Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Connection Oriented Multiplexing And De multiplexing
TCP socket identified by 4 tuple:
a.Source IP address
b.Source port number
c.Destination IP address
d.Destination port number
When a TCP segment arrives form the network to a host the host uses all four values to direct the segment to the appropriate socket. In particulars with different source IP addresses or source port numbers will be directed to two different socket.
The server host may support may is simultaneous TCP sockets with each socket attached to a process and with each socket identified by its own four tuple when a TCP segment arrives to the host all fours fields are used to direct the segment to the appropriate socket.
The situations illustrated in figure in which host c initiates two HTTP sessions to server B and host A initiates one HTTP session B hosts A and C and server B each have their own unique IP address A , C and B, respectively host C assigns two different source port number its two HTTP connections. Because host A is choosing source port number independently of C. It might also assign a source port of 61452 to its HTTP connection. Nevertheless sever B will still be able to correctly de multiplex the two connection having the same source port number since the two connections have different source IP addresses.
figure two clients using the same destination port unmber (80) to communicate with the same web server application
Define Decoder? A device or program that translates encoded data into its original format (e.g. it decodes the data). The term is often used in reference to MPEG-2 video and so
Describe at one disadvantage of a peer to peer network. When you are accessing the resources that are shared by one of the workstations on the network, that workstation takes
DNS ID hacking The Dns use ID system in order to keep track of each every request and replies. In order to spoof the DNS’s response, the hacker needs to do ID Hacking. In orde
Q. How is computer networks used in Financial services? Financial services: Today's financial services are totally depended on networks. Application includes credit history
Selective Repeat (SR) Selective repeats is a connection oriented protocols in which transmitter and receiver have a window of sequence numbers. SR scheme avoids the unne
Originally Linux/UNIX systems had one all-powerful user called root that managed systems. Discuss the risks of having a single root user and how more limited management abilities c
What is the different type of networking / internetworking devices? 1. Repeater: Also known as a regenerator, it is an electronic device that operates only at physical layer.
Briefly describe NAT and RIP NAT is Network Address Translation. This is a protocol that gives a way for multiple computers on a common network to share one connection to the I
QUESTION 1 (a) Draw a use-case model for the above system. You must identify all possible actors and use-cases. (b) Assume you are using the Rational Unified Process a
Token Passing Station is able to send only when it receives a special frame called a token Token circulates around the ring If station wishes to sen
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd