Maximum transmission unit (mtu), Computer Network Security

Maximum Transmission Unit  (MTU)

Each hardware method specification adds the definition of the maximum size of the frame data area, which is known the Maximum Transmission Unit (MTU). Any datagram packet encapsulated in a hardware frame have to be smaller than the MTU for that hardware.

MTU AND HETEROGENEOUS NETWORKS:

 An Internet can have networks with different MTUs as given in the figure below. Consider downstream network has smaller MTU than local network.

 

157_MTU.png

Posted Date: 8/1/2012 8:09:12 AM | Location : United States







Related Discussions:- Maximum transmission unit (mtu), Assignment Help, Ask Question on Maximum transmission unit (mtu), Get Answer, Expert's Help, Maximum transmission unit (mtu) Discussions

Write discussion on Maximum transmission unit (mtu)
Your posts are moderated
Related Questions
(a) Describe how CSMA/CD operates and explain how Ethernet deals with collisions. (b) Describe how the subsequent protocols work: i. ARP ii. DHCP iii. DNS iv. SMTP (c) The

Confidentiality Confidentiality of information ensures that only those with sufficient privileges may access specific information. When unauthorized individuals can access inform


Problem (a) Using Vigenère cipher and given the key abc, find the ciphertext for the message: simplicity Only the 26 lower-case alphabetical characters are used in messa

What is Authentication/confirmation?  How it is different from  the Authorization/approval?  Explain in brief different authentication protocols along with their merits and demerit

Question 1: Why do we need a Law of Contract? a Explanation Reasons to have a law of contract b Explain the close procurement project process - Explanation (causes,

Problem (a) Describe RSA algorithm with an example. (b) Answer the following RSA encryption, given the values of the primes are: p = 17, q = 11 and choosing e = 7. (c)

QUESTION: a) Below is a capture of an Ethernet II frame which has an IPv4 packet and a segment. Provide the source MAC address in hexadecimal; the source IP address, the length

Question: (a) Explain how the Diffie-Hellman key establishment protocol works. (b) Prove that the Diffie-Hellman key establishment protocol is vulnerable to a `man in the mi

Q. Explain the random key distribution? The triple key management mechanisms ensure a better and complete security solution using the random key distribution mechanism. In this