Subtle point, Computer Networking

It is possible for a datagram to generate ICMP errors after it has been fragmented. For example, suppose that each of two fragments cannot be delivered. Seemingly, this would mean that one transmitted datagram would cause two ICMP errors to be sent back to the transmitter. However,the textbook on page 517 indicates that the ICMP error should be sent for only the ?rst fragment that causes the error. This is a convenient simpli?cation: it means that your transmiting APP need never listen for more than one ICMP error response.

RFC 791 de?nes IP and RFC 792 de?nes ICMP. Both date to September 1981. ICMP, although typically mentioned as a separate protocol-and sometimes not mentioned at all-is a required part of IP; i.e., an implementation of IP is non- conforming unless it includes ICMP. RFC 1122 (October 1989) updates and clari?es the earlier standards, based on experience gained in the 80s. RFC 1122 is quite long and detailed. Since RFC 1122, the only revisions to IPv4 have addressed type-of-service.

 

Posted Date: 3/15/2013 1:11:35 AM | Location : United States







Related Discussions:- Subtle point, Assignment Help, Ask Question on Subtle point, Get Answer, Expert's Help, Subtle point Discussions

Write discussion on Subtle point
Your posts are moderated
Related Questions
What is TCP/IP TCP/IP is short for Transmission Control Protocol / Internet Protocol. This is a set of protocol layers that is intended to make data exchange possible on dissim


What is a pseudo tty? A pseudo tty or false terminal enables external machines to connect by Telnet or rlogin. Without a pseudo tty, no connection can take place.

Full-Duplex Ethernet 10Base5 as well as 10Base2 are half-duplex Full-duplex raises capacity of each domain No require for CSMA/CD

Threats to information can include Deletion of a file or files. Corruption, caused either by hardware problems or by a bug in the software. Theft of company data

a)  Which of the well-known Internet applications uses a separate TCP connection for control?   b)  The separate control connection as in (a) above is an example of control (sig

The Common method for writing a program with PVM is as follows: A user writes one or more sequential programs in C, C++, or Fortran 77 having embedded PVM function (or subroutin

Q. Explain about Traditional Modems? - Subsequent to modulation by the modem an analog signal reaches the telephone company switching station where it sampled and digitized to

In point-to-point message passing, single process sends/receives message to/from another process. There are four communication modes for sending a message: i)    Buffered mode

What to do to connection with external communication For dealing with external communication, the Web server must have a static IP. Having a static IP could also be a problemat