The OSI Model and Network Protocols

Posted on 2010-01-06
Last Modified: 2013-12-07
Why are network protocol suites needed?

Why are connection-oriented protocols usually considered more reliable than connectionless protocols?

I need to Provide and give example this is not the case. And Also, explain the difference between Routing, Routed, and Non-Routeable protocols. Provide one example of each protocol.

Question by:CubanRican_NY
    LVL 3

    Expert Comment

    I've explained the questions you've asked... Let me know if this helped...

    LVL 8

    Accepted Solution

    Routed- TCP/IP,IPX

    Connection Oriented - TCP (goes through 3-way handshake)
    Connectionless - UDP

    Connection Oriented
    Connection-Oriented means that when devices communicate, they perform handshaking to set up an end-to-end connection. The handshaking process may be as simple as syncrhonization such as in the transport layer protocol TCP, or as complex as negotiating communications parameters as with a modem.

    Connection-Oriented systems can only work in bi-directional communications environments. To negotiate a connection, both sides must be able to communicate with each other. This will not work in a unidirectional environment.

    Connectionless means that no effort is made to set up a dedicated end-to-end connection.

    Connectionless communication is usually achieved by transmitting information in one direction, from source to destination without checking to see if the destination is still there, or if it is prepared to receive the information. When there is little interferance, and plenty of speed available, these systems work fine. In environments where there is difficulty transmitting to the destination, information may have to be re-transmitted several times before the complete message is received.

    Walkie-talkies, or Citizens Band radios are a good examples of connectionless communication. You speak into the mike, and the radio transmitter sends out your signal. If the person receiving you doesn't understand you, there's nothing his radio can do to correct things, the receiver must send you a message back to repeat your last message.

    IP, UDP, ICMP, DNS, TFTP and SNMP are examples of connectionless protocols in use on the Internet

    LVL 12

    Expert Comment

    They key difference between connection-based protocols (TCP) and connectionless protocols (UDP) is that connectionless protocols make a "best effort" to have their packets reach a destination, while connection-based protocols guarantee it.  That leads to the issue of error correction, which is performed in connection-based protocols with "windowing" (no relationg to MS Windows), which is much more robust and reliable, as well as being faster.  In connectionless protocols, there is no effort at error detection and correction beyond simple retransmissions.


    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    How your wiki can always stay up-to-date

    Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
    - Increase transparency
    - Onboard new hires faster
    - Access from mobile/offline

    Suggested Solutions

    Hello to you all, I hear of many people congratulate AWS (Amazon Web Services) on how easy it is to spin up and create new EC2 (Elastic Compute Cloud) instances, but then fail and struggle to connect to them using simple tools such as SSH (Secure…
    Network ports are the threads that hold network communication together. They are an essential part of networking that can be easily ignore or misunderstood, my goals is to show those who don't have a strong network foundation how network ports opera…
    This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor ( If you're looking for how to monitor bandwidth using netflow or packet s…
    In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor ( If you're interested in additional methods for monitoring bandwidt…

    759 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    14 Experts available now in Live!

    Get 1:1 Help Now