Fragment identification,loss , fragmenting a fragment, Computer Network Security

FRAGMENT IDENTIFICATION:

IDENT field in every fragment matches IDENT field in real datagram. Fragments from different datagrams may arrive out of order and still be saved out.

FRAGMENT LOSS:

IP may drop fragment because receiver drops whole original datagram. Destination sets timer with every fragment to check lost fragment. If timer ends before all fragments reach, fragment is assumed lost and datagram is removed. Host is assumed to retransmit.

FRAGMENTING A FRAGMENT:

Fragment may checks subsequent network with even smaller MTU. Router segments the fragment to fit. Resulting sub-fragments look just like real fragments. There is no use to reassemble hierarchically as sub-fragments add position in real datagram.

 

 

Posted Date: 8/1/2012 9:15:03 AM | Location : United States







Related Discussions:- Fragment identification,loss , fragmenting a fragment, Assignment Help, Ask Question on Fragment identification,loss , fragmenting a fragment, Get Answer, Expert's Help, Fragment identification,loss , fragmenting a fragment Discussions

Write discussion on Fragment identification,loss , fragmenting a fragment
Your posts are moderated
Related Questions
(a) Describe RSA encryption. (b) For an RSA encryption the values of the primes are: p=29, q=31. select e=11, evaluate the public and private keys. (c) How can RSA be used fo

ACCESS CONTROL DEVICES Successful access control system includes number of components, which depends on system’s requirements for authentication and authorization. Powerful auth

In this section, you should create a program that emulates a GBN node. Two GBN nodes will be running to send packets to each other through the UDP protocol. For emulation purpose,

Confidentiality Confidentiality of information ensures that only those with sufficient privileges may access specific information. When unauthorized individuals can access inform

You are provided with 3000 sample keystrokes for 5 users mentioned above. You can find this data using the ‘Lab 2 User Data' link in the ‘Lab 2' folder on Blackboard. Please note t

Dynamic Packet Filtering Dynamic Packet Filtering is also referred to as stateful firewalling. Here the firewall maintains the status of connections as well. When a connection

Question: Network diagrams combine with a set of systematic analysis procedures, serve to remedy the shortcomings of the Gantt chart. Explain the following terms used in the ne

THREADS AND ATTACKS Threat is an object, person, or other entity which represents a constant danger to an asset. To make sound decisions about information security, management s

QUESTION (a) What do you understand by a VLAN? Provide one advantage of using a VLAN. (b) What is a trunk port in a VLAN? (c) A VLAN will be created using one or more

Question: (a) Which of the following is not a goal of security: i) detection ii) prevention iii) recovery iv) prosecution (b) You are an honest student. One day you