Fragmentation, Computer Network Security

FRAGMENTATION

One method is to limit datagram size to smallest MTU of any server. IP needs fragmentation i.e. datagrams can be divided into pieces to fit in network with small MTU. Router checks datagram larger than network MTU and then it divided into pieces and every piece is smaller than outbound server MTU.

Each fragment is an independent datagram packet. It adds all header fields. Bit in header shows that the datagram is a fragment. Other fields have information for reconstructing original datagram packet. Fragment offset provides original location of fragment. Router has local MTU to device size of every fragment. It puts part of datagram from original datagram in every fragment and puts other information into message header. The fragmentation process is given in the diagram below.

 

 

1880_FRAGMENTATION.png

Posted Date: 8/1/2012 8:14:31 AM | Location : United States







Related Discussions:- Fragmentation, Assignment Help, Ask Question on Fragmentation, Get Answer, Expert's Help, Fragmentation Discussions

Write discussion on Fragmentation
Your posts are moderated
Related Questions
TRANSPORT PROTOCOLS: Give application-to-application communication. Require extended addressing mechanisms to check applications. Are known end-to-end communicatio

Belady's Anomaly Also known FIFO anomaly. Generally, on raising the number of frames given to a process' virtual storage, the program execution is faster, because lesser page

Problem 1: List measurable entities on which the quality of service in a data communication network depends Problem 2: Show the features of a typical Network Management

Question: (a) A string of ciphertext was enciphered using an a±ne transformation of single letters in a 28-letter alphabet consisting of A to Z, a blank and a?, where A to Z ha

Discuss how developers should apply the following countermeasures to improve the security of their code:

Question: (a) A Wireless Mesh Network (WMN) is a communications network made up of radio nodes organized in a mesh topology. i. Describe the function of a TAP in WMNs. ii.

B-Router Hybrid devices that has the features of both routers and bridges . A bridge router or brouter is a network machine that acts as a router and as a bridge. The brout

Describe what the FTAM services are. FTAM  stand for the File Transfer Access and Management: FTAM is an ISO application protocol which performs the operations on files such as.

Question: (a) State whether the following statements are TRUE or FALSE. Justify your answer. i. A good site security policy will require that users use computer generated p

In the e-mail system, where the e-mail messages are saved and why? E-mail messages are saved in user’s private electronic mailbox. A mailbox refers to a local/domestic hard drive c