Fragmentation and path mtu, Computer Network Security

FRAGMENTATION AND PATH MTU

IPv6 source is responsible for fragmentation. Routers simply drop datagrams bigger than network MTU. So source have to fragment datagram to arrive destination.

Source calculates path MTU. The smallest MTU on any network between destination and source and it fragments datagram to fix within that MTU.The process of learning the path MTU is called as path MTU discovery.  Source transmits probe message of different sizes until destination arrived. It have to be dynamic i.e. path may modify during transmission of message.

USE OF MULTIPLE HEADERS:

It has given advantages:

  • Efficiency: Header is only as big as necessary.
  • Flexibility: it may add new headers for new features.
  • Incremental development: It can include processing for new features to testbed, other routers will remove those headers.

 

Posted Date: 8/1/2012 9:27:40 AM | Location : United States







Related Discussions:- Fragmentation and path mtu, Assignment Help, Ask Question on Fragmentation and path mtu, Get Answer, Expert's Help, Fragmentation and path mtu Discussions

Write discussion on Fragmentation and path mtu
Your posts are moderated
Related Questions
(a) Consider the subsequent authentication options: A. Using password. B. Using pin and fingerprint Which option A or B provides stronger security and why? (b) Give

What is information Information comprises the meanings and interpretations which people place upon the facts, or data. The value of information springs from the ways it can be i

how can you enter the ASVAB practice test on line?

Project Name : Computer Adaptive Test Role : Day to Day interaction with Client. Involved in Requirement Gathering, Estimation.Involved with Stellent design and architectur

Develop a TCP-based client-server socket program for transferring a large message. The message transmitted from the client to server is read from a large file (size is about 30000

Question : (a) What do you meant by the term "Bastion Host"? What is its use? (b) "Hostile" Java applets will do undesirable actions. Mention two problems caused by Hosti

Question (a) For the bit stream 010011, show the waveforms for each of the code indicated. Consider that the signal level for NRZ-L for mark is positive; the signal level for t

Discuss how developers should apply the following countermeasures to improve the security of their code:

Information System Security 1. Write about: a. Potential Risks to Information Systems b. Factors to be addressed for making information systems more secure 2. Write about t

Packet Filtering Firewall Packet filtering is a network security mechanism that works by controlling what data can flow in and out of the network. The basic device that interco