The Gateway to Computer Science Excellence
First time here? Checkout the FAQ!
x
+4 votes
2k views

i am understanding Character stuffing from an online resource !! 

It says " 

sing the special character of <DEL> and <STX> and <ETX> for start/end framing, the message: 

AB<DEL>C<STX><ETX>DE 

would be sent as (stuffed characters are underlined):

<STX>AB<DEL><DEL>C<DEL><STX><DEL><ETX>DE<ETX>...<STX>


but they state that the problem with this method is 

" We can't use this method in situation like this when message is 

<DEL><STX>A<DEL><ETX> 



why we can't do that ?? 

converting this <DEL><STX>A<DEL><ETX> to our codeword will give output something like this 

<STX><DEL><DEL><DEL><STX>A<DEL><DEL><DEL><ETX><ETX> 

where receiver will loose the sync ??

asked in Computer Networks by (69 points) | 2k views

1 Answer

0 votes

Character stuffing

Same idea as bit-stuffing, but operates on bytes instead of bits.

Use reserved characters to indicate the start and end of a frame. For instance, use the two-character sequence DLE STX (Data-Link Escape, Start of TeXt) to signal the beginning of a frame, and the sequence DLE ETX (End of TeXt) to flag the frame's end.

Problem: What happens if the two-character sequence DLE ETX happens to appear in the frame itself?

Solution: Use character stuffing; within the frame, replace every occurrence of DLE with the two-character sequence DLE DLE. The receiver reverses the processes, replacing every occurrence of DLE DLE with a single DLE.

Example: If the frame contained ``A B DLE D E DLE'', the characters transmitted over the channel would be ``DLE STX A B DLE DLE D E DLE DLE DLE ETX''.

Disadvantage: character is the smallest unit that can be operated on; not all architectures are byte oriented.

answered by Boss (22.6k points)

Related questions

0 votes
0 answers
3
asked Oct 2, 2017 in Computer Networks by atul_21 Active (3.8k points) | 73 views
+1 vote
4 answers
4
asked Oct 1, 2017 in Computer Networks by Ashwani Kumar 2 Boss (14.9k points) | 123 views
0 votes
1 answer
5
asked Sep 24, 2017 in Computer Networks by shefali1 Active (2.1k points) | 136 views
+9 votes
2 answers
6
asked Sep 20, 2017 in Computer Networks by junaid ahmad Loyal (9.4k points) | 335 views
+1 vote
1 answer
7
Quick search syntax
tags tag:apple
author user:martin
title title:apple
content content:apple
exclude -tag:apple
force match +apple
views views:100
score score:10
answers answers:2
is accepted isaccepted:true
is closed isclosed:true
47,935 questions
52,336 answers
182,393 comments
67,819 users