Fragmentation format, Computer Network Security

FRAGMENTATION

Fragmentation information is kept in different extension header.  Every fragment has base header and fragmentation header. Whole datagram including original header can be fragmented. This process is given in the figure below.

 

2441_FRAGMENTATION Format.png

Posted Date: 8/1/2012 9:26:14 AM | Location : United States







Related Discussions:- Fragmentation format, Assignment Help, Ask Question on Fragmentation format, Get Answer, Expert's Help, Fragmentation format Discussions

Write discussion on Fragmentation format
Your posts are moderated
Related Questions
Information asset classification-risk management A number of organizations have data classification schemes (for instance confidential, internal, public data). The classificat

Question : (a) What do you meant by the term "Bastion Host"? What is its use? (b) "Hostile" Java applets will do undesirable actions. Mention two problems caused by Hosti

Students were asked about search engine they used.90 of them said they used google chrome,70 used Internet Explorer,40 used Mozilla Firefox,30 used Google Chrome and Internet Explo

QUESTION (a) Mention two attitudes of a carer towards an inspector that could lead to negative outcomes (b) Give two performance indicators of Early Childhood Education that

Hashing is the transformation of a string of characters into a generally shorter fixed-length key or a value that presents the original string. Hashing is used to index and retri

How safe is the encryption of virtual private networks?

QUESTION (a) Which PKI (Public Key Infrastructure) model is typically favored by business organization? (b) Give one possible use of the "extensions" field of an X.509 certi

Repeater known as regenerator ; it is an electronic machine that performs only at physical layer. It gets the signal in the network before it becomes loss or weak, recreates the

briefly expslain type of e-commerce

Network-Based IDS (NIDS) A NIDS resides on computer or appliance connected to segment of an organization’s network and looks for signs of attacks. While examining packets, a NID