SlideShare a Scribd company logo
ASSIGNMENT TOPIC – “RELIABLE STREAM
TRANSPORT SERVICE”
Submitted by,
Ajay.v.j
IT
Reliable stream transport service
 Previous chapters:
 unreliable,
 connectionless,
 packet delivery
service;
 defined by IP
 This chapter:
 reliable
 network level
service
 stream delivery
 defined by TCP
 At the lowest level, computer
communication networks provide unreliable
packet delivery.
 Packet can be lost or destroyed.
 when transmission errors interfere with data,
 when network hardware fails,
 when networks become too heavily loaded
 Networks that route packets dynamically can
 Deliver them out of order
 Deliver them after a substantial delay or
 Deliver duplicates
 underlying network technologies may dictate
an optimal packet size or pose other
constraints needed to achieve efficient
transfer rates.
 At the highest level, application programs
often need to send large volumes of data
from one computer to another.
 unreliable connectionless delivery system for
large volume transfers becomes
 tedious and annoying,
 it requires programmers to build error detection
and recovery into each application program.
 Because it is difficult to design, understand, or
modify software that correctly provides
reliability.
 goal of network protocol research has been
 to find general purpose solutions to the problems
of providing reliable stream delivery,
 making it possible for experts to build a single
instance of stream protocol software that all
application programs use.
 Single general purpose protocol isolate
application programs from the details of
networking, and makes it possible to
define a uniform interface for the stream
transfer service.
 Stream orientation
 Virtual circuit connection
 Buffered transfer
 Unstructured stream
 Full duplex connection
 When user processes transfers data ,data
as stream of bits divided into 8 bit octets
which are called bytes.
 The stream delivery service on the
destination machine passes to the receiver
exactly the same sequence of octets that the
sender passes to it on the source machine.
 Protocol software modules in the two operating systems
communicate by sending messages across an internet, verifying
that the transfer is authorized, and that both sides are ready.
 Once all details have been settled, the protocol modules inform
the application programs that a connection has been established
and that transfer can begin.
 During transfer, protocol software on the two machines continue
to communicate to verify that data is received correctly.
 If the communication fails for any reason ( e.g., because
network hardware along the path between the machines fails),
both machines detect the failure and report it to the appropriate
application programs.
 We use the term virtual circuit to describe such connections
because although application programs view the connection as a
dedicated hardware circuit, the reliability is an illusion provided
by the stream delivery service.
 The protocol software is free to divide the stream into
packets.
 Application program generates stream one octet at a time.
 if the application program chooses to generate extremely
large blocks of data, the protocol software can choose to
divide each block into smaller pieces for transmission.
 For those applications where data should be delivered
even though it does not fill a buffer, the stream service
provides a push mechanism that applications use to force
a transfer.
 At the sending side, a push forces protocol software to
transfer all data that has been generated without waiting
to fill a buffer.
 When it reaches the receiving side, the push causes TCP to
make the data available to the application without delay.
 It is important to understand that the TCP/IP
stream service does not honour structured
data streams.
 Application programs using the stream
service must understand stream content and
agree on stream format before they initiate
a connection.
 Connections provided by the TCP/IP stream
service allow concurrent transfer in both
directions. Such connections are called full
duplex.
 It consists of two independent streams
flowing in opposite directions, with no
apparent interaction.
 The stream service allows an application
process to terminate flow in one direction
while data continues to flow in the other
direction, making the connection half
duplex.
 Advantage is that underlying protocol
software can send control information for
one stream back to the source in datagrams
carrying data in opposite direction.
 Such piggybacking reduces the network
traffic.
Reliable stream transport service

More Related Content

DOCX
Computer network
Anupan Jain
 
PPTX
Pharmacy Management System1
Nuwan Lansakara
 
PPTX
Query processing strategies in distributed database
ShreerajKhatiwada
 
PPTX
Web Services in Cloud Computing.pptx
ssuser403d87
 
PPTX
Tour and travel management system
Ravindra Chaudhary
 
DOCX
Lifi technology documentation
Sowjanya Jajaila
 
PPTX
CLOUD ENABLING TECHNOLOGIES.pptx
Dr Geetha Mohan
 
PPTX
library management system in SQL
farouq umar
 
Computer network
Anupan Jain
 
Pharmacy Management System1
Nuwan Lansakara
 
Query processing strategies in distributed database
ShreerajKhatiwada
 
Web Services in Cloud Computing.pptx
ssuser403d87
 
Tour and travel management system
Ravindra Chaudhary
 
Lifi technology documentation
Sowjanya Jajaila
 
CLOUD ENABLING TECHNOLOGIES.pptx
Dr Geetha Mohan
 
library management system in SQL
farouq umar
 

What's hot (20)

PDF
Distributed Coordination-Based Systems
Ahmed Magdy Ezzeldin, MSc.
 
DOCX
an efficient spam detection technique for io t devices using machine learning
Venkat Projects
 
PPT
E-Commerce 07
Zarrar Siddiqui
 
PPTX
Advanced Processor Power Point Presentation
PrashantYadav931011
 
PPTX
System interconnect architecture
Gagan Kumar
 
DOCX
Preventing private information inference attacks on social networks
JPINFOTECH JAYAPRAKASH
 
ODT
10 golden rules for website design
Hih7 Webtech Pvt Ltd
 
DOCX
Online bus ticket booking
Gaurav kumar rai - student
 
PPTX
MOBILE COMMUNICATION
junnubabu
 
PPTX
Cloud computing in indian perspective
Ajit Kumar
 
PPTX
Clinic Management System
R M Shahidul Islam Shahed
 
PPTX
Inbound marketing AMA Webinar
HubSpot
 
PPTX
Wide area network (wan)
Raaz Shrestha
 
PPTX
Grid protocol architecture
Pooja Dixit
 
PPTX
Simple Network Management Protocol
AnupomShill
 
PDF
Multimedia cloud computing
munny92
 
PPT
Types dbms
Avnish Shaw
 
DOCX
Furniture shop management system project report
MaiwandTechnologix
 
DOCX
Seminar Report On Amazon Web Service
shishupal choudhary
 
PPT
Network architecture
csk selva
 
Distributed Coordination-Based Systems
Ahmed Magdy Ezzeldin, MSc.
 
an efficient spam detection technique for io t devices using machine learning
Venkat Projects
 
E-Commerce 07
Zarrar Siddiqui
 
Advanced Processor Power Point Presentation
PrashantYadav931011
 
System interconnect architecture
Gagan Kumar
 
Preventing private information inference attacks on social networks
JPINFOTECH JAYAPRAKASH
 
10 golden rules for website design
Hih7 Webtech Pvt Ltd
 
Online bus ticket booking
Gaurav kumar rai - student
 
MOBILE COMMUNICATION
junnubabu
 
Cloud computing in indian perspective
Ajit Kumar
 
Clinic Management System
R M Shahidul Islam Shahed
 
Inbound marketing AMA Webinar
HubSpot
 
Wide area network (wan)
Raaz Shrestha
 
Grid protocol architecture
Pooja Dixit
 
Simple Network Management Protocol
AnupomShill
 
Multimedia cloud computing
munny92
 
Types dbms
Avnish Shaw
 
Furniture shop management system project report
MaiwandTechnologix
 
Seminar Report On Amazon Web Service
shishupal choudhary
 
Network architecture
csk selva
 
Ad

Similar to Reliable stream transport service (20)

PDF
Week10 transport
kapilpahwabnb
 
PPTX
Network software
SakthiVinoth78
 
PPTX
Understanding the Transport Layer: MUX, DEMUX, Process-to-Process Delivery, T...
Sisodetrupti
 
PDF
A Machine Learning based Network Sharing System Design with MPTCP
IJMREMJournal
 
PDF
A Machine Learning based Network Sharing System Design with MPTCP
IJMREMJournal
 
PPTX
OSI and TCP/IP reference models in networking
MeenakshiGupta233101
 
PPTX
CNT - Module 1.Introduction to CN-OSI layers
poojapp6
 
PPSX
Layering and Architecture
selvakumar_b1985
 
PDF
OSI MODEL
Soumo Dhali
 
DOCX
Transport layer
Bathshebaparimala
 
PDF
Protocols and standards
PriyankaM69
 
PDF
Mid term Topic
Dulal Miah
 
PPTX
computer network basics
MohammedAdhil11
 
PPTX
Manish Jha- Research Scholar- Internet Basics Requriement
Manish Jha
 
PPTX
Internet basics and Cloud Computing- Manish Jha
manish jha
 
PDF
Unit 3 Assignment 1 Osi Model
Jacqueline Thomas
 
PPTX
transportlayerUnit4ComputerNetworkUnit4.pptx
nikku12900
 
PPTX
The OSI model
ShofiqulIslam38
 
Week10 transport
kapilpahwabnb
 
Network software
SakthiVinoth78
 
Understanding the Transport Layer: MUX, DEMUX, Process-to-Process Delivery, T...
Sisodetrupti
 
A Machine Learning based Network Sharing System Design with MPTCP
IJMREMJournal
 
A Machine Learning based Network Sharing System Design with MPTCP
IJMREMJournal
 
OSI and TCP/IP reference models in networking
MeenakshiGupta233101
 
CNT - Module 1.Introduction to CN-OSI layers
poojapp6
 
Layering and Architecture
selvakumar_b1985
 
OSI MODEL
Soumo Dhali
 
Transport layer
Bathshebaparimala
 
Protocols and standards
PriyankaM69
 
Mid term Topic
Dulal Miah
 
computer network basics
MohammedAdhil11
 
Manish Jha- Research Scholar- Internet Basics Requriement
Manish Jha
 
Internet basics and Cloud Computing- Manish Jha
manish jha
 
Unit 3 Assignment 1 Osi Model
Jacqueline Thomas
 
transportlayerUnit4ComputerNetworkUnit4.pptx
nikku12900
 
The OSI model
ShofiqulIslam38
 
Ad

Recently uploaded (20)

PPTX
MSME 4.0 Template idea hackathon pdf to understand
alaudeenaarish
 
PDF
Unit I Part II.pdf : Security Fundamentals
Dr. Madhuri Jawale
 
PPTX
22PCOAM21 Session 2 Understanding Data Source.pptx
Guru Nanak Technical Institutions
 
PPTX
ternal cell structure: leadership, steering
hodeeesite4
 
PPTX
22PCOAM21 Session 1 Data Management.pptx
Guru Nanak Technical Institutions
 
PPT
Lecture in network security and mobile computing
AbdullahOmar704132
 
PDF
EVS+PRESENTATIONS EVS+PRESENTATIONS like
saiyedaqib429
 
PDF
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
PPTX
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
PDF
Cryptography and Information :Security Fundamentals
Dr. Madhuri Jawale
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PDF
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
PPT
1. SYSTEMS, ROLES, AND DEVELOPMENT METHODOLOGIES.ppt
zilow058
 
PDF
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
DOCX
SAR - EEEfdfdsdasdsdasdasdasdasdasdasdasda.docx
Kanimozhi676285
 
PPTX
MT Chapter 1.pptx- Magnetic particle testing
ABCAnyBodyCanRelax
 
PDF
Chad Ayach - A Versatile Aerospace Professional
Chad Ayach
 
PDF
flutter Launcher Icons, Splash Screens & Fonts
Ahmed Mohamed
 
PPTX
Information Retrieval and Extraction - Module 7
premSankar19
 
PPTX
AgentX UiPath Community Webinar series - Delhi
RohitRadhakrishnan8
 
MSME 4.0 Template idea hackathon pdf to understand
alaudeenaarish
 
Unit I Part II.pdf : Security Fundamentals
Dr. Madhuri Jawale
 
22PCOAM21 Session 2 Understanding Data Source.pptx
Guru Nanak Technical Institutions
 
ternal cell structure: leadership, steering
hodeeesite4
 
22PCOAM21 Session 1 Data Management.pptx
Guru Nanak Technical Institutions
 
Lecture in network security and mobile computing
AbdullahOmar704132
 
EVS+PRESENTATIONS EVS+PRESENTATIONS like
saiyedaqib429
 
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
Cryptography and Information :Security Fundamentals
Dr. Madhuri Jawale
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
1. SYSTEMS, ROLES, AND DEVELOPMENT METHODOLOGIES.ppt
zilow058
 
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
SAR - EEEfdfdsdasdsdasdasdasdasdasdasdasda.docx
Kanimozhi676285
 
MT Chapter 1.pptx- Magnetic particle testing
ABCAnyBodyCanRelax
 
Chad Ayach - A Versatile Aerospace Professional
Chad Ayach
 
flutter Launcher Icons, Splash Screens & Fonts
Ahmed Mohamed
 
Information Retrieval and Extraction - Module 7
premSankar19
 
AgentX UiPath Community Webinar series - Delhi
RohitRadhakrishnan8
 

Reliable stream transport service

  • 1. ASSIGNMENT TOPIC – “RELIABLE STREAM TRANSPORT SERVICE” Submitted by, Ajay.v.j IT
  • 3.  Previous chapters:  unreliable,  connectionless,  packet delivery service;  defined by IP  This chapter:  reliable  network level service  stream delivery  defined by TCP
  • 4.  At the lowest level, computer communication networks provide unreliable packet delivery.  Packet can be lost or destroyed.  when transmission errors interfere with data,  when network hardware fails,  when networks become too heavily loaded
  • 5.  Networks that route packets dynamically can  Deliver them out of order  Deliver them after a substantial delay or  Deliver duplicates  underlying network technologies may dictate an optimal packet size or pose other constraints needed to achieve efficient transfer rates.  At the highest level, application programs often need to send large volumes of data from one computer to another.
  • 6.  unreliable connectionless delivery system for large volume transfers becomes  tedious and annoying,  it requires programmers to build error detection and recovery into each application program.  Because it is difficult to design, understand, or modify software that correctly provides reliability.
  • 7.  goal of network protocol research has been  to find general purpose solutions to the problems of providing reliable stream delivery,  making it possible for experts to build a single instance of stream protocol software that all application programs use.  Single general purpose protocol isolate application programs from the details of networking, and makes it possible to define a uniform interface for the stream transfer service.
  • 8.  Stream orientation  Virtual circuit connection  Buffered transfer  Unstructured stream  Full duplex connection
  • 9.  When user processes transfers data ,data as stream of bits divided into 8 bit octets which are called bytes.  The stream delivery service on the destination machine passes to the receiver exactly the same sequence of octets that the sender passes to it on the source machine.
  • 10.  Protocol software modules in the two operating systems communicate by sending messages across an internet, verifying that the transfer is authorized, and that both sides are ready.  Once all details have been settled, the protocol modules inform the application programs that a connection has been established and that transfer can begin.  During transfer, protocol software on the two machines continue to communicate to verify that data is received correctly.  If the communication fails for any reason ( e.g., because network hardware along the path between the machines fails), both machines detect the failure and report it to the appropriate application programs.  We use the term virtual circuit to describe such connections because although application programs view the connection as a dedicated hardware circuit, the reliability is an illusion provided by the stream delivery service.
  • 11.  The protocol software is free to divide the stream into packets.  Application program generates stream one octet at a time.  if the application program chooses to generate extremely large blocks of data, the protocol software can choose to divide each block into smaller pieces for transmission.  For those applications where data should be delivered even though it does not fill a buffer, the stream service provides a push mechanism that applications use to force a transfer.  At the sending side, a push forces protocol software to transfer all data that has been generated without waiting to fill a buffer.  When it reaches the receiving side, the push causes TCP to make the data available to the application without delay.
  • 12.  It is important to understand that the TCP/IP stream service does not honour structured data streams.  Application programs using the stream service must understand stream content and agree on stream format before they initiate a connection.
  • 13.  Connections provided by the TCP/IP stream service allow concurrent transfer in both directions. Such connections are called full duplex.  It consists of two independent streams flowing in opposite directions, with no apparent interaction.  The stream service allows an application process to terminate flow in one direction while data continues to flow in the other direction, making the connection half duplex.
  • 14.  Advantage is that underlying protocol software can send control information for one stream back to the source in datagrams carrying data in opposite direction.  Such piggybacking reduces the network traffic.