1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dimulka [17.4K]
2 years ago
5

an IPv6 packet has a 40 byte base header, a 20 byte destination options extension header (which is not used for routing) and 200

0 bytes of payload data (total packet length is 2060 bytes). This is to be fragmented to travel over a network with a MTU of 1500 bytes. Considering the fragmentable and unfragmentable parts of this packet, create a sketch showing the headers and data in each fragment, including the number of bytes. Don’t forget the fragmentation header, which is 8 bytes.
Computers and Technology
1 answer:
NISA [10]2 years ago
7 0

Answer:

Explanation:

Given, total payload is: 2000 bytes

 MTU is: 1500 bytes

 Header is: 20 bytes

 Base header is: 40 bytes

Total number of fragments = Total Payload / MTU

                                            = 2500 / 1500

                                            = 2 fragments

Fragment     Base header    Fragmentation header     Authentication  

                                                                                                     header + Data

1                  40 bytes                  8 bytes                              20 bytes +772bytes

2                 40 bytes                   8 bytes                                 792 bytes

You might be interested in
Which of the following is true for an API?
navik [9.2K]

Answer:

c

Explanation:

4 0
3 years ago
What shows on the web, what is behind the web (source code) and what is placed on the server (database) , is known as web source
slega [8]

Answer:

A. True

Explanation:

Websites are created using html, css, javascript and other web based programming languages. When a website page is requested, the host server sends the copy of the source code to the web browser of the client system, the web browser is able to interpret the source code and displays the graphical representation on the web browser for the client.

3 0
3 years ago
Which graphics format works best for desktop publishing and print work? (1 point) .tiff .gif .tga .jpeg?
Sergeeva-Olga [200]
. jpeg, probably works best
6 0
2 years ago
To add slides to a presentation, _____.
Effectus [21]
<span>select the New Slide option from the Insert menu</span>
7 0
3 years ago
Users report that the database on the main server cannot be accessed. A database administrator verifies the issue and notices th
navik [9.2K]

Answer: (C) Ransomware

Explanation:

The ransomware is one of the type of malware software design which is used for blocking the user accessing unauthorized and also without paying money.

The most of the ransomware software encrypt the computer accessing and the files as they demand for the payment dues for again restoring the access.  

It also encrypt the user account and the information until the correct decrypt key are get entered into the system. So, according to the given situation, the ransomware attack are experienced in an organization.  

Therefore, Option (C) is correct.

4 0
3 years ago
Other questions:
  • Suppose an instruction takes 4 cycles to execute in an unpipelined CPU: one cycle to fetch the instruction, one cycle to decode
    10·1 answer
  • true or false manual handling of materials accounts for the primary source of energy in the workplace
    13·2 answers
  • He has a new Wi-Fi router that connects wirelessly to a new desktop and two new laptops, in addition to multiple smartphones, ta
    8·1 answer
  • In general terms, a program that is broken into smaller units of code such as methods, is known as a ________
    6·1 answer
  • Which of the following is true regarding packaged software and custom software? Group of answer choices Packaged software are ap
    13·1 answer
  • Samira works for a large U.S. company that has factories all over the world. Samira returned to the U.S. after visiting several
    9·1 answer
  • 3.3 Code Practice: Question 1
    15·1 answer
  • Consider the following instructions for a game element: Move Forward If not at end, move forward Else stop This is an example of
    10·1 answer
  • When preparing a technical document, do all of the following EXCEPT:_______.
    12·1 answer
  • Discuss the ways you can perform to prevent your computer/device and its data/contents from being stolen. Define two-facto authe
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!