Connectionless multiplexing and de multiplexing, Computer Networking

Assignment Help:

Connectionless Multiplexing  and De multiplexing

Java program running in a host can create a UDP socket  with the  line

Datagram's socket my socket =  new datagram's socket

When a UDP socket  is created in this  manner the transport  layer  automatically assigns  a port  number to the socket.  In particular  the transport  layer assigns a port  number in the range  1024 to 65535 that  is currently not being used  by any  other UDP  port in the  host.  Alternatively a java  program could create  a socket  with the line.

Datagram socket  my socket =  new  data grams socket 9157

In this  cases the  application assigns a specific port number namely 9157 to the UDP  socket. If  the application  developer writing the code  were implementing the server side  of a well known protocol. Then  the developer would have  to assign the corresponding well  known protocol. Then  the developer  would  have t assign the corresponding  well known  port number typically  the client  side of the application. The transport  layers  automatically  assign  the port  number whereas the server side  of the application assigns a specific  port number

Suppose a process in host a with  USP  port 9157  wants  to send  a chunk of  applications data to  process will UDP  post 64281 in host B. The  transport layer in host  a creates a transport layer segment that  includes the application data the source port number 9157 the destination port  number 64281 and  two other values. The  transport  layer than  passes the resulting segment to the network layer. The  network layer encapsulates the segment in an IP datagram and makes a best effort attempt to deliver the segment to the receiving  host. If  the segment  arrives at the receiving host. B could be running  receiving host examines the destination port number in the segment 64281 and delivers  the segment to its socket identified by port 64281. Note that host B could be  running  multiple processes  each with  it own UDP socket  and associated  port  number. As USP segments  arrive from  the network host B  directs  each segment the  appropriate socket by examining  the segment  destination port number.

It is  important  to note  that UDP  socket is fully  identified by a two  tuple  consisting of a  destination IP address  and destination port number  as a consequence if two USP segments  have different  source  IP addresses  and source port numbers. But  have the same  destination IP address and destination port  number  then the two  segments  will be directed to the  same destination  process via the  same  destination socket.

The  purpose of  source  port number is shown in figure 44. In A to B segment  the source  port number solves as part of a return address when B wants to send a segment back  to A the destination port in  the B to A  segment will take  its vale from  the source  port value  of the A to B segment. In UDP server layer  servers a method to extract the  port number  form the  segment it receives from  the client it the sends a new  segment  to the  client  with  the extracted source  port number  serving as the destination  port number  in this  new  segment.

 

 


Related Discussions:- Connectionless multiplexing and de multiplexing

Why routine security audits are essential, Why Routine security audits are ...

Why Routine security audits are essential It is essential that regular security audits are conducted to find out physically which computer is connected and permits access to

Protocols and standards - cable network architecture, Q. Protocols and Stan...

Q. Protocols and Standards - Cable Network Architecture? - Essential in creating as well as maintaining an open and competitive market for equipment manufacturers and in guaran

Security mechanism, How can the use of NAT and PAT, be considered a securit...

How can the use of NAT and PAT, be considered a security mechanism? Research the acronym(s) if it is not a part of your collection.

What are the drawbacks of ethernet cabling, What are the drawbacks of Ether...

What are the drawbacks of Ethernet Cabling? The Ethernet cabling ahs the following drawbacks: 1. Ethernet is not a high-level performer in high-load environments. This proto

Benefits of mpls vpn- wireless technology, 1) The school has implemented a ...

1) The school has implemented a pilot MPLS VPN which is being evaluated to replace the Bell South Frame Relay solution that provides connectivity to the Bascom Palmer Eye-Institute

Configure basic switch parameters- ccna, Configure basic switch parameters....

Configure basic switch parameters. Configure the S1, S2, and S3 switches according to the following guidelines: Configure the switch hostname. Disable DNS lookup.

Telecommunication switching system, if the signal input to an amplifier is ...

if the signal input to an amplifier is 0 dBm what is the power output in mW if the gain of the amplifier is 20 dB ?

Virtual local area network, VLAN ( Virtual Local Area Network) is a concept...

VLAN ( Virtual Local Area Network) is a concept of creating distinct broadcast domains. It is a network which aims at partitioning the physical network. VLAN comprises all the attr

No retransmission - transport layer, No Retransmission This  protocols...

No Retransmission This  protocols  will not  through  the correctly received packets  but buffers than  and send  acknowledgment  for those packets. Thus  retransmission of th

Explain the working of ISDN, Explain the working of ISDN Stands for ...

Explain the working of ISDN Stands for Integrated Services Digital Network. It is a way to move more data over existing regular phone lines. ISDN is rapidly becoming availab

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd