Maximum transmission unit (mtu), Computer Network Security

Maximum Transmission Unit  (MTU)

Each hardware method specification adds the definition of the maximum size of the frame data area, which is known the Maximum Transmission Unit (MTU). Any datagram packet encapsulated in a hardware frame have to be smaller than the MTU for that hardware.

MTU AND HETEROGENEOUS NETWORKS:

 An Internet can have networks with different MTUs as given in the figure below. Consider downstream network has smaller MTU than local network.

 

157_MTU.png

Posted Date: 8/1/2012 8:09:12 AM | Location : United States







Related Discussions:- Maximum transmission unit (mtu), Assignment Help, Ask Question on Maximum transmission unit (mtu), Get Answer, Expert's Help, Maximum transmission unit (mtu) Discussions

Write discussion on Maximum transmission unit (mtu)
Your posts are moderated
Related Questions
Q1 (15 marks, 5 marks each part): This question has three parts: In a short paragraph (200-300 words) explain the fundamentals of Packet Switching and how it works. In a short pa

Hypothetical reliable data transfer protocol: A jumping window based Go-back-N  ARQ protocol for file transfer using UDP as the transport protocol: In this protocol, a window o

CONCEPT OF PACKET : Network systems splits data in small junks or blocks known as packets, which they send individually. Why we required packets rather than bits? The answer to

Hashing is the transformation of a string of characters into a generally shorter fixed-length key or a value that presents the original string. Hashing is used to index and retri

Question: (a) State the strong law of large numbers. (b) Data have been collected on response times (in minutes) at a fire station. The data are 2:7 1:8 0:8 1:4 1:2 (i

Risk Control Strategies Once the ranked vulnerability risk worksheet has created, they should choose one of following 4 strategies to control each risk: •Apply safeguards which

You are hired as a consultant to help design a digital library in which books are scanned and stored digitally and made available to users of the World Wide Web. Assume that the li


FIREWALL ANALYSIS TOOLS There are a number of tools automate remote discovery of firewall rules and assist the administrator in analyzing rules Administrators who feel wary of u

Belady's Anomaly Also known FIFO anomaly. Generally, on raising the number of frames given to a process' virtual storage, the program execution is faster, because lesser page