Data Link Layer Concepts
1. Flow Control and Error Control
Flow Control: Prevents the sender from overwhelming the receiver by regulating transmission
speed. Techniques include Stop-and-Wait, Sliding Window, and Credit-based control.
Error Control: Ensures correctness of data using error detection and correction. Methods include
ARQ (Stop-and-Wait ARQ, Go-Back-N, Selective Repeat) and FEC (Forward Error Correction).
Common detection methods: Parity, Checksums, CRC.
2. Framing, Bit Stuffing and Byte Stuffing
Framing: Divides continuous bit streams into frames. Methods: Fixed-length, Length-field,
Delimiters (flags), Coding violations.
Byte Stuffing: Used in byte-oriented protocols. Special bytes (FLAG, ESC) are escaped. Example:
PPP uses 0x7E as flag, 0x7D as escape.
Bit Stuffing: Used in bit-oriented protocols like HDLC. After five consecutive 1s, a 0 is inserted.
Receiver removes stuffed 0s.
3. Data Link Layer Protocol
Functions: Framing, Physical addressing, Flow control, Error control, Access control (MAC),
Sequencing, Multiplexing.
Examples: Ethernet (802.3), PPP, HDLC, Frame Relay, Token Ring, IEEE 802.11 (Wi-Fi).
4. HDLC Protocol
HDLC: High-Level Data Link Control is a bit-oriented ISO standard. Uses bit stuffing, CRC, and
supports reliable transfer.
Frame Structure: Flag | Address | Control | Information | FCS | Flag
Frame Types: I-frames (data), S-frames (ACK/control), U-frames (management).
Modes: Normal Response Mode (NRM), Asynchronous Balanced Mode (ABM), Asynchronous
Response Mode (ARM).
5. Difference Between ALOHA and Slotted ALOHA
• Pure ALOHA: Transmit anytime; vulnerable period = 2T; max throughput ≈ 18.4%.
• Slotted ALOHA: Transmit only at slot boundaries; vulnerable period = T; max throughput ≈
36.8%.
• Slotted ALOHA requires synchronization, Pure ALOHA does not.
• Slotted ALOHA doubles throughput compared to Pure ALOHA.