ECP2056 chapter 4 part B - ECP 2056 : DATACOMMUNICATIONS...

Info iconThis preview shows pages 1–13. Sign up to view the full content.

View Full Document Right Arrow Icon
FACULTY OF ENGINEERING, CYBERJAYA YEAR 2008 ECP 2056 : DATACOMMUNICATIONS AND COMPUTER NETWORKING Saiful Jumaat Osman, SUPELEC France        4.2) Framing, flow and error control 4.3) Stop-and-Wait protocol, Automatic Repeat    4.4) HDLC CHAPTER 4 : Reliable Data Communications
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CHAPTER 4 : Reliable Data Communications Table Of Contents (1)  Error detection and correction (2)  Framing, flow and error control (3) Stop-and-Wait protocol, Automatic Repeat  (4)  HDLC
Background image of page 2
3 FRAMING FRAMING The data link layer needs to pack bits into The data link layer needs to pack bits into frames frames , , so that each frame is distinguishable from another. so that each frame is distinguishable from another. Our postal system practices a type of framing. The Our postal system practices a type of framing. The simple act of inserting a letter into an envelope simple act of inserting a letter into an envelope separates one piece of information from another; separates one piece of information from another; the envelope serves as the delimiter. the envelope serves as the delimiter. Fixed-Size Framing Variable-Size Framing Topics discussed in this section: Topics discussed in this section: CHAPTER 4 : Reliable Data Communications
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4 Figure 1 A frame in a character-oriented protocol CHAPTER 4 : Reliable Data Communications
Background image of page 4
5 Figure 2 Byte stuffing and unstuffing CHAPTER 4 : Reliable Data Communications
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
6 Byte stuffing is the process of adding 1 extra byte whenever there is a flag or escape character in the text. Note CHAPTER 4 : Reliable Data Communications
Background image of page 6
7 Figure 3 A frame in a bit-oriented protocol CHAPTER 4 : Reliable Data Communications
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
8 Bit stuffing is the process of adding one extra 0 whenever five consecutive 1s follow a 0 in the data, so that the receiver does not mistake the pattern 0111110 for a flag. Note CHAPTER 4 : Reliable Data Communications
Background image of page 8
9 Figure 4 Bit stuffing and unstuffing CHAPTER 4 : Reliable Data Communications
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
10 FLOW AND ERROR CONTROL The most important responsibilities of the data link The most important responsibilities of the data link layer are layer are flow control flow control and and error control error control . Collectively, . Collectively, these functions are known as these functions are known as data link control data link control . . Flow Control Error Control Topics discussed in this section: Topics discussed in this section: CHAPTER 4 : Reliable Data Communications
Background image of page 10
11 Flow control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. CHAPTER 4 : Reliable Data Communications Error control in the data link layer is based on automatic repeat request, which is the retransmission of data.
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
12 PROTOCOLS PROTOCOLS Now let us see how the data link layer can combine Now let us see how the data link layer can combine framing, flow control, and
Background image of page 12
Image of page 13
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 08/27/2009 for the course FET data com taught by Professor Hi during the Spring '09 term at Multimedia University, Cyberjaya.

Page1 / 57

ECP2056 chapter 4 part B - ECP 2056 : DATACOMMUNICATIONS...

This preview shows document pages 1 - 13. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online