0 ratings0% found this document useful (0 votes) 86 views8 pagesDLL Protocols, HDLC, LAN, LLC-PDU, MAC Protocols (ALOHA)
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
DATA LINK PROTOCOLS
F :
6 protocols are sets of specifications used t implement the Aata Ninh Neyer
Data link pr
Data link protocols can be divided into two subgroups +
(Asynchronous protocols
Data Link Protocols
(ii) Synchronous protocols
‘Asynchronous
Bit oriented
(i) Asynchronous protocol
In asynchronous transmission, a data unit is transmitted with no timing coordination
between the sender and receiver.
A receiver does not need to know exactly when 2 data unit is sent, it only needs to recognize the
beginning and end of the data unit. This is accomplished by using extra bits i.e, start and atop bits
to frame the data unit. Due to addition of start and stop bits and extended spaces between frames,
asynchronous protocol are extremely slow,
Example : XMODEM, YMODEM, ZMODEM, BLAST, KERMIT
(i) Synchronous Protocol
Synchronous protocol can be divided into two classes - (a) Character oriented protocols (b) Bit
oriented protocols,
In Character oriented protocols, also called as byte oriented isi
= 7 Protocols, the frame is interpreted as &
series of characters. Each character ol i ion is ji
of an existing character ing sy composed of one byte, All control information is in the form
Example : ASCII characters
‘Scanned wih CamScannerIn Bit oriented protocols, the frame fy interpreted as a serles of bits, Rach bit or group of bls have
meaning depending on thelr placement in the frame, Control Information in » bit orlented protocol
can be one or multiple bits,
Exampk
DLC, HDLC
High Level Data Link Control Protocol (IIDLC)
HDLC is the most important data link control protocol,
Basic Characteristi
To satisfy a variety of applications, HDLC defined
«Three types of stations
+ Two link configurations
¢ Three data transfer modes of operation
Types of Stations
Primary Station
Nas the responsibility for controlling the operation of the link, Frames
Secondary Station
issued by the pri called commands,
Operates under the control of the primary station, Frames Issued by a
secondary are called responses. ‘The primary maintains a separate
logical link with each secondary station on the fine
‘Combined Station
Combines the features of primary and secondary. A combined station
may issue both commands and responses,
Two Link Configurations
Unbalanced Configuration
Consists of one primary and one or more secondary and supporis both
full-duplex and half-duplex trangmission,
Balanced Configuration
Consists of two combined stations and supports both full-duplex and
half-duplex transmission,
Three Data Transfer Modes
Normal Response Mode
(NRM)
Used with an unbalanced configuration, ‘The primary may initiate data
transfer to a secondary, but a secondary may only transmit data in
response to a command from the primary,
Asynchronous Balanced
Mode (ABM)
Asynchronous Response
Mode (ARM)
Used with a balanced configuration, Either combined station may
initiate transmission without recelving permission from the other
combined station,
Used with an unbalanced configuration, The secondary may initiate
transmission without explilt permission of the primary, The primary
still retains responsibility for the line, including, initialization, error
Frame Structure
fa
recovery and logical disconnection,
HDLC uses synchronous transmission, All transmission are in the form of frames and a single frame
format suffices for all types of data and control exchanges.
Header: The flag, address and control fields that. precede the Information field.
‘Trailer : The FCS and fag fields following the data field,
‘Scanned wih ComScanner[ne [ain] cme [sees Ts [ne]
e+ 16 oF 32
ae hf or 16 vara
bile extendable
(a) Frame format
DIAS OTA DON ISIS 8a
(b) Extended address field
123 678
vtntormation [0 To fs) [re] 6) |
= iber
ssspnton [TTi[ # [re] wa] MO) sSenttcm amas
S_ = Supervisory function bits
U: Unnumbered CT [™ fel |] M_ «7 Uanumbered funtion bs
(€) &-bit control field format
Fig. HDLC Frame Structure
Flag Fields a
Flag fields delimit the frame at both ends with the unique pattern 01111110. The data is bit stuffed at
the transmitter and unstuffed at the receiver,
Address Fields
The address fields identify the secondary station that transmitted or is to receive the frame.
Control Fields
HDLC defines three types of frames, each with a different control field format.
They carry the data to be transmitted for the user. Additionally flow
and error control data using the ARQ mechanism are piggybacked on
an information frame.
Information frames
(I-frames)
Supervisory frames
Glee) They provide the ARQ mechanism when pigeybacking is not used.
Unnumbered f ' .
"Usttames) They provide supplemental link control functions,
Frame Check Sequence Field
Fes 7 an eror-detesting code calculated from the remaining bits of the flags, exclusive of flags and
Operation
The operation of HDLC involves three phases:
(i) Initialization
Initialization may be requested by either side. The cot
7 r : mmands serve :
a) It signals the other side that initialization is requested, aes
b) It specifies which ofthe three modes (NRM, ABM, ARM) is requested
¢) I-specifies whether 3 ~ or 7 bit sequence numbers are to be used
‘Scanned wih CamScannerIf the other sides accepts this request, then the HDLC module on that end transmits an
ur umnbered acknowledged (UA) frame back to the initiating side. Ifthe request is rejected, then a
Gisconnected mode (DM) frame is sent.
(ji) Data Transfer
‘When the initialization had been requested and accepted, then a logical connection is established,
Both sides may begin to send user data in I-frames, starting with sequence number 0, The N(S)
and N(R) fields of the I-frame are sequence numbers that support flow control and error control.
Disconnect
Either HDLC module can initiate a disconnect by issuing a disconnect (DISC) frame. The other
side reply’s with UA.
+ | LOCAL AREA NETWORKS
independent devices to communicate directly with each other in a limited geo;
graphic
area.
PROJECT 802
In 1985, the computer society of IEEE developed project 802. It covers the first two layers of the OSI
model and part of the third level.
6 A local area network (LAN) is a data communication system that allows a number of
Project 802 ‘OSI Model
Fig. LAN compared with the OSI model
The IEEE subdivided the datalink layer into two sublayer — logical link control, media access control
—
Project 802
OSI Mode!
Fig. project 802
‘Scanned with CamScanner; nite 2. gta of functions,
‘The IBEL project 102 model takes the structure of HDLG frame and divides 11
One set contains the end user portions of the fame
= the logleal address
= the control information
= data
sonsidered the: upper Inzer OF the
‘These functions are handled by IBLE 802.2 LLC protocol, LLG Is ¢
IEEE 802 datatink layer and Is common LAN protocol,
iy, flow and
chronvzation Me
eee ell a8 the
Medium Access Control (MAC)
place (0 another, a
MAC sublayer provides an access to the shared media, It cant th
error contro! specifications necessary (0 move Information ae
physical address of the next station to recolve and route # packet,
MAC functions include t
(1) At transmitter, assemble data into framo wit
(2) At receiver, dissemble frame, perform address recogt
(3) Govern access to the LAN transmission media.
MAC provides an specific to the LAN using them,
h address and error detecting field.
ition and error detection.
MAC Frame format
The MAC layer receivets a block of data from the LLC layer
functions related to medium access and for transmitting data,
and ta responsible for performing
ig. MAC Frame
Standardized Medium Access Control Techniques
Round Robin
With round robin cach station in turn is given the opportunity to transmit, During this time, the station
may decline to transmit or may transmit. In any case, the station when it is finished, relinquishes its
turn and the right to transmit passes to the next station is logical sequence,
Logical Link Control
LLC services +
LLC specifies the mechanism for addressing stations across the medi i
a medium and
exchange of data between two users, ‘The operation and format of this standard is cacd a HDL =
Some services are provided :
(i) (acknowledged connections service :
1 is very simple service, that does not i
i , involve
" tlncy eee a as any of the flow and error control mechanism. Thus,
(ii) Connection-mode service :
This service is similar to that offered by HDLC. A logical connecti
. C1
exchanging data and flow re provi
in aahansing control and error controls a id
° of and provided,
fee ceed comect lonless service :
ion is set up between two users
data
are to be acknowledged but no Prior logical connection is set up.
‘Scanned wih ComScannerThe unacknowledged connectionless service requires, minimum logic.
* The connection mode service could be used in very simple devices such as terminal controller.
LLC protocol
The basic LLC protocol is modeled other HDLC and has similar functions and formats.
(i) LLC makes use of the asynchronous, balanced mode operation of HDLC in order to support
connection mode LLC services. This is type-2 operation.
(ii) LLC supports a connectionless service using the unnumbered information PDU. This is type-I
operation.
(iii) LLC supports an acknowledged connectionless service by using two new unnumbered PDU’s.
This is type-3 operation:
LLC-PDU
The data unit in the LLC level is called the Protocol data unit,
DSAP| SSAP| Control} Information
Fig. PDU
DSAP - Destination service Access point
SSAP — Source service Access point
Control— The control field of PDU is identical to the control field in HDLC.
[osar [ ssap ] conteot Information
Tame [0 el PIF Pollifinal bit
NG) Nim) NS) _ Sequence number
of frame sent
S-Frame LTT] see) sequence number
of next frame expected
Code N®) Code Code for supervisory of
Ei unnumbered frames
U-Frame. [7] 1]
Code Code
Fig. Control Field in PDU
All three LLC protocols employ the same PDU format. The DSAP and SSAP fields each contain 8 bit
| addresses which specify the destination and source users of LLC
__ + MSB bit of DSAP indicates whether the DSAP is an individual or group address. MSB bit of the
;
SSAP indicates whether the PDU is a command or response PDU.
* For type-I operation (unacknowledged connectionless service) the unnumbered information (UI)
PDU iis used for data transfer. There is no acknowledgements, flow control or error control,
However there is error detection and discard at the receiver.
£2" {ype-2 operation (connection mode) data link connection is established setting two LLC
SAP's prior to data exchange. The LLC entity issues a SABME PDU to request a logical
connection with the other LLC. entity. If the connection is accepted by the LLC user designated by
the DSAP, then the destination LLC entity returns an unnumbered acknowledgement (UA) PDU.
The Connection is henceforth uniquely identified by the pair of user SAP’s If the destination LLC
“er ejects the connection request, its LLC entity retums a disconnegt mode (DM) PDU.
‘Scanned wih CamScannerOnce the connection is established, data is exchanged using the Infirmaony PHN’ WG Aa
‘The information PDU includes send and receives: sequence nambers for ee wen rtther LLC
IW HDLC for flow conte
‘Soatol. The supervisory PDU are used as in HDLC for flow a s SC) PDU,
entity can terminate a logical LLC connection hy issuing a disconnect (DISC
cl vice) ench transmitted POU ty
© With ype openttion (Acknowledged connectiontess service) ana a) ntoraan
acknowledged. A new unnumbered POU, the en a vst be aoknowledged asin, the
Dis defined. U: are sent it. AC command P At Be REO eRe sent
AC ee UT and against fost POU, a 1 BIC sequence euumier,o used. eae
With the opposite number of the corresponding command, only one
sew at any time.
MULTIPLE ACCESS PROTOCOLS
ALORA
9 WO versions of ALOHA
— PureALOHA
— Sloted ALOHA
Bee oes Wishing to transmit is allowed to transmit, If more that one devices attempt to tae at
the same time, there will be collision and the transmitted frame will be destroyed, A sender waits for a
reasonable amount of time after transmitting for an acknowledgement, If there is no acknowledgement
the station assumes that a collision has occurred and retransmits the frame again,
Receiving station, examines the frame for address detection, If the address is recognized it check for
exror if any. If'a received frame is valid then it immediately sends an acknowledgement, If'a received
fame is not valid, it simply ignores the frame because the no. of collisions rise rapidly with increased
load. The maximum utilization of the channel is only about 18%, To improve efficiency a
modification of ALOHA known as slotted ALOHA was developed,
LOHA
In this scheme, the time on the channel is divided into discrete intervals, each interval corresponding
to frame transmission time. This approach requires the users to agree of slot boundaries, Transmission
is permined to began only at a slot boundary, Thus continuous pure ALOHA is tumed into a discrete
e
novases the maximum utilization of the channel to about 37%. Both ALOHA exhibi poor
i 3 it
Both fail to take the advantage that the propagation delay between stations i y very
a A a gal y between stations is usually
Efficiency of ALOHA Channel
* the “frame time’ denote the amount of the time needed to transmit frame.
Let S be the average no. of new frames frame ti Tis tadard fed Length
crit taa ie hone pened nara ie time. IfS > 1, the user is generating frames at
: and nearly every * |
For rasonable throughput we expect O <8 < 1c In addltiog eons eset collision,
“Session of ames that previously sufferd collisions, SY Ames: the station also generate
LetG be the average no. of Ss
age No. of transmi
+ Atlow load (ie §= a
0) there wil
will .
Athigh load, there wil be fev
* Under all load, § = Gi
pts (old + new) per frame time, Clearly G 2S.
Collision . ke
llbe many collisions, soG= $e EY FetNsMission so G = S,
P es ts
9 Where Pp is the Probability that a frame does not suffer collision,
‘Scanned wih CamScanner‘A frame will not suffer a collision if no other frames are sent within one frame time of its start as
shown :
the shaded
frame
tt tot 2t
Vulnerable ————>|
Fig. Vulnerable period for the shaded frame.
Let t be the time required to send a frame. If any other user has generated a frame between time tp and
to+ t, the end of that frame will collide with the shaded one. Similarly any other frame started between
to+t and to + 2t will collide with the end of the shaded one. If the frame starts after to + 2t time, there
will be no collision. The probability that k frames are generated during a given frame time is given by
Poisson distribution
tere
a-Se
The probability of zero frame ise. In an interval two frame time long the average no. of frames
generated is 2G.
The probability of no other traffic being initiated i.e. zero frame generated during the entire vulnerable
period is thus given by
P, =e
with S=GP, weget S=G-e7
The maximum throughput occurs at G = 0.5.
When G=0.5, S=(0.5)e*™ “+ = 0.184
That means channel utilization is 18.44.
With slotted ALOHA, station is required to wait for the beginning of the next slot. The probability of
no other traffic during the frame time is thus P, =e~° and then
S=GP, =Ge°
Max. throughput occurs at G = 1
S= Ger? =e =1/e= 0.368
That means channel utilization is 36.8 % i.e. nearly 37 % successes.
Operating at higher value of G reduces the number of empties but increases the number of collisions.
‘The probability that it will avoid collision = e“®. Then, the probability of collision is= (1- e-°)
Tee probability of a transmission requiring exactly k attempts i.e. (k — 1) collisions followed by one
sis
P= e(1-e0)
The expected number of transmission E
B= Dik-R = k-eS(1-e°9)#4 = 8
a
‘Scanned wih CamScanner