Subtle point, Computer Networking

Assignment Help:

It is possible for a datagram to generate ICMP errors after it has been fragmented. For example, suppose that each of two fragments cannot be delivered. Seemingly, this would mean that one transmitted datagram would cause two ICMP errors to be sent back to the transmitter. However,the textbook on page 517 indicates that the ICMP error should be sent for only the ?rst fragment that causes the error. This is a convenient simpli?cation: it means that your transmiting APP need never listen for more than one ICMP error response.

RFC 791 de?nes IP and RFC 792 de?nes ICMP. Both date to September 1981. ICMP, although typically mentioned as a separate protocol-and sometimes not mentioned at all-is a required part of IP; i.e., an implementation of IP is non- conforming unless it includes ICMP. RFC 1122 (October 1989) updates and clari?es the earlier standards, based on experience gained in the 80s. RFC 1122 is quite long and detailed. Since RFC 1122, the only revisions to IPv4 have addressed type-of-service.

 


Related Discussions:- Subtle point

Bluej programming, i have been given a question:- any 50 numbers are given ...

i have been given a question:- any 50 numbers are given and to find out the 1)frequency of odd and even numbers 2)frequency of positive and negative numbers

Destination port number - transport layer, Destination Port Number Thi...

Destination Port Number This is  port number used by the process  running on the destination host. It is also 16 bits long  if the destination  host if  server ( a client  sen

What are triggers and rules, Triggers are special user defined actions usua...

Triggers are special user defined actions usually in the form of stored procedures, that are automatically requested by the server based on data related events. It can perform diff

Determine the benefits of security on internet or intranet, Determine the b...

Determine the benefits of security on internet or intranet Security has long been seen as a major threatening point in the implementation of the Internet or of Intranet technolog

Virtual private network vpns, Virtual Private Network  ( VPNs) When we ...

Virtual Private Network  ( VPNs) When we use the  internet  or the  risks to the security of our data  arise. The solve the security problem a virtual private network  used for

What are mac addresses, What are MAC addresses? MAC, or Media Access Co...

What are MAC addresses? MAC, or Media Access Control, uniquely identifies a device on the network. It is also called as physical address or Ethernet address. A MAC address is m

Torus, Torus The mesh network with enclose around connections is called...

Torus The mesh network with enclose around connections is called Tours Network.

Nics and network hardware, NICs AND NETWORK HARDWARE:  NIC is create f...

NICs AND NETWORK HARDWARE:  NIC is create for one kind of physical network. For example Ethernet interface may not be needed with token ring and similar ATM interface cannot b

Determine the working of communications intranet, Determine the working of ...

Determine the working of Communications Intranet Intranets of this type tend to feature in geographically dispersed organisations. The motivation for its implementation is g

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd