Logo

Navigation
  • Home
  • Services
    • ERP Solutions
    • Implementation Solutions
    • Support and Maintenance Solutions
    • Custom Solutions
    • Upgrade Solutions
    • Training and Mentoring
    • Web Solutions
    • Production Support
    • Architecture Designing
    • Independent Validation and Testing Services
    • Infrastructure Management
  • Expertise
    • Microsoft Development Expertise
    • Mobile Development
    • SQL Server Database and BI
    • SAP BI, SAP Hana, SAP BO
    • Oracle and BI
    • Oracle RAC
  • Technical Training
    • Learn Data Management
      • Business Intelligence
      • Data Mining
      • Data Modeling
      • Data Warehousing
      • Disaster Recovery
    • Learn Concepts
      • Application Development
      • Client Server
      • Cloud Computing Tutorials
      • Cluster Computing
      • CRM Tutorial
      • EDI Tutorials
      • ERP Tutorials
      • NLP
      • OOPS
      • Concepts
      • SOA Tutorial
      • Supply Chain
      • Technology Trends
      • UML
      • Virtualization
      • Web 2.0
    • Learn Java
      • JavaScript Tutorial
      • JSP Tutorials
      • J2EE
    • Learn Microsoft
      • MSAS
      • ASP.NET
      • ASP.NET 2.0
      • C Sharp
      • MS Project Training
      • Silverlight
      • SQL Server 2005
      • VB.NET 2005
    • Learn Networking
      • Networking
      • Wireless
    • Learn Oracle
      • Oracle 10g
      • PL/SQL
      • Oracle 11g Tutorials
      • Oracle 9i
      • Oracle Apps
    • Learn Programming
      • Ajax Tutorial
      • C Language
      • C++ Tutorials
      • CSS Tutorial
      • CSS3 Tutorial
      • JavaScript Tutorial
      • jQuery Tutorial
      • MainFrame
      • PHP Tutorial
      • VBScript Tutorial
      • XML Tutorial
    • Learn Software Testing
      • Software Testing Types
      • SQA
      • Testing
  • Career Training
    • Career Improvement
      • Career Articles
      • Certification Articles
      • Conflict Management
      • Core Skills
      • Decision Making
      • Entrepreneurship
      • Goal Setting
      • Life Skills
      • Performance Development
      • Personal Excellence
      • Personality Development
      • Problem Solving
      • Relationship Management
      • Self Confidence
      • Self Supervision
      • Social Networking
      • Strategic Planning
      • Time Management
    • Education Help
      • Career Tracks
      • Essay Writing
      • Internship Tips
      • Online Education
      • Scholarships
      • Student Loans
    • Managerial Skills
      • Business Communication
      • Business Networking
      • Facilitator Skills
      • Managing Change
      • Marketing Management
      • Meeting Management
      • Process Management
      • Project Management
      • Project Management Life Cycle
      • Project Management Process
      • Project Risk Management
      • Relationship Management
      • Task Management
      • Team Building
      • Virtual Team Management
    • Essential Life Skills
      • Anger Management
      • Anxiety Management
      • Attitude Development
      • Coaching and Mentoring
      • Emotional Intelligence
      • Stress Management
      • Positive Thinking
    • Communication Skills
      • Conversation Skills
      • Cross Culture Competence
      • English Vocabulary
      • Listening Skills
      • Public Speaking Skills
      • Questioning Skills
    • Soft Skills
      • Assertive Skills
      • Influence Skills
      • Leadership Skills
      • Memory Skills
      • People Skills
      • Presentation Skills
    • Finding a Job
      • Etiquette Tips
      • Group Discussions
      • HR Interviews
      • Interview Notes
      • Job Search Tips
      • Resume Tips
      • Sample Resumes
 

High Level Data Link Control (HDLC)

By Exforsys | on March 29, 2008 |
Networking

High Level Data Link Control (HDLC)

The High Level Data Link Control protocol was developed by the International Organization for Standardization (ISO).  It is used for switched and non-switched networks and is a bit oriented architecture. The High Level Data Link Control has been accepted and used widely because it supports almost all kinds of functionalities like half duplex, full duplex, point to point and multi-point networks. The bit patterns are standard in HDLC and therefore the information exchanged follows the same pattern. This minimizes the chances of any errors.

HDLC Features

The main features of HDLC are divided into various aspects
• The modes for operation
• Stations
• Configuration
• Frames and Structures
• The subsets of HDLC

HDLC Stations and Configurations

The HDLC has three levels of stations, the primary station, secondary station and the combined station.

The primary station is responsible for controlling all the other secondary stations for a network that uses the HDLC protocol. The primary station also takes care of the error control aspect and organizes the data flow on the links.

The secondary station is controlled by the primary station and is activated when the primary station sends a request.

The combined station controls the links and overlooks the primary and the secondary stations functions. The combined stations have complete control over the links and do not need the authorization of any other station.

These stations are further dependant on the configuration types and basically follow three different types of configuration.

Unbalanced Configuration: In an unbalanced configuration there is one primary station and the remaining stations are all secondary stations that are controlled by the primary station. Unbalanced configuration supports many types of operations like half duplex, full duplex, point to point configuration and multi point configuration.

Balanced Configuration: In a balanced configuration there are two or more combined configurations however there are limitations when it comes to the balanced configurations since it can use only specific configurations like the half and full duplex operations or point to point network configurations.

Symmetrical Configuration: The symmetrical configuration is a combination of balanced and unbalanced configurations and is rarely used in current day technology. In this type of configuration each station in the network has two kinds of status; one is primary and the secondary status.

There are several modes of operation for the above configurations in the HDLC.

Normal Response Mode (NRM): The Normal Response Mode is used only with the unbalanced configurations. The primary station usually requests information from the secondary station and only then the secondary station initiates the data transfer. The response is transferred after the primary station authorizes the transaction.

This procedure is followed for each and every frame that is being transferred. After the last frame is sent or transferred then the procedure sets back itself to zero where the entire gamut of taking permission is repeated for the next set of frames.

Asynchronous Response Mode (ARM): The ARM can be used with balanced or combined configuration as it does not need any authorization from the primary station to start transferring the frames from the secondary station. It reduced the time overheads while transferring the frames and since the permissions are not required.

Asynchronous Balanced Mode (ABM): The asynchronous balanced mode is not very different from the asynchronous response mode. Even this mode does not require permissions from the primary station in order to transfer data or frames from the secondary station. The ABM mode is better for multi point nodes whereas the ARM is better for the point to point nodes. However this mode is not being widely used in modern day technology.

« « Business Intelligence Overview
Business Intelligence History » »

Author Description

Avatar

Editorial Team at Exforsys is a team of IT Consulting and Training team led by Chandra Vennapoosa.

Free Training

RSSSubscribe 392 Followers
  • Popular
  • Recent
  • Point to Point Protocol (PPP)

    March 6, 2008 - 0 Comment
  • Linux Thin Client Networks Design and Deployment

    October 2, 2009 - 0 Comment
  • Network Topology

    February 25, 2008 - 0 Comment
  • Synchronous Data Link Control (SDLC)

    March 13, 2008 - 0 Comment
  • Creating and Developing Security Policies

    November 23, 2011 - 0 Comment
  • Home Networking

    February 25, 2008 - 0 Comment
  • Switched Multi Megabit Data Service (SMDS)

    March 13, 2008 - 0 Comment
  • Preventing Network Intrusion

    November 24, 2011 - 0 Comment
  • Web Server

    February 26, 2008 - 0 Comment
  • Subnetting

    March 17, 2008 - 0 Comment
  • How to use Hashes to Ensure Integrity

    November 30, 2011 - 0 Comment
  • Data Protection Protocols

    November 30, 2011 - 0 Comment
  • How to Effectively Protect Your System

    November 28, 2011 - 0 Comment
  • Network Security Firewall and Architecture

    November 26, 2011 - 0 Comment
  • Preventing Network Intrusion

    November 24, 2011 - 0 Comment
  • Creating and Developing Security Policies

    November 23, 2011 - 0 Comment
  • Linux Thin Client Networks Design and Deployment

    October 2, 2009 - 0 Comment
  • IPv6

    March 20, 2008 - 0 Comment
  • High-Speed Serial Interface (HSSI)

    March 20, 2008 - 0 Comment
  • Frame Relay

    March 17, 2008 - 0 Comment

Exforsys e-Newsletter

ebook
 

Related Articles

  • How to use Hashes to Ensure Integrity
  • Data Protection Protocols
  • How to Effectively Protect Your System
  • Network Security Firewall and Architecture
  • Preventing Network Intrusion

Latest Articles

  • Project Management Techniques
  • Product Development Best Practices
  • Importance of Quality Data Management
  • How to Maximize Quality Assurance
  • Utilizing Effective Quality Assurance Strategies
  • Sitemap
  • Privacy Policy
  • DMCA
  • Trademark Information
  • Contact Us
© 2023. All Rights Reserved.IT Training and Consulting
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.AcceptReject Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT