Does CRC depends on MTU size ?

Hello everybody,
Can someone please confirm the following :
1) Whether Switching in Physical layer casues CRC on router interface for DS3 TDM link.
2) Also whether Increment in CRC depends on MTU size on router interface.
Thanks

Hello!
1) Yes this will cause CRC errors.
2) I do not think this will make a difference
Mike

Similar Messages

  • How do you change the MTU size in a Cisco 871?

    This 871 is at a remote site and is an ezvpn IPsec client (network extension mode) back to a 3030 headend.
    We're having problems with a PC trying to connect through the IPsec tunnel and we think it may be an MTU size problem.
    Int F4 is the outside interface.
    We are using a virtual-template associated with the crypto ipsec client ezvpn statement.
    When I go into any of the 871 interfaces and type 'mtu 1370' it errors out with 'The F4 (or whatever interface) does not allow manual MTU size configuration.
    If I type 'ip mtu 1370' on F4 (or vlan1 or virtual-template 1) this is accepted, but when I do a 'show int f 4', it still shows MTU of 1514 - even after a reload.
    What is the correct way to set the MTU size in the 871 router - and is it best set on the F4 interface, the vlan, or the virtual-template interface?

    Hi
    As per the supporting doc Cisco 871 has one want ethernet interface and 2 switch ports.
    I feel you are trying to change the mtu under the switch port which may not be possible.
    You can refer the below link for more info..
    http://www.cisco.com/en/US/products/hw/routers/ps380/products_data_sheet0900aecd8028a976.html
    regds

  • Does Cat2950 support MTU size changeable?

    Hi,
    Does anyone knows the catalyst 2950 software that can support MTU size changeable on FastEther port?
    I got a problem when connecting P (C7507) to a PE (C3640) on FastEther port using Cat2950 in between. When I ping with packet size greater than 1497, it does not pass through.
    swt01(config)#int f0/8
    swt01(config-if)#mtu ?
    <64-18000> MTU size in bytes
    swt01(config-if)#mtu 2000
    % Interface FastEthernet0/8 does not support user settable mtu.
    regards,
    --rizal

    Rizal, you have to set the MTU globally on the switch using the "system mtu" command - you cannot do it per interface.
    Be aware only the 2950G, 2950LRE and 2955 can support a larger MTU - upto 1530 bytes.
    Regards
    Daniel

  • If MTU size will increase in cisco 3550 does it will impact any traffic ?

    For WiFi traffic from source to destination MTU size should ping up to 1472 Now the MTU is pinging up to 1468 because port level MTU size is 1500 we need to increase 1522.
    while we changing size it will impact my traffic ?
    Model number: WS-C3550-24-DC-SMI
    #sh version
    Cisco IOS Software, C3550 Software (C3550-IPSERVICESK9-M), Version 12.2(25)SEE4, RELEASE SOFTWARE (fc1).
    Any suggestions on this.
    Thanks in advance.
    NagaPrasad

    Hello Prasad,
    Changing the MTU size in general will not cause any impact except if it is VPC domain.
    But it is advisible that MTU size keep same at both ends.
    FYI...
    Changing the MTU value (with the mtu interface configuration command) can affect the IP MTU value. If the current IP MTU value is the same as the MTU value, and you change the MTU value, the IP MTU value will be modified automatically to match the new MTU. However, the reverse is not true; changing the IP MTU value has no effect on the value for the mtu command.
    Please rate the helpfull posts.
    Regards,
    Naidu.

  • MTU Size Problem Loading Certain Webpages

    Hello Colleagues,
    I'm having a strange problem dealing with MTU sizes and loading certain webpages. I am aware of the default Microsoft MTU of 1500 and also using GRE IPSEC Tunnels recommended at MTU size 1400. I have since manually set some users PC's to MTU of 1400 and most of those users are experiencing no issues. However, there are a few users who still experience website loading issues even though I have manually changed their MTU size to 1400.
    These are domain accounts will the same image loads on their machines, so all have the same permissions, rights, firewall settings, etc. They all use the same LAN, switches, and routers.
    Here are the router configs, router 1 and router 2
    Router 1
    Current configuration : 9006 bytes
    version 15.3
    no service pad
    service timestamps debug datetime msec localtime
    service timestamps log datetime msec localtime
    service password-encryption
    hostname R-US-RS-WVPN1
    boot-start-marker
    boot system flash:c1900-universalk9-mz.SPA.153-1.T1.bin
    boot system flash:c1900-universalk9-mz.SPA.151-3.T1.bin
    boot-end-marker
    logging buffered 64000
    enable secret 5 *removed*
    no aaa new-model
    clock timezone CET 1 0
    clock summer-time CET recurring last Sun Mar 2:00 last Sun Oct 3:00
    errdisable recovery cause udld
    errdisable recovery cause bpduguard
    errdisable recovery cause rootguard
    errdisable recovery cause pagp-flap
    errdisable recovery cause dtp-flap
    errdisable recovery cause link-flap
    errdisable recovery interval 303
    ip cef
    ip domain name corp.com
    ip name-server 10.###.8.21
    ip name-server 10.###.8.96
    ip inspect dns-timeout 90
    ip inspect tcp idle-time 60
    ip inspect name fw smtp timeout 120
    ip inspect name fw ftp timeout 120
    ip inspect name fw realaudio
    ip inspect name fw tftp timeout 30
    ip inspect name fw udp timeout 30
    ip inspect name fw tcp timeout 60
    no ipv6 cef
    multilink bundle-name authenticated
    crypto pki trustpoint TP-self-signed-316595902
    enrollment selfsigned
    subject-name cn=IOS-Self-Signed-Certificate-316595902
    revocation-check none
    rsakeypair TP-self-signed-316595902
    crypto pki certificate chain TP-self-signed-316595902
    certificate self-signed 01
      *removed*
            quit
    license udi pid CISCO1921/K9 sn FTX153182M8
    spanning-tree vlan 229 priority 8192
    redundancy
    ip ssh version 2
    crypto isakmp policy 10
    hash md5
    authentication pre-share
    lifetime 3600
    crypto isakmp key *removed* address 70.###.172.142
    crypto isakmp key *removed* address 184.###.###.254
    crypto isakmp keepalive 35 11
    crypto ipsec transform-set FY-WVPN-Tunnel esp-aes esp-md5-hmac
    mode tunnel
    crypto map vpn 10 ipsec-isakmp
    set peer 70.###.172.142
    set peer 184.###.###.254
    set transform-set FY-WVPN-Tunnel
    match address gre-tunnel-list
    interface Loopback0
    ip address 10.###.0.10 255.255.255.255
    interface Tunnel2291
    description Primary-TimewarnerTelecom-Ral-FayWVPN1
    ip address 10.###.99.26 255.255.255.252
    no ip redirects
    cdp enable
    tunnel source 66.###.161.126
    tunnel destination 184.###.###.254
    crypto map vpn
    interface Tunnel2293
    description Primary-TimewarnerTelecom-Ral-FayWVPN2
    ip address 10.###.99.154 255.255.255.252
    no ip redirects
    cdp enable
    tunnel source 66.###.161.126
    tunnel destination 70.###.172.142
    crypto map vpn
    interface Embedded-Service-Engine0/0
    no ip address
    shutdown
    interface GigabitEthernet0/0
    description TW Telecom/DMVPN1
    ip address 66.###.161.126 255.255.255.252
    ip access-group Block-Internet in
    ip access-group Block-Internet out
    duplex auto
    speed auto
    no cdp enable
    crypto map vpn
    interface GigabitEthernet0/1
    no ip address
    duplex auto
    speed auto
    interface GigabitEthernet0/0/0
    switchport access vlan 229
    no ip address
    interface GigabitEthernet0/0/1
    switchport access vlan 229
    no ip address
    interface GigabitEthernet0/0/2
    switchport access vlan 229
    no ip address
    interface GigabitEthernet0/0/3
    description PBX Eth1
    switchport access vlan 229
    no ip address
    interface Vlan1
    no ip address
    shutdown
    interface Vlan229
    ip address 10.###.229.253 255.255.255.0
    ip helper-address 10.###.231.201
    standby 229 ip 10.###.229.254
    standby 229 priority 105
    standby 229 preempt
    router eigrp 100
    network 10.0.0.0
    ip forward-protocol nd
    no ip http server
    ip http secure-server
    ip route 70.###.172.142 255.255.255.255 66.###.161.125
    ip route 184.###.###.254 255.255.255.255 66.###.161.125
    ip route 205.###.96.180 255.255.255.252 66.###.161.125
    ip access-list extended Block-Internet
    permit esp host 66.###.161.126 host 184.###.###.254
    permit esp host 184.###.###.254 host 66.###.161.126
    permit udp host 66.###.161.126 host 184.###.###.254 eq isakmp
    permit udp host 184.###.###.254 host 66.###.161.126 eq isakmp
    permit esp host 66.###.161.126 host 70.###.172.142
    permit esp host 70.###.172.142 host 66.###.161.126
    permit udp host 66.###.161.126 host 70.###.172.142 eq isakmp
    permit udp host 70.###.172.142 host 66.###.161.126 eq isakmp
    permit icmp host 66.###.161.126 host 184.###.###.254
    permit icmp host 184.###.###.254 host 66.###.161.126
    permit icmp host 66.###.161.126 host 70.###.172.142
    permit icmp host 70.###.172.142 host 66.###.161.126
    permit icmp any any echo-reply
    permit icmp any any time-exceeded
    permit icmp any any packet-too-big
    permit icmp any any traceroute
    permit icmp any any unreachable
    deny   ip any any
    deny   icmp any any
    ip access-list extended gre-tunnel-list
    permit gre host 66.###.161.126 host 184.###.###.254
    permit gre host 66.###.161.126 host 70.###.172.142
    logging host 10.100.###.254
    logging host 10.100.###.246
    snmp-server community a RW 20
    snmp-server community r RO 20
    snmp-server community a RW 20
    snmp-server community r RO 20
    snmp-server community P_RW RW
    snmp-server community P_RO RO
    snmp-server enable traps entity-sensor threshold
    snmp-server host 10.100.###.246 public
    snmp-server host 10.100.###.254 public
    access-list 20 permit 10.###.9.3
    access-list 20 permit 10.###.8.16
    access-list 20 permit 10.100.###.249
    access-list 20 permit 10.100.###.254
    access-list 20 permit 10.100.###.246
    control-plane
    banner motd ^CCCCCCC
    ****************** Warning! Warning! Warning! ********************
    This system is restricted to authorized users for business
    purposes.  Unauthorized access is a violation of the law.  This
    service may be monitored for administrative and security reasons.
    By proceeding, you consent to this monitoring
    ****************** Warning! Warning! Warning! ********************
    ^C
    line con 0
    login local
    line aux 0
    line 2
    no activation-character
    no exec
    transport preferred none
    transport input all
    transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
    stopbits 1
    line vty 0 4
    exec-timeout 60 0
    password 7 *removed*
    login local
    transport input ssh
    line vty 5 15
    exec-timeout 60 0
    password 7 *removed*
    login local
    transport input ssh
    scheduler allocate 20000 1000
    ntp server 10.###.8.8 prefer
    ntp server 10.###.231.200 prefer
    ntp server 10.###.8.69
    ntp server 10.###.1.6 prefer
    end
    Router 2
    Current configuration : 9013 bytes
    version 15.3
    no service pad
    service timestamps debug datetime msec localtime
    service timestamps log datetime msec localtime
    service password-encryption
    hostname R-US-RS-WVPN2
    boot-start-marker
    boot system flash:c1900-universalk9-mz.SPA.153-1.T1.bin
    boot system flash:c1900-universalk9-mz.SPA.151-3.T1.bin
    boot-end-marker
    logging buffered 64000
    logging console critical
    enable secret 5 *removed*
    no aaa new-model
    clock timezone CET 1 0
    clock summer-time CET recurring last Sun Mar 2:00 last Sun Oct 3:00
    errdisable recovery cause udld
    errdisable recovery cause bpduguard
    errdisable recovery cause rootguard
    errdisable recovery cause pagp-flap
    errdisable recovery cause dtp-flap
    errdisable recovery cause link-flap
    errdisable recovery interval 303
    ip cef
    ip domain name corp.mann-hummel.com
    ip name-server 10.###.8.21
    ip name-server 10.###.8.96
    ip inspect dns-timeout 90
    ip inspect tcp idle-time 60
    ip inspect name fw smtp timeout 120
    ip inspect name fw ftp timeout 120
    ip inspect name fw realaudio
    ip inspect name fw tftp timeout 30
    ip inspect name fw udp timeout 30
    ip inspect name fw tcp timeout 60
    ipv6 multicast rpf use-bgp
    no ipv6 cef
    multilink bundle-name authenticated
    crypto pki trustpoint TP-self-signed-3179596086
    enrollment selfsigned
    subject-name cn=IOS-Self-Signed-Certificate-3179596086
    revocation-check none
    rsakeypair TP-self-signed-3179596086
    crypto pki certificate chain TP-self-signed-3179596086
    certificate self-signed 01
      *removed*
            quit
    license udi pid CISCO1921/K9 sn FTX153182M2
    spanning-tree vlan 229 priority 1###84
    redundancy
    ip ssh version 2
    crypto isakmp policy 10
    hash md5
    authentication pre-share
    lifetime 3600
    crypto isakmp key *removed* address 70.###.172.142
    crypto isakmp key *removed* address 184.###.###.254
    crypto isakmp keepalive 35 11
    crypto ipsec transform-set Fay-Ral-WVPN-Tunnel esp-aes esp-md5-hmac
    mode tunnel
    crypto map vpn 10 ipsec-isakmp
    set peer 184.###.###.254
    set peer 70.###.172.142
    set transform-set Fay-Ral-WVPN-Tunnel
    match address gre-tunnel-list
    interface Loopback0
    ip address 10.###.0.12 255.255.255.255
    interface Tunnel2292
    description Failover-TimewarnerCable-Ral-Fay-WVPN2
    ip address 10.###.99.30 255.255.255.252
    no ip redirects
    cdp enable
    tunnel source 96.###.25.226
    tunnel destination 184.###.###.254
    crypto map vpn
    interface Tunnel2294
    description Failover-TimewarnerCable-Ral-Fay-WVPN2
    ip address 10.###.99.158 255.255.255.252
    no ip redirects
    cdp enable
    tunnel source 96.###.25.226
    tunnel destination 70.###.172.142
    crypto map vpn
    interface Embedded-Service-Engine0/0
    no ip address
    shutdown
    interface GigabitEthernet0/0
    description Fay-Ral WVPN
    ip address 96.###.25.226 255.255.255.252
    ip access-group Block-Internet in
    ip access-group Block-Internet out
    duplex auto
    speed auto
    no cdp enable
    crypto map vpn
    interface GigabitEthernet0/1
    no ip address
    shutdown
    duplex auto
    speed auto
    interface GigabitEthernet0/0/0
    switchport access vlan 229
    no ip address
    interface GigabitEthernet0/0/1
    switchport access vlan 229
    no ip address
    interface GigabitEthernet0/0/2
    switchport access vlan 229
    no ip address
    interface GigabitEthernet0/0/3
    description PBX Eth2
    switchport access vlan 229
    no ip address
    interface Vlan1
    no ip address
    shutdown
    interface Vlan229
    ip address 10.###.229.252 255.255.255.0
    ip helper-address 10.###.231.201
    standby 229 ip 10.###.229.254
    standby 229 preempt
    router eigrp 100
    network 10.0.0.0
    ip forward-protocol nd
    no ip http server
    ip http secure-server
    ip route 70.###.172.142 255.255.255.255 96.###.25.225
    ip route 184.###.###.254 255.255.255.255 96.###.25.225
    ip route 205.###.96.180 255.255.255.252 66.###.161.125
    ip access-list extended Block-Internet
    permit esp host 96.###.25.226 host 184.###.###.254
    permit esp host 184.###.###.254 host 96.###.25.226
    permit udp host 96.###.25.226 host 184.###.###.254 eq isakmp
    permit udp host 184.###.###.254 host 96.###.25.226 eq isakmp
    permit esp host 96.###.25.226 host 70.###.172.142
    permit esp host 70.###.172.142 host 96.###.25.226
    permit udp host 96.###.25.226 host 70.###.172.142 eq isakmp
    permit udp host 70.###.172.142 host 96.###.25.226 eq isakmp
    permit icmp host 96.###.25.226 host 184.###.###.254
    permit icmp host 184.###.###.254 host 96.###.25.226
    permit icmp host 96.###.25.226 host 70.###.172.142
    permit icmp host 70.###.172.142 host 96.###.25.226
    permit icmp any any echo-reply
    permit icmp any any time-exceeded
    permit icmp any any packet-too-big
    permit icmp any any traceroute
    permit icmp any any unreachable
    deny   ip any any
    deny   icmp any any
    ip access-list extended gre-tunnel-list
    permit gre host 96.###.25.226 host 184.###.###.254
    permit gre host 96.###.25.226 host 70.###.172.142
    logging host 10.100.###.254
    logging host 10.100.###.246
    snmp-server community P_RW RW
    snmp-server community P_RO RO
    snmp-server community a RW 20
    snmp-server community r RO 20
    snmp-server community a RW 20
    snmp-server community r RO 20
    snmp-server enable traps entity-sensor threshold
    snmp-server host 10.100.###.246 public
    snmp-server host 10.100.###.254 public
    access-list 20 permit 10.###.9.3
    access-list 20 permit 10.###.8.16
    access-list 20 permit 10.100.###.249
    access-list 20 permit 10.100.###.254
    access-list 20 permit 10.100.###.246
    control-plane
    banner motd ^CCCCCC
    ****************** Warning! Warning! Warning! ********************
    This system is restricted to authorized users for business
    purposes.  Unauthorized access is a violation of the law.  This
    service may be monitored for administrative and security reasons.
    By proceeding, you consent to this monitoring
    ****************** Warning! Warning! Warning! ********************
    ^C
    line con 0
    login local
    line aux 0
    line 2
    no activation-character
    no exec
    transport preferred none
    transport input all
    transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
    stopbits 1
    line vty 0 4
    exec-timeout 60 0
    password 7 *removed*
    login local
    transport input ssh
    line vty 5 15
    exec-timeout 60 0
    password 7 *removed*
    login local
    transport input ssh
    scheduler allocate 20000 1000
    ntp server 10.###.8.8 prefer
    ntp server 10.###.231.200 prefer
    ntp server 10.###.8.69
    ntp server 10.###.1.6 prefer
    end

    UPDATE
    I have since applied the following config to the tunnel interfaces:
    ip mtu 1400
    ip tcp adjust-mss 1400
    tunnel path-mtu-discovery
    This worked and I was able to reset each users PC to default MTU size of 1500, but only until just now. I got a call from a user who explained that he wasn't able to reach some websites, again.
    Sure enough, I've just confirmed that all of the users are unable to access the websites any longer.
    This is crazy, does anyone have any ideas?

  • Sharepoint 2003 Message please wait while setup upgrades your sharepoint sites. This may take a few minutes to a few hours depending on the size of your sites.

    Hi All,
      We have recently installed Service Pack 4 In SharePoint 2003 I,e SPS 2.0 , we ran the stsadm upgrade command from the Command Prompt , since 5 days the upgrading the sites windows showing and does it completes or not or is there some thing wrong ?.
    Environment:
        SharePoint 2003 Service Pack 3
    SharePoint 2003 Message  :
    Please wait while setup upgrades your sharepoint sites. This may take a few minutes to a few hours depending on the size of your sites.
    We have applied in development box it was completed in 8 hours , but when we do the same in production it was never coming back since 5 days. Not sure what happening
    Thanks in Advance
    Ravishankar Maduri MCTS,MCPD,MCP

    how large are your site collections and content databases?
    sounds to me like you're WELL past the recommendations, which could certainly cause such an impact.
    Scott Brickey
    MCTS, MCPD, MCITP
    www.sbrickey.com
    Strategic Data Systems - for all your SharePoint needs

  • Can I set the MTU size for the Airport Extreme?

    Can I change the MTU size setting of the Airport? How would this be possible? In my Linksys router I was able to change this.

    Since the AirPort Extreme base station (AEBS) does not modify the packets in any way. So as neptune2000 stated, there is no MTU setting. Whatever MTU your computer broadcasts with is unchanged by the AEBS.
    You will need to configure the MTU on the computer sending the packets.

  • FTTH connection proper MTU Size and Jumbo frames

    I've recently moved to a ISP that provides a 4mbps connection through FTTH(Single OFC). There is a EPON ONU in my premise from which a RJ-45 lan cable is connected to my Intel DH67CL1 board based PC. manual says, the NIC is a gigabit ethernet card. I tried setting MTU of 8996 and I can ping and browse fine. But, I'm totally in dark whether this value is optimum and works flawlessly browsing sites. How to find and set the proper MTU for a fibre network like this? Is the value correct?
    I tried like this decreasing mtu value:
    ifconfig eth0 mtu 8997
    SIOCSIFMTU: Invalid argument
    then,
    ifconfig eth0 mtu 8996
    ^^^ No error message and it seems accepting.
    BTW, from arch wiki, I saw that the driver module(e1000e which is used here) used by NIC  have some bug report filed wr.to Jumbo frame. Am I doing things correctly? Earlier MTU was at default 1500. Please guide. thank you
    Some drivers will prevent lower C-states
    Some kernel drivers, like e1000e will prevent the CPU from entering C-states under C3 with non-standard MTU sizes by design. See bugzilla #77361 for comments by the developers.
    https://wiki.archlinux.org/index.php/Ju … mbo_frames

    yeah, i actually talked to support and they told me the same thing. just another example of misleading information from Linksys as here is what the manual and the help page say:
    MTU
    MTU is the Maximum Transmission Unit. It specifics the largest packet size permitted for Internet transmission. Select Manual if you want to manually enter the largest packet size that will be transmitted. The recommended size, entered in the Size field, is 1500. You should leave this value in the 1200 to 1500 range. To have the Router select the best MTU for your Internet connection, keep the default setting, Auto.
    no where in that description does it say that 1500 is the maxmium. 
    because this is also a gigabit switch, one would expect that jumbo frame support is not out of the realm of possibility. as a point of reference any other $50 (or less) gigabit switch supports this, but that's what i get for expecting too much from Linksys.
    thanks for the info.

  • AirPort Wireless Leopard Mac-Mini  Setting the MTU size

    Does anyone know how to set the MTU size for the wireless ?
    Setting the MTU on the Ethernet is easy now that an Advanced>> custom is available for the Ethernet interface. But no such interface exists for the Wireless NIC card. The MAC default = 1500 and for use in PPTP VPNs that causes issues and I would like set the MTU to 1200
    PPTP works great with Ethernet set for 1200
    also using Fusion and windows VM I can set the MTU size for the wireless and PPTP works great inside the Windows VM
    Now if i could just set the MTU for the wireless when operating in normal MAC OS

    Open a terminal window, and, assuming your airport interface is called "en0", enter the following command :
    +ifconfig en0 mtu 1200+
    You'll have to do this each time you restart the system, though, so you might want to setup a startup script yourself or use a third-party utility to do so.

  • System MTU size on Cisco switch

    after setting sys mtu to something other than 1500 on a WS-C3750G-24TS-1U it appears that this setting will stay in effect even if the startup config is erased and the switch is reloaded. My question is. Does this mean that if I need to replace the switch and I just load a saved version of the config and the vlan.dat files. Most likley if I am running a non default MTU this will not be in effect on the new switch.

    Hi IP,
    if i was understood properly, you have changed the MTU size of cisco 3750 from default 1500 bytes to 1998(eg.) now even after restarting the switch, this MTU size doesn't come to the default value of 1500 bytes & also when you tried put this config & vlan.dat file you wanted to know whether this changed MTU value will be in effect. Answer is NO, bcoz config & vlan.dat doesn't contain this MTU settings. but you can again manually change the MTU size to 1500 bytes & restart the switch.
    hope this helps.
    rate this post if it is been clarified.

  • MPLS MTU size

    Hello,
    Please correct me if I am wrong. The MPLS MTU size is 1518 to 1520 and the normal MTU size is 1500, So does it means that while configuring the MPLS network on the Switches attached with the MPLS CE router we MUST have to configure the MTU size to 1520 or not.
    Please confirm

    MPLS is not configured between the CE and the PE. So if your IP mtu is 1500 then the switch between the CE and PE needs to support 1500 only.
    The mpls mtu needs to be configured in the core where ethernet switches are used.
    Hope this helps,

  • Why does KOffice depend on gtk?

    When I try to install KOffice, I get:
    resolving dependencies... done.
    looking for inter-conflicts... done.
    Targets: libgsf-1.14.3-2  wv2-0.2.3-1  lcms-1.16-1  libwmf-0.2.8.4-4
             atk-1.18.0-2  cairo-1.4.6-2  libthai-0.1.8-1  pango-1.16.4-1
             gtk2-2.10.13-1  libcroco-0.6.1-1  librsvg-2.16.1-1
             imagemagick-6.3.4.4-1  python-2.5.1-1  libwpd-0.8.9-1
             libexif-0.6.16-1  koffice-1.6.3-2  libdatrie-0.1.1-1
    Total Package Size:   49.97 MB
    Proceed with installation? [Y/n]
    Why does it depend on gtk2?
    Last edited by miggols99 (2007-07-08 17:30:57)

    librsvg is dependent on GTK2. This was discussed at KDE-devel:
    http://lists.kde.org/?l=koffice-devel&m … 425620&w=2
    Last edited by skottish (2007-07-08 17:44:57)

  • With MPLS - No Fragmantation with MTU Size 1501-1504

    Ping with MTU 1500 and 1505 is OK.
    Ping with MTU 1501-1504 doesn?t work - there is no fragmantation done.
    This occures on a Cisco7200 and Cisco7500 where traffic is sended via a labeld switch path: MTU-Size from the Fast/Gig Eth-Interface is set to 1500. With no MPLS "no mpls ip" everthing works fine.
    Does anyone have a solution for this?
    Thanks and Regards
    Erich

    Hello,
    did you configure "mpls mtu 1512" on all MPLS enabled interfaces? F.e.:
    interface FastEthernet0/0/0
    mpls mtu 1512
    This would allow for as much as 3 labels.
    There is no fragmentation for labeled packets, only for IP. So this could be a software/hardware bug as well.
    Hope this helps! Please rate all posts.
    Regards, Martin

  • Recommended MTU Size setting within the router and...

    Hello!
    I was wondering what MTU Size do you guys recomended me setting within the Router Interface
    and on Windows for best performance when on a BT Broadband service?
    Note: It's not a BT Router i'm using, i'm using a Netgear DG834N.
    I am sure BT Routers like the HomeHub have a MTU Size of 1500 set in the Router Interface, am I correct?
    My Netgear DG834N has a  MTU Size of 1458 in the Router Interface by default.
    Thanks for responding.

    Personally I was able to squeeze about 11KB/s more out of my 8128Kbps line by setting my MTU to '1430', maxing out my throughput at (after the change): 859KB/s. I'm on a 20CN DSLAM so it might be different on a 21CN MSAN.
    Why not experiment? You can't hurt your line (As long as your router's firmware doesn't reset your ADSL sync everytime you change it - If it does then DLM might have something to say ).
    Like this post? Give it a Star . If this post answers your question, please Mark it as the Accepted Solution.

  • SPA3000: Lowest MTU size

    I can let my DSL-modem lower the MTU size as soon as I receive of make a call.
    This is done with IPQoS EF Timer.
    I want to do this so other heavy traffic like P2P-clients get slowed down when I am calling. I set MTU at 512 but my call gets disconnected after about 25 secs. when I set it at 768 my call doesn't get disconnected.
    I would like to know the official lowest MTU size the SPA3000 can work with.
    I add to this that it's not a VoIP Service Provider issue as I made a call with another ATA, same MTU setting (512), and the call didn't get disconnected.
    SPA-3000
    2.0.1(5673)
    3.1.20(GW)
    Thanks in advance.
    Message Edited by caesu on 11-26-2007 12:40 AM

    I will try to rephrase what I already have said.
    First, for the UDP datagrams, fragmentation is not supported.
    If you have to send 501 bytes UDP datagram, with MTU=500 it will get dropped. No excuse. No fragmentation. Packet is lost. If it's important SIP packet to keep the "session-in-progress" this may cause session drop.
    Second, the SIP UDP datagrams can be large. As it's plain text messages, there is no compression / optimization on those datagrams. Within the SIP language boundaries, SIP device is free to compose the SIP UDP datagrams as needed. I have seen logs/debugs with the SIP UDP datagrams close to 1300 bytes.
    Third, SIP UDP datagrams are sent moreless asynchronous comparing to RTP stream. At the beginning of the call, device(s) and VoIP/SIP switchboard will use the SIP dialog to initiate the phone call. After this, the RTP UDP datagrams stream is exchanged moreless independently on the RTP port(s), while device(s) continue to speak with switchboard with the SIP messages. Those messages may bring info like : ringing, call connected, call ended, call waiting on the line, invitation to another call / conference.
    Fourth, for priorizing the RTP datagrams over other traffic, the RTP packets are (can be) marked by SIP VoIP device with certain TOS type. This TOS type can be used by QOS-enabled routers to pass the RTP stream first, SIP second (different TOS) and other traffic last. Using MTU for this purpose which MTU is NOT intended to may cause you unpredictable troubles anytime.
    Fifth, I realy doubt you can configure SPA-3000's MTU size. I did not find it in the configuration. So very likely, SPA-3000 sends all packets as needed, but your MTU-limited device does not transfer the longer datagrams further, as fragmentation not possible. As UDP works without ACK mechanism on IP level, the SPA-3000 device will never notice the datagrams are dropped on the transport path.
    You shall collect the SIP debugs (SPA-3000 can generate them to syslog server) and possibly the capture of the network traffic (for example using wireshark) between the SPA-3000 and your MTU-limited device (using port mirroring and/or HUB to ensure all packets are sent to all cards).
    Here, compare the SIP debugs and SIP datagrams in the wireshark to determine, how big the SIP UDP datagrams are, and which SIP message is realy not transferred. You may collect two sets, one with standard MTU, one with limited MTU and you shall get your answer how big the SIP message realy is.

Maybe you are looking for