1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dimulka [17.4K]
3 years ago
5

an IPv6 packet has a 40 byte base header, a 20 byte destination options extension header (which is not used for routing) and 200

0 bytes of payload data (total packet length is 2060 bytes). This is to be fragmented to travel over a network with a MTU of 1500 bytes. Considering the fragmentable and unfragmentable parts of this packet, create a sketch showing the headers and data in each fragment, including the number of bytes. Don’t forget the fragmentation header, which is 8 bytes.
Computers and Technology
1 answer:
NISA [10]3 years ago
7 0

Answer:

Explanation:

Given, total payload is: 2000 bytes

 MTU is: 1500 bytes

 Header is: 20 bytes

 Base header is: 40 bytes

Total number of fragments = Total Payload / MTU

                                            = 2500 / 1500

                                            = 2 fragments

Fragment     Base header    Fragmentation header     Authentication  

                                                                                                     header + Data

1                  40 bytes                  8 bytes                              20 bytes +772bytes

2                 40 bytes                   8 bytes                                 792 bytes

You might be interested in
When it comes to social media technologies and formal learning in the corporate environment, the only social media platform that
Andrew [12]

Ootions: TRUE OR FALSE

Answer: FALSE

Explanation: According to (Steer,2015) there are many platforms for learning and teaching purposes in corporate Organisations, they include PINTEREST,WIKI,GOOGLE+, LINKEDIN,TWITTER etc, The social media platforms are available for effective and efficient Communication and has been the main driving force for Businesses the world over.

These social media platforms have aided the growth and expansion of product marketing strategies and enhanced the over all business efficiency.

4 0
3 years ago
Which statements describe global information systems (gis)? measures sound underwater tracks the speed of airplanes collects dat
zheka24 [161]
I think the correct answer from the choices listed above is the second option. Global information systems (GIS) can be used to create emergency plans in the event of natural disasters. Hope this answers the question. Have a nice day.
3 0
3 years ago
Read 2 more answers
It is well-known that monoalphabetic substitution cipher (also known as monoalphabetic cipher) is not secure, because it can be
olasank [31]

Answer:

a. True

Explanation:

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

It is well-known that monoalphabetic substitution cipher (also known as monoalphabetic cipher) is not secure, because it can be subjected to frequency analysis.

The Playfair Cipher is generally considered to be the best multiple letter encryption cipher because it processes digrams in the plaintext as singular units and translates them directly into ciphertext digrams.

In the Playfair Cipher, a 5 × 5 matrix comprising of letters is developed using a keyword and then, the matrix is used to encrypt the plaintext as a pair i.e two letters at a time rather than as a single text.

5 0
3 years ago
Online learning is impossible without?
Shtirlitz [24]
<span>Online learning is impossible without "basic computer literacy." Let us assume that everything is already provide, from computers to electricity. You can not move if at least a single idea about the usage of computer is not there, even the basics like turning on, turning off, browsing, etc.</span>
8 0
3 years ago
Users are reporting Internet connectivity issues. The network administrator wants to determine if the issues are internal to the
Anika [276]

Answer:

traceroute.

Explanation:

Traceroute these are the computer networking commands and they are used to determine the path or route that data packets take on the network with the delays that are associated with it.So according to me traceroute is the best tool to determine the issues or outrages are in the internet connectivity.

8 0
3 years ago
Other questions:
  • What shows on the web, what is behind the web (source code) and what is placed on the server (database) , is known as web source
    13·1 answer
  • In this website/app what are the points for?
    7·1 answer
  • Which company operates a public cloud?<br><br> Lotus<br> Acme<br> Google<br> Symantec
    5·2 answers
  • In the beginning of wireless technology, some devices used _____ technology to "beam" information from one source to another sou
    14·1 answer
  • The graphic shows a cause and effect organizational aid.
    6·1 answer
  • In 3-5 sentences describe whether or not files should be deleted from your computer explain your answer
    12·1 answer
  • What is the volume of a rectangular prism with a length of 812 centimeters, width of 913 centimeters, and a height of 1225 centi
    12·1 answer
  • Which best describes what databases do?
    8·2 answers
  • GRAND THEFT AUTO 5 LOLLL
    15·2 answers
  • Susan is a network monitoring technician working on a firewall for her company’s network. In the process to determine an open po
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!