Cs 601 Data Comunication 2
Cs 601 Data Comunication 2
Introduction
o Whenever the TX capacity of a medium linking 2 devices is greater than the TX
needs of the devices, the link can be shared
o Example: Large Water pipe can carry water to several separate houses at once
o Multiplexing is the set of techniques that allows simultaneous TX of multiple signals
across a single data link
o As data communication usage increases, traffic also increases
o We can add a new line each time a new channel is needed
o Or we can install higher capacity links and use each to carry multiple signals
o All current TX media i.e. Coax, Optical fiber have high available BWs
o Each of these has carrying capacity far in excess of that needed for one signal
o If TX capacity of a link is greater than the TX needs of devices attached to it, the
excess capacity is wasted
Multiplexing
Set of techniques that allows the simultaneous transmission of multiple signals
across a single data link”
In the multiplexed system, „n‟ devices share the capacity of one link
Y FDM
o An analog technique that can be applied when BW of the link is greater than the
combined BW of the signals to be TX
o Signals generated by each sending device modulate difference carrier frequencies
o These modulated signals are then combined into a single Composite signal that
can be transported by the link
o Carrier frequencies are separated by enough BW to accommodate the modulated
signal
o These BW ranges are the channels through which the various signals travel
o In fig. the TX path is divided into 3 parts, each representing a channel to carry one
TX
o As an analogy, imagine a point where 3 narrow streets merge to form a 3-lane
highway
o Each of these streets correspond to a lane of the highway
o Each car merging on to the highway from one of these streets still has its own lane
and can travel w/o interfering with cars from other lanes
• DEMULTIPLEXING
o DEMUX uses a series of filters to decompose multiplexed signal into its
constituent signals
o Individual signals are then passed to a demodulator that separates them to the
carriers and passes them to the waiting receivers
This figure is the time domain representation of the FDM MUX again using 3 telephones
as the communication devices
This figure is the time domain representation of the FDM MUX again using 3 telephones
as the communication devices
Y Mechanism of WDM
o Although the technology is very complex, the idea is very simple
o We want to combine multiple sources into one single light at the the MUX
and do the reverse at the DEMUX
PRISM
o Combining and Splitting of light sources is easily handled by a PRISM
o From Physics, a prism can deflect the light depending upon the angle of incidence
and the frequency
o Using this technique, a MUX can be made to combine several input beams of light
each containing a narrow band of frequencies into one o/p beam of a wider band
of frequencies
o The DEMUX can also be made to reverse the process
TDM
o TDM is a digital process that can be applied when the data rate capacity of the TX
medium is greater than the data rate required by the sending and receiving devices
In fig, same link is used as in FDM. However, here the link is shown sectioned by time
rather than frequency In TDM fig, portions of signals 1, 2, 3 and 4 occupy the link
sequentially
Y Implementation of TDM
TDM can be implemented in two ways:
–Synchronous TDM
–Asynchronous TDM
Y Synchronous TDM
o The term synchronous has a different from that used in other areas of
telecommunication
o Here synchronous means that MUX allocates exactly the same time slot to
each device at all device whether or not the device has any thing to transmit
Interleaving
o Synchronous TDM can be compared to a very fast rotating switch
o As the switch opens in front of a device, the device has the opportunity to send a
specifies amount of data on to the path
o The switch moves from device to device at a constant rate and in a fixed order
o This process is called INTERLEAVING
o Interleaving can be done by BITS, BYTES or by any other DATA UNIT
o In other words MUX can take one byte from each device, then another byte from each
device and so on
o In a given system interleaved units will always be of the same size
Demultiplexing Process
o Demultiplexer decomposes each frame by extracting each data unit in turn
o Weakness of synchronous TDM
–Waste of empty slots
Framing Bits
o Various factor however can cause timing inconsistencies.
o For this reason one or more synchronization bits are added to the beginning of each
frame
o These bits called Framing bits follow a pattern frame to frame that allows a DEMUX
to synchronize with the incoming stream so that it can separate time slots accurately
o This synch info consist of one bit /frame alternating b/w 0 and 1.
Summary
• Multiplexing
• Frequency division multiplexing
• Wave division multiplexing
• Time division multiplexing
Reading Sections
• Section 8.1,8.2,8.3,8.4
“Data Communications and Networking” 4th Edition by Behrouz A. Forouzan
Asynchronous TDM
o Synchronous TDM does not guarantee full utilization of the timeslots
o Because the time slots are fixed and pre assigned, whenever a connected device is not
transmitting, the corresponding slot is empty and much of the channel capacity is
wasted
o For Example, imagine that we have multiplexed the o/p of 20 identical computers
onto a single line
o Using synchronous TDM, the speed of that line must be at least 20 times the speed of
each i/p line
o But what if only 10 computers are in use at a time?
o Half of the capacity of the line is wasted
o Asynchronous TDM or Statistical TDM is designed to avoid this type of waste
o Asynchronous means flexible or Not fixed
o In an asynchronous system, if we have „n‟ input lines, the frame contains no more
than „m‟ slots, where m is less than n
o In this way asynchronous TDM supports the same number of I/p lines as synchronous
TDM with a lower capacity link
o A slot is available to any device that wants to send data
o MUX scans I/p lines, accepts data until a frame is filled and then sends the frame
across the link
o Fig. shows a system with 5 I/p lines sharing a link using Asynchronous TDM
o Frame size is 3 slots per frame
o Fig shows how MUX handles 3 levels of traffic
• Multiplexing Application
Reading Sections
• Section 8.4,8.5 “Data Communications and Networking” 4th Edition by Behrouz
A. Forouzan
Telephone Services
• Analog Services
o Of the many analog services available to telephone subscribers, two are really
important:
–Switched Analog Services
–Leased Analog Services
o Familiar dial up service most often encountered when using a home telephone
o Uses twisted pair cable to connect subscriber‟s phone to the network via exchange
o This connection is called LOCAL LOOP
o The n/w it joins is called PSTN
o Signal on a local loop is Analog and BW is usually b/w 0 and 4000 Hz
Conditioned Lines
Analog Hierarchy
o To maximize efficiency, telephone companies multiplex signal from lower BW lines
onto higher BW lines
o In this way many switched or leased lines can be combined into fewer but bigger
channels
o FDM is used for analog lines
Switched / 56 Service
It is digital version of Analog switched line
Allows data rates of up to 56 Kbps
Both parties must subscribe to the service
A caller with normal telephone service cannot connect to a telephone or
computer with this service even with a Modem
T Lines
o DS-0 DS1 are the names of the Services
o To implement those services, telephone companies use T-lines
o These are the lines with capacities matched to the data rates of DS-0 to DS-4
Summary
• The Telephone System
• Analog Services
• Digital Services
• Fiber To The Curb (FTTC)
Reading Sections
Y T 1 Frame (Figure)
o DS-1 requires 8 Kbps of overhead
o To understand this overhead, lets examine format of a 24-voice channel frame
o Frame used on T-1 line is usually 193 bits divided into 24 slots of 8 bits each
+ 1 bit for synchronization (24*8+1=193)
o 24 segments are interleaved in one frame
o If a T-1 carries 8000 frames, the data rate is 1.544 Mbps (193 * 8000=1.544
Mbps) which is capacity of the line
E-Lines
•Europeans use a version of T-lines called E-lines
•Two are conceptually identical but capacities vary
Line Rate(Mbps) Voice channels
------------------------------------------------
E-1 2.048 30
E-2 8.448 120
E-3 34.368 480
E-4 139.264 1920
Types of Errors
Reading Sections
o The term single bit error means that only one bit of a given data unit (such as a
byte, character, or a packet) is changed from 1 to 0 or from 0 to 1
o Figure shows the effect of a single bit error on a data unit
o ASCII character 000000010 (ASCII STX) is sent but 00001010 (ASCII LF) is
received
o Single bit errors are the least likely type of error in serial data TX
o To see Why? Imagine a sender sends data at 1Mbps
o This means that each bit lasts only 1/1,000,000 seconds or 1 microsecond
o For single bit error to occur, the noise must have a duration of 1 microsecond
which is very rare, noise lasts much longer than that
o However, single bit error can occur if we are sending data using parallel TX
o For Example, if 8 wires are used to send all of the eight bits of a byte at the same
time and one of the wires is noise, one bit can be corrupted in each byte
• Burst Errors
•The term burst error means that two or more bit sin the data unit have changed from 1
to 0 or from 0 to 1
Y Redundancy
o One error detection mechanism that would satisfy these requirements would be to
send every data unit twice
o The receiving device would then be able to do a bit-for-bit comparison b/w two
TXs
o Any discrepancy will indicate an error and an appropriate error correction
mechanism could be set in place
o This system will be completely Accurate because the odds of error affecting the
same bits in both version will be infinitesimally small
o But this system will be extra ordinarily SLOW
o Not only will the TX time double, but the time it takes to compare two data units
is also added up
o The concept of including extra information in the TX solely for the purpose of
comparison is a good one
o But instead of repeating the entire data stream, a shorter group of bits may be
appended to the end of each unit
o This technique is called REDUNDANCY because the extra bit are redundant to
the information and are discarded as soon as the accuracy of TX has been
determined
o When it reaches its destination, the RX puts all 8 bits through an even parity
checking function
o If the RX sees 11100001, it counts four ones, an even number and the data unit
passes
o But what if the data unit has been damaged in transit?
o What if instead of 11100001, receiver sees 11100101?
o Then when the parity checker counts the 1‟s, it gets 5 an odd number
o The receiver knows that an error has occurred somewhere and therefore rejects the
whole unit
o Some systems may also use ODD parity checking
o The principal is the same as even parity
Example 9.2
• | Suppose “world” is received by the receiver without being corrupted:
• Performance of VRC
o VRC can detect all single bit errors
o Can also detect Burst errors as long as the total number of bits changed is ODD
(1,3,5 etc)
Examples
• We have an Even Parity data unit where the total number of 1‟s including the
parity bit is „6‟ : 1000111011
• If 3 bits change value resulting parity will be odd and an error will be detected:
1111111011: 1‟s = 9
• If 2 bits change value resulting parity will still be even and error will not be
detected: 1110111011: 1‟s = 8
o VRC cannot detect errors when the total number of bits changed are even
o VRC checker will return a result of 1 and the data unit will be rejected
o The same hold true for any odd number of errors
o In the second case, VRC checker will check parity and will return an even
number although the data unit contains two errors
o VRC cannot detect error when the number of bits changed is even
o If any two bits change in TX, the changes cancel each other and the data unit will
pass a parity check even though the data unit is damaged
o Same holds true for any even number of errors
Summary
• Types of Errors
• Error Detection Techniques
• Redundancy
• Types of Redundancy Checks
Reading Sections
• Section 9.1, 9.2, 9.3
“Data Communications and Networking” 4th Edition by Behrouz A. Forouzan
o We then calculate the Parity bit for each column and create a new row of 8 bits
which are the parity bits for the whole block
o Note that the first parity bit in the 5th row is calculated based on all the first
bits
o The second parity bit is calculated based on all the second bits and so on
o We then attach the 8 parity bits to the original data and send them to the
receiver
Example 9.4
Suppose the following block is sent:
10101001
00111001
11011101
11100111
10101010 (LRC)
10100011
10001001
11011101
11100111
10101010 (LRC)
• Receiver checks LRC, some of bits do not follow even parity rule and whole
block is discarded
10101010 (LRC)
• Performance of LRC
Qualities of CRC
•To be valid the CRC must have two qualities:
–It must have exactly one less bit than the divisor
–Appending it to the end of the data must make the resulting bit sequence exactly
divisible by the divisor
•Third,the CRC of „n‟ bits replaces the appended 0‟s at the end of the data unit
•Note that CRC may consist of all zeros
•The data unit arrives at the receiver followed by the CRC
•The receiver treats the whole string as a unit and divides it by the same divisor that was
used to find the CRC remainder
•If string arrives without an error, the CRC checker yields a remainder of zero and data
unit passes
•If the string has been changed in transit, the division yields a non-zero remainder and
the data unit does not pass
The CRC Generator
•Uses Modulo-2 Division
•The first condition guarantees that all burst errors of a length equal to the degree of the
polynomial are detected
•The 2nd guarantees that all burst errors affecting an odd number of bits are detected
• Performance of CRC
o CRC can detect all burst errors that affect an odd number of errors
o CRC can detect all burst errors of length less than or equal to the degree of the
polynomial
o CRC can detect with a very high probability burst errors of length greater than
the degree of the polynomial
Example 9.6
• The CRC-12 ( x
12
+ x 11 + x3 + x + 1 ) has a degree of 12
• It will detect
– All burst errors affecting odd no. of bits
– All burst errors with a length equal to or less than 12
– 99.97 % of the time burst errors with a length of 12 or more
Summary
• Types of Redundancy Checks
• Longitudinal Redundancy Check (LRC)
• Cyclic Redundancy Check (CRC)
Reading Section
Y CHECKSUM Generator
o The sender subdivides data units into equal segments of „n‟ bits(16 bits)
o These segments are added together using one‟s complement
o The total (sum) is then complemented and appended to the end of the original
data unit as redundancy bits called CHECKSUM
o The extended data unit is transmitted across the network
o The receiver subdivides data unit as above and adds all segments together and
complement the result
o If the intended data unit is intact, total value found by adding the data
segments and the checksum field should be zero
o If the result is not zero, the packet contains an error & the receiver rejects it
Checksum Figure
Examples
Example 9.7
Example 9.8
• Examples of no error and a burst error
Segment1 10111101
Summary
• Checksum
• Single-Bit Error Correction
• Hamming Code
Reading Sections
• Section 9.6, 9.7, “Data Communications and Networking” 4th Edition by Behrouz
A. Forouzan
Hamming Code
• Each r bit is the VRC bit for one combination of data bits
• r1(r2) bit is calculated using all bit positions whose binary representation includes
a 1 in the first(second) position, and so on
o In addition to Line Discipline, the most important functions in the data link layer are
Flow Control and Error Control
o Collectively these functions are called Data Link Control
Y Line Discipline:
– Coordinates the link systems, which device can send and when it can send?
Y Flow Control:
–The amount of data that can be sent before the receiving acknowledgement
–It also provides the receiver‟s acknowledgement for frames received intact and
so is linked to error control
Y Error Control:
–Means Error detection and Correction
–It allows the receiver to inform the sender of any frames lost or damaged in TX
and coordinates Retransmission of those frames by the sender
Y Line Discipline
o How efficient the system is, no device in it should be allowed to transmit until that
device has the evidence that the intended receiver is:
–able to receive
–is prepared to accept the TX
o What if the Rx device does not expect a transmission or is busy
•Poll / Select
–Primary-Secondary communication
Summary
• Hamming Code
• Data Link Control
• Line Discipline
– ENQ/ACK
– POLL/SELECT
• Flow Control
Reading Sections
Section 9.7, 10.1 “Data Communications and Networking” 4th Edition by Behrouz A.
Forouzan
How It Works?
o The receiver must answer either with an acknowledgement (ACK) frame if it is
ready to receive or with a negative acknowledgement ( NAK), if it is not
o By requiring a response, even if the answer is negative, the initiator knows that his
enquiry was in fact received even if the receiver is currently unable to receive
o If neither an ACK or a NAK is received within a specified time limit, the initiator
assumes that an ENQ frame was lost in transit, it disconnects and sends a
replacement
o An initiating system ordinarily makes 3 such attempts before giving up
o If the response to the ENQ is negative for 3 attempts, the initiator disconnects and
begins the process again at another time
•If the response is positive the initiator is free to send its data
• Poll / Select
Primary-Secondary communication
o This method works with topologies where one device is designed as a Primary station
and the other devices are Secondary stations
o Multipoint systems must coordinate several nodes, not just two
o The questions are not only Are you Ready? But also Which of the device has the right
to use the channel
o Whenever a multipoint link consists of a primary device and multiple secondary
devices using a single TX line , all exchanges must be made through the primary
device even when the ultimate destination is a secondary device
o The primary device controls the link and the secondary device follow sits instruction
o It is up to the primary to determine which device is allowed to use the channel ata
given time
o The primary therefore is always the initiator of the a session
•If the primary wants to receive data, it asks the second-arise if they have anything to
send, This is called POLLING
•If the primary wants to send data, it tells the target secondary to get ready to receive,
This function is called SELECTING
Reading Sections
Section 10.1,10.2 “Data Communications and Networking” 4th Edition by Behrouz
A. Forouzan
o Any receiving device has a limited speed at which it can process incoming data and a
limited amount of memory in which to store incoming data
o The receiving device must be able to inform the sending device before those limits are
reached and to request that the TX device send fewer frames or stop temporarily
• Flow Control-Buffer
o Two methods have been developed to control the flow of data across communication
links :
Y Stop and Wait
Y Sliding Window
Y Stop and Wait
In this method, the sender waits for an ACK after every frame it sends
• Sliding Window
o In this method, sender can transmit several frames before needing an ACK
o Frames can be sent one right after another meaning link can carry several
frames at once and its capacity can be used efficiently
o The receiver uses a single ACK to confirm the receipt of multiple data frames
o Sliding Window refers to imaginary boxes at both the sender and the receiver
o This window can hold frames at either end and provides the upper limit on the
number of frames that can be sent before requiring an ACK
o Frames may be ACK at any point w/o waiting for the window to fill up and
may be TX as long as the window is not yet Full
o To keep track of which frames have been transmitted and which received,
sliding window introduces an identification scheme based on the size of the
window
o The frames are numbered modulo-n means from 0 to n-1
o If n=8, frames are numbered 0,1,2,3,4,5,6,7,0,1,2,3,4,5,6,7,0,….
•At the beginning of TX, the receiver window contains n-1 spaces for
frames
•As new frames come in, the size of the receiver window shrinks
© Copyright Virtual University of Pakistan 195
•The receiver window therefore does not show the frames that are
received but the frames that may still be received before an ACK is sent
• ERROR CONTROL
Refers primarily to error detection and correction
• Damaged Frame
•
Summary
• Flow Control
-Stop-and-Wait-
-Sliding Window
• Error Control
Reading Sections
Section 10.2, 10.3 “Data Communications and Networking” 4th Edition by Behrouz A.
Forouzan
Y Go-back-n ARQ
Y Selective Reject ARQ
Three features are added to sliding window flow control to allow for the retransmission of
the lost or the damaged frames:
o The sending device keeps copies of the transmitted frames until all of them have been
acknowledged
o In addition to ACK frames, receiver also has the option of NAK frames, if data has
been received damaged
o Because sliding window is a continuous TX mechanism, both ACK and NAK frames
must be numbered for identification
• Go Back n ARQ
In Go Back n ARQ, if one frame is lost or damaged, all frames sent since last frame
acknowledged are retransmitted
Go Back n- Damaged Frame
The selective reject ARQ differs from Go Back n in the following ways:
o The Rx device must contain sorting logic to enable it to reorder frames
received out of sequence
o Sending device must contain a searching mechanism that allows it to
find and select only the requested frame for retransmission
o Selective Reject ARQ
o A buffer in the receiver must keep all previously received frames on
hold until all retransmissions have been stored
o Although retransmitting only specific damaged or lost frames may seems more
efficient than resending all the frames
Protocols
Protocol: Set of rules or conventions for executing a particular task
Protocol in Data Comm.: Set of rules or specifications used to implement one or more
layers of the OSI Model
Example: EIA 232-D interface is a protocol used at the physical layer in the OSI Model
Protocols
Data Link Protocols: Set of specifications used to implement the data link layer
Data link protocols contain rules for:
–Line Discipline
–Flow Control
–Error Control
Synchronous Protocols: Take the whole bit stream and chop it into characters of equal
Size
Y Asynchronous Protocols
Employed mainly in Modems
./ XMODEM
In 1979 Ward Christiansen designed a File transfer protocol for Telephone-line
communication b/w PCs called XMODEM
XMODEM
o The first field is a One Byte start of header (SOH) field
o The second field is a two-byte Header.
–The first header byte , the Sequence number carries the Frame number
–The second header byte is used to check the validity of the sequence number
o The fixed data field holds 128 bytes of data
o The last field CRC checks for errors in the data field only
Transmission in XMODEM
o TX begins with sending of a NAK frame from the receiver to the sender
o Each time, the sender sends a frame, it must wait for an ACK before sending next
frame
Summary
•Error Control
–Stop-and-Wait ARQ
–Sliding Window ARQ
•Go-back-n
•Selective Reject
•Data Link Protocols
Reading Sections
•Section 10.3, 11.1,
“Data Communications and Networking” 4th Edition by Behrouz A. Forouzan
ZMODEM
•Newer Protocol
•Combines features of
– XMODEM
and
– YMODEM
BLAST
o Blocked Asynchronous Transmission
o More powerful than XMODEM
o Full Duplex
o Sliding Window Flow Control
o Allows transfer of Data and Binary Files
KERMIT
o Designed at Columbia University
o Most Widely used Asynchronous Protocol
o File Transfer protocol is similar in operation to XMODEM, with sender waiting for an
NAK before it starts TX
o Kermit allows the transmission of control characters as Text
Synchronous Protocols
Speed of synchronous TX makes it a better choice over Asynchronous T for LAN, MAN
and WAN technology
o Character –Oriented Protocols are not as efficient as bit – oriented protocols and are
seldom used
o They are easy to comprehend and employ the same logic as bit-oriented protocols
o Their study will provide the basis for studying the other data link layer protocols
o In all data link protocols, control information is inserted in the data frame as separate
control frames or as addition to existing data frames
o In character oriented protocols, this info is in the form of code words taken from
existing character sets such as ASCII
o IBN‟s BSC is the best known character oriented protocol
BSC FRAMES
•BSC protocol divides a transmission into frames
CONTROL FRAMES
o If a frame is used strictly for control purposes, it is called a Control frame
o Control frames are used to exchange information b/w communicating devices for
example, to establish the connection, to control the flow, to request error correction
etc
DATA FRAMES
Multiblock Frame
Multi
Frames
Control Frames
o A control frame is used by one device to send commands to or to get information
from another device
o A control frame contains control characters but no data
o It carries information specific to the functioning of the data link layer itself
– Establishing Connections
– Maintaining Flow and Error Control during Data Transmission
– Terminating Connection
Summary
•Data Link Protocols
•Asynchronous Protocols
•Synchronous Protocols
Reading Sections
•Section11.1, 11.2
“Data Communications and Networking” 4th Edition by Behrouz A. Forouzan
o One of these HDLC is the design of the ISO and has become the basis for all bit-
oriented protocols in use today
•In 1975, IBM gave Synchronous Data Link Control (SDLC)
•In 1979, ISO answered with High Level Data Link Control (HDLC)
o Since 1981, ITU-T has developed a series of protocols called Link Access Protocols
o LAPs: LAPB, LAPD, LAPM, LAPZ etc. all based on HDLC
Primary Station
o Primary station works in the same way as primary devices in the discussion of flow
control
o The primary is a device in point-to-point or multipoint line configuration that has
complete control of the link
Secondary Station
o The primary sends commands to the secondary stations
o A primary issues commands and a secondary issues responses
Combined Station
o A combined station can both command and respond
o A combined station is one of a set of connected peer devices programmed to behave
either as a primary or as a secondary depending on the nature and the direction of the
transmission
Configuration (1)
o Configuration refers to the relationship of the hardware devices on a link
o Primary , secondary and combined stations can be configured in three ways:
Y Unbalanced Configuration
Y Symmetrical Configuration
Y Balanced Configuration
Configuration (2)
Unbalanced Configuration
o Also called Master/Slave Configuration
o One device is a primary and others are secondary
o Unbalanced configuration can be point to point if only two devices are
involved
o Most of the times it is multipoint with one primary controlling several
secondaries
Configuration (3)
Symmetrical Configuration
o Each physical station on a link consists of two logical stations, one a primary
and the other a secondary
o Separate lines link the primary aspect of one physical station to the secondary
aspect of another physical station
Modes
o A mode in HDLC is the relationship b/w two devices involved in an exchange
o The mode describes who controls the link
o HDLC supports 3 modes of communication b/w stations:
–Normal Response Mode (NRM)
–Asynchronous Response Mode (ARM)
–Asynchronous Balanced Mode (ABM)
I-Frames are used to transport user data and control information relating to user data
S-Frames are used only to transport control information
U-F rame are reserved for System Management
•The flag field of an HDLC frame is an 8-bit sequence with a bit patter 01111110 that
identifies both the beginning and the ending of the of a frame
•It serves as a Synchronization pattern for the receiver
•Fig. shows placement of 2 flag fields in an I-Frame
HDLC Address Field
o
The second field of HDLC frame contains the address of the secondary station
that is either the originator or the destination of the frame
o If a primary station creates Frame it includes a „To‟ address and if a secondary
creates the frame, it contains a „From‟ address
o Can be of one byte or several bytes depending upon the network
o If the address field is only 1 byte, the last bit is always a 1
o If the address is of several bytes, all bytes but the last one will end with 0 , and the
last will end with a 1
o Ending each intermediate byte with 0 indicates to the receiver that there are more
address bytes to come
© Copyright Virtual University of Pakistan 214
HDLC Control Field
o The control field is a one o two byte segment of the frame used for flow management
o The two byte case is called the Extended Mode
o Control field in the I-Frame and S-Frame is two bytes long to allow seven bits of
sending and receiving sequence
o However the control field in the U-Frame is still one byte
Reading Sections
•Section11.4, 11.5
“Data Communications and Networking” 4th Edition by Behrouz A. Forouzan
o Ethernet, Token Bus, Token Ring -7 Standards of IEEE and a part of its Project 802
o Fiber Distributed Data Interface (FDDI) -7 ANSI Standard
• FIGURE
o IEEE has divided the data link layer into two sub-layers:
Logical Link Control (LLC)
Medium Access Control (MAC)
o LLC is non-architecture specific i.e. it is the same for all IEEE-defined LANs
o The MAC sub layer on the other hand contains a number of distinct modules; each
carries proprietary info specific to the LAN product being used
o LAN compared with OSI -Figure
PROJECT 802
o Strength of Project 802 is Modularity
o By subdividing the functions necessary for LAN management, the designers were
able to standardize those that can be generalized and isolate those that must remain
specific
Y IEEE 802.11
o Is the section of Project 802 devoted to internetworking issues in LANs and MANs
o Although not yet complete, it seek to resolve the incompatibilities b/w network
architectures w/o requiring modifications in existing addressing, access, and error
recovery mechanisms
Y LLC
In general, IEEE project 802 model takes the structure of an HDLC frame and divides
into two sets of functions:
• One set contains the end-user portions of the frame: The logical address,
control information and data
• These functions are handled by IEEE 802.2 LLC protocol
• LLC is upper of data link layer and is common to all LAN protocols
Y MAC
o The second set of functions, the MAC sub-layer , resolves the contention for the
shared media
o It contains Synchronization Flag, Flow and Error control specifications as well as
the physical address of next station to receive & route a packet
CONTROL
o The control field of PDU is identical to the control field in HDLC.
o As in HDLC, PDU frames can be I-frames, S-frames, or U-Frames and carry all of the
codes and the information that the corresponding HDLC frame carry
Categories of 802.3-Figure
o In a CSMA system, any device wishing to transmit must first listen for existing traffic
on the line
o A device must listen by checking for voltage
o If no voltage is detected, the line is considered idle and the TX is initiated
o CSMA cuts down on the number of collisions but does not eliminate them
o If a system transmits after checking the line and another system transmits during this
small interval, collisions can still occur
o The final step is the addition of Collision Detection (CD)
o In CSMA/CD, the station wishing to transmit first listens to make certain the link is
free, then transmits its data, then listens again
Y Addressing
o Each station on the Ethernet network such as a PC, workstation or printer has its own
Network Interface Card (NIC)
o The NIC usually fits inside the station and provides the station with a 6-byte physical
address
o The number on the NIC is unique
Y Data Rate
o Ethernet LANs can support data rates between 1 and 100 Mbps
Implementation
o In IEEE 802.3 standard, the IEEE defines types of cables, connections and signals that
are to be used in each of the five different Ethernet implementations
o Each frame is transmitted to every station on the link but read only by the station to
which it is addressed
Topology of 10 Base 5
The physical connectors and cables utilized by 10 base 5 include coaxial cable, Network
Interface Card, Transceivers and Attachment Unit Interface (AUI) cables
Y TRANSCEIVER
Each station is attached by an AUI cable to an intermediary device called a
Medium Attachment Unit (MAU) or a Transceiver
Transceiver performs the CSMS/CD function of checking for voltages and
collisions on the line and may contain a small buffer
Y AUI Cables
Each station is linked to its corresponding transceiver by an AUI cable also called
the Transceiver cable
An AUI is a 15 wire cable with plug that performs the physical layer interface
functions b/w the station and the transceiver
An AUI has a max. Length of 50 meters and it terminates in a 15-pin DB- 15
connector
Y TRANSCEIVER TAP
Each transceiver contains a connecting mechanism called a TAP because it allows
the transceiver to tap into the line at any point
The TAP is a thick cable sized well with a metal spike in the center
Summary
•Local Area Networks (LANs)
•Project 802
•Protocol Data Unit (PDU)
•Ethernet
Reading Sections
•Section12.1, 12.2
“Data Communications and Networking” 4th Edition by Behrouz A. Forouzan
Y RG-58 Cable
o These cables are relatively easy to install and move around
o Especially inside the buildings where cable must be pulled through the walls and
the ceilings
Y BNC-T
The BNC-T connector is a T-shaped device with three ports:
–One for the NIC
–One each for the input and output ends of the cable
10 base T: Twisted Pair Ethernet
o Most popular standard defined in IEEE 802.3 series is 10 Base T also called Twisted
Pair Ethernet
o It is a Star topology LAN that uses Unshielded Twisted pair (UTP) cable instead of
coaxial cable
o It supports a data rate of 10 Mbps and has a maximum length of 100 meters
Switched Ethernet
o An attempt to improve the performance of 10BASE-T
o N ×10 Mbps with N devices
• 100 Base-T4
Token Bus
o Other LANs are not suitable for this purpose
o Token Bus has no commercial application in data communications
o Token Ring allows each station to send one frame per turn
o Access method: Token passing
Summary
•Ethernet
–Implementations
•Other Ethernet Networks
•Token Bus/Ring
Reading Sections
•Section 12.2, 12.3, 12.4, 12.5
“Data Communications and Networking” 4th Edition by Behrouz A. Forouzan
o Token Ring allows each station to send one frame per turn
o Access method: Token passing
Implementation
o Each station in the Token Ring regenerates the frame
o One disabled or disconnected node could stop the traffic flow around the entire
network
–Each station is connected to an automatic switch
Time registers
–Values are set when the ring is initialized and do not vary
–SA (Synchronous Allocation)
–TTRT (Target Token Rotation Time)
–AMT (Absolute Maximum Time)
Y FDDI Timers
Timers
–Each station contains two timers
–TRT (Token Rotation Timer) : Incrementing
–THT (Token Holding Timer) : Decrementing
Station Procedure
o THT is set to the difference between TTRT and TRT
o THT = TTRT - TRT
o TRT is reset to zero (TRT = 0)
o The station sends S-frames during the time in SA
o The station sends A-frames as long as THT ≥ 0
o Release the token
Summary
•Token Ring
•FDDI
Reading Sections
•Section 12.5, 12.6, 12.7
“Data Communications and Networking” 4th Edition by Behrouz A. Forouzan
Repeaters (Figure-3)
Routers
TCP/IP Protocols
• Network Layer
–IP (Internetworking Protocol )
–ARP(Address Resolution Protocol)
–RARP(Reverse Address Resolution Protocol)
–ICMP(Internet Control Message Protocol)
–IGMP(Internet Group Message Protocol)
• Transport Layer
–TCP (Transmission Control Protocol)
–UDP (User Datagram Protocol)
Summary
•Internet work
•Connecting Devices
–Repeaters
–Bridges
–Routers
•TCP/IP Protocol Suite
Reading Sections
•Section 21.1, 21.2, 21.3, 24.1, 24.2,
“Data Communications and Networking” 4th Edition by Behrouz A. Forouzan