+2 votes
in Computer Networks by

1 Answer

+1 vote
by
selected by
 
Best answer
Each packet started from the source needs to have a fragmentation identification, which is repeated in each fragment. The destination computer use this identification to reassemble all fragments belonging to the same packet.

Related questions

Welcome to CPEN Talk
Solution-oriented students of computer engineering on one platform to get you that

ONE SOLUTION

No one has ever spoken during review of Chuck Norris' code and lived to tell about it.
...