1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dimulka [17.4K]
3 years ago
5

an IPv6 packet has a 40 byte base header, a 20 byte destination options extension header (which is not used for routing) and 200

0 bytes of payload data (total packet length is 2060 bytes). This is to be fragmented to travel over a network with a MTU of 1500 bytes. Considering the fragmentable and unfragmentable parts of this packet, create a sketch showing the headers and data in each fragment, including the number of bytes. Don’t forget the fragmentation header, which is 8 bytes.
Computers and Technology
1 answer:
NISA [10]3 years ago
7 0

Answer:

Explanation:

Given, total payload is: 2000 bytes

 MTU is: 1500 bytes

 Header is: 20 bytes

 Base header is: 40 bytes

Total number of fragments = Total Payload / MTU

                                            = 2500 / 1500

                                            = 2 fragments

Fragment     Base header    Fragmentation header     Authentication  

                                                                                                     header + Data

1                  40 bytes                  8 bytes                              20 bytes +772bytes

2                 40 bytes                   8 bytes                                 792 bytes

You might be interested in
Someone help me I don’t know what to do /COMPUTER SCIENCE
nydimaria [60]
It kind of depends on the intended language, but I can see the following mistakes:

- lines not terminated with a semicolon (but not all languages require this)
- while statement missing parenthesis, ie., while (num1 <= num2), also not required in all languages
- statements below the while statement must be grouped by curly braces
- num1+5 should be num1=num1+5 or num1 += 5

Output will be:

10
15
20
25
30
5 0
4 years ago
You are between flights at the airport and you want to check your email. Your wireless settings show two options:
Likurg_2 [28]
The correct answers Is B
8 0
3 years ago
What are the components of computer system??<br>​
FinnZ [79.3K]

There are Mainly Five basic Components of a computer system.

Input Unit.

Output unit.

Memory Unit.

Control unit.

Arithmetic and Logic Unit.

8 0
3 years ago
Read 2 more answers
Why should programmers use a Post Mortem Review?
Zina [86]
The goal of a postmortem is to draw meaningful conclusions to help you learn from your past successes and failures. Despite its grim-sounding name, a postmortem can be an extremely productive method of improving your development practices.
8 0
4 years ago
The first line of defense against illicit use of, or threats to, computer resources and sensitive information is a strong authen
Ksju [112]

Answer: Authorization process

Explanation

Authorization is a security measure to determine the access levels or user/client rights to use to system resources like files, computer programs, data and other features on a computer. Authorization process is the process of granting or denying access to a network resource that allows the user access to various resources based on the his/her identity.

Most web security systems are based on a two-step Authorization process. The first step ensures and approves the user's identity, that is authentication and the second stage is authorization, which allows the user to access the various resources based on the user's identity.

Therefore the first thing you should do when you suspect "illicit use of, or threats to, computer resources and sensitive information is a strong authentication and authorization process".

5 0
4 years ago
Other questions:
  • How has the development of personal computer hardware and software reversed some of the trends brought on by the industrial revo
    15·1 answer
  • An email address is made up of all of the following parts except
    13·2 answers
  • 1 Explain the difference between using a computer program and programming a computer.
    12·1 answer
  • What is the unit of measure that specifies the value of cellspacing?
    9·1 answer
  • What are the principles for computer programming?<br> Please add some examples
    8·1 answer
  • The commands available from a menu change depending upon what you are doing.<br> True<br> False
    11·2 answers
  • In cell B20, enter a function to calculate the average attendance for 2018
    11·1 answer
  • What is the amount of work you must input in order to move the stone?
    13·1 answer
  • What is the advantage of using a translation look-aside buffer (TLB), also called associative memory, in the logical-physical ad
    15·1 answer
  • WILL GIVE BRAINLIEST!!! Danielle is warehouse supervisor for a large shipping company. Most shipments need to leave the warehous
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!