Multiplexing and de multiplexing, Computer Networking

Assignment Help:

Multiplexing  and De multiplexing

Another  critical set of services that are provided by the transport layer is that of application multiplexing and de multiplexing. This feature allows multiple applications to use the network simultaneously and ensure that the transport layer can differentiate  the data it receives from  the lower  layer according  to the application  or process to which  the data belong. To achieve this  segment headers at the data segment  headers at the transport layer have  a set of fields to determine the process to which the segment data are to be delivered. At the receiver these fields  are examined to determine the process to which  the data segment  belong  and the segment it then directed to that process. This functions at the receiver transport layer that  delivers the data it receivers to the correct application   process is called de multiplexing. The process at the sender where information about the   various  active processes is collected and the corresponding information is incorporated in the segment  headers to be given to  the lower layers  is called multiplexing

Transport  layer multiplexing  and de multiplexing that is extending the  host to host  delivery  service  provided  by the  network layer  to a process to process delivery  service  for application running  on the  hosts. At the destination host layer has the responsibility  of   delivering the data  in these segments to  the appropriation process  application process running  in the  host. As we have previously discussed that  a process as part of a network application  can have one or more sockets doors through which data passes from the network to the  layer in the receiving host does not actually deliver data  directly to a process but instead to an intermediary socket. Because at any given  time there  can be more than  one socket   in the  receiving host  each  socket  has a unique identifier. The  format  of the  identifier depends on whether the socket  in a UDP or in a TCP socket.

615_multiplexing-demultiplexing.gif

                                                                                   figure Multiplexing/ demultiplexing

Each transport layer  segment receiving  host  has a set  fields  in the segment for directs an  incoming  transport layer segments  to the appropriate socket. At the receiving  end the transport  layer examines  these fields  to identity  the  receiving socket and then  directs the segment to that socket this job of delivering the data  in a transport layer segment to the correct socket is called   de multiplexing . the job of gathering data chunks  at the  source host form  different  and passing the segments to  the network  layer is called multiplexing. Note  that the  transport  layer in  the middle  host  in figure must de multiplex  segments  arriving.

From the network  layer  bellow  to either process  p or p above  this is done  by directing the  arriving  segments  data the  to the  corresponding  process socket. The  transport  layer  in the middle  host  must also  gather  outgoing  data from  these  sockets, form  transport  layer  segments  and pass there  segments down  to the network  to the network  layer.

Let  us examine how transport layer  multiplexing and  de multiplexing is  actually done  in a host. We know  that  transport layer multiples in requires that sockets  unique  identifiers and that each segment have special fields that indicate the socket to which the  segment is to be delivered. These special fields illustrated in figure are the source  part number field  and the destination port number filed. The  port numbers ranging  from 1 to 1023 are called  well know  port numbers and are restricted which  means that they are reserved for use  by well know  application protocols  such as HTTP which  use post number 80  and FTP which use port number 21.

Service  of transport layer de multiplexing  each  socket in the host  can be assigned a port  number and when  a segment  arrives to the host the transport  layer  examines  the destination post number in the segment  and directs the  segments to the  corresponding  sockets. The  segments  data then  passes  through the sockets into the  attached process.

 


Related Discussions:- Multiplexing and de multiplexing

Data communications and networks, A magazine publisher based in Nairobi has...

A magazine publisher based in Nairobi has branch in Kisumu, and one in Mombasa. The company has kept in touch by telephone and courier service. Each office is networked. The networ

Dynamic process groups in parallel virtual machine , Dynamic Process Groups...

Dynamic Process Groups To generate and manage dynamic groups, a separate library libgpvm3.a must be connected with the user programs that make use of any of the set functions.

Features of transmission control protocol, The major features of TCP are fo...

The major features of TCP are following: Reliability : TCP ensures that any data sent by a sender arrives at the destination as it was sent. There cannot be any data loss or mo

Subscriber database - computer network, Subscriber Database Core ne...

Subscriber Database Core network  also hosts  the subscribers  database ( for e, g HLR in GSM systems). Subscriber  database  is accessed by core  network  nodes fro  funct

Comparing transport for tcp/ip and osi model, Q. Comparing Transport for TC...

Q. Comparing Transport for TCP/IP and osi model? - The features of TCP and UDP defined at TCP/IP Transport Layer correspond to many of the requirements of the OSI Transport Lay

Routing by rumor, What is the major issue with routing by rumor?

What is the major issue with routing by rumor?

What is redundancy, What is Redundancy? The method of including extra i...

What is Redundancy? The method of including extra information in the transmission solely for the purpose of comparison. This technique is known as redundancy.

Disadvantages of ip sec tunnelling mode, Disadvantages of IP sec  Tunnelli...

Disadvantages of IP sec  Tunnelling mode IP sec  tunnelling  mode has the  following  disadvantage a.Encryption of  small  packets  generates a lot  networks  over head  thu

How big can an intranet be, How big can an Intranet be? An Intranet ca...

How big can an Intranet be? An Intranet can be as big as a community of interest. Scale is an important factor in web implementation, but it has no bearing on the logical asso

Advantage of ip sec tunnelling mode, Advantage of IP sec  Tunnelling Mode ...

Advantage of IP sec  Tunnelling Mode IP Sec  tunnelling mode  has the  following  advantages: a.Security : Ts IP sec tunnelling mode  secure somewhat but  not the best. In a

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd