Wireshark Fundamentals by Unknown
Author:Unknown
Language: eng
Format: epub
Chapter 3 analyzing layer 2 and layer 3 traffiC
Figure 3-18. Wireshark capture of last fragmented packet For simplicity and ease of remembering, the IP packets can be
categorized into three types:
⢠Nonfragmented
⢠Initial fragment
⢠Noninitial fragment
Based on these packet types, the more fragments bit and Fragment Offset field are set as shown in Table 3-5.
109
Chapter 3 analyzing layer 2 and layer 3 traffiC
Table 3-5. Fragment Settings in IP Header
Packet Type
More Fragments Flag
Fragment Offset Field
nonfragmented
0
0
initial fragment
1
0
noninitial fragment (not last)
1
nonzero
noninitial fragment (last)
0
nonzero
In todayâs networks, we rarely notice fragmentation as most networks these days are designed with support for jumbo MTU (MTU values higher than 1500 bytes). All the Gigabit Ethernet networks support up to 9216
bytes to be set as the MTU value and to leverage the benefit of higher MTU sizes, most applications send the packets with the donât fragment (do not fragment or DF) bit set. When this bit is set, the router processing the packet will not fragment the packet and will try to send the packet out as is. When a packet is forwarded across a network segment with the DF bit set and the router encounters a next hop interface having lower MTU or IP MTU settings, the router will send an ICMP Destination Unreachable message back with type 3 and code 4, which basically means fragmentation is needed and the DF bit is set. Along with the ICMP Destination Unreachable message, the router also sends the MTU
settings of the next hop device to let the source know that it needs to send the packet with a smaller data payload if it wants to send the packet with the DF bit set. Figure 3-19 displays the Wireshark capture of the ICMP
Destination Unreachable message along with the MTU settings of the next hop device.
110
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
In-Memory Analytics with Apache Arrow by Matthew Topol(2638)
Architects of Intelligence_The Truth About AI From the People Building It by Martin Ford(1198)
Cloud Auditing Best Practices: Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans by Shinesa Cambric Michael Ratemo(1023)
In-Memory Analytics with Apache Arrow: Perform fast and efficient data analytics on both flat and hierarchical structured data by Matthew Topol(975)
Mastering Azure Virtual Desktop: The Ultimate Guide to the Implementation and Management of Azure Virtual Desktop by Ryan Mangan(951)
Automated Machine Learning in Action by Qingquan Song Haifeng Jin Xia Hu(865)
Ansible for Real-Life Automation - A complete Ansible handbook filled with practical IT automation use cases (2022) by Packt(685)
Learn Wireshark - A definitive guide to expertly analyzing protocols and troubleshooting networks using Wireshark - 2nd Edition (2022) by Packt(669)
Data Engineering with Scala and Spark by Eric Tome Rupam Bhattacharjee David Radford(377)
ABAP Development for SAP HANA by Unknown(315)
Introduction to Algorithms, Fourth Edition by unknow(300)
Automated Machine Learning in Action by Qingquan Song & Haifeng Jin & Xia Hu(264)
Kubernetes Secrets Handbook by Emmanouil Gkatziouras | Rom Adams | Chen Xi(236)
Learn Enough Developer Tools to Be Dangerous: Git Version Control, Command Line, and Text Editors Essentials by Michael Hartl(223)
Machine Learning for Imbalanced Data by Kumar Abhishek Dr. Mounir Abdelaziz(205)
Power BI for Jobseekers by Alan Murray(193)
Asynchronous Programming in Rust by Carl Fredrik Samson;(185)
Mastering GPT-4 A Comprehensive Guide to Harnessing the Power of AI: Unleash the Potential of OpenAI's GPT-4 for Your Projects by Hussaini Saif(185)
Data Labeling in Machine Learning with Python by Vijaya Kumar Suda(179)