Why is fragmentation needed on internet not on a typical wan, Computer Engineering

Assignment Help:

Why is fragmentation needed on Internet not on a typical WAN?

TCP/IP protocol utilizes the name IP datagram to demote to an Internet packet. The amount of data carried into a datagram is not fixed. The sender selects an amount of data which is suitable for a particular purpose. Fragmentation is performed, if size of a datagram is larger than network MTU.

If a datagram is larger than the MTU of a network over that it is sent, the router separates the datagram into smaller pieces termed as fragments.

Fragmentation is required on Internet as this in connection of different networks using various LAN technologies (as Ethernet and Token ring). Each technology has a several frame size that is smaller to fit an entire IP datagram.

When a typical Wan is have electronic devices termed as packet switches interconnected through communication lines. The packet switches contains special purpose hardware. A packet switch is implemented along with special purpose computer which is dedicated to the task of providing communication.


Related Discussions:- Why is fragmentation needed on internet not on a typical wan

What are instruction hazards, What are instruction hazards? The pipelin...

What are instruction hazards? The pipeline might also be stalled because of a delay in the availability of an instruction. For instance, this may be a result of a miss in the c

What is sector sparing, What is sector sparing? Low-level formatting al...

What is sector sparing? Low-level formatting also sets aside spare sectors not visible to the operating system. The controller can be told to change each bad sector logically w

What is indexing, What is indexing? Specific fields shown on each scann...

What is indexing? Specific fields shown on each scanned document are provided to our organization to make the systematic arrangement of your records. This process is designed t

What is meant by hide area, What is meant by hide area? The hide comman...

What is meant by hide area? The hide command temporarily kept the contents of the field at the present line in a system-controlled memory called as the HIDE AREA.  At an intera

Define the message queues, The message queue provides the information about...

The message queue provides the information about sizes of queues under utilization of various processors. It points to size of every processor incoming message queue that would be

What functions connect( )& accept( ) call in socket interfac, What function...

What functions connect( ) and accept ( ) call in Socket interfacing? connect() system call: Clients use procedures connect to initiate connection with an exact server. The

When should we stop testing, When should you stop testing? It is quite ...

When should you stop testing? It is quite complex to determine as many modern software applications are so complex and run in like an interdependent environment that complete t

Posix, POSIX is the IEEE's Portable Operating System Interface for Computer...

POSIX is the IEEE's Portable Operating System Interface for Computer Environments. The standard provides compliances criteria for operating system services and is designed to allow

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd