Content deleted Content added
std acronym def. other grammar. |
→See also: Efficiency (network science) |
||
(32 intermediate revisions by 12 users not shown) | |||
Line 1:
{{Short description|Protocol acknowledgement capability}}
{{Use American English|date=January 2020}}
In [[computer networking]], a '''reliable''' protocol is a [[communication protocol]] that notifies the sender whether or not the delivery of data to intended recipients was successful. [[Reliability engineering|Reliability]] is a synonym for '''assurance''', which is the term used by the [[ITU]] and [[ATM Forum]], and leads to '''[[fault-tolerant]] messaging'''. ▼
▲In [[computer networking]], a '''reliable''' protocol is a [[communication protocol]] that notifies the sender whether or not the delivery of data to intended recipients was successful. Reliability is a synonym for '''assurance''', which is the term used by the [[ITU]] and [[ATM Forum]].
Reliable protocols typically incur more overhead than unreliable protocols, and as a result, function more slowly and with less scalability. This often is not an issue for [[unicast]] protocols, but it may become a problem for [[reliable multicast]] protocols.
[[Transmission Control Protocol]] (TCP), the main protocol used on the [[Internet]], is a reliable unicast protocol; it provides the abstraction of a [[reliable byte stream]] to applications. [[User Datagram Protocol|UDP]] is an unreliable protocol and is often used in [[computer games]], [[streaming media]] or in other situations where speed is an issue and some data loss may be tolerated because of the transitory nature of the data.
Often, a reliable unicast protocol is also [[connection
==History==
Building on the [[packet switching]] concepts proposed by [[Donald Davies]], the first [[communication protocol]] on the [[ARPANET]] was a reliable packet delivery procedure to connect its hosts via the [[BBN Report 1822|1822 interface]].<ref name="J. Gillies, R. Cailliau">{{cite book|last1=Gillies|first1=J.|url=https://books.google.
Meanwhile, the developers of [[CYCLADES]] and of [[ALOHAnet]] demonstrated that it was possible to build an effective computer network without providing reliable packet transmission. This lesson was later embraced by the designers of [[Ethernet]].
Line 17:
==Reliability properties==
A reliable service is one that notifies the user if delivery fails, while an ''unreliable'' one does not notify the user if delivery fails.{{
In the context of distributed protocols, reliability properties specify the guarantees that the protocol provides with respect to the delivery of messages to the intended recipient(s).
Line 33:
Reliable messaging is the concept of [[message passing]] across an unreliable infrastructure whilst being able to make certain guarantees about the successful transmission of the messages.<ref>[http://www.w3.org/2001/03/WSWS-popa/paper40 W3C paper on reliable messaging]</ref> For example, that if the message is delivered, it is delivered at most once, or that all messages successfully delivered arrive in a particular order.
Reliable delivery can be contrasted with [[best-effort delivery]], where there is no guarantee that messages will be delivered quickly, in order, or at all.
==Implementations==
A reliable delivery protocol can be built on an unreliable protocol. An extremely common example is the layering of [[Transmission Control Protocol]] on the [[Internet Protocol]], a combination known as [[TCP/IP]].
Strong reliability properties are offered by [[group communication system]]s (GCSs) such as [[IS-IS]], [[Appia framework
One protocol that implements reliable messaging is [[WS-ReliableMessaging]], which handles reliable delivery of [[SOAP]] messages.<ref>[http://download.boulder.ibm.com/ibmdl/pub/software/dw/specs/ws-rm/ws-reliablemessaging200502.pdf WS-ReliableMessaging specification (PDF)]</ref>
The [[Asynchronous Transfer Mode|ATM]] Service-Specific Coordination Function provides for transparent assured delivery with [[
[[IEEE 802.11]] attempts to provide reliable service for all traffic. The sending station will resend a frame if the sending station
==Real-time systems==
There is, however, a problem with the definition of reliability as "delivery or notification of failure" in [[real-time computing]]. In such systems, failure to deliver the real-time data will adversely affect the performance of the systems, and some systems, e.g. [[safety-critical]], [[
There are a number of protocols that are capable of
[[MIL-STD-1553B]] and [[STANAG 3910]] are well-known examples of such timely and reliable protocols for [[avionics#
The [[Asynchronous Transfer Mode]] (ATM), the [[Avionics Full-Duplex Switched Ethernet]] (AFDX), and [[Time Triggered Ethernet]] (TTEthernet) are examples of packet-switched networks protocols where the timeliness and reliability of data transfers can be assured by the network. AFDX and TTEthernet are also based on IEEE 802.3 Ethernet, though not entirely compatible with it.
ATM uses connection-oriented [[virtual channel]]s (VCs) which have fully deterministic paths through the network, and [[UPC and NPC|usage and network parameter control]] (UPC/NPC), which are implemented within the network, to limit the traffic on each VC separately. This allows the usage of the shared resources (switch buffers) in the network to be calculated from the parameters of the traffic to be carried in advance, i.e. at system design time. That they are implemented by the network means that these calculations remain valid even when other users of the network behave in unexpected ways, i.e. transmit more data than they are expected to. The calculated usages can then be compared with the capacities of these resources to show that, given the constraints on the routes and the bandwidths of these connections, the resource used for these transfers will never be over-subscribed. These transfers will therefore never be affected by congestion and there will be no losses due to this effect. Then, from the predicted maximum usages of the switch buffers, the maximum delay through the network can also be predicted. However, for the reliability and timeliness to be proved, and for the proofs to be tolerant of faults in and malicious actions by the equipment connected to the network, the calculations of these resource usages cannot be based on any parameters that are not actively enforced by the network, i.e. they cannot be based on what the sources of the traffic are expected to do or on statistical analyses of the traffic characteristics (see [[network calculus]]).<ref>{{cite
AFDX uses frequency ___domain bandwidth allocation and [[Traffic policing (communications)|traffic policing]]
TTEthernet provides the lowest possible latency in transferring data across
However, low latency in transferring data over the bus or network does not necessarily translate into low transport delays between the application processes that source and sink this data. This is especially true where the transfers over the bus or network are cyclically scheduled (as is commonly the case with MIL-STD-1553B and STANAG 3910, and necessarily so with AFDX and TTEthernet) but the application processes are
With both AFDX and TTEthernet, there are additional functions required of the
==See also==
*{{anl|Robustness of complex networks}}
*{{anl|Efficiency (network science)}}
*{{anl|Cascading failure}}
==References==
|