SlideShare a Scribd company logo
MULTIPLEXING AND DEMULTIPLEXING:
• Multiplexing and Demultiplexing services are provided in
almost every protocol architecture ever designed. UDP and
TCP perform the demultiplexing and multiplexing jobs by
including two special fields in the segment headers: the source
port number field and the destination port number field.
• Multiplexing -
Gathering data from multiple application processes of the sender,
enveloping that data with a header, and sending them as a whole to the
intended receiver is called multiplexing.
• Demultiplexing -
Delivering received segments at the receiver side to the
correct app layer processes is called demultiplexing.
• In this we have Frequency,Time,Wavelength
CLASSES OF IP ADDRESSING:
CLASS A:
• IP addresses belonging to class A are assigned to the networks that contain
a large number of hosts.
• The network ID is 8 bits long.
• The host ID is 24 bits long.
• The higher-order bit of the first octet in class A is always set to 0.The
remaining 7 bits in the first octet are used to determine network ID.The 24
bits of host ID are used to determine the host in any network.The default
subnet mask for Class A is 255.x.x.x.Therefore, class A has a total of:
• 224
- 2 = 16,777,214 host ID
• IP addresses belonging to class A ranges from 1.x.x.x – 126.x.x.x.
Multiplexing and demultiplexing, ipv4 types
CLASS B:
• IP address belonging to class B is assigned to networks that range from
medium-sized to large-sized networks.
• The network ID is 16 bits long.
• The host ID is 16 bits long.
• The higher-order bits of the first octet of IP addresses of class B are always
set to 10.The remaining 14 bits are used to determine the network ID.The
16 bits of host ID are used to determine the host in any network.The default
subnet mask for class B is 255.255.x.x. Class B has a total of:
• 214
= 16384 network address
• 216
- 2 = 65534 host address
• IP addresses belonging to class B ranges from 128.0.0.0 – 191.255.255.255.
Multiplexing and demultiplexing, ipv4 types
CLASS C:
• IP addresses belonging to class C are assigned to small-sized networks.
• The network ID is 24 bits long.
• The host ID is 8 bits long.
• The higher-order bits of the first octet of IP addresses of class C is always
set to 110.The remaining 21 bits are used to determine the network ID.The
8 bits of host ID are used to determine the host in any network.The default
subnet mask for class C is 255.255.255.x. Class C has a total of:
• 221
= 2097152 network address
• 28
– 2 = 254 host address
• IP addresses belonging to class C range from 192.0.0.0 – 223.255.255.255.
Multiplexing and demultiplexing, ipv4 types
CLASS D:
• IP address belonging to class D is reserved for multi-casting.The higher-
order bits of the first octet of IP addresses belonging to class D is always set
to 1110.The remaining bits are for the address that interested hosts
recognize.
• Class D does not possess any subnet mask. IP addresses belonging to class
D range from 224.0.0.0 – 239.255.255.255.
CLASS E:
• IP addresses belonging to class E are reserved for experimental and
research purposes. IP addresses of class E range from 240.0.0.0 –
255.255.255.255.This class doesn’t have any subnet mask.The higher-order
bits of the first octet of class E are always set to 1111.
Multiplexing and demultiplexing, ipv4 types
VPN(VIRTUAL PRIVATE NETWORK)
• VPN stands for Virtual Private Network. It is a technology that provides a
secure and encrypted connection between a user's device and the internet.
A VPN creates a private network over a public network, such as the internet,
allowing users to send and receive data as if their devices were directly
connected to a private network.
• When you connect to a VPN, your device establishes an encrypted tunnel to
the VPN server. All the data transmitted between your device and the VPN
server is encrypted, making it difficult for anyone else to intercept or access
your data.This encryption ensures that your online activities, including
browsing history, messages, file transfers, and other internet traffic, remain
private an d secure.
KEY BENEFITS OF USING A VPN:
• Privacy: A VPN masks your IP address, making it difficult for websites, advertisers, and other
entities to track your online activities. It enhances your privacy and anonymity while
browsing the internet.
• Security:The encryption provided by a VPN ensures that your data is protected from
eavesdropping, especially when using public Wi-Fi networks or accessing the internet from
insecure locations.
• Access to Restricted Content:VPNs allow you to bypass geographical restrictions and access
content that may be blocked or limited in your location. By connecting to a VPN server in a
different country, you can appear as if you are browsing from that location and access region-
restricted websites or services.
• Remote Access:VPNs enable secure remote access to private networks.They are commonly
used by businesses to provide employees with secure access to company resources when
working remotely.
• Protection against Internet Censorship: In regions where internet access is heavily restricted
or censored, a VPN can help bypass these restrictions and access blocked websites and
services
Multiplexing and demultiplexing, ipv4 types
OVERVIEW OF
TCP(TRANSMISSION CONTROL PROTOCOL)
• Transmission Control Protocol (TCP) is a connection-oriented
protocol for communications that helps in the exchange of
messages between different devices over a network
• It is one of the main protocols of the TCP/IP suite. In OSI model, it
operates at the transport layer(Layer 4). It lies between the
Application and Network Layers which are used in providing
reliable delivery services.
• TCP establishes a reliable connection between sender and receiver using
the three-way handshake (SYN, SYN-ACK, ACK).
ADVANTAGES:
• It is a reliable protocol.
• It provides an error-checking mechanism as well as one for recovery.
• It gives flow control.
• It makes sure that the data reaches the proper destination in the exact order
that it was sent.
• It is a well-documented and widely implemented protocol, maintained by
standards organizations like the IETF (Internet Engineering Task Force).
• It works in conjunction with IP (Internet Protocol) to establish connections
between devices on a network.
DISADVANTAGES:
• TCP is made for Wide Area Networks, thus its size can become
an issue for small networks with low resources.
• TCP runs several layers so it can slow down the speed of the
network.
• It is not generic in nature. It cannot represent any protocol stack
other than the TCP/IP suite. E.g., it cannot work with a Bluetooth
connection.
• No modifications since their development around 30 years ago.
TCP SEGMENTATION STRUCTURE
OVERVIEW OF UDP :
• User Datagram Protocol (UDP) is one of the core protocols of
the Internet Protocol (IP) suite. It is a communication protocol
used across the internet for time-sensitive transmissions such
as video playback or DNS lookups .
• Unlike Transmission Control Protocol (TCP), UDP is
connectionless and does not guarantee delivery, order, or error
checking, making it a lightweight and efficient option for
certain types of data transmission.
Multiplexing and demultiplexing, ipv4 types
UDP STRUCTURE:
DIFF BET TCP&UDP
• TCP is a connection-oriented
protocol.
• TCP is reliable as it guarantees the
delivery of data to the destination
router.
• TCP provides extensive error-
checking mechanisms
• An acknowledgment segment is
present.
• UDP is the Datagram-oriented
proto
• The delivery of data to the
destination cannot be guaranteed
in UDP.
• UDP has only the basic error-
checking mechanism using
checksums.
• No acknowledgment segment.
INTERNET CONTROL MESSAGE PROTOCOL (ICMP)
• ICMP is used for reporting errors and management queries. It
is a supporting protocol and is used by network devices like
routers for sending error messages and operations information.
For example, the requested service is not available or a host or
router could not be reached.

More Related Content

PPTX
Internet protocol (ip) ppt
PPTX
Computer Networking: Internet Protcol (IP) and IP Addressing
PPT
07 - TCP_IP and the DoD Model.ppt
PPTX
ip addressing & subnet.pptx
PPTX
Internet Protocol
PPTX
IP classes
PPT
tcpip.ppt
PPT
Networking and socket
Internet protocol (ip) ppt
Computer Networking: Internet Protcol (IP) and IP Addressing
07 - TCP_IP and the DoD Model.ppt
ip addressing & subnet.pptx
Internet Protocol
IP classes
tcpip.ppt
Networking and socket

Similar to Multiplexing and demultiplexing, ipv4 types (20)

PPTX
Data link layer
PPT
PPTX
IP addressing and Subnetting PPT
PPTX
IP_ADDRESSING_AND_SUBNETTING.pptx
PPTX
IP Addressing & subnetting strategy
PPT
Tcp
PPT
Hardware9
PPTX
TCP-IP PROTOCOL
PPT
Day-3 PowerPoint
PPTX
5 configuring TCP/IP
PPTX
IP addressing seminar ppt
PPTX
IPAddressing .pptx
PPTX
IPv4 Addressing
PPTX
Linux Systems Prograramming: Unix Domain, Internet Domain (TCP, UDP) Socket P...
PPTX
Cisco networking and protocals ccna.pptx
PPTX
tcp-140613123317-phpapp01.pptx
PPS
Lesson1: Introduction To Networking Concepts
PDF
IP addressing by Mamun Sir
PPT
Chapter2ccna
Data link layer
IP addressing and Subnetting PPT
IP_ADDRESSING_AND_SUBNETTING.pptx
IP Addressing & subnetting strategy
Tcp
Hardware9
TCP-IP PROTOCOL
Day-3 PowerPoint
5 configuring TCP/IP
IP addressing seminar ppt
IPAddressing .pptx
IPv4 Addressing
Linux Systems Prograramming: Unix Domain, Internet Domain (TCP, UDP) Socket P...
Cisco networking and protocals ccna.pptx
tcp-140613123317-phpapp01.pptx
Lesson1: Introduction To Networking Concepts
IP addressing by Mamun Sir
Chapter2ccna
Ad

Recently uploaded (20)

PPTX
Welding lecture in detail for understanding
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
Construction Project Organization Group 2.pptx
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPT
Project quality management in manufacturing
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
additive manufacturing of ss316l using mig welding
PDF
Structs to JSON How Go Powers REST APIs.pdf
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Welding lecture in detail for understanding
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
CYBER-CRIMES AND SECURITY A guide to understanding
Embodied AI: Ushering in the Next Era of Intelligent Systems
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Foundation to blockchain - A guide to Blockchain Tech
Construction Project Organization Group 2.pptx
OOP with Java - Java Introduction (Basics)
CH1 Production IntroductoryConcepts.pptx
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Project quality management in manufacturing
Model Code of Practice - Construction Work - 21102022 .pdf
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Internet of Things (IOT) - A guide to understanding
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
additive manufacturing of ss316l using mig welding
Structs to JSON How Go Powers REST APIs.pdf
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Ad

Multiplexing and demultiplexing, ipv4 types

  • 1. MULTIPLEXING AND DEMULTIPLEXING: • Multiplexing and Demultiplexing services are provided in almost every protocol architecture ever designed. UDP and TCP perform the demultiplexing and multiplexing jobs by including two special fields in the segment headers: the source port number field and the destination port number field. • Multiplexing - Gathering data from multiple application processes of the sender, enveloping that data with a header, and sending them as a whole to the intended receiver is called multiplexing.
  • 2. • Demultiplexing - Delivering received segments at the receiver side to the correct app layer processes is called demultiplexing. • In this we have Frequency,Time,Wavelength
  • 3. CLASSES OF IP ADDRESSING: CLASS A: • IP addresses belonging to class A are assigned to the networks that contain a large number of hosts. • The network ID is 8 bits long. • The host ID is 24 bits long. • The higher-order bit of the first octet in class A is always set to 0.The remaining 7 bits in the first octet are used to determine network ID.The 24 bits of host ID are used to determine the host in any network.The default subnet mask for Class A is 255.x.x.x.Therefore, class A has a total of: • 224 - 2 = 16,777,214 host ID • IP addresses belonging to class A ranges from 1.x.x.x – 126.x.x.x.
  • 5. CLASS B: • IP address belonging to class B is assigned to networks that range from medium-sized to large-sized networks. • The network ID is 16 bits long. • The host ID is 16 bits long. • The higher-order bits of the first octet of IP addresses of class B are always set to 10.The remaining 14 bits are used to determine the network ID.The 16 bits of host ID are used to determine the host in any network.The default subnet mask for class B is 255.255.x.x. Class B has a total of: • 214 = 16384 network address • 216 - 2 = 65534 host address • IP addresses belonging to class B ranges from 128.0.0.0 – 191.255.255.255.
  • 7. CLASS C: • IP addresses belonging to class C are assigned to small-sized networks. • The network ID is 24 bits long. • The host ID is 8 bits long. • The higher-order bits of the first octet of IP addresses of class C is always set to 110.The remaining 21 bits are used to determine the network ID.The 8 bits of host ID are used to determine the host in any network.The default subnet mask for class C is 255.255.255.x. Class C has a total of: • 221 = 2097152 network address • 28 – 2 = 254 host address • IP addresses belonging to class C range from 192.0.0.0 – 223.255.255.255.
  • 9. CLASS D: • IP address belonging to class D is reserved for multi-casting.The higher- order bits of the first octet of IP addresses belonging to class D is always set to 1110.The remaining bits are for the address that interested hosts recognize. • Class D does not possess any subnet mask. IP addresses belonging to class D range from 224.0.0.0 – 239.255.255.255.
  • 10. CLASS E: • IP addresses belonging to class E are reserved for experimental and research purposes. IP addresses of class E range from 240.0.0.0 – 255.255.255.255.This class doesn’t have any subnet mask.The higher-order bits of the first octet of class E are always set to 1111.
  • 12. VPN(VIRTUAL PRIVATE NETWORK) • VPN stands for Virtual Private Network. It is a technology that provides a secure and encrypted connection between a user's device and the internet. A VPN creates a private network over a public network, such as the internet, allowing users to send and receive data as if their devices were directly connected to a private network. • When you connect to a VPN, your device establishes an encrypted tunnel to the VPN server. All the data transmitted between your device and the VPN server is encrypted, making it difficult for anyone else to intercept or access your data.This encryption ensures that your online activities, including browsing history, messages, file transfers, and other internet traffic, remain private an d secure.
  • 13. KEY BENEFITS OF USING A VPN: • Privacy: A VPN masks your IP address, making it difficult for websites, advertisers, and other entities to track your online activities. It enhances your privacy and anonymity while browsing the internet. • Security:The encryption provided by a VPN ensures that your data is protected from eavesdropping, especially when using public Wi-Fi networks or accessing the internet from insecure locations. • Access to Restricted Content:VPNs allow you to bypass geographical restrictions and access content that may be blocked or limited in your location. By connecting to a VPN server in a different country, you can appear as if you are browsing from that location and access region- restricted websites or services. • Remote Access:VPNs enable secure remote access to private networks.They are commonly used by businesses to provide employees with secure access to company resources when working remotely. • Protection against Internet Censorship: In regions where internet access is heavily restricted or censored, a VPN can help bypass these restrictions and access blocked websites and services
  • 15. OVERVIEW OF TCP(TRANSMISSION CONTROL PROTOCOL) • Transmission Control Protocol (TCP) is a connection-oriented protocol for communications that helps in the exchange of messages between different devices over a network • It is one of the main protocols of the TCP/IP suite. In OSI model, it operates at the transport layer(Layer 4). It lies between the Application and Network Layers which are used in providing reliable delivery services.
  • 16. • TCP establishes a reliable connection between sender and receiver using the three-way handshake (SYN, SYN-ACK, ACK).
  • 17. ADVANTAGES: • It is a reliable protocol. • It provides an error-checking mechanism as well as one for recovery. • It gives flow control. • It makes sure that the data reaches the proper destination in the exact order that it was sent. • It is a well-documented and widely implemented protocol, maintained by standards organizations like the IETF (Internet Engineering Task Force). • It works in conjunction with IP (Internet Protocol) to establish connections between devices on a network.
  • 18. DISADVANTAGES: • TCP is made for Wide Area Networks, thus its size can become an issue for small networks with low resources. • TCP runs several layers so it can slow down the speed of the network. • It is not generic in nature. It cannot represent any protocol stack other than the TCP/IP suite. E.g., it cannot work with a Bluetooth connection. • No modifications since their development around 30 years ago.
  • 20. OVERVIEW OF UDP : • User Datagram Protocol (UDP) is one of the core protocols of the Internet Protocol (IP) suite. It is a communication protocol used across the internet for time-sensitive transmissions such as video playback or DNS lookups . • Unlike Transmission Control Protocol (TCP), UDP is connectionless and does not guarantee delivery, order, or error checking, making it a lightweight and efficient option for certain types of data transmission.
  • 23. DIFF BET TCP&UDP • TCP is a connection-oriented protocol. • TCP is reliable as it guarantees the delivery of data to the destination router. • TCP provides extensive error- checking mechanisms • An acknowledgment segment is present. • UDP is the Datagram-oriented proto • The delivery of data to the destination cannot be guaranteed in UDP. • UDP has only the basic error- checking mechanism using checksums. • No acknowledgment segment.
  • 24. INTERNET CONTROL MESSAGE PROTOCOL (ICMP) • ICMP is used for reporting errors and management queries. It is a supporting protocol and is used by network devices like routers for sending error messages and operations information. For example, the requested service is not available or a host or router could not be reached.