Connection oriented multiplexing and de multiplexing, Computer Networking

Assignment Help:

Connection Oriented Multiplexing And De multiplexing

TCP socket  identified by 4 tuple:

a.Source IP address

b.Source port number

c.Destination IP address

d.Destination port number

When a TCP segment  arrives  form the  network  to a host  the host  uses all  four values  to direct the segment  to the appropriate socket. In  particulars with different source IP  addresses or source port numbers will be  directed to two different socket.

The  server  host may support  may is simultaneous TCP sockets  with each  socket attached to a process  and with each  socket  identified by its  own  four tuple  when a TCP  segment  arrives  to the  host all  fours fields are used to direct the segment to the appropriate socket.

The  situations illustrated in figure in which host  c initiates two HTTP sessions to server B and  host A initiates one HTTP session B hosts A  and C and server B each have their own  unique IP address A , C and B, respectively  host  C assigns two different  source port  number its two  HTTP  connections. Because  host A is choosing  source  port number  independently of C. It  might  also assign a source  port of 61452 to its  HTTP connection. Nevertheless sever B will still  be able to correctly  de multiplex the two  connection  having  the same  source  port number since the two  connections  have different  source  IP addresses.

213_Connection Oriented Multiplexing And De multiplexing.png

figure two clients using the same destination port  unmber (80) to communicate with  the same web server  application


Related Discussions:- Connection oriented multiplexing and de multiplexing

Shared programming using library routines, Shared Programming Using Library...

Shared Programming Using Library Routines The most well-liked of them is the use of combo function called fork() and join(). Fork() function is used to make a new child proces

Connection-oriented service, The connection-oriented service process for ne...

The connection-oriented service process for networking is same to the manner in which telephones are used. This is shown as follows: A caller dials a number of the receiver. The

Firewall, confiriguration,capabilities,implementation

confiriguration,capabilities,implementation

eigrp finds its successor and feasible successor, Describe how EIGRP finds...

Describe how EIGRP finds its successor and feasible successor?

Compare error detection and error correction, Compare Error Detection and E...

Compare Error Detection and Error Correction: The correction of errors is more difficult than the detection. In error detection, checks only any error has happened. In error co

Password authentication protocols (pap), Password Authentication Protocols ...

Password Authentication Protocols (PAP) PAP  implements the  traditional username and password  authentication methods. At the  request from  an authenticator the client respon

The ip addressing scheme, An Internet address (IP address) is a unique 32-b...

An Internet address (IP address) is a unique 32-bit binary number given to a host and used for all interaction with the host. Each packet transmit across an Internet contains the 3

Define about the term - hackers, Define about the term - hackers Every ...

Define about the term - hackers Every time technology updates itself, new techniques evolve. At the same time thieves or intruders (in the information technology line, they are

What is an interrupt request, Question: a) Briefly describe the purpos...

Question: a) Briefly describe the purpose of Windows Powershell? b) Name three ways software can be installed on Linux? c) What is an interrupt request? d) As the

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd