Fragmentation, Computer Network Security

FRAGMENTATION

One method is to limit datagram size to smallest MTU of any server. IP needs fragmentation i.e. datagrams can be divided into pieces to fit in network with small MTU. Router checks datagram larger than network MTU and then it divided into pieces and every piece is smaller than outbound server MTU.

Each fragment is an independent datagram packet. It adds all header fields. Bit in header shows that the datagram is a fragment. Other fields have information for reconstructing original datagram packet. Fragment offset provides original location of fragment. Router has local MTU to device size of every fragment. It puts part of datagram from original datagram in every fragment and puts other information into message header. The fragmentation process is given in the diagram below.

 

 

1880_FRAGMENTATION.png

Posted Date: 8/1/2012 8:14:31 AM | Location : United States







Related Discussions:- Fragmentation, Assignment Help, Ask Question on Fragmentation, Get Answer, Expert's Help, Fragmentation Discussions

Write discussion on Fragmentation
Your posts are moderated
Related Questions
QUESTION (a) Define and distinguish between Electronic Commerce and Electronic Business (b) According to you what are the benefits that Electronic Commerce can brings to org

The key concepts and frameworks covered in modules 1-4 are particularly relevant for this assignment. Assignment 2 relates to the specific course learning objectives 1, 2 and 3:

QUESTION A small ISP requests your help. The technicians report that they have had no downstream access to the Internet. They believe the problem lies with their access provide

how would land elevation have canged if coronado had traveled 150 miles due west from what is today arizona instead of west toward new mexico

ADDRESS RESOLUTION PROTOCOL (ARP) TCP/IP can use any of the three address resolution functions relaying on the addressing procedure used by the underlying hardware. To guarant

SECURITY ANALYSIS Overview •    Know yourself: examine, identify, and understand the information and systems which are currently in place •    Know the enemy: examine, identify,

Digital Certificates Digital Certificates are electronic document having key value and identifying information about entity which controls key. Digital signature which is attach

Q. Attacks on wireless network WSN are vulnerable to attacks which compromise the integrity of the WSN nodes by decreasing the nodes' fault tolerance capabilities, data distrib

Using the selected approach, you should then conduct an audit or review of the information security issues associated with the use of computing facility and report on the findings.

The method used to check errors is checksum . In this method data is treated as a sequence of integers and their arithmetic sum is calculated and the carry bits are added to the