Question

Host A wants to transfer 5000 bytes of data to Host B. On the network path...

Host A wants to transfer 5000 bytes of data to Host B. On the network path there are two routers. First router R1, has MTU(Maximum Transformation Unit) of 1900 bytes. Second router R2, has MTU of 900 bytes.

  1. How many packets will Router 1 will deliver to Router 2 ?
  2. Draw packet formats with More Flag and Offset values and data sizes for each datagram for R1 .
  3. How many packets will Router 2 will deliver to Host B ?
  4. Draw packet formats with More Flag and Offset values and data sizes for each datagram for R2 sending to Host B.
0 0
Add a comment Improve this question Transcribed image text
Answer #1

Answer

1. In Case of 1st router it has MTU of 1900B and data is 5000B>1900B so fragmentation is needed.
So 20B of header info will be added to each packed being sent.
So in one packed we can send 1900 - 20 = 1880B of data,
So we will need 5000/1880 = 2 full packets of 1880B data and one packet having data of 1240B
So Router 1 will send 3 packets.

  • 2 packet of 1880B of data and 20B header
  • 1 packet of 1240B data and 20B header.

2. Packet 1: More_Flag = true, offset_value = 0, data_size = 1880B
   Packet 2: More_Flag = true, offset_value = 1881, data_size = 1880B
   Packet 3: More_Flag = false, offset_value = 3761, data_size = 1240B

3. So as router B has MTU of 900B so it can send 900-20B = 880B of data, so fragmentation is needed for the packets    receiving from router A.
So it will need

  • 1880/880 = 3 packets(2 full 1 partial ) for the first packet of router 1
  • 1880/880 = 3 packets(2 full 1 partial ) for the second packet of router 1
  • 1240/880 = 2 packets(1 full 1 partial ) for the third packet of router 1

So total of 8 packets

4. Following would be packets of router 2.

  1. Packet 1: more_flag = true, offset_value = 0, data_size = 880
  2. Packet 2: more_flag = true, offset_value = 881, data_size = 880
  3. Packet 3: more_flag = true, offset_value = 1761, data_size = 120
  4. Packet 4: more_flag = true, offset_value = 1881, data_size = 880
  5. Packet 5: more_flag = true, offset_value = 2761, data_size = 880
  6. Packet 6: more_flag = true, offset_value = 3641, data_size = 120
  7. Packet 7: more_flag = true, offset_value = 3761, data_size = 880
  8. Packet 8: more_flag = false, offset_value = 4641, data_size = 360
Add a comment
Know the answer?
Add Answer to:
Host A wants to transfer 5000 bytes of data to Host B. On the network path...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 4. (20%) PC1 sends a 1,500 octet datagram (20-byte header and 1,480 bytes of data, IP...

    4. (20%) PC1 sends a 1,500 octet datagram (20-byte header and 1,480 bytes of data, IP ID = 677 to PC2 through the routers R1 and R2. The corresponding MTUs are given in the following diagram. Please show the information about IP packet identification, total packet length, IP flag bit Mand fragment offset in the IP header of each fragmented IP packet. R1 R2 MTU=1500 bytes MTU=1500 bytes PC1 MTU=500 bytes PC2 Fragment #1 Fragment #2 Fragment #2 Fragment ID...

  • 3. Consider sending real-time data from Host A to Host B over a packet-switched network. Host...

    3. Consider sending real-time data from Host A to Host B over a packet-switched network. Host A takes a 32-bit measurement every millisecond, and Host A collects these into 128-byte packets. There is one link between Hosts A and B; its transmission rate is 2 Mbps, its propagation delay is 2 × 108 meters/sec, and its length is 1500 km. As soon as Host A gathers a packet, it sends the packet to Host B. How much time elapses from...

  • 1. To which of the following subnets does IP address 225.3.2.22 belong? 225.3.2.0/24 225.3.2.22/24 225.2.3.0/24 225.0.0.0/24...

    1. To which of the following subnets does IP address 225.3.2.22 belong? 225.3.2.0/24 225.3.2.22/24 225.2.3.0/24 225.0.0.0/24 none of the above Question 2 On which of the following devices does the transport layer NOT run? laptop router cellphone A, B and C none of the above Question 3 What is the source address contained in the discover message sent by a host that is wanting to obtain an IP address? 255.255.255.255 0.0.0.0 the IP address of the server the last IP...

  • a) b) c) This chapter ("data plane") is all about forwarding packets at a router. Check...

    a) b) c) This chapter ("data plane") is all about forwarding packets at a router. Check all the statements that apply to Forwarding: Forwarding tables are computed by the control plane, in software. Forwarding tables are typically stored at every input port of a router. Forwarding tables are typically stored at every output port of a router. Forwarding tables are stored in the switching fabric. Destination-based forwarding means that we use the destination address of an IP datagram, to look...

  • - Network security QUESTION 17 We assume that a LAN network includes 7 hosts (A, B,...

    - Network security QUESTION 17 We assume that a LAN network includes 7 hosts (A, B, C, D, E. Fand G) which are connected by a switch. The contents of the switch's CAM table is as follows: (Port 1. Host A) - (Port 2. Host B) - (Port 3. Host - Port 4, Host D) - Port S. Hosta-Port 6, Host F) - (Port 7. HostG), Also, we assume that there is/are one or many host(s) that has/have sent fake...

  • comm & networks fund 12. (8pts) Change the following IP addresses from dotted- decimal notation to...

    comm & networks fund 12. (8pts) Change the following IP addresses from dotted- decimal notation to binary notation. a. 197.163.222.19 b. Show in details how to convert 197 into binary 13. (&pts) Change the following IP addresses from binary notation to dotted-decimal notation. a. 11011111 10110000 00011111 01011101 b. Show in details how to convert 01011101 into decimal 14. (6pts) Find the class of the following IP addresses (i.e., classful addressing) a. 11110111 11110011 10000111 11011101 b. 10101111 11000000 11110000...

  • check my answers for Networking I came up with these answers, can check my answers Question...

    check my answers for Networking I came up with these answers, can check my answers Question 1: General What data rate is needed to transmit an uncompressed 4" x 6" photograph every second with a resolution of 1200 dots per inch and 24 bits per dot (pixel)? 691,200 kb/s 28.8 kb/s 8.29 Mb/s 829 Mb/s Question 2: Layering "Layering" is commonly used in computer networks because (check all that apply): -It forces all network software to be written in ‘C’....

  • computer networks help please !!! could someone help with the following tasks! ANY HELP WILL BE...

    computer networks help please !!! could someone help with the following tasks! ANY HELP WILL BE IMMENSELY APPRECIATED! THANKS. Task 1 In the following scenario, we would like to find out more information about a host that is on out network. Given an IP address we would like to search for additional information, we can start with obtaining the IP address off the default route. When running on a Linux VM, this like most likely to be the internal IP...

  • PART A 21 MARKS SHORT ANSWER QUESTIONS Answer ALL questions from this part. Write your answers...

    PART A 21 MARKS SHORT ANSWER QUESTIONS Answer ALL questions from this part. Write your answers in the Examination Answer Booklet. Each question is worth 1.5 marks (14 x 1.5 = 21 marks). Question 1 An organisation has been granted a block of addresses with the mask /22. If the organisation creates 8 equal-sized subnets, how many addresses (including the special addresses) are available in each subnet? Show your calculations. Question 2 Give an example of a valid classful address...

  • Q1 Error detection/correction Can these schemes correct bit errors: Internet checksums, two-dimendional parity, cyclic...

    Q1 Error detection/correction Can these schemes correct bit errors: Internet checksums, two-dimendional parity, cyclic redundancy check (CRC) A. Yes, No, No B. No, Yes, Yes c. No, Yes, No D. No, No, Yes E. Ho, hum, ha Q2 CRC vs Internet checksums Which of these is not true? A. CRC's are commonly used at the link layer B. CRC's can detect any bit error of up to r bits with an r-bit EDC. c. CRC's are more resilient to bursty...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT