Subtle point, Computer Networking

It is possible for a datagram to generate ICMP errors after it has been fragmented. For example, suppose that each of two fragments cannot be delivered. Seemingly, this would mean that one transmitted datagram would cause two ICMP errors to be sent back to the transmitter. However,the textbook on page 517 indicates that the ICMP error should be sent for only the ?rst fragment that causes the error. This is a convenient simpli?cation: it means that your transmiting APP need never listen for more than one ICMP error response.

RFC 791 de?nes IP and RFC 792 de?nes ICMP. Both date to September 1981. ICMP, although typically mentioned as a separate protocol-and sometimes not mentioned at all-is a required part of IP; i.e., an implementation of IP is non- conforming unless it includes ICMP. RFC 1122 (October 1989) updates and clari?es the earlier standards, based on experience gained in the 80s. RFC 1122 is quite long and detailed. Since RFC 1122, the only revisions to IPv4 have addressed type-of-service.

 

Posted Date: 3/15/2013 1:11:35 AM | Location : United States







Related Discussions:- Subtle point, Assignment Help, Ask Question on Subtle point, Get Answer, Expert's Help, Subtle point Discussions

Write discussion on Subtle point
Your posts are moderated
Related Questions
Q. Show the Refraction and Reflection in Fiber-optic cable ? - Refraction often takes place when light bends as it passes from one medium to another less dense medium - Wh

Q. Describe Differential Manchester? - Inversion at middle of bit interval is utilized for synchronization - Presence or else absence of additional transition at beginning o

How many types of twisted pair cable are there We can find two types of twisted pair cables, namely: Unshielded Twisted Pair Cable (UTP) and Shielded Twisted Pair Cable (STP).

Describe the term - License-free operation Users would prefer to buy and operate wireless LAN products without having to secure a license for the frequency band used by the LAN

In quantum computing, we use the method of qubits, superposition and coherence. A normal bit can be in only two states - 0 and 1. But a qubit it can be in 0, 1, or in the superposi

What is General Middleware in client server environment? Ans) It having the communication stacks, distributed directories, authentication services, network time, RPC, Queuing se

Checksum This 16 bits field contain  the checksum. The  calculation of the   checksum for TCP follows  the same  procedure as the  described for  UDP. However the inclusion

Question: (a) Show by means of a diagram the Ethernet frame structure and describe the six fields of the Ethernet frame structure. (b) Explain the operation of the Carrier S

Electronic Mail One  of the  most popular internet  services is electronic mail ( e mail). At  the beginning  of the internet era teh message sent by  electronic  mail were sh

Token Bus Physical order of stations doesn't matter Line is broadcast medium "Send" token by addressing neighbour Provisions for deleting, adding stations