throbber
116
`
`FUNDAMENTAL WIDE AFIEA NETWORKING CONCEPTS
`
`.3 Universal
`jOCl'I
`
`]C|Ck
`
`RJ4-15
`
`Programmed
`
`Figure 1.69 Programmed arrangement jack
`
`W455
`
`Table 1.29 Telephone ordering options
`
`Decision
`A
`
`B
`
`0
`
`Description
`
`
`
`
`
`OD‘-iiG301«F5-(.0i'\.'1|—‘-
`
`Tetephone set controls line
`Data set controls line
`
`No aural monitoring
`Aural monitoring provided
`
`Touchtone dialing
`Rotary dialing
`Switchhook indicator
`Mode indicator
`
`Vfhen the telephone set is optioned for telephone set controls the line, calls are
`originated or answereti with the telephone h_\‘
`lifting the l’Ik1l1I’.l:$Ct' off-hook. To
`enable control of the line to he passed to a moclem or data set an ‘cxclusitari key‘ is
`reqttirecl.
`Tlie exclusion lte_\' telt-phone permits calls; to be manually answered and then
`translierretl to the tnodeni using the exclusion key. The exclusion key telephone is
`wired for either ‘telephone set controls line‘ or ‘data set controls line’. Data set
`control
`is normally selt-acted if you have an autornatit‘ call or automatic answer
`moclem since this permits calls to be originated or answered without taking the
`telephone handset oft‘-hook. To use the telephone for voitte communications the
`handset tnust be 1‘-.tisr:d and the exclusion lte_\' placed in an up\\':irtl location.
`The telephone set control of the line option is
`tisctl with manual answer or
`manual originate modems or automatic answer or m'igi:'1att: l’I“1U(_lt'_‘n"1.‘-‘- that will be
`operated manutilly. To connect the modem to the line the telephone tmtst be off—
`hook and the exclusion key placed in an upward position. To use telephone for
`mice communications the telephone must he off-hook while the exclusion lie)‘ is
`placed in the downward position.
`\\"hen the (lat set controls the line option is selcctetl. calls can he E1l.lt0lTlE1l'.lC8ll_\'
`ori,:__tii1atcd or answerccl by the tlata equipment without lifting the telephone ltandset.
`Aural mt.}nit0t'lng enables the telephone set to monitor call prr)g1'ess tones as well
`as voice answer hack messages without requiring the user to switch from data to
`voice.
`
`

`
`1.15 THE DATA LINK LAYER
`
`117
`
`You can select option B3 if aural monitorin;._g is not required, while option B4
`should be selected if it
`is required. Option C5 should be selected if touchtone
`dialing is to be used. while option C6 should be specified for rotary dial telephones.
`Under option D7, the exclusion key will he h_\'passet'l, resulting in the lifting of the
`telephone handset causing the closure of the switehhook contact in the telephone.
`ln comparison, option D8 results in the ercclusion key contacts being wired in
`series with the switehhook contacts, indicating to the user whether he or she is in a
`Voice or L‘l'dta tnode.
`
`Ordering the business line
`
`Orderin;_r a business line t.o transmit (late: o\'er the switched telephone network
`currently requires you to pr0\'i(l€
`the telephone eompan_\‘ with four items of
`information. First, you must supply the telephone LT(ll‘|'1]')::lI‘l_\‘ with the Federal
`Ctnnmunications Cotninission (FCC) registration nuniher of the device to be
`ctmnected to the switched telephone network. This 1+-character number can be
`obtained from the \-‘entlor who must First register their device for operation on the
`switchetl network prior to making it amilahle. for use on that network.
`Next, you must provitle the ringer equivalence number of the data set to be
`connected to the switched network, This is a three—eharaetei' number, such as
`('}.4.'—\, and represents a unitless quotient formed in 'r1CL‘(')l'ClClI1C€ with certain circuit
`parameters. Finally, you must provide the jack numbers and ai'r-angement to be
`used as well as the telepho|‘1e options if you intend to use a handset.
`
`1.15 THE DATA LINK LAYER
`
`In the ['50 model, the data link l:i_\'(_‘T is responsible for the estahli.~;hment, control,
`and termination of connections among network devices.
`'l‘o ateeornplish these.
`tasks the. data link layer assumes responsibilit_\' for the How of user data as well as
`for detecting and providing a mechanism for re-cot-'er_\-‘ from errors and other
`abnormal conditions, such as at station failing to receive a response during a
`predefined time int:-:r\-‘al.
`In this section, we will first examine the l<e_\' element that defines the data link
`la_\'er—its protocol. In this exarnination. we will differentiate between terminal
`protocols and data link protocols to eliminate this l'et‘minolog_\' as -.1 potential area of
`ttoiilusioti. Next, we will
`focus our attention upon several specific wide area
`networking protocols, starting with simple :1s_\-'nt:hronous line-by-line protocols.
`Protocols examined in the second portion of this section include an as}-'nehronous
`teletype protocol, several popular asynchronous file transfer protocols used to
`transfer data to and from personal computers,
`ll3‘.\I's eharacter—oriented binary
`synchronous communication (commonly referred to as BBC or hisyne), Digital
`Equipment C'.orpoi':Ition‘s Digital
`l)ata Comrnunieations Nlcssage Protocol
`(DDCt\'lI’}. and the. bit—orien1ed Higher Lei-'el Data Link Control (I-IDLC) as
`well as its IBRI near—equi\'alent,
`.‘5y11ttl1roi"ioLis Data Link Control (SDLC).
`
`*
`
`_
`"I
`
`I
`
`i
`
`.
`
`1......
`
`j
`
`s
`
`.
`
`|
`
`;
`
`l
`j I
`"a
`' -
`I
`l
`i
`|'
`I
`I
`-.l
`i
`:1
`
`|
`
`,=,
`
`_,
`
`.,
`"1
`
`
`
`

`
`l
`
`|
`|
`,
`i
`
`i
`
`i
`
`'
`
`113
`
`FUNDAMENTAL WIDE AREA NETWORKING CONCEPTS
`
`Terminal and data link protocols
`
`Two types of protocols should be considered in 21 data (‘.OITIt11lIl1i(.221ti('JnS
`enrii-onment: terminal protocols and data link protocols.
`The data link protocol defines the control characteristics of the netvrorlt and is a
`set oi‘ conventions that are followecl which govern the transmission of data and
`control
`information. A terminal or it personal computer can have a predefined
`control character or set oi" control characters which are unique to the terminal and
`are not interpreted by the line protocol. This internal protocol can include such
`control characters as the bell,
`line Feed and carriage return for conventional
`teletype terminals, blink and cursor positioning characters for a display terminal
`and form control characters for a line printer.
`For experinienting with members of
`the ll-3L\-"l PC series and compatible
`computers, you can execute the one line BASIC" program PI{I1\7'l‘ Ci-IREMX)
`“l_)E.\IO”, substituting different ASCII values For the value of X to see the effect
`of different PC terrninal control ci1aI'acters. As an example, using the value F for X.
`the IBM PC will beep prior to displaying the Inessagxe I_)EL\-"IO, sinee ASCWI 7 is
`interpreted by the PC as a request to beep the speaker. Using the Value 9 for
`will
`cause the message DEMO to be printed commencing in position 9, since ASCII 9
`is 21 tab character which causes the cursor to more on the screen 8 character
`
`positions to the right. :'\nother example of a terminal control character is ASCII
`ll, which is the home character. Using the value ll for X will cause the message
`DER-"IO to be printed in the upper left—hand corner of the screen since the cursor is
`first placed at that location by the home character.
`Altliotigli poll and select is normall_\‘ thought of as a type of line discipline or
`control, it is also a data link protocol. in general, tht-. data linlt protocol enables the
`exchange of information according to an order or setjtience by establishing a series
`of rules for the interpretation of control siegnals which will govern the exchange of
`inioI'matitm. The control signals govern the execution of a number of tasks which
`are essential
`in controlling the exchaiige of information via a communications
`faciiit}-'. Some of these inforrnation control tasks are listed in 'l'al.1le 1.30.
`
`Table 1.30
`
`information control tasks
`
`Connection establishment
`Connection verification
`Connection disengagement
`
`Transmission sequences
`Data sequence
`Error control procedures
`
`Connection establishment and verification
`
`.'—\lthot1gh all of the tasks listed in 'l'able 1.30 are important, not all are required for
`the transmission of data, since the series of taslts required is a function of the total
`data communications en\'ironn'1ent. As an example, a single terminal or personal
`computer connected directly to a mainframe or another terminal device by a leased
`line may not require the establishment and \-'erii'ieation of the connection. Several
`
`
`
`

`
`1.15 THE DATA LINK LAYER
`
`119
`
`ll
`
`,
`
`'
`‘’
`
`l
`
`-
`
`,
`
`.
`
`E
`
`_l
`
`-
`ii
`l
`
`I
`' i
`l
`l
`
`Il
`
`II I
`
`I
`
`_.
`
`I
`
`de\-"ices connected to a mainframe coniputer on a multidrop or multipoint line
`would, however, require the verification ol‘ the ideiitification of each terminal
`device on the line to insure that data transmitted from the computer would be
`received by the proper device. Similarly, when a device's session is completed, this
`
`fact must he recognized so that the mainframe eomputei-’s resources can be made
`available to other users. Thus, connection disengagernent on devices other than
`those connected on a point-to-point leased line permits a port on the front-end
`processor to become available to service other users.
`
`Transmission sequence
`
`Ptnother important task is the transmission sequence which is used to establish the
`precedence and order of transmission, to include both data and control inform-
`ation. As an example, this task defines the rules for when devices on a multipoint
`
`circuit may transmit and receive information. In addition to the transmission of
`information folloxving a sequence,
`the data itself may be sequenced. Data
`sequencing is normally e.mployed in synchroiintis transmission and in asynchro-
`
`nous file transfer operations where a long block is broken into smaller blocks for
`transmission, with the size of
`the blocks being a
`function of the personal
`computer’s or terminal's buffer area and the error control procedure employed. B}-'
`dividing a block into smaller blocks for transmission.
`the amount of data that
`must he retransmitted,
`in the event that an error in transmission is detected,
`is
`1'edL1ced.
`Although man_\-' error-checking techniques are more efficient when short bloclts
`of information are transmitted,
`the efficiency of transmission correspondingl_\-'
`decreases since an acknt.m'leclgement (negative or positive) is returned to the device
`transmitting after each block has been received and checked. For communications
`between remote joh entry terminals and computers, blocks of up to several
`thousand characters are t_\-'pit::1ll_\-‘ used. Block lengths from 80 to 1024- characters
`are,
`l'10\\-'{3\-‘I31’.
`the most common sizes. Altliougli some protocols specify block
`length, most protocols permit the user to set the size of the block, while other
`protocols automatically \-'ar_\= the block size based upon the error rate experienced
`by the transmission progress.
`
`Error control
`
`The simplest method of error control does not actually ensure errors are corrected.
`This method of error control is known as echoplex and results in each character
`transmitted to a receiving device being sent back or echoed from the receiver to the
`transmitting device, hence, the term ‘echoplex’.
`the transmitting device
`Under
`the echoplex method of error correction,
`examines the echoed data. If the echoed data differs from the transmitted data
`an error is assumed to have occurred and the data must then be retransmitted.
`
`Since a transmission error can occur in either direction. it is possible for a character
`corrupted to another character durinig,
`transmission in one direction to be
`
`:
`
`

`
`120
`
`FUNDAMENTAL WIDE AREA NETWORKING CONCEPTS
`
`eorruptetl hack into its original hit form when echoed to the tr:-msmittingz tl(_'\'iL‘(':. in
`ntltlition, a L‘.i'11lI‘11CI€I'
`reeeivetl eorreetl_\‘ only he eorrttptetl tll.Il'iI‘t_s'_{ its echo. resulting
`in the I":-Ilse itnpressism that an L'I‘t't)r oL‘cL:ri‘e(l.
`Ee.hop|ex “"218 a popular method for detecting tralnsmission errors that was us-eel
`\\'itl)
`teletype terminals. This method of error Lleteetiran was also used in such
`message switching .s_\'s.te1‘ns as TV.-VX and is eurrently used with mz1n_\‘
`types of
`ttsynehronous trnrisniission. including pt-i'so11a| computers. Coneerning the latter.
`it PC Colnnttlliieating in L-1|‘! 215:_\'nCl1i'ormt1.s tiull-(luplcx I'nt)L'le to zmothttr lull-dttplcx
`computer will have each ehm':.ieter t1':1l'I:-ir‘I‘Il’ftL'Ll eehoetl hnel<.
`.‘a'inee the detection of
`erroneous t:l1ui'nt:tei's.
`i”1()\\'l'_'\'(_‘l', depends upon the \'lSLI2Il ae.euit_\-' ol‘ the operator
`more mo(le1‘n rnethods of L.'I'l'(_)I' detection :-Ind eoI'i‘eeti0n ltzive replttcecl the Llse of
`
`eCht)pl(‘X in zippliczititins where we camntit t'el_\' upon an tJpe1'ato1' to eoi‘1‘eL‘t (:I‘l't.)I'S_
`Thus.
`21
`l&1t‘,(_{e nLImlJt_‘.r of‘ file tI':'it1sfL1t‘ pI'otoeol.~': that group (_‘l1.'<iI'E1(:T.l.‘.’1'S
`into (him
`bloeks and zippentl ii t:heekin;_v meelttniisni m;-.re elevelopecl to uL:tomatieall_\' detect
`and eorI'et.“t trzmsmiss-ion errors.
`
`'l‘o{l:I_\'. the most t‘omI'i'1tml}' employs;-cl method to t:o1't'eL;1' tI‘imsn'1itte.Ll Crt'ot‘s is to
`infiorrn the ti':msi'nittin;_g devitre simpl_\'
`to retratnsmit
`-.1
`l3lU(.‘l{. This procedure
`requires eoorclin:-ttion l')t..'l'\\'L‘.t.'f'l
`the sending klntl
`reeeix-in;_: devices, with the
`rt-eei\'in,u device either eor1tinuousl_\' informing the seiitliitg tievitse of the status
`of each pre\'iou.~sly trainsrnitted hloelq or transmitting ii netgdtive ;1el\'no\\'Ietl,s,rement
`o1‘il_\‘ when 21 block is l‘Cl.‘(‘l\'(.‘('l
`in erroi‘.
`If the protocol used requires ;: re.-;ponse to each hloek Lintl the hloek pre\'ioL1sl_\-'
`T1"dl'l:-3lTlltI.'l'_'Ll eontztinetl no deteetecl errors.
`the rcL‘ei\'eI‘ will
`transmit
`21 positive
`
`If the recei\'er
`the next block.
`trmismit
`and the sender will
`2l(.‘l{l‘I()\\'le(lg€l’I'lI.311l.'
`detects an error. it will tl‘zI1"lSt1‘Iil a I‘I(:‘_E__{éltl\-‘t' ueltr1o\\'letlgement and disc:-trei the block
`containing: an error. The transmitting station will then retransmit the ])I‘(:\'lUL1Sl_\'
`sent block. Depending upon the protocol employetl. 11 number of retransmissitms
`rna_\' he attempted.
`l-lo\x'e\'er_.
`if d deftiult limit is reetelted owing to at bald circuit
`or other problems,
`then the eomptiter or terminal cleviee -.1;-ting; as the rnaster
`station ma._\' termin:-ate the session. and the operattor will have to re-establish the
`connection.
`
`If the p1'ott.}eol supports trzmsmission ol‘ 2'1 negattive aeknt>\\'let|;_{ement only when
`:1 block is reeeitetl in error, atltlitiomtl rules are required to go\'ern trztnsniissitm.
`As an example, the sending Ll(.'\'i(:L’ eotlld transmit .~;e\'em] blocks and. in fact, eouitl
`be transmitting laloek H + 4 prior
`to receiving;
`2! negzttixre aeltnowletlgement
`concerning hloek H. Depending upon the protoeol‘s rules, the transmitting device
`could retrtmsmit bl0(.‘l< J‘? and all hloelts after that block or finish transmitting hloek
`srz —:— 4, then transmit block is and resutne trzinsmission with hloek '1'?-l‘ 5.
`
`Types of protocols
`
`_\'t)\\' that \\'t: h2I\'e exatminetl protocol tiishs. let us Focus 01.11‘ eitterition upon the
`cltmzteteristies. operettion and utili-/.ntion tll‘.\‘€\'t.'I'1ll
`types of protocols that provide 2!
`Dretletined 5l§_.‘,‘l‘I;‘(".]’I‘It3H.1.' for the ortlerl_\' L‘XL'l‘L':‘1l1,.‘1L‘ ot‘ information. To facilitate this
`exatnittzttion we will start with an o\'ei‘\'ie\=\' oi" one of the simplest protocols in use
`amcl Stl'I.ICTuI'e our o\'er\'ie\\' ol" p:'otoe.olt-2 with respect to their C0mplexit_\'.
`
`

`
`1.15 THE DATA LINK LAYER _
`
`—
`
`121
`
`Teletype DFOIOCOIS
`
`'I‘e1et_\.vpe and ii»_1et_\-pe compatible terminals support i'elati\-‘ely simple protocols
`used for conveying information. In general, a teletype protocol is a line-b}'—linc
`protocol that requires no acknowledggeinerit of line rec.eipt. Thus, the l<c_\-' elements
`of this protocol define how characters are displayed and when a line is terminated
`and the next line is to be displa_\-'ecl. Some additional elements included in line by
`line tele.t_vpc protocols actually are part of the terminal protocol. since they define
`how the terminal should respond to specific control characters.
`
`Teletype Model 33
`
`One commonly used teletype protocol is the Teletype“ .\-Iodel 33 data terminal.
`This terminal trainsmits and receives data asynchronotisly on a line b_\_-' line basis
`using a modified ASCII code in which lo“-'er~case character received by a :\'[odel
`33 are actually printed as their upper-case equivalent, a term known as ‘fold—over'
`printing, Although the ASCII code defines the operation of 32 control characters,
`only 11 control characters can be used for communications control purposes, Prior
`to examining the use of communications control characters in the telct_\-'pe
`protocol, let us first review the operational Function and typical use of each control
`character. These characters were previously listed in Table 1.11 with the two—
`character designator CC folloxx-'ing their meaning and will be reviewed in the order
`of their appearance in the referenced table.
`
`Communications control characters
`
`NUL
`
`The null (_\'-UL) character is a non-printable time dela_\-' or filler character. This
`character is primarily used for communicating with printing dex-"ices that require a
`defined period of time after each carriage return in which to reposition the
`printhead to the IJI’.-’.gi!'1I‘1iI‘1g of the next line. In the early days of PC communications
`many mainframe computers would he p1'ogi‘arnmed to prompt users to ‘Enter the
`number of nulls’; this is a mechariisrn to permit electromechanical terminal devices
`that require a delay to return the print head to the first position on the next line
`without obtaining garbled output.
`
`SOH
`
`The start of heading (S011) is a communications control character used in se\-'eral
`character-oriented protocols to define the beginning of a message heading data
`block. In synchronous transmission on a multipoint or multidrop line structure.
`the SOH is followed by an address which is checked by all devices on the common
`line to ascertain if they are the recipient of the data. In asynchronous transmission,
`the SOH character can be used to signal
`the beginning of a filename during
`multiple file transfers, permitting the transfer to occur without treating each file
`
`&
`‘
`
`\
`
`E
`
`-
`
`I
`I
`
`:-
`.
`ti
`';
`I
`
`_'
`
`-|-
`
`_|
`ll;
`
`~_
`
`.,
`
`
`
`H:
`ll
`
`
`
`

`
`122
`
`FUNDAMENTAL WlDE AREA NETWORKING CONCEPTS
`
`ti'miste1' as a separate communications session. Since asynchronous communica-
`tions t_vpicall_V in\-‘ohre point-to-point comrnunications, no address is required after
`the SO]-l character; ho\\-ever, both devices must have the same communications
`software program that permits multiple rile ti'ansle.i's in this manner.
`
`8 TX
`
`The start of text (STX) character signilies the end of heading data and the
`beginning of the actual
`information contained within the block. This commu-
`nications control character is used in the bis_\'nchronous protocol
`that will be
`examined later in this section.
`
`ETX
`
`the
`The end of text {ETX} character is used to inform the receiver that all
`information within the block has heen transmitted and normally terminates a block
`of data started with an STX or SOH. This character is also used to denote the
`
`beginning of the block check characters appended to a transmission hlock as an
`error detection t‘necl1anism. This communications control character is primarily
`
`used in the bisynchronous protocol and its receipt requires a status acknowl-
`eclgement, such as an .-'—\CI( or N.-'-\l(.
`
`EOT
`
`The end of transmission (l7.()'T) character defines the end ol‘ transmission of all
`data associated with a message transmitted to a device. If transmission occurs on a
`multidrop circuit the HUT also informs other devices on the line to check later
`transmissions for the occurrence of messages that could be addressed to them. The
`HOT is also used as a response to a poll \-when the polled station has nothing to
`sencl and as an ahort signal when the sender cannot continue transmission. In
`the X3-'I()DE.\"i protocol the l:I()'l.'
`is used to indicate the end of a file transfer
`operation.
`
`ENG
`
`'|'hc enquiry (Ti-NQ) communications control character is used in the bis}-‘nchro—
`nous protocol to request a response or status from the other station on a point to
`point line or to a specil'lcall_\' addressed station on a tnultidrop line. In response to
`the ENQ character, the receiving station tnay respond with the number of the last
`lziloclt of data it successl'ull_\' received. in a multidrop environment, the mairifrarne
`computer would poll each device on the line by addressing the ENQ to one
`particular station at a time. Each station would respond to the poll positixrely or
`negati\'el_\'. depending upon whether or not they had information to send to the
`rnainframe computer at that point in time.
`
`

`
`1.15 THE DATA LINK LAYER
`
`ACK and DLE
`
`123
`
`The acknovrledgenient (ACK) character is used to verify that a block of data was
`received correctly. After the receiver computes its own ‘internal' ehecksum or
`cyclic code and compares it to the one appended to the transmitted block, it will
`transmit
`the ACK character if the two ehecksums match.
`ln the Xl\*IODEi\-"l
`protocol the ACK character is used to inform the transmitter that the next block of
`data can be transmitted. ln the bis_\-nchronous protocol the data link escape (DLE)
`character is normally used in conjunction with the 0 and 1 characters in place of
`the .-'5\CK character. Alternating DIJEU and DLE1 as positive acknowledgement to
`each correctly received block of data eliminates the potential of a lost or garbled
`acknox-vledgemcnt resulting in the loss of data. In some literature, DLEU and
`DLEl are referred to as ACKU and ACKI.
`
`NAK
`
`is
`(NAK) communications control character
`The negative acknowledgement
`transmitted b_v a recei\-'in,:__I device to request the transmitting device to rt-transmit
`the previously sent data block. 'l‘l'1is character is transmitted when the receiver's
`internally generated checksum or c_\'c.liC code does not match the one transmitted,
`indicating that a transmission error has occurred. In the XN1ODl.CV'l protocol this
`character is used to inform the transmitting device that the receiver is read)-' to
`commence a File transfer operation as well as to inform the transmitter of any
`blocks of data received in error. In the bis)-'nchronous protocol. the ‘.\7.»"-\K is also
`used as a station-not—ready reply to an ENQ line bid or a station selection.
`
`SYN
`
`The synchronous idle (SYN) character is employed in the bis_vnehronous protocol
`to establish and then rnaintain line synchronization between the transmitter and
`receiver during periods when no data is transmitted on the line. \-Vhen a series of
`SYN characters is interrupted, this indicates to the receiver that a block of data is
`being transmitted.
`
`E TB
`
`The end of transmission block (RTE) character is used in the bisvnchronous
`protocol in place of an ETX character when data is transmitted in multiple blocks.
`This character then indicates the end of a particular block of transmitted data that
`commenced with an SOH or STX character. A block check character (BCC) is
`sent after an BT13. The receipt of an ETB is ’f(illo\=\'e(l by an acknowledgement by
`
`the receiving device, such as an ACK or .=\J.'—\K.
`
`Information flow
`
`Figure 1.70 illustrates in a time chart format the possible How of information
`between a teletype compatible terminal and a computer system employing a basic
`
`'-
`
`I
`I
`l
`
`_
`I
`ll"
`I
`
`I
`
`.
`
`‘
`
`_
`
`.
`
`'
`
`-
`-l
`
`,}
`
`I
`
`5
`
`1
`
`
`
`

`
`124
`
`FUNDAMENTAL WIDE AREA NETWORKING CONCEPTS
`
`Terminal
`
`Compufey
`
`Figure 1.70 Basic teletype protocol
`
`telct}-‘pt: protocol. In this pr(_)t(>t.‘0l the terminal opoi'2itoi' might tirst transmit the
`ENQ chnracster, which is formed lay pressing tht: shift and E keys SiFT‘lLIlt3nC(}|.1Sl}-'.
`If the call originated over the PS"l"N,
`the ELVQ (‘.l1{ll';1t_‘!.'€1‘,
`in effect.
`tells the
`computer to respond with its st-.1tL1s. Since the computer is beginning its st-:r\'it:ing
`of 21 new connection request, it normally responds with a log-on message. This log-
`on niess-age can contain one or more lines of data.
`l.?{.} is pl‘f3l'l.‘{(.‘(] with 21
`The first
`line of the log-on message shown in Pi,_c,rL1re
`(ta:-ria,_r__r,e return (CR) line feed (LIV) sequence, \\-'hi¢:h positions the pi'intht:ad to the
`first column on at maw line prior to printing the data in the rccci\'r:d log-on inessztge
`line. The !og—on inessage line, as well as all
`followiniz, lines transmitted by the
`computer", will have Li CR LF suffix, in eftlrtrt, preparing the terminal for the next
`line of data. Upon receipt of the log—on mt:s:sag'e the tormimil operator keys in his
`or her lo,t.:—or1 code, which is E!'ElI‘I5-iYT|l‘l'.‘El.2(l to the computer as data followed by the
`CR l.l*' sulilix \\'hit:l1 [e1'I'nil1:itL:s the line enti'_\-'.
`
`

`
`i
`
`‘I
`'
`
`.
`
`:
`i
`
`_l
`I
`I
`
`.
`
`-
`
`:
`I
`
`I
`
`'
`
`_
`
`0
`
`"
`
`_
`"
`
`I
`
`till
`ll
`'5
`l
`-
`
`I
`
`l l
`
`1.15 THE DATA LINK LAYER
`
`Variations
`
`125
`
`There are numerous variations to the p]'t:\-'i0I.lSl_\' discussed teletypewriter protocol,
`of which space permits mentioning only two.
`Some eornputers will not recognize an l_C.\‘-Q character on an asvnclironous
`.—\HCIl port. Those computers are normally programmed to respond to a sequence
`of two or more cat":-iage returns. Thus,
`the sequence ENQ LI" CR would be
`replaced by CR CR or CR CR (IR.
`\\-"ith the growth in popularity and use of personal computers as terminals, it was
`found that the time delay transmitted b_v computers in the form of null cliaracters
`to separate multiple lines of output from one another by time was not necessary.
`(_)i'i,;imill_v, the transmission of one line was separated through the use of NLII.
`characters by several character intervals from the next line. This separation was
`required to provide the electromechanical printer used on teletype terminals with a
`sulifieient amount of time to reposition its printhead from the end of one line to the
`l)i_'gil‘1I‘Ii1'i;;_ of the next line prior to reeeivin_r_{ the tirst character to be printed on the
`next line. Since a cursor on a video display can be repositioned almost instantly.
`the growth in the use of personal computers and video display terminals resulted in
`the rcrnoval oi‘ time delays between computer transmitted lines.
`'l‘odav, some computer software tlesignetl to service asynchronous terminals, as
`well as personal computers. will prompt
`the terminal operator with a message
`similar to: “I§N'l.‘lCR .\'l.TLl_.S (U T0 5)—“. This message provides the terminal
`operator with the abilitv to inform the computer whether he or she is using an
`eleetrtamt-chanical terminal. If (I is entered, the computer assumes the terminal has
`a Cl{"l" tlisplav and does not separate multiple lines transmitted from the computer
`by anything more than the sranclard CR L17 sequence. If a number greater than
`zero is entered, the computer separates multiple lines by the. use of the indicated
`number of null characters. The .\'L'L character, also called a PAD character, is
`considered to be a blank character which is discarded by the receiver. Thus,
`transmitting one. or more -.\'L'L characters between lines only serves to Phovide
`time for the. terminal's printh -ad to be repositioned to column 1 and has no effect
`upon the received data.
`lf you are accessing a computer system that assumes all
`users have CRT terminals or personal computers, more than lil<el_v the null
`message will not be displayed.
`friueh systems assume all users do not require a
`timing delay between transmitted lines and do not insert XUL characters between
`lines.
`
`Error control
`
`\\’h-at happens it" a line hit occurs during the transmission of data when a teletvpe
`protocol is used? L..'-nfortunatelv, the only error detection mechanisms emplo_ved by
`teletvpe terminals and computer ports that supports this protocol are parity
`t‘l‘Il.’t.'l<in}_{ and echople.\'.
`it may simply substitute and
`ll‘ parity checking is supported by the terminal,
`display a special error character received with a parity error. This places the.
`responsibility for error detection and correction upon the terminal operator, who
`must first visually observe the error and then request the computer to retransmit
`
`l
`'.
`i'
`
`,
`_
`
`I
`ii
`
`-
`
`
`
`

`
`126
`
`FUNDAMENTAL WIDE AREA NETWORKING CONCEPTS
`
`.‘5imilarl_v. echoplex requires the operator to
`the line containing the parity error.
`visuall_\' note that the echoed character differs front the character key just pressed.
`As previousl_v discussed in Section 1.11, the response of a computer to a parity
`error can range from no action to the generation of a special symbol to denote the
`occurrence of a parity error. In fact, most asynchronous line by line protocols do
`not check for parity errors. These protocols use echoplex, which as previously
`explained can result in a false indication of a transmission error or the appearance
`that all is well even though a transmitted character was received in error.
`
`X.-MODEM protocol
`
`\7\-"ard Christensen
`The X.\-"IOIJlii_\"l protocol which was originally developed b_\_-‘
`has been implemented into many asynchronous personal computer communica-
`tions software programs and is supported by a large number of bulletin boards.
`Figure l.?1 illustrates in a time chart format the use of the X3-'IODEJ\-"I protocol
`for a file transfer consisting of two blocks of data. As illustrated, under the
`X.\"lODEi\'[ protocol the receiving device transmits a negative acknowledgement
`(.\7AK) character to signal the transmitter that it is ready to receive data.
`The .‘{t\-"lODl:I.\-'l protocol
`is a ‘receiver-driven’ protocol
`in that the receiver
`transmits a cliaraeter as a signal for the transmitter to start its data transfer opera-
`tion. L-inder the .‘{1\-"IOl)I*IM protocol the receiver has a 10s timeout. It transmits a
`N.'—\}{ each time it times out; hence, if the software on the personal computer that is
`to transmit a File
`is not set up to do so a period of Ills can transpire until
`transmission actually starts. In response to the NAK the transmitter sends a start
`of header (HOE) communications control character followed by two characters
`that represent the block number and the one’s complement of the block number.
`The block number used in the X.\'IODE.\-I protocol starts at 0'1, increments by
`'l_. and wraps from a maximum value of OFFI-I to UUH and not to 011-1. The one’s
`complement is obtained b_v sttbtraeting the block number from 255. Next a '128~
`character data block is transmitted which in turn is followed by the checksum
`eha 'acter. As previously discussed in Section 1.11, the cheeksum is computed by
`first adding the ASCII values of each of the characters in the l28—eharacter block
`and dividing the sum b_v 255. Next. the quotient is discarded and the remainder is
`retained as the I’.Tl‘t{.‘¢..‘l(SLII'|'l.
`
`If the data blocks are damaged during transmission, the receiver can detect the
`ocettrrence of an error in one of three \va_\'s. If the start of header is darnaged, it will
`be detected b_v the receiver and the data block will be neg-ati\‘el_v acknowledged. lf
`either the block count or the one's complement field are damaged, they will not be
`the one's complement of each other.
`l7inall_\',
`the receiver will compute its own
`cheeltsum and compare it to the transmitted checksum. If the ehecksums do not
`match this is also an indicator that the transmitted block was received in error.
`
`Each of the preceding situations results in the block being considered to have
`been received in error. Then the receiving station will transmit a t\'AI( character
`which serves as a request to the. transmitting station to retransmit the previously
`transmitted block. As illustrated in Fi_quI'e 1.71, a line hit occurring during" the
`transmission of the second block resulted in the receiver transmitting a .\lAl{ and
`
`

`
`1.15 THE DATQ LINK LAYER
`
`Rece,,,,ng
`computer
`
`127
`
`Transmitting
`C0"”P1-"9"
`
`Time
`
`___
`
`5
`
`E—
`
`-1-
`
`X
`
`Z:
`
`..
`
`Figure 1.71 XMODEM protocol file transfer operation
`
`the transmitting device resending the second block. Suppose more line hits occur
`\\'l1icl1 affects the retransmission of the second block.
`[.'-nder the X_\-lODE.\-"I
`protocol the retransrnissions process will be repeated until the hloek is correctly
`
`receix-‘edoruntiltenretransmissionattemptsoccur.If,owingtoathunderstormor
`
`other disturhance. line noise is a problem, after [0 attempts to retransmit a hlock
`the file transfer process will he aborted. This will require :1 manual operator
`intervention to restart
`the file transfer at
`the beginning and is one of many
`tleficieticitrs of the Xl\-'lOI)l€3-"I
`protocol. Other deficiencies of the X.\'lODE'i\-"I
`protocol
`include its
`relatix-'el_\-' small block size,
`its half—duple-2:
`transmission
`scheme, and its use of the checksum that provides a less reliable error detection
`cap-al)ilit_\-' in comparison to the ri

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket