+2 votes
in Computer Networks by

1 Answer

+1 vote
selected by
Best answer
Each packet started from the source needs to have a fragmentation identification, which is repeated in each fragment. The destination computer use this identification to reassemble all fragments belonging to the same packet.

Related questions

Welcome to CPEN Talk
Solution-oriented students of computer engineering on one platform to get you that


No one has ever spoken during review of Chuck Norris' code and lived to tell about it.