Fragmentation, Computer Network Security

FRAGMENTATION

One method is to limit datagram size to smallest MTU of any server. IP needs fragmentation i.e. datagrams can be divided into pieces to fit in network with small MTU. Router checks datagram larger than network MTU and then it divided into pieces and every piece is smaller than outbound server MTU.

Each fragment is an independent datagram packet. It adds all header fields. Bit in header shows that the datagram is a fragment. Other fields have information for reconstructing original datagram packet. Fragment offset provides original location of fragment. Router has local MTU to device size of every fragment. It puts part of datagram from original datagram in every fragment and puts other information into message header. The fragmentation process is given in the diagram below.

 

 

1880_FRAGMENTATION.png

Posted Date: 8/1/2012 8:14:31 AM | Location : United States







Related Discussions:- Fragmentation, Assignment Help, Ask Question on Fragmentation, Get Answer, Expert's Help, Fragmentation Discussions

Write discussion on Fragmentation
Your posts are moderated
Related Questions
Asymmetric Encryption Asymmetric encryption method makes use of two different but related keys and either key can be used to encrypt or decrypt the message. This method is freque

Application-Based IDS Application-based IDS (AppIDS) is an advanced version of HIDS. It examines application for abnormal events. The ability to view encrypted data is the uniqu

Problem (a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a TCP segment. The second screen capture is from the data portion of the frame.

ADDRESS MASKS To identify receiver, network apply address mask to receiver address and calculate to network address in routing table. It can use Boolean 'and' to calculate the

Discuss how developers should apply the following countermeasures to improve the security of their code:


People,Procedures,Data Asset Identification-Risk Management The human resources, data information and documentation assets are more difficult to identify. People having knowle

how to form the trojan integrated cirucit and what are the tools are used to simulate the ciruit to our system and how to pass it as input to the clustering algorithm to get the ou

UDP COMMUNICATION SEMANTICS:  UDP needs IP for all delivery, that is, similar best effort delivery as IP. To use UDP, an application have to either be immune to the causes or

COLLISION DETECTION The signals from two devices will interfere with each other and the overlapping of frames is known a collision. It does not cause to the hardware but data