In a Nutshell

Maximum Transmission Unit (MTU) defines the largest data unit that can be passed over a link. When a packet exceeds the MTU of any node in the path, it must be either fragmented or dropped. This article explains why fragmentation is one of the most hidden and destructive killers of network performance.

What is MTU?

Standard Ethernet has an MTU of 1,500 bytes. However, complex paths involving VPNs, MPLS, or PPPoE often add headers that reduce the available space for original data. When a router receives a packet larger than its egress interface's MTU, it has two choices:

  1. Fragment: Slice the packet into smaller pieces and forward them.
  2. Drop & Notify: Discard the packet and send an ICMP 'Destination Unreachable - Fragmentation Needed' message back to the sender.

MTU Fragmentation Simulator

Packet Size: 1500B | Link MTU: 1400B

MTU GATE (1400B)
1500B
Set Outbound Packet SizeFRAGMENTATION REQUIRED

The time required to reassemble fragmented packets at the destination increases CPU overhead and dramatically elevates Latency.

Path MTU Discovery (PMTUD)

Modern operating systems attempt to avoid fragmentation by discovering the smallest MTU along the entire path before sending data. This is done by setting the DF (Don't Fragment) bit in the IP header.

Calculating the Overhead

To calculate the payload efficiency, we look at the ratio of data to headers.

Efficiency=PayloadPayload+Headers×100%Efficiency = \frac{Payload}{Payload + Headers} \times 100\%

By optimizing the Infrastructure standards and ensuring consistent MTU across the backplane, engineers can eliminate the jitter and latency associated with packet slicing.

Share Article

Technical Standards & References

REF [1]
J. Mogul, S. Deering (1990)
RFC 1191: Path MTU Discovery
Published: IETF
The standard for determining the maximum packet size across a path.
VIEW OFFICIAL SOURCE
REF [2]
M. Mathis, J. Heffner (2007)
RFC 4821: Packetization Layer Path MTU Discovery
Published: IETF
An improved mechanism for discovering MTU without relying solely on ICMP Messages.
VIEW OFFICIAL SOURCE
Mathematical models derived from standard engineering protocols. Not for human safety critical systems without redundant validation.

Related Engineering Resources