SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Downloaden Sie, um offline zu lesen
1 IEEE standards and Data Link Layer Protocol
IEEE Standards
And
Data Link Layer Protocol
 Data Link Layer : purpose and sub layers
 Functions of DataLink Layer
 IEEE 802 Project : Subgroups & Responsibilities and Standards
 Data Link Layer Protocols
o Elementary Data Link Protocols
o Sliding Window Protocol
o High Level Data Link Control Protocol
2 IEEE standards and Data Link Layer Protocol
Contents
1 Data Link Layer................................................................................................................................................................3
1.1 Purpose of the data link layer.................................................................................................................................3
1.2 Sub Layers of the data link layer.............................................................................................................................3
1.2.1 Logical link control sublayer............................................................................................................................3
1.2.2 Media access control sublayer........................................................................................................................3
2 Functions of DataLink Layer............................................................................................................................................4
3 IEEE 802 Project ..............................................................................................................................................................5
4 Data Link Layer Protocols................................................................................................................................................6
4.1 Elementary Data Link Protocols..............................................................................................................................7
4.1.1 An unrestricted simplex protocol ...................................................................................................................7
4.1.2 A simplex stop-and-wait protocol...................................................................................................................7
4.1.3 A simplex protocol for a noisy channel...........................................................................................................7
4.2 Sliding Window Protocols .......................................................................................................................................8
4.2.1 Piggybacking technique ..................................................................................................................................8
4.2.2 Sliding window................................................................................................................................................9
4.2.3 Pipelining.........................................................................................................................................................9
4.2.4 Protocol 5: Pipelining, Multiple outstanding frames (MaxSeq)....................................................................10
4.2.5 Protocol 6......................................................................................................................................................10
4.3 High Level Link Control (HDLC) Protocol...............................................................................................................11
3 IEEE standards and Data Link Layer Protocol
1 Data Link Layer
1.1 Purpose of the data link layer
Data Link Layer is second layer of OSI Layered Model. This layer is one of the most complicated layers and has
complex functionalities and liabilities. Data link layer hides the details of underlying hardware and represents
itself to upper layer as the medium to communicate.
Data link layer works between two hosts which are directly connected in some sense. This direct connection
could be point to point or broadcast. Systems on broadcast network are said to be on same link. The work of
data link layer tends to get more complex when it is dealing with multiple hosts on single collision domain.
Data link layer is responsible for converting data stream to signals bit by bit and to send that over the underlying
hardware. At the receiving end, Data link layer picks up data from hardware which are in the form of electrical
signals, assembles them in a recognizable frame format, and hands over to upper layer.
1.2 Sub Layers of the data link layer
The data link layer has two sublayers: logical link control (LLC) and media access control (MAC).
1.2.1 Logical link control sublayer
The uppermost sublayer, LLC, multiplexes protocols running atop the data link layer, and optionally provides
flow control, acknowledgment, and error notification. The LLC provides addressing and control of the data link.
It specifies which mechanisms are to be used for addressing stations over the transmission medium and for
controlling the data exchanged between the originator and recipient machines.
1.2.2 Media access control sublayer
MAC may refer to the sublayer that determines who is allowed to access the media at any one time (e.g.
CSMA/CD). Other times it refers to a frame structure delivered based on MAC addresses inside.
There are generally two forms of media access control: distributed and centralized. Both of these may be
compared to communication between people. In a network made up of people speaking, i.e. a conversation, we
look for clues from our fellow talkers to see if any of them appear to be about to speak. If two people speak at
the same time, they will each pause a random amount of time and then attempt to speak again, effectively
establishing a long and elaborate game of saying "no, you first".
The Media Access Control sublayer also determines where one frame of data ends and the next one starts –
frame synchronization. There are four means of frame synchronization: time based, character counting, byte
stuffing and bit stuffing.
1. The time based approach simply puts a specified amount of time between frames. The major drawback of this is
that new gaps can be introduced or old gaps can be lost due to external influences.
4 IEEE standards and Data Link Layer Protocol
2. Character counting simply notes the count of remaining characters in the frame's header. This method,
however, is easily disturbed if this field gets faulty in some way, thus making it hard to keep up synchronization.
3. Byte stuffing precedes the frame with a special byte sequence such as DLE STX and succeeds it with DLE ETX.
Appearances of DLE (byte value 0x10) have to be escaped with another DLE. The start and stop marks are
detected at the receiver and removed as well as the inserted DLE characters.
4. Similarly, bit stuffing replaces these start and end marks with flag consisting of a special bit pattern (e.g. a 0, six
1 bits and a 0). Occurrences of this bit pattern in the data to be transmitted are avoided by inserting a bit. To use
the example where the flag is 01111110, a 0 is inserted after 5 consecutive 1's in the data stream. The flags and
the inserted 0's are removed at the receiving end. This makes for arbitrary long frames and easy synchronization
for the recipient. Note that this stuffed bit is added even if the following data bit is 0, which could not be
mistaken for a sync sequence, so that the receiver can unambiguously distinguish stuffed bits from normal bits.
2 Functions of DataLink Layer
Data link layer does many tasks on behalf of upper layer. These are:
Framing
Data-link layer takes packets from Network Layer and encapsulates them into Frames.Then, it sends
each frame bit-by-bit on the hardware. At receiver’ end, data link layer picks up signals from hardware
and assembles them into frames.
Addressing
Data-link layer provides layer-2 hardware addressing mechanism. Hardware address is assumed to be
unique on the link. It is encoded into hardware at the time of manufacturing.
Synchronization
When data frames are sent on the link, both machines must be synchronized in order to transfer to take
place.
Error Control
Sometimes signals may have encountered problem in transition and the bits are flipped.These errors are
detected and attempted to recover actual data bits. It also provides error reporting mechanism to the
sender.
Flow Control
5 IEEE standards and Data Link Layer Protocol
Stations on same link may have different speed or capacity. Data-link layer ensures flow control that
enables both machine to exchange data on same speed.
Multi-Access
When host on the shared link tries to transfer the data, it has a high probability of collision. Data-link
layer provides mechanism such as CSMA/CD to equip capability of accessing a shared media among
multiple Systems.
3 IEEE 802 Project
Project 802 is a set of networking standards and procedures for implementing networks, and creating network
related equipment. As long as manufacturers of networking equipment follow the same standards, then
interoperability and compatibility across multiple platforms and network systems will remain high. The IEEE
(institute of Electrical and Electronics Engineers) designed Project 802 and it became a standard in 1983. 802
actually stands for the date of Project 802’s inception, which was February of 1980, hence 802. The project
mostly covers physical media aspects of networking, such as cabling, attachments, hardware recommendations,
and some logical networking aspects as well.
A list of the 802 Networking Standards and uses:
802.1: Internetworking. Covers routers, bridging, switches, and other internetworking communications
standards and equipment.
802.2: Logical Link Control. Covers the properties and standards of physical media interoperability, such as with
network interface cards, attachment and cabling media.
802.3: Ethernet: Covers standards and specifications of implementing Ethernet networks.
802.4: Token Bus LAN: Covers forms of physical media that work with the Token Bus Networking topology.
802.5: Token Ring LAN: Covers forms of physical media that work with the Token Ring Topology
802.6: Metropolitan Area Networks: Covers the procedures and implementation procedures for managing large
networks.
802.7: Broadband Technical Advisory Group: Covers broadband networking media concepts and procedures.
6 IEEE standards and Data Link Layer Protocol
802.8: Fiber Optic Technical Advisory Group: Covers the standards and procedures for Digital Optical
networking.
802.9: Integrated Voice and Data Networks: Covers the procedures for integrating voice and data over networks.
902.10: Network Security: Covers the standards and procedures for securing networks logically (software level),
and physically (Hardware level). Includes information concerning encryption standards for both wired and
wireless networking models. Also, covers procedures for authentication and software implementation of
security practices across networking media.
802.11: Wireless Networking: Covers the procedures, specifications, and implementation of wireless networks.
(More info on 802.11 radio frequency specifications under our wireless networking tutorials).
802.12: High Speed Networking: Covers the planning and implementation of high data rate networking
technologies (such as Gigabit Ethernet).
802.13: Not Currently In Use.
802.14: Defunct Working Group: Covers specifications for implementing data transmissions of cable television
networks.
802.15: Wireless Personal Area Networks: Covers the standards for short range wireless networking, such as
used with blue tooth devices.
802.16: Wireless Metropolitan Area Networks: Covers the planning, implementation, and procedures for
managing large city wide wireless networks. These have become quite common in Nevada, Oregon, and
California. San Francisco has WIMAX wireless networking coverage.
802.17: Resilient Packet Ring: Covers emerging standards for Ring topology based networking.
802.18: Wireless Advisory Group: Consists of wireless technical advisory group that monitors the standards of
radio based communications.
802.19: Coexistance Advisory Group: creates standards and procedures for developing hardware and software
based networking technology that implies backward compatibility with older networking equipment and
standards. Also works to implement new networking technology compatibility between major hardware
resources.
802.20: Mobile Broadband Wireless: Implements specifications, plans, and procedures for managing 4th
generation wireless networks. This includes, smart phones, mobile broadband wireless devices, etc.
4 Data Link Layer Protocols
7 IEEE standards and Data Link Layer Protocol
4.1 Elementary Data Link Protocols
4.1.1 An unrestricted simplex protocol
In order to appreciate the step by step development of efficient and complex protocols such as SDLC, HDLC etc.,
we will begin with a simple but unrealistic protocol. In this protocol:
 Data are transmitted in one direction only
 The transmitting (Tx) and receiving (Rx) hosts are always ready
 Processing time can be ignored
 Infinite buffer space is available
 No errors occur; i.e. no damaged frames and no lost frames (perfect channel)
4.1.2 A simplex stop-and-wait protocol
In this protocol we assume that
 Data are transmitted in one direction only
 No errors occur (perfect channel)
 The receiver can only process the received information at a finite rate
These assumptions imply that the transmitter cannot send frames at a rate faster than the receiver can process
them. The problem here is how to prevent the sender from flooding the receiver.
A general solution to this problem is to have the receiver provide some sort of feedback to the sender. The
process could be as follows: The receiver send an acknowledge frame back to the sender telling the sender that
the last received frame has been processed and passed to the host; permission to send the next frame is
granted. The sender, after having sent a frame, must wait for the acknowledge frame from the receiver before
sending another frame. This protocol is known as stop-and-wait.
4.1.3 A simplex protocol for a noisy channel
In this protocol the unreal "error free" assumption in protocol 2 is dropped. Frames may be either damaged or
lost completely. We assume that transmission errors in the frame are detected by the hardware checksum.
One suggestion is that the sender would send a frame, the receiver would send an ACK frame only if the frame is
received correctly. If the frame is in error the receiver simply ignores it; the transmitter would time out and
would retransmit it.
One fatal flaw with the above scheme is that if the ACK frame is lost or damaged, duplicate frames are accepted
at the receiver without the receiver knowing it.
Imagine a situation where the receiver has just sent an ACK frame back to the sender saying that it correctly
received and already passed a frame to its host. However, the ACK frame gets lost completely, the sender times
8 IEEE standards and Data Link Layer Protocol
out and retransmits the frame. There is no way for the receiver to tell whether this frame is a retransmitted
frame or a new frame, so the receiver accepts this duplicate happily and transfers it to the host. The protocol
thus fails in this aspect.
To overcome this problem it is required that the receiver be able to distinguish a frame that it is seeing for the
first time from a retransmission. One way to achieve this is to have the sender put a sequence number in the
header of each frame it sends. The receiver then can check the sequence number of each arriving frame to see if
it is a new frame or a duplicate to be discarded.
The receiver needs to distinguish only 2 possibilities: a new frame or a duplicate; a 1-bit sequence number is
sufficient. At any instant the receiver expects a particular sequence number. Any wrong sequence numbered
frame arriving at the receiver is rejected as a duplicate. A correctly numbered frame arriving at the receiver is
accepted, passed to the host, and the expected sequence number is incremented by 1 (modulo 2).
This protocol can handle lost frames by timing out. The timeout interval has to be long enough to prevent
premature timeouts which could cause a "deadlock" situation.
4.2 Sliding Window Protocols
4.2.1 Piggybacking technique
In most practical situations there is a need for transmitting data in both directions (i.e. between 2 computers). A
full duplex circuit is required for the operation.
If protocol 2 or 3 is used in these situations the data frames and ACK (control) frames in the reverse direction
have to be interleaved. This method is acceptable but not efficient. An efficient method is to absorb the ACK
frame into the header of the data frame going in the same direction. This technique is known as piggybacking.
When a data frame arrives at an IMP (receiver or station), instead of immediately sending a separate ACK frame,
the IMP restrains itself and waits until the host passes it the next message. The acknowledgement is then
attached to the outgoing data frame using the ACK field in the frame header. In effect, the acknowledgement
gets a free ride in the next outgoing data frame.
This technique makes better use of the channel bandwidth. The ACK field costs only a few bits, whereas a
separate frame would need a header, the acknowledgement, and a checksum.
An issue arising here is the time period that the IMP waits for a message onto which to piggyback the ACK.
Obviously the IMP cannot wait forever and there is no way to tell exactly when the next message is available.
For these reasons the waiting period is usually a fixed period. If a new host packet arrives quickly the
acknowledgement is piggybacked onto it; otherwise, the IMP just sends a separate ACK frame.
9 IEEE standards and Data Link Layer Protocol
4.2.2 Sliding window
When one host sends traffic to another it is desirable that the traffic should arrive in the same sequence as that
in which it is dispatched. It is also desirable that a data link should deliver frames in the order sent.
A flexible concept of sequencing is referred to as the sliding window concept and the next three protocols are all
sliding window protocols.
In all sliding window protocols, each outgoing frame contains a sequence number SN ranging from 0 to 2^(n -
1)(where n is the number of bits reserved for the sequence number field).
At any instant of time the sender maintains a list of consecutive sequence numbers corresponding to frames it is
permitted to send. These frames are said to fall within the sending window. Similarly, the receiver maintains a
receiving window corresponding to frames it is permitted to accept.
The size of the window relates to the available buffers of a receiving or sending node at which frames may be
arranged into sequence.
At the receiving node, any frame falling outside the window is discarded. Frames falling within the receiving
window are accepted and arranged into sequence. Once sequenced, the frames at the left of the window are
delivered to the host and an acknowledgement of the delivered frames is transmitted to their sender. The
window is then rotated to the position where the left edge corresponds to the next expected frame, RN.
Whenever a new frame arrives from the host, it is given the next highest sequence number, and the upper edge
of the sending window is advanced by one. The sequence numbers within the sender's window represent
frames sent but as yet not acknowledged. When an acknowledgement comes in, it gives the position of the
receiving left window edge which indicates what frame the receiver expects to receive next. The sender then
rotates its window to this position, thus making buffers available for continuous transmission.
4.2.3 Pipelining
In many situations the long round-trip time can have important implications for the efficiency of the bandwidth
utilisation.
As an example, consider a satellite channel with a 500ms round-trip propagation delay. At time t~~=0 the
sender starts sending the first frame. Not until at least t~>=~500 ms has the acknowledgement arrived back at
the sender. This means that the sender was blocked most of the time causing a reduction in efficiency.
As another example, if the link is operated in a two-way alternating mode (half-duplex), the line might have to
be "turned around" for each frame in order to receive an acknowledgement. This acknowledgement delay could
severely impact the effective data transfer rate.
The effects of these problems can be overcome by allowing the sender to transmit multiple contiguous frames
(say up to w frames) before it receives an acknowledgement. This technique is known as pipelining.
10 IEEE standards and Data Link Layer Protocol
In the satellite example, with a channel capacity of 50kbps and 1000-bit frames, by the time the sender has
finished sending 26 frames, t~=~520 ms, the acknowledgement for frame 0 will have just arrived, allowing the
sender to continue sending frames. At all times, 25 or 26 unacknowledged frames will be outstanding, and the
sender's window size needs to be at least 26.
Pipelining frames over an unreliable communication channel raises some serious issues. What happens if a
frame in the middle of a long stream is damaged or lost? What should the receiver do with all the correct frames
following the bad one?
The are two basic Automatic Request for Repeat (ARQ) methods for dealing with errors in the presence of
pipelining.
One method, the normal mode of ARQ is called Go-back-N. If the receiver detects any error in frame N, it signals
the sender and then discards any subsequent frame.
The sender, which may currently be sending frame N+X when the error signal is detected, initiates
retransmission of frame N and all subsequent frames.
The other method is called selective reject. In this method the receiver stores all the correct frames following
the bad one. When the sender finally notices what was wrong, it just retransmits the one bad frame, not all its
successors.
4.2.4 Protocol 5: Pipelining, Multiple outstanding frames (MaxSeq)
In this protocol, the sender may transmit up to MaxSeq frames without waiting for an acknowledgement. In
addition, unlike the previous protocols, the host is not assumed to have a new message all the time. Instead, the
host causes host ready events when there is a message to send.
4.2.5 Protocol 6
This protocol employs the selective reject technique. The protocol does not discard good frames because an
earlier frame was damaged or lost provided that these good frames fall within the receiving window.
Associated with each outstanding frame is a timer. When the timer goes off, (or when the transmitter is notified
of any error), only that one frame is retransmitted, not all the outstanding frames, as in protocol 5.
In this protocol, the receiver's window size is fixed, the maximum of which is (MaxSeq+1)/2 . The maximum
number is thus chosen to ensure that there will not be an overlapping between the new window and the
previous window. The overlapping of windows means that the receiver would not be able to differentiate
between a new frame and a retransmitted frame.
The receiver has a buffer reserved for each sequence number within its window. Whenever a frame arrives, its
sequence number is checked to see if it falls within the receiver's window. If so, and if it has not already been
received, it is accepted and stored regardless of whether or not it is the next frame expected by the host.
Frames passed to the host must always be in order.
Protocol 6 is more efficient than protocol 5 in that:
11 IEEE standards and Data Link Layer Protocol
 Protocol 6 employs an auxiliary timer to prevent delay in piggybacking. If no reverse traffic has
presented itself before the timer goes off, a separate acknowledgement is sent.
 Whenever the receiver has reason to suspect that an error has occured it sends a negative
acknowledgement (NAK) frame back to the sender. Such a frame is a request for retransmission of the
frame specified in the NAK.
4.3 High Level Link Control (HDLC) Protocol
The HDLC protocol is a general purpose protocol which operates at the data link layer of the OSI reference
model. The protocol uses the services of a physical layer, and provides either a best effort or reliable
communications path between the transmitter and receiver (i.e. with acknowledged data transfer). The type of
service provided depends upon the HDLC mode which is used.
Each piece of data is encapsulated in an HDLC frame by adding a trailer and a header. The header contains an
HDLC address and an HDLC control field. The trailer is found at the end of the frame, and contains a Cyclic
Redundancy Check (CRC) which detects any errors which may occur during transmission. The frames are
separated by HDLC flag sequences which are transmitted between each frame and whenever there is no data to
be transmitted.

Weitere Àhnliche Inhalte

Was ist angesagt?

Framing in data link layer
Framing in data link layerFraming in data link layer
Framing in data link layerAhtesham Ullah khan
 
Socket programming
Socket programmingSocket programming
Socket programmingharsh_bca06
 
Unit 2 data link control
Unit 2 data link controlUnit 2 data link control
Unit 2 data link controlVishal kakade
 
Distributed dbms architectures
Distributed dbms architecturesDistributed dbms architectures
Distributed dbms architecturesPooja Dixit
 
Media Access Control
Media Access ControlMedia Access Control
Media Access ControlVijayaLakshmi514
 
Data link layer
Data link layer Data link layer
Data link layer Mukesh Chinta
 
The mac layer
The mac layerThe mac layer
The mac layeraazamk
 
Guided Transmission Media
Guided  Transmission MediaGuided  Transmission Media
Guided Transmission MediaRajapriya82
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocolAung Thu Rha Hein
 
Connection Establishment & Flow and Congestion Control
Connection Establishment & Flow and Congestion ControlConnection Establishment & Flow and Congestion Control
Connection Establishment & Flow and Congestion ControlAdeel Rasheed
 
RANDOM ACCESS PROTOCOL IN COMMUNICATION
RANDOM ACCESS PROTOCOL IN COMMUNICATION           RANDOM ACCESS PROTOCOL IN COMMUNICATION
RANDOM ACCESS PROTOCOL IN COMMUNICATION AMOGHA A K
 
Introduction to Data-Link Layer
Introduction to Data-Link LayerIntroduction to Data-Link Layer
Introduction to Data-Link LayerAbdullaziz Tagawy
 
Dynamic storage allocation techniques in Compiler design
Dynamic storage allocation techniques in Compiler designDynamic storage allocation techniques in Compiler design
Dynamic storage allocation techniques in Compiler designkunjan shah
 
Network Layer
Network LayerNetwork Layer
Network LayerGhaffar Khan
 
Error Detection and Correction
Error Detection and CorrectionError Detection and Correction
Error Detection and CorrectionTechiNerd
 
IPV4 Frame Format
IPV4 Frame FormatIPV4 Frame Format
IPV4 Frame FormatAditya Rawat
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layerNaiyan Noor
 

Was ist angesagt? (20)

Framing in data link layer
Framing in data link layerFraming in data link layer
Framing in data link layer
 
Socket programming
Socket programmingSocket programming
Socket programming
 
Unit 2 data link control
Unit 2 data link controlUnit 2 data link control
Unit 2 data link control
 
Distributed dbms architectures
Distributed dbms architecturesDistributed dbms architectures
Distributed dbms architectures
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
Data link layer
Data link layer Data link layer
Data link layer
 
process creation OS
process creation OSprocess creation OS
process creation OS
 
The mac layer
The mac layerThe mac layer
The mac layer
 
Guided Transmission Media
Guided  Transmission MediaGuided  Transmission Media
Guided Transmission Media
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
 
Connection Establishment & Flow and Congestion Control
Connection Establishment & Flow and Congestion ControlConnection Establishment & Flow and Congestion Control
Connection Establishment & Flow and Congestion Control
 
RANDOM ACCESS PROTOCOL IN COMMUNICATION
RANDOM ACCESS PROTOCOL IN COMMUNICATION           RANDOM ACCESS PROTOCOL IN COMMUNICATION
RANDOM ACCESS PROTOCOL IN COMMUNICATION
 
Introduction to Data-Link Layer
Introduction to Data-Link LayerIntroduction to Data-Link Layer
Introduction to Data-Link Layer
 
Dynamic storage allocation techniques in Compiler design
Dynamic storage allocation techniques in Compiler designDynamic storage allocation techniques in Compiler design
Dynamic storage allocation techniques in Compiler design
 
computer network OSI layer
computer network OSI layercomputer network OSI layer
computer network OSI layer
 
SSL TLS Protocol
SSL TLS ProtocolSSL TLS Protocol
SSL TLS Protocol
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Error Detection and Correction
Error Detection and CorrectionError Detection and Correction
Error Detection and Correction
 
IPV4 Frame Format
IPV4 Frame FormatIPV4 Frame Format
IPV4 Frame Format
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 

Andere mochten auch

Tcp and introduction to protocol
Tcp and introduction to protocolTcp and introduction to protocol
Tcp and introduction to protocolSripati Mahapatra
 
CCNA Exploration 1 - Chapter 8
CCNA Exploration 1 - Chapter 8CCNA Exploration 1 - Chapter 8
CCNA Exploration 1 - Chapter 8Irsandi Hasan
 
Osi model with neworking overview
Osi model with neworking overviewOsi model with neworking overview
Osi model with neworking overviewSripati Mahapatra
 
OSI(Open System Interconnection) model
OSI(Open System Interconnection) modelOSI(Open System Interconnection) model
OSI(Open System Interconnection) modelNamra Afzal
 
CCNA Exploration 1 - Chapter 5
CCNA Exploration 1 - Chapter 5CCNA Exploration 1 - Chapter 5
CCNA Exploration 1 - Chapter 5Irsandi Hasan
 
Lan Ethernet Fddi 03 Format
Lan Ethernet Fddi  03 FormatLan Ethernet Fddi  03 Format
Lan Ethernet Fddi 03 Formatanishgoel
 
Networking and Data Communications
Networking and Data CommunicationsNetworking and Data Communications
Networking and Data Communicationskuramartin
 
oil gas industry guidelines | Michael Bowen
 oil gas industry guidelines | Michael Bowen oil gas industry guidelines | Michael Bowen
oil gas industry guidelines | Michael BowenMichael Bowen oil and gas
 
OSI Physical Layer
OSI Physical LayerOSI Physical Layer
OSI Physical LayerSachii Dosti
 
13 Wired Lans_Ethernet
13 Wired Lans_Ethernet13 Wired Lans_Ethernet
13 Wired Lans_EthernetAhmar Hashmi
 
DDL and Physical Layer
DDL and Physical LayerDDL and Physical Layer
DDL and Physical LayerSatyendra Mohan
 
17 SONET/SDH
17 SONET/SDH17 SONET/SDH
17 SONET/SDHAhmar Hashmi
 
Data Link Layer
Data Link LayerData Link Layer
Data Link LayerRutwik Jadhav
 
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPTGROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPTKrishbathija
 
IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5Vicky Kumar
 
HDLC(high level data link control)
HDLC(high level data link control)HDLC(high level data link control)
HDLC(high level data link control)Anand Biradar
 

Andere mochten auch (20)

Tcp and introduction to protocol
Tcp and introduction to protocolTcp and introduction to protocol
Tcp and introduction to protocol
 
CCNA Exploration 1 - Chapter 8
CCNA Exploration 1 - Chapter 8CCNA Exploration 1 - Chapter 8
CCNA Exploration 1 - Chapter 8
 
Osi model with neworking overview
Osi model with neworking overviewOsi model with neworking overview
Osi model with neworking overview
 
OSI(Open System Interconnection) model
OSI(Open System Interconnection) modelOSI(Open System Interconnection) model
OSI(Open System Interconnection) model
 
Mod8
Mod8Mod8
Mod8
 
CCNA Exploration 1 - Chapter 5
CCNA Exploration 1 - Chapter 5CCNA Exploration 1 - Chapter 5
CCNA Exploration 1 - Chapter 5
 
Lan Ethernet Fddi 03 Format
Lan Ethernet Fddi  03 FormatLan Ethernet Fddi  03 Format
Lan Ethernet Fddi 03 Format
 
Error control
Error controlError control
Error control
 
Networking and Data Communications
Networking and Data CommunicationsNetworking and Data Communications
Networking and Data Communications
 
oil gas industry guidelines | Michael Bowen
 oil gas industry guidelines | Michael Bowen oil gas industry guidelines | Michael Bowen
oil gas industry guidelines | Michael Bowen
 
OSI Physical Layer
OSI Physical LayerOSI Physical Layer
OSI Physical Layer
 
Datalinklayer tanenbaum
Datalinklayer tanenbaumDatalinklayer tanenbaum
Datalinklayer tanenbaum
 
13 Wired Lans_Ethernet
13 Wired Lans_Ethernet13 Wired Lans_Ethernet
13 Wired Lans_Ethernet
 
DDL and Physical Layer
DDL and Physical LayerDDL and Physical Layer
DDL and Physical Layer
 
17 SONET/SDH
17 SONET/SDH17 SONET/SDH
17 SONET/SDH
 
Data Link Layer
Data Link LayerData Link Layer
Data Link Layer
 
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPTGROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
GROUP03_AMAK:ERROR DETECTION AND CORRECTION PPT
 
Hdlc
HdlcHdlc
Hdlc
 
IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5
 
HDLC(high level data link control)
HDLC(high level data link control)HDLC(high level data link control)
HDLC(high level data link control)
 

Ähnlich wie IEEE standards and Data Link Layer Protocol

OSI model (7 layer )
OSI model (7 layer ) OSI model (7 layer )
OSI model (7 layer ) dimuthu22
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSDr. SELVAGANESAN S
 
unit2-210710110327.pdf
unit2-210710110327.pdfunit2-210710110327.pdf
unit2-210710110327.pdfssuser3aa461
 
OSI &TCP/IP Model
OSI &TCP/IP ModelOSI &TCP/IP Model
OSI &TCP/IP ModelShamima Akther
 
Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelJacqueline Thomas
 
Automation and Robotics 20ME51I Week 3 Theory Notes.pdf
Automation and Robotics 20ME51I Week 3 Theory Notes.pdfAutomation and Robotics 20ME51I Week 3 Theory Notes.pdf
Automation and Robotics 20ME51I Week 3 Theory Notes.pdfGandhibabu8
 
seven layer OSI model
seven layer OSI modelseven layer OSI model
seven layer OSI modelManjeet MN
 
Network Advantages And Disadvantages
Network Advantages And DisadvantagesNetwork Advantages And Disadvantages
Network Advantages And DisadvantagesRenee Jones
 
Chapter 2. vantage understanding sensor placement in networks
Chapter 2. vantage  understanding sensor placement in networksChapter 2. vantage  understanding sensor placement in networks
Chapter 2. vantage understanding sensor placement in networksPhu Nguyen
 
computer network NCC l4dc assingment
computer network NCC l4dc assingment computer network NCC l4dc assingment
computer network NCC l4dc assingment David Parker
 
Unit 3 - Data Link Layer - Part A
Unit 3 - Data Link Layer - Part AUnit 3 - Data Link Layer - Part A
Unit 3 - Data Link Layer - Part AChandan Gupta Bhagat
 
Wp simoneau osi_model
Wp simoneau osi_modelWp simoneau osi_model
Wp simoneau osi_modelJagadish Gurrala
 
C C N A Day1
C C N A  Day1C C N A  Day1
C C N A Day1darulquthni
 
CN R16 -UNIT-3.pdf
CN R16 -UNIT-3.pdfCN R16 -UNIT-3.pdf
CN R16 -UNIT-3.pdfJoshuaeeda1
 
Networking (osi model)
Networking (osi model)Networking (osi model)
Networking (osi model)Pooja Bhojwani
 

Ähnlich wie IEEE standards and Data Link Layer Protocol (20)

OSI model (7 layer )
OSI model (7 layer ) OSI model (7 layer )
OSI model (7 layer )
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
unit2-210710110327.pdf
unit2-210710110327.pdfunit2-210710110327.pdf
unit2-210710110327.pdf
 
OSI &TCP/IP Model
OSI &TCP/IP ModelOSI &TCP/IP Model
OSI &TCP/IP Model
 
Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi Model
 
Automation and Robotics 20ME51I Week 3 Theory Notes.pdf
Automation and Robotics 20ME51I Week 3 Theory Notes.pdfAutomation and Robotics 20ME51I Week 3 Theory Notes.pdf
Automation and Robotics 20ME51I Week 3 Theory Notes.pdf
 
CCNA Report
CCNA ReportCCNA Report
CCNA Report
 
seven layer OSI model
seven layer OSI modelseven layer OSI model
seven layer OSI model
 
Network Advantages And Disadvantages
Network Advantages And DisadvantagesNetwork Advantages And Disadvantages
Network Advantages And Disadvantages
 
Chapter 2. vantage understanding sensor placement in networks
Chapter 2. vantage  understanding sensor placement in networksChapter 2. vantage  understanding sensor placement in networks
Chapter 2. vantage understanding sensor placement in networks
 
computer network NCC l4dc assingment
computer network NCC l4dc assingment computer network NCC l4dc assingment
computer network NCC l4dc assingment
 
Unit 3 - Data Link Layer - Part A
Unit 3 - Data Link Layer - Part AUnit 3 - Data Link Layer - Part A
Unit 3 - Data Link Layer - Part A
 
Wp simoneau osi_model
Wp simoneau osi_modelWp simoneau osi_model
Wp simoneau osi_model
 
C C N A Day1
C C N A  Day1C C N A  Day1
C C N A Day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
CN R16 -UNIT-3.pdf
CN R16 -UNIT-3.pdfCN R16 -UNIT-3.pdf
CN R16 -UNIT-3.pdf
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Networking (osi model)
Networking (osi model)Networking (osi model)
Networking (osi model)
 
Ccna notes
Ccna notesCcna notes
Ccna notes
 

KĂŒrzlich hochgeladen

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...gurkirankumar98700
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

KĂŒrzlich hochgeladen (20)

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

IEEE standards and Data Link Layer Protocol

  • 1. 1 IEEE standards and Data Link Layer Protocol IEEE Standards And Data Link Layer Protocol  Data Link Layer : purpose and sub layers  Functions of DataLink Layer  IEEE 802 Project : Subgroups & Responsibilities and Standards  Data Link Layer Protocols o Elementary Data Link Protocols o Sliding Window Protocol o High Level Data Link Control Protocol
  • 2. 2 IEEE standards and Data Link Layer Protocol Contents 1 Data Link Layer................................................................................................................................................................3 1.1 Purpose of the data link layer.................................................................................................................................3 1.2 Sub Layers of the data link layer.............................................................................................................................3 1.2.1 Logical link control sublayer............................................................................................................................3 1.2.2 Media access control sublayer........................................................................................................................3 2 Functions of DataLink Layer............................................................................................................................................4 3 IEEE 802 Project ..............................................................................................................................................................5 4 Data Link Layer Protocols................................................................................................................................................6 4.1 Elementary Data Link Protocols..............................................................................................................................7 4.1.1 An unrestricted simplex protocol ...................................................................................................................7 4.1.2 A simplex stop-and-wait protocol...................................................................................................................7 4.1.3 A simplex protocol for a noisy channel...........................................................................................................7 4.2 Sliding Window Protocols .......................................................................................................................................8 4.2.1 Piggybacking technique ..................................................................................................................................8 4.2.2 Sliding window................................................................................................................................................9 4.2.3 Pipelining.........................................................................................................................................................9 4.2.4 Protocol 5: Pipelining, Multiple outstanding frames (MaxSeq)....................................................................10 4.2.5 Protocol 6......................................................................................................................................................10 4.3 High Level Link Control (HDLC) Protocol...............................................................................................................11
  • 3. 3 IEEE standards and Data Link Layer Protocol 1 Data Link Layer 1.1 Purpose of the data link layer Data Link Layer is second layer of OSI Layered Model. This layer is one of the most complicated layers and has complex functionalities and liabilities. Data link layer hides the details of underlying hardware and represents itself to upper layer as the medium to communicate. Data link layer works between two hosts which are directly connected in some sense. This direct connection could be point to point or broadcast. Systems on broadcast network are said to be on same link. The work of data link layer tends to get more complex when it is dealing with multiple hosts on single collision domain. Data link layer is responsible for converting data stream to signals bit by bit and to send that over the underlying hardware. At the receiving end, Data link layer picks up data from hardware which are in the form of electrical signals, assembles them in a recognizable frame format, and hands over to upper layer. 1.2 Sub Layers of the data link layer The data link layer has two sublayers: logical link control (LLC) and media access control (MAC). 1.2.1 Logical link control sublayer The uppermost sublayer, LLC, multiplexes protocols running atop the data link layer, and optionally provides flow control, acknowledgment, and error notification. The LLC provides addressing and control of the data link. It specifies which mechanisms are to be used for addressing stations over the transmission medium and for controlling the data exchanged between the originator and recipient machines. 1.2.2 Media access control sublayer MAC may refer to the sublayer that determines who is allowed to access the media at any one time (e.g. CSMA/CD). Other times it refers to a frame structure delivered based on MAC addresses inside. There are generally two forms of media access control: distributed and centralized. Both of these may be compared to communication between people. In a network made up of people speaking, i.e. a conversation, we look for clues from our fellow talkers to see if any of them appear to be about to speak. If two people speak at the same time, they will each pause a random amount of time and then attempt to speak again, effectively establishing a long and elaborate game of saying "no, you first". The Media Access Control sublayer also determines where one frame of data ends and the next one starts – frame synchronization. There are four means of frame synchronization: time based, character counting, byte stuffing and bit stuffing. 1. The time based approach simply puts a specified amount of time between frames. The major drawback of this is that new gaps can be introduced or old gaps can be lost due to external influences.
  • 4. 4 IEEE standards and Data Link Layer Protocol 2. Character counting simply notes the count of remaining characters in the frame's header. This method, however, is easily disturbed if this field gets faulty in some way, thus making it hard to keep up synchronization. 3. Byte stuffing precedes the frame with a special byte sequence such as DLE STX and succeeds it with DLE ETX. Appearances of DLE (byte value 0x10) have to be escaped with another DLE. The start and stop marks are detected at the receiver and removed as well as the inserted DLE characters. 4. Similarly, bit stuffing replaces these start and end marks with flag consisting of a special bit pattern (e.g. a 0, six 1 bits and a 0). Occurrences of this bit pattern in the data to be transmitted are avoided by inserting a bit. To use the example where the flag is 01111110, a 0 is inserted after 5 consecutive 1's in the data stream. The flags and the inserted 0's are removed at the receiving end. This makes for arbitrary long frames and easy synchronization for the recipient. Note that this stuffed bit is added even if the following data bit is 0, which could not be mistaken for a sync sequence, so that the receiver can unambiguously distinguish stuffed bits from normal bits. 2 Functions of DataLink Layer Data link layer does many tasks on behalf of upper layer. These are: Framing Data-link layer takes packets from Network Layer and encapsulates them into Frames.Then, it sends each frame bit-by-bit on the hardware. At receiver’ end, data link layer picks up signals from hardware and assembles them into frames. Addressing Data-link layer provides layer-2 hardware addressing mechanism. Hardware address is assumed to be unique on the link. It is encoded into hardware at the time of manufacturing. Synchronization When data frames are sent on the link, both machines must be synchronized in order to transfer to take place. Error Control Sometimes signals may have encountered problem in transition and the bits are flipped.These errors are detected and attempted to recover actual data bits. It also provides error reporting mechanism to the sender. Flow Control
  • 5. 5 IEEE standards and Data Link Layer Protocol Stations on same link may have different speed or capacity. Data-link layer ensures flow control that enables both machine to exchange data on same speed. Multi-Access When host on the shared link tries to transfer the data, it has a high probability of collision. Data-link layer provides mechanism such as CSMA/CD to equip capability of accessing a shared media among multiple Systems. 3 IEEE 802 Project Project 802 is a set of networking standards and procedures for implementing networks, and creating network related equipment. As long as manufacturers of networking equipment follow the same standards, then interoperability and compatibility across multiple platforms and network systems will remain high. The IEEE (institute of Electrical and Electronics Engineers) designed Project 802 and it became a standard in 1983. 802 actually stands for the date of Project 802’s inception, which was February of 1980, hence 802. The project mostly covers physical media aspects of networking, such as cabling, attachments, hardware recommendations, and some logical networking aspects as well. A list of the 802 Networking Standards and uses: 802.1: Internetworking. Covers routers, bridging, switches, and other internetworking communications standards and equipment. 802.2: Logical Link Control. Covers the properties and standards of physical media interoperability, such as with network interface cards, attachment and cabling media. 802.3: Ethernet: Covers standards and specifications of implementing Ethernet networks. 802.4: Token Bus LAN: Covers forms of physical media that work with the Token Bus Networking topology. 802.5: Token Ring LAN: Covers forms of physical media that work with the Token Ring Topology 802.6: Metropolitan Area Networks: Covers the procedures and implementation procedures for managing large networks. 802.7: Broadband Technical Advisory Group: Covers broadband networking media concepts and procedures.
  • 6. 6 IEEE standards and Data Link Layer Protocol 802.8: Fiber Optic Technical Advisory Group: Covers the standards and procedures for Digital Optical networking. 802.9: Integrated Voice and Data Networks: Covers the procedures for integrating voice and data over networks. 902.10: Network Security: Covers the standards and procedures for securing networks logically (software level), and physically (Hardware level). Includes information concerning encryption standards for both wired and wireless networking models. Also, covers procedures for authentication and software implementation of security practices across networking media. 802.11: Wireless Networking: Covers the procedures, specifications, and implementation of wireless networks. (More info on 802.11 radio frequency specifications under our wireless networking tutorials). 802.12: High Speed Networking: Covers the planning and implementation of high data rate networking technologies (such as Gigabit Ethernet). 802.13: Not Currently In Use. 802.14: Defunct Working Group: Covers specifications for implementing data transmissions of cable television networks. 802.15: Wireless Personal Area Networks: Covers the standards for short range wireless networking, such as used with blue tooth devices. 802.16: Wireless Metropolitan Area Networks: Covers the planning, implementation, and procedures for managing large city wide wireless networks. These have become quite common in Nevada, Oregon, and California. San Francisco has WIMAX wireless networking coverage. 802.17: Resilient Packet Ring: Covers emerging standards for Ring topology based networking. 802.18: Wireless Advisory Group: Consists of wireless technical advisory group that monitors the standards of radio based communications. 802.19: Coexistance Advisory Group: creates standards and procedures for developing hardware and software based networking technology that implies backward compatibility with older networking equipment and standards. Also works to implement new networking technology compatibility between major hardware resources. 802.20: Mobile Broadband Wireless: Implements specifications, plans, and procedures for managing 4th generation wireless networks. This includes, smart phones, mobile broadband wireless devices, etc. 4 Data Link Layer Protocols
  • 7. 7 IEEE standards and Data Link Layer Protocol 4.1 Elementary Data Link Protocols 4.1.1 An unrestricted simplex protocol In order to appreciate the step by step development of efficient and complex protocols such as SDLC, HDLC etc., we will begin with a simple but unrealistic protocol. In this protocol:  Data are transmitted in one direction only  The transmitting (Tx) and receiving (Rx) hosts are always ready  Processing time can be ignored  Infinite buffer space is available  No errors occur; i.e. no damaged frames and no lost frames (perfect channel) 4.1.2 A simplex stop-and-wait protocol In this protocol we assume that  Data are transmitted in one direction only  No errors occur (perfect channel)  The receiver can only process the received information at a finite rate These assumptions imply that the transmitter cannot send frames at a rate faster than the receiver can process them. The problem here is how to prevent the sender from flooding the receiver. A general solution to this problem is to have the receiver provide some sort of feedback to the sender. The process could be as follows: The receiver send an acknowledge frame back to the sender telling the sender that the last received frame has been processed and passed to the host; permission to send the next frame is granted. The sender, after having sent a frame, must wait for the acknowledge frame from the receiver before sending another frame. This protocol is known as stop-and-wait. 4.1.3 A simplex protocol for a noisy channel In this protocol the unreal "error free" assumption in protocol 2 is dropped. Frames may be either damaged or lost completely. We assume that transmission errors in the frame are detected by the hardware checksum. One suggestion is that the sender would send a frame, the receiver would send an ACK frame only if the frame is received correctly. If the frame is in error the receiver simply ignores it; the transmitter would time out and would retransmit it. One fatal flaw with the above scheme is that if the ACK frame is lost or damaged, duplicate frames are accepted at the receiver without the receiver knowing it. Imagine a situation where the receiver has just sent an ACK frame back to the sender saying that it correctly received and already passed a frame to its host. However, the ACK frame gets lost completely, the sender times
  • 8. 8 IEEE standards and Data Link Layer Protocol out and retransmits the frame. There is no way for the receiver to tell whether this frame is a retransmitted frame or a new frame, so the receiver accepts this duplicate happily and transfers it to the host. The protocol thus fails in this aspect. To overcome this problem it is required that the receiver be able to distinguish a frame that it is seeing for the first time from a retransmission. One way to achieve this is to have the sender put a sequence number in the header of each frame it sends. The receiver then can check the sequence number of each arriving frame to see if it is a new frame or a duplicate to be discarded. The receiver needs to distinguish only 2 possibilities: a new frame or a duplicate; a 1-bit sequence number is sufficient. At any instant the receiver expects a particular sequence number. Any wrong sequence numbered frame arriving at the receiver is rejected as a duplicate. A correctly numbered frame arriving at the receiver is accepted, passed to the host, and the expected sequence number is incremented by 1 (modulo 2). This protocol can handle lost frames by timing out. The timeout interval has to be long enough to prevent premature timeouts which could cause a "deadlock" situation. 4.2 Sliding Window Protocols 4.2.1 Piggybacking technique In most practical situations there is a need for transmitting data in both directions (i.e. between 2 computers). A full duplex circuit is required for the operation. If protocol 2 or 3 is used in these situations the data frames and ACK (control) frames in the reverse direction have to be interleaved. This method is acceptable but not efficient. An efficient method is to absorb the ACK frame into the header of the data frame going in the same direction. This technique is known as piggybacking. When a data frame arrives at an IMP (receiver or station), instead of immediately sending a separate ACK frame, the IMP restrains itself and waits until the host passes it the next message. The acknowledgement is then attached to the outgoing data frame using the ACK field in the frame header. In effect, the acknowledgement gets a free ride in the next outgoing data frame. This technique makes better use of the channel bandwidth. The ACK field costs only a few bits, whereas a separate frame would need a header, the acknowledgement, and a checksum. An issue arising here is the time period that the IMP waits for a message onto which to piggyback the ACK. Obviously the IMP cannot wait forever and there is no way to tell exactly when the next message is available. For these reasons the waiting period is usually a fixed period. If a new host packet arrives quickly the acknowledgement is piggybacked onto it; otherwise, the IMP just sends a separate ACK frame.
  • 9. 9 IEEE standards and Data Link Layer Protocol 4.2.2 Sliding window When one host sends traffic to another it is desirable that the traffic should arrive in the same sequence as that in which it is dispatched. It is also desirable that a data link should deliver frames in the order sent. A flexible concept of sequencing is referred to as the sliding window concept and the next three protocols are all sliding window protocols. In all sliding window protocols, each outgoing frame contains a sequence number SN ranging from 0 to 2^(n - 1)(where n is the number of bits reserved for the sequence number field). At any instant of time the sender maintains a list of consecutive sequence numbers corresponding to frames it is permitted to send. These frames are said to fall within the sending window. Similarly, the receiver maintains a receiving window corresponding to frames it is permitted to accept. The size of the window relates to the available buffers of a receiving or sending node at which frames may be arranged into sequence. At the receiving node, any frame falling outside the window is discarded. Frames falling within the receiving window are accepted and arranged into sequence. Once sequenced, the frames at the left of the window are delivered to the host and an acknowledgement of the delivered frames is transmitted to their sender. The window is then rotated to the position where the left edge corresponds to the next expected frame, RN. Whenever a new frame arrives from the host, it is given the next highest sequence number, and the upper edge of the sending window is advanced by one. The sequence numbers within the sender's window represent frames sent but as yet not acknowledged. When an acknowledgement comes in, it gives the position of the receiving left window edge which indicates what frame the receiver expects to receive next. The sender then rotates its window to this position, thus making buffers available for continuous transmission. 4.2.3 Pipelining In many situations the long round-trip time can have important implications for the efficiency of the bandwidth utilisation. As an example, consider a satellite channel with a 500ms round-trip propagation delay. At time t~~=0 the sender starts sending the first frame. Not until at least t~>=~500 ms has the acknowledgement arrived back at the sender. This means that the sender was blocked most of the time causing a reduction in efficiency. As another example, if the link is operated in a two-way alternating mode (half-duplex), the line might have to be "turned around" for each frame in order to receive an acknowledgement. This acknowledgement delay could severely impact the effective data transfer rate. The effects of these problems can be overcome by allowing the sender to transmit multiple contiguous frames (say up to w frames) before it receives an acknowledgement. This technique is known as pipelining.
  • 10. 10 IEEE standards and Data Link Layer Protocol In the satellite example, with a channel capacity of 50kbps and 1000-bit frames, by the time the sender has finished sending 26 frames, t~=~520 ms, the acknowledgement for frame 0 will have just arrived, allowing the sender to continue sending frames. At all times, 25 or 26 unacknowledged frames will be outstanding, and the sender's window size needs to be at least 26. Pipelining frames over an unreliable communication channel raises some serious issues. What happens if a frame in the middle of a long stream is damaged or lost? What should the receiver do with all the correct frames following the bad one? The are two basic Automatic Request for Repeat (ARQ) methods for dealing with errors in the presence of pipelining. One method, the normal mode of ARQ is called Go-back-N. If the receiver detects any error in frame N, it signals the sender and then discards any subsequent frame. The sender, which may currently be sending frame N+X when the error signal is detected, initiates retransmission of frame N and all subsequent frames. The other method is called selective reject. In this method the receiver stores all the correct frames following the bad one. When the sender finally notices what was wrong, it just retransmits the one bad frame, not all its successors. 4.2.4 Protocol 5: Pipelining, Multiple outstanding frames (MaxSeq) In this protocol, the sender may transmit up to MaxSeq frames without waiting for an acknowledgement. In addition, unlike the previous protocols, the host is not assumed to have a new message all the time. Instead, the host causes host ready events when there is a message to send. 4.2.5 Protocol 6 This protocol employs the selective reject technique. The protocol does not discard good frames because an earlier frame was damaged or lost provided that these good frames fall within the receiving window. Associated with each outstanding frame is a timer. When the timer goes off, (or when the transmitter is notified of any error), only that one frame is retransmitted, not all the outstanding frames, as in protocol 5. In this protocol, the receiver's window size is fixed, the maximum of which is (MaxSeq+1)/2 . The maximum number is thus chosen to ensure that there will not be an overlapping between the new window and the previous window. The overlapping of windows means that the receiver would not be able to differentiate between a new frame and a retransmitted frame. The receiver has a buffer reserved for each sequence number within its window. Whenever a frame arrives, its sequence number is checked to see if it falls within the receiver's window. If so, and if it has not already been received, it is accepted and stored regardless of whether or not it is the next frame expected by the host. Frames passed to the host must always be in order. Protocol 6 is more efficient than protocol 5 in that:
  • 11. 11 IEEE standards and Data Link Layer Protocol  Protocol 6 employs an auxiliary timer to prevent delay in piggybacking. If no reverse traffic has presented itself before the timer goes off, a separate acknowledgement is sent.  Whenever the receiver has reason to suspect that an error has occured it sends a negative acknowledgement (NAK) frame back to the sender. Such a frame is a request for retransmission of the frame specified in the NAK. 4.3 High Level Link Control (HDLC) Protocol The HDLC protocol is a general purpose protocol which operates at the data link layer of the OSI reference model. The protocol uses the services of a physical layer, and provides either a best effort or reliable communications path between the transmitter and receiver (i.e. with acknowledged data transfer). The type of service provided depends upon the HDLC mode which is used. Each piece of data is encapsulated in an HDLC frame by adding a trailer and a header. The header contains an HDLC address and an HDLC control field. The trailer is found at the end of the frame, and contains a Cyclic Redundancy Check (CRC) which detects any errors which may occur during transmission. The frames are separated by HDLC flag sequences which are transmitted between each frame and whenever there is no data to be transmitted.