Maximum transmission unit (mtu), Computer Network Security

Maximum Transmission Unit  (MTU)

Each hardware method specification adds the definition of the maximum size of the frame data area, which is known the Maximum Transmission Unit (MTU). Any datagram packet encapsulated in a hardware frame have to be smaller than the MTU for that hardware.

MTU AND HETEROGENEOUS NETWORKS:

 An Internet can have networks with different MTUs as given in the figure below. Consider downstream network has smaller MTU than local network.

 

157_MTU.png

Posted Date: 8/1/2012 8:09:12 AM | Location : United States







Related Discussions:- Maximum transmission unit (mtu), Assignment Help, Ask Question on Maximum transmission unit (mtu), Get Answer, Expert's Help, Maximum transmission unit (mtu) Discussions

Write discussion on Maximum transmission unit (mtu)
Your posts are moderated
Related Questions
POLICY MANAGEMENT Policies should be managed as they constantly change. Good policy development and maintenance make a more resilient organization. All policies undergo tremendou

SUCCESS OF IP:  IP has accommodated dramatic modification since real design. But basic rules are still appropriate today. There are many new kinds of hardware. SCALING:

- Alice, Bob and Charlie have a secret key a=3, b=4, c=5, in that order. - They would like to find a common secret key using Diffie-Hellan key exchange protocol (with g=2, p=5).

(a) (i) Bob has public RSA key (n = 77, e = 7). Show that Bob's private key is (d = 43). (ii) Alice wants to send the message m = 13 to Bob. She encrypts the message usi

QUESTION Testing of a Business Continuity Plan (BCP) does not need to be costly or to interrupt the daily operations of the business. The result of the test should also be look

(a) Cost allocation mechanisms are important when it comes to establishing other aspects of inter-firm compensations and how these are transferred to the users. There are two pri

SHIFT OPERATION:  This operation replaced all bits to the left one position. For example in the diagram below a 16-bit CRC hardware is given, which needs three Exclusive OR (

A digital signature is a stamp on the data, which is unique and very hard to forge.  A digital signature has 2 steps and creates 2 things from the security perspective. STEP 1

UDP- DATAGRAM TRANSPORT SERVICE INTRODUCTION:  UDP is the one of the transport protocols in TCP/IP protocol suite. UDP protocol accepts applications on the computers to

INTRODUCTION TO CRYPTOGRAPHY Cryptography The word cryptography is derived from Greek words kryptos, which means hidden and graphein, meaning to write, this is the process of