Fragmentation and path mtu, Computer Network Security


IPv6 source is responsible for fragmentation. Routers simply drop datagrams bigger than network MTU. So source have to fragment datagram to arrive destination.

Source calculates path MTU. The smallest MTU on any network between destination and source and it fragments datagram to fix within that MTU.The process of learning the path MTU is called as path MTU discovery.  Source transmits probe message of different sizes until destination arrived. It have to be dynamic i.e. path may modify during transmission of message.


It has given advantages:

  • Efficiency: Header is only as big as necessary.
  • Flexibility: it may add new headers for new features.
  • Incremental development: It can include processing for new features to testbed, other routers will remove those headers.


Posted Date: 8/1/2012 9:27:40 AM | Location : United States

Related Discussions:- Fragmentation and path mtu, Assignment Help, Ask Question on Fragmentation and path mtu, Get Answer, Expert's Help, Fragmentation and path mtu Discussions

Write discussion on Fragmentation and path mtu
Your posts are moderated
Related Questions
Problem: (a) What is a firewall and which are its most important tasks? (b) What is the difference between default deny and default permit? Which advantages and disadvanta

For this assignment you will create a program called MMWordFix (Multi-Mode WordFix). This program prompts the user to select one of three word filters (uppercase, lowercase, encryp

Question: (a) Besides privacy, what other security functions does Pretty Good Privacy (PGP) provides? (b) What is the Post Office Protocol (POP) used for? Why is it impo

Confidentiality Confidentiality of information ensures that only those with sufficient privileges may access specific information. When unauthorized individuals can access inform

SDLC Systems development life cycle (SDLC) is process of developing information systems through analysis, design, investigation, implementation and maintenance. SDLC is called as

MAC Address The address for a machine as it is identified at the Media Access Control (MAC) layer in the network structure. MAC address is generally stored in ROM on the n

The three primary types of network protection are the same as the three primary areas where a network can be attacked. Every network needs protection against people-related, hardwa

Problem (a) As a forensic investigator, you are needed to trace the source of an email. It is suspected that the email header has been forged. Show how you would proceed to

Question: Network diagrams combine with a set of systematic analysis procedures, serve to remedy the shortcomings of the Gantt chart. Explain the following terms used in the ne

?Examples should include direct costs items, indirect costs items, as well as variable costing. ?What are at least 5 types of expenses that are associated with manufacturing the