Connection oriented multiplexing and de multiplexing, Computer Networking

Assignment Help:

Connection Oriented Multiplexing And De multiplexing

TCP socket  identified by 4 tuple:

a.Source IP address

b.Source port number

c.Destination IP address

d.Destination port number

When a TCP segment  arrives  form the  network  to a host  the host  uses all  four values  to direct the segment  to the appropriate socket. In  particulars with different source IP  addresses or source port numbers will be  directed to two different socket.

The  server  host may support  may is simultaneous TCP sockets  with each  socket attached to a process  and with each  socket  identified by its  own  four tuple  when a TCP  segment  arrives  to the  host all  fours fields are used to direct the segment to the appropriate socket.

The  situations illustrated in figure in which host  c initiates two HTTP sessions to server B and  host A initiates one HTTP session B hosts A  and C and server B each have their own  unique IP address A , C and B, respectively  host  C assigns two different  source port  number its two  HTTP  connections. Because  host A is choosing  source  port number  independently of C. It  might  also assign a source  port of 61452 to its  HTTP connection. Nevertheless sever B will still  be able to correctly  de multiplex the two  connection  having  the same  source  port number since the two  connections  have different  source  IP addresses.

213_Connection Oriented Multiplexing And De multiplexing.png

figure two clients using the same destination port  unmber (80) to communicate with  the same web server  application


Related Discussions:- Connection oriented multiplexing and de multiplexing

asymmetric multiprocessing, Describe what is meant by Asymmetric Multiproc...

Describe what is meant by Asymmetric Multiprocessing (AMP)? Ans) It imposses hierarchy and a division of labour between processors. Only one designated processor, the master, co

Describe about cryptography, Q. Describe about Cryptography? - Some med...

Q. Describe about Cryptography? - Some media cannot be protected from unauthorized reception (or interception) - Encryption involves transforming the original information in

Deadlock avoidance or prevention, Deadlock Avoidance To avoid deadlock...

Deadlock Avoidance To avoid deadlocks two types of strategies are used: 1) Static prevention: It uses V and P operators and Semaphores to allocate and deallocate shared res

Describe the depth penetration method for a crt, Question: (a) What do ...

Question: (a) What do you understand by the following terms related to LCDs: Reflective LCDs Backlit LCDs (b) By using an example, explain the main steps of the B

Explain a transaction server, With a transaction server, the client request...

With a transaction server, the client requests remote procedures that reside on the server with an SQL database engine. These remote processes on the server execute a group of SQL

Key features of spontaneous networking, QUESTION a) Give a detailed exp...

QUESTION a) Give a detailed explanation of the following: Some dynamics systems can be built as variations on the client server model. b) Give one main drawback of the "Thin

State the types of performance of computer hardware, State the types of per...

State the types of performance of computer hardware The hardware, i.e., the server or computer has a direct relationship on performance in the following areas: Reliabili

Networking concepts, Networking Concepts Q1  What are the main feature...

Networking Concepts Q1  What are the main features of TCP connections? Why is it said that TCP provides full-duplex service? Q2  What are the differences between TCP conne

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd