High Data Link Control

The most important data link control protocol is HDLC (IS0 33009, IS0 4335). Not
only is HDLC widely used, but it is the basis for many other important data link
control protocols, which use the same or similar formats and the same mechanisms
as employed in HDLC. Accordingly, in this section we provide a detailed discussion
of HDLC. Section 6.5 surveys related protocols.
Basic Characteristics
To satisfy a variety of applications, HDLC defines three types of stations, two link
configurations, and three data-transfer modes of operation. The three station types
are :
Primary station. Has the responsibility for controlling the operation of the
link. Frames issued by the primary are called commands.
Secondary station. Operates under the control of the primary station. Frames
6.4 / HIGH-LEVEL DATA LINK CONTROL (HDLC) 177
issued by a secondary are called responses. The primary maintains a separate
logical link with each secondary station on the line.
Combined station. Combines the features of primary and secondary. A combined
station may issue both commands and responses.

The two link configurations are

Unbalanced configuration. Consists of one primary and one or more secondary
stations and supports both full-duplex and half-duplex transmission.
Balanced configuration. Consists of two combined stations and supports both
full-duplex and half-duplex transmission.

The three data transfer modes are

Normal response mode (NRM). Used with an unbalanced configuration. The
primary may initiate data transfer to a secondary, but a secondary may only
transmit data in response to a command from the primary.
Asynchronous balanced mode (ABM). Used with a balanced configuration.
Either combined station may initiate transmission without receiving permission
from the other combined station.
Asynchronous response mode (ARM). Used with an unbalanced configuration.
The secondary may initiate transmission without explicit permission of
the primary. The primary still retains responsibility for the line, including initialization,
error recovery, and logical disconnection.

NRM is used on mulitdrop lines, in which a number of terminals are connected
to a host computer. The computer polls each terminal for input. NRM is also
sometimes used on point-to-point links, particularly if the link connects a terminal
or other peripheral to a computer. ABM is the most widely used of the three modes;
it makes more efficient use of a full-duplex point-to-point link as there is no polling
overhead. ARM is rarely used; it is applicable to some special situations in which a
secondary may need to initiate transmission.

Frame Structure
HDLC uses synchronous transmission. All transmissions are in the form of frames,
and a single frame format suffices for all types of data and control exchanges.
Figure 6.10a depicts the structure of the HDLC frame. The flag, address, and
control fields that precede the information field are known as a header. The FCS
and flag fields following the data field are referred to as a trailer.
Flag Fields
Flag fields delimit the frame at both ends with the unique pattern 01111110. A single
flag may be used as the closing flag for one frame and the opening flag for the
next. On both sides of the user-network interface, receivers are continuously hunting
for the flag sequence to synchronize on the start of a frame. While receiving a frame, a station continues to hunt for that sequence to determine the end of the
frame. However, it is possible that the pattern 01111110 will appear somewhere
inside the frame, thus destroying frame-level synchronization. To avoid this, a procedure
known as bit stuffing is used. Between the transmission of the starting and
ending flags, the transmitter will always insert an extra 0 bit after each occurrence
of five Is in the frame. After detecting a starting flag, the receiver monitors the bit
stream. When a pattern of five 1s appears, the sixth bit is examined. If this bit is 0,
it is deleted. If the sixth bit is a 1 and the seventh bit is a 0, the combination is
accepted as a flag. If the sixth and seventh bits are both 1, the sender is indicating
an abort condition.
With the use of bit stuffing, arbitrary bit patterns can be inserted into the data
field of the frame. This property is known as data transparency.
Figure 6.11a shows an example of bit stuffing. Note that in the first two cases,
the extra 0 is not strictly necessary for avoiding a flag pattern, but is necessary for
the operation of the algorithm. The pitfalls of bit stuffing are also illustrated in this figure. When a flag is used as both an ending and a starting flag, a 1-bit error merges
two frames into one; conversely, a 1-bit error inside the frame could split it in two.

Address Field
The address field identifies the secondary station that transmitted or is to receive
the frame. This field is not needed for point-to-point links, but is always included
for the sake of uniformity. The address field is usually eight bits long but, by prior
agreement, an extended format may be used in which the actual address length is a
multiple of seven bits (Figure 6.10b). The least significant bit of each octet is 1 or 0,
depending on whether it is or is not the last octet of the address field. The remaining
seven bits of each octet form part of the address. The single-octet address of
11111111 is interpreted as the all-stations address in both basic and extended
formats. It is used to allow the primary to broadcast a frame for reception by all
secondaries.
Control Field
HDLC defines three types of frames, each with a different control field format.
Information frames (I-frames) carry the data to be transmitted for the user (the
logic above HDLC that is using HDLC). Additionally, flow- and error-control data,
180 CHAPTER 6 / DATA LINK CONTROL
using the ARQ mechanism, are piggybacked on an information frame. Supervisory
frames (S-frames) provide the ARQ mechanism when piggybacking is not used.
Unnumbered frames (U-frames) provide supplemental link control functions. The
first one or two bits of the control field serves to identify the frame type. The
remaining bit positions are organized into subfields as indicated in Figure 6.10~an d
d. Their use is explained below in the discussion of HDLC operation.
Note that the basic control field for S- and I-frames uses 3-bit sequence numbers.
With the appropriate set-mode command, an extended control field can be
used for S- and I-frames that employs 7-bit sequence numbers. U-frames always
contain an &bit control field.
Information Field
The information field is present only in I-frames and some U-frames. The field can
contain any sequence of bits but must consist of an integral number of octets. The
length of the information field is variable up to some system-defined maximum.
Frame Check Sequence Field
The frame check sequence (FCS) is an error-detecting code calculated from the
remaining bits of the frame, exclusive of flags. The normal code is the 16-bit CRCCCITT
defined in Section 6.2. An optional 32-bit FCS, using CRC-32, may be
employed if the frame length or the line reliability dictates this choice.
Operation
HDLC operation consists of the exchange of I-frames, S-frames, and U-frames
between two stations. The various commands and responses defined for these frame
types are listed in Table 6.1. In describing HDLC operation, we will discuss these
three types of frames.
The operation of HDLC involves three phases. First, one side or another initializes
the data link so that frames may be exchanged in an orderly fashion. During
this phase, the options that are to be used are agreed upon. After initialization, the
two sides exchange user data and the control information to exercise flow and error
control. Finally, one of the two sides signals the termination of the operation.
Initialization
Initialization may be requested by either side by issuing one of the six set-mode
commands. This command serves three purposes:
1. It signals the other side that initialization is requested.
2. It specifies which of the three modes (NRM, ABM, ARM) is requested.
3. It specifies whether 3- or 7-bit sequence numbers are to be used.
If the other side accepts this request, then the HDLC module on that end
transmits an unnumbered acknowledged (UA) frame back to the initiating side. If
the request is rejected, then a disconnected mode (DM) frame is sent.
Data Transfer
When the initialization has been requested and accepted, then a logical connection
is established. Both sides may begin to send user data in I-frames, starting with
sequence number 0. The N(S) and N(R) fields of the I-frame are sequence numbers
that support flow control and error control. An HDLC module sending a sequence
of I-frames will number them sequentially, modulo 8 or 128, depending on whether
3- or 7-bit sequence numbers are used, and place the sequence number in N(S).
N(R) is the acknowledgment for I-frames received; it enables the HDLC module to indicate which number I-frame it expects to receive next.
S-frames are also used for flow control and error control. The receive-ready
(RR) frame is used to acknowledge the last I-frame received by indicating the next
I-frame expected. The RR is used when there is no reverse-user data traffic (Iframes)
to carry an acknowledgment. Receive-not-ready (RNR) acknowledges an
I-frame, as with RR, but also asks the peer entity to suspend transmission of Iframes.
When the entity that issued RNR is again ready, it sends an RR. REJ initiates
the go-back-N ARQ. It indicates that the last I-frame received has been
rejected and that retransmission of all I-frames beginning with number N(R) is
required. Selective reject (SREJ) is used to request retransmission of just a single
frame.
Disconnect
Either HDLC module can initiate a disconnect, either on its own initiative if there
is some sort of fault, or at the request of its higher-layer user. HDLC issues a disconnect
by sending a disconnect (DISC) frame. The other side must accept the disconnect
by replying with a UA.
Examples of Operation
In order to better understand HDLC operation, several examples are presented in
Figure 6.12. In the example diagrams, each arrow includes a legend that specifies
the frame name, the setting of the PIF bit, and, where appropriate, the values of
N(R) and N(S). The setting of the P or F bit is 1 if the designation is present and 0
if absent.
Figure 6.12a shows the frames involved in link setup and disconnect. The
HDLC protocol entity for one side issues an SABM command to the other side and
starts a timer. The other side, upon receiving the SABM, returns a UA response
and sets local variables and counters to their initial values. The initiating entity
receives the UA response, sets its variables and counters, and stops the timer. The
logical connection is now active, and both sides may begin transmitting frames.
Should the timer expire without a response, the originator will repeat the SABM,
as illustrated. This would be repeated until a UA or DM is received or until, after a
given number of tries, the entity attempting initiation gives up and reports failure to
a management entity. In such a case, higher-layer intervention is necessary. The
same figure (Figure 6.12a) shows the disconnect procedure. One side issues a DISC
command, and the other responds with a UA response.
Figure 6.12b illustrates the full-duplex exchange of I-frames. When an entity
sends a number of I-frames in a row with no incoming data, then the receive
sequence number is simply repeated (e.g., I, 1, 1; I, 2, 1 in the A-to-B direction).
When an entity receives a number of I-frames in a row with no outgoing frames,
then the receive sequence number in the next outgoing frame must reflect the
cumulative activity (e.g., I, 1, 3 in the B-to-A direction). Note that, in addition to
I-frames, data exchange may involve supervisory frames.
Figure 6.12~sh ows an operation involving a busy condition. Such a condition
may arise because an HDLC entity is not able to process I-frames as fast as they are because it is out of order and sends an REJ with an N(R) of 4. This causes A to initiate
retransmission of all I-frames sent, beginning with frame 4. It may continue to
send additional frames after the retransmitted frames.
An example of error recovery using a timeout is shown in Figure 6.12e. In this
example, A transmits I-frame number 3 as the last in a sequence of I-frames. The
frame suffers an error. B detects the error and discards it. However, B cannot send
an REJ; this is because there is no way to know if this was an I-frame. If an error is
detected in a frame, all of the bits of that frame are suspect, and the receiver has no
way to act upon it. A, however, would have started a timer as the frame was transmitted.
This timer has a duration long enough to span the expected response time.
When the timer expires, A initiates recovery action; this is usually done by polling
the other side with an RR command with the P bit set, to determine the status of
the other side. Because the poll demands a response, the entity will receive a frame
containing an N(R) field and be able to proceed. In this case, the response indicates that frame 3 was lost, which A retransmits.
These examples are not exhaustive. However, they should give the reader a
good feel for the behavior of HDLC.

OTHER DATA LINK CONTROL PROTOCOLS
In addition to HDLC, there are a number of other important data link control protocols.
Figure 6.13 illustrates the frame formats, and this section provides a brief
overview.
LAPB
LAPB (Link Access Procedure, Balanced) was issued by ITU-T as part of its X.25
packet-switching network-interface standard. It is a subset of HDLC that provides
only the asynchronous balanced mode (ABM); it is designed for the point-to-point
link between a user system and a packet-switching network node. Its frame format
is the same as that of HDLC.
LAPD
LAPD (Link Access Procedure, D-Channel) was issued by ITU-T as part of its set
of recommendations on ISDN (Integrated Services Digital Network). LAPD provides
data link control over the D channel, which is a logical channel at the user-
ISDN interface.
There are several key differences between LAPD and HDLC. Like LAPB,
LAPD is restricted to ABM. LAPD always uses 7-bit sequence numbers; 3-bit
sequence numbers are not allowed. The FCS for LAPD is always the 16-bit CRC.
Finally, the address field for LAPD is a 16-bit field that actually contains two subaddresses:
one is used to identify one of possibly multiple devices on the user side
of the interface, and the other is used to identify one of possibly multiple logical
users of LAPD on the user side of the interface.
Logical Link Control (LLC)
LLC is part of the IEEE 802 family of standards for controlling operation over a
local area network (LAN). LLC is lacking some features found in HDLC and also
has some features not found in HDLC.
The most obvious difference between LLC and HDLC is the difference in
frame format. Link control functions in the case of LLC are actually divided
between two layers: a medium access control (MAC) layer, and the LLC layer,
which operates on top of the MAC layer.
Figure 6 . 1 3~sh ows the structure of the combined MACILLC frame; the
shaded portion corresponds to the fields produced at the LLC layer, and the
unshaded portions are the header and trailer of the MAC frame. The MAC layer
includes source and destination addresses for devices attached to the LAN. Two
addresses are needed as there is no concept of primary and secondary in the LAN
environment; therefore, both the sender and receiver must be identified. Error
detection is done at the MAC level, using a 32-bit CRC. Finally, there are some control functions peculiar to medium-access control that may be included in a MAC
control field.
At the LLC layer, there are four fields. The destination and source service
access points (DSAP and SSAP), identify the logical user of LLC at the source and
destination systems. The LLC control field has the same format as that of HDLC,
limited to 7-bit sequence numbers.
Operationally, LLC offers three forms of service. The connection-mode service
is the same as the ABM of HDLC. The other two services, unacknowledged
connectionless and acknowledged connectionless, are described in Part 11.
Frame Relay
Frame relay is a data link control facility designed to provide a streamlined capability
for use over high-speed packet-switched networks. It is used in place of X.25,
which consists of both a data link control protocol (LAPB) and a network-layer
protocol (called X.25 packet layer). Frame relay is examined in detail in Part 11.
The data link control protocol defined for frame relay is LAPF (Link Access
Procedure for Frame-Mode Bearer Services). There are actually two protocols: a
control protocol, which has similar features to HDLC, and a core protocol, which is
a subset of the control pyotocol.
There are several key differences between the LAPF control protocol and
HDLC. Like LAPB, LAPF control is restricted to ABM. LAPF control always uses
7-bit sequence numbers; 3-bit sequence numbers are not allowed. The FCS for
LAPF control is always the 16-bit CRC. Finally, the address field for LAPF control
is two, three, or four octets long, containing a 10-bit, 16-bit, or 23-bit DLCI (data
link connection identifier). The DLCI identifies a logical connection between a
source and destination system. In addition, the address field contains some control
bits that are useful for flow control purposes.
The LAPF core consists of the same flag, address, information, and FCS fields
as LAPF control. The difference is that there is no control field for LAPF core.
Thus, there is no means of doing flow and error control, which results in a more
streamlined operation.
Asynchronous Transfer Mode (ATM)
Like frame relay, ATM is designed to provide a streamlined data-transfer capability
across high-speed networks. Unlike frame relay, ATM is not based on HDLC.
Instead, ATM is based on a completely new frame format, known as a cell, that provides
minimum processing overhead.
The cell has a fixed length of 53 octets, or 424 bits. The details of the ATM cell
fields are discussed in Part 11
Read more

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • Twitter
  • RSS

Sistem Komunikasi Bluetooth

Protokol bluetooth menggunakan sebuah kombinasi antara circuit switching dan packet
switching. Bluetooth dapat mendukung sebuah kanal data asinkron, tiga kanal suara sinkron simultan atau sebuah kanal dimana secara bersamaan mendukung layanan data asinkron dan suara sinkron. Setiap kanal suara mendukung sebuah kanal suara sinkron 64 kb/s. Kanal asinkron dapat mendukung kecepatan maksimal 723,2 kb/s asimetris, dimana untuk arah 2 sebaliknya dapat mendukung sampai dengan kecepatan 57,6 kb/s. Sedangkan untuk mode simetris dapat mendukung sampai dengan kecepatan 433,9 kb/s.

Sebuah perangkat yang memiliki teknologi wireless bluetooth akan mempunyai kemampuan untuk melakukan pertukaran informasi dengan jarak jangkauan sampai dengan 10 meter (~30 feet), bahkan untuk daya kelas 1 bisa sampai pada jarak 100 meter. Sistem bluetooth menyediakan layanan komunikasi point to point maupun komunikasi point to multipoint. Produk bluetooth dapat berupa PC card atau USB adapter yang dimasukkan ke dalam perangkat. Perangkat-perangkat yang dapat diintegerasikan dengan teknologi bluetooth antara lain : mobile PC, mobile phone, PDA (Personal Digital Assistant), headset, kamera digital, printer, router dan masih banyak peralatan lainnya. Aplikasiaplikasi yang dapat disediakan oleh layanan bluetooth ini antara lain : PC to PC file transfer, PC to PC file synch (notebook to desktop), PC to mobile phone, PC to PDA, wireless headset, LAN connection via ethernet access point dan sebagainya. Contoh modul aplikasi beberapa peralatan yang kemungkinan dapat menggunakan teknologi bluetooth dapat dilihat seperti Gambar di bawah ini.



Dalam transceiver bluetooth ada tiga kelas pembagian daya yaitu :
Daya kelas 1 beroperasi antara 100 mW (20dBm) dan 1mW (0dBm) dan didesain untuk
peralatan dengan jangkauan yang jauh hingga 100m.
Daya kelas 2 beroperasi antara 2,5 mW (4dBm) dan 0,25mW (-6dBm) dan didesain untuk
peralatan dengan jangkauan yang jauh hingga 10m.
Daya kelas 3 beroperasi pada 1 mW (0dBm) dan didesain untuk peralatan dengan jangkauan pendek atau sekitar 1m.

Read more

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • Twitter
  • RSS

Implementasi Sistem Informasi


DFD
Melalui DFD berikut ini akan digambarkan aliran informasi yang terlibat dalam proses sistem informasi Restoran dan data-data terkait secara detil.



Diagram ini adalah diagram yang akan menggambarkan hubungan setiap entitas yang terlibat dalam sistem secara umum. Entitas adalah kelompok pemakai yang akan menggunakan sistem.



Diagram Zero
Dan berikut ini merupakan diagram zero yang diturunkana atau diperinci lagai dari diagram konteks sebelumnya.



Entity Relationship Diagram
I

IMPLEMENTASI SISTEM PADA RESTORAN

Entitas-entitas dalam yang terdapat dalam Chicken Farm ini adalah:

1. Pemilik

  • Berposisi tertinggi di dalam perusahaan, memberikan ijin kepada manajer untuk mengambil keputusan harian

  • Menerima rekap laporan dari manajer

  • Mengambil kebijakan perusahaan

2. Manajer

  • Mengambil keputusan harian

  • Menerima laporan harian dari petugas kandang, melakukan rekapitulasi dan melaporkannya kepada pemilik

  • Melakukan transaksi dengan distributor ayam dan pemasok pakan ayam.

3. Kepala Persedian, mencatat data untuk laporan harian berupa:

  • Mencatat persediaan logistik dari pemasok dan mengatur persedian setiap logistik yang keluar maupun masuk.

Entitas-entitas luar yang terdapat dalam Restoran ini adalah:

1. Supplier

Supplier adalah orang atau perusahaan yang memasok persedian berupa bahan baku makanan yang dibutuhkan restoran.

2. Jukir

Jukir atau Juru Parkir adalah orang yang membantu memakirkan kendaraan pelanggan sebelum memasuki restoran.



1. Fase Awal Pengembangan Sistem



Fase awal pengembangan sistem mengutamakan kemampuan pemakai dalam mengoperasikannya. Fase awal terdiri dari :



Perencanaan sistem



Analisis sistem



Perancangan sistem secara umum/konseptual



Evaluasi dan seleksi sistem

1.1 Fase Perencanaan Sistem



1.1.1 Latar Belakang Pengembangan Sistem



Sistem adalah kumpulan elemen yang masing-masing elemen tersebut memiliki fungsi masing - masing, namun secara bersama-sama bekerja untuk mencapai tujuan dari adanya sistem tersebut. Sebuah mobil dapat dikatakan sebuah sistem karena di dalamnya terdapat kumpulan elemen.Sistem yang kita bahas sebagai contoh sederhana di sini adalah Sistem Informasi pada peternakan ayam.

1.1.2 Tujuan Dari Pengembangan Sistem



Tujuan dari pengembangan sistem ini adalah memudahkan para pelanggan dan proses transaksi yang ada di peternakan ayam.

1.1.3 Batasan Masalah



Dalam pengembangan sistem ini, penulis membatasi masalah pada transaksi dan menangani pemesanan pada restoran.



1.1.4 Studi Faktor Kelayakan

Kelayakan Ekonomis



Sistem ini mempunyai nilai yang ekonomis, karena tidak terlalu berorintasi pada hardware yang canggih dan operator yang mempunyai keahlian khusus, jadi banyak biaya yang dapat di kurangi dengan memakai sistem ini seperti : biaya merekrut tenaga ahli, biaya perangkat lunak dan perangat keras yang dipakai.



Kelayakan Operasional



Pada system ini, prosedur dan keahlian pegawai sudah cukup untuk mengoperasikan system yang dirancang untuk kesuksesan system ini



Kelayakan Rencana



Pada system ini hanya membutuhkan waktu sekitar satu bulan untuk membuat sepenuhnya system ini dapat dioperasikan.



Diferensiasi



Dengan adanya sistem ini pelayanan berbasis komputerisasi, pelayanan yang diberikan akan lebih cepat, proses lebih mudah untuk dilaksanakan, proses pembagian lebih terstruktur, lebih mudah dan cepat.



Sumber : http://blog.its.ac.id/adtgasal0809/2008/12/27/analisis-sistem-restoran-“nikmat-rasa”



Read more

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • Twitter
  • RSS

Empty Life

Empty Life

Dia kembali menulis tentang kehidupannya, dimana dia merasa hidupnya benar-benar terasa kosong sekarang. Belum lama ini dia sempat menonton film drama seri, dan di film tersebut benar-benar mencerminkan kehidupannya yang sekarang ia rasakan. Kadang ia bertanya, bukan bahkan ia selalu bertanya kenapa ia terlahir dengan sifat sperti ini. Gengsi yang dimiliknya sangat tinggi yang mengakibatkan ia sering kehilangan something important in his life. Kenapa mulutnya sangatlah sulit untuk mengungkapkan isi hatinya, ia hanya bisa memendamnya bahkan membiarkan dirinya sakit karena sifatnya tersebut. Sekarang disaat seperti ini yang dia bisa lakukan hanya menyalahkan dirinya sendiri dan mengasihani dirinya yang memalukan tersebut. Hari ini dia bertemu dengan seseorang yang disebutkan dalam his fucking whole life was gone, tapi apa yang bisa dia perbuat?? Dia hanya terdiam tanpa dapat mengatakan apapun yang bisa mempertahankan his fucking whole life. Mengapa mulutnya sangatlah berat untuk mengucapkan kalimat yang diharapkan oleh his fucking whole life? yang sebenarnya juga diharapkan oleh dirinya. Namun semuanya telah berlalu, dia hanya bisa menyesalinya sekarang. His fucking whole life is really gone now, dengan seseorang yang tidak dicintainya. Disaat inilah dia percaya bahwa karma itu benar-benar ada, dah ia tidak ingin his fucking whole life tersebut merasakannya walaupun itu harus menyakiti hatinya sendiri. He really get an empty life now!!!

Read more

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • Twitter
  • RSS