Connection oriented multiplexing and de multiplexing, Computer Networking

Assignment Help:

Connection Oriented Multiplexing And De multiplexing

TCP socket  identified by 4 tuple:

a.Source IP address

b.Source port number

c.Destination IP address

d.Destination port number

When a TCP segment  arrives  form the  network  to a host  the host  uses all  four values  to direct the segment  to the appropriate socket. In  particulars with different source IP  addresses or source port numbers will be  directed to two different socket.

The  server  host may support  may is simultaneous TCP sockets  with each  socket attached to a process  and with each  socket  identified by its  own  four tuple  when a TCP  segment  arrives  to the  host all  fours fields are used to direct the segment to the appropriate socket.

The  situations illustrated in figure in which host  c initiates two HTTP sessions to server B and  host A initiates one HTTP session B hosts A  and C and server B each have their own  unique IP address A , C and B, respectively  host  C assigns two different  source port  number its two  HTTP  connections. Because  host A is choosing  source  port number  independently of C. It  might  also assign a source  port of 61452 to its  HTTP connection. Nevertheless sever B will still  be able to correctly  de multiplex the two  connection  having  the same  source  port number since the two  connections  have different  source  IP addresses.

213_Connection Oriented Multiplexing And De multiplexing.png

figure two clients using the same destination port  unmber (80) to communicate with  the same web server  application


Related Discussions:- Connection oriented multiplexing and de multiplexing

Reliable data transfer over a channel bit error rdt : 20, Reliable  data...

Reliable  data  transfer over a channel bit error  rdt : 20 A more realist model  of the underlying  channel  is one  in which  bits in packet may be  computed. Such  bit erro

Determine the term - backend lan, Determine the term - Backend LAN Back...

Determine the term - Backend LAN Backend networks are used to interconnect large systems like mainframes, supercomputers, and mass storage devices. The key needs here is for bu

Data bandwidth requirements, Calculate data bandwidth requirements from and...

Calculate data bandwidth requirements from and to each site.

Which osi reference layer is concerned with logical address, There are two ...

There are two logical addressing :- a) Datalink is physical (hardware) addressing. b) Network is logical (software) addressing.

Comparative study between mpls and public internet, i want an assignment wi...

i want an assignment with 2500 words on this topic with Harvard referencing on 22th of dec can i get it ?

Name the connecting devices of bridges, Connecting Devices of bridges -...

Connecting Devices of bridges - Five kinds: - Repeaters - Hubs - Bridges - Two- and three-layer switches - Repeaters and hubs - layer one of Internet model -

Vpn technology - point to point , VPN Technology For an organization  ...

VPN Technology For an organization  VPN  technology  uses some main  techniques for privacy a.Encryption /Authentication b.Tunnelling c.Fire walls

How to prepare the network- ccna, Prepare the Network Cable a network ...

Prepare the Network Cable a network that is similar to the one in the topology diagram.  You can use any current switch in your lab as long as it has the needed interfaces

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd