Fragmentation, Computer Network Security

FRAGMENTATION

One method is to limit datagram size to smallest MTU of any server. IP needs fragmentation i.e. datagrams can be divided into pieces to fit in network with small MTU. Router checks datagram larger than network MTU and then it divided into pieces and every piece is smaller than outbound server MTU.

Each fragment is an independent datagram packet. It adds all header fields. Bit in header shows that the datagram is a fragment. Other fields have information for reconstructing original datagram packet. Fragment offset provides original location of fragment. Router has local MTU to device size of every fragment. It puts part of datagram from original datagram in every fragment and puts other information into message header. The fragmentation process is given in the diagram below.

 

 

1880_FRAGMENTATION.png

Posted Date: 8/1/2012 8:14:31 AM | Location : United States







Related Discussions:- Fragmentation, Assignment Help, Ask Question on Fragmentation, Get Answer, Expert's Help, Fragmentation Discussions

Write discussion on Fragmentation
Your posts are moderated
Related Questions
NSTISSC SECURITY MODEL The NSTISSC Security Model provides a detailed perspective on security. While the NSTISSC model covers the 3 dimensions of information security, it removes

Ask You have been asked by a new client to assist in setting up a new computer for her coffee shop. She has just purchased the newest Apple computer from an online site. Should wou

Your rules should ensure that Internet access will be restricted to the following: Only the following services will be permitted as OUTBOUND traffic (to the Internet from the DM

Question: (a) Explain how the Diffie-Hellman key establishment protocol works. (b) Prove that the Diffie-Hellman key establishment protocol is vulnerable to a `man in the mi

Write down short notes on the architecture of WWW which is World Wide Web. WWW which means The World Wide web or the web is a repository of information spread worldwide and rel

This project involves the design and development of a simulation environment of many sensors tagging material/ machinery/equipment/etc in a warehouse site to help monitor and manag

Question 1: (a) Differentiate between symmetric and asymmetric encryption system. (b) Describe how a digital signature is created. (c) Explain briefly what SSL (secure so

Network can be distinguished by shape. According to which there are three most popular methodologies, which are shown as follows; Star Ring Bus

Base lining •    Organizations do not have any contact to each other •    No two organizations are identical to each other •    The best practices are a moving target •    K

You are hired as a consultant to help design a digital library in which books are scanned and stored digitally and made available to users of the World Wide Web. Assume that the li