+2 votes
in Computer Networks by

1 Answer

+1 vote
selected by
Best answer
Each packet started from the source needs to have a fragmentation identification, which is repeated in each fragment. The destination computer use this identification to reassemble all fragments belonging to the same packet.

Related questions

Welcome to CPEN Talk
Solution-oriented students of computer engineering on one platform to get you that


Chuck Norris doesn't do Burn Down charts, he does Smack Down charts.