Software And Hardware As A Common Part Of The...The Role Of Software And Hardware As A Common Part Of The...
The Role Of Software And Hardware As A Common Part Of The...
ย 

Recently uploaded

UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
ย 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
ย 
Top Rated Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...Call Girls in Nagpur High Profile
ย 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
ย 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .DerechoLaboralIndivi
ย 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
ย 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
ย 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLManishPatel169454
ย 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
ย 
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfSuman Jyoti
ย 
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
ย 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
ย 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
ย 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
ย 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
ย 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
ย 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
ย 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Christo Ananth
ย 

Recently uploaded (20)

UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
ย 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
ย 
Top Rated Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
ย 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
ย 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
ย 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
ย 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
ย 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
ย 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ย 
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...
ย 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
ย 
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
ย 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
ย 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
ย 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
ย 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
ย 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
ย 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
ย 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
ย 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
ย 

datalinklayer-130407001728-phpapp01.pdf sa