Open In App

Connection-less Service

A Connectionless Service is technique that is used in data communications to send or transfer data or message at Layer 4 i.e., Transport Layer of Open System Interconnection model. This service does not require session connection among sender or source and receiver or destination. Sender starts transferring or sending data or messages to destination.

In other words, we can say that connectionless service simply means that node can transfer or send data packets or messages to its receiver even without session connection to receiver. Message is sent or transferred without prior arrangement. This usually works due to error handling protocols that allow and give permission for correction of errors just like requesting retransmission.



In this service, network sends each packet of data to sender one at a time, independently of other packets. But network does not have any state information to determine or identify whether packet is part of stream of other packets. Even the network doesn’t have any knowledge and information about amount of traffic that will be transferred by user. In this, each of data packets has source or destination address and is routed independently from source to destination.

Therefore, data packets or messages might follow different paths to reach destination. Data packets are also called datagrams. It is also similar to that of postal services, as it also carries full address of destination where message is to send. Data is also sent in one direction from source to destination without checking that destination is still present there or not or if receiver or destination is prepared to accept message.



Connectionless Protocols :
These protocols simply allow data to be transferred without any link among processes. Some Of data packets may also be lost during transmission. Some of protocols for connectionless services are given below:

Types of Connectionless Services :

Service Example
Unreliable Datagram Electronic Junk Mail, etc.
Acknowledged Datagram Registered mail, text messages along with delivery report, etc.
Request Reply Queries from remote databases, etc.

Advantages :

Disadvantages :

Article Tags :