0% found this document useful (0 votes)
11 views17 pages

Framing

Uploaded by

wtfhub2069
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views17 pages

Framing

Uploaded by

wtfhub2069
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 17

Department of Applied Computational Science & Engg

Course Code :(KCS- 603) Course Name:Computer Networks

Checksum

• .

Subject: Computer Networks


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

Checksum

• .

Subject: Computer Networks


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

Checksum

• .

Subject: Computer Networks


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

Checksum

• .

Subject: Computer Networks


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

• Packet of data transmitted as a polynomial 1101 =


Cyclic Redundancy Check (CRC)
x^3+x^2+1
• At sender end - the polynomial is divided by the given

generating polynomial
• Remainder is attached to the end of the message
• Quotient is discarded
• Message is transmitted
• Receiver divides the message with same polynomial
• If remainder not equal to zero then error occurred
• Else equal to zero then no error
Subject: Computer Networks
Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

Cyclic Redundancy Check (CRC)

Subject: Computer Networks


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

Cyclic Redundancy Check (CRC)

Subject: Computer Networks


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

11-1 FRAMING

• The data link layer needs to pack bits into frames, so that each frame is distinguishable from another.
• Our postal system practices a type of framing.
• The simple act of inserting a letter into an envelope separates one piece of information from another; the envelope serves as the

delimiter.
• Framing in the data link layer separates a message from one source to a destination, or from other messages to other

destinations, by adding a sender address and a destination address.


• The destination address defines where the packet is to go; the sender address helps the recipient acknowledge the receipt.
• When a message is divided into smaller frames, a single-bit error affects only that small frame.
• Frames can be of fixed or variable size.

Subject: Computer Networks


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

Fixed-Size Framing

• In fixed-size framing, there is no need for defining the boundaries of the frames; the size itself can be used as a delimiter.
• An example of this type of framing is the ATM wide-area network, which uses frames of fixed size called cells.

Variable-Size Framing

• In variable-size framing, we need a way to define the end of the frame and the beginning of the next.
• Historically, two approaches were used for this purpose: a character-oriented approach and a bit-oriented approach.
• Character-Oriented Protocols :
• In a character-oriented protocol, data to be carried are 8-bit characters from a coding system such as ASCII .
• The header, which normally carries the source and destination addresses and other control information, and the trailer,

which carries error detection or error correction redundant bits, are also multiples of 8 bits.

Subject: Computer Networks


• To separate one frame from the next, an 8-bit (I-byte) flag is added at the beginning and the end of a frame.
• The flag, composed of protocol-dependent special characters, signals the start or end of a frame.
• Figure 11.1 shows the format of a frame in a character-oriented protocol.

Figure 11.1 A frame in a character-oriented protocol

• Character-oriented framing was popular when only text was exchanged by the data link layers.
• The flag could be selected to be any character not used for text communication.
• Now, however, we send other types of information such as graphs, audio, and video.
• Any pattern used for the flag could also be part of the information.
• If this happens, the receiver, when it encounters this pattern in the middle of the data, thinks it has reached the end

of the frame.

Subject: Computer Networks


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

Byte Stuffing

• To fix this problem, a byte-stuffing strategy was added to character-oriented framing.


• In byte stuffing (or character stuffing), a special byte is added to the data section of the frame when there is a character with the

same pattern as the flag.


• The data section is stuffed with an extra byte.
• This byte is usually called the escape character (ESC), which has a predefined bit pattern.
• Whenever the receiver encounters the ESC character, it removes it from the data section and treats the next character as data,

not a delimiting flag.


• What happens if the text contains one or more escape characters followed by a flag?
• The receiver removes the escape character but keeps the flag, which is incorrectly interpreted as the end of the frame.
• To solve this problem, the escape characters that are part of the text must also be marked by another escape character.

Subject: Computer Networks


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

Figure 11.2 Byte stuffing and unstuffing

Subject: Computer Networks


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

Note

Byte stuffing is the process of adding 1 extra byte whenever there is a

flag or escape character in the text.

Subject: Computer Networks


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

Bit-Oriented Protocols

• In a bit-oriented protocol, the data section of a frame is a sequence of bits to be interpreted by the upper layer as text, graphic,

audio, video, and so on.


• However, in addition to headers (and possible trailers), we still need a delimiter to separate one frame from the other.
• Most protocols use a special 8-bit pattern flag 01111110 as the delimiter to define the beginning and the end of the frame, as

shown in Figure 11.3.


• If the flag pattern appears in the data, we need to somehow inform the receiver that this is not the end of the frame.
• We do this by stuffing 1 single bit (instead of I byte) to prevent the pattern from looking like a flag. The strategy is called bit

stuffing.
• In bit stuffing, if a 0 and five consecutive I bits are encountered, an extra 0 is added.
• This extra stuffed bit is eventually removed from the data by the receiver.
• This guarantees that the flag field sequence does not inadvertently appear in the frame.

Subject: Computer Networks


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

Figure 11.3 A frame in a bit-oriented protocol

Subject: Computer Networks


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

Note

Bit stuffing is the process of adding one extra 0 whenever five

consecutive 1s follow a 0 in the data, so that the receiver does not

mistake

the pattern 0111110 for a flag.

Subject: Computer Networks


Department of Applied Computational Science & Engg
Course Code :(KCS- 603) Course Name:Computer Networks

Figure 11.4 Bit stuffing and unstuffing

Subject: Computer Networks

You might also like