Multiplexing and demultiplexing are complementary processes used in data transmission. Multiplexing combines multiple data signals into a single transmission path, while demultiplexing separates a combined signal back into its original components.
1. MULTIPLEXING AND DEMULTIPLEXING:
• Multiplexing and Demultiplexing services are provided in
almost every protocol architecture ever designed. UDP and
TCP perform the demultiplexing and multiplexing jobs by
including two special fields in the segment headers: the source
port number field and the destination port number field.
• Multiplexing -
Gathering data from multiple application processes of the sender,
enveloping that data with a header, and sending them as a whole to the
intended receiver is called multiplexing.
2. • Demultiplexing -
Delivering received segments at the receiver side to the
correct app layer processes is called demultiplexing.
• In this we have Frequency,Time,Wavelength
3. CLASSES OF IP ADDRESSING:
CLASS A:
• IP addresses belonging to class A are assigned to the networks that contain
a large number of hosts.
• The network ID is 8 bits long.
• The host ID is 24 bits long.
• The higher-order bit of the first octet in class A is always set to 0.The
remaining 7 bits in the first octet are used to determine network ID.The 24
bits of host ID are used to determine the host in any network.The default
subnet mask for Class A is 255.x.x.x.Therefore, class A has a total of:
• 224
- 2 = 16,777,214 host ID
• IP addresses belonging to class A ranges from 1.x.x.x – 126.x.x.x.
5. CLASS B:
• IP address belonging to class B is assigned to networks that range from
medium-sized to large-sized networks.
• The network ID is 16 bits long.
• The host ID is 16 bits long.
• The higher-order bits of the first octet of IP addresses of class B are always
set to 10.The remaining 14 bits are used to determine the network ID.The
16 bits of host ID are used to determine the host in any network.The default
subnet mask for class B is 255.255.x.x. Class B has a total of:
• 214
= 16384 network address
• 216
- 2 = 65534 host address
• IP addresses belonging to class B ranges from 128.0.0.0 – 191.255.255.255.
7. CLASS C:
• IP addresses belonging to class C are assigned to small-sized networks.
• The network ID is 24 bits long.
• The host ID is 8 bits long.
• The higher-order bits of the first octet of IP addresses of class C is always
set to 110.The remaining 21 bits are used to determine the network ID.The
8 bits of host ID are used to determine the host in any network.The default
subnet mask for class C is 255.255.255.x. Class C has a total of:
• 221
= 2097152 network address
• 28
– 2 = 254 host address
• IP addresses belonging to class C range from 192.0.0.0 – 223.255.255.255.
9. CLASS D:
• IP address belonging to class D is reserved for multi-casting.The higher-
order bits of the first octet of IP addresses belonging to class D is always set
to 1110.The remaining bits are for the address that interested hosts
recognize.
• Class D does not possess any subnet mask. IP addresses belonging to class
D range from 224.0.0.0 – 239.255.255.255.
10. CLASS E:
• IP addresses belonging to class E are reserved for experimental and
research purposes. IP addresses of class E range from 240.0.0.0 –
255.255.255.255.This class doesn’t have any subnet mask.The higher-order
bits of the first octet of class E are always set to 1111.
12. VPN(VIRTUAL PRIVATE NETWORK)
• VPN stands for Virtual Private Network. It is a technology that provides a
secure and encrypted connection between a user's device and the internet.
A VPN creates a private network over a public network, such as the internet,
allowing users to send and receive data as if their devices were directly
connected to a private network.
• When you connect to a VPN, your device establishes an encrypted tunnel to
the VPN server. All the data transmitted between your device and the VPN
server is encrypted, making it difficult for anyone else to intercept or access
your data.This encryption ensures that your online activities, including
browsing history, messages, file transfers, and other internet traffic, remain
private an d secure.
13. KEY BENEFITS OF USING A VPN:
• Privacy: A VPN masks your IP address, making it difficult for websites, advertisers, and other
entities to track your online activities. It enhances your privacy and anonymity while
browsing the internet.
• Security:The encryption provided by a VPN ensures that your data is protected from
eavesdropping, especially when using public Wi-Fi networks or accessing the internet from
insecure locations.
• Access to Restricted Content:VPNs allow you to bypass geographical restrictions and access
content that may be blocked or limited in your location. By connecting to a VPN server in a
different country, you can appear as if you are browsing from that location and access region-
restricted websites or services.
• Remote Access:VPNs enable secure remote access to private networks.They are commonly
used by businesses to provide employees with secure access to company resources when
working remotely.
• Protection against Internet Censorship: In regions where internet access is heavily restricted
or censored, a VPN can help bypass these restrictions and access blocked websites and
services
15. OVERVIEW OF
TCP(TRANSMISSION CONTROL PROTOCOL)
• Transmission Control Protocol (TCP) is a connection-oriented
protocol for communications that helps in the exchange of
messages between different devices over a network
• It is one of the main protocols of the TCP/IP suite. In OSI model, it
operates at the transport layer(Layer 4). It lies between the
Application and Network Layers which are used in providing
reliable delivery services.
16. • TCP establishes a reliable connection between sender and receiver using
the three-way handshake (SYN, SYN-ACK, ACK).
17. ADVANTAGES:
• It is a reliable protocol.
• It provides an error-checking mechanism as well as one for recovery.
• It gives flow control.
• It makes sure that the data reaches the proper destination in the exact order
that it was sent.
• It is a well-documented and widely implemented protocol, maintained by
standards organizations like the IETF (Internet Engineering Task Force).
• It works in conjunction with IP (Internet Protocol) to establish connections
between devices on a network.
18. DISADVANTAGES:
• TCP is made for Wide Area Networks, thus its size can become
an issue for small networks with low resources.
• TCP runs several layers so it can slow down the speed of the
network.
• It is not generic in nature. It cannot represent any protocol stack
other than the TCP/IP suite. E.g., it cannot work with a Bluetooth
connection.
• No modifications since their development around 30 years ago.
20. OVERVIEW OF UDP :
• User Datagram Protocol (UDP) is one of the core protocols of
the Internet Protocol (IP) suite. It is a communication protocol
used across the internet for time-sensitive transmissions such
as video playback or DNS lookups .
• Unlike Transmission Control Protocol (TCP), UDP is
connectionless and does not guarantee delivery, order, or error
checking, making it a lightweight and efficient option for
certain types of data transmission.
23. DIFF BET TCP&UDP
• TCP is a connection-oriented
protocol.
• TCP is reliable as it guarantees the
delivery of data to the destination
router.
• TCP provides extensive error-
checking mechanisms
• An acknowledgment segment is
present.
• UDP is the Datagram-oriented
proto
• The delivery of data to the
destination cannot be guaranteed
in UDP.
• UDP has only the basic error-
checking mechanism using
checksums.
• No acknowledgment segment.
24. INTERNET CONTROL MESSAGE PROTOCOL (ICMP)
• ICMP is used for reporting errors and management queries. It
is a supporting protocol and is used by network devices like
routers for sending error messages and operations information.
For example, the requested service is not available or a host or
router could not be reached.