This document provides an overview of the data link layer and media access control. It discusses topics like link-layer addressing, data link layer protocols, framing, error control, flow control, and common data link layer protocols. It provides examples of finite state machines to illustrate the simple protocol and stop-and-wait protocol. Key points covered include how framing separates messages, the use of bit stuffing to avoid flag patterns in data, flow control using buffers, and acknowledgments for error control.
A Virtual Circuit is a circuit used in transportation of data over a packet switch networks.
Virtual Circuit appears as if there is a physical path established between and source and destination so that all packets(data) can be routed over that path during the transmission
IV B.Tech I Sem CSE&IT JNTUK R10 regulation students have Mobile computing paper. This slides especially contains UNIT - 5 total material required for end exams
A Virtual Circuit is a circuit used in transportation of data over a packet switch networks.
Virtual Circuit appears as if there is a physical path established between and source and destination so that all packets(data) can be routed over that path during the transmission
IV B.Tech I Sem CSE&IT JNTUK R10 regulation students have Mobile computing paper. This slides especially contains UNIT - 5 total material required for end exams
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
3. Internet Connection might be instable…
Stay online…!!!!
3
Attend the Class with a notebook and pen..!
Install “Google meet” app in your mobile..!
4. Unit II
DATA-LINK LAYER & MEDIA ACCESS 9
Introduction – Link-Layer Addressing – DLC Services –
Data-Link Layer Protocols – HDLC – PPP – Media
Access Control – Wired LANs: Ethernet – Wireless LANs
– Introduction – IEEE 802.11, Bluetooth – Connecting
Devices.
4
CO2 - Build wired/wireless LAN and configure the networking
devices for a required scenario.
6. Recap: Address Resolution Protocol (ARP)
• ARP belongs to the network layer.
• ARP accepts an IP address from the IP protocol,
maps the address to the corresponding link-
layer address, and passes it to the data-link
layer.
Position of ARP in TCP/IP protocol suite
6
7. Recap: Reverse Address Resolution Protocol (RARP)
• RARP finds the logical address for a machine
that only knows its physical address.
• This often encountered on thin-client
workstations. No disk, so when machine is
booted, it needs to know its IP address
• RARP requests are broadcast, RARP replies are
unicast.
7
8. Recap: Framing
• A frame is a group of bits.
• Framing means organizing the bits into a
frame that are carried by the physical
layer.
• Framing separates a message from other
messages by adding sender-address &
destination-address.
• The destination address defines where the
packet is to go; the sender address helps the
recipient acknowledge the receipt
• Two types of frames
8
9. Type of Frame Size
1) Fixed-Size Framing
• There is no need for defining boundaries of
frames; the size itself can be used as a delimiter.
• For example: ATM WAN uses frames of fixed
size called cells.
2) Variable-Size Framing
• We need to define the end of the frame and the
beginning of the next frame.
• Two approaches are used:
1) Character-oriented approach
2) Bit-oriented approach
9
10. Character-Oriented Framing
• Data to be carried are 8-bit characters from a
coding system such as ASCII.
• The header and the trailer are also
multiples of 8 bits.
1) Header carries the source and destination-
addresses and other control information.
2) Trailer carries error-detection or error-
correction redundant bits.
• To separate one frame from the next frame, an
8- bit (I-byte) flag is added at the
beginning and the end of a frame.
• The flag signals the start or end of a frame.
10
11. A frame in a Character Oriented protocol
• Character-oriented framing is suitable when
only text is exchanged by the data-link-layers.
• The flag could be selected to be any character
not used for text communication
11
Problems
12. Problems in Character - Oriented
• However, if we send other type of information
(say audio/video), then any pattern used for the
flag can also be part of the information.
• If the flag-pattern appears in the data-section,
the receiver might think that it has reached the
end of the frame.
• Solution: A byte-stuffing is used.
• (Byte stuffing ->character stuffing)
• Byte Stuffing: In byte stuffing, a special byte is
added to the data-section of the frame when
there is a character with the same pattern as the
flag.
12
13. Byte Stuffing
• The data-section is stuffed with an extra byte.
This byte is called the escape character (ESC),
which has a predefined bit pattern.
• When a receiver encounters the ESC character,
the receiver
→ removes ESC character from the data-section
and
→ treats the next character as data, not a
delimiting flag.
13
15. Byte Stuffing and Unstuffing
• Byte stuffing is the process of adding one extra
byte whenever there is a flag or escape character
in the text.
15
16. Bit Oriented Approach
• The data-section of a frame is a sequence of bits
to be interpreted by the upper layer as text,
audio, video, and so on.
• However, in addition to headers and trailers, we
need a delimiter to separate one frame from the
other.
• Most protocols use a special 8-bit pattern flag
01111110 as the delimiter to define the
beginning and the end of the frame
16
17. Frame in Bit – Oriented Protocol
• If the flag-pattern appears in the data-section, the
receiver might think that it has reached the end of the
frame.
• Solution: A bit-stuffing is used.
• In bit stuffing, if a 0 and five consecutive 1 bits are
encountered, an extra 0 is added. This extra stuffed bit
is eventually removed from the data by the receiver.
17
18. Bit Stuffing and Unstuffing
• This guarantees that the flag field sequence does not
inadvertently appear in the frame.
• So, bit stuffing is the process of adding one
extra 0 whenever five consecutive 1s follow a 0
in the data, so that the receiver does not
mistake the pattern 0111110 for a flag
18
19. Flow Control and Error Control
• One of the responsibilities of the DLC sublayer is
flow and error control at the data-link layer.
Flow Control
• Whenever an entity produces data and another
entity consumes them, there should be a balance
between production and consumption rates.
• If the data are produced faster than they can be
consumed, the consumer can be overwhelmed
and may need to discard some dat.
• We need to prevent losing the data at the
consumer site.
19
20. Flow control @ DLL
• At the sending node, the data-link layer tries to
push frames toward the data-link layer at the
receiving node.
• If the receiving node cannot process and deliver
the packet to its network at the same rate that
the frames arrive, it becomes overwhelmed with
frames.
20
21. Flow control @ DLL
• Here, flow control can be feedback from the
receiving node to the sending node to stop or
slow down pushing frames.
Buffers
• Flow control can be implemented by using buffer.
• A buffer is a set of memory locations that can hold
packets at the sender and receiver.
• Normally, two buffers can be used.
• 1) First buffer at the sender.
• 2) Second buffer at the receiver.
21
22. Flow Control & Error Control
• The flow control communication can occur by
sending signals from the consumer to the
producer.
• When the buffer of the receiver is full, it informs
the sender to stop pushing frames.
Error Control
• Error-control includes both error-detection and
error-correction.
• Error-control allows the receiver to inform the
sender of any frames lost/damaged in
transmission.
22
23. Error Control
• A CRC is
→ added to the frame header by the sender and
→ checked by the receiver.
• At the data-link layer, error control is normally
implemented using one of the following two
methods.
1)First method: If the frame is corrupted, it
is discarded;
▫ If the frame is not corrupted, the packet is
delivered to the network layer.
• This method is used mostly in wired LANs such
as Ethernet.
23
24. Error Control
2)Second method: If the frame is corrupted, it
is discarded;
▫ If the frame is not corrupted, an acknowledgment is
sent to the sender.
• Acknowledgment is used for the purpose of both flow
and error control.
Combination of Flow and Error Control
• The acknowledgment that is sent for flow control can also
be used for error control to tell the sender the packet has
arrived uncorrupted.
• The lack of acknowledgment means that there is a problem
in the sent frame.
• A frame that carries an acknowledgment is normally called
an ACK to distinguish it from the data frame.
24
25. 2.4 Data link layer Protocols
• A protocol in data communications is the set of
rules or specifications used to implement one or
more layers of the OSI model.
• Data link protocols are sets of specifications
used to implement the data link layer.
• Traditionally four protocols have been defined
for the data-link layer to deal with flow and error
control: Simple, Stop-and-Wait, Go-Back- N,
and Selective-Repeat.
25
26. Finite State Machine (FSM)
• The behavior of a data-link-layer protocol can be
better shown using Finite State Machine (FSM)
• We have used rounded-corner rectangles to show
states, colored text to show events, and regular
black text to show actions.
26
27. Finite State Machine (FSM)
• An FSM is thought of as a machine with a finite
number of states.
• The machine is always in one of the states until
an event occurs.
• Each event is associated with two reactions:
defining the list of actions to be performed and
determining the next state (which can be the
same as the current state).
• One of the states must be defined as the initial
state, the state in which the machine starts when
it turns on.
27
28. Simple Protocol
• Our first protocol is a simple protocol with
neither flow nor error control.
• We assume that the receiver can immediately
handle any frame it receives. In other words, the
receiver can never be overwhelmed with
incoming frames.
• Below Figure 11.7 shows the layout for this
protocol.
28
29. FSM of Simple Protocol
• The sender site should not send a frame until its network
layer has a message to send.
• The receiver site cannot deliver a message to its network
layer until a frame arrives.
• We can show these requirements using two FSMs. Each
FSM has only one state, the ready state.
• The sending machine remains in the ready state until a
request comes from the network layer.
• When this event occurs, the sending machine
encapsulates the message in a frame and sends it to the
receiving machine.
• The receiving machine remains in the ready state until a
frame arrives from the sending machine.
29
31. Stop and Wait Protocol
• Sender sends one data frame, waits for
acknowledgement (ACK) from receiver before
proceeding to transmit next frame.
• This simple flow control will break down if ACK
gets lost or errors occur then sender may wait
for the ACK that never arrives
31