Fragment identification,loss , fragmenting a fragment, Computer Network Security

FRAGMENT IDENTIFICATION:

IDENT field in every fragment matches IDENT field in real datagram. Fragments from different datagrams may arrive out of order and still be saved out.

FRAGMENT LOSS:

IP may drop fragment because receiver drops whole original datagram. Destination sets timer with every fragment to check lost fragment. If timer ends before all fragments reach, fragment is assumed lost and datagram is removed. Host is assumed to retransmit.

FRAGMENTING A FRAGMENT:

Fragment may checks subsequent network with even smaller MTU. Router segments the fragment to fit. Resulting sub-fragments look just like real fragments. There is no use to reassemble hierarchically as sub-fragments add position in real datagram.

 

 

Posted Date: 8/1/2012 9:15:03 AM | Location : United States







Related Discussions:- Fragment identification,loss , fragmenting a fragment, Assignment Help, Ask Question on Fragment identification,loss , fragmenting a fragment, Get Answer, Expert's Help, Fragment identification,loss , fragmenting a fragment Discussions

Write discussion on Fragment identification,loss , fragmenting a fragment
Your posts are moderated
Related Questions
Consider the following case study: In order to avoid criticisms of their existing manned road-toll payment system on its private road, WS-Pass has decided to adopt an automated

UDP- DATAGRAM TRANSPORT SERVICE INTRODUCTION:  UDP is the one of the transport protocols in TCP/IP protocol suite. UDP protocol accepts applications on the computers to

For this assignment you will create a program called MMWordFix (Multi-Mode WordFix). This program prompts the user to select one of three word filters (uppercase, lowercase, encryp

FRAME FORMAT AND ERROR DETECTION The changed frame format also adds CRC. If there is an error happened in frame, then it typically causes receiver to removed frame. The frame

Asymmetric Encryption Asymmetric encryption method makes use of two different but related keys and either key can be used to encrypt or decrypt the message. This method is freque

Question 1 a) Explain how CSMA/CD works. b) Describe the term "exponential back-off". c) Describe the differences between "circuit switching" and "packet switching". d) Th

Question: a. State briefly three reasons why computer networks are used? b. Differentiate between simplex, half-duplex and full-duplex mode of transmission. c. State any

attacks on crytography

Question: (a) State whether the following statements are TRUE or FALSE. Justify your answer. i. A good site security policy will require that users use computer generated p

Problem: (a) What do you meant by Network Address Translation (NAT)? Why is it used? (b) Given the following information by your ISP about your newly acquired Frame Relay c