You are on page 1of 7

Chapter 23: Data-Link Protocols and Data Communications Networks

QUESTIONS:
2. What is meant by a primary station? Secondary station?
 The primary station (or control station) enacts procedures that determine which station is
transmitting and which is receiving.
 The secondary station receives commands from the primary and return (transmit) responses to
the primary station.

4. List and describe the three data-link protocol functions.


Data-link protocol functions include line discipline, flow control, and error control:
 Line discipline coordinates hop-to-hop data delivery where a hop may be a computer, a network
controller, or some type of network-connecting device, such as a router. Line discipline
determines which device is transmitting and which is receiving at any point in time.
 Flow control coordinates the rate at which data are transported over a link and generally provides
an acknowledgment mechanism that ensures that data are received at the destination.
 Error control specifies means of detecting and correcting transmission errors.

6. Briefly describe the poll/select line discipline.


 The poll/select line discipline is best suited to centrally controlled data communications
networks using a multipoint topology, such as a bus, where one station or device is designated as
the primary or host station and all other stations are designated as secondaries. In a poll/select
environment, the primary station controls the data link, while secondary stations simply respond
to instructions from the primary. The primary determines which device or station has access to
the transmission channel (medium) at any given time. Hence, the primary initiates all data
transmissions on the network with polls and selections.

8. Briefly describe the sliding window method of flow control.


 With sliding window flow control, a source station can transmit several frames in succession
before receiving an acknowledgment. There is only one acknowledgment for several transmitted
frames, thus reducing the number of acknowledgments and considerably reducing the total
elapsed transmission time as compared to stop-and-wait flow control.

10. Describe the difference between asynchronous and synchronous protocols.


 Asynchronous data-link protocols are relatively simple, character-oriented protocols generally
used on two-point networks using asynchronous data and asynchronous modems.
 Synchronous data-link protocols are generally used with synchronous data and synchronous
modems and can be either character or bit oriented. With synchronous data-link protocols, remote
stations can have more than one PC or printer.

12. Why is IBM’s 3270 protocol called “bisync”?


 IBM’s 3270 protocol is called bisync because SYN characters are always transmitted in pairs.

14. Briefly describe the selection sequence for BSC.


The sequence for a selection is very identical to a specific poll except two SSA characters are
substituted for the two SPA characters. SSA stands for station selection address. All selections are
specific, as they are for a specific device at the selected station.
A secondary station can respond to a selection with either a positive or a negative
acknowledgment. A positive acknowledgment to a selection indicates that the device selected is
ready to receive. The character sequence for a positive acknowledgment is
A negative acknowledgment to a selection indicates that the selected device is not ready to
receive. A negative acknowledgment is called a reverse interrupt (RVI). The character sequence for
a negative acknowledgment to a selection is

16. What is the difference between a command and a response with SDLC?
 The control field in an unnumbered frame sent from a primary station is called a command, and
the control field in an unnumbered frame sent from a secondary station is called a response.

18. What are the five fields used with SDLC?


There are five fields included in an SDLC frame:
1. Flag field (beginning and ending)
2. Address field
3. Control field
4. Information (or text) field
5. Frame check sequence field

20. What are the three frame formats used with SDLC?
 Information frame. With an information frame, there must be an information field, which must
contain user data. Information frames are used for transmitting sequenced information that must
be acknowledged by the destination station.
 Supervisory frame. With supervisory frames, an information field is not allowed. Consequently,
supervisory frames cannot be used to transfer numbered information; however, they can be used
to assist in the transfer of information.
 Unnumbered frame. An unnumbered frame is identified by making bits b6 and b7 in the control
field both logic 1s.

22. What is the difference between P and F bits?


 It is called a poll (P) bit when sent by the primary and a final (F) bit when sent by a secondary.

24. With SDLC, which frame types can be used for error correction?
 The FCC field contains the error detection mechanism for SDLC.

26. When is the configure command/response used with SDLC?


 The configure command/ response (CFGR) is an unnumbered command/response that is used
only in SDLC loop configurations. CFGR contains a one-byte function descriptor (essentially a
subcommand) in the information field. A CFGR command is acknowledged with a CFGR
response. If the low-order bit of the function descriptor is set, a specified function is initiated. If it
is reset, the specified function is cleared

28. What is the transparency mechanism used with SDLC?


 The transparency mechanism used with SDLC is called zero-bit insertion or zero stuffing. With
zero-bit insertion, a logic 0 is automatically inserted after any occurrence of five consecutive
logic 1s except in a designated flag sequence (i.e., flags are not zero inserted). When five
consecutive logic 1s are received and the next bit is a 0, the 0 is automatically deleted or
removed. If the next bit is a logic 1, it must be a valid flag.
30. What are the transparency mechanism and delimiting sequence for HDLC?
 With HDLC, the frame structure and delimiting sequence are essentially the same as with SDLC.
The delimiting sequence with HDLC is a binary 01111110, which is the same flag sequence used
with SDLC. However, HDLC computes the frame check characters in a slightly different manner.
HDLC can use either CRC-16 with a generating polynomial specified by CCITT V.41 for error
detection.

32. List and describe the HDLC operational modes.


 HDLC has two additional operational modes: asynchronous response mode (ARM) and
asynchronous balanced mode (ABM).
 With ARM, secondary stations are allowed to send unsolicited responses (i.e., communicate with
the primary without permission).
 Asynchronous balanced mode is a mode of operation logically equivalent to a two point
private-line circuit where each station has equal data-link responsibilities (a station can operate as
a primary or as a secondary), which enables a station to initiate data transmission without
receiving permission from any other station.

34. What is a value-added network?


 A value-added network “adds value” to the services or facilities provided by a common carrier
to provide new types of communication services. Examples of added values are error control,
enhanced connection reliability, dynamic routing, failure protection, logical multiplexing, and
data format conversions.

36. What is a transactional switch? A transparent switch?


 A message switch is a transactional switch because it does more than simply transfer the data
from the source to the destination. A message switch can store data or change its format and bit
rate, then convert the data back to their original form or an entirely different form at the receive
end. Message switching multiplexes data from different sources onto a common facility.
 A circuit switch is a transparent switch. The switch is transparent to the data; it does nothing
more than interconnect the source and destination terminal equipment. A circuit switch adds no
value to the circuit.

38. Briefly describe an X.25 call request packet.


 The delimiting sequence is 01111110 (an HDLC flag), and the error-detection/ correction
mechanism is CRC-16 with ARQ. The link address field and the control field have little use and,
therefore, are seldom used with packet networks.

40. Define ISDN.


 The Integrated Services Digital Network (ISDN) is a proposed network designed by the major
telephone companies in conjunction with the ITU-T with the intent of providing worldwide
telecommunications support of voice, data, video, and facsimile information within the same
network (in essence, ISDN is the integrating of a wide range of services into a single
multipurpose network). ISDN is a network that proposes to interconnect an unlimited number of
independent users through a common communications network.

42. List and describe the evolution of ISDN.


 In the evolution toward an ISDN, digital end-to-end connectivity will be obtained via plant and
equipment used in existing networks, such as digital transmission, time-division multiplex, and/or
space-division multiplex switching. Existing relevant recommendations for these constituent
elements of an ISDN are contained in the appropriate series of recommendations of ITU-T and
CCIR. In the early stages of the evolution of ISDNs, some interim user-network arrangements
may need to be adopted in certain countries to facilitate early penetration of digital service
capabilities. An evolving ISDN may also include at later stages switched connections at bit rates
higher and lower than 64 kbps.

44. List the objectives of ISDN.


The key objectives of developing a worldwide ISDN system are the following:
1. System standardization. Ensure universal access to the network.
2. Achieving transparency. Allow customers to use a variety of protocols and applications.
3. Separating functions. ISDN should not provide services that preclude competitiveness.
4. Variety of configurations. Provide private-line (leased) and switched services.
5. Addressing cost-related tariffs. ISDN service should be directly related to cost and
independent of the nature of the data.
6. Migration. Provide a smooth transition while evolving.
7. Multiplexed support. Provide service to low-capacity personal subscribers as well as to large
companies.

46. List and describe the ISDN system connections and interface units.
 ISDN subscriber units and interfaces are defined by their function and reference within the
network. TE1equipmentsupports standard ISDN interfaces and, therefore, requires no protocol
translation. Data enter the network and are immediately configured into ISDN protocol format.
TE2 equipment is classified as non-ISDN; thus, computer terminals are connected to the system
through physical interfaces such as the RS-232 and host computers with X.25.
 There are several types of transmission channels in addition to the B and D types described in the
previous section. They include the following:
HO channel. This interface supports multiple 384-kbps HO channels. These structures are 3HO
+ D and 4HO + D for the 1.544-Mbps interface and 5HO + D for the 2.048-Mbps interface.
H11 channel. This interface consists of one 1.536-Mbps H11 channel (24 64-kbps channels).
H12 channel. European version of H11 that uses 30 channels for a combined data rate of 1.92
Mbps.
E channel. Packet switched using 64 kbps (similar to the standard D channel).

48. Briefly describe asynchronous transfer mode.


 Asynchronous transfer mode (ATM) is a relatively new data communications technology that
uses a high-speed form of packet switching network for the transmission media.

50. Briefly describe the ATM header field; ATM information field.
 ATM header field:
o Generic flow control field (GFC). The GFC field uses the first four bits of the first byte of
the header field. The GFC controls the flow of traffic across the user network interface (UNI)
and into the network.
o Virtual path identifier (VPI) and virtual channel identifier (VCI). The 24 bits
immediately following the GFC are used for the ATM address.
o Payload type identifier (PT). The first three bits of the second half of byte 4 specify the type
of message (payload) in cell. With three bits, there are eight different types of payloads
possible. At the present time, however, types 0 to 3 are used for identifying the type of user
data, types 4 and 5 indicate management information, and types 6 and 7 are reserved for
future use.
o Cell loss priority (CLP). The last bit of byte 4 is used to indicate whether a cell is eligible to
be discarded by the network during congested traffic periods. The CLP bit is set by the user
or cleared by the user. If set, the network may discard the cell during times of heavy use.
o Header error control (HEC). The last byte of the header field is for error control and is used
to detect and correct single-bit errors that occur in the header field only; the HEC does not
serve as an entire cell check character. The value placed in the HEC is computed from the
four previous bytes of the header field. The HEC provides some protection against the
delivery of cells to the wrong destination address.
 ATM information field.
The 48-byte information field is reserved for user data. The five types of AALs are the following:
1. Constant bit rate (CBR). CBR information fields are designed to accommodate PCM-TDM
traffic, which allows the ATM network to emulate voice or DSN services.
2. Variable bit rate (VBR) timing-sensitive services. This type of AAL is currently undefined;
however,it is reserved for future data services requiring transfer of timing information between
terminal points as well as data (i.e., packet video).
3. Connection-oriented VBR data transfer. Type 3 information fields transfer VBR data such
as impulsive data generated at irregular intervals between two subscribers over a preestablished
data link. The data link is established by network signaling procedures that are very similar to
those used by the public switched telephone network. This type of service is intended for large,
long-duration data transfers, such as file transfers or file backups.
4. Connectionless VBR data transfer. This AAL type provides for transmission of VBR data
that does not have a preestablished connection. Type 4 information fields are intended to be used
for short, highly bursty types of transmissions, such as those generated from a LAN.

52. Briefly describe a local area network.


 A local area network (LAN) provides the most economical and effective means of handling local
data communication needs. A LAN is typically a privately owned data communications system in
which the users share resources, including software.

54. Describe the following LAN transmission formats: baseband and broadband.
 Baseband transmission formats are defined as transmission formats that use digital signaling. In
addition, baseband formats use the transmission medium as a single-channel device. Only one
station can transmit at a time, and all stations must transmit and receive the same types of signals
(encoding schemes, bit rates, and so on). Baseband transmission formats time-division multiplex
signals onto the transmission medium. All stations can use the media but only one at a time.
 Broadband transmission formats use the connecting media as a multichannel device. Each
channel occupies a different frequency band within the total allocated bandwidth (i.e., frequency-
division multiplexing). Consequently, each channel can contain different modulation and
encoding schemes and operate at different transmission rates.

56. Briefly describe the history of Ethernet.


 Ethernet is a baseband transmission system designed in 1972 by Robert Metcalfe and David
Boggs of the Xerox Palo Alto Research Center (PARC).
 Metcalfe’s first Ethernet was called the Alto Aloha Network; however, in 1973 Metcalfe changed
the name to Ethernet to emphasize the point that the system could support any computer, not just
Altos, and to stress the fact that the capabilities of his new network had evolved well beyond the
original Aloha system. Metcalfe chose the name based on the word ether, meaning “air,”
“atmosphere,” or “heavens,” as an indirect means of describing a vital feature of the system: the
physical medium (i.e., a cable).
 In July 1976, Metcalfe and Boggs published a landmark paper titled “Ethernet: Distributed Packet
Switching for Local Computer.” On December 13, 1977, Xerox Corporation received patent
number 4,063,220 titled “Multipoint Data Communications System with Collision
Detection.”In1979, Xerox joined forces with Intel and Digital Equipment Corporation (DEC) in
an attempt to make Ethernet an industry standard. In September 1980, the three companies jointly
released the first version of the first Ethernet specification calledthe Ethernet Blue Book, DIX 1.0
(after the initials of the three companies), or Ethernet I.

58. List and briefly describe the 10-Mbps Ethernet systems.


 The maximum number of cable segments supported with 10Base-5 Ethernet is five,
interconnected with four repeaters or hubs. However, only three of the segments can be populated
with nodes (computers). This is called the 5-4-3 rule: five segments joined by four repeaters, but
only three segments can be populated. The maximum segment length for 10Base-5 is 500 meters.
Imposing maximum segment lengths are required for the CSMA/CD to operate properly. The
limitations take into account Ethernet frame size, velocity of propagation on a given transmission
medium, and repeater delay time to ensure collisions that occur on the network are detected.
 10Base-2 Ethernet uses a bus topology and allows a maximum of five segments; however, only
three can be populated. Each segment has a maximum length of 185 meters with no more than 30
nodes per segment. This limits the capacity of a 10Base-2 network to 96 nodes.
 10Base-T Ethernet is the most popular 10-Mbps Ethernet commonly used with PC-based LAN
environments utilizing a star topology.
 10Base-FL (fiber link) is the most common 10-Mbps Ethernet that uses optical fiber for the
transmission medium.

60. List and briefly describe the 1000-Mbps Ethernet systems.


 Gigabit Ethernet can be generally categorized as either two-wire 1000Base-X or four-wire
1000Base-T.
o Two-wire gigabit Ethernet can be either 1000Base-SX for shortwave optical fiber,
1000Base-LX for long-wave optical fiber, or 1000Base-CX for short copper jumpers.
o The four-wire version of gigabit Ethernet is 1000Base-T. 1000BaseSX and 1000Base-
LX use two optical fiber cables where the only difference between them is the
wavelength (color) of the light waves propagated through the cable. 1000Base-T Ethernet
was designed to be used with four twisted pairs of Category 5 UTP cables.
Camarines Sur Polytechnic College
Nabua, Camarines Sur
A/Y 2018-2019

Compilation in Data
Communications
(Chapter 23)

Submitted by:
Beloro, Sarah Rivie Mae S.
BSECE-5B

Submitted to:
Engr. Victor Solito DR. Isaac

You might also like