Fragment identification,loss , fragmenting a fragment, Computer Network Security


IDENT field in every fragment matches IDENT field in real datagram. Fragments from different datagrams may arrive out of order and still be saved out.


IP may drop fragment because receiver drops whole original datagram. Destination sets timer with every fragment to check lost fragment. If timer ends before all fragments reach, fragment is assumed lost and datagram is removed. Host is assumed to retransmit.


Fragment may checks subsequent network with even smaller MTU. Router segments the fragment to fit. Resulting sub-fragments look just like real fragments. There is no use to reassemble hierarchically as sub-fragments add position in real datagram.



Posted Date: 8/1/2012 9:15:03 AM | Location : United States

Related Discussions:- Fragment identification,loss , fragmenting a fragment, Assignment Help, Ask Question on Fragment identification,loss , fragmenting a fragment, Get Answer, Expert's Help, Fragment identification,loss , fragmenting a fragment Discussions

Write discussion on Fragment identification,loss , fragmenting a fragment
Your posts are moderated
Related Questions
INTRODUCTION TO PLANNING FOR SECURITY The creation of an information security program begins with creation and review of organization’s information security policies, standards,

how can i start thesis? Please mention so of examples?

Ask question #Minimum.. 100 words accepted#

With explain the encryption model the help of diagram. Symmetric cipher model uses the secret-key or a single-key for encryption/decryption purposes. It employs a symmetric encr

(a) Explain the two possible configuration for 3DES. (b) What is the main disadvantage of 3DES? (c) Why are most modern symmetric algorithm block ciphers? (d) Describe

An injunction to 'think ethically' about a situation is not helpful. Perhaps if one has a background in moral philosophy this would work, but usually both students and IT professio

(a) Describe how CSMA/CD operates and explain how Ethernet deals with collisions. (b) Describe how the subsequent protocols work: i. ARP ii. DHCP iii. DNS iv. SMTP (c) The

what is an SSID?

Question: Spreadsheet packages are widely used in Business. a) Explain why spreadsheets are so useful. b) Spreadsheet files are sometimes saved for use by other software

Question: a) Explain what you understand by the term brute force attack, giving an example of such an attack b) Briefly outline the concept of Caesar cipher and identify a