1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anastassius [24]
3 years ago
10

Consider sending a 2400-byte datagram into a link that has an mtu of 700 bytes. suppose the original datagram is stamped with th

e identification number 422. how many fragments are generated? what are the values in the various fields in the ip datagram(s) generated related to fragmentation?
Computers and Technology
1 answer:
Feliz [49]3 years ago
3 0

Explanation:

Let, DG is the datagram so, DG= 2400.

Let, FV is the Value of Fragment and F is the Flag and FO is the Fragmentation Offset.

Let, M is the MTU so, M=700.

Let, IP is the IP header so, IP= 20.

Let, id is the identification number so, id=422

Required numbers of the fragment = [\frac{DG-IP}{M-IP} ]

Insert values in the formula = [\frac{2400-20}{700-20} ]

Then,        = [\frac{2380}{680} ] = [3.5]

The generated numbers of the fragment is 4

  • If FV = 1 then, bytes in data field of DG= 720-20 = 680 and id=422 and FO=0 and F=1.
  • If FV = 2 then, bytes in data field of DG= 720-20 = 680 and id=422 and FO=85(85*8=680 bytes) and F=1.
  • If FV = 3 then, bytes in data field of DG= 720-20 = 680 and id=422 and FO=170(170*8=1360 bytes) and F=1.
  • If FV = 4 then, bytes in data field of DG= 2380-3(680) = 340 and id=422 and FO=255(255*8=2040 bytes) and F=0.

You might be interested in
Code embedded into an HTML page and downloaded by a user; resides on the client and helps process Web form input. Common clients
Stels [109]

Answer:

TRUE

Explanation:

8 0
3 years ago
Which resource helps a user access a cloud service?
gregori [183]

Answer B (Data storage system)

5 0
4 years ago
You want to connect to a user desktop to review windows 10 configuration settings when the user is not present. which technology
MakcuM [25]

Remote desktop is a technology that allows users to connect to a specific computer from a remote location as if they were sitting in front of it.

<h3>What is the desktop remote system?</h3>

A remote desktop is a program or an operating system feature that permits a user to connect to a computer in another location, see that computer's desktop and interact with it as if it were local.

<h3>What is Remote Desktop example?</h3>

A basic example of a Remote Desktop is securing your home laptop to your office PC so you can access files, run applications, print documents, etc. on that PC without going into the office.

However, the host machine does not have to be a PC. It is often a waitperson or virtual server environment in many business use cases.

To learn more about  remote desktop, refer

brainly.com/question/4455143

#SPJ4

3 0
2 years ago
Which of the following technologies is the best choice to convey urgent and highly sensitive information?a. Telephone b. Fax Let
Setler79 [48]

Answer:

C. E-mail

Explanation:

Electronic mail is the best choice to convey urgent and highly sensitive information

8 0
3 years ago
Research and recommend the most appropriate VPN technology. The most likely solution is either an Internet Protocol Security (IP
chubhunter [2.5K]

Answer:

The five eras are general- purpose mainframe and minicomputer computing, personal computers, client/server networks, ...

7 0
3 years ago
Other questions:
  • A geologist is part of what career feild
    6·1 answer
  • The ________ of the operating system enables users to communicate with the computer system. modem window network adapter card us
    14·1 answer
  • Why must you be careful when handling a hard drive?
    10·1 answer
  • after pouring concentrated disinfectant on larger drops or pools of blood how much contact time should be allowed before attempt
    8·2 answers
  • What are the uses of plotters​
    7·2 answers
  • Which best describes how a supporting database will be structured?
    10·1 answer
  • Which similar computer network components connect multiple devices?
    7·1 answer
  • Launa is reviewing several videos from her friends doing the latest dance challenge before they are published on their own
    11·1 answer
  • In what situations might you need to use a function that calls another function?
    11·1 answer
  • Does anybody have the answer for 2.19.6 checkerboard for codehs??
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!