What is the maximum number of fragments, Computer Engineering

Assignment Help:

What is the maximum number of fragments that can result from a single IP Datagram? Explain.

To fragment a datagram for transmission across a network, a router utilizes the network MTU that is Maximum Transmission Unit and the datagram header size to compute the maximum amount of data which can be sent in each fragment and number of fragment which will be required. The router than creates the fragments. A datagram cannot be larger than the MTU of a network over that this is sent. If a fragment ultimately reaches another network which has a smaller MTU then fragment is further separated in smaller fragments. IP does not differentiate between sub fragments and original fragments. Therefore the maximum number of fragments from a single datagram will depend upon size of datagram and MTU of the networks over that this is sent along its path.


Related Discussions:- What is the maximum number of fragments

The concept of electronic cash, The concept of electronic cash is to implem...

The concept of electronic cash is to implement payment by Using computers over network

Applications of electronic data interchange in business, What are the appli...

What are the applications of Electronic Data Interchange in business? The applications of Electronic Data Interchange are as given below: 1. Organisations that use EDI 2

What is virtual memory, Virtual Memory is a way of extending a computer's m...

Virtual Memory is a way of extending a computer's memory by using a disk file to replicate add'l memory space. The OS remain track of these add'l memory addresses on the hard disk

What is an orthogonal base class in c++, If two base classes have no overla...

If two base classes have no overlapping methods or data they are said to be independent of, or orthogonal to each other. Orthogonal in the sense means that two classes function in

C programming, #write a program to find the area under the curve y=f(x) bet...

#write a program to find the area under the curve y=f(x) between x =a and x=b integrate the area between a and b by c programming

Explain public key encryption, Public Key Encryption A cryptographic sy...

Public Key Encryption A cryptographic system that uses two-keys-a public  key known to everyone and a private or secret key known only to the recipient of the message. An si

Give some examples of malicious data, Give some examples of malicious data....

Give some examples of malicious data.  In May 2002, the Norton Anti-Virus software for Windows operating systems detects about 61000 malicious programs. Some of them are named

How many select lines will have a 16 to 1 multiplexer, How many select line...

How many select lines will a 16 to 1 multiplexer will have ?   Ans. For 16 to 1 MUX four select lines will be needed to select 16 (2 4 ) inputs.

How can a parent and child process communicate, How can a parent and child ...

How can a parent and child process communicate? A parent and child can communicate by any of the normal inter-process communication schemes (pipes, sockets, message queues, sha

Define password methods and biometric systems, Define the password methods ...

Define the password methods and Biometric systems for implementing client server network security. In cyberspace, buyers and sellers cannot notice each other. Also within video

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd