Fragmentation and path mtu, Computer Network Security

FRAGMENTATION AND PATH MTU

IPv6 source is responsible for fragmentation. Routers simply drop datagrams bigger than network MTU. So source have to fragment datagram to arrive destination.

Source calculates path MTU. The smallest MTU on any network between destination and source and it fragments datagram to fix within that MTU.The process of learning the path MTU is called as path MTU discovery.  Source transmits probe message of different sizes until destination arrived. It have to be dynamic i.e. path may modify during transmission of message.

USE OF MULTIPLE HEADERS:

It has given advantages:

  • Efficiency: Header is only as big as necessary.
  • Flexibility: it may add new headers for new features.
  • Incremental development: It can include processing for new features to testbed, other routers will remove those headers.

 

Posted Date: 8/1/2012 9:27:40 AM | Location : United States







Related Discussions:- Fragmentation and path mtu, Assignment Help, Ask Question on Fragmentation and path mtu, Get Answer, Expert's Help, Fragmentation and path mtu Discussions

Write discussion on Fragmentation and path mtu
Your posts are moderated
Related Questions
what is the guaranteed quality of this coursework? how many days it take for 10-12 pages? how much will be? thanks

Question 1 Explain any two types of security policies Question 2 What is security attack? Explain with examples Question 3 Explain different characteristics that i

QUESTION An analog sensor is used to monitor the temperature of sea water at different depth. The sensor is fitted to a buoy and incorporates a wireless transmitter that send

Documenting the Results of Risk Assessment The goal of this process is to recognize the information assets, list them, and rank according to those most required protection. The

For this assignment you will create a program called MMWordFix (Multi-Mode WordFix). This program prompts the user to select one of three word filters (uppercase, lowercase, encryp

Question: (a) Distinguish between a mobile agent "state" and "code". (b) Differentiate between "weak" and "strong" mobility. (c) Mobile agent systems are known to have

This assignment aims to enhance students' understanding of the network protocol hierarchy and flow control and error control techniques by implementing a sliding window protocol in

Q. Develop a completely secure WSN based on the triple key? Wireless network is the most vulnerable type of network to security attack. Unauthorized access to wireless network

A  half-duplex (HDX) system gives communication in both directions, but only one direction at a time. Hardly, once a party stats receiving a signal, it must need for the transmi

(a) Describe the principal characteristics of associative memory networks? (b) Name the two basic types of associative memories and the differences between them. (c) Give an