Knowledge

Bit-oriented protocol

Source 📝

22: 253: 172:
technique is used to prevent the receiver from detecting the special flag byte in user data e.g. whenever the sender's data link layer encounters 5 consecutive 1 (one) in the data, it automatically stuffs 0 into the outgoing
294: 39: 318: 217: 105: 86: 58: 323: 65: 43: 72: 287: 313: 54: 123: 32: 280: 183: 147: 79: 204: 213: 260: 127: 264: 307: 169: 165:
Each frame begins and ends with a special bit pattern 01111110, called a flag byte.
155: 143: 238: 21: 151: 139: 252: 161:
Synchronous framing High-Level Data Link Control may work like this:
135: 15: 154:
regardless of frame contents. It can also be stated as "
268: 206:
Principles of Communication and Networking Protocols,
46:. Unsourced material may be challenged and removed. 146:are defined in terms of bit sequences instead of 288: 8: 212:. IEEE Computer Society Press. p. 67. 295: 281: 239:Linktionary page for bit-oriented protocol 106:Learn how and when to remove this message 195: 150:. Bit oriented protocol can transfer 7: 249: 247: 44:adding citations to reliable sources 14: 251: 20: 31:needs additional citations for 1: 267:. You can help Knowledge by 319:Telecommunication protocols 203:Lam, Simon S., ed. (1984). 340: 246: 126:that sees the transmitted 124:communications protocol 55:"Bit-oriented protocol" 324:Computer science stubs 184:Byte-oriented protocol 120:bit-oriented protocol 40:improve this article 314:Data transmission 276: 275: 116: 115: 108: 90: 331: 297: 290: 283: 261:computer science 255: 248: 231: 230: 228: 226: 211: 200: 111: 104: 100: 97: 91: 89: 48: 24: 16: 339: 338: 334: 333: 332: 330: 329: 328: 304: 303: 302: 301: 244: 235: 234: 224: 222: 220: 209: 202: 201: 197: 192: 180: 112: 101: 95: 92: 49: 47: 37: 25: 12: 11: 5: 337: 335: 327: 326: 321: 316: 306: 305: 300: 299: 292: 285: 277: 274: 273: 256: 242: 241: 233: 232: 218: 194: 193: 191: 188: 187: 186: 179: 176: 175: 174: 166: 142:, or meaning. 114: 113: 28: 26: 19: 13: 10: 9: 6: 4: 3: 2: 336: 325: 322: 320: 317: 315: 312: 311: 309: 298: 293: 291: 286: 284: 279: 278: 272: 270: 266: 263:article is a 262: 257: 254: 250: 245: 240: 237: 236: 221: 219:0-8186-0582-0 215: 208: 207: 199: 196: 189: 185: 182: 181: 177: 171: 167: 164: 163: 162: 159: 157: 153: 149: 145: 144:Control codes 141: 137: 133: 129: 125: 121: 110: 107: 99: 96:February 2024 88: 85: 81: 78: 74: 71: 67: 64: 60: 57: –  56: 52: 51:Find sources: 45: 41: 35: 34: 29:This article 27: 23: 18: 17: 269:expanding it 258: 243: 225:February 11, 223:. Retrieved 205: 198: 170:bit stuffing 160: 156:bit stuffing 131: 119: 117: 102: 93: 83: 76: 69: 62: 50: 38:Please help 33:verification 30: 152:data frames 308:Categories 190:References 148:characters 134:stream of 66:newspapers 140:semantics 178:See also 138:with no 173:stream. 80:scholar 216:  132:opaque 130:as an 82:  75:  68:  61:  53:  259:This 210:(PDF) 122:is a 87:JSTOR 73:books 265:stub 227:2024 214:ISBN 136:bits 128:data 59:news 158:". 42:by 310:: 168:A 118:A 296:e 289:t 282:v 271:. 229:. 109:) 103:( 98:) 94:( 84:· 77:· 70:· 63:· 36:.

Index


verification
improve this article
adding citations to reliable sources
"Bit-oriented protocol"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
communications protocol
data
bits
semantics
Control codes
characters
data frames
bit stuffing
bit stuffing
Byte-oriented protocol
Principles of Communication and Networking Protocols,
ISBN
0-8186-0582-0
Linktionary page for bit-oriented protocol
Stub icon
computer science
stub
expanding it
v

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.