Computer Interfacing and Protocols

Slides:



Advertisements
Similar presentations
Synchronous Links/Networks Modems are asynchronous - penalized by start bits and stop bits on each character (and dead time) Synchronous Networks recover.
Advertisements

Data Link Protocols(HDLC & PPP). Data Link Protocols The set of specifications used to implement the DLL. DLL Protocols Synchronous Protocols Character-oriented.
William Stallings Data and Computer Communications 7th Edition
The Data Link Layer Chapter 3. Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control.
Data Link Control We want to minimize the amount of error correcting and detecting we need to do.
Framing and Stuffing Advanced Computer Networks. Framing & Stuffing Outline  Synchronous vs Asynchronous Transmissions  Asynchronous Character Transmissions.
Piggybacking A method to combine a data frame with ACK. Station A and B both have data to send. Instead of sending separately, station A sends a data frame.
Data Transmission and Computer Networks
Fundamentals of Computer Networks ECE 478/578 Lecture #3: Encoding and Framing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
The Data Link Layer Chapter 3. Position of the data-link layer.
William Stallings Data and Computer Communications 7 th Edition Chapter 7 Data Link Control Protocols.
The OSI Reference Model
Bit and Byte Stuffing1. 2 Synchronous versus Asynchronous Transmissions There exists a hierarchy of synchronization tasks: –Bit level : recognizing the.
Chapter 9: Data Link Control Business Data Communications, 4e.
Transmission Characteristics 1. Introduction (Information Interchange codes) 2. Asynchronous and Synchronous Transmissions 3. Error detection (bit errors)
Networks: Bit and Byte Stuffing
Computer Networks: Bit and Byte Stuffing 1 Bit and Byte Stuffing.
Chapter 10 Data Link Control Protocols. Agenda Definition Functions Attributes Concepts Types Conversion.
Data Link Protocols Asynchronous Protocols Synchronous Protocols
Gursharan Singh Tatla DATA LINK PROTOCOLS 24-Mar
Computer Networking 网络课件 双语教学 模拟实验 计算机网络教研室 Department of Computer Networking Application CHAPTER 7 DATA LINK CONTROL PROTOCOL 1 The first section 2.
MODULE I NETWORKING CONCEPTS.
UNIT-IV DATA COMMUNICATION TECHNIQUES
CS 640: Introduction to Computer Networks Aditya Akella Lecture 5 - Encoding and Data Link Basics.
EE 122: Encoding And Framing Ion Stoica September 9, 2002.
Chapter 7 Data Link Control & Data Link Protocol By Dr.Sukchatri P.
CSE331: Introduction to Networks and Security Lecture 3 Fall 2002.
Data Link Control Protocols Dr. Muazzam A. Khan. Flow Control Ensuring the sending entity does not overwhelm the receiving entity —Preventing buffer overflow.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Data Link Layer Part I – Designing Issues and Elementary.
Chapter 3 THE DATA LINK LAYER
Computer Networks Chapter 11 – Data Link Control and Protocols.
Chapt 3 Data Link Layer1 Data Link Layer Functions –Provides services to network layer Well-defined interface –Framing –Flow control – between adjacent.
Review:. Chapter 3: The Data Link Layer –achieve reliable, efficient communication between two physically connected machines. –Example problems to be.
Chapter 5 Peer-to-Peer Protocols and Data Link Layer PART I: Peer-to-Peer Protocols ARQ Protocols and Reliable Data Transfer Flow Control.
THE DATA LINK LAYER Chapter 3 1. H YBRID M ODEL The hybrid reference model to be used in this book. 2.
The Data Link Layer Goal –As reliable as possible, efficient communication Point-to-Point –single connection –bits arrive in order sent Not necessarily.
UNIT-II Computer Network Data Link Layer. Data Link Layer Prepared by - ROHIT KOSHTA Data Link Layer is second layer of OSI reference model and is placed.
Computer Networks Module 3: Data Link Layer (Framing) Dr. Vikram Shete St. Francis Institute of Technology.
Layer Two Data Link Layer Collects bits from layer 1 and organizes into frames Passes bits that make up frames to layer 1 for transmission Concerned with.
1 Message Delineation Identify the start and end of messages by: Identify the start and end of messages by:
Chapter -8 Data Link Protocols Asynchronous Protocols Synchronous Protocols Character-Oriented Protocols Bit-Oriented Protocols.
Chapter 11 Data Link Protocols A data link protocol is a set of specifications used to implement the data link layer [A protocol is the set of rules or.
Chapter 11 Data Link Control
Data Link Protocols Prof. Choong Seon HONG.
Data Link Layer: Data Link Control : Data Communication and Computer Networks Asst. Prof. Chaiporn Jaikaeo, Ph.D.
DATA LINK CONTROL PROTOCOLS. 2 Introduction Data link control layer – often abbreviated simply to data link layer – is concerned with the transfer of.
Data Link Protocols ผศ.ดร. อนันต์ ผลเพิ่ม
Point-to-Point Links: Framing
Error Correction and Flow Control Martin Weiss. Slide 2 Objectives of this Meeting u Describe different flow control techniques u Describe the major error.
Framing and Stuffing Advanced Computer Networks. Framing & Stuffing Outline  Synchronous vs Asynchronous Transmissions  Asynchronous Character Transmissions.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 5 Data Link Layer.
1 The Data Link Layer A. S. Tanenbaum Computer Networks W. Stallings Data and Computer Communications Chapter 3.
11.1 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 9: Data Link Control Business Data Communications, 4e.
Data Link Layer.
Data Communications Data Link Layer.
Data Link Control. The two main functions of the data link layer are data link control and media access control. The first, data link control, deals with.
24/11/1013-Datalink1 The Data Link Layer Role Services Functions –Framing –Encapsulation –Addressing –Connection Control –Ordered Delivery –Flow Control.
Getting Connected (Chapter 2 Part 1)
The University of Adelaide, School of Computer Science
UNIT 4 Data Link Control Line Discipline Flow Control Error Control
CIS 321 Data Communications & Networking
CS412 Introduction to Computer Networking & Telecommunication
DATA COMMUNICATION Lecture-39.
Ion Stoica September 6, 2001 EE 122: Lecture 4 Ion Stoica September 6, 2001.
DATA COMMUNICATION Lecture-40.
Flow control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. Error control.
Networks: Bit and Byte Stuffing
Data Link Layer. Position of the data-link layer.
Introduction Communication Modes Transmission Modes
Presentation transcript:

Computer Interfacing and Protocols Data Link Protocols Specifications to implement data link layer Asynchronous Protocols: Primarily used in modems Feature start and stop bits and variable length gaps between characters Synchronous Protocols: Developed for higher speed networks No start and stop bits, much lower overhead, faster transmission Winter 2006 ECE ECE 766 Computer Interfacing and Protocols

Synchronous Protocols Character-oriented protocols: Frames are interpreted as a sequence of characters Example: Binary Synchronous Communication (BSC) Character count-oriented protocols: Frame length specified within the header Example: Digital Data Communication Message Protocol, Count Type (DDCMP) Bit-oriented protocols: Frames are interpreted as a sequence of bits Example: High-Level Data Link Control (HDLC) Winter 2006 ECE ECE 766 Computer Interfacing and Protocols

Computer Interfacing and Protocols BSC Half duplex, can be used with ASCII, EBCDIC, and Six Bit Transcode Control information is in the form of code words taken from the character set Control information is carried in separate frames as well as within data frames Line control, flow control, error control Winter 2006 ECE ECE 766 Computer Interfacing and Protocols

Computer Interfacing and Protocols BSC Data Frames: SYN = (0)0010110 (ASCII 268) Header: Address, sequence number for stop-and-wait ARQ Non-standardized BCC: Block Check Character 1-character LRC 2-character CRC S Y N S O H S T X E T X B C C Header …Data… Winter 2006 ECE ECE 766 Computer Interfacing and Protocols

Computer Interfacing and Protocols BSC Multiblock frame: Multiframe transmission: S Y N S O H S T X I T B B C C Header …Data… E T X Block S Y N S O H S T X I T B B C C Header …Data… E T B A C1 K S Y N S O H S T X I T B B C C Header …Data… E T X A C0 K Winter 2006 ECE ECE 766 Computer Interfacing and Protocols

Computer Interfacing and Protocols BSC Control Frames: Frames used only for signaling SYN SYN {Control Characters} BCC Connection establishment (bid, poll, select, positive and negative responses) Connection termination (end of transmission) Flow and error control (ACK0, ACK1, NAK, WACK (wait and ACK), reverse interrupt, temporary delay) Winter 2006 ECE ECE 766 Computer Interfacing and Protocols

Computer Interfacing and Protocols BSC Data Transparency When sending binary data, certain sequences may be identical to control characters Solution: Define transparent blocks and use character stuffing Start transparent text block with DLE STX End transparent text block with DLE ETX, DLE ITB, DLE ETB To send DLE character, send DLE DLE Winter 2006 ECE ECE 766 Computer Interfacing and Protocols

Computer Interfacing and Protocols DDCMP Character-count-oriented protocol Instead of using control characters to mark the end of the frame, send the length of the frame Can also be used asynchronously What happens when header is damaged? S Y N HEADER Source Dest. MSG Byte Count C R C …Data… Winter 2006 ECE ECE 766 Computer Interfacing and Protocols

Computer Interfacing and Protocols HDLC Bit-oriented protocol Special bit pattern to signal beginning and end of frame (01111110) This pattern cannot be repeated in the frame Solution: Bit stuffing Transmitter automatically stuffs dummy 0 after five 1s If after five 1s the sequence 10 is received, it is the reserved pattern If less than 15 1s are received, it signals abort, otherwise idle channel Flag Address Control Variable length data Check Winter 2006 ECE ECE 766 Computer Interfacing and Protocols