Link Access Procedure Balanced (LAPB) Frame Types Last Updated : 11 Aug, 2020 Comments Improve Suggest changes Like Article Like Report Link Access Procedure, Balanced (LAPB) is protocol that is usually required for data link layer. It is version of High-Level Data Link Control (HDLC) in Asynchronous Balanced Mode (ABM). LAPB use of P/F bit is somewhere different from all of the other protocols. LAPB basically uses three types of data frames. Each of these frames has different functions and purposes. These three types of frames are given below : 1. I-Frames : These frames are generally known as Information frames. It is basically used to carry information or data of upper layer. It includes two different sequence numbers i.e. N (S) that is used to send sequence number and N (R) that is used to receive sequence number which is the expected value of what N (S) will usually take in the next I-frame that is going to be received. This frame also includes X.25 PLP Packets and is always commands. 2. S-Fames : These frames are generally known as Supervisory frames. It is used to provide control information. This frame only includes N (R). Using S-frame, there basically three different types of messages that are sent. S-frame usually controls data flow with RR, RNR, and REJ Frames. Receive Ready (RR) - RR is used to acknowledge current frames that are being received and also indicates which of frame is expected to be next. This frame can be either command or response out of which response RR’s are required to acknowledge data frames that are being received and also in reply to command RR’s. On the other hand, Command RR’s are required when force response from peer and are also basically required when link is idle simply to check whether it is still active or not. Reject (REJ) - REJ is used to reject signals of frame usually by receiver. This is basically required when I-frames are received with unexpected sequence number. Unexpected sequence numbers simply indicate to peer that I-frames are required to be transmitted again or retransmitted. Receive Not Ready (RNR) - RNR is used for control of data flow and also required to indicate that receiver is not at all ready to receive any data that is extra or additional and transmitter has to wait anyhow until receiving ready message is sent or transmitted. These are usually transmitted or transferred when local end of link is temporarily not been able or ready to receive any further information frames. 2. U-Frames : These frames are generally known as Unnumbered frames. It is used to provide unsequenced control information. This frame does not include any type of sequence numbers at all. It is also required for link setup, disconnection of link, and error reporting. It is basically required to establish or develop and maintain or handle communication with SABM, UA, DISC, DM, and FRMR. Disconnect (DISC) - This command usually disconnects or terminates link or connection. Set Asynchronous Balanced Mode (SABM) - It is used to develop DTE and DCE link in Normal i.e. basic mode (modulo 8) sequence numbers. It is needed to be acknowledged by UA Frame so that link gets to enter information or data transfer. Unnumbered Acknowledgment (UA) - It is basically transmitted in response to SABM frame simply to set link to information transfer. Disconnected Mode (DM) - This is basically response frame. It is being transmitted or transferred in response to command frames in disconnected phase when link is not ready to enter information transfer. Frame Reject (FRMR) - It basically reports an error condition. It is also response frame that is being transmitted whenever any error occurs that might be resolved by resetting data link. Comment More infoAdvertise with us Next Article Link Access Procedure Balanced (LAPB) Frame Types madhurihammad Follow Improve Article Tags : Computer Networks Data Link Layer Similar Reads What is OSI Model? - Layers of OSI Model The OSI (Open Systems Interconnection) Model is a set of rules that explains how different computer systems communicate over a network. OSI Model was developed by the International Organization for Standardization (ISO). The OSI Model consists of 7 layers and each layer has specific functions and re 13 min read TCP/IP Model The TCP/IP model (Transmission Control Protocol/Internet Protocol) is a four-layer networking framework that enables reliable communication between devices over interconnected networks. It provides a standardized set of protocols for transmitting data across interconnected networks, ensuring efficie 7 min read Types of Network Topology Network topology refers to the arrangement of different elements like nodes, links, or devices in a computer network. Common types of network topology include bus, star, ring, mesh, and tree topologies, each with its advantages and disadvantages. In this article, we will discuss different types of n 12 min read Computer Network Tutorial A Computer Network is a system where two or more devices are linked together to share data, resources and information. These networks can range from simple setups, like connecting two devices in your home, to massive global systems, like the Internet. Below are the main components of a computer netw 7 min read Basics of Computer Networking A computer network is a collection of interconnected devices that share resources and information. These devices can include computers, servers, printers, and other hardware. Networks allow for the efficient exchange of data, enabling various applications such as email, file sharing, and internet br 14 min read Difference Between IPv4 and IPv6 In the digital world, where billions of devices connect and communicate, Internet Protocol (IP) Addresses play a crucial role. These addresses are what allow devices to identify and locate each other on a network.To know all about IP Addresses - refer to What is an IP Address?Currently, there are tw 9 min read Domain Name System (DNS) DNS is a hierarchical and distributed naming system that translates domain names into IP addresses. When you type a domain name like www.geeksforgeeks.org into your browser, DNS ensures that the request reaches the correct server by resolving the domain to its corresponding IP address.Without DNS, w 8 min read RSA Algorithm in Cryptography RSA(Rivest-Shamir-Adleman) Algorithm is an asymmetric or public-key cryptography algorithm which means it works on two different keys: Public Key and Private Key. The Public Key is used for encryption and is known to everyone, while the Private Key is used for decryption and must be kept secret by t 13 min read Types of Computer Networks A computer network is a system that connects many independent computers to share information (data) and resources. The integration of computers and other different devices allows users to communicate more easily. It is a collection of two or more computer systems that are linked together. A network 11 min read Network Devices (Hub, Repeater, Bridge, Switch, Router, Gateways and Brouter) Network devices are physical devices that allow hardware on a computer network to communicate and interact with each other. Network devices like hubs, repeaters, bridges, switches, routers, gateways, and brouter help manage and direct data flow in a network. They ensure efficient communication betwe 9 min read Like