SlideShare a Scribd company logo
1 of 13
FRAGMENTATION
- An Internetworking concept
Shashwat Shriparv
dwivedishashwat@gmail.com
InfinitySoft
What is fragmentation?
Splitting up things into smaller more
manageable entities for incorporating
ease in use and flexibility in transport.
Where could it possibly come in
Networks ?
Each n/w imposes some maximum
size on its packets, the reason being;
 Hardware (frame size)
 Operating System (buffers size 512 bytes)
 Protocols (no. of bits in packet length field)
 Compliance with some standard
 To reduce error-induced retransmission to
some level
 Prevent packet from choking channel
Problems
 A large packet wants to travel through
a network whose maximum packet
size is small.
 What if the original source packet is
too large to be handled by the
destination network?
 Routing algorithms to prevent such
situation (not applicable)
Fragmentation in networks
 Allow gateways to break up packets
into fragments, sending each packet
as a separate internet packet
 Breaking up a thing is easy, but fixing
it back is not that easy
Types of fragmentation
 Transparent
 Non transparent
Transparent Fragmentation
 Caused by a “small packet” network
transparent to any subsequent networks
through which the packet may pass on its
way to the destination
 Gateways fragment oversized packets,
each addressed to the same exit gateway,
where they are recombined
 The process carries on until destination is
reached
Problems
 Exit gateway should know that it has
received all fragments to start
combination sequence
 All packets must exit via the same
gateway, else data loss occurs
 Overhead required to fragment and
reassemble at each gateway
Non transparent Fragmentation
 Refrain from recombining fragments
at intermediate gateways
 Fragments are considered as packets
and are passed through the gateways
 Recombination occurs only at the
destination host
 IP follows this methodology
Problems
 Requires all hosts to do Reassembly
 Increases overhead, larger the
packet, more the headers
 An advantage being multiple exit
gateways can be employed increasing
the efficiency of the transmission
Schemes
 Fragments should be numbered in a way
that aids recombination
 Trees can be used
 0 can be split as 0.1, 0.2, 0.3 …..
 These can be again fragmented as 0.0.0,
0.0.1, 0.0.2, …….., 0.1.0, 0.1.1 etc.
 Only if enough space is reserved in header
such terminology can be employed
 Sufficient to reorder fragments
THANK YOU
Shashwat Shriparv
dwivedishashwat@gmail.com
InfinitySoft

More Related Content

What's hot

Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
barodia_1437
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layer
Nitesh Singh
 
Line configuration
Line configurationLine configuration
Line configuration
Ashish Vats
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
hoanv
 

What's hot (20)

DATA RATE LIMITS
DATA RATE LIMITSDATA RATE LIMITS
DATA RATE LIMITS
 
Congestion control in TCP
Congestion control in TCPCongestion control in TCP
Congestion control in TCP
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc network
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layer
 
Framing in data link layer
Framing in data link layerFraming in data link layer
Framing in data link layer
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Line configuration
Line configurationLine configuration
Line configuration
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
 
2.6 ethernet ieee 802.3
2.6 ethernet   ieee 802.32.6 ethernet   ieee 802.3
2.6 ethernet ieee 802.3
 
Computer networks lan
Computer networks lanComputer networks lan
Computer networks lan
 

Similar to Fragmentation

F06_Lecture7_etherne..
F06_Lecture7_etherne..F06_Lecture7_etherne..
F06_Lecture7_etherne..
webhostingguy
 
Switching Techniques
Switching TechniquesSwitching Techniques
Switching Techniques
tameemyousaf
 
IntroductionTransport LayerTransport Layer forms the bas.docx
IntroductionTransport LayerTransport Layer forms the bas.docxIntroductionTransport LayerTransport Layer forms the bas.docx
IntroductionTransport LayerTransport Layer forms the bas.docx
mariuse18nolet
 
Lab Seminar 2009 06 17 Description Based Ad Hoc Networks
Lab Seminar 2009 06 17  Description Based Ad Hoc NetworksLab Seminar 2009 06 17  Description Based Ad Hoc Networks
Lab Seminar 2009 06 17 Description Based Ad Hoc Networks
tharindanv
 
Software Slides
Software SlidesSoftware Slides
Software Slides
iarthur
 
Bh us-02-kaminsky-blackops
Bh us-02-kaminsky-blackopsBh us-02-kaminsky-blackops
Bh us-02-kaminsky-blackops
Dan Kaminsky
 
Bh us-02-kaminsky-blackops
Bh us-02-kaminsky-blackopsBh us-02-kaminsky-blackops
Bh us-02-kaminsky-blackops
Dan Kaminsky
 

Similar to Fragmentation (20)

networking
networkingnetworking
networking
 
IPV6 Under the Hood
IPV6 Under the HoodIPV6 Under the Hood
IPV6 Under the Hood
 
Composite Message Pattern
Composite Message PatternComposite Message Pattern
Composite Message Pattern
 
MTU (maximum transmission unit) & MRU (maximum receive unit)
MTU (maximum transmission unit) & MRU (maximum receive unit)MTU (maximum transmission unit) & MRU (maximum receive unit)
MTU (maximum transmission unit) & MRU (maximum receive unit)
 
F06_Lecture7_etherne..
F06_Lecture7_etherne..F06_Lecture7_etherne..
F06_Lecture7_etherne..
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Computer network basics
Computer network basicsComputer network basics
Computer network basics
 
Switching Techniques
Switching TechniquesSwitching Techniques
Switching Techniques
 
IntroductionTransport LayerTransport Layer forms the bas.docx
IntroductionTransport LayerTransport Layer forms the bas.docxIntroductionTransport LayerTransport Layer forms the bas.docx
IntroductionTransport LayerTransport Layer forms the bas.docx
 
Lab Seminar 2009 06 17 Description Based Ad Hoc Networks
Lab Seminar 2009 06 17  Description Based Ad Hoc NetworksLab Seminar 2009 06 17  Description Based Ad Hoc Networks
Lab Seminar 2009 06 17 Description Based Ad Hoc Networks
 
Ethernet
EthernetEthernet
Ethernet
 
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENTTCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
 
DISTIBUTED OPERATING SYSTEM
DISTIBUTED  OPERATING SYSTEM DISTIBUTED  OPERATING SYSTEM
DISTIBUTED OPERATING SYSTEM
 
Software Slides
Software SlidesSoftware Slides
Software Slides
 
Chapter#3
Chapter#3Chapter#3
Chapter#3
 
unit3-220228110900.pptx
unit3-220228110900.pptxunit3-220228110900.pptx
unit3-220228110900.pptx
 
An Introduction to Networking
An Introduction to Networking An Introduction to Networking
An Introduction to Networking
 
Bh us-02-kaminsky-blackops
Bh us-02-kaminsky-blackopsBh us-02-kaminsky-blackops
Bh us-02-kaminsky-blackops
 
Bh us-02-kaminsky-blackops
Bh us-02-kaminsky-blackopsBh us-02-kaminsky-blackops
Bh us-02-kaminsky-blackops
 
3
33
3
 

More from Shashwat Shriparv

LibreOffice 7.3.pptx
LibreOffice 7.3.pptxLibreOffice 7.3.pptx
LibreOffice 7.3.pptx
Shashwat Shriparv
 

More from Shashwat Shriparv (20)

Learning Linux Series Administrator Commands.pptx
Learning Linux Series Administrator Commands.pptxLearning Linux Series Administrator Commands.pptx
Learning Linux Series Administrator Commands.pptx
 
LibreOffice 7.3.pptx
LibreOffice 7.3.pptxLibreOffice 7.3.pptx
LibreOffice 7.3.pptx
 
Kerberos Architecture.pptx
Kerberos Architecture.pptxKerberos Architecture.pptx
Kerberos Architecture.pptx
 
Suspending a Process in Linux.pptx
Suspending a Process in Linux.pptxSuspending a Process in Linux.pptx
Suspending a Process in Linux.pptx
 
Kerberos Architecture.pptx
Kerberos Architecture.pptxKerberos Architecture.pptx
Kerberos Architecture.pptx
 
Command Seperators.pptx
Command Seperators.pptxCommand Seperators.pptx
Command Seperators.pptx
 
Upgrading hadoop
Upgrading hadoopUpgrading hadoop
Upgrading hadoop
 
Hadoop migration and upgradation
Hadoop migration and upgradationHadoop migration and upgradation
Hadoop migration and upgradation
 
R language introduction
R language introductionR language introduction
R language introduction
 
Hive query optimization infinity
Hive query optimization infinityHive query optimization infinity
Hive query optimization infinity
 
H base introduction & development
H base introduction & developmentH base introduction & development
H base introduction & development
 
Hbase interact with shell
Hbase interact with shellHbase interact with shell
Hbase interact with shell
 
H base development
H base developmentH base development
H base development
 
Hbase
HbaseHbase
Hbase
 
H base
H baseH base
H base
 
My sql
My sqlMy sql
My sql
 
Apache tomcat
Apache tomcatApache tomcat
Apache tomcat
 
Linux 4 you
Linux 4 youLinux 4 you
Linux 4 you
 
Introduction to apache hadoop
Introduction to apache hadoopIntroduction to apache hadoop
Introduction to apache hadoop
 
Next generation technology
Next generation technologyNext generation technology
Next generation technology
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Fragmentation

  • 1. FRAGMENTATION - An Internetworking concept Shashwat Shriparv dwivedishashwat@gmail.com InfinitySoft
  • 2. What is fragmentation? Splitting up things into smaller more manageable entities for incorporating ease in use and flexibility in transport. Where could it possibly come in Networks ?
  • 3. Each n/w imposes some maximum size on its packets, the reason being;  Hardware (frame size)  Operating System (buffers size 512 bytes)  Protocols (no. of bits in packet length field)  Compliance with some standard  To reduce error-induced retransmission to some level  Prevent packet from choking channel
  • 4. Problems  A large packet wants to travel through a network whose maximum packet size is small.  What if the original source packet is too large to be handled by the destination network?  Routing algorithms to prevent such situation (not applicable)
  • 5. Fragmentation in networks  Allow gateways to break up packets into fragments, sending each packet as a separate internet packet  Breaking up a thing is easy, but fixing it back is not that easy
  • 6. Types of fragmentation  Transparent  Non transparent
  • 7.
  • 8. Transparent Fragmentation  Caused by a “small packet” network transparent to any subsequent networks through which the packet may pass on its way to the destination  Gateways fragment oversized packets, each addressed to the same exit gateway, where they are recombined  The process carries on until destination is reached
  • 9. Problems  Exit gateway should know that it has received all fragments to start combination sequence  All packets must exit via the same gateway, else data loss occurs  Overhead required to fragment and reassemble at each gateway
  • 10. Non transparent Fragmentation  Refrain from recombining fragments at intermediate gateways  Fragments are considered as packets and are passed through the gateways  Recombination occurs only at the destination host  IP follows this methodology
  • 11. Problems  Requires all hosts to do Reassembly  Increases overhead, larger the packet, more the headers  An advantage being multiple exit gateways can be employed increasing the efficiency of the transmission
  • 12. Schemes  Fragments should be numbered in a way that aids recombination  Trees can be used  0 can be split as 0.1, 0.2, 0.3 …..  These can be again fragmented as 0.0.0, 0.0.1, 0.0.2, …….., 0.1.0, 0.1.1 etc.  Only if enough space is reserved in header such terminology can be employed  Sufficient to reorder fragments