Maximum transmission unit (mtu), Computer Network Security

Maximum Transmission Unit  (MTU)

Each hardware method specification adds the definition of the maximum size of the frame data area, which is known the Maximum Transmission Unit (MTU). Any datagram packet encapsulated in a hardware frame have to be smaller than the MTU for that hardware.

MTU AND HETEROGENEOUS NETWORKS:

 An Internet can have networks with different MTUs as given in the figure below. Consider downstream network has smaller MTU than local network.

 

157_MTU.png

Posted Date: 8/1/2012 8:09:12 AM | Location : United States







Related Discussions:- Maximum transmission unit (mtu), Assignment Help, Ask Question on Maximum transmission unit (mtu), Get Answer, Expert's Help, Maximum transmission unit (mtu) Discussions

Write discussion on Maximum transmission unit (mtu)
Your posts are moderated
Related Questions
Problem a) Consider a 1000 Mbps Ethernet with a single Store-N-Forward switch mid-way in the path between two nodes A and B. Assume that there are no other nodes on the network


REASON FOR MULTIPLE TOPOLOGIES Every topology has disadvantages and advantages, which are described below: IN A RING:  It is simple to coordinate access to other dev

CSMA/CA Wireless needs collision avoid ness rather than collision checking. Transmitting computer puts very short codes to receiver. Receiver responds with short message getti

Question: The Wired Equivalent Privacy (WEP) standard was created in order to give wireless networks safety and security features similar to that of wired networks. (a) L

Intercultural sensitivity: recognising differences You represent a Mauritian computer company which is negotiating to buy hardware from a manufacturer in Japan. In your first

ADDRESS RESOLUTION WITH CLOSED-FORM COMPUTATION For networks use reliable addressing, it is possible to select an address that creates closed-form address resolution possible.

Threat Identification After identifying and performing a primary classification of an organization’s information assets, the analysis phase moves onto an examination of threats

QUESTION (In this question, you will need to use the ISO 27001:2005 and ISO 27002:2005 standards) For each of the situations below, comment on the following: 1. Mention

Network security is an issue for companies regardless of whether they participate in electronic commerce; however, since most organizations have a Web site that allows some interac