Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
"A datagram cannot be larger than the MTU of a network over which it is sent." Is the statement true or false? Explain with the help of a suitable example.
All hardware technology gives the maximum amount of data that a frame can carry. Its limit is termed as maximum transmission unit (i.e.MTU).
Here is no exception to MTU limit, the network hardware is not designed to transfer or to accept frame to carry more data than the MTU al lows. Therefore a datagram should be smaller or identical to network MTU or for transmission it cannot be encapsulated.
An Example of a router which connects two networks with various MTU values.
In figure host H2 attaches to a network which has an MTU of 1000. Hence each datagram which H2 transmits should be 1000 octets or less. Because, however, host HI attaches to a network which has an MTU of 1500 octets, HI can transmit datagram which contains up to 1500 octets. To resolve this problem IP router uses a technique termed as fragmentation. While a datagram is larger than the MTU of a network over that this is sent, the router divides the datagram in smaller pieces termed as fragments and sends each fragment independently. For fragmentation a datagram for transmission across the network, a router uses the network MTU and to calculate maximum amount of data datagram header size which can be sent in each fragment and number of fragment which will be needed.
how to prove the partial order R is a total order in discrete mathmetics and structures by topological sorting method in c programming
How different control function categories help in signalling and control. Events happening outside the exchange on the line units, trunk junctions and inter exchange signalin
CIH, also known as Chernobyl or Spacefiller, is a Microsoft Windows computer virus which first emerged in 1998. It is one of the most damaging viruses, overwriting critical inform
Handshake packets: Handshake packets consist of nothing but a PID byte, and are usually sent in response to data packets. The 3 basic types are, NAK, indicating that the data
Difference between Visual check and Parity check Visual check This is checking for errors by comparing entered data with original document (NOTE: this is not the same as
How many address bits are required to represent 4K memory ? Ans. 12 address bits are required for representing 4K memory, as 4K = 2 2 x 2 10 = 2 12 Therefore 1K = 1024
Ask qa survey was conducted among the residents of pune city,it suburbs and the pune cantonment area.the following three pie diagrams show their respective preferences for living i
Q. Example of arrays pointers? General form of declaration of array in Fortran 90 is type, DIMENSION(bound) [,attr] :: name E.g. the declaration INTEGER, D
Show the two ways in which Warnings can be suppressed in PHP? 1) Stop an individual function call from producing an error message put the @ warning suppression Operator front o
Define micro routine and microinstruction. A sequence of control words corresponding to the control sequence of a machine instruction represents the micro routine for that ins
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd