Logo

Navigation
  • Home
  • Services
    • ERP Solutions
    • Implementation Solutions
    • Support and Maintenance Solutions
    • Custom Solutions
    • Upgrade Solutions
    • Training and Mentoring
    • Web Solutions
    • Production Support
    • Architecture Designing
    • Independent Validation and Testing Services
    • Infrastructure Management
  • Expertise
    • Microsoft Development Expertise
    • Mobile Development
    • SQL Server Database and BI
    • SAP BI, SAP Hana, SAP BO
    • Oracle and BI
    • Oracle RAC
  • Technical Training
    • Learn Data Management
      • Business Intelligence
      • Data Mining
      • Data Modeling
      • Data Warehousing
      • Disaster Recovery
    • Learn Concepts
      • Application Development
      • Client Server
      • Cloud Computing Tutorials
      • Cluster Computing
      • CRM Tutorial
      • EDI Tutorials
      • ERP Tutorials
      • NLP
      • OOPS
      • Concepts
      • SOA Tutorial
      • Supply Chain
      • Technology Trends
      • UML
      • Virtualization
      • Web 2.0
    • Learn Java
      • JavaScript Tutorial
      • JSP Tutorials
      • J2EE
    • Learn Microsoft
      • MSAS
      • ASP.NET
      • ASP.NET 2.0
      • C Sharp
      • MS Project Training
      • Silverlight
      • SQL Server 2005
      • VB.NET 2005
    • Learn Networking
      • Networking
      • Wireless
    • Learn Oracle
      • Oracle 10g
      • PL/SQL
      • Oracle 11g Tutorials
      • Oracle 9i
      • Oracle Apps
    • Learn Programming
      • Ajax Tutorial
      • C Language
      • C++ Tutorials
      • CSS Tutorial
      • CSS3 Tutorial
      • JavaScript Tutorial
      • jQuery Tutorial
      • MainFrame
      • PHP Tutorial
      • VBScript Tutorial
      • XML Tutorial
    • Learn Software Testing
      • Software Testing Types
      • SQA
      • Testing
  • Career Training
    • Career Improvement
      • Career Articles
      • Certification Articles
      • Conflict Management
      • Core Skills
      • Decision Making
      • Entrepreneurship
      • Goal Setting
      • Life Skills
      • Performance Development
      • Personal Excellence
      • Personality Development
      • Problem Solving
      • Relationship Management
      • Self Confidence
      • Self Supervision
      • Social Networking
      • Strategic Planning
      • Time Management
    • Education Help
      • Career Tracks
      • Essay Writing
      • Internship Tips
      • Online Education
      • Scholarships
      • Student Loans
    • Managerial Skills
      • Business Communication
      • Business Networking
      • Facilitator Skills
      • Managing Change
      • Marketing Management
      • Meeting Management
      • Process Management
      • Project Management
      • Project Management Life Cycle
      • Project Management Process
      • Project Risk Management
      • Relationship Management
      • Task Management
      • Team Building
      • Virtual Team Management
    • Essential Life Skills
      • Anger Management
      • Anxiety Management
      • Attitude Development
      • Coaching and Mentoring
      • Emotional Intelligence
      • Stress Management
      • Positive Thinking
    • Communication Skills
      • Conversation Skills
      • Cross Culture Competence
      • English Vocabulary
      • Listening Skills
      • Public Speaking Skills
      • Questioning Skills
    • Soft Skills
      • Assertive Skills
      • Influence Skills
      • Leadership Skills
      • Memory Skills
      • People Skills
      • Presentation Skills
    • Finding a Job
      • Etiquette Tips
      • Group Discussions
      • HR Interviews
      • Interview Notes
      • Job Search Tips
      • Resume Tips
      • Sample Resumes
 

Synchronous Data Link Control (SDLC)

By Exforsys | on March 13, 2008 |
Networking

Synchronous Data Link Control (SDLC)

The SDLC or the Synchronous Data Link Control was first developed by IBM. It is basically a linked layer protocol which can be used with systems network architecture or the SNA environment. In this system all the functions in a network can be defined and slotted into layers. There are different types of layers and each of these layers has its own functionality which is some what similar to the OSI layers.

For example the data is transferred without errors form the Data Link Control layer to the Network Addressable Units or the NAU’s using the SDLC or the synchronous data link control protocol. There are physical control layers and logical layers.

Data progresses from the higher layers to the lower layers and is eventually transferred to the communication ports. Here the basic ingredient is the SDLC which is important in the entire layering and data transfer process as it is the primary protocol that is being used.

SDLC Protocols and Topologies

The SDLC protocol supports a vast variety of topologies and types of data links. Like for example point to point links, multi links, switched networks and packet networks and many more. The SDLC protocol simplifies the data control process into a basic pattern.

There are two types of networks identified by the SDLC, the primary node and the secondary node.

The primary node is responsible for handling all the secondary nodes and controls all the links. The secondary nodes actually send all the data that is received to the primary node. Data is processed only through the primary node.

However there are some basic configurations that are followed by these nodes like

Point to Point in which there are only two nodes, one is the primary and the other is the secondary.

Multipoint where there is one primary node and the remaining are all secondary nodes.

Loop nodes where the first node which is the primary is connected to the secondary nodes and has two nodes on either side.

SDLC Features

There are many features that contribute to the functionality of the SDLC frame work.

• Flag: The flag feature is used by the SDLC format to initiate and terminate the errors by keeping them under a check.

• Address: The SDLC address feature helps identify if the frames are being received from the primary or the secondary because it contains information of group address, specific address, broadcast address and so on.

• Controls: There are three different formats followed by the controls feature, Information Frame, Supervisory Frame and Unnumbered Frame.

• Information Frame Controls: Information Frame controls the sequence in which the frames are being sent and number the frames. By doing this it can keep a tab on which was received first and which needs to be processed first. The primary and the secondary communicate with each other to check on the immediate responses.

• Supervisory Frame: Supervisor Frame provides information about the control; however it does not contain an information field. It also acknowledges and sends receipts when it receives an information frame.

• Unnumbered Frames: Unnumbered Frames are not in sequence and contain no numbers. These frames can be used to initialize the secondary frames.

• The Data feature contains information of the path and exchange, identification and so on. It basically condenses all the information related to the data.

Conclusion

The SDLC can be used in a remote site or a local site. For example it can be used to connect a token ring network to the SNA or the systems network architecture backbone using a 56kbps line based on SDLC.

« « SQA Principles
Switched Multi Megabit Data Service (SMDS) » »

Author Description

Avatar

Editorial Team at Exforsys is a team of IT Consulting and Training team led by Chandra Vennapoosa.

Free Training

RSSSubscribe 392 Followers
  • Popular
  • Recent
  • How to Effectively Protect Your System

    November 28, 2011 - 0 Comment
  • Virtual Private Network (VPN)

    February 28, 2008 - 0 Comment
  • IPv6

    March 20, 2008 - 0 Comment
  • Data Protection Protocols

    November 30, 2011 - 0 Comment
  • Mesh Topology

    March 2, 2008 - 0 Comment
  • High Level Data Link Control (HDLC)

    March 29, 2008 - 0 Comment
  • How to use Hashes to Ensure Integrity

    November 30, 2011 - 0 Comment
  • Star Topology

    March 2, 2008 - 0 Comment
  • Asynchronous Transfer Mode (ATM) Switching

    February 13, 2008 - 0 Comment
  • Tree Topology

    March 4, 2008 - 0 Comment
  • How to use Hashes to Ensure Integrity

    November 30, 2011 - 0 Comment
  • Data Protection Protocols

    November 30, 2011 - 0 Comment
  • How to Effectively Protect Your System

    November 28, 2011 - 0 Comment
  • Network Security Firewall and Architecture

    November 26, 2011 - 0 Comment
  • Preventing Network Intrusion

    November 24, 2011 - 0 Comment
  • Creating and Developing Security Policies

    November 23, 2011 - 0 Comment
  • Linux Thin Client Networks Design and Deployment

    October 2, 2009 - 0 Comment
  • High Level Data Link Control (HDLC)

    March 29, 2008 - 0 Comment
  • IPv6

    March 20, 2008 - 0 Comment
  • High-Speed Serial Interface (HSSI)

    March 20, 2008 - 0 Comment

Exforsys e-Newsletter

ebook
 

Related Articles

  • How to use Hashes to Ensure Integrity
  • Data Protection Protocols
  • How to Effectively Protect Your System
  • Network Security Firewall and Architecture
  • Preventing Network Intrusion

Latest Articles

  • Project Management Techniques
  • Product Development Best Practices
  • Importance of Quality Data Management
  • How to Maximize Quality Assurance
  • Utilizing Effective Quality Assurance Strategies
  • Sitemap
  • Privacy Policy
  • DMCA
  • Trademark Information
  • Contact Us
© 2023. All Rights Reserved.IT Training and Consulting
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.AcceptReject Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT