+2 votes
in Computer Networks by

1 Answer

+1 vote
by
selected by
 
Best answer
Each packet started from the source needs to have a fragmentation identification, which is repeated in each fragment. The destination computer use this identification to reassemble all fragments belonging to the same packet.

Related questions

Welcome to CPEN Talk
Solution-oriented students of computer engineering on one platform to get you that

ONE SOLUTION

Chuck Norris doesn't do Burn Down charts, he does Smack Down charts.
...