You are on page 1of 21

Annexture I

MAHARASHTRA STATE BOARD OF


TECHNICAL EDUCATION –
MUMBAI
Program: Information Technology Course code:(22322)

Micro Project Report On


“Framing Techniques”

Submitted by,

Mohit Khandale (11) Anurag Mhaske (28)

Sahil Gaikwad (50)

Guided by
Prof. S.B.Patil
HOD
Department of Information Technology,
MET’S Institute of Technology , Polytechnic , Nasik
Academic Year -2022-2023
ACKNOWLEDGEMENT

We take this opportunity to express our deepest sense of gratitude and


sincere thanks to those who have helped us in completing this task

We express our sincere Thanks to our guide PROF. S.B.Patil lecturer in


IT department. Who has given us valuable suggestion excellent guidance,
continues encouragement and taken keen interest in the completion of this work.
Her kind assistance and constant inspiration will always help us in our future
also.

We thank PROF. S.B.Patil (HOD) of Information Technology Department,


for the co-operation and encouragement for collecting information and
preparation of data
We are thankful to principal DR.R.S.Narkhede, for encouraging us to
undertake this project and he has taken interest in making the project and report
absolutely flawless

Credit goes to our friends’ staff member of information technology


Department and the institute’s library for their helps and timely assistance.
Annexure II-A

PART A – Plan

For 3rdsemester

“ Framing Technique”

1.0 Brief Introduction:-


1.In the physical layer, data transmission involves synchronised transmission of bits from the source
to the destination. The data link layer packs these bits into frames.
2.Data-link layer takes the packets from the Network Layer and encapsulates them into frames. If the
frame size becomes too large, then the packet may be divided into small sized frames. Smaller sized
frames makes flow control and error control more efficient.

2.0Aim of the Micro-project:


This Micro-Project aims at :
1. To understand concept of framing techniques.
2. To reduce the ambiguity of intangible topics.
3. To diagnose a course.
4. To make value judgments
3.0Action Plan:

Sr. No. Details of activity Planned Planned Name of


Start date Finish date Responsible Team
Members
1 Searching & allocation of Mohit Khandale
Topic 15-9-2022 17-9-2022 Anurag Mhaske
Sahil Gaikwad
2 Collection of data of Mohit Khandale
Selected topic 18-9-2022 21-9-2022 Sahil Gaikwad

3 Planned to prepared Mohit Khandale


the project 22-9-2022 25-9-2022 Anurag Mhaske

4 Development of Sahil Gaikwad


Project followup 29-9-2022 30-9-2022 Anurag Mhaske
5 Mohit Khandale
Completion of project 01-10-2022 Sahil Gaikwad
05-10-2022
Anurag Mhaske
6 Mohit Khandale
Project Report Preparation 07-10-2022 15-10-2022 Anurag Mhaske
Sahil Gaikwad
7 Mohit Khandale
Project Report submission 18-10-2021 23-10-2021 Anurag Mhaske
Sahil Gaikwad
8 Presentation of Project Mohit Khandale
12-11-2021 20-11-2021 Anurag Mhaske
Sahil Gaikwad

4.0 Resources Required:

S. No. Name of Specifications Qty Remarks


Resource/material
1 Computer system Windows 10,11 - -
2 Internet Connection - - -
‘Framing Techniques’

Framing is a point-to-point connection between two computers or devices consisting of


a wire where data is transmitted as a stream of bits. However, these bits must be
framed into discernible blocks of information.

Framing is a function of the data link layer.

The data link layer, needs to pack bits into frames, so that each frame is distinguishable
from another. The Data Link layer prepares a packet for transport across the local
media by encapsulating it with a header and a trailer to create a frame.

The Data Link layer frame includes:


• Data - The packet from the Network layer
• Header - Contains control information, such as addressing, and is located at the
beginning of the PDU
• Trailer - Contains control information added to the end of the PDU
Fig. Data Link Layer Service

Our postal system practices a type of framing. The simple act of inserting a letter into
an envelope separates one piece of information from another; the envelope serves as
the delimiter. In addition, each envelope defines the sender and receiver addresses
since the postal system is a many-to-many carrier facility. Framing in the data link
layer separates a message from one source to a destination, or from other messages to
other destinations, by adding a sender address and a destination address. The
destination address defines where the packet is to go; the sender address helps the
recipient acknowledge the receipt.

 Types of Framing Techniques:


1. Fixed-Size Framing
2. Variable-Size Framing
1.Fixed-Size Framing
Frames can be of fixed or variable size. In fixed-size framing, there is no need for
defining the boundaries of the frames; the size itself can be used as a delimiter. An
example of this type of framing is the ATM wide-area network, which uses frames of
fixed size called cells.
2.Variable-Size Framing
Variable-size framing is prevalent in local- area networks. In variable-size framing, we
need a way to define the end of the frame and the beginning of the next. Historically,
two approaches were used for this purpose: a character-oriented approach and a bit-
oriented approach.

 Character-Oriented Protocols
In a character-oriented protocol, data to be carried are 8-bit characters from a coding
system such as ASCII (see Appendix A). The header, which normally carries the
source and destination addresses and other control information, and the trailer, which
carries error detection or error correction redundant bits, are also multiples of 8 bits. To
separate one frame from the next, an 8-bit (I-byte) flag is added at the beginning and
the end of a frame. The flag, composed of protocol-dependent special characters,
signals the start or end of a frame . Any pattern used for the flag could also be part of
the information. To fix this problem, a byte-stuffing strategy was added to character-
oriented framing. In byte stuffing (or character stuffing), a special byte is added to the
data section of the frame when there is a character with the same pattern as the flag.
The data section is stuffed with an extra byte.

This byte is usually called the escape character (ESC), which has a predefined bit
pattern. Whenever the receiver encounters the ESC character, it removes it from the
data section and treats the next character as data, not a delimiting flag. Character-
oriented protocols present a problem in data communications.

The universal coding systems in use today, such as Unicode, have 16-bit and 32-bit
characters that conflict with 8-bit characters. We can say that in general, the tendency
is moving toward the bit-oriented protocols that we discuss next.
 Bit-Oriented Protocols
In a bit-oriented protocol, the data section of a frame is a sequence of bits to be
interpreted by the upper layer as text, graphic, audio, video, and so on. However, in
addition to headers (and possible trailers), we still need a delimiter to separate one
frame from the other. Most protocols use a special 8-bit pattern flag 01111110 as the
delimiter to define the beginning and the end of the frame

Fig.A Frame in a bit-oriented protocol

This flag can create the same type of problem we saw in the byte-oriented protocols.
That is, if the flag pattern appears in the data, we need to somehow inform the receiver
that this is not the end of the frame. We do this by stuffing 1 single bit (instead of 1
byte) to prevent the pattern from looking like a flag. The strategy is called bit stuffing.
In bit stuffing, if a 0 and five consecutive 1 bits are encountered, an extra 0 is added.
This extra stuffed bit is eventually removed from the data by the receiver. Note that the
extra bit is added after one 0 followed by five 1s regardless of the value of the next bit.
This guarantees that the flag field sequence does not inadvertently appear in the frame.
Fig.Bit-Oriented Protocols

01111110 appears in the data, it will change to 011111010 (stuffed) and is not
mistaken as a flag by the receiver. The real flag 01111110 is not stuffed by the sender
and is recognized by the receiver.
Architecture: The architecture of a LAN can be considered as a set of layered
protocols. In OSI terms, the higher layer protocols are totally independent of the LAN
architecture. Hence, only lower order layers are considered for the design of LAN
architecture. The datalink layer of LAN is split into two sub layers. - Medium Access
Control (MAC), - Logical Link Control Layer (LLC). The IEEE 802 committee had
formulated the standards for LAN.
 IEEE Standards :

 LLC Frame Format:


Destination Service Access Point (DSAP) -- IEEE 802.2 header begins with a 1 byte
field, which identifies the receiving upper-layer process.

Source Service Access Point (SSAP) -- Following the DSAP address is the 1-byte
address, which identifies the sending upper-layer process

Control -- The Control field employs three different formats, depending on the type of
LLC frame used:
 Information (I) frame -- Carries upper-layer information and some control
information.
Supervisory (S) frame -- Provides control information. An S frame can request and
suspend transmission, reports on status, and acknowledge receipt of I frames. S frames
do not have an Information field.

Unnumbered (U) frame -- Used for control purposes and is not sequenced. A U frame
can be used to initialize secondaries. Depending on the function of the U frame, its
Control field is 1 or 2 bytes. Some U frames have an Information field.
 IEEE 802.3 Ethernet Frame Format

Fig. IEEE 802.3 Ethernet Frame Format

 Preamble – Ethernet frame starts with 7-Bytes Preamble. This is a pattern of


alternative 0’s and 1’s which indicates starting of the frame and allow sender and
receiver to establish bit synchronization. Initially, PRE (Preamble) was
introduced to allow for the loss of a few bits due to signal delays. But today’s
high-speed Ethernet don’t need Preamble to protect the frame bits. PRE
(Preamble) indicates the receiver that frame is coming and allow the receiver to
lock onto the data stream before the actual frame begins.
 Destination Address – This is 6-Byte field which contains the MAC address of
machine for which data is destined.
 Source Address – This is a 6-Byte field which contains the MAC address of
source machine. As Source Address is always an individual address (Unicast),
the least significant bit of first byte is always 0.
 Lenght - Length is a 2-Byte field, which indicates the length of entire Ethernet
frame. This 16-bit field can hold the length value between 0 to 65534, but length
cannot be larger than 1500 Bytes because of some own limitations of Ethernet.
 Data – This is the place where actual data is inserted, also known as Payload.
Both IP header and data will be inserted here if Internet Protocol is used over
Ethernet. The maximum data present may be as long as 1500 Bytes. In case data
length is less than minimum length i.e. 46 bytes, then padding 0’s is added to
meet the minimum possible length.
 Frame Check Sequence (FCS) – FCS is 4 Byte field. This field contains a 32-
bits hash code of data, which is generated over the Destination Address, Source
Address, Length, and Data field. If the checksum computed by destination is not
the same as sent checksum value, data received is corrupted.
Conclusion:

Frames can be crucial to the experience we have of art. They not only enhance the
way that the piece looks but can also play a key role in protecting it too. Some
frames can even mean that the value of the artwork inside goes up when placed in it.

Framing in photography refers to the technique of drawing focus to the subject in the
photo by blocking other parts of the image with something in the scene. Frames
can be located in the center of the picture or alongside its edges.
Teacher Evaluation Sheet
Name of Student: Khandale Mohit Deepak Enrollment No. : 2107760266
Name of Programme: Information Technology Semester: 3rd
Course Title: Data communication (22322)

Title of the Micro-Project : Prepare report on fixed size, variable size framing techniques

Course Outcomes Achieved:


1) Learned about Framing Techniques
2) Reduce the ambiguity of intangible topics..
3) Computer knowledge is developed.

Evaluation as per Suggested Rubric for Assessment of Micro Project

Sr. Characteristic to be assessed Poor Average Good Excellent


No. ( Marks 1 - 3 ( Marks 4 - 5 ) ( Marks 6 - 8 ( Marks 9-
) ) 10 )

1 Relevance to the course

2 Literature Survey /
Information Collection
3 Project Proposal

4 Completion of the Target as


per project proposal

5 Analysis of Data and


representation
6 Quality of Prototype/Model

7 Report Preparation

8 Presentation

9 Defense
Micro-Project Evaluation Sheet

Process Assessment Product Assessment Total


Part A - Project Methodology PartB - Project individual Marks
Project (2 marks) Report/Working Presentation/Viva
Proposal Model (4 marks) 10
(2 marks) (2 marks)

Note:
Every course teacher is expected to assign marks for group evolution in first 3 columns
& individual evaluation in 4TH columns for each group of students as per rubrics.

Comments/Suggestions about team work/leadership/inter-personal communication (if any)


………………………………………………………………………………………………
……………………………………………………………………………………………..
……………………………………………………………………………………………..
……………………………………………………………………………………………..

Any Other Comment:


……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
………………………………………………………………………………………………

Name and designation of the Faculty Member: Prof. S.B.Patil

Signature…………………………………………………………………………………………...
Teacher Evaluation Sheet
Name of Student: Mhaske Anurag Sandeep Enrollment No. : 2107760287
Name of Programme: Information Technology Semester: 3rd
Course Title: Data communication (22322)

Title of the Micro-Project : Prepare report on fixed size, variable size framing techniques

Course Outcomes Achieved:


1) Learned about Framing Techniques
2) Reduce the ambiguity of intangible topics..
3) Computer knowledge is developed.

Evaluation as per Suggested Rubric for Assessment of Micro Project

Sr. Characteristic to be Poor Average Good Excellent


No assessed ( Marks 1 - 3 ( Marks 4 - 5 ) ( Marks 6 - 8 ( Marks 9-
. ) ) 10 )

1 Relevance to the course

2 Literature Survey /
Information Collection
3 Project Proposal

4 Completion of the Target as


per project proposal

5 Analysis of Data and


representation
6 Quality of Prototype/Model

7 Report Preparation

8 Presentation

9 Defense
Micro-Project Evaluation Sheet

Process Assessment Product Assessment Total


Part A - Project Methodology PartB - Project individual Marks
Project (2 marks) Report/Working Presentation/Viva
Proposal Model (4 marks) 10
(2 marks) (2 marks)

Note:
Every course teacher is expected to assign marks for group evolution in first 3 columns
& individual evaluation in 4TH columns for each group of students as per rubrics.

Comments/Suggestions about team work/leadership/inter-personal communication (if any)


………………………………………………………………………………………………
……………………………………………………………………………………………..
……………………………………………………………………………………………..
……………………………………………………………………………………………..

Any Other Comment:


……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
………………………………………………………………………………………………

Name and designation of the Faculty Member: Prof. S.B.Patil

Signature…………………………………………………………………………………………...
Teacher Evaluation Sheet
Name of Student: Gaikwad Sahil Bhaskar Enrollment No. : 2107760317
Name of Programme: Information Technology Semester: 3rd
Course Title: Data communication (22322)

Title of the Micro-Project : Prepare report on fixed size, variable size framing techniques

Course Outcomes Achieved:


1) Learned about Framing Techniques
2) Reduce the ambiguity of intangible topics..
3) Computer knowledge is developed.

Evaluation as per Suggested Rubric for Assessment of Micro Project

Sr. Characteristic to be Poor Average Good Excellent


No assessed ( Marks 1 - 3 ( Marks 4 - 5 ) ( Marks 6 - 8 ( Marks 9-
. ) ) 10 )

1 Relevance to the course

2 Literature Survey /
Information Collection
3 Project Proposal

4 Completion of the Target as


per project proposal

5 Analysis of Data and


representation
6 Quality of Prototype/Model

7 Report Preparation

8 Presentation

9 Defense
Micro-Project Evaluation Sheet

Process Assessment Product Assessment Total


Part A - Project Methodology PartB - Project individual Marks
Project (2 marks) Report/Working Presentation/Viva
Proposal Model (4 marks) 10
(2 marks) (2 marks)

Note:
Every course teacher is expected to assign marks for group evolution in first 3 columns
& individual evaluation in 4TH columns for each group of students as per rubrics.

Comments/Suggestions about team work/leadership/inter-personal communication (if any)


………………………………………………………………………………………………
……………………………………………………………………………………………..
……………………………………………………………………………………………..
……………………………………………………………………………………………..

Any Other Comment:


……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
………………………………………………………………………………………………

Name and designation of the Faculty Member: Prof. S.B.Patil

Signature…………………………………………………………………………………………...

You might also like