• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • Blog
  • Contact

Webmaster Blog

Webmaster's Blog - Webmaster Resources

  • SEO
  • Web Design
  • Internet
  • Marketing
  • Web Development
  • Content
  • Web Hosting
  • Tech
You are here: Home / Internet / Framing

Framing

October 20, 2008 By Keith Stromberg

In order to provide services to the Network Layer, the Data Link Layer must use the service provided to it by the Physical Layer. What the Physical Layer does is, to accept a raw bit stream and attempt to deliver the data to the destination. The bit stream is not guaranteed to be error free. the numbers of bits received may be less than or equal to or more than number of bits were transmitted and they have a different values. It is the task of Data Link Layer to provide the error free transmission of the data. The usual approaches is for the Data Link Layer to break the bit stream up into discrete frames and compute the checksum for each frame. When the frame arrives at the destination the checksum is recomputed. If the newly computed checksum is different from the one contained in the frame, the Data Link Layer knows that an error has occurred and takes the necessary steps to deal with it.

Breaking, the bit stream up into frames is more difficult. One way to achieve this framing is to insert time gaps between frames, much likes the spaces between words in ordinary text. However, networks rarely makes any guarantee about timing so it is possible these gaps might be vanished or other gaps might be inserted during transmission. Since, it is too risky to count on timing to make the start and end off each frame, other methods have been divided following are some of the methods used:-

  • Character Count
  • Starting and Ending Characters, with characters stuffing
  • Starting and ending flags, with bit stuffing
  • Physical Layer Violation

Character Count

This method uses a field in the Header to specify the number and character in the frame. When the Data Link Layer at the destination sees the character count it knows how many characters follows and hence where the end of the frame is.

Disadvantages

The trouble with this algorithm is that the count can be affected by a transmission error. For e.g. if a character count of 5 in the frame becomes 7, the destination will be unable to locate the starting of the next frame. Even if the checksum is incorrect so the destination knows that the frame is the bad one, it still has no way of telling where the next frame starts. Sending a frame back to the source asking for a retransmission does not help either, since the destination does not know how many characters to skip over to get to the start of retransmission.

Starting and Ending Characters, with characters stuffing

This method gets around the problem of unsynchronized data after an error by having each frame start with the ASCII Character sequence DLE STX and end with sequence DLE ETX (DLE is Link Escape, STX is Start of text and ETX is the End Of Text). In this way if the destination looses its track of frame boundary all it has to do is look for DLE, STX or DLE ETX characters to figure out the problem.

Starting and ending flags, with bit stuffing

This technique allows data frames to contain an arbitrary numbers of bits and allows character codes with a arbitrary number of bits/sec character. It works like this:-

Each frame begins and ends with a special bit pattern 0111110 called as FLAG BYTES. Whenever the sender Data Link Layer encounters five constitutive 1s in the data, it automatically stuffs a zero bit into the outgoing bit stream. This bit stuffing in which DLE is stuffed into the outgoing character stream before DLE in the data. When the receiver sees the five consecutive incoming 1 bits by a zero bit. Just as Character stuffing is completely transparent to the network layers in both computers. If the user data contains a flag pattern 01111110 then this flag is transmitted as 011111010 but stored in receivers memory as 01111110.

Physical Layer Violation

This method of framing is only applicable to networks in which the encoding on the physical medium contains some redundancy (duplication). For e.g. some LANs encode one bit of the data by using two physical bits. Normally a one bit is a high-low value and zero is a low-high pair. The combination of Low-Low and High-High are not used for data. This scheme means that every data bit has a transition in the middle, making it easy for the receiver to locate the bit boundaries.

Share on Facebook Share
Share on TwitterTweet
Share on Pinterest Share

Filed Under: Internet

Primary Sidebar

Search Something Here

News

Fewer things in life are more interesting than … [Read More...] about These Are 9 Of The Very Best Portable Devices For Travel

Many businesses depend on servers; therefore, … [Read More...] about Everything You Should Need To Know About Server Management?

  • Essential Questions That You Must Ask While Hiring An IT Support Team
  • Using An UX Agency To Get Very Happy Visitors
  • Software Testing And Its Types

Popular Tags

Blogger Outreach Business Directory Link Building Local Citation Local Search Citations Local SEO Search Engine Optimisation Search Engine Optimization SEO Techniques Social Media Marketing Web Design Software Web Design Tools

Footer

About

This blog is part of HelloWebmaster’s creative thinking to unite webmasters on single place. In this blog you will find useful information related to every aspect of webmasters, shared by webmaster for the webmasters.

GROW WITH US

Follow Us on FacebookFollow Us on TwitterFollow Us on InstagramFollow Us on Pinterest

Categories

  • Blog
  • Content
  • Internet
  • Marketing
  • SEO
  • Social Media
  • Tech
  • Web Design
  • Web Development
  • Web Hosting

Recent Posts

  • These Are 9 Of The Very Best Portable Devices For Travel
  • Everything You Should Need To Know About Server Management?
  • Expert Blogger Outreach Services- Successfully Boosts Your Site’s Ranking
  • Pointers Considering While Choosing SEO Company For Your Business
  • Essential Questions That You Must Ask While Hiring An IT Support Team

Copyright © 2002 - 2022 Hello WebMaster Blog


Privacy Policy