Maximum transmission unit (mtu), Computer Network Security

Maximum Transmission Unit  (MTU)

Each hardware method specification adds the definition of the maximum size of the frame data area, which is known the Maximum Transmission Unit (MTU). Any datagram packet encapsulated in a hardware frame have to be smaller than the MTU for that hardware.

MTU AND HETEROGENEOUS NETWORKS:

 An Internet can have networks with different MTUs as given in the figure below. Consider downstream network has smaller MTU than local network.

 

157_MTU.png

Posted Date: 8/1/2012 8:09:12 AM | Location : United States







Related Discussions:- Maximum transmission unit (mtu), Assignment Help, Ask Question on Maximum transmission unit (mtu), Get Answer, Expert's Help, Maximum transmission unit (mtu) Discussions

Write discussion on Maximum transmission unit (mtu)
Your posts are moderated
Related Questions
how much would you charge for minimum 20 pages

Intercultural sensitivity: recognising differences You represent a Mauritian computer company which is negotiating to buy hardware from a manufacturer in Japan. In your first

ADDRESS RESOLUTION WITH MESSAGE EXCHANGE An alternative to local calculation is a distributed function. A computer that requires to find an address transmits a message across

IDS RESPONSE BEHAVIOR Once IDS detects an anomalous network situation, it has a number of options. IDS responses to external stimulation can be classified as active or passive.

This project involves the design and development of a simulation environment of many sensors tagging material/ machinery/equipment/etc in a warehouse site to help monitor and manag

Describe what the FTAM services are. FTAM  stand for the File Transfer Access and Management: FTAM is an ISO application protocol which performs the operations on files such as.

Access Controls Access controls addresses admission of a user into a trusted area of organization. It comprises of a combination of policies & technologies. The ways to control

Problem (a) Distinguish between passive and active attacks. (b) Give two reasons why it is important to organise security awareness programs for users. (c) Describe how

QUESTION (a) Describe the role of DNS root servers in the Internet network. (b) What do you understand by the handover concept in a mobile network? (c) List five meth

on LAN,where are IP datagrams transported?