StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Operating System Concepts: The Fragmentation of the Network Packet - Essay Example

Cite this document
Summary
The author of the paper under the title "Operating System Concepts: The Fragmentation of the Network Packet" will begin with the statement that in this age of technology, every network requires a number of utmost sizes on its network transmission packets. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.3% of users find it useful
Operating System Concepts: The Fragmentation of the Network Packet
Read Text Preview

Extract of sample "Operating System Concepts: The Fragmentation of the Network Packet"

The Packets that are bigger than the permissible Maximum Transmission Unit, or simply MTU have to be segregated into numerous lesser packets, or fragments, to facilitate them to move all through the network. If a packet that is pertaining to be transmitted (for instance: over an Ethernet connection) is larger than that, the router that is pertaining to transmit the packet over that transmission connection will fragment the network transmission packet i.e. the router will break up the packet into lesser messages (recognized as fragments) that are very small sufficient to be sent over the network transmission channel. As the fragments come to the receiver or destination (the system /user to which they are being transmitted), that computer is able to rebuild the fragments to get back the originally transmitted data or information message, supposing that none of the messages are misplaced during transmission (LearnSoftwareProcesses, 2009)  (Silberschatz, Galvin, & Gagne, 2004) and  (Forouzan & Fegan, 2006).

In this regard, HPING2 is a tool pertaining to the network and has the capability to transmit usual TCP/IP packets as well as to show the destination or receiver’s responses similar to the ping program performed by means of ICMP responses. Additionally, the HPING2 manages fragmentation, random packets unit, and size, and is capable to transmit files that have been encapsulated by a supported set of rules known as protocols. In addition, through HPING2 we are capable to carry out as a minimum the subsequent major jobs in a network fragmentation or transmission: (HPING, 2010)

  • Check firewall policy
  • Sophisticated scanning of port
  • Examine networking plus an operational performance by means of different packet sizes, protocols, and TOS (type of service) in addition to fragmentation.
  • MTU channel discovery
  • TCP/IP stack assessment

HPING2 works with an IP header bit known as the don’t fragment bit. Typically when a gateway sends a packet ahead from one network to some other by means of an MTU size that is lesser than the network transmission packet size, the packet becomes fragmented or broken into smaller pieces (known as fragments). In its place, if the Don't fragment bit is put in the IP header, the gateway will deny fragmenting the network packet, as well as will in its place transmit an ICMP error of sort Fragmentation needed however Don't fragment large position to the sender of the packet. Also, the error will refer fraction of the genuine network transmission packet, consequently, the sender has the means to recognize that it has to utilize packets through a negligible length while transmitting to a specified receiver or destination. The sender will attempt through lesser packets, if yet an ICMP error will go back, it will attempt once more by means of a lesser packet plus so on, until the leaving packets will be lesser enough to make sure that no fragmentation will take place (HPING2, 2004).

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Fragmentation Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1574806-fragmentation
(Fragmentation Essay Example | Topics and Well Written Essays - 500 Words)
https://studentshare.org/miscellaneous/1574806-fragmentation.
“Fragmentation Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/miscellaneous/1574806-fragmentation.
  • Cited: 0 times

CHECK THESE SAMPLES OF Operating System Concepts: The Fragmentation of the Network Packet

Internetworking IpV6 vs IpV4: Compare and Contrast

network devices that require IP address allocation are constantly on the rise with mobile phones taking the lead among other communication devices.... The paper analyses the similarities and differences that exists between the two versions of internetworking protocol; IPv4 and IPv6 while stating their major characteristics, advantages as well as their limitations....
17 Pages (4250 words) Research Paper

The Worlds Largest Public Data Network

Salient Features of IPV-6 Large address space Stateless auto configuration Quality of service capabilities Improved Security Streamlined Protocol header Mobility IPV6 is packed with a large number of improvements which includes large addressing space, and hence accommodation of more users on the network, this is followed by mobility, which enables tablets, and other handheld devices to be connected even when on the go.... to 4 is another technical term associated with the entire concept which enables the packet transmission of IPv6 to a version 4 network....
4 Pages (1000 words) Research Paper

Intrusion Detection System

Working of the system in a network and the network traffic are monitored by the Intrusion Detection System.... Systems that create traffic among the network are identified and blocked.... Intrusion Detection is used to manage the system and the network in a secured manner.... IDS is selected based on the network's complexity.... Most common attacks target the system's confidentiality, system control, and the network's integrity....
11 Pages (2750 words) Essay

The Effectiveness of Network Management Tools

To summarize, network management tools can help a network manager understand when any component of the network is about to fail or has already failed, or whose security has been compromised (e.... Power failures require the network manager to discontinue all other tasks and focus on that issue.... are some other activities that the network manager needs to perform.... A network management tool known as "The Multi Router Traffic Grapher" is used to monitor the traffic load on all the network links....
27 Pages (6750 words) Assignment

Operating Systems Design and Implementation

The "Operating Systems Design and Implementation" paper focuses on the operating system, an essential part of any computer system.... The operating system provides all these users with an environment in which they can perform their tasks and achieve their requirements conveniently and efficiently.... Some of the most common functionalities of any operating system are mentioned below: The history of Operating Systems starts as early as the first computing machine....
26 Pages (6500 words) Essay

Quality of Service in WiMAX Based Broadband Wireless Networks

1 set of standards developed by this committee provide a basis for wireless local area network (WLAN) communications.... The paper "Quality of Service in WiMAX Based Broadband Wireless Networks" states that there are certain concerns about the deployability of WiMAX-based wireless networks, it offers a reliable and robust alternative to existing networking technologies such as Wi-Fi....
9 Pages (2250 words) Essay

Delay-Tolerant Network Security

DTNs (Delay Tolerant Networks) or opportunistic networks represent a class of networks in which continuous end-to-end connectivity in the network may not be quite possible.... Here the data is first stored then moved incrementally in the network, hoping that the data will reach its destination.... DTN primarily stands for the delay in the network.... The paper "Delay-Tolerant network Security" summarizes security is a major barrier to the wide-scale deployment of the DTNs, though it has gained little attention so far....
20 Pages (5000 words) Term Paper

Security of Information in Commercial or Business Organisations

In addition to the concepts above, Smith, Friese, Engel, Freisleben (2006) claim that an asset refers to anything that is of importance and value to the owner, including data, information, network, programs, and communication infrastructures.... Therefore, this paper intends to explore some significant security concepts, as well as the existing categories of threats to commercial assets.... Threats refer to events, entities, or circumstances with the ability to cause harm or alter standard security operations through the exploitation of system vulnerabilities (Onwubiko & Lenaghan, 2007)....
15 Pages (3750 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us