Professional Documents
Culture Documents
Flags
Flags
Flags
In bit-oriented framing, the special 8-bit pattern used to define the beginning and end
of a frame is called the "flag sequence"
The most commonly used flag sequence in networking and telecommunications
applications is the 8-bit sequence "01111110". This sequence is known as the HDLC flag
sequence
FLOW CONTROL:
Flow control is the process of managing the flow of data or instructions within a
program. It refers to the mechanisms and techniques that programmers use to control
the order in which instructions are executed or data is processed.
USE OF BUFFERS:
In networking, for example, buffers are used to store packets of data as they are being
transmitted between two devices. The receiving device will typically use a buffer to hold
incoming packets until they can be processed and acted upon. In file I/O, buffers are
used to temporarily store data that is being read from or written to a file. This can help
to optimize the transfer of data, especially when dealing with large files.
Error control at the data link layer uses in CRC in two ways:
Redundant bit:
A redundant bit is an extra bit added to a set of bits in a digital system, which is not
strictly necessary for representing the information but is used to detect and correct
errors that may occur during transmission or storage.
ERROR CONTROL:
1. Error detection: This involves adding redundant information to the data, which
can be used to detect errors that may have occurred during transmission or
storage. Examples of error detection techniques include checksums, cyclic
redundancy checks (CRC), and parity bits.
2. Error correction: This involves adding redundant information to the data,
which can be used to correct errors that may have occurred during transmission
or storage. Examples of error correction techniques include forward error
correction (FEC) and error-correcting codes (ECC).
3. Retransmission: This involves detecting errors and requesting that the sender
retransmit the data. This technique is commonly used in communication
systems, where a lost or corrupted packet can be requested to be retransmitted.
CONNECTIONLESS COMMUNICATION:
This mode of communication is typically used in applications where low latency and
high speed are critical, such as in real-time multimedia streaming, online gaming, and
VoIP.
CONNECTION-ORIENTED:
Multiplexing: is the technique of combining multiple data streams into a single, high-
capacity transmission channel. It is a method used in telecommunications and computer
networking to allow multiple devices to share a single communication resource, such as
a network connection, radio frequency channel, or optical fiber.
Payload: refers to the actual data that is being transmitted or stored. For example, in a
network packet, the payload would be the actual message being sent, while in a file, the
payload would be the contents of the file.
Padding:, on the other hand, refers to the additional data that is added to the payload
in order to meet certain requirements or constraints. For example, in cryptography,
padding may be added to a message to ensure that it meets a specific block size, or to
make it more difficult for an attacker to decipher the message.