11-6 HDLC High-level Data Link Control (HDLC) is a bit-oriented protocol for communication over point-to-point and multipoint links. It implements the.

Slides:



Advertisements
Similar presentations
Data Link Protocols(HDLC & PPP). Data Link Protocols The set of specifications used to implement the DLL. DLL Protocols Synchronous Protocols Character-oriented.
Advertisements

HIGH-LEVEL DATA LINK CONTROL (HDLC) HDLC was defined by ISO for use on both point-to-point and multipoint data links. It supports full-duplex communication.
William Stallings Data and Computer Communications 7th Edition
Chapter 11. Data Link Control
11.1 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 11 Data Link Control (DLC) Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 11 Data Link Control (DLC) Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Data and Computer Communications Updated: 2/9/2009.
11.1 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
11-5 NOISY CHANNELS Although the Stop-and-Wait Protocol gives us an idea of how to add flow control to its predecessor, noiseless channels are nonexistent.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 11 Data Link Control and Protocols.
The two main functions of the data link layer are data link control and media access control. Data link control deals with the design and procedures for.
11.1 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Data Link Control Slide 1 Data Link Control Chapter 7.
Piggybacking A method to combine a data frame with ACK. Station A and B both have data to send. Instead of sending separately, station A sends a data frame.
Two Protocol Case Studies HDLC & Kermit. HDLC A multi-functional protocol. Works in lots of modes. Forms the basis for MANY of the current protocols in.
11-6 HDLC High-level Data Link Control (HDLC) is a bit-oriented protocol for communication over point-to-point and multipoint links. It implements the.
William Stallings Data and Computer Communications 7 th Edition Chapter 7 Data Link Control Protocols.
1 ELEN 602 Lecture 6 Review of last lecture –Generator polynomials –Stop-and-wait, Go-back-N ARQ Today’s lecture –Selective Repeat ARQ –Analysis of all.
FLAG-8 bit sequence with a bit pattern (7E) ADDRESS-address of secondary station that is either the originator or destination of the frame (or.
11.1 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Example Data Link Protocols Quick review Reference Models? Layers? Flow Control? Bit stuffing? Connection Oriented? Synchronous transmission?
Data Link Protocols Asynchronous Protocols Synchronous Protocols
Gursharan Singh Tatla DATA LINK PROTOCOLS 24-Mar
HDLC and PPP. The Data Link Layer in the Internet A home personal computer acting as an internet host. Technology like Ethernet cannot provide “high-level”
MODULE I NETWORKING CONCEPTS.
Data Link Control Protocols Dr. Muazzam A. Khan. Flow Control Ensuring the sending entity does not overwhelm the receiving entity —Preventing buffer overflow.
11.1 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
11.1 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Kyung Hee University Chapter 11 Data Link Control.
11.1 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Point-to-Point Access: PPP PPP Between Routers  Used for Point-to-Point Connections only  Used as data link control (encapsulates network layer.
Data and Computer Communications Tenth Edition by William Stallings Data and Computer Communications, Tenth Edition by William Stallings, (c) Pearson Education.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Control and Protocols.
11.1 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Kyung Hee University Data Link Protocols. 2 Kyung Hee University 11 장 Data Link Control and Protocols 11.1 Flow and Error Control 11.2 Stop-and-Wait.
Computer Networks Module 3: Data Link Layer (Framing) Dr. Vikram Shete St. Francis Institute of Technology.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 11 Data Link Control and Protocols.
Chapter 11 Data Link Protocols A data link protocol is a set of specifications used to implement the data link layer [A protocol is the set of rules or.
Chapter 11 Data Link Control
Data Link Layer: Data Link Control : Data Communication and Computer Networks Asst. Prof. Chaiporn Jaikaeo, Ph.D.
11.1 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CIS : Data Link Control. Flow Control Ensuring the sending entity does not overwhelm the receiving entity —Preventing buffer overflow Transmission.
Data Link Protocols ผศ.ดร. อนันต์ ผลเพิ่ม
1 Reliable stream service--TCP 1.TCP accepts byte stream, segments 2.It is over IP, so out-of-sequence is very common --lost or error frame results in.
FIT – Monash University High-Level Data Link Control
Chapter 11 Data Link Control.
Chapter 11 Data Link Control and Protocols Flow and Error Control Flow Control Error Control.
11.1 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Data and Computer Communications Data Link Control Protocols.
11.1 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 11 Data Link Control and Protocols 1.
Data Communications Data Link Layer.
2.10 Flow and Error Control Before that ...
High level Data Link Layer Protocol - HDLC
HDLC and PPP.
Chapter 11 Data Link Control
Chapter 11 Data Link Control (DLC)
Chapter 11 Data Link Control and Protocols
Chapter 11 Data Link Control
DATA LINK CONTROL (DLC)
Chapter 11 - Part 2 Data Link Control.
Chapter 3 Data Link Layer.
ICSA 341 Data Communications & Networking
CIS 321 Data Communications & Networking
Chapter 11 Data Link Control (DLC)
Chapter 11 Data Link Control and Protocols.
Flow control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. Error control.
Kendali Data Link dan Protokol
Data Link Control (DLC) Services
Presentation transcript:

11-6 HDLC High-level Data Link Control (HDLC) is a bit-oriented protocol for communication over point-to-point and multipoint links. It implements the ARQ mechanisms Figure Normal response mode Configuration and Transfer Modes NRM The station configured as unbalanced. On primary and multiple secondary stations A primary station can send commands and secondary can respond Used for both point-to-point and multipoint links

ABM The configuration is balanced Link is point to point Each station can function as primary/secondary Station Types Primary Secondary Combined Link Configuration point-to-multipoint links Point-to-point links Figure Asynchronous balanced mode Configuration and Transfer Modes

Frames Three types of frames I-frames(Information frames) To transport user data or control information for user data like piggy backing S-frames(Supervisory frames) To transport Control frames U-frames(Unnumbered frames) For link management

Fields Flag Field It is an 8-bit sequence with a bit pattern of Identify start and end of the frame Serve for the synchronization Bi stuffing is used to avoid the appearance of this number in that data Address field Address of the secondary station Whether the station is the originator or the destination If primary creates the frame it contains “to” otherwise “from” It can be 1 or several byte long Always the last bit ends with 1 If more than one byte all byte’s last bit,except the last byte,will end with 0. Ethernet does not use primary/secondary environment,uses two address fields Sender address Receiver address

HDLC Header Fields Control Field 1 or 2 byte Used for error and flow control Interpretation is different for different frame types Information Field User’s data from the network layer or Network management information layer Length can vary but fixed for one network FCS Frame check sequence It contain 2 or 4 byte ITU-T CRC

Figure HDLC frames Figure Control field format for the different frame types

Fields Flag Field It is an 8-bit sequence with a bit pattern of Identify start and end of the frame Serve for the synchronization Bi stuffing is used to avoid the appearance of this number in that data Address field Address of the secondary station Whether the station is the originator or the destination If primary creates the frame it contains “to” otherwise “from” It can be 1 or several byte long Always the last bit ends with 1 If more than one byte all byte’s last bit,except the last byte,will end with 0. Ethernet does not use primary/secondary environment,uses two address fields Sender address Receiver address

Fields Control Field 1 or 2 byte Used for error and flow control Interpretation is different for different frame types Information Field User’s data from the network layer or Network management information layer Length can vary but fixed for one network FCS Frame check sequence It contain 2 or 4 byte ITU-T CRC

FRAME TYPES I-frame S-frame CodeTypes of S-framesMeaning 00RRAcknowledges a safe receipt of frame /frames 10RNRAcknowledges the receipt of frames but tells that receiver is not ready yet to receive further frames 01REJUsed in Go-back-N to improve the efficiency and tells about the lost frame to the sender before its timer expires 11SREJUsed in selective Repeat

Table 11.1 U-frame control command and response

Figure shows how U-frames can be used for connection establishment and connection release. Node A asks for a connection with a set asynchronous balanced mode (SABM) frame; node B gives a positive response with an unnumbered acknowledgment (UA) frame. After these two exchanges, data can be transferred between the two nodes (not shown in the figure). After data transfer, node A sends a DISC (disconnect) frame to release the connection; it is confirmed by node B responding with a UA (unnumbered acknowledgment). Example 11.9 Figure Example of connection and disconnection

Figure shows an exchange using piggybacking. Node A begins the exchange of information with an I-frame numbered 0 followed by another I-frame numbered 1. Node B piggybacks its acknowledgment of both frames onto an I-frame of its own. Node B’s first I-frame is also numbered 0 [N(S) field] and contains a 2 in its N(R) field, acknowledging the receipt of A’s frames 1 and 0 and indicating that it expects frame 2 to arrive next. Node B transmits its second and third I-frames (numbered 1 and 2) before accepting further frames from node A. Example Its N(R) information, therefore, has not changed: B frames 1 and 2 indicate that node B is still expecting A’s frame 2 to arrive next. Node A has sent all its data. Therefore, it cannot piggyback an acknowledgment onto an I-frame and sends an S-frame instead. The RR code indicates that A is still ready to receive. The number 3 in the N(R) field tells B that frames 0, 1, and 2 have all been accepted and that A is now expecting frame number 3.

Figure Example of piggybacking without error

Figure shows an exchange in which a frame is lost. Node B sends three data frames (0, 1, and 2), but frame 1 is lost. When node A receives frame 2, it discards it and sends a REJ frame for frame 1. Note that the protocol being used is Go-Back-N with the special use of an REJ frame as a NAK frame. The NAK frame does two things here: It confirms the receipt of frame 0 and declares that frame 1 and any following frames must be resent. Node B, after receiving the REJ frame, resends frames 1 and 2. Node A acknowledges the receipt by sending an RR frame (ACK) with acknowledgment number 3. Example 11.11

Figure Example of piggybacking with error

11-7 POINT-TO-POINT PROTOCOL Although HDLC is a general protocol that can be used for both point-to-point and multipoint configurations, one of the most common protocols for point-to-point access is the Point-to-Point Protocol (PPP). PPP is a byte-oriented protocol. Figure PPP frame format PPP is a byte-oriented protocol using byte stuffing with the escape byte

Figure Transition phases

Figure Multiplexing in PPP

Table 11.2 LCP packets Figure LCP packet encapsulated in a frame

Figure PAP packets encapsulated in a PPP frame Table 11.3 Common options

Figure CHAP packets encapsulated in a PPP frame

Table 11.4 Code value for IPCP packets Figure IPCP packet encapsulated in PPP frame

Figure Multilink PPP Figure IP datagram encapsulated in a PPP frame

Let us go through the phases followed by a network layer packet as it is transmitted through a PPP connection. Figure shows the steps. For simplicity, we assume unidirectional movement of data from the user site to the system site (such as sending an through an ISP). The first two frames show link establishment. We have chosen two options (not shown in the figure): using PAP for authentication and suppressing the address control fields. Frames 3 and 4 are for authentication. Frames 5 and 6 establish the network layer connection using IPCP. Example The next several frames show that some IP packets are encapsulated in the PPP frame. The system (receiver) may have been running several network layer protocols, but it knows that the incoming data must be delivered to the IP protocol because the NCP protocol used before the data transfer was IPCP. After data transfer, the user then terminates the data link connection, which is acknowledged by the system. Of course the user or the system could have chosen to terminate the network layer IPCP and keep the data link layer running if it wanted to run another NCP protocol.

Figure An example

Figure An example (continued)