SlideShare a Scribd company logo
1 of 43
Chapter 11 Data Link Control and Protocols
11.1  Flow and Error Control Flow Control Error Control
Flow control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. Note :
Error control in the data link layer is based on automatic repeat request, which is the retransmission of data.  Note :
11.2  Stop-and-Wait ARQ Operation Bidirectional Transmission
11.1   Normal operation
11.2   Stop-and-Wait ARQ, lost frame
11.3   Stop-and-Wait ARQ, lost ACK frame
In Stop-and-Wait ARQ, numbering frames prevents the retaining of duplicate frames. Note :
11.4   Stop-and-Wait ARQ, delayed ACK
Numbered acknowledgments are needed if an acknowledgment is delayed and the next frame is lost.  Note :
11.5   Piggybacking
11.3  Go-Back-N ARQ Sequence Number Sender and Receiver Sliding Window Control Variables and Timers Acknowledgment Resending Frames Operation
11.6   Sender sliding window
11.7   Receiver sliding window
11.8   Control variables
11.9   Go-Back-N ARQ, normal operation
11.10   Go-Back-N ARQ, lost frame
11.11   Go-Back-N ARQ: sender window size
In Go-Back-N ARQ, the size of the sender window must be less than 2m; the size of the receiver window is always 1. Note :
11.4  Selective-Repeat ARQ Sender and Receiver Windows Operation Sender Window Size Bidirectional Transmission Pipelining
11.12   Selective Repeat ARQ, sender and receiver windows
11.13   Selective Repeat ARQ, lost frame
In Selective Repeat ARQ, the size of the sender and receiver window must be at most one-half of 2 m .  Note :
11.14   Selective Repeat ARQ, sender window size
Example 1 In a Stop-and-Wait ARQ system, the bandwidth of the line is 1 Mbps, and 1 bit takes 20 ms to make a round trip. What is the bandwidth-delay product? If the system data frames are 1000 bits in length, what is the utilization percentage of the link? Solution The bandwidth-delay product is 1    10 6     20    10 -3  = 20,000 bits The system can send 20,000 bits during the time it takes for the data to go from the sender to the receiver and then back again. However, the system sends only 1000 bits. We can say that the link utilization is only 1000/20,000, or 5%. For this reason, for a link with high bandwidth or long delay, use of Stop-and-Wait ARQ wastes the capacity of the link.
Example 2 What is the utilization percentage of the link in Example 1 if the link uses Go-Back-N ARQ with a 15-frame sequence? Solution The bandwidth-delay product is still 20,000. The system can send up to 15 frames or 15,000 bits during a round trip. This means the utilization is 15,000/20,000, or 75 percent. Of course, if there are damaged frames, the utilization percentage is much less because frames have to be resent.
11.5  HDLC Configurations and Transfer Modes Frames Frame Format Examples Data Transparency
11.15   NRM
11.16   ABM
11.17   HDLC frame
11.18   HDLC frame types
11.19   I-frame
11.20   S-frame control field in HDLC
11.21   U-frame control field in HDLC
Table 11.1  U-frame control command and response Request information mode RIM Set initialization mode SIM Reset RSET Exchange ID XID Frame reject FRMR Unnumbered information UI Unnumbered acknowledgment UA Request disconnect RD Disconnect DISC Disconnect mode DM Unnumbered poll UP Set asynchronous balanced mode (extended) SABME Set asynchronous balanced mode SABM Set normal response mode (extended) SNRME Set normal response mode Meaning SNRM Command/response
Example 3 Figure 11.22 shows an exchange using piggybacking where is no error. Station A begins the exchange of information with an I-frame numbered 0 followed by another I-frame numbered 1. Station B piggybacks its acknowledgment of both frames onto an I-frame of its own. Station B’s first I-frame is also numbered 0 [N(S) field] and contains a 2 in its N(R) field, acknowledging the receipt of A’s frames 1 and 0 and indicating that it expects frame 2 to arrive next. Station B transmits its second and third I-frames (numbered 1 and 2) before accepting further frames from station A. Its N(R) information, therefore, has not changed: B frames 1 and 2 indicate that station B is still expecting A frame 2 to arrive next.
11.22   Example 3
Example 4 In Example 3, suppose frame 1 sent from station B to station A has an error. Station A informs station B to resend frames 1 and 2 (the system is using the Go-Back-N mechanism). Station A sends a reject supervisory frame to announce the error in frame 1. Figure 11.23 shows the exchange.
11.23   Example 4
Bit stuffing is the process of adding one extra 0 whenever there are five consecutive 1s in the data so that the receiver does not mistake the  data for a flag. Note :
11.24   Bit stuffing and removal
11.25   Bit stuffing in HDLC

More Related Content

What's hot

Congetion Control.pptx
Congetion Control.pptxCongetion Control.pptx
Congetion Control.pptxNaveen Dubey
 
File replication
File replicationFile replication
File replicationKlawal13
 
Dcn ppt by roma
Dcn ppt by romaDcn ppt by roma
Dcn ppt by romaboraroma
 
Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Peter R. Egli
 
14 data link control
14 data link control14 data link control
14 data link controlarvindsarja
 
Presentation Routing algorithm
Presentation Routing algorithmPresentation Routing algorithm
Presentation Routing algorithmBasit Hussain
 
Congestion on computer network
Congestion on computer networkCongestion on computer network
Congestion on computer networkDisi Dc
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocaltes31
 
File models and file accessing models
File models and file accessing modelsFile models and file accessing models
File models and file accessing modelsishmecse13
 
Flow & Error Control
Flow & Error ControlFlow & Error Control
Flow & Error Controltameemyousaf
 

What's hot (20)

Network Layer
Network LayerNetwork Layer
Network Layer
 
Congetion Control.pptx
Congetion Control.pptxCongetion Control.pptx
Congetion Control.pptx
 
File replication
File replicationFile replication
File replication
 
Dcn ppt by roma
Dcn ppt by romaDcn ppt by roma
Dcn ppt by roma
 
Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
 
Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
Congestion control
Congestion controlCongestion control
Congestion control
 
14 data link control
14 data link control14 data link control
14 data link control
 
Presentation Routing algorithm
Presentation Routing algorithmPresentation Routing algorithm
Presentation Routing algorithm
 
Distributed Coordination-Based Systems
Distributed Coordination-Based SystemsDistributed Coordination-Based Systems
Distributed Coordination-Based Systems
 
Congestion on computer network
Congestion on computer networkCongestion on computer network
Congestion on computer network
 
Network virtualization
Network virtualizationNetwork virtualization
Network virtualization
 
Message passing in Distributed Computing Systems
Message passing in Distributed Computing SystemsMessage passing in Distributed Computing Systems
Message passing in Distributed Computing Systems
 
TCP timers.ppt
TCP timers.pptTCP timers.ppt
TCP timers.ppt
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
File models and file accessing models
File models and file accessing modelsFile models and file accessing models
File models and file accessing models
 
Flow & Error Control
Flow & Error ControlFlow & Error Control
Flow & Error Control
 
aloha
alohaaloha
aloha
 
Transport layer
Transport layer Transport layer
Transport layer
 

Similar to Data Link Protocols - Flow, Error Control, ARQ Types Explained

chapter 11(Data link Control)in CN .ppt
chapter 11(Data link Control)in CN  .pptchapter 11(Data link Control)in CN  .ppt
chapter 11(Data link Control)in CN .pptanjubala996089
 
3a data link layer
3a data link layer 3a data link layer
3a data link layer kavish dani
 
Unit I Data Link Control.ppt
Unit I Data Link Control.pptUnit I Data Link Control.ppt
Unit I Data Link Control.pptMSANDHYARANI3
 
Framming data link layer
Framming data link layerFramming data link layer
Framming data link layerPREMAL GAJJAR
 
11 Data Link_Control
11 Data Link_Control11 Data Link_Control
11 Data Link_ControlAhmar Hashmi
 
Networks-part9-DLL-Flowcontrol.pptx
Networks-part9-DLL-Flowcontrol.pptxNetworks-part9-DLL-Flowcontrol.pptx
Networks-part9-DLL-Flowcontrol.pptxraju005raju005
 
SYBSC IT COMPUTER NETWORKS UNIT III Data Link Control
SYBSC IT COMPUTER NETWORKS UNIT III Data Link ControlSYBSC IT COMPUTER NETWORKS UNIT III Data Link Control
SYBSC IT COMPUTER NETWORKS UNIT III Data Link ControlArti Parab Academics
 
Flow Control (1).ppt
Flow Control (1).pptFlow Control (1).ppt
Flow Control (1).pptsarthakgithub
 
3a data link layer continued
3a data link layer continued3a data link layer continued
3a data link layer continuedkavish dani
 
Link-Level Flow and Error Control Chapter11
Link-Level Flow and Error Control Chapter11Link-Level Flow and Error Control Chapter11
Link-Level Flow and Error Control Chapter11daniel ayalew
 
DataLinkControl.ppt
DataLinkControl.pptDataLinkControl.ppt
DataLinkControl.pptMaddalaSeshu
 
Unit 2 data link control
Unit 2 data link controlUnit 2 data link control
Unit 2 data link controlVishal kakade
 

Similar to Data Link Protocols - Flow, Error Control, ARQ Types Explained (20)

DLL Part_1.ppt
DLL Part_1.pptDLL Part_1.ppt
DLL Part_1.ppt
 
chapter 11(Data link Control)in CN .ppt
chapter 11(Data link Control)in CN  .pptchapter 11(Data link Control)in CN  .ppt
chapter 11(Data link Control)in CN .ppt
 
dl_frames.ppt
dl_frames.pptdl_frames.ppt
dl_frames.ppt
 
Data Link Control.ppt
Data Link Control.pptData Link Control.ppt
Data Link Control.ppt
 
3a data link layer
3a data link layer 3a data link layer
3a data link layer
 
Unit I Data Link Control.ppt
Unit I Data Link Control.pptUnit I Data Link Control.ppt
Unit I Data Link Control.ppt
 
Framming data link layer
Framming data link layerFramming data link layer
Framming data link layer
 
Ch11
Ch11Ch11
Ch11
 
11 Data Link_Control
11 Data Link_Control11 Data Link_Control
11 Data Link_Control
 
Ch11
Ch11Ch11
Ch11
 
Networks-part9-DLL-Flowcontrol.pptx
Networks-part9-DLL-Flowcontrol.pptxNetworks-part9-DLL-Flowcontrol.pptx
Networks-part9-DLL-Flowcontrol.pptx
 
SYBSC IT COMPUTER NETWORKS UNIT III Data Link Control
SYBSC IT COMPUTER NETWORKS UNIT III Data Link ControlSYBSC IT COMPUTER NETWORKS UNIT III Data Link Control
SYBSC IT COMPUTER NETWORKS UNIT III Data Link Control
 
Flow Control (1).ppt
Flow Control (1).pptFlow Control (1).ppt
Flow Control (1).ppt
 
3a data link layer continued
3a data link layer continued3a data link layer continued
3a data link layer continued
 
Link-Level Flow and Error Control Chapter11
Link-Level Flow and Error Control Chapter11Link-Level Flow and Error Control Chapter11
Link-Level Flow and Error Control Chapter11
 
DataLinkControl.ppt
DataLinkControl.pptDataLinkControl.ppt
DataLinkControl.ppt
 
07 data linkcontrol
07 data linkcontrol07 data linkcontrol
07 data linkcontrol
 
Ch11
Ch11Ch11
Ch11
 
go back n protocol
go back n protocolgo back n protocol
go back n protocol
 
Unit 2 data link control
Unit 2 data link controlUnit 2 data link control
Unit 2 data link control
 

More from soumya ranjan mohanty (20)

Ch 30
Ch 30Ch 30
Ch 30
 
Ch 31
Ch 31Ch 31
Ch 31
 
Ch 29
Ch 29Ch 29
Ch 29
 
Ch 28
Ch 28Ch 28
Ch 28
 
Ch 26
Ch 26Ch 26
Ch 26
 
Ch 27
Ch 27Ch 27
Ch 27
 
Ch 25
Ch 25Ch 25
Ch 25
 
Ch 24
Ch 24Ch 24
Ch 24
 
Ch 23
Ch 23Ch 23
Ch 23
 
Ch 22
Ch 22Ch 22
Ch 22
 
Ch 21
Ch 21Ch 21
Ch 21
 
Ch 20
Ch 20Ch 20
Ch 20
 
Ch 17
Ch 17Ch 17
Ch 17
 
Ch 19
Ch 19Ch 19
Ch 19
 
Ch 18
Ch 18Ch 18
Ch 18
 
Ch 16
Ch 16Ch 16
Ch 16
 
Ch 12
Ch 12Ch 12
Ch 12
 
Ch 14
Ch 14Ch 14
Ch 14
 
Ch 13
Ch 13Ch 13
Ch 13
 
Ch 15
Ch 15Ch 15
Ch 15
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

Data Link Protocols - Flow, Error Control, ARQ Types Explained

  • 1. Chapter 11 Data Link Control and Protocols
  • 2. 11.1 Flow and Error Control Flow Control Error Control
  • 3. Flow control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. Note :
  • 4. Error control in the data link layer is based on automatic repeat request, which is the retransmission of data. Note :
  • 5. 11.2 Stop-and-Wait ARQ Operation Bidirectional Transmission
  • 6. 11.1 Normal operation
  • 7. 11.2 Stop-and-Wait ARQ, lost frame
  • 8. 11.3 Stop-and-Wait ARQ, lost ACK frame
  • 9. In Stop-and-Wait ARQ, numbering frames prevents the retaining of duplicate frames. Note :
  • 10. 11.4 Stop-and-Wait ARQ, delayed ACK
  • 11. Numbered acknowledgments are needed if an acknowledgment is delayed and the next frame is lost. Note :
  • 12. 11.5 Piggybacking
  • 13. 11.3 Go-Back-N ARQ Sequence Number Sender and Receiver Sliding Window Control Variables and Timers Acknowledgment Resending Frames Operation
  • 14. 11.6 Sender sliding window
  • 15. 11.7 Receiver sliding window
  • 16. 11.8 Control variables
  • 17. 11.9 Go-Back-N ARQ, normal operation
  • 18. 11.10 Go-Back-N ARQ, lost frame
  • 19. 11.11 Go-Back-N ARQ: sender window size
  • 20. In Go-Back-N ARQ, the size of the sender window must be less than 2m; the size of the receiver window is always 1. Note :
  • 21. 11.4 Selective-Repeat ARQ Sender and Receiver Windows Operation Sender Window Size Bidirectional Transmission Pipelining
  • 22. 11.12 Selective Repeat ARQ, sender and receiver windows
  • 23. 11.13 Selective Repeat ARQ, lost frame
  • 24. In Selective Repeat ARQ, the size of the sender and receiver window must be at most one-half of 2 m . Note :
  • 25. 11.14 Selective Repeat ARQ, sender window size
  • 26. Example 1 In a Stop-and-Wait ARQ system, the bandwidth of the line is 1 Mbps, and 1 bit takes 20 ms to make a round trip. What is the bandwidth-delay product? If the system data frames are 1000 bits in length, what is the utilization percentage of the link? Solution The bandwidth-delay product is 1  10 6  20  10 -3 = 20,000 bits The system can send 20,000 bits during the time it takes for the data to go from the sender to the receiver and then back again. However, the system sends only 1000 bits. We can say that the link utilization is only 1000/20,000, or 5%. For this reason, for a link with high bandwidth or long delay, use of Stop-and-Wait ARQ wastes the capacity of the link.
  • 27. Example 2 What is the utilization percentage of the link in Example 1 if the link uses Go-Back-N ARQ with a 15-frame sequence? Solution The bandwidth-delay product is still 20,000. The system can send up to 15 frames or 15,000 bits during a round trip. This means the utilization is 15,000/20,000, or 75 percent. Of course, if there are damaged frames, the utilization percentage is much less because frames have to be resent.
  • 28. 11.5 HDLC Configurations and Transfer Modes Frames Frame Format Examples Data Transparency
  • 29. 11.15 NRM
  • 30. 11.16 ABM
  • 31. 11.17 HDLC frame
  • 32. 11.18 HDLC frame types
  • 33. 11.19 I-frame
  • 34. 11.20 S-frame control field in HDLC
  • 35. 11.21 U-frame control field in HDLC
  • 36. Table 11.1 U-frame control command and response Request information mode RIM Set initialization mode SIM Reset RSET Exchange ID XID Frame reject FRMR Unnumbered information UI Unnumbered acknowledgment UA Request disconnect RD Disconnect DISC Disconnect mode DM Unnumbered poll UP Set asynchronous balanced mode (extended) SABME Set asynchronous balanced mode SABM Set normal response mode (extended) SNRME Set normal response mode Meaning SNRM Command/response
  • 37. Example 3 Figure 11.22 shows an exchange using piggybacking where is no error. Station A begins the exchange of information with an I-frame numbered 0 followed by another I-frame numbered 1. Station B piggybacks its acknowledgment of both frames onto an I-frame of its own. Station B’s first I-frame is also numbered 0 [N(S) field] and contains a 2 in its N(R) field, acknowledging the receipt of A’s frames 1 and 0 and indicating that it expects frame 2 to arrive next. Station B transmits its second and third I-frames (numbered 1 and 2) before accepting further frames from station A. Its N(R) information, therefore, has not changed: B frames 1 and 2 indicate that station B is still expecting A frame 2 to arrive next.
  • 38. 11.22 Example 3
  • 39. Example 4 In Example 3, suppose frame 1 sent from station B to station A has an error. Station A informs station B to resend frames 1 and 2 (the system is using the Go-Back-N mechanism). Station A sends a reject supervisory frame to announce the error in frame 1. Figure 11.23 shows the exchange.
  • 40. 11.23 Example 4
  • 41. Bit stuffing is the process of adding one extra 0 whenever there are five consecutive 1s in the data so that the receiver does not mistake the data for a flag. Note :
  • 42. 11.24 Bit stuffing and removal
  • 43. 11.25 Bit stuffing in HDLC