End-to-End Argument
network Layering
Suppose my parents want to send money to me??
Checksum 1:
Parents:
Charu
- Goes to ICICI bank.
- BIC(Brnch Identification Code) is
given to identify the recipient bank.
Application
Layer
Bank of America
- Carried in the Link layer.
- Performed in the Ethernet Hardware:
16 bit Cyclic Redudancy Checksum (CRC)
- Protects against errors in Ether( communication medium).
ICICI Bank,Delhi:
Network
Layer
- Transmits the message to the
Rx bank through secure system.
- Receives the message from SWIFT
- Transfers the money in my account.
Checksum 2:
SWIFT:
- Exchanges messages within banks.
- Carried in Higer layers( as a part of EFTP protocol ).
- Software checksum is used:
1's complement add and cycle over the entire packet.
- Protects against failures in parallel data also.
Link Layer
However, Reliable Communication System offers some benefits:
- It reduces the frequency of retries by the file tranfer appl.
- It protects the information in th system from attackers.
by automatic encryption
Conclusion:
- Focus on placing functionality in higher layers for the correctness.
- Low level checks can add to the performance aspects.
Case 2: Reliabilty at higher layers
End-to-End Argument
Application knows the best !!!
- Placement of the function upward in a layer system.
- Correct operation can be verified by end-points.
Reliable File transfer Program
Case1: By checksum in communication system
- No effect in correctness of the outcome.
- Provides only performance enhancement.
- Application prog. has to be reliable for reliable transfer.
- It provide end-end checksum and retry.
- End-end acknowledgement is facilitated.
Reliable
Communication
Sys.
Hardware fault /
S/W bug in file transfer prog.