Connection oriented multiplexing and de multiplexing, Computer Networking

Connection Oriented Multiplexing And De multiplexing

TCP socket  identified by 4 tuple:

a.Source IP address

b.Source port number

c.Destination IP address

d.Destination port number

When a TCP segment  arrives  form the  network  to a host  the host  uses all  four values  to direct the segment  to the appropriate socket. In  particulars with different source IP  addresses or source port numbers will be  directed to two different socket.

The  server  host may support  may is simultaneous TCP sockets  with each  socket attached to a process  and with each  socket  identified by its  own  four tuple  when a TCP  segment  arrives  to the  host all  fours fields are used to direct the segment to the appropriate socket.

The  situations illustrated in figure in which host  c initiates two HTTP sessions to server B and  host A initiates one HTTP session B hosts A  and C and server B each have their own  unique IP address A , C and B, respectively  host  C assigns two different  source port  number its two  HTTP  connections. Because  host A is choosing  source  port number  independently of C. It  might  also assign a source  port of 61452 to its  HTTP connection. Nevertheless sever B will still  be able to correctly  de multiplex the two  connection  having  the same  source  port number since the two  connections  have different  source  IP addresses.

213_Connection Oriented Multiplexing And De multiplexing.png

figure two clients using the same destination port  unmber (80) to communicate with  the same web server  application

Posted Date: 3/9/2013 5:00:54 AM | Location : United States







Related Discussions:- Connection oriented multiplexing and de multiplexing, Assignment Help, Ask Question on Connection oriented multiplexing and de multiplexing, Get Answer, Expert's Help, Connection oriented multiplexing and de multiplexing Discussions

Write discussion on Connection oriented multiplexing and de multiplexing
Your posts are moderated
Related Questions
Q. Explain the Bit-Level Encryption? Bit-Level Encryption - Data is divided into blocks of bits then altered by encoding/decoding, permutation, substitution, exclusive OR

What is OLTP? In the transaction server, the client component usually contains GUI and the server components usually having of SQL transactions against a database. These applic

How Does a Firewall Protect Firewalls work by controlling the information that comes in and out of the network. By using the Application Proxy service, the flow of information



Controlling and monitoring access to the Intranet Digital certificates provide excellent means of controlling and monitoring access to the Intranets. The certificate itself act

Question: a) In route-optimized communication, a mobile node sends packets to a correspondent using the home address present in the destination option. Why does the design use

VLAN - Virtual Local Area Network Vlan is a logical grouping or segmenting a network linked to administratively described ports on a switch, they give Broadcast control, Securit

What is the difference between a straight-through and crossover cable? A straight-through cable is used to connect computers to a hub, switch, or router. A crossover cable is u

THIN ETHERNET WIRING: Thin Ethernet needs thin coax cable that is cost effective and easier to install than thick Ethernet coax. In this case transceiver electronics are creat