answersLogoWhite

0


Best Answer

-Unacknowledged connectionless service consists of having the source machine send independent frames to the destination machine without having the destination machine acknowledged. Most LAN's use this service.

-Acknowledged connectionless service in this service there are no logical connections used but each frame sent individually acknowledged. In this way the sender knows whether a frame has arrived correctly. It is useful on wireless systems.

User Avatar

Wiki User

13y ago
This answer is:
User Avatar
More answers
User Avatar

Hoàng Nguyên Nhật

Lvl 2
2y ago

Explain the difference between connection-oriented acknowledged service and connectionless acknowledged service. How do the protocols that provide these services differ?

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Explain the difference between connectionless unacknowledged service and connectionless acknowledged service. How do the protocols that provide these services differ?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Communications

What is the conceptual difference between IP and end-to-end protocols?

jjj


How would you explain consistency in communication?

Replicated services can be implemented as process groups. Member processes use group communication protocols to communicate amongst themselves and group membership protocols to determine what processes are in the group. These protocols can provide various levels of consistency between members. The author investigates weak consistency protocols that guarantee that messages are delivered to all members, but do not guarantee when. He reports on a new family of communication protocols, an associated group membership mechanism, and current progress in evaluating their efficiency and utility for real applications.


What protocols allow network to accomplish?

Tcp/ip


What is the differences between connection-oriented services and connectionless services?

In general, transport protocols can be characterized as being either connection-oriented or connectionless. Connection-oriented services must first establish a connection with the desired service before passing any data. A connectionless service can send the data without any need to establish a connection first. In general, connection-oriented services provide some level of delivery guarantee, whereas connectionless services do not. Connection-oriented service involves three phases: connection establishment, data transfer, and connection termination. During connection establishment, the end nodes may reserve resources for the connection. The end nodes also may negotiate and establish certain criteria for the transfer, such as a window size used in TCP connections. This resource reservation is one of the things exploited in some denial of service (DOS) attacks. An attacking system will send many requests for establishing a connection but then will never complete the connection. The attacked computer is then left with resources allocated for many never-completed connections. Then, when an end node tries to complete an actual connection, there are not enough resources for the valid connection. The data transfer phase occurs when the actual data is transmitted over the connection. During data transfer, most connection-oriented services will monitor for lost packets and handle resending them. The protocol is generally also responsible for putting the packets in the right sequence before passing the data up the protocol stack. When the transfer of data is complete, the end nodes terminate the connection and release resources reserved for the connection. Connection-oriented network services have more overhead than connectionless ones. Connection-oriented services must negotiate a connection, transfer data, and tear down the connection, whereas a connectionless transfer can simply send the data without the added overhead of creating and tearing down a connection. Each has its place in internetworks.


What is difference between topology and protocol?

Network topology is the physical design of a LAN which resolves the conflict that occurs between computers on the network attempting to transmit at the same time. Whereas protocols are the standards used by networks to permit communication between network-connected devices. -s74

Related questions

What protocols are connectionless?

UDP


Is DNS connectionless or connection-oriented?

DHCP is a connectionless protocols. In general, any protocol that is based on TCP port alone is a connection-oriented protocol while any protocol that is based on UDP port alone is a connectionless protocol. And a protocols that can work on both TCP and UDP port can be either a connection-oriented or a connectionless protocol depending upon the which protocol is used (TCP or UDP). For checking other protocols if they are connection-oriented or connectionless check http://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers


What protocols do not guarantee delivery of their data but do operate with a very low overhead that conserves network bandwidth?

connectionless protocols - transport layer


What type of protocol is useful when data must be transferred quickly?

Connectionless protocols


Transport layer protocols that do not establish a connection before transmission and make no effort to ensure that data is delivered error-free are called?

connectionless protocols


When connectionless protocols are implemented at the lower layers of the OSI model?

an upper-layer, connection-oriented protocol or service


What is a connectionless?

Connectionless Protocols: These protocols do not establish a connection between devices. As soon as a device has data to send to another, it just sends it. Answer:A Connectionless Protocol is a data communication method in which communication occurs between hosts with no previous setup. The device at one end of the communication transmits data to the other, without first ensuring that the recipient is available and ready to receive the data. The device sending a message simply sends it addressed to the intended recipient. The internet Protocol (IP) and User Datagram Protocol (UDP) are connectionless protocols, but TCP/IP (the most common use of IP) is connection-oriented


Which protocol working at the Transport layer provides a connectionless service between hosts?

There are many connectionless protocols depending on which layer of the OSI model you are referring to. An example would be UDP for transport, and IP for routing.


What is a connectionless protocol?

Connectionless Protocols: These protocols do not establish a connection between devices. As soon as a device has data to send to another, it just sends it. Answer:A Connectionless Protocol is a data communication method in which communication occurs between hosts with no previous setup. The device at one end of the communication transmits data to the other, without first ensuring that the recipient is available and ready to receive the data. The device sending a message simply sends it addressed to the intended recipient. The Internet Protocol (IP) and User Datagram Protocol (UDP) are connectionless protocols, but TCP/IP (the most common use of IP) is connection-oriented


When connectionless protocols are implemented at the lower layers of the OSI model what are usually used to acknowledge the data receipt and request the retransmission of missing data?

upper-layer connection-oriented protocols


Are Layer 2 protocols connectionless or connection-oriented?

They can be both. E.g. MPLS-TP or Connection-Oriented-Ethernet (COE) are connection oriented.


Which firewall feature is used to track communication channels and provides additional security for connectionless protocols?

Stateful Inspection. A stateful inspection firewall uses a technique known as stateful packet filtering to keep track of communication channels. This is different when compared to basic firewalls. Once the packet and connection has been sent, a normal firewall will not remember the communication channel, whereas the stateful inspection firewall will. This also proves useful to protect connectionless communication protocols.