Misplaced Pages

Assurance

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.

A virtual circuit ( VC ) is a means of transporting data over a data network, based on packet switching and in which a connection is first established across the network between two endpoints. The network, rather than having a fixed data rate reservation per connection as in circuit switching , takes advantage of the statistical multiplexing on its transmission links, an intrinsic feature of packet switching.

#567432

39-582: [REDACTED] Look up assurance in Wiktionary, the free dictionary. Assurance may refer to: Assurance (computer networking) Assurance (theology) , a Protestant Christian doctrine Assurance services , offered by accountancy firms Life assurance , an insurance on human life Quality assurance Assurance IQ, Inc., a subsidiary of Prudential Financial Places [ edit ] Assurance, West Virginia , an unincorporated community in

78-449: A reliable protocol is a communication protocol that notifies the sender whether or not the delivery of data to intended recipients was successful. Reliability is a synonym for assurance , which is the term used by the ITU and ATM Forum . Reliable protocols typically incur more overhead than unreliable protocols, and as a result, function more slowly and with less scalability. This often

117-405: A bus controller (BC) to command the connected remote terminals (RTs) to receive or transmit this data. The BC can, therefore, ensure that there will be no congestion, and transfers are always timely. The MIL-1553 protocol also allows for automatic retries that can still ensure timely delivery and increase the reliability above that of the physical layer. STANAG 3910, also known as EFABus in its use on

156-482: A connectionless packet switching network layer protocol such as IP , where different packets may be routed over different paths, and thus be delivered out of order. However, it is possible to use TCP as a virtual circuit, since TCP includes segment numbering that allows reordering on the receiver side to accommodate out-of-order delivery. Data link layer and network layer virtual circuit protocols are based on connection-oriented packet switching , meaning that data

195-536: A frame if the sending station does not receive an ACK frame within a predetermined period of time. There is, however, a problem with the definition of reliability as "delivery or notification of failure" in real-time computing . In such systems, failure to deliver the real-time data will adversely affect the performance of the systems, and some systems, e.g. safety-critical , safety-involved , and some secure mission-critical systems, must be proved to perform at some specified minimum level. This, in turn, requires that

234-419: A number of protocols that are capable of addressing real-time requirements for reliable delivery and timeliness: MIL-STD-1553B and STANAG 3910 are well-known examples of such timely and reliable protocols for avionic data buses . MIL-1553 uses a 1 Mbit/s shared media for the transmission of data and the control of these transmissions, and is widely used in federated military avionics systems. It uses

273-406: A per- call basis and are disconnected when the call is terminated; however, a permanent virtual circuit ( PVC ) can be established as an option to provide a dedicated circuit link between two facilities. PVC configuration is usually preconfigured by the service provider. Unlike SVCs, PVC are usually very seldom broken/disconnected. A switched virtual circuit (SVC) is a virtual circuit that

312-414: A per-recipient basis (simple reliability properties), or they may relate the fact of delivery or the order of delivery among the different recipients (strong reliability properties). In the context of multicast protocols, strong reliability properties express the guarantees that the protocol provides with respect to the delivery of messages to different recipients. An example of a strong reliability property

351-464: A purely declarative manner, using a simple rule-based language, and automatically translated into a hierarchical protocol. One protocol that implements reliable messaging is WS-ReliableMessaging , which handles reliable delivery of SOAP messages. The ATM Service-Specific Coordination Function provides for transparent assured delivery with AAL5 . IEEE 802.11 attempts to provide reliable service for all traffic. The sending station will resend

390-457: A specified minimum reliability for the delivery of the critical data be met. Therefore, in these cases, it is only the delivery that matters; notification of the failure to deliver does ameliorate the failure. In hard real-time systems , all data must be delivered by the deadline or it is considered a system failure. In firm real-time systems , late data is still valueless but the system can tolerate some amount of late or missing data. There are

429-496: Is atomicity . The property states that if at least a single copy of a message has been delivered to a recipient, all other recipients will eventually receive a copy of the message. In other words, each message is always delivered to either all or none of the recipients. One of the most complex strong reliability properties is virtual synchrony . Reliable messaging is the concept of message passing across an unreliable infrastructure whilst being able to make certain guarantees about

SECTION 10

#1732771854568

468-619: Is connectionless communication using datagrams . In the early 1970s, virtual call capability was developed by British Telecom for EPSS (building on the work of Donald Davies at the National Physical Laboratory ). The concept was enhanced by Rémi Després as virtual circuits for the RCP experimental network of the French PTT . Connection oriented transport layer protocols such as TCP may rely on

507-403: Is last copy recall , meaning that as long as at least a single copy of a message remains available at any of the recipients, every other recipient that does not fail eventually also receives a copy. Strong reliability properties such as this one typically require that messages are retransmitted or forwarded among the recipients. An example of a reliability property stronger than last copy recall

546-403: Is always delivered along the same network path, i.e., through the same nodes. Advantages with this over connectionless packet switching are: Examples of transport layer protocols that provide a virtual circuit: Examples of network-layer and data-link-layer virtual circuit protocols, where data always is delivered over the same path: Switched virtual circuits ( SVCs ) are generally set up on

585-513: Is an issue and some data loss may be tolerated because of the transitory nature of the data. Often, a reliable unicast protocol is also connection oriented . For example, TCP is connection oriented, with the virtual-circuit ID consisting of source and destination IP addresses and port numbers. However, some unreliable protocols are connection oriented, such as Asynchronous Transfer Mode and Frame Relay . In addition, some connectionless protocols, such as IEEE 802.11 , are reliable. Building on

624-425: Is delivered in correct order, and signaling overhead is required during a connection establishment phase. However, circuit switching provides a constant bit rate and latency, while these may vary in a virtual circuit service due to factors such as: In telecommunications , a virtual call capability , sometimes called a virtual call facility , is a service feature in which: An alternative approach to virtual calls

663-401: Is dynamically established on demand and is torn down when transmission is complete, for example after a phone call or a file download. SVCs are used in situations where data transmission is sporadic and/or not always between the same data terminal equipment ( DTE ) endpoints. A permanent virtual circuit (PVC) is a virtual circuit established for repeated/continuous use between the same DTE . In

702-471: Is not an issue for unicast protocols, but it may become a problem for reliable multicast protocols. Transmission Control Protocol (TCP), the main protocol used on the Internet , is a reliable unicast protocol; it provides the abstraction of a reliable byte stream to applications. UDP is an unreliable protocol and is often used in computer games , streaming media or in other situations where speed

741-468: Is the layering of Transmission Control Protocol on the Internet Protocol , a combination known as TCP/IP . Strong reliability properties are offered by group communication systems (GCSs) such as IS-IS , Appia framework , JGroups or QuickSilver Scalable Multicast . The QuickSilver Properties Framework is a flexible platform that allows strong reliability properties to be expressed in

780-626: The Eurofighter Typhoon , is, in effect, a version of MIL-1553 augmented with a 20 Mbit/s shared media bus for data transfers, retaining the 1 Mbit/s shared media bus for control purposes. The Asynchronous Transfer Mode (ATM), the Avionics Full-Duplex Switched Ethernet (AFDX), and Time Triggered Ethernet (TTEthernet) are examples of packet-switched networks protocols where the timeliness and reliability of data transfers can be assured by

819-483: The packet switching concepts proposed by Donald Davies , the first communication protocol on the ARPANET was a reliable packet delivery procedure to connect its hosts via the 1822 interface . A host computer simply arranged the data in the correct packet format, inserted the address of the destination host computer, and sent the message across the interface to its connected Interface Message Processor (IMP). Once

SECTION 20

#1732771854568

858-533: The United States Mount Assurance , New Hampshire, United States Ships [ edit ] HMS  Assurance USS  Assurance See also [ edit ] All pages with titles containing Assurance Insurance Topics referred to by the same term [REDACTED] This disambiguation page lists articles associated with the title Assurance . If an internal link led you here, you may wish to change

897-407: The application processes are not synchronized with this schedule. With both AFDX and TTEthernet, there are additional functions required of the interfaces, e.g. AFDX's Bandwidth Allocation Gap control, and TTEthernet's requirement for very close synchronization of the sources of time-triggered data, that make it difficult to use standard Ethernet interfaces. Other methods for control of the traffic in

936-440: The constraints on the routes and the bandwidths of these connections, the resource used for these transfers will never be over-subscribed. These transfers will therefore never be affected by congestion and there will be no losses due to this effect. Then, from the predicted maximum usages of the switch buffers, the maximum delay through the network can also be predicted. However, for the reliability and timeliness to be proved, and for

975-422: The context of distributed protocols, reliability properties specify the guarantees that the protocol provides with respect to the delivery of messages to the intended recipient(s). An example of a reliability property for a unicast protocol is "at least once", i.e. at least one copy of the message is guaranteed to be delivered to the recipient. Reliability properties for multicast protocols can be expressed on

1014-482: The development of the end-to-end principle , which is one of the Internet 's fundamental design principles. A reliable service is one that notifies the user if delivery fails, while an unreliable one does not notify the user if delivery fails. For example, Internet Protocol (IP) provides an unreliable service. Together, Transmission Control Protocol (TCP) and IP provide a reliable service, whereas User Datagram Protocol (UDP) and IP provide an unreliable one. In

1053-413: The fundamental prerequisite for time-triggered communication". This is because the sources of critical data will have to have the same view of time as the switch, in order that they can transmit at the correct time and the switch will see this as correct. This also requires that the sequence with which a critical transfer is scheduled has to be predictable to both source and switch. This, in turn, will limit

1092-407: The link to point directly to the intended article. Retrieved from " https://en.wikipedia.org/w/index.php?title=Assurance&oldid=973463234 " Category : Disambiguation pages Hidden categories: Short description is different from Wikidata All article disambiguation pages All disambiguation pages Assurance (computer networking) In computer networking ,

1131-453: The message was delivered to the destination host, an acknowledgment was delivered to the sending host. If the network could not deliver the message, the IMP would send an error message back to the sending host. Meanwhile, the developers of CYCLADES and of ALOHAnet demonstrated that it was possible to build an effective computer network without providing reliable packet transmission. This lesson

1170-411: The network by using time-domain control methods – each time triggered transfer is scheduled at a specific time so that contention for shared resources is controlled and thus the possibility of congestion is eliminated. The switches in the network enforce this timing to provide tolerance of faults in, and malicious actions on the part of, the other connected equipment. However, "synchronized local clocks are

1209-549: The network that would allow the use of such standard IEEE 802.3 network interfaces is a subject of current research. Virtual circuit A 1978 standardization of virtual circuits by the CCITT imposes per-connection flow controls at all user-to-network and network-to-network interfaces. This permits participation in congestion control and reduces the likelihood of packet loss in a heavily loaded network. Some circuit protocols provide reliable communication service through

Assurance - Misplaced Pages Continue

1248-418: The network to be calculated from the parameters of the traffic to be carried in advance, i.e. at system design time. That they are implemented by the network means that these calculations remain valid even when other users of the network behave in unexpected ways, i.e. transmit more data than they are expected to. The calculated usages can then be compared with the capacities of these resources to show that, given

1287-430: The network. AFDX and TTEthernet are also based on IEEE 802.3 Ethernet, though not entirely compatible with it. ATM uses connection-oriented virtual channels (VCs) which have fully deterministic paths through the network, and usage and network parameter control (UPC/NPC), which are implemented within the network, to limit the traffic on each VC separately. This allows the usage of the shared resources (switch buffers) in

1326-477: The proofs to be tolerant of faults in and malicious actions by the equipment connected to the network, the calculations of these resource usages cannot be based on any parameters that are not actively enforced by the network, i.e. they cannot be based on what the sources of the traffic are expected to do or on statistical analyses of the traffic characteristics (see network calculus ). AFDX uses frequency domain bandwidth allocation and traffic policing , that allows

1365-452: The successful transmission of the messages. For example, that if the message is delivered, it is delivered at most once, or that all messages successfully delivered arrive in a particular order. Reliable delivery can be contrasted with best-effort delivery , where there is no guarantee that messages will be delivered quickly, in order, or at all. A reliable delivery protocol can be built on an unreliable protocol. An extremely common example

1404-460: The traffic on each virtual link to be limited so that the requirements for shared resources can be predicted and congestion prevented so it can be proved not to affect the critical data. However, the techniques for predicting the resource requirements and proving that congestion is prevented are not part of the AFDX standard. TTEthernet provides the lowest possible latency in transferring data across

1443-479: The transmission schedule to a highly deterministic one, e.g. the cyclic executive . However, low latency in transferring data over the bus or network does not necessarily translate into low transport delays between the application processes that source and sink this data. This is especially true where the transfers over the bus or network are cyclically scheduled (as is commonly the case with MIL-STD-1553B and STANAG 3910, and necessarily so with AFDX and TTEthernet) but

1482-638: The use of data retransmissions invoked by error detection and automatic repeat request (ARQ). Before a virtual circuit may be used, it must be established between network nodes in the call setup phase. Once established, a bit stream or byte stream may be exchanged between the nodes, providing abstraction from low-level division into protocol data units , and enabling higher-level protocols to operate transparently. An alternative to virtual-circuit networks are datagram networks. Virtual circuit communication resembles circuit switching , since both are connection oriented , meaning that in both cases data

1521-492: Was later embraced by the designers of Ethernet . If a network does not guarantee packet delivery, then it becomes the host's responsibility to provide reliability by detecting and retransmitting lost packets. Subsequent experience on the ARPANET indicated that the network itself could not reliably detect all packet delivery failures, and this pushed responsibility for error detection onto the sending host in any case. This led to

#567432