Fragmentation, Computer Network Security


One method is to limit datagram size to smallest MTU of any server. IP needs fragmentation i.e. datagrams can be divided into pieces to fit in network with small MTU. Router checks datagram larger than network MTU and then it divided into pieces and every piece is smaller than outbound server MTU.

Each fragment is an independent datagram packet. It adds all header fields. Bit in header shows that the datagram is a fragment. Other fields have information for reconstructing original datagram packet. Fragment offset provides original location of fragment. Router has local MTU to device size of every fragment. It puts part of datagram from original datagram in every fragment and puts other information into message header. The fragmentation process is given in the diagram below.




Posted Date: 8/1/2012 8:14:31 AM | Location : United States

Related Discussions:- Fragmentation, Assignment Help, Ask Question on Fragmentation, Get Answer, Expert's Help, Fragmentation Discussions

Write discussion on Fragmentation
Your posts are moderated
Related Questions
Ask question #Minimum 100 words acceptwwwed#

QUESTION (a) Describe the role of DNS root servers in the Internet network. (b) What do you understand by the handover concept in a mobile network? (c) List five meth

Maximum Transmission Unit  (MTU) Each hardware method specification adds the definition of the maximum size of the frame data area, which is known the Maximum Transmission Uni

Normal 0 false false false EN-US X-NONE X-NONE

QUESTION (a) Which PKI (Public Key Infrastructure) model is typically favored by business organization? (b) Give one possible use of the "extensions" field of an X.509 certi

Question: (a) i. Explain what is meant by Discretionary Access Control and Mandatory Access Control ii. Which method would be the most effective to ensure that users do

The key concepts and frameworks covered in modules 1-4 are particularly relevant for this assignment. Assignment 2 relates to the specific course learning objectives 1, 2 and 3:

Encode the following plaintext, using the Caesar cipher: LORD OF THE RINGS b) The following ciphertext jw njbh lxmn cx kanjt has been encoded using a

Q. Explain the random key distribution? The triple key management mechanisms ensure a better and complete security solution using the random key distribution mechanism. In this