Connection oriented multiplexing and de multiplexing, Computer Networking

Connection Oriented Multiplexing And De multiplexing

TCP socket  identified by 4 tuple:

a.Source IP address

b.Source port number

c.Destination IP address

d.Destination port number

When a TCP segment  arrives  form the  network  to a host  the host  uses all  four values  to direct the segment  to the appropriate socket. In  particulars with different source IP  addresses or source port numbers will be  directed to two different socket.

The  server  host may support  may is simultaneous TCP sockets  with each  socket attached to a process  and with each  socket  identified by its  own  four tuple  when a TCP  segment  arrives  to the  host all  fours fields are used to direct the segment to the appropriate socket.

The  situations illustrated in figure in which host  c initiates two HTTP sessions to server B and  host A initiates one HTTP session B hosts A  and C and server B each have their own  unique IP address A , C and B, respectively  host  C assigns two different  source port  number its two  HTTP  connections. Because  host A is choosing  source  port number  independently of C. It  might  also assign a source  port of 61452 to its  HTTP connection. Nevertheless sever B will still  be able to correctly  de multiplex the two  connection  having  the same  source  port number since the two  connections  have different  source  IP addresses.

213_Connection Oriented Multiplexing And De multiplexing.png

figure two clients using the same destination port  unmber (80) to communicate with  the same web server  application

Posted Date: 3/9/2013 5:00:54 AM | Location : United States







Related Discussions:- Connection oriented multiplexing and de multiplexing, Assignment Help, Ask Question on Connection oriented multiplexing and de multiplexing, Get Answer, Expert's Help, Connection oriented multiplexing and de multiplexing Discussions

Write discussion on Connection oriented multiplexing and de multiplexing
Your posts are moderated
Related Questions
QUESTION 1 (a) Draw a use-case model for the above system. You must identify all possible actors and use-cases. (b) Assume you are using the Rational Unified Process a

IGRP is a distance vector routing protocol designed by Cisco. The maximum hop count is 255, and it uses a combination of variables to verify a composite metric. IGRP has an adminis

Q. Show the Class A Addresses? Class A Addresses Numerically the lowest Use merely one byte to identify the class type and netid Three bytes are obtainable

Let's imagine that we have 2 TCP clients. A simple one (modTCPClient.c) like the one you wrote in the first part of project 2 and another one (modTCPClient1.c) that after it connec

Reference models Designing  implementing and  manufacturing  computer  networks  and related  devices  are very  complex  activities. Therefore in order  for this  technolog

Hyper Cube A Hypercube interconnection network is increament  of cube network. Hypercube interconnection network for n ≥ 3, can be distinct recursively as follow: For n = 3,

How Firewall configuration makes all the difference The greatest blunder that any company make is to just install a firewall and think that they have ensured perfect securit

Authoritative DNS Servers Every  organization with publicly  accessible hosts  ( such  as web  server and mail  several  on the  internet  must  provide  publicly accessible D

S t d "B" 9 m C-BAND EARTH STATION (2001)   This  Earth  Station  is  aligned  with  INTEL  SAT  IOR  66°  and  provide domestic connectivity. R-Sat (Regional Satellite) i

Q. Show the Use of flow control? Flow control denotes to a set of procedures used to restrict the amount of data that the sender can send before waiting for Error Control