Skip to main content

BIT ORIENTED PROTOCOLS : SDLC, HDLC, BISYNC, LAP & LAPB

BIT ORIENTED PROTOCOLS

A bit-oriented protocol is a communications protocol that sees the transmitted data as an opaque stream of bits with no semantics, or meaning. Control codes are defined in terms of bit sequences instead of characters. Bit oriented protocol can transfer data frames regardless of frame contents. It can also be stated as "bit stuffing" this technique allows the data frames to contain an arbitrary number of bits and allows character codes with arbitrary number of bits per character.

SDLC

Synchronous Data Link Control (SDLC) supports a variety of link types and topologies. It can be used with point-to-point and multipoint links, bounded and unbounded media, half-duplex and full-duplex transmission facilities, and circuit-switched and packet-switched networks.

SDLC identifies two types of network nodes: primary and secondary. Primary nodes control the operation of other stations, called secondary. The primary polls the secondary in a predetermined order and secondary can then transmit if they have outgoing data. The primary also sets up and tears down links and manages the link while it is operational. Secondary nodes are controlled by a primary, which means that secondary can send information to the primary only if the primary grants permission.

 

SDLC primaries and secondary can be connected in four basic configurations:

  • Point-to-point---Involves only two nodes, one primary and one secondary.
  • Multipoint---Involves one primary and multiple secondary.
  • Loop---Involves a loop topology, with the primary connected to the first and last secondary. Intermediate secondary pass messages through one another as they respond to the requests of the primary.
  • Hub go-ahead---Involves an inbound and an outbound channel. The primary uses the outbound channel to communicate with the secondary. The secondary use the inbound channel to communicate with the primary. The inbound channel is daisy-chained back to the primary through each secondary.
                                                                SDLC

  •  Flag- Initiates and terminates error checking.
  • Address- Contains the SDLC address of the secondary station, which indicates whether the frame comes from the primary or secondary. This address can contain a specific address, a group address, or a broadcast address. A primary is either a communication source or a destination, which eliminates the need to include the address of the primary.
  • Control- Employs three different formats, depending on the type of SDLC frame used:

1. Information (I) frame: Carries upper-layer information and some control information. This frame sends and receives sequence numbers, and the poll final (P/F) bit performs  flow and error control. The send-sequence number refers to the number of the frame to be sent next. The receive-sequence number provides the number of the frame to be received next. Both sender and receiver maintain send- and receive-sequence numbers.

A primary station uses the P/F bit to tell the secondary whether it requires an immediate response. A secondary station uses the P/F bit to tell the primary whether the current frame is the last in its current response.

2.  Supervisory (S) frame: Provides control information. An S frame can request and suspend transmission, reports on status, and acknowledge receipt of I frames. S frames do not have an information field.

3.  Unnumbered (U) frame: Supports control purposes and is not sequenced. A U frame can be used to initialize secondary. Depending on the function of the U frame, its control field is 1 or 2 bytes. Some U frames have an information field.

  • Data- Contains path information unit (PIU) or exchange identification (XID) information.
  • Frame Check Sequence (FCS) - Precedes the ending flag delimiter and is usually a cyclic redundancy check (CRC) calculation remainder. The CRC calculation is redone in the receiver. If the result differs from the value in the original frame, an error is assumed.

HDLC

  • High-Level Data Link Control (HDLC) is a bit-oriented code-transparent synchronous data link layer protocol.
  • HDLC provides both connection-oriented and connectionless service.
  •  HDLC can be used for point to multipoint connections, but is now used almost exclusively to connect one device to another, using what is known as Asynchronous Balanced Mode (ABM).
  • The original master-slave modes Normal Response Mode (NRM) and Asynchronous Response Mode (ARM) are rarely used.

HDLC FRAMING

HDLC frames can be transmitted over synchronous or asynchronous serial communication links. Those links have no mechanism to mark the beginning or end of a frame, so the beginning and end of each frame has to be identified. This is done by using a frame delimiter, or flag, which is a unique sequence of bits that is guaranteed not to be seen inside a frame. This sequence is '01111110', or, in hexadecimal notation, 0x7E. Each frame begins and ends with a frame delimiter. A frame delimiter at the end of a frame may also mark the start of the next frame.

Frame structure

The contents of an HDLC frame are shown in the following table:

Note that the end flag of one frame may be (but does not have to be) the beginning (start) flag of the next frame.

Data is usually sent in multiples of 8 bits, but only some variants require this; others theoretically permit data alignments on other than 8-bit boundaries.

There are three fundamental types of HDLC frames.

  • Information frames, or I-frames, transport user data from the network layer. In addition, they can also include flow and error control information piggybacked on data.
  • Supervisory Frames, or S-frames, are used for flow and error control whenever piggybacking is impossible or inappropriate, such as when a station does not have data to send. S-frames do not have information fields.
  • Unnumbered frames, or U-frames, are used for various miscellaneous purposes, including link management. Some U-frames contain an information field, depending on the type.

BISYNC

Binary Synchronous Communication (BSC or Bisync) is an IBM character-oriented, half duplex link protocol. It replaced the synchronous transmit-receive (STR) protocol used with second generation computers. The intent was that common link management rules could be used with three different character encodings for messages. Six-bit Transcode looked backwards to older systems.
  • BISYNC establishes rules for transmitting binary-coded data between a terminal and a host computer's BISYNC port.
  • BISYNC is a half-duplex protocol, it will synchronize in both directions on a full-duplex channel.
  • BISYNC supports both point-to-point (over leased or dial-up lines) and multipoint transmissions. Each message must be acknowledged, adding to its overhead.
  • BISYNC is character oriented, meaning that groups of bits (bytes) are the main elements of transmission, rather than a stream of bits. The BISYNC frame is pictured next.
 It starts with two sync characters that the receiver and transmitter use for synchronizing. This is followed by a start of header (SOH) command, and then the header. Following this are the start of text (STX) command and the text. Finally, an end of text (EOT) command and a cyclic redundancy check (CRC) end the frame. The CRC provides error detection and correction.
BISYNC FRAME STRUCTURE

Most of the bisynchronous protocols, of which there are many, provide only half-duplex transmission and require an acknowledgment for every block of transmitted data. Some do provide full-duplex transmission and bit-oriented operation.

BISYNC has largely been replaced by the more powerful SDLC (Synchronous Data Link Control).

LAP AND LAPB

Link Access Procedure (LAP) protocols are Data Link layer protocols for framing and transmitting data across point-to-point links. LAP was originally derived from HDLC (High-Level Data Link Control), but was later updated and renamed LAPB (LAP Balanced).

LAPB is the data link protocol for X.25.LAPB is a bit-oriented protocol derived from HDLC that ensures that frames are error free and in the right sequence. It can be used as a Data Link Layer protocol implementing the connection-mode data link service in the OSI Reference Model as defined by ITU-T Recommendation X.222.

LAPB is used to manage communication and packet framing between data terminal equipment (DTE) and the data circuit-terminating equipment (DCE) devices in the X.25 protocol stack. LAPB is essentially HDLC in Asynchronous Balanced Mode (ABM). LAPB sessions can be established by either the DTE or DCE. The station initiating the call is determined to be the primary, and the responding station is the secondary.

Frame types

  • I-Frames (Information frames): Carries upper-layer information and some control information. I- frame functions include sequencing, flow control, and error detection and recovery. I-frames carry send and receive sequence numbers.
  • S-Frames (Supervisory Frames): Carries control information. S-frame functions include requesting and suspending transmissions, reporting on status, and acknowledging the receipt of I-frames. S- frames carry only receive sequence numbers.
  • U-Frames (Unnumbered Frames): carries control information. U-frame functions include link setup and disconnection, as well as error reporting. U-frames carry no sequence numbers

Frame format

LAP & LAPB FRAME STRUCTURE

Flag – The value of the flag is always 0x7E. In order to ensure that the bit pattern of the frame delimiter flag does not appear in the data field of the frame (and therefore cause frame misalignment), a technique known as Bit stuffing is used by both the transmitter and the receiver.

Address field – In LAPB, this field has no meaning since the protocol works in a point to point mode and the DTE network address is represented in the layer 3 packets. This byte is therefore put to a different use; it separates the link commands from the responses and can have only two values: 0x01 and 0x03. 01 identifies frames containing commands from DTE to DCE and responses to these commands from DCE to DTE. 03 are used for frames containing commands from DCE to DTE and for responses from DTE to DCE.

Control field – it serves to identify the type of the frame. In addition, it includes sequence numbers, control features and error tracking according to the frame type.

Comments

Popular posts from this blog

Do Google Assistant work on KaiOS?

Yes Google Assistant can now read, translate text on KaiOS Google on Tuesday announced that now within Google Assistant, KaiOS users in India can use Google Lens to read, translate, and define words. At Google I/O in 2019, the US-based search engine giant brought a camera-based translation to Google Lens to help understand information. With Lens, one can point the camera at text one see and translate it into more than 100 languages and can even speak the words out loud in the preferred language. "We brought these Lens capabilities to Google Go, so even those on the most affordable smartphones can access them. Today we are extending this capability to the millions of Google Assistant users on KaiOS devices in India," the company said in a statement. It is currently available in English and several Indian languages, including Hindi, Bengali, Telugu, Marathi, and Tamil, and will soon be available in Kannada and Gujarati. Users can simply press the right soft key

Can coronavirus spread through mosquitoes?

  Can coronavirus spread through mosquitoes? Scientists have confirmed for the first time that the novel coronavirus behind the COVID-19 pandemic cannot be transmitted to people by mosquitoes , a finding that adds evidence to WHO claims that the disease is not mosquito-borne. The research, published in the journal Scientific Reports, provided the first experimental evidence on the capacity of SARS-CoV-2, the virus that causes COVID-19 disease, to infect and be transmitted by mosquitoes. "Here we provide the first experimental data to investigate the capacity of SARS-CoV-2 to infect and be transmitted by mosquitoes," the study noted. "While the World Health Organization (WHO) has definitively stated that mosquitoes cannot transmit the virus, our study is the first to provide conclusive data supporting the theory," said Stephen Higgs, a co-author of the research from Kansas State University in the US. According to the study, conducted at the university&#

What is Binary Exponential Back-off Algorithm in Computer Networking?

What is Binary Exponential Back-off Algorithm?                          When two station A and B transmit data simultaneously there will be collision and when collision occurs both the stations waits for some time before retransmitting the data. The time for which they stop sending the data is called back-off time and to calculate the back-off time we use an algorithm knows as Binary Exponential Back-off Algorithm.   How Binary Exponential Back- off Algorithm(BEB) Work?   After undergoing the collision both the stations wait for random amount of time in the range of    [0, (2^n)-1]. Value of n is - the nth times they are undergoing collision. If a station chooses a time K which is in the range [0, (2^n)-1] then Back-off time = K*time slot Example 1 - Collision occurs for 1st time then n=1 and range will be 0 to 1. Means K value will be between     0 to 1. Station A Station B  Remark  K=0          K=0           

Topology-Mesh, Star, Bus, Ring and Hybrid

Computer Network Topology – Mesh, Star, Bus, Ring and Hybrid Geometric representation of how the computers are connected to each other is known as topology. There are five types of topology – Mesh, Star, Bus, Ring and Hybrid. Types of Topology There are five types of topology in computer networks: 1. Mesh Topology 2. Star Topology 3. Bus Topology 4. Ring Topology 5. Hybrid Topology Mesh Topology In mesh topology each device is connected to every other device on the network through a dedicated point-to-point link. When we say dedicated it means that the link only carries data for the two connected devices only. Lets say we have n devices in the network then each device must be connected with (n-1) devices of the network. Number of links in a mesh topology of n devices would be n(n-1)/2. Advantages of Mesh topology 1. No data traffic issues as there is a dedicated link between two devices which means the link is only available for those two devices. 2. Mesh topolog

what is diode | working, types

Diode A diode is a specialized electronic component with two electrodes/terminal called the anode and cathode. Most diodes are made up with semiconductor materials such as silicon, germanium, or selenium. Diode Symbol The anode terminal of the diode is called as P-type. The cathode terminal of the diode is called as N-type. A diode is an electrical device which allows current to easily pass through it in one direction and prohibit the current from other direction. Biasing: Method of applying necessary voltages across P-N junction, is known as biasing. There are two methods of Biasing: Forward Biasing Reverse Biasing Forward Biasing: When the diode allows current to easily pass through it this condition is called as forward biased. In forward biased condition the anode of diode is connected with positive terminal of the battery. And the cathode of diode is connected with the negative terminal of the battery. Reverse Biasing: In Reverse biased condition the a

Network devices: Repeaters, Hub, Switch, Bridge, Routers, Modem, Gateway

Network Devices Network devices are the components that are used to interconnect multiple computing devices to form a network, In order to share files or resources like printers or fax machines and for communications. Types of networking devices Repeaters Hub Switch Bridge Routers Modem Gateway Repeaters What is a repeater? In communication when signals move from one place to another place they become weak and after a particular time, they lost their values and become a straight line. To increase the strength of the signal and get back the original data before the signal loss, repeaters are used. “Repeaters are used to regenerate the signals before the complete loss of signal up to a particular limit.” Regeneration means to recreate the signals before they lost their value. We can't regenerate a signal, which is completely lost. We can't get back the data (we don't know whether it is 0 or 1 because the signal becomes a straight line) If there is some stren