Question

In: Computer Science

Discuss how demultiplexing is carried out using TCP and UDP. (8 marks) Please make a table,...

Discuss how demultiplexing is carried out using TCP and UDP.

Please make a table, one side FULLY explaining how demultiplexing is carried out using TCP and the other side FULLY explaining how demultiplexing is carried out using UDP.

Solutions

Expert Solution

Answer:

Demultiplexing in a network:

Transport layer gathers chunks of data it receives from different sockets and encapsulate them with transport headers. Passing these resulting segments to the network layer is called multiplexing. The reverse process which is delivering data to the correct socket by the transport layer is called demultiplexing.

Demultiplexing at TCP

(Transmission Control Protocol )

Demultiplexing at UDP

(User Datagram Protocol)

As TCP is a connection oriented protocol, In TCP, the receiver host uses all of source IP, source port, destination IP and destination port to direct datagram to appropriate socket. UDP is a connectionless protocol, so in UDP, the receiver only checks destination port number to direct the datagram.
In TCP the data is transmitted in a particular sequence which means that packets arrive in-order at the receiver.Retransmission of data packets is possible in TCP in case packet get lost or need to resend. On other hand there is no sequencing of data in UDP in order to implement ordering it has to be managed by the application layer.On other hand retransmission of packets is not possible in UDP.

Hope this will be helpful for you............Thanks.


Related Solutions

What is UDP and how does it work? What are the differences between TCP and UDP?....
What is UDP and how does it work? What are the differences between TCP and UDP?. Provide examples (if applicable) to support your comparative review.
UDP and TCP use 1s complement for their checksums. Suppose you have the following three 8-bit...
UDP and TCP use 1s complement for their checksums. Suppose you have the following three 8-bit bytes: 01010011, 01100110, 01110100. a) What is the 1s complement of the sum of these 8-bit bytes? (Note that although UDP and TCP use 16-bit words in computing the checksum, for this problem you are being asked to consider 8-bit sums.) b) Why is it that UDP takes the 1s complement of the sum; that is, why not just use the sum? c) With...
Discuss how Maxwell's predictions were confirmed by the experiments carried out by Hertz. Please use own...
Discuss how Maxwell's predictions were confirmed by the experiments carried out by Hertz. Please use own words at least 2 paragraphs.
b) UDP does not provide end to end flow control, but TCP does. Explain how this...
b) UDP does not provide end to end flow control, but TCP does. Explain how this is achieved using sequence numbers. Give an example where a packetized message sent using UDP is received incorrectly, but when using TCP it is received correctly under same circumstances without channel errors.                                                                     
Describe how DDoS attacks may be mounted against TCP and UDP services. In what way will...
Describe how DDoS attacks may be mounted against TCP and UDP services. In what way will being connection-oriented be different for TCP and UDP?
Using a TCP SYN spoofing attack, the attacker aims to flood the table of TCP connection...
Using a TCP SYN spoofing attack, the attacker aims to flood the table of TCP connection requests on a system so that it is unable to respond to legitimate connection requests. Consider a server system with a table for 256 connection requests. This system will retry sending the SYN-ACK packet five times when it fails to receive an ACK packet in response, at 30 second intervals, before purging the request from its table. Assume that no additional countermeasures are used...
Using a TCP SYN spoofing attack, the attacker aims to flood the table of TCP connection...
Using a TCP SYN spoofing attack, the attacker aims to flood the table of TCP connection requests on a system so that it is unable to respond to legitimate connection requests. Consider a server system with a table for 256 connection requests. This system will retry sending the SYN-ACK packet five times when it fails to receive an ACK packet in response, at 30 second intervals, before purging the request from its table. Assume that no additional countermeasures are used...
Discuss how TCP provides fairness.
Discuss how TCP provides fairness.
Discuss how the immigration policies carried out by the President Trump and the President Obbama affect...
Discuss how the immigration policies carried out by the President Trump and the President Obbama affect the United States, and how immigration in general is viewed in the U.S. While immigration policy is made by federal government according to the Constitution, what role should states have, if any, in influencing policy?
Identify a man-made threat on an asset. Discuss how the threat was carried out. What steps...
Identify a man-made threat on an asset. Discuss how the threat was carried out. What steps did the attacker take prior, during, and after threat? Could this situation have been handled better? Explain.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT