0% found this document useful (0 votes)
81 views

Computer Network - Unit-2 - Data - Link - Layer

The document discusses the data link layer. It covers: 1. An introduction to the data link layer, including its responsibilities like physical addressing, framing data, error control, and flow control. 2. Design issues at the data link layer such as the services provided to the network layer, framing, error control, and flow control. 3. Error detection and correction techniques including parity checks, checksums, and cyclic redundancy checks for error detection as well as backward and forward error correction.

Uploaded by

Shaikh Ibrahim
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
81 views

Computer Network - Unit-2 - Data - Link - Layer

The document discusses the data link layer. It covers: 1. An introduction to the data link layer, including its responsibilities like physical addressing, framing data, error control, and flow control. 2. Design issues at the data link layer such as the services provided to the network layer, framing, error control, and flow control. 3. Error detection and correction techniques including parity checks, checksums, and cyclic redundancy checks for error detection as well as backward and forward error correction.

Uploaded by

Shaikh Ibrahim
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 89

030090501

Computer Network

Unit-2
Data Link Layer

Prof. Ekta Patel


9662513192
[email protected]

Unit-2 Weightage : 15%


Topic Covered
1. Introduction to Data Link Layer

2. Design Issues:
2.1 Services provided to network layer
2.2 Framing
2.3 Flow control
2.4 Error control

3. Error detection and correction:


3.1 Error detecting codes
3.2 Error correcting codes

4. Elementary data link protocols


4.1 Noiseless Channel Protocol
4.2 Noisy Channel Protocol (Sliding window Protocol)

5. High-level Data Link Control (HDLC)

Unit: 2 – Data Link Layer 2 CGPIT, UTU


1. INTRODUCTION OF DATA LINK LAYER

1.1 Introduction
1.2 Working
1.3 Responsibility

Back to Outline
1.1 Data Link Layer (DLL)

Unit: 2 – Data Link Layer 4 CGPIT, UTU


1.2 Working DLL

Unit: 2 – Data Link Layer 5 CGPIT, UTU


1.3 Responsibility of DLL
▪ Data link layer is concerned with:
✔ Physical addressing (MAC Address)
✔ Framing – divide bits stream into data unit (frame)
✔ Error control – bit loses, retransmission
✔ Flow control – avoid over overwhelming
✔ Access control (Unit-3)

Unit: 2 – Data Link Layer 6 CGPIT, UTU


2. DESIGN ISSUES

2.1 Services provided to network layer


2.2 Framing
2.3 Error Control
2.4 Flow Control

Back to Outline
2.1 Service Provided to Network Layer

Relationship between packets and frames.

Unit: 2 – Data Link Layer 8 CGPIT, UTU


2.1 Service Provided to Network Layer

1. Unacknowledged connectionless service.


✔ E.g. Ethernet

2. Acknowledged connectionless service.


✔ E.g. Wifi 802.11

3. Acknowledged connection-oriented service.


✔ E.g. Telephone Connection

Unit: 2 – Data Link Layer 9 CGPIT, UTU


2.2 Framing
• The data link layer needs to pack bits into frames, so that
each frame is distinguishable from another.

Unit: 2 – Data Link Layer 10 CGPIT, UTU


2.2 Framing
1. Fixed size – The frame is of fixed size and there is no need to provide
boundaries to the frame, length of the frame itself acts as delimiter.

✔ Drawback: It suffers from internal fragmentation if data size is less than frame size
✔ Solution: Padding

2. Variable size – In this there is need to define end of frame as well as beginning
of next frame to distinguish. This can be done in two ways:

✔ Length field – We can introduce a length field in the frame to indicate the length of the
frame. Used in Ethernet(802.3). The problem with this is that sometimes the length field
might get corrupted. (E.g Byte Counting)

✔ End Delimeter (ED) – We can introduce an ED(pattern) to indicate the end of the frame.
Used in Token Ring. The problem with this is that ED can occur in the data. This can be
solved by:
▪ Character/Byte Stuffing
▪ Bit Stuffing

Unit: 2 – Data Link Layer 11 CGPIT, UTU


Length Field (Byte Counting)

A byte stream. (a) Without errors. (b) With one error.

Unit: 2 – Data Link Layer 12 CGPIT, UTU


End Delimiter (Character/Byte Stuffing)

▪ FLAG : A frame delimited by FLAG bytes.


▪ ESC : The ESC byte delimiter used when frame having flag as data.
▪ Four examples of byte sequences before and after byte stuffing.

Unit: 2 – Data Link Layer 13 CGPIT, UTU


End Delimiter (Character/Byte Stuffing)

▪ Byte stuffing is the process of adding 1 extra byte whenever there is a flag or
escape character in the text.

Unit: 2 – Data Link Layer 14 CGPIT, UTU


End Delimiter (Flag bits with bit stuffing)

Bit stuffing. (a) The original data. (b) The data as they appear on
the line. (c) The data as they are stored in the receiver’s memory after destuffing.

Unit: 2 – Data Link Layer 15 CGPIT, UTU


End Delimiter (Flag bits with bit stuffing)

▪ Bit stuffing is the process of adding one extra 0 whenever five consecutive 1s follow a 0
in the data
▪ so that the receiver does not mistake the pattern 0111110 for a flag.

Unit: 2 – Data Link Layer 16 CGPIT, UTU


2.3 Flow Control

▪ Flow Control: Flow control coordinates that amount of data that


can be sent before receiving an acknowledgement.

➢ It is one of the most important duties of the data link layer.


➢ Flow control tells the sender how much data to send.
➢ It makes the sender wait for some sort of an acknowledgement
(ACK) before continuing to send more data.
➢ Flow Control Techniques:
1. Stop-and-wait
2. Sliding Window

Unit: 2 – Data Link Layer 17 CGPIT, UTU


2.4 Error Control

• Data-link layer uses error control techniques to ensure that frames


(i.e. bit streams of data) are transmitted from the source to the
destination with a certain extent of accuracy.

• Errors: When bits are transmitted over the computer network, they
are subject to get corrupted due to interference and network
problems.

• The corrupted bits leads to spurious data being received by the


destination and are called errors.

Unit: 2 – Data Link Layer 18 CGPIT, UTU


Types of the Error
• Errors can be of three types, namely single bit errors, multiple bit
errors, and burst errors.

• Single bit error − In the received frame, only one bit has been
corrupted, i.e. either changed from 0 to 1 or from 1 to 0.

Unit: 2 – Data Link Layer 19 CGPIT, UTU


Types of the Error
Multiple bits error − In the received frame, more than one bits are
corrupted.

Burst error − In the received frame, more than one consecutive bits
are corrupted.

Unit: 2 – Data Link Layer 20 CGPIT, UTU


2.4 Error Control

➢ Error Control Techniques:

1. Error detection − Error detection involves checking whether


any error has occurred or not.
➢ The number of error bits and the type of error does not matter.

2. Error correction − Error correction involves ascertaining the


exact number of bits that has been corrupted and the
location of the corrupted bits.

Unit: 2 – Data Link Layer 21 CGPIT, UTU


3. ERROR DETECTION AND CORRECTION
3.1 Error Detection Code
1. Parity Check
2. Checksum
3. Cyclic redundancy check (CRC)

3.2 Error Correction Code


1. Backward Error Correction (Retransmission)
2. Forward Error Correction

Back to Outline
3.1 Error Detection Code
▪ Error detection : A condition when the receiver’s information does not match
with the sender’s information.

▪ During transmission, digital signals suffer from noise that can introduce errors
in the binary bits travelling from sender to receiver.

▪ Basic approach used for error detection is the use of redundancy bits, where
additional bits are added to facilitate detection of errors.

▪ Some popular techniques for error detection are:


1. Parity Check
2. Checksum
3. Cyclic redundancy check

Unit: 2 – Data Link Layer 23 CGPIT, UTU


1. Error Detection Code (Parity Check)
• The parity check is done by adding an extra bit, called parity bit to the
data to make a number of “1” either even in case of even parity or odd in
case of odd parity.

• While creating a frame, the sender counts the number of 1s in it and


adds the parity bit in the following ways :
Data bit Parity bit
1. Even parity:
✔ If a number of 1s is even then parity bit value is 0. Ex-1. 101101 0
✔ If the number of 1s is odd then parity bit value is 1. Ex-2. 100011 1

2. Odd parity: :
✔ If a number of 1s is odd then parity bit value is 0. Ex-3. 100011 0
✔ If a number of 1s is even then parity bit value is 1.
Ex-4. 101101 1

Unit: 2 – Data Link Layer 24 CGPIT, UTU


1. Error Detection Code (Parity Check)

Even Parity

Unit: 2 – Data Link Layer 25 CGPIT, UTU


1. Error Detection Code (Parity Check)
▪ On receiving a frame, the receiver counts the number of 1s
in it. In case of even parity check, if the count of 1s is even,
the frame is accepted, otherwise, it is rejected.

• A similar rule is adopted for odd parity check.

• The parity check is suitable for single bit error detection only.

Unit: 2 – Data Link Layer 26 CGPIT, UTU


2. Error Detection Code (Checksum)
▪ In this Checksum error detection scheme, the following procedure is
applied:

• Checksum Generate and Validation Process :

1. Data is divided into fixed sized frames or segments.


2. The sender Side :
1. addition the all frame (segment) to get the sum.
2. complements the sum to get the checksum.
3. sends all data frames along with checksum to receiver.
3. The receiver Side :
1. addition the all frame (segment) received..
2. Addition the checksum with sum value.
3. Find 1’s complement of final sum and if it is all 0’s then data receive correctly.

Unit: 2 – Data Link Layer 27 CGPIT, UTU


Checksum Example-1

Checksum

Unit: 2 – Data Link Layer 28 CGPIT, UTU


Checksum Example-2

Unit: 2 – Data Link Layer 29 CGPIT, UTU


Checksum Example-2

Unit: 2 – Data Link Layer 30 CGPIT, UTU


Checksum Example-3

▪ Suppose our data is a list of five 4-bit numbers that we want to


send to a destination. In addition to sending these numbers,
▪ we send the sum of the numbers. For example, if the set of
numbers is (7, 11, 12, 0, 6),
▪ we send (7, 11, 12, 0, 6, 36), where 36 is the sum of the original
numbers.
▪ The receiver adds the five numbers and compares the result with
the sum.
▪ If the two are the same, the receiver assumes no error, accepts
the five numbers, and discards the sum.
▪ Otherwise, there is an error somewhere and the data are not
accepted.

Unit: 2 – Data Link Layer 31 CGPIT, UTU


3. Error Detection Code (Cyclic Redundancy Code)

▪ CRC or Cyclic Redundancy Check is a method of detecting accidental


changes/errors in the communication channel.

▪ CRC involves binary division of the data bits being sent by a


predetermined divisor agreed upon by the communicating system.
▪ The divisor is generated using polynomials.
▪ So, CRC is also called polynomial code checksum.

Unit: 2 – Data Link Layer 32 CGPIT, UTU


3. Error Detection Code (Cyclic Redundancy Code)

▪ Error detection using CRC technique involves the following steps :

▪ Step-1 : Calculation Of CRC At Sender Side


✔ A string of n 0’s is appended to the data unit to be transmitted.
✔ Here, n is one less than the number of bits in CRC generator.
✔ Binary division is performed of the resultant string with the CRC generator.
✔ After division, the remainder so obtained is called as CRC.
✔ It may be noted that CRC also consists of n bits.

▪ Step-2 : Appending CRC To Data Unit at Sender Side


✔ The CRC is obtained after the binary division.
✔ The string of n 0’s appended to the data unit earlier is replaced by the CRC
remainder.

Unit: 2 – Data Link Layer 33 CGPIT, UTU


3. Error Detection Code (Cyclic Redundancy Code)

▪ Step-3 : Transmission To Receiver


✔ The newly formed code word (Original data + CRC) is transmitted to the
receiver.

▪ Step-4 : Checking at Receiver Side


✔ The transmitted code word is received.
✔ The received code word is divided with the same CRC generator.
✔ On division, the remainder so obtained is checked.
✔ If the remainder is zero, Receiver assumes that no error occurred in the
data during the transmission.
✔ If the remainder is non-zero, Receiver assumes that some error occurred in
the data during the transmission.

Unit: 2 – Data Link Layer 34 CGPIT, UTU


3. Error Detection Code (Cyclic Redundancy Code)

Unit: 2 – Data Link Layer 35 CGPIT, UTU


CRC Example-1

Unit: 2 – Data Link Layer 36 CGPIT, UTU


CRC Example-1 without error

Unit: 2 – Data Link Layer 37 CGPIT, UTU


CRC Example-1 with error

Unit: 2 – Data Link Layer 38 CGPIT, UTU


CRC Example-3

Example calculation of the CRC


Unit: 2 – Data Link Layer 39 CGPIT, UTU
CRC Example-4
Calculate CRC for the given data word in polynomial x3+1 and
divisor x3+x+1 where codeword will be of 7 bits. Also show
the generation of codeword at sender side and checking of
code word at receiver side.

CRC Example-5

▪ A bit stream 10011101 is transmitted using the standard CRC


method. The generator polynomial is x3+1.
✔ What is the actual bit string transmitted?
✔ Suppose the third bit from the left is inverted during transmission. How will
receiver detect this error?

Unit: 2 – Data Link Layer 40 CGPIT, UTU


3.2 Error Correcting Code
▪ Error Correction : Error Correction codes are used to detect and correct the
errors when data is transmitted from the sender to the receiver.

▪ In the digital world, error correction can be done in two ways:

1. Backward Error Correction : When the receiver detects an error in the data
received, it requests back the sender to retransmit the data unit.

2. Forward Error Correction : When the receiver detects some error in the data
received, it executes error-correcting code, which helps it to auto-recover and
to correct some kinds of errors. Some popular error correcting methods :
▪ Hamming codes.
▪ Binary convolution codes.
▪ Reed-Solomon codes.
▪ Low-Density Parity Check codes

Unit: 2 – Data Link Layer 41 CGPIT, UTU


Error Correcting Code (Hamming Code)

• The Hamming distance between two codewords is simply the


number of bits that are disparate between two bit strings as
demonstrated in below figure.

• Hamming distance will be calculated on same length binary


string.

Unit: 2 – Data Link Layer 42 CGPIT, UTU


Error Correcting Code (Hamming Code 7-Bit)

Unit: 2 – Data Link Layer 43 CGPIT, UTU


4. ELEMENTARY DATA LINK PROTOCOLS
4.1 Noiseless Channel Protocol
- Simple Protocol
- Stop & Wait Protocol

4.2 Noisy Channel Protocol


- Stop & Wait ARQ
- Go-Back-N ARQ
- Selective Repeat ARQ

Back to Outline
Elementary Data Link Layer Protocols
• Now let us see how the data link layer can combine framing, flow
control, and error control to achieve the delivery of data from one
node to another.

Unit: 2 – Data Link Layer 45 CGPIT, UTU


Noiseless channel (Simple Protocol)
• An ideal channel in which no frames are lost, duplicated or
corrupted is regarded as Noiseless Channel.
• The design of the simplest protocol with no flow or error control.

Unit: 2 – Data Link Layer 46 CGPIT, UTU


Noiseless channel (Simple Protocol)

▪ In simplest protocol, there is no flow control and error control mechanism.


▪ It is a unidirectional protocol in which data frames travel in only one direction
(from sender to receiver).
▪ Also, the receiver can immediately handle any received frame with a processing
time that is small enough to be negligible.

Unit: 2 – Data Link Layer 47 CGPIT, UTU


Noiseless channel (Stop and Wait Protocol)
▪ The simplest retransmission protocol is stop-and-wait.
• Transmitter (Station A) sends a frame over the communication line and then
waits for a positive or negative acknowledgement from the receiver (station B).
• If no error occurs in the transmission, station B sends a positive
acknowledgement (ACK) to station A.

Unit: 2 – Data Link Layer 48 CGPIT, UTU


Noiseless channel (Stop and Wait Protocol)

Unit: 2 – Data Link Layer 49 CGPIT, UTU


Noisy channel (Error Control)
• Consider the normal situation of a communication channel that
makes errors and flow control require.

• Errors Control Mechanism:


• Receiver not able to process incoming frame
• Communication channel may corrupt the frame
• Frame may lost in channel and receive late at receiver
• Damage frame received at receiver

• ARQ (Automatic Repeat Request) : ARQ is a technique to deal with


frame error or lost frames by retransmitting them.
• Feedback channel acknowledgement (ACK)
• Time-out Timer will be set.

Unit: 2 – Data Link Layer 50 CGPIT, UTU


Types of acknowledgement
1. Lost ACK:
client server

Time out
Solution : Time-Out Timer Set

Lost

Time out

Unit: 2 – Data Link Layer 51 CGPIT, UTU


Types of acknowledgement
2. Negative ACK:
client server

Time out

Time out

Unit: 2 – Data Link Layer 52 CGPIT, UTU


Types of acknowledgement
3. Delayed ACK:
client server

Solution : ACK + Sequence No.


Time out

Time out

Unit: 2 – Data Link Layer 53 CGPIT, UTU


Types of acknowledgement
4. Independent ACK:
client server

Time out

Unit: 2 – Data Link Layer 54 CGPIT, UTU


Types of acknowledgement
5. Commutative ACK:
client server

Time out

Unit: 2 – Data Link Layer 55 CGPIT, UTU


Noisy channel (Flow Control)
• Flow Control Mechanism:
• In Noisy channel flow control is also important task.
• For improve efficiency user can send multiple frame

• Sliding Window Protocol :


• It is a flow control protocol.
• Multiple frames can be sent by a sender at a time before receiving an
acknowledgment from the receiver.
• The term sliding window refers to the imaginary boxes to hold frames.
Sliding window method is also known as windowing.

Unit: 2 – Data Link Layer 56 CGPIT, UTU


Sliding Window Protocol

Unit: 2 – Data Link Layer 57 CGPIT, UTU


Sliding Window Protocol

Unit: 2 – Data Link Layer 58 CGPIT, UTU


Noisy channel Protocol
Data Link Layer Protocol

Unit: 2 – Data Link Layer 59 CGPIT, UTU


1. Stop and Wait ARQ Protocol

Unit: 2 – Data Link Layer 60 CGPIT, UTU


1. Stop and Wait ARQ Protocol
ARQ : Automatic Repeat Request
Sender Window Size = 1
Receiver Window Size = 1

Unit: 2 – Data Link Layer 61 CGPIT, UTU


1. Stop and Wait ARQ Protocol

ACK Lost
Frame Lost

Unit: 2 – Data Link Layer 62 CGPIT, UTU


2. Go-Back-N ARQ Protocol

Unit: 2 – Data Link Layer 63 CGPIT, UTU


2. Go-Back-N ARQ Protocol
ARQ : Automatic Repeat Request
Sender Window Size = N
Receiver Window Size = 1

Unit: 2 – Data Link Layer 64 CGPIT, UTU


2. Go-Back-N ARQ Protocol

Unit: 2 – Data Link Layer 65 CGPIT, UTU


2. Go-Back-N ARQ Protocol

Unit: 2 – Data Link Layer 66 CGPIT, UTU


2. Go-Back-N ARQ Protocol

• Important Point of Go-Back-N ARQ Protocol :

1. Go back N, sender window size is N and receiver window size is always 1.


2. Go back N uses cumulative acknowledgements.
3. Go back N may use independent acknowledgements too.
4. Go back N does not accept the corrupted frames and silently discards them.
5. Go back N does not accept out of order frames and silently discards them.
6. Go back N leads to retransmission of entire window if for any frame, no ACK is
received by the sender.
7. Go back N leads to retransmission of lost frames after expiry of time out timer.

Unit: 2 – Data Link Layer 67 CGPIT, UTU


3. Selective Repeat ARQ Protocol
3. Selective Repeat ARQ Protocol

Delivery of data in Selective Repeat ARQ


3. Selective Repeat ARQ Protocol
3. Selective Repeat ARQ Protocol
3. Selective Repeat ARQ Protocol

• Important Point of Selective Repeat (SR) ARQ Protocol :

1. In SR protocol, sender window size is always same as receiver window size.


2. SR protocol uses independent acknowledgements only.
3. SR protocol does not accept the corrupted frames but does not silently discard
them.
4. SR protocol accepts the out of order frames.
5. SR protocol requires sorting at the receiver’s side.
6. SR protocol requires searching at the sender’s side.
7. SR protocol leads to retransmission of lost frames after expiry of time out
timer.

Unit: 2 – Data Link Layer 72 CGPIT, UTU


Go-Back-N and Selective Repeat Animation

• Animation Link :

• https://www2.tkn.tu-berlin.de/teaching/rn/animations/gbn_sr/

Unit: 2 – Data Link Layer 73 CGPIT, UTU


Unit: 2 – Data Link Layer 74 CGPIT, UTU
Unit: 2 – Data Link Layer 75 CGPIT, UTU
Unit: 2 – Data Link Layer 76 CGPIT, UTU
Piggybacking

• Piggybacking means to ride over something.

• In piggybacking, the sender sends a data packet along with the


acknowledgment, if any acknowledgment needs to send at the time of
transmission of the data packet.

• In reliable full - duplex data transmission, the technique of hooking up


acknowledgments onto outgoing data frames is called piggybacking.

• For example, in single message may have two chunks one is for DATA
and the other is ACK. After piggybacking, there is a single message over
the wire in place of two.

Unit: 2 – Data Link Layer 77 CGPIT, UTU


Piggybacking

Unit: 2 – Data Link Layer 78 CGPIT, UTU


Piggybacking

• Advantages :
• better use of bandwidth
• The underlying cable and intermediate switches, router, etc, will be less
loaded.
• If someone is paying the cost to utilize a network based on messages, then
the cost will also be reduced.

• Disadvantages :
• blocking of ack for some time.
• This may cause a connection to go down or may cause a service problem if
the delay is more than expected.
• To avoid problems, piggybacking uses a very small duration timer.

Unit: 2 – Data Link Layer 79 CGPIT, UTU


5. HIGH-LEVEL DATA LINK CONTROL (HDLC)

5.1 Transfer Modes


5.2 HDLC Frame
5.3 Types of HDLC Frames

Back to Outline
High-level Data Link Control (HDLC)
▪ High-level Data Link Control (HDLC) is a group of communication
protocols of the data link layer for transmitting data between network
points or nodes.
▪ Since it is a data link protocol, data is organized into frames.
▪ A frame is transmitted via the network to the destination that verifies its
successful arrival.
▪ It is a bit - oriented protocol that is applicable for both point - to - point
and multipoint communications.

1. Transfer Mode
2. HDLC Frame
3. Types of HDLC Frame

Unit: 2 – Data Link Layer 81 CGPIT, UTU


1. Transfer Mode
▪ HDLC supports two types of transfer modes, normal response mode and
asynchronous balanced mode.
• Normal Response Mode (NRM) − It is used for both point - to - point and
multipoint communications.

Unit: 2 – Data Link Layer 82 CGPIT, UTU


1. Transfer Mode
▪ HDLC supports two types of transfer modes, normal response mode and
asynchronous balanced mode.
▪ Asynchronous Balanced Mode (ABM) − Here, the configuration is balanced, i.e.
each station can both send commands and respond to commands. It is used for
only point - to - point communications.

Unit: 2 – Data Link Layer 83 CGPIT, UTU


2. HDLC Frame
▪ HDLC is a bit - oriented protocol where each frame contains up to six fields. The
structure varies according to the type of frame. The fields of a HDLC frame are:

Unit: 2 – Data Link Layer 84 CGPIT, UTU


2. HDLC Frame
▪ HDLC is a bit - oriented protocol where each frame contains up to six fields. The
structure varies according to the type of frame. The fields of a HDLC frame are:

▪ Flag − It is an 8-bit sequence that marks the beginning and the end of the frame. The bit
pattern of the flag is 01111110.
▪ Address − It contains the address of the receiver. If the frame is sent by the primary
station, it contains the address(es) of the secondary station(s). If it is sent by the
secondary station, it contains the address of the primary station. The address field may
be from 1 byte to several bytes.
▪ Control − It is 1 or 2 bytes containing flow and error control information.
▪ Payload − This carries the data from the network layer. Its length may vary from one
network to another.
▪ FCS − It is a 2 byte or 4 bytes frame check sequence for error detection. The standard
code used is CRC (cyclic redundancy code)

Unit: 2 – Data Link Layer 85 CGPIT, UTU


3. Types of HDLC Frame
▪ There are three types of HDLC frames. The type of frame is determined by the
control field of the frame −

Unit: 2 – Data Link Layer 86 CGPIT, UTU


3. Types of HDLC Frame
▪ There are three types of HDLC frames. The type of frame is determined
by the control field of the frame −

▪ I-frame − I-frames or Information frames carry user data from the


network layer. They also include flow and error control information that
is piggybacked on user data. The first bit of control field of I-frame is 0.

▪ S-frame − S-frames or Supervisory frames do not contain information


field. They are used for flow and error control when piggybacking is not
required. The first two bits of control field of S-frame is 10.

▪ U-frame − U-frames or Un-numbered frames are used for myriad


miscellaneous functions, like link management. It may contain an
information field, if required. The first two bits of control field of U-
frame is 11.

Unit: 2 – Data Link Layer 87 CGPIT, UTU


References
▪ Books :
1. Behrouz Forouzan - "Introduction to Data Communication and
Networking", TMH.
2. Andrew S. Tanenbaum - "Computer network", Pearson education.
▪ Website/Link :
1. https://www.darshan.ac.in/DIET/CE/GTU-Computer-Engineering-Study-
Material
2. https://www.geeksforgeeks.org/network-devices-hub-repeater-bridge-
switch-router-gateways/
3. https://www.gatevidyalay.com/cyclic-redundancy-check-crc-error-
detection/
4. https://www.tutorialspoint.com/high-level-data-link-control-
hdlc#:~:text=High%2Dlevel%20Data%20Link%20Control%20(HDLC)%20i
s%20a%20group,that%20verifies%20its%20successful%20arrival.

Unit: 2 – Data Link Layer 88 CGPIT, UTU


Thank You

Unit: 2 – Data Link Layer 89 CGPIT, UTU

You might also like