22:
253:
172:
technique is used to prevent the receiver from detecting the special flag byte in user data e.g. whenever the sender's data link layer encounters 5 consecutive 1 (one) in the data, it automatically stuffs 0 into the outgoing
294:
39:
318:
217:
105:
86:
58:
323:
65:
43:
72:
287:
313:
54:
123:
32:
280:
183:
147:
79:
204:
213:
260:
127:
264:
307:
169:
165:
Each frame begins and ends with a special bit pattern 01111110, called a flag byte.
155:
143:
238:
21:
151:
139:
252:
161:
Synchronous framing High-Level Data Link
Control may work like this:
135:
15:
154:
regardless of frame contents. It can also be stated as "
268:
206:
46:. Unsourced material may be challenged and removed.
146:are defined in terms of bit sequences instead of
288:
8:
212:. IEEE Computer Society Press. p. 67.
295:
281:
239:Linktionary page for bit-oriented protocol
106:Learn how and when to remove this message
195:
150:. Bit oriented protocol can transfer
7:
249:
247:
44:adding citations to reliable sources
14:
251:
20:
31:needs additional citations for
1:
267:. You can help Knowledge by
319:Telecommunication protocols
203:Lam, Simon S., ed. (1984).
340:
246:
126:that sees the transmitted
124:communications protocol
55:"Bit-oriented protocol"
324:Computer science stubs
184:Byte-oriented protocol
120:bit-oriented protocol
40:improve this article
314:Data transmission
276:
275:
116:
115:
108:
90:
331:
297:
290:
283:
261:computer science
255:
248:
231:
230:
228:
226:
211:
200:
111:
104:
100:
97:
91:
89:
48:
24:
16:
339:
338:
334:
333:
332:
330:
329:
328:
304:
303:
302:
301:
244:
235:
234:
224:
222:
220:
209:
202:
201:
197:
192:
180:
112:
101:
95:
92:
49:
47:
37:
25:
12:
11:
5:
337:
335:
327:
326:
321:
316:
306:
305:
300:
299:
292:
285:
277:
274:
273:
256:
242:
241:
233:
232:
218:
194:
193:
191:
188:
187:
186:
179:
176:
175:
174:
166:
142:, or meaning.
114:
113:
28:
26:
19:
13:
10:
9:
6:
4:
3:
2:
336:
325:
322:
320:
317:
315:
312:
311:
309:
298:
293:
291:
286:
284:
279:
278:
272:
270:
266:
263:article is a
262:
257:
254:
250:
245:
240:
237:
236:
221:
219:0-8186-0582-0
215:
208:
207:
199:
196:
189:
185:
182:
181:
177:
171:
167:
164:
163:
162:
159:
157:
153:
149:
145:
144:Control codes
141:
137:
133:
129:
125:
121:
110:
107:
99:
96:February 2024
88:
85:
81:
78:
74:
71:
67:
64:
60:
57: –
56:
52:
51:Find sources:
45:
41:
35:
34:
29:This article
27:
23:
18:
17:
269:expanding it
258:
243:
225:February 11,
223:. Retrieved
205:
198:
170:bit stuffing
160:
156:bit stuffing
131:
119:
117:
102:
93:
83:
76:
69:
62:
50:
38:Please help
33:verification
30:
152:data frames
308:Categories
190:References
148:characters
134:stream of
66:newspapers
140:semantics
178:See also
138:with no
173:stream.
80:scholar
216:
132:opaque
130:as an
82:
75:
68:
61:
53:
259:This
210:(PDF)
122:is a
87:JSTOR
73:books
265:stub
227:2024
214:ISBN
136:bits
128:data
59:news
158:".
42:by
310::
168:A
118:A
296:e
289:t
282:v
271:.
229:.
109:)
103:(
98:)
94:(
84:·
77:·
70:·
63:·
36:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.