SlideShare una empresa de Scribd logo
1 de 12
Framing
Framing
• Data link layer translates a stream of bits from the
physical layer into the larger aggregate (or) discrete
unit called frames.
• The hardware present in the data link layer is network
adaptor. It enables the nodes to exchange frames.
Framing
• When node A wishes to transmit a frame to node B, it
tells its adaptor to transmit a frame from the node’s
memory. This results in a sequence of bits being sent
over the link.
• The adaptor on node B then collects together the
sequence of bits arriving on the link and deposits the
corresponding frame in B’s memory.
• Recognizing exactly what set of bits constitute a
frame
i.e., determining where the frame begins and ends is the
issue faced by the adaptor
Framing
Byte Oriented
DDCMP
Framing
Bit Oriented
Sentinel Approach
BISYNC
PPP
Byte Count Approach
HDLC
Byte Oriented Protocols:
– It views each frame as a collection of bytes (Character)
rather than a collection of bits.
a) Sentinel Approach:
BISYNC (Binary Synchronous Communication)
The frame format of the BISYNC protocol is,
 Frames transmitted beginning with leftmost field
 SYN - Beginning of a frame is denoted by sending a special SYN
(synchronize) character
 STX & ETX - Data portion of the frame is contained between special
sentinel character STX (start of text) and ETX (end of text)
 SOH (Start of Header) – Header information is start from this sentinel
character
Framing
 CRC (Cyclic Redundancy Check) – Used for error detection in the
frame.
Problems in the sentinel approach,
 ETX character might appear in the data portion of the frame. So it
leads to the wrong end of text calculation.
 BISYNC overcomes this problem by “escaping” the ETX character by
preceding it with a DLE (data-link-escape) character whenever it
appears in the body of a frame; the DLE character is also escaped (by
preceding it with an extra DLE) in the frame body. This approach is
called as “character stuffing”.
PPP (Point to Point Protocol)
 Commonly used in dial up modem links.
 It also uses the “Character Stuffing”
PPP Frame format as follows,
 Flag - Special start of text character denoted as Flag
- 0 1 1 1 1 1 1 0
 Address, control - default values
o Address – 11111111
o Control – 11000000
 Protocol - Used for demultiplexing. It identifies the high level protocol
such as IP / IPX.
 Payload – Frame data (default size is 1500 bytes)
 Checksum - for error detection
Byte Stuffing in PPP,
 Whenever the flag value appears in the data section of the frame,
escape byte (01111101) stuffed into the data to tell the receiver that
the next byte is not a flag.
Protocols used by PPP,
 LCP (Link Control Protocol)
 AP (Authentication Protocol)
 NCP (Network Control Protocol)
LCP (Link Control Protocol)
 Responsible for establishing, maintaining, configuring & terminating the links.
 All LCP packets are carried in the payload of the PPP frame with protocol field
set to “C021” in hexadecimal.
 Code – defines the type of the LCP packet. There are 11 types of LCP packet is
available.
• These 11 types of LCP packets are categorized into three category.
 First category – comprising the first four packet types (o×01 - o×04) used for
link configuration during link establishment.
 Second Category – comprising packet types o×05, o×06 for the termination of
the link.
 Third Category – comprising last five packet types (o×07 - o×11) used for link
monitoring and debugging.
 Id – value that matches the request and reply.
 Length – defines the total length of the LCP packet.
 Information – optional information.
AP (Authentication Protocol)
 PPP is mainly designed for dial up links, where the user identity verification is
necessary
 Authentication – validating the identity of a user.
 PPP uses two authentication protocols,
 PAP (Password Authentication Protocol)
 CHAP (Challenge Handshake Authentication Protocol)
NCP (Network Control Protocol)
 IPCP (Internet Protocol Control Protocol) is used as a network control protocol.
 IPCP defines 7 types of packets distinguished by the code values.
b) Byte Count Approach:
DDCMP (Digital Data Communication Message protocol)
 DDCMP uses the count field that contains the no. of bytes in the frame
to find the end of the frame.
 Suppose, if count field is corrupted framing error will arise.
SYN – starting of the frame.
count – no. of bytes in the frame.
Bit Oriented Protocols
– It simply views the frame as collection of bits.
HDLC
 Earlier called as SDLC (Synchronous Data Link Control)
 Beginning and Ending Sequence – denotes both the starting & end of
the frame with the bit sequence 01111110.
- This sequence is also transmitted during any times that the link is idle, so
that the sender and receiver can keep their clock synchronization.
 Bit Stuffing
Sending side:
 On the sending side, any time five consecutive 1’s have been transmitted from
the body of the message (i.e. excluding when the sender is trying to send the
distinguished 01111110 sequence)
• The sender inserts ‘0’ before transmitting the next bit.
Receiving side:
 On the receiving side,
• Five consecutive 1’s
 Next bit 0 - Stuffed, so discard it
1 - Either End of the frame marker (or) Error has been
introduced in the bit stream
 Look at the next bit
If 0 ( 01111110 )  End of the frame marker
If 1 ( 01111111 )  Error, discard the whole frame
 The receiver needs to wait for next 01111110 before it can start receiving again.

Más contenido relacionado

La actualidad más candente

TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference ModelMukesh Tekwani
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layerNaiyan Noor
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocaltes31
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithmBushra M
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Dr. SELVAGANESAN S
 
ASYNCHRONOUS TRANSFER MODE (ATM)
ASYNCHRONOUS TRANSFER MODE (ATM)ASYNCHRONOUS TRANSFER MODE (ATM)
ASYNCHRONOUS TRANSFER MODE (ATM)ZillayHuma Mehmood
 
Flow & Error Control
Flow & Error ControlFlow & Error Control
Flow & Error Controltameemyousaf
 
Presentation Routing algorithm
Presentation Routing algorithmPresentation Routing algorithm
Presentation Routing algorithmBasit Hussain
 
Distributed system lamport's and vector algorithm
Distributed system lamport's and vector algorithmDistributed system lamport's and vector algorithm
Distributed system lamport's and vector algorithmpinki soni
 
PPP (Point to Point Protocol)
PPP (Point to Point Protocol)PPP (Point to Point Protocol)
PPP (Point to Point Protocol)Ali Jafar
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network pptextraganesh
 

La actualidad más candente (20)

TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
Transport layer
Transport layer Transport layer
Transport layer
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
Error control
Error controlError control
Error control
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer
 
ASYNCHRONOUS TRANSFER MODE (ATM)
ASYNCHRONOUS TRANSFER MODE (ATM)ASYNCHRONOUS TRANSFER MODE (ATM)
ASYNCHRONOUS TRANSFER MODE (ATM)
 
Stop and-wait protocol
Stop and-wait protocolStop and-wait protocol
Stop and-wait protocol
 
Token ring
Token ringToken ring
Token ring
 
Sliding window protocol
Sliding window protocolSliding window protocol
Sliding window protocol
 
Flow & Error Control
Flow & Error ControlFlow & Error Control
Flow & Error Control
 
Data link layer
Data link layer Data link layer
Data link layer
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
Presentation Routing algorithm
Presentation Routing algorithmPresentation Routing algorithm
Presentation Routing algorithm
 
Distributed system lamport's and vector algorithm
Distributed system lamport's and vector algorithmDistributed system lamport's and vector algorithm
Distributed system lamport's and vector algorithm
 
PPP (Point to Point Protocol)
PPP (Point to Point Protocol)PPP (Point to Point Protocol)
PPP (Point to Point Protocol)
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 

Destacado

Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)Imesha Perera
 
Thrift vs Protocol Buffers vs Avro - Biased Comparison
Thrift vs Protocol Buffers vs Avro - Biased ComparisonThrift vs Protocol Buffers vs Avro - Biased Comparison
Thrift vs Protocol Buffers vs Avro - Biased ComparisonIgor Anishchenko
 
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)Tutun Juhana
 
Data link layer
Data link layerData link layer
Data link layerst2112
 
Marketing that Matters: 10 practices to profit your organization and change t...
Marketing that Matters: 10 practices to profit your organization and change t...Marketing that Matters: 10 practices to profit your organization and change t...
Marketing that Matters: 10 practices to profit your organization and change t...Metropolitan Group
 
Everythingmustchange2
Everythingmustchange2Everythingmustchange2
Everythingmustchange2brianmclaren
 
Dcn data link_layer
Dcn data link_layerDcn data link_layer
Dcn data link_layermangal das
 
jb 3283 Persuasive Writing
jb 3283 Persuasive Writingjb 3283 Persuasive Writing
jb 3283 Persuasive WritingBill Handy
 
Advance Repeat reQuest (ARQ)
Advance Repeat reQuest (ARQ)Advance Repeat reQuest (ARQ)
Advance Repeat reQuest (ARQ)Muhammad Irtiza
 
Dcn ppt on data link layer
Dcn ppt on data link layerDcn ppt on data link layer
Dcn ppt on data link layerroma bora
 
New framing-protocols
New framing-protocolsNew framing-protocols
New framing-protocolsNitesh Singh
 

Destacado (20)

Ethernet
EthernetEthernet
Ethernet
 
Framing
FramingFraming
Framing
 
Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)
 
Thrift vs Protocol Buffers vs Avro - Biased Comparison
Thrift vs Protocol Buffers vs Avro - Biased ComparisonThrift vs Protocol Buffers vs Avro - Biased Comparison
Thrift vs Protocol Buffers vs Avro - Biased Comparison
 
R2 itesm-02
R2 itesm-02R2 itesm-02
R2 itesm-02
 
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
 
Data link layer
Data link layerData link layer
Data link layer
 
Marketing that Matters: 10 practices to profit your organization and change t...
Marketing that Matters: 10 practices to profit your organization and change t...Marketing that Matters: 10 practices to profit your organization and change t...
Marketing that Matters: 10 practices to profit your organization and change t...
 
Everythingmustchange2
Everythingmustchange2Everythingmustchange2
Everythingmustchange2
 
Jan adventure 4
Jan adventure 4Jan adventure 4
Jan adventure 4
 
Ch04
Ch04Ch04
Ch04
 
Dcn data link_layer
Dcn data link_layerDcn data link_layer
Dcn data link_layer
 
jb 3283 Persuasive Writing
jb 3283 Persuasive Writingjb 3283 Persuasive Writing
jb 3283 Persuasive Writing
 
Data Link Layer
Data Link LayerData Link Layer
Data Link Layer
 
PR basics
PR basicsPR basics
PR basics
 
Advance Repeat reQuest (ARQ)
Advance Repeat reQuest (ARQ)Advance Repeat reQuest (ARQ)
Advance Repeat reQuest (ARQ)
 
Data link control protocol(4)
Data link control protocol(4)Data link control protocol(4)
Data link control protocol(4)
 
Dcn ppt on data link layer
Dcn ppt on data link layerDcn ppt on data link layer
Dcn ppt on data link layer
 
New framing-protocols
New framing-protocolsNew framing-protocols
New framing-protocols
 
Ch12
Ch12Ch12
Ch12
 

Similar a Framing Protocols

unit2-210710110327.pdf
unit2-210710110327.pdfunit2-210710110327.pdf
unit2-210710110327.pdfssuser3aa461
 
data link layer to print
data link layer to printdata link layer to print
data link layer to printBishalWosti1
 
Jaimin chp-3 - data-link layer- 2011 batch
Jaimin   chp-3 - data-link layer- 2011 batchJaimin   chp-3 - data-link layer- 2011 batch
Jaimin chp-3 - data-link layer- 2011 batchJaimin Jani
 
Introduction to the OSI 7 layer model and Data Link Layer
Introduction to the OSI 7 layer model and Data Link LayerIntroduction to the OSI 7 layer model and Data Link Layer
Introduction to the OSI 7 layer model and Data Link LayerVNIT-ACM Student Chapter
 
Unit 4 data link layer
Unit 4 data link layerUnit 4 data link layer
Unit 4 data link layermekind
 
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptxU2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptxk2w9psdb96
 
Chapter 11: Data Link Control
Chapter 11: Data Link ControlChapter 11: Data Link Control
Chapter 11: Data Link ControlJeoffnaRuth
 
Chapter 2.1.1.pptx
Chapter 2.1.1.pptxChapter 2.1.1.pptx
Chapter 2.1.1.pptxbotAlert
 
Data link control & protocol concepts
Data link control & protocol conceptsData link control & protocol concepts
Data link control & protocol conceptsRaji Lakshmi
 
IntroductionTransport LayerTransport Layer forms the bas.docx
IntroductionTransport LayerTransport Layer forms the bas.docxIntroductionTransport LayerTransport Layer forms the bas.docx
IntroductionTransport LayerTransport Layer forms the bas.docxmariuse18nolet
 
Different protocols for data communication networks
Different protocols for data communication networks Different protocols for data communication networks
Different protocols for data communication networks Nt Arvind
 
Direct Link Lan
Direct Link LanDirect Link Lan
Direct Link Lanyanhul
 

Similar a Framing Protocols (20)

unit2-210710110327.pdf
unit2-210710110327.pdfunit2-210710110327.pdf
unit2-210710110327.pdf
 
DLL
DLLDLL
DLL
 
datalinklayermukesh
datalinklayermukeshdatalinklayermukesh
datalinklayermukesh
 
data link layer to print
data link layer to printdata link layer to print
data link layer to print
 
Jaimin chp-3 - data-link layer- 2011 batch
Jaimin   chp-3 - data-link layer- 2011 batchJaimin   chp-3 - data-link layer- 2011 batch
Jaimin chp-3 - data-link layer- 2011 batch
 
Unit 3 - Data Link Layer - Part A
Unit 3 - Data Link Layer - Part AUnit 3 - Data Link Layer - Part A
Unit 3 - Data Link Layer - Part A
 
Unit 2
Unit 2Unit 2
Unit 2
 
Introduction to the OSI 7 layer model and Data Link Layer
Introduction to the OSI 7 layer model and Data Link LayerIntroduction to the OSI 7 layer model and Data Link Layer
Introduction to the OSI 7 layer model and Data Link Layer
 
Unit 4 data link layer
Unit 4 data link layerUnit 4 data link layer
Unit 4 data link layer
 
Unit 2 ppt 3.ppt
Unit 2 ppt 3.pptUnit 2 ppt 3.ppt
Unit 2 ppt 3.ppt
 
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptxU2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
 
Chapter 11: Data Link Control
Chapter 11: Data Link ControlChapter 11: Data Link Control
Chapter 11: Data Link Control
 
Chapter 2.1.1.pptx
Chapter 2.1.1.pptxChapter 2.1.1.pptx
Chapter 2.1.1.pptx
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
Data link control & protocol concepts
Data link control & protocol conceptsData link control & protocol concepts
Data link control & protocol concepts
 
IntroductionTransport LayerTransport Layer forms the bas.docx
IntroductionTransport LayerTransport Layer forms the bas.docxIntroductionTransport LayerTransport Layer forms the bas.docx
IntroductionTransport LayerTransport Layer forms the bas.docx
 
Different protocols for data communication networks
Different protocols for data communication networks Different protocols for data communication networks
Different protocols for data communication networks
 
Direct Link Lan
Direct Link LanDirect Link Lan
Direct Link Lan
 
CN UNIT II.pptx
CN UNIT II.pptxCN UNIT II.pptx
CN UNIT II.pptx
 
transport layer
transport layertransport layer
transport layer
 

Más de selvakumar_b1985 (20)

Triggering transmission
Triggering transmissionTriggering transmission
Triggering transmission
 
Subnetting
SubnettingSubnetting
Subnetting
 
Email Security
Email SecurityEmail Security
Email Security
 
RIP - Routing Information Protocol
RIP - Routing Information ProtocolRIP - Routing Information Protocol
RIP - Routing Information Protocol
 
Physical Mediums
Physical MediumsPhysical Mediums
Physical Mediums
 
OSPF - Routing Protocol
OSPF - Routing ProtocolOSPF - Routing Protocol
OSPF - Routing Protocol
 
Layering and Architecture
Layering and ArchitectureLayering and Architecture
Layering and Architecture
 
Issues in Data Link Layer
Issues in Data Link LayerIssues in Data Link Layer
Issues in Data Link Layer
 
Internetworking - IP
Internetworking - IPInternetworking - IP
Internetworking - IP
 
ICMP
ICMPICMP
ICMP
 
Hybrid Channel Access Link
Hybrid Channel Access LinkHybrid Channel Access Link
Hybrid Channel Access Link
 
Hypertext Transfer Protocol
Hypertext Transfer ProtocolHypertext Transfer Protocol
Hypertext Transfer Protocol
 
Addressing Scheme IPv4
Addressing Scheme IPv4Addressing Scheme IPv4
Addressing Scheme IPv4
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
Flow Control
Flow ControlFlow Control
Flow Control
 
FDDI
FDDIFDDI
FDDI
 
DNS
DNS DNS
DNS
 
DHCP
DHCPDHCP
DHCP
 
Congestion control in TCP
Congestion control in TCPCongestion control in TCP
Congestion control in TCP
 
Congestion avoidance in TCP
Congestion avoidance in TCPCongestion avoidance in TCP
Congestion avoidance in TCP
 

Último

CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 

Último (20)

CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 

Framing Protocols

  • 1.
  • 2. Framing Framing • Data link layer translates a stream of bits from the physical layer into the larger aggregate (or) discrete unit called frames. • The hardware present in the data link layer is network adaptor. It enables the nodes to exchange frames.
  • 3. Framing • When node A wishes to transmit a frame to node B, it tells its adaptor to transmit a frame from the node’s memory. This results in a sequence of bits being sent over the link. • The adaptor on node B then collects together the sequence of bits arriving on the link and deposits the corresponding frame in B’s memory. • Recognizing exactly what set of bits constitute a frame i.e., determining where the frame begins and ends is the issue faced by the adaptor
  • 4. Framing Byte Oriented DDCMP Framing Bit Oriented Sentinel Approach BISYNC PPP Byte Count Approach HDLC
  • 5. Byte Oriented Protocols: – It views each frame as a collection of bytes (Character) rather than a collection of bits. a) Sentinel Approach: BISYNC (Binary Synchronous Communication) The frame format of the BISYNC protocol is,  Frames transmitted beginning with leftmost field  SYN - Beginning of a frame is denoted by sending a special SYN (synchronize) character  STX & ETX - Data portion of the frame is contained between special sentinel character STX (start of text) and ETX (end of text)  SOH (Start of Header) – Header information is start from this sentinel character Framing
  • 6.  CRC (Cyclic Redundancy Check) – Used for error detection in the frame. Problems in the sentinel approach,  ETX character might appear in the data portion of the frame. So it leads to the wrong end of text calculation.  BISYNC overcomes this problem by “escaping” the ETX character by preceding it with a DLE (data-link-escape) character whenever it appears in the body of a frame; the DLE character is also escaped (by preceding it with an extra DLE) in the frame body. This approach is called as “character stuffing”. PPP (Point to Point Protocol)  Commonly used in dial up modem links.  It also uses the “Character Stuffing” PPP Frame format as follows,
  • 7.  Flag - Special start of text character denoted as Flag - 0 1 1 1 1 1 1 0  Address, control - default values o Address – 11111111 o Control – 11000000  Protocol - Used for demultiplexing. It identifies the high level protocol such as IP / IPX.  Payload – Frame data (default size is 1500 bytes)  Checksum - for error detection Byte Stuffing in PPP,  Whenever the flag value appears in the data section of the frame, escape byte (01111101) stuffed into the data to tell the receiver that the next byte is not a flag. Protocols used by PPP,  LCP (Link Control Protocol)  AP (Authentication Protocol)  NCP (Network Control Protocol)
  • 8. LCP (Link Control Protocol)  Responsible for establishing, maintaining, configuring & terminating the links.  All LCP packets are carried in the payload of the PPP frame with protocol field set to “C021” in hexadecimal.  Code – defines the type of the LCP packet. There are 11 types of LCP packet is available. • These 11 types of LCP packets are categorized into three category.  First category – comprising the first four packet types (o×01 - o×04) used for link configuration during link establishment.  Second Category – comprising packet types o×05, o×06 for the termination of the link.  Third Category – comprising last five packet types (o×07 - o×11) used for link monitoring and debugging.  Id – value that matches the request and reply.  Length – defines the total length of the LCP packet.  Information – optional information.
  • 9. AP (Authentication Protocol)  PPP is mainly designed for dial up links, where the user identity verification is necessary  Authentication – validating the identity of a user.  PPP uses two authentication protocols,  PAP (Password Authentication Protocol)  CHAP (Challenge Handshake Authentication Protocol) NCP (Network Control Protocol)  IPCP (Internet Protocol Control Protocol) is used as a network control protocol.  IPCP defines 7 types of packets distinguished by the code values.
  • 10. b) Byte Count Approach: DDCMP (Digital Data Communication Message protocol)  DDCMP uses the count field that contains the no. of bytes in the frame to find the end of the frame.  Suppose, if count field is corrupted framing error will arise. SYN – starting of the frame. count – no. of bytes in the frame.
  • 11. Bit Oriented Protocols – It simply views the frame as collection of bits. HDLC  Earlier called as SDLC (Synchronous Data Link Control)  Beginning and Ending Sequence – denotes both the starting & end of the frame with the bit sequence 01111110. - This sequence is also transmitted during any times that the link is idle, so that the sender and receiver can keep their clock synchronization.  Bit Stuffing Sending side:  On the sending side, any time five consecutive 1’s have been transmitted from the body of the message (i.e. excluding when the sender is trying to send the distinguished 01111110 sequence) • The sender inserts ‘0’ before transmitting the next bit.
  • 12. Receiving side:  On the receiving side, • Five consecutive 1’s  Next bit 0 - Stuffed, so discard it 1 - Either End of the frame marker (or) Error has been introduced in the bit stream  Look at the next bit If 0 ( 01111110 )  End of the frame marker If 1 ( 01111111 )  Error, discard the whole frame  The receiver needs to wait for next 01111110 before it can start receiving again.