Fragment identification,loss , fragmenting a fragment, Computer Network Security

FRAGMENT IDENTIFICATION:

IDENT field in every fragment matches IDENT field in real datagram. Fragments from different datagrams may arrive out of order and still be saved out.

FRAGMENT LOSS:

IP may drop fragment because receiver drops whole original datagram. Destination sets timer with every fragment to check lost fragment. If timer ends before all fragments reach, fragment is assumed lost and datagram is removed. Host is assumed to retransmit.

FRAGMENTING A FRAGMENT:

Fragment may checks subsequent network with even smaller MTU. Router segments the fragment to fit. Resulting sub-fragments look just like real fragments. There is no use to reassemble hierarchically as sub-fragments add position in real datagram.

 

 

Posted Date: 8/1/2012 9:15:03 AM | Location : United States







Related Discussions:- Fragment identification,loss , fragmenting a fragment, Assignment Help, Ask Question on Fragment identification,loss , fragmenting a fragment, Get Answer, Expert's Help, Fragment identification,loss , fragmenting a fragment Discussions

Write discussion on Fragment identification,loss , fragmenting a fragment
Your posts are moderated
Related Questions
For simplicity, each character is regarded as one data packet, which means that the data in each packet should have the max length of only 1 byte. Your own packet header (not th

QUESTION a) Consider the speed of propagation of an electrical signal is same to 2x10 8 m/s, evaluate the ratio of the propagation delay to the transmit time for the given typ

QUESTION (a) Describe the role of DNS root servers in the Internet network. (b) What do you understand by the handover concept in a mobile network? (c) List five meth

Mapping between a hardware address and a protocol address is known Address Resolution. A router or host uses address resolution when it requires to transmit a packet to another dev

In this assignment, you are required to emulate the operation of a link layer and network layer protocols in a small computer network. Your program should behave like a single node

(a) What are the different architectures for wireless networks? (b) Explain how WEP authentication and encryption works, describe the vulnerability. (c) In what ways are secu

Feasibility Studies Before deciding on strategy, all information of economic or non economic consequences of vulnerability of information asset should be explored. A number of w

Question: (a) What do you meant by the term diffusion and confusion? Explain how diffusion and confusion can be implemented. (b) Distinguish between authorisation and auth

RING TOPOLOGY In this topology of network the devices are connected to each other in packed loop. In this network first computer passes data packet to the second and then seco

what is the guaranteed quality of this coursework? how many days it take for 10-12 pages? how much will be? thanks