Subtle point, Computer Networking

It is possible for a datagram to generate ICMP errors after it has been fragmented. For example, suppose that each of two fragments cannot be delivered. Seemingly, this would mean that one transmitted datagram would cause two ICMP errors to be sent back to the transmitter. However,the textbook on page 517 indicates that the ICMP error should be sent for only the ?rst fragment that causes the error. This is a convenient simpli?cation: it means that your transmiting APP need never listen for more than one ICMP error response.

RFC 791 de?nes IP and RFC 792 de?nes ICMP. Both date to September 1981. ICMP, although typically mentioned as a separate protocol-and sometimes not mentioned at all-is a required part of IP; i.e., an implementation of IP is non- conforming unless it includes ICMP. RFC 1122 (October 1989) updates and clari?es the earlier standards, based on experience gained in the 80s. RFC 1122 is quite long and detailed. Since RFC 1122, the only revisions to IPv4 have addressed type-of-service.

 

Posted Date: 3/15/2013 1:11:35 AM | Location : United States







Related Discussions:- Subtle point, Assignment Help, Ask Question on Subtle point, Get Answer, Expert's Help, Subtle point Discussions

Write discussion on Subtle point
Your posts are moderated
Related Questions
Higher bandwidth Fibre  optic  cable an  support  dramatically higher bandwidths than  either   twisted pair or  coaxial  cable currently data rates  and bandwidth utilizatio

Explain about the Switches LAN switches are an expansion of the method in LAN bridging, which controls data flow, handles transmission errors, gives physical addressing, and ma

Reliable  data  transfer over a channel bit error  rdt : 20 A more realist model  of the underlying  channel  is one  in which  bits in packet may be  computed. Such  bit erro

configure a router . get the default gateway

What are the responsibilities of Application Layer? The Application Layer enables the user, whether human or software, to access the network. It gives user interfaces and suppo


Explain in detail about wireless network Think about unseen terminal problem. Imagine a wireless network consist of five stations, A through E, such that each one them is in r

Q. What is Boundary Level Masking? If mask numbers are either 255 or 0: Bytes in the IP address that correspond to 255 in the mask will be repeated in the subnet ma

The diagram below offers an overall view on the methods use by both the OSI and TCP/IP model. ISO Approach - Occasionally called Horizontal Approach - OSI asse

Configure basic switch parameters. Configure the S1, S2, and S3 switches according to the following guidelines: Configure the switch hostname. Disable DNS lookup.