The document discusses data link control protocols that manage the exchange of data over a communication link. It covers several important topics:
1) Framing involves packing data bits into distinguishable frames using techniques like byte stuffing and bit stuffing.
2) Flow and error control ensure reliable data transmission by preventing buffer overflows and allowing retransmission of corrupted frames. Common methods are stop-and-wait and sliding window protocols.
3) Specific protocols like go-back-N and selective reject are examined, combining framing, flow control, and error handling over noiseless and noisy channels. Utilization rates under different protocols are also calculated.
The data link layer, or layer 2, is the second layer of the seven-layer OSI model of computer networking. This layer is the protocol layer that transfers data between adjacent network nodes in a wide area network (WAN) or between nodes on the same local area network (LAN) segment.
The data link layer, or layer 2, is the second layer of the seven-layer OSI model of computer networking. This layer is the protocol layer that transfers data between adjacent network nodes in a wide area network (WAN) or between nodes on the same local area network (LAN) segment.
Abstract The data can get lost, reordered or duplicated due to the presence of routers and buffer space over the unreliable channel in the conventional networks. The data link layer deals with frame formation, flow control, error control, and addressing and link management. All such functions will be performed only by data link protocols. The sliding window protocol will detect and correct error if the received data have enough redundant bits or repeat a retransmission of data. The paper shows the working of this duplex protocol of data link network. Keywords: ACK, GOBACK, ARQ, NACK.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Abstract The data can get lost, reordered or duplicated due to the presence of routers and buffer space over the unreliable channel in the conventional networks. The data link layer deals with frame formation, flow control, error control, and addressing and link management. All such functions will be performed only by data link protocols. The sliding window protocol will detect and correct error if the received data have enough redundant bits or repeat a retransmission of data. The paper shows the working of this duplex protocol of data link network. Keywords: ACK, GOBACK, ARQ, NACK.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Spanning Tree Protocol (STP) is a mechanism which provides loop-free paths within a pure layer 2 topology. STP allows for link redundancy by temporarily blocking ports in order to have a single path. Upon the detection of a link, or port failure, STP will re-converge to leverage the other unused port. This prevents broadcast storms and the duplication of packets from floating around in the network endlessly. There are multiple flavors of STP, each with their own features and nuances, which includes: Per VLAN Spanning Tree Protocol Plus (PVST+), Rapid Per VLAN Spanning Tree Protocol Plus (Rapid PVST+), and Multiple Spanning Tree Protocol (MSTP).
With LiveAction 2.6 and greater, users have higher levels of situational awareness and visibility on their switched network infrastructure by providing a topological representation of each Spanning Tree instance, as well as providing alerts on the transitioning port state events. This helps network administrators to act quickly and identify the insertion of rogue and/or misconfigured switches promptly. Similarly, the STP path representation can be used to identify suboptimal layer 2 paths in a switched network. This application note provides instructions on enabling the STP functionality within LiveAction and will cover the aforementioned use case.
This presentation provides a comprehensive state-of-the-art study of wireless sensor networks(WSN) - based IoT MAC protocols, design guidelines that inspired these protocols,
as well as their drawbacks and shortcomings.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
Vaccine management system project report documentation..pdf
Data Link Control Protocols
1. Eighth Edition
by William Stallings
Chapter 7 – Data Link Control Protocols
Data Link Control Protocols
• need layer of logic above Physical
• to manage exchange of data over a link
– frame synchronization
– flow control
– error control
– addressing
– control and data
– link management
2. 11-1 FRAMING
The data link layer needs to pack bits into frames, so that each
frame is distinguishable from another. Our postal system
practices a type of framing. The simple act of inserting a letter
into an envelope separates one piece of information from
another; the envelope serves as the delimiter.
Figure 11.1 A frame in a character-oriented protocol
3. Figure 11.2 Byte stuffing and unstuffing
Byte stuffing is the process of adding 1 extra byte
whenever there is a flag or escape character in the text.
4. Figure 11.3 A frame in a bit-oriented protocol
Bit stuffing is the
process of adding
one extra 0
whenever five
consecutive 1s
follow a 0 in the
data, so that the
receiver does not
mistake the pattern
0111110 for a flag.
Figure 11.4 Bit stuffing and unstuffing
5. FLOW AND
ERROR
CONTROL
Flow control refers to a
set of procedures used
to restrict the amount
of data that the sender
can send before
waiting for
acknowledgment.
Error control in the
data link layer is
based on automatic
repeat request, which
is the retransmission
of data.
• ensure sending entity does not
overwhelm receiving entity
– by preventing buffer overflow
• influenced by:
– transmission time
• time taken to emit all bits into
medium
– propagation time
• time for a bit to traverse the
link
• assume here no errors but varying
delays
Flow Control
The most important responsibilities of the
data link layer are flow control and error
control. Collectively, these functions are
known as data link control.
6. Error Control
• Detection and correction of errors such as:
– lost frames
– damaged frames
• common techniques use:
– error detection
– positive acknowledgment
– retransmission after timeout
– negative acknowledgement & retransmission
Automatic Repeat Request (ARQ)
• collective name for such error control mechanisms,
including:
• Stop and Wait
• Sliding Window
– go back N
– selective reject (selective retransmission)
7. 11-3 PROTOCOLS
Now let us see how the data link layer can combine framing, flow
control, and error control to achieve the delivery of data from one node
to another. The protocols are normally implemented in software by
using one of the common programming languages.
8. 11-4 NOISELESS CHANNELS
Let us first assume we have an ideal channel in which no frames are
lost, duplicated, or corrupted. We introduce two protocols for this type
of channel.
10. Stop and Wait
• source transmits frame
• destination receives
frame and replies with
acknowledgement (ACK)
• source waits for ACK
before sending next
• destination can stop flow
by not send ACK
• works well for a few large
frames
• Stop and wait becomes
inadequate if large block
of data is split into small
frames
11. Stop and Wait
• pros and cons
– simple
– inefficient
• source transmits single
frame
• wait for ACK
• if received frame
damaged, discard it
– transmitter has timeout
– if no ACK within timeout,
retransmit
• if ACK
damaged,transmitter will
not recognize it
– transmitter will retransmit
– receive gets two copies of
frame
– use alternate numbering
and ACK0 / ACK1
12. Sliding Windows Flow Control
• allows multiple numbered frames to be in transit
• receiver has buffer W long
• transmitter sends up to W frames without ACK
• ACK includes number of next frame expected
• sequence number is bounded by size of field (k)
– frames are numbered modulo 2k
– giving max window size of up to 2k - 1
• receiver can ack frames without permitting
further transmission (Receive Not Ready)
• must send a normal acknowledge to resume
• if have full-duplex link, can piggyback ACks
15. Go Back N
• based on sliding window
• if no error, ACK as usual
• use window to control number of outstanding frames
• if error, reply with rejection
– discard that frame and all future frames until error frame received
correctly
– transmitter must go back and retransmit that frame and all
subsequent frames
• Damaged Frame
– error in frame i so receiver rejects frame i
– transmitter retransmits frames from i
• Lost Frame
– frame i lost and either
• transmitter sends i+1 and receiver gets frame i+1 out of seq and
rejects frame i
• or transmitter times out and send ACK with P bit set which receiver
responds to with ACK i
– transmitter then retransmits frames from i
17. Go Back N - Handling
• Damaged Acknowledgement
– receiver gets frame i, sends ack (i+1) which is lost
– acks are cumulative, so next ack (i+n) may arrive
before transmitter times out on frame i
– if transmitter times out, it sends ack with P bit set
– can be repeated a number of times before a reset
procedure is initiated
• Damaged Rejection
– reject for damaged frame is lost
– handled as for lost frame when transmitter times out
18. Selective Reject
• also called selective retransmission
• only rejected frames are retransmitted
• subsequent frames are accepted by the receiver
and buffered
• minimizes retransmission
• receiver must maintain large enough buffer
• more complex logic in transmitter
• hence less widely used
• useful for satellite links with long propagation
delays
20. Utilization under SW Flow Control
• Utilization = U = frame time / total time
• U = 1/1+2a
• a = Propagation Time / Transmission Time
• a = Medium length in bits / Frame length in
bits Station s1 sends f1
Station s2 sends an acknowledgment
Station s1 sends f2
Station s2 sends an acknowledgment
.
.
.
Station s1 sends fn
Station s2 sends an acknowledgment
CALCULATION OF U
21. • Total time to send the data=T=nTf
• Tf=time to send and receive an acknowledgment
– Tf=Tframe+Tprop+Tproc+ Tack + Tprop+Tproc
• Tprop=propagation time from s1 to s2
• Tframe=time to transmit a frame
• Tproc=processing time (negligible)
• Tack=time to transmit an acknowledgment(very small as
compared to data frame)
• T=2Tprop+Tframe
• For n frames T=n(2Tprop+Tframe)
• Of that time only n x Tframe is actually spent transmitting data
and the rest is overhead,therefore the utilization or efficiency
of the line is
• U= (n x Tframe )/n(2Tprop+Tframe)
= Tframe/(2Tprop+Tframe)
• If a=Tprop/Tframe then
• U=1/(1+2a)
CALCULATION OF U
22. Utilization with Sliding Window Flow Control
• N > 2a + 1
for
• N < 2a + 1
for
N
2a + 1
U =
U = 1