Fragmentation and path mtu, Computer Network Security

FRAGMENTATION AND PATH MTU

IPv6 source is responsible for fragmentation. Routers simply drop datagrams bigger than network MTU. So source have to fragment datagram to arrive destination.

Source calculates path MTU. The smallest MTU on any network between destination and source and it fragments datagram to fix within that MTU.The process of learning the path MTU is called as path MTU discovery.  Source transmits probe message of different sizes until destination arrived. It have to be dynamic i.e. path may modify during transmission of message.

USE OF MULTIPLE HEADERS:

It has given advantages:

  • Efficiency: Header is only as big as necessary.
  • Flexibility: it may add new headers for new features.
  • Incremental development: It can include processing for new features to testbed, other routers will remove those headers.

 

Posted Date: 8/1/2012 9:27:40 AM | Location : United States







Related Discussions:- Fragmentation and path mtu, Assignment Help, Ask Question on Fragmentation and path mtu, Get Answer, Expert's Help, Fragmentation and path mtu Discussions

Write discussion on Fragmentation and path mtu
Your posts are moderated
Related Questions
Problem (a) Using Vigenère cipher and given the key abc, find the ciphertext for the message: simplicity Only the 26 lower-case alphabetical characters are used in messa

Question (a) Name 3 popular electronic mail access protocols? (b) i. What is DNS? ii. Briefly, describe what it does and how it works? iii. Why does DNS use a dist

Computer networks are defined by four factors which are as given below: 1) NETWORK SIZE: According to the size of networks. 1) Local Area Network ( LAN) 2) Wide Area Ne

Problem 1 Solve the following Caesar cipher by showing your working: EM KIUM EM AIE EM KWVYCMZML Problem 2 Compare and contrast between block and stream ciphers, listin

Threat Identification After identifying and performing a primary classification of an organization’s information assets, the analysis phase moves onto an examination of threats

briefly expslain type of e-commerce

VIRTUAL PACKETS These data packets serve same reason in Internet as frames on LAN. Every packet has a header. Routers, which are normally gateways, transfer packets between ph

Q. Explain the random key distribution? The triple key management mechanisms ensure a better and complete security solution using the random key distribution mechanism. In this

Normal 0 false false false EN-US X-NONE X-NONE

Problem : (a) Provide one possible classification of PCA, ART, RBF, and Fuzzy ARTMAP networks. (b) Describe in detail the characteristics of Radial Basis Function Neural Net