Implementation of Data Link Control Protocols in Wired Network

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2014 by IJETT Journal
Volume-18 Number-2
Year of Publication : 2014
Authors : Sudhanshu Maurya, Vikas Kumar Nayak, Dr. A Nagaraju
DOI :  10.14445/22315381/IJETT-V18P211

Citation 

Sudhanshu Maurya, Vikas Kumar Nayak, Dr. A Nagaraju "Implementation of Data Link Control Protocols in Wired Network", International Journal of Engineering Trends and Technology (IJETT), V18(2),64-68 Dec 2014. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract

Data Link Layer is the protocol layer which transfers data between connected networks. It provides the functional and procedural means to transfer data between network and its nodes. It also provide the means to rectify the errors and usually correct it that may occur in the Physical Layer. Study and simulate protocol to analyse and find the advantages and disadvantages to improve the quality of protocol such that it handles the network data transmission in proper way. The protocol is studied so that the details of the protocols are revealed and the limitations of the protocol can be overcome later. In this research paper we give a brief introduction about Data Link Layer Protocols and introduced a new protocol (Protocol 7) to overcome the problem of previous protocols on the basis of priority of the frame.

References

[1] Behrouz A Forozan, “Data Communications and Networking”, Fourth Edition.
[2] H. Zimmermann, "OSI Reference Model - The IS0 Model of Architecture for Open Systems Interconnection", IEEE trans. On Communications, Vol COM-28, pp 425-432, April 1980.
[3] Steven Cherry, “A Broadband Utopia”, IEEE spectrum, May 2006
[4] S Chen, “ELEC3030(EL336)”, Computer Networks, Electonics and Computer Science, University of Southampton.
[5] F. Argenti, G. Benelli and A. Garzelli “Generalised Stop and Wait Protocol”, Electronic Letters, Vol.28, No. 9, 23rd April 1992.
[6] HOLZMANN, G.J. “Design and validation of computer protocols” Prentice-Hall, Englewood Cliffs, NJ, 1991
[7] W. STALLINGS “Data and Computer Communications”, Prentice Hall Upper Saddle River, NJ, 1997, 5th edition.
[8] Andrew S. TANENBAUM, “Computer Networks”, Prentice Hall, Upper saddle River, NJ, 1996, 3rd edition.
[9] D. Hercog, “Generalised Sliding Window Protocol”, Electronic Letters, Vol. 38, No. 18, 29 Aug 2002.
[10] G. ogasawara, t.ju, s.kota, “Experiments with Tactical network simulation, routing and management”, milcom ’96, confrence proceedings, ieee , volume 2.
[11] LIN, S., COSTELLO, JR, D., and MILLERM, ”Automatic-repeat request error-control schemes”, IEEE Commun., 22 December 1984.
[12] LINs and COSTELLO, JR, I "Error control coding: fundamentals and applications" (Prentice Hall, Englewood Cliffs, New Jersey,1983).
[13] M. E. Anagnostou and E. N. Protonotatios, “Performance analysis of the Selective Repeat ARQ protocol,” IEEE Trclns. Qmmun., vol. COM-34,Feb. 1986.
[14] K. Brayer and S. Natarajan, “An investigation of ARQ and hybrid FECARQ on an experimental high latitude meteor burst channel,” IEEE Trans. Commun., vol. 37, Nov. 1989.
[15] O. C. M. B. Duarte and H. M. Lima, “A new selective repeat scheme Actual Environmental Performance Analysis Conference. June1988.
[16] F. Halsall, Data Communications, Computer Networks and Open Systems-Addison-Wesley, 1992.
[17] J. J. Metzner and D. Chang, “Efficient selective repeat ARQ strategies for very noisy and fluctuating channels,” IEEE Trans. Commun., vol. COM-33, May 1985.
[18] M. J. Miller and S. Lin, “The analysis of some Selective Repeat ARQ schemes with finite receiver buffer,” IEEE Trans. Commun., vol. COM- 29, Sept. 1981.

Keywords
Protocol, Adjacent network, Simulate, Transmission, Segment, Frame.