Types of Service. Types of service (1) A network architecture may have multiple protocols at the same layer in order to provide different types of service.

Slides:



Advertisements
Similar presentations
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Advertisements

TCP/IP MODEL Maninder Kaur
Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
CCNA – Network Fundamentals
OSI Model OSI MODEL.
Answers of Exercise 7 1. Explain what are the connection-oriented communication and the connectionless communication. Give some examples for each of the.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
CS 582 / CMPE 481 Distributed Systems Communications.
Semester Copyright USM EEE442 Computer Networks Introduction: Protocols En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex, UK)
William Stallings Data and Computer Communications 7 th Edition (Selected slides used for lectures at Bina Nusantara University) Transport Layer.
Chapter 2 Network Models.
Gursharan Singh Tatla Transport Layer 16-May
NETWORKING CONCEPTS. TCP/IP The TCPIIP protocol suite was developed prior to the OSI model TCP/IP protocol suite was defined as having four layers: Host-to-network,
1.  A protocol is a set of rules that governs the communications between computers on a network.  Functions of protocols:  Addressing  Data Packet.
Switching Techniques Student: Blidaru Catalina Elena.
Process-to-Process Delivery:
The Transport Layer (L4) Provides an end-to-end, reliable transport service between l4 entities –Reliable - error-free, in- sequence, no loss or duplication.
2-2008UP-Copyrights reserved1 ITGD4103 Data Communications and Networks OSI Reference Model Lecture-5: OSI Reference Model week 5- q-2/ 2008 Dr. Anwar.
TRANSPORT LAYER T.Najah Al-Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
Chapter 17 Networking Dave Bremer Otago Polytechnic, N.Z. ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William Stallings.
Review: – computer networks – topology: pair-wise connection, point-to-point networks and broadcast networks – switching techniques packet switching and.
Presentation on Osi & TCP/IP MODEL
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 4 Introduction to Network.
6.1. Transport Control Protocol (TCP) It is the most widely used transport protocol in the world. Provides reliable end to end connection between two hosts.
Mukesh N. Tekwani Elphinstone College Mumbai
Layer Architecture Layer architecture simplifies the network design. It is easy to debug network applications in a layered architecture network. The network.
Introduction to Networks CS587x Lecture 1 Department of Computer Science Iowa State University.
Data and Computer Communications Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based Applications.
TCP: A Closer Look Transmission Control Protocol.
University of the Western Cape Chapter 12: The Transport Layer.
SMUCSE 4344 transport layer. SMUCSE 4344 transport layer end-to-end protocols –transport code runs only on endpoint hosts encapsulates network communications.
TCP/IP TCP/IP LAYERED PROTOCOL TCP/IP'S APPLICATION LAYER TRANSPORT LAYER NETWORK LAYER NETWORK ACCESS LAYER (DATA LINK LAYER)
Networked & Distributed Systems TCP/IP Transport Layer Protocols UDP and TCP University of Glamorgan.
Switching breaks up large collision domains into smaller ones Collision domain is a network segment with two or more devices sharing the same Introduction.
Bjorn Landfeldt, The University of Sydney 1 NETS 3303 Networked Systems Revision.
Chapter 2 Applications and Layered Architectures Sockets.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
Transport Layer COM211 Communications and Networks CDA College Theodoros Christophides
Marwan Al-Namari Week 5. Responsible for delivering packets between endpoints over multiple links Physical Link Network Transport Application.
Packet switching network Data is divided into packets. Transfer of information as payload in data packets Packets undergo random delays & possible loss.
Chapter 2 Protocols and the TCP/IP Suite 1 Chapter 2 Protocols and the TCP/IP Suite.
Lecture 4 Overview. Ethernet Data Link Layer protocol Ethernet (IEEE 802.3) is widely used Supported by a variety of physical layer implementations Multi-access.
Institute of Technology Sligo - Dept of Computing Chapter 12 The Transport Layer.
Advanced UNIX programming Fall 2002, lecture 16 Instructor: Ashok Srinivasan Acknowledgements: The syllabus and power point presentations are modified.
4343 X2 – The Transport Layer Tanenbaum Ch.6.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
1 Computer Communication & Networks Lecture 23 & 24 Transport Layer: UDP and TCP Waleed Ejaz
Network Layer Lecture Network Layer Design Issues.
Transmission Control Protocol (TCP) TCP Flow Control and Congestion Control CS 60008: Internet Architecture and Protocols Department of CSE, IIT Kharagpur.
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
Process-to-Process Delivery:
Computer Engineering and Networks, College of Engineering, Majmaah University Protocols OSI reference MODEL TCp /ip model Mohammed Saleem Bhat
OSI Model OSI MODEL. Communication Architecture Strategy for connecting host computers and other communicating equipment. Defines necessary elements for.
OSI Model OSI MODEL.
Chapter 9 Introduction To Data-Link Layer 9.# 1
Instructor Materials Chapter 9: Transport Layer
Chapter 3 Internet Applications and Network Programming
The OSI Model & the TCP/IP Protocol Suite
Telemedicine.
Lecturer, Department of Computer Application
DEPARTMENT OF COMPUTER SCIENCE
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Process-to-Process Delivery:
Network Model.
CPEG514 Advanced Computer Networkst
OSI Model OSI MODEL.
Process-to-Process Delivery: UDP, TCP
Computer Networks Protocols
Presentation transcript:

Types of Service

Types of service (1) A network architecture may have multiple protocols at the same layer in order to provide different types of service Or a single protocol may be able to provide different types of service if the higher layer entity chooses a different service primitive to use at the service interface (or different parameters) There are some basic service categories that arise throughout networking regardless of the layer where they are implemented 2

Types of service (2) Perhaps the most important service distinction is between Connection-oriented vs. Connectionless service models Connection-oriented service –All data on the connection follows the same path –Received data is in the same order it was sent –A connection is created from the source to the destination prior to the exchange of any data –The characteristics of the connection may be negotiated prior to the data exchange –The connection is “torn down” when no longer needed 3

Types of service (3) Connection-oriented service (cont.) –The phone system is the classic example Initially when the phone system was entirely analog (and not mechanized) the operators would literally plug wires into patch panels to create the connections (human switches!) When the phone company digitized most of their system the connections became virtual connections on a shared physical medium –Sometimes called a virtual-circuit service model –If the connection is broken then data flow stops and the connection must be re-established –Here statistical multiplexing means re-using the virtual connection for some other user at a later time 4

Types of service (4) Connectionless service –Messages from the same source to the same destination are unrelated from the perspective of a connectionless service –Messages can take different pathways –Messages may not arrive in the same order as sent –Data flows immediately, but the sender is not sure that the message can be delivered –More robust to failures of a single link in a path – route around failed link 5

Types of service (5) Reliable vs. unreliable service Reliable service –The service makes a significant effort to deliver all of the data and in the correct order Not a guaranteed service – a single point of failure in the hardware along the path can still stop all communication –Uses acknowledgements (ACKS) and retransmissions ACKS are small messages from a receiver that indicate successful receipt of some data –Also uses sequence numbers to maintain order –ACKS introduce additional delay and complexity Reliability has a cost! 6

Types of service (6) Unreliable service –This type of service provides only best effort –Used for applications that can’t afford the overhead associated with ACKS in a reliable service Also good for applications that can just ask again if a request fails (called idempotent request behavior) –Best effort is often very good and therefore often adequate A LAN has low error rates, potentially large capacity Chances of failure are low –A common mistake of application designers is to: Use an unreliable service on the LAN with good results Fail to design for poorer WAN behavior of the same service 7

Types of service (7) Applications provide many types of services to users but they are built on a small number of services at the lower layers –We can therefore easily add a new application using the application programming interface of the transport layer called the socket interface We will study two basic types of service that the transport layer provides to applications –A basic message or datagram service –A byte-stream service 8

Types of service (8) Datagram service (UDP in the TCP/IP stack) –Is a connectionless, unreliable service Messages may be lost, duplicated, or delivered out-of-order –The network accepts individual messages of limited size Similar to regular mail –The network delivers exactly the bytes handed to it by the application It doesn’t join messages together nor does it deliver a part of a message –The datagram name is derived from the telegram model –Is unidirectional It supports unicast, broadcast, or multicast recipients 9

Types of service (9) Byte-Stream service (TCP in the TCP/IP stack) –A connection-oriented, ordered, reliable service –An arbitrary-length sequence of individual bytes –Is bi-directional between two peer applications Offers only one-to-one communications, i.e., unicast The network accepts input from either application, and delivers the data to the other application –Chooses the number of bytes to deliver at any time A sending application can choose to generate one byte at a time, or it can generate blocks of bytes The byte-stream service can choose to combine smaller blocks into one large block or can divide a large block into smaller blocks (as it hands the data to the lower layers) The service treats the bytes as part of a larger stream 10

Types of service (10) A programmer who uses the datagram service must insure that the application operates correctly –Even if packets are lost or reordered Many applications require delivery guarantees –Programmers tend to use the byte-stream service except in special situations such as broadcast New combinations of reliable vs. unreliable, connection-oriented vs. connectionless, and datagram versus stream are emerging –For example: video, where a stream is multicast and the application can deal with packet reordering and loss 11

Types of service (11) ServiceExample Reliable message streamSequence of pages Reliable byte streamRemote login Unreliable connectionDigitized voice Unreliable datagramElectronic junk mail Acknowledged datagramRegistered mail Request-replyDatabase query 12 Connection - oriented Connectionless