0% found this document useful (0 votes)
114 views

Computer Networks Framing Concepts

Framing divides data streams into manageable frames using byte-oriented, bit-oriented, or clock-based protocols. Byte-oriented protocols use sentinel characters or byte counts. Bit-oriented protocols like HDLC use a flag sequence to mark frame boundaries and perform bit stuffing. Clock-based protocols like SONET use a repeating frame structure synchronized to a clock, with frames identified by special bit patterns occurring regularly.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
114 views

Computer Networks Framing Concepts

Framing divides data streams into manageable frames using byte-oriented, bit-oriented, or clock-based protocols. Byte-oriented protocols use sentinel characters or byte counts. Bit-oriented protocols like HDLC use a flag sequence to mark frame boundaries and perform bit stuffing. Clock-based protocols like SONET use a repeating frame structure synchronized to a clock, with frames identified by special bit patterns occurring regularly.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16

FRAMING

Topics
Byte

Oriented Protocols (BISYNC , PPP)

Sentinel Approach Byte - Counting Approach (DDCMP)


Bit

Oriented Protocols ( HDLC) Based Framing (SONET)

Clock

7/29/13

Computer Networks By Sakthivel

FRAMING
The

stream of bits are not advisible to maintain in networks. an error occurs, then the entire stream have to retransmitted. avoid this, the framing concept is used. this, the stream of bits are divided into manageable bit units called frames. achieve, we are using several ways.

When To In

To

They are,
1. Byte Oriented Protocols 2. Bit Oriented Protocols 3. Clock Based Protocols
7/29/13 Computer Networks By Sakthivel 3

Contd
1. BYTE ORIENTED PROTOCOLS:
Each frame is considered as a collection of bytes rather than a collection of bits.
There

are two approaches. They are,

1. Sentinel Approach 2. Byte Counting Approach

1. Sentinel approach
In this approach it uses special characters called sentinel characters to indicate where frames start and end. This approach is called character stuffing because extra characters are inserted in the data portion of the frame.

Ex:

1. Binary Synchronous Communication (BISYNC) 2. Point to Point Protocol

7/29/13

Computer Networks By Sakthivel

Contd

Fig: BISYNC Frame format

The The

beginning of a frame is denoted by sending a special SYN(synchronization) character. data portion of the frame contain special sentinel characters
STX (Start of TeXt) ETX(End of TeXt)

The SOH (Start Of Header) field serves much the same purpose as the STX field.

7/29/13

Computer Networks By Sakthivel

Contd
The

problem with the sentinel approach is that the ETX character might appear in the data portion of the frame. overcomes this problem by escaping the ETX character by preceding it with a DLE(Data Link-Escape) character whenever it appears in the body of a frame. DLE character is also escaped in the frame body. approach is called character stuffing because extra characters are inserted in the data portion of the frame. (Cyclic Redundancy Check) is used to detect transmission errors.

BISYNC

The The

CRC

7/29/13

Computer Networks By Sakthivel

Point to Point protocol (PPP)


PPP

is commonly run over dial up modem links

The format of PPP frame is

Fig: PPP Frame Format


The The The The The

Flag field has 01111110 as starting sequence. Address and Control fields usually contain default values Protocol field is used for demultiplexing.

frame payload size can be negotiated, but it is 1500 bytes by default. PPP frame format is unusual in that several of the field sizes are negotiated rather than fixed. is conducted by a protocol called LCP (Link Control Protocol). sends control messages encapsulated in PPP framessuch messages are denoted by an LCP identifier in the PPP Protocol.

Negotiation LCP

7/29/13

Computer Networks By Sakthivel

Contd
2. Byte Count Approach
In this approach no of bytes in frame are counted and entered in the header.
Ex:

1.Digital Data Communication Message Protocol(DDCMP)

7/29/13

Computer Networks By Sakthivel

Contd
DDCMP

protocol is used for this approach. The frame format is

Fig: DDCMP frame format


COUNT

Field specifies how many bytes are contained in the frames body. count field will be corrupted during transmission, so the receiver will accumulate as many bytes as the COUNT field indicates. This is sometimes called a framing error. receiver will then wait until it sees the next SYN character.
Computer Networks By Sakthivel 9

Sometime

The

7/29/13

Bit-Oriented Protocols (HDLC)

In

this, frames are viewed as collection of bits. High level data link protocol(HDLC) is used. The format is

Fig: HDLC Frame Format

7/29/13

Computer Networks By Sakthivel

10

Contd
HDLC This On

denotes both the beginning and the end of a frame with the distinguished bit sequence 01111110. sequence might appear anywhere in the body of the frame, it can be avoided by bit stuffing. the sending side, any time five consecutive 1s have been transmitted from the body of the message (i.e., excluding when the sender is trying to transmit the distinguished 01111110 sequence), the sender inserts a 0 before transmitting the next bit.

7/29/13

Computer Networks By Sakthivel

11

Contd
On

the receiving side, five consecutive 1s arrived, the receiver makes its decision based on the next bit it sees (i.e., the bit following the five is). the next bit is a 0, it must have been stuffed, and so the receiver removes it. If the next bit is a 1, then one of two things is true, either this is the end-of-frame marker or an error has been introduced into the bit stream.

If

7/29/13

Computer Networks By Sakthivel

12

Contd
By

looking at the next bit, the receiver can distinguish between these two cases: it sees a 0 (i.e., the last eight bits it has looked at are 01111110), then it is the end-of- frame marker. it sees a 1 (i.e., the last eight bits it has looked at are 01111111), then there must have been an error and the whole frame is discarded.
Computer Networks By Sakthivel 13

If

If

7/29/13

Clock-Based Framing (SONET)

Synchronous

Optical Network Standard is used for long distance transmission of data over optical network. supports multiplexing of several low speed links into one high speed links. STS-1 frame is used in this method.

It

An

7/29/13

Computer Networks By Sakthivel

14

Contd
It

is arranged as nine rows of 90 bytes each, and the first 3 bytes of each row are overhead, with the rest being available for data. first 2 bytes of the frame contain a special bit pattern, and these bytes that enable the receiver to determine where the frame starts. receiver looks for the special bit pattern consistently, once in every 810 bytes, since each frame is 9 x 90 = 810 bytes long.

The

The

7/29/13

Computer Networks By Sakthivel

15

Contd

The

STS-N frame can be thought of as consisting of N STS-1 frames, where the bytes from these frames are interleaved; that is, a byte from the first frame is transmitted, then a byte from the second frame is transmitted, and so on. from these STS-1 frames can be linked together to form a larger STS-N payload, such a link is denoted STS-Nc. One of the bit in overhead is used for this purpose.
Computer Networks By Sakthivel 16

Payload

7/29/13

You might also like