Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Connectionless Multiplexing  and De multiplexing

Java program running in a host can create a UDP socket  with the  line

Datagram's socket my socket =  new datagram's socket

When a UDP socket  is created in this  manner the transport  layer  automatically assigns  a port  number to the socket.  In particular  the transport  layer assigns a port  number in the range  1024 to 65535 that  is currently not being used  by any  other UDP  port in the  host.  Alternatively a java  program could create  a socket  with the line.

Datagram socket  my socket =  new  data grams socket 9157

In this  cases the  application assigns a specific port number namely 9157 to the UDP  socket. If  the application  developer writing the code  were implementing the server side  of a well known protocol. Then  the developer would have  to assign the corresponding well  known protocol. Then  the developer  would  have t assign the corresponding  well known  port number typically  the client  side of the application. The transport  layers  automatically  assign  the port  number whereas the server side  of the application assigns a specific  port number

Suppose a process in host a with  USP  port 9157  wants  to send  a chunk of  applications data to  process will UDP  post 64281 in host B. The  transport layer in host  a creates a transport layer segment that  includes the application data the source port number 9157 the destination port  number 64281 and  two other values. The  transport  layer than  passes the resulting segment to the network layer. The  network layer encapsulates the segment in an IP datagram and makes a best effort attempt to deliver the segment to the receiving  host. If  the segment  arrives at the receiving host. B could be running  receiving host examines the destination port number in the segment 64281 and delivers  the segment to its socket identified by port 64281. Note that host B could be  running  multiple processes  each with  it own UDP socket  and associated  port  number. As USP segments  arrive from  the network host B  directs  each segment the  appropriate socket by examining  the segment  destination port number.

It is  important  to note  that UDP  socket is fully  identified by a two  tuple  consisting of a  destination IP address  and destination port number  as a consequence if two USP segments  have different  source  IP addresses  and source port numbers. But  have the same  destination IP address and destination port  number  then the two  segments  will be directed to the  same destination  process via the  same  destination socket.

The  purpose of  source  port number is shown in figure 44. In A to B segment  the source  port number solves as part of a return address when B wants to send a segment back  to A the destination port in  the B to A  segment will take  its vale from  the source  port value  of the A to B segment. In UDP server layer  servers a method to extract the  port number  form the  segment it receives from  the client it the sends a new  segment  to the  client  with  the extracted source  port number  serving as the destination  port number  in this  new  segment.

 

 

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M9527237

Have any Question?


Related Questions in Computer Network & Security

Buffer overflowthe common vulnerabilities and exposures cve

Buffer overflow The "Common Vulnerabilities and Exposures" (CVE) is a list of cybersecurity vulnerabilities that have been discovered, and they are collected in a database for everyone to see and improve or patch their s ...

Metasoft ltd is a software development company which works

MetaSoft Ltd is a software development company which works across Australia and New Zealand. The company is considering the following strategic proposal: - They plan to close down the Melbourne data centre rather than up ...

Question suppose you work in a network security company and

Question: Suppose you work in a network security company, and you need to prepare a survey report of a particular security issue of wireless networking. To start with, select an area of wireless network security. We have ...

A run in a setting is a substring of length at least two as

A run in a setting is a substring of length at least two, as long as possible, and consisting entirely of the same symbol. For instance, the string abbbaab contains a run of b's of length three and a run of a's of length ...

Shadow register setsa describe the use of shadow register

Shadow Register Sets a. Describe the use of shadow register sets. b. How many shadow register sets are supported? c. What instructions are used to move data between them? Floating Point Numbers. We have heretofore focuse ...

Sip encodingwhy does the session initiation protocol sip

SIP, ENCODING Why does the session initiation protocol SIP allow the sender and receiver to choose two different multimedia encoding schemes? Describe a scenario where it makes sense to use different protocols for sender ...

Wireless sensor networks wsn let users to access servers

Wireless Sensor Networks (WSN) let users to access servers, printers, and other network resources regardless of their location, within the wireless reach. This flexibility means that, for example, a user's laptop stays c ...

If a router is attached to a network with a base ip address

If a router is attached to a network with a base IP address of 198.10.0.0/20 and receives a packet addressed to 198.10.10.144, answer the following questions: What is the network mask used by the router? (in dotted decim ...

Overview of network security assessment - security

Overview of Network Security Assessment - Security Challenges in Emerging Networks Purpose of the assessment - The purpose of this assignment is to develop skills to independently think of innovation. Students will be ab ...

Consider the following series of paymentsyear 0 20year 1

Consider the following series of payments: Year 0: 20 Year 1: 30 Year 2: 40 Year 3: 10 Year 4: 5 Using an interest rate of 10%: a. What is the present value of this series of payments? b. What is the future value of this ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As