Fragmentation and path mtu, Computer Network Security

FRAGMENTATION AND PATH MTU

IPv6 source is responsible for fragmentation. Routers simply drop datagrams bigger than network MTU. So source have to fragment datagram to arrive destination.

Source calculates path MTU. The smallest MTU on any network between destination and source and it fragments datagram to fix within that MTU.The process of learning the path MTU is called as path MTU discovery.  Source transmits probe message of different sizes until destination arrived. It have to be dynamic i.e. path may modify during transmission of message.

USE OF MULTIPLE HEADERS:

It has given advantages:

  • Efficiency: Header is only as big as necessary.
  • Flexibility: it may add new headers for new features.
  • Incremental development: It can include processing for new features to testbed, other routers will remove those headers.

 

Posted Date: 8/1/2012 9:27:40 AM | Location : United States







Related Discussions:- Fragmentation and path mtu, Assignment Help, Ask Question on Fragmentation and path mtu, Get Answer, Expert's Help, Fragmentation and path mtu Discussions

Write discussion on Fragmentation and path mtu
Your posts are moderated
Related Questions
(a) Cost allocation mechanisms are important when it comes to establishing other aspects of inter-firm compensations and how these are transferred to the users. There are two pri

Question: a. State briefly three reasons why computer networks are used? b. Differentiate between simplex, half-duplex and full-duplex mode of transmission. c. State any

Access Controls Access controls addresses admission of a user into a trusted area of organization. It comprises of a combination of policies & technologies. The ways to control

Question 1 Explain the types of threats (Attacks) Question 2 What are the Characteristics of Good Encryption Technique? Question 3 Write a note on Digital Signatur

Question: (a) Data on four variables are stored in a file called file1.dat. The first line of the file is the variable names f, x, y and z. Give the R commands to (i) read t

POINT-TO-POINT: In Point-to-Point topology there are two kind of topologies. 1) STAR topology 2) TREE topology In star topology each and every computer is connect

Question: (a) State the strong law of large numbers. (b) Data have been collected on response times (in minutes) at a fire station. The data are 2:7 1:8 0:8 1:4 1:2 (i

PROCESSING AN INCOMING ARP MESSAGE When an ARP message reaches, the protocol specifies that the receiver must operate two basic steps. First the receiver finds the sender's add

INTRODUCTION TO PLANNING FOR SECURITY The creation of an information security program begins with creation and review of organization’s information security policies, standards,

For this assignment you will create a program called MMWordFix (Multi-Mode WordFix). This program prompts the user to select one of three word filters (uppercase, lowercase, encryp