0% found this document useful (0 votes)
119 views13 pages

Data Link Layer: Alok Joshi, JIIT128

The data link layer has two main functions: 1. Data link control deals with node-to-node communication through framing, flow control, and error control. 2. Media access control determines how nodes share the transmission link. Framing involves packing data bits into frames with header and trailer bits to distinguish one frame from another. Frames can be fixed size or variable size, using flags or special characters as delimiters. Variable size framing may use byte or bit stuffing to prevent delimiter patterns in data from being misinterpreted as frame boundaries.

Uploaded by

harshit420
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
119 views13 pages

Data Link Layer: Alok Joshi, JIIT128

The data link layer has two main functions: 1. Data link control deals with node-to-node communication through framing, flow control, and error control. 2. Media access control determines how nodes share the transmission link. Framing involves packing data bits into frames with header and trailer bits to distinguish one frame from another. Frames can be fixed size or variable size, using flags or special characters as delimiters. Variable size framing may use byte or bit stuffing to prevent delimiter patterns in data from being misinterpreted as frame boundaries.

Uploaded by

harshit420
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 13

Data Link Layer

Alok Joshi, JIIT128

Functions
The two main functions of the data link layer are a) Data link control deals with the design and procedures for node-to-node communication. b) Media access control.
Deals with media access control, or how to share the link
Alok Joshi, JIIT128

Data Link Control


Data link control functions include Framing Flow Control Error control Software implemented protocols that provide smooth and reliable transmission of frames between nodes.
Alok Joshi, JIIT128

FRAMING
Data transmission in the physical layer means moving bits in the form of a signal from the source to the destination.

The data link layer, on the other hand, needs to pack bits into frames, so that each frame is distinguishable from another.
Alok Joshi, JIIT128

FRAMING
Although the whole message could be packed in one frame, that is not normally done. One reason is that a frame can be very large, making flow and error control very inefficient. Even a single-bit error would require the retransmission of the whole message. When a message is divided into smaller frames, a single-bit error affects only that small frame.

Framing types
1) Fixed-Size Framing There is no need for defining the bouderies of the frames; the size itself can be used as a delimiter. E.g ATM wide-area network, uses frames of fixed size (53-bytes) cells. 2)Variable-Size Framing In variable-size framing, we need a way to define the end of the frame and the beginning of the next (delimiter/Flag).

Variable-Size Framing
a) Character-Oriented Protocols:
1.Data to be carried are 8-bit characters . 2.The header, which normally carries the source & destination addresses and other control information 3.The trailer, which carries error detection or error correction redundant bits, are also multiples of 8 bits. 4.To separate one frame from the next, an 8-bit flag is added at the beginning and the end of a frame. 5.The flag consists of protocol-dependent special characters

Byte stuffing in Character-Oriented Protocols


If pattern of flag is repeated in data, then byte stuffing is used. In byte stuffing (or character stuffing), a special byte is added to the data section of the frame when there is a character with the same pattern as the flag. The data section is stuffed with an extra byte. This byte is usually called the escape character (ESC), which has a predefined bit pattern. Whenever the receiver encounters the ESC character, it removes it from the data section and treats the next character as data, not a delimiting flag
Alok Joshi, JIIT128

If the escape character is part of the text, an extra one is added to show that the second one is part of the text.

Problem with character oriented approach


The universal coding systems in use today, such as Unicode, have 16-bit and 32-bit characters that conflict with 8-bit characters. We can say that in general, the tendency is moving toward the bit-oriented protocols
Alok Joshi, JIIT128

Bit-oriented protocols
In a bit-oriented protocol, the data section of a frame is a sequence of bits to be interpreted by the upper layer. However, in addition to headers (and possible trailers), we still need a delimiter to separate one frame from the other. Most protocols use a special 8-bit pattern flag 01111110 as the delimiter to define the beginning and the end of the frame

Bit-stuffing in bit-oriented protocol


If the flag pattern appears in the data, we need to somehow inform the receiver that this is not the end of the frame. We do this by stuffing 1 single bit (instead of 1 byte) to prevent the pattern from looking like a flag. The strategy is called bit stuffing if a 0 and five consecutive 1-bits are encountered, an extra 0 is added. This extra stuffed bit is eventually removed from the data by the receiver.
Alok Joshi, JIIT128

Bit stuffing and un-stuffing

You might also like