Fragment identification,loss , fragmenting a fragment, Computer Network Security

FRAGMENT IDENTIFICATION:

IDENT field in every fragment matches IDENT field in real datagram. Fragments from different datagrams may arrive out of order and still be saved out.

FRAGMENT LOSS:

IP may drop fragment because receiver drops whole original datagram. Destination sets timer with every fragment to check lost fragment. If timer ends before all fragments reach, fragment is assumed lost and datagram is removed. Host is assumed to retransmit.

FRAGMENTING A FRAGMENT:

Fragment may checks subsequent network with even smaller MTU. Router segments the fragment to fit. Resulting sub-fragments look just like real fragments. There is no use to reassemble hierarchically as sub-fragments add position in real datagram.

 

 

Posted Date: 8/1/2012 9:15:03 AM | Location : United States







Related Discussions:- Fragment identification,loss , fragmenting a fragment, Assignment Help, Ask Question on Fragment identification,loss , fragmenting a fragment, Get Answer, Expert's Help, Fragment identification,loss , fragmenting a fragment Discussions

Write discussion on Fragment identification,loss , fragmenting a fragment
Your posts are moderated
Related Questions
Question 1 The speech act theory is used as the model for communication among computational agents. Locution, illocution, and perlocution are the 3 aspects of this theory Using

The first and foremost need of  any business is a role to perform for its client base, and for the spammer this will typically be the role of advertising products which, due to the

IP DATAGRAM HEADER FORMAT:  It is given in the figure below:   In the table: VERS denotes the version of IP. H.LEN denotes the header length in units of

Question (a) In relation to a TCP segment structure, provide the fields responsible for: i. Connection Management ii. Flow Control iii. Error Control iv. Reliable, in-order

Belady's Anomaly Also known FIFO anomaly. Generally, on raising the number of frames given to a process' virtual storage, the program execution is faster, because lesser page

Ask question #Minimum.. 100 words accepted#

Evaluations, Assessment, and Maintenance of Risk Controls When the control strategy has been implemented, it should be monitored and measured on an ongoing basis to determine ef

Question : (a) State whether the following statement is FALSE or TRUE: It is always better to have various access points to the Internet so that if a hacker takes one down you

The Internet is known as the set of networks connected by routers that are configured to pass traffic among any machine attached to any network in the set. By internet several

Question: Suppose the following brief history of WLAN security standards: When the security of WEP was broken, the industry turned to the IEEE to fix it. The IEEE said it could