Filters








843 Hits in 3.6 sec

Non-Fragmented Network Flow Design Analysis: Comparison IPv4 with IPv6 Using Path MTU Discovery

Thiago Lucas, Maycon Ferreira, Rychard Plachta, Gabriel Ferreira, Kelton Costa
2020 Computers  
The fragmentation of packets demonstrated the effectiveness of the Path MTU Discovery protocol.  ...  One of the advances of IPv6 concerning its predecessor was the Path MTU Discovery protocol, in which this work aims to demonstrate its effectiveness in a virtual environment.  ...  Conclusions The elaboration of this work allowed for an analysis of the fragmentation of IP packets in IPv4 and IPv6 network environments, and to present the functionality of the Path MTU Discovery protocol  ... 
doi:10.3390/computers9020054 fatcat:ej7funqlurgr3pdvj64iullchm

Steganography in Handling Oversized IP Packets [article]

Wojciech Mazurczyk, Krzysztof Szczypiorski
2009 arXiv   pre-print
Layer Path MTU Discovery).  ...  We present how mentioned mechanisms can be used to enable hidden communication for both versions of IP protocol: 4 and 6. Also the detection of the proposed methods is enclosed in this paper.  ...  For this purpose two methods have been proposed PMTUD (Path MTU Discovery) [6] for IPv4 and [7] for IPv6 and PLPMTUD (Packetization Layer Path MTU Discovery) [8] , which is enhancement of previous  ... 
arXiv:0907.0313v1 fatcat:tsjnvw7uv5cg5gmffhjrubfsx4

Steganography in Handling Oversized IP Packets

Wojciech Mazurczyk, Krzysztof Szczypiorski
2009 2009 International Conference on Multimedia Information Networking and Security  
Path MTU Discovery).  ...  This paper identifies new class of network steganography methods that utilize mechanisms for handling oversized IP packets: IP fragmentation, PMTUD (Path MTU Discovery) and PLPMTUD (Packetization Layer  ...  Proposed methods can be utilized to enable hidden communication for both versions of IP protocol: 4 and 6.  ... 
doi:10.1109/mines.2009.246 fatcat:2viv2dcz5jh7xinc6bcpbzughe

Evaluation of steganographic methods for oversized IP packets

Wojciech Mazurczyk, Krzysztof Szczypiorski
2010 Telecommunications Systems  
This paper describes new network steganography methods that utilize mechanisms for handling oversized IP packets: IP fragmentation, PMTUD (Path MTU Discovery) and PLPMTUD (Packetization Layer Path MTU  ...  We present how mentioned mechanisms can be used to enable hidden communication for both versions of IP protocol: 4 and 6 and how they can be detected.  ...  For this purpose two methods have been proposed PMTUD (Path MTU Discovery) [6] for IPv4 and [7] for IPv6 and PLPM-TUD (Packetization Layer Path MTU Discovery) [8] , which is enhancement of previous  ... 
doi:10.1007/s11235-010-9362-7 fatcat:hq43dcizdrc4fedet4aze7clsa

Solving MTU Mismatch and Broadcast Overhead of NDN over Link-layer Networks

Thongchai Chuachan, Karim Djemame, Somnuk Puangpronpitag
2020 International Journal of Networked and Distributed Computing (IJNDC)  
However, there are two main unsolved issues for the NDN link-layer, namely broadcast overhead and Maximum Transmission Unit (MTU) mismatch.  ...  for the future data-centric communication.  ...  This idea is similar to the path MTU discovery for IP version 6 [17] . By using the minimum path MTU, FIGOA would not be vulnerable to the MTU mismatch.  ... 
doi:10.2991/ijndc.k.200213.001 fatcat:ebt6wiez7vdczackzy6etbwlia

Dynamic MTU : Technique to reduce packet drops in IPv6 network resulted due to smaller path mtu size [article]

Ishfaq Hussain, Janibul Bashir
2020 arXiv   pre-print
Moreover, due to IP tunneling, some extra headers are added to the IPv6 packet, exceeding the packet size higher than the maximum transmission unit (MTU), resulting in increase in packet drops.  ...  With an increase in the number of internet users and the need to secure internet traffic, the unreliable IPv4 protocol has been replaced by a more secure protocol, called IPv6 for Internet system.  ...  Mogul] called "Path MTU Discovery version 6" which is upgraded version of state-of-arts proposed by [Mogul and Deering(1990) J.C. Mogul and S.E. Deering] for IPv4.  ... 
arXiv:1911.11468v4 fatcat:n6rvijaybjg3na4xtbf6kandqy

Beyond folklore: observations on fragmented traffic

C. Shannon, D. Moore, K.C. Claffy
2002 IEEE/ACM Transactions on Networking  
Although rumored to be the main impetus for IP packet fragmentation, NFS is not among the top ten causes.  ...  Fragmented IP traffic is a poorly understood component of the overall mix of traffic on the Internet.  ...  Path MTU discovery should allow the end host to discover an MTU that minimizes fragmentation of its tunneled traffic.  ... 
doi:10.1109/tnet.2002.805028 fatcat:vpcdknv6zzhlhju7tfw3qcqmga

UDP Large-Payload Capability Detection for DNSSEC

K. RIKITAKE, K. NAKAO, S. SHIMOJO, H. NOGAWA
2008 IEICE transactions on information and systems  
DNSSEC assumes IP fragmentation allowance for exchange of its messages over UDP large payloads.  ...  IP fragments are often blocked on network packet filters for administrative reasons, and the blockage may prevent fast exchange of DNSSEC messages.  ...  Acknowledgment This work is supported by NICT Incentive Research Fund for FY2006.  ... 
doi:10.1093/ietisy/e91-d.5.1261 fatcat:s5mtj5npmvfqvgrwc63wwtaj4q

Secure Fragmentation for Content-Centric Networks (extended version) [article]

Cesar Ghali, Ashok Narayanan, David Oran, Gene Tsudik, Christopher A. Wood
2015 arXiv   pre-print
IP represents the unmodified version of CCNx and NDN represents FIGOA. The values above the bars represent the difference between NDN and IP fragmentation (NDN / IP).Fig. 6.  ...  Of course, knowledge of the MTU does not come for free; an MTU discovery protocol is needed, e.g., [21] .  ... 
arXiv:1405.2861v3 fatcat:c7unyeftnjemvb6wqxtjevgoli

Secure Fragmentation for Content-Centric Networks

Cesar Ghali, Ashok Narayanan, David Oran, Gene Tsudik, Christopher A. Wood
2015 2015 IEEE 14th International Symposium on Network Computing and Applications  
Fig. 6. End-to-end latency for retrieval of various sizes of content. IP represents the unmodified version of CCNx and NDN represents FIGOA.  ...  Of course, knowledge of the MTU does not come for free; an MTU discovery protocol is needed, e.g., [21] .  ... 
doi:10.1109/nca.2015.34 dblp:conf/nca/GhaliNOTW15 fatcat:j4m3pcx5onbu7dmdnpwff34nfy

Measuring interactions between transport protocols and middleboxes

Alberto Medina, Mark Allman, Sally Floyd
2004 Proceedings of the 4th ACM SIGCOMM conference on Internet measurement - IMC '04  
., Path MTU Discovery, Explicit Congestion Notification, etc.). We present results of measurements taken using an active measurement framework to study web servers.  ...  For 18% of the servers on our list, Path MTU Discovery failed, presumably because of middleboxes that block ICMP packets on the path to the web server.  ...  Alternate methods for determining the path MTU are being considered in the Path MTU Discovery Working Group in the IETF, based on the sender starting with small packets and progressively increasing the  ... 
doi:10.1145/1028788.1028835 dblp:conf/imc/MedinaAF04 fatcat:gz5gci35h5ellh5lynbtv5i44a

Konsep Tingkat Kematangan penerapan Internet Protokol versi 6 (Capability Maturity Model for IPv6 Implementation)

Riza Azmi
2015 Buletin Pos dan Telekomunikasi: Media Komunikasi Ilmiah  
Kata kunci: Capability Maturity Model Integrated (CMMI), Request for Comment (RFC), Internet Protocol version 6 (IPv6)  ...  Keywords: Capability Maturity Model Integrated (CMMI), Request for Comment (RFC), Internet Protocol version 6 (IPv6) ABSTRAK Internet Protocol atau IP merupakan standar penomoran internet di dunia yang  ...  IPv6 Specification Φ IPv 6 Addressing Architecture (RFC 4291) Φ Pat h MTU Discovery for IPv 6 (RFC 1981) Φ BGP Multi -protocol Extensions for IP v6 Inter-domain Routing (RFC 2545) Gambar 5.  ... 
doi:10.17933/bpostel.2011.090402 fatcat:cnfs7jdecvfklm6azvrpwqyd4u

An Intelligent Approach of Packet Marking at Edge Router for IP Traceback [chapter]

Dae Sun Kim, Choong Seon Hong, Yu Xiang
2005 Lecture Notes in Computer Science  
For large amount of packets, analysis time and complicated computation are necessary while detect marking information.  ...  In order to improve the performance of whole network, RFC1191 specifies a path MTU discovery protocol.  ...  Related Work Source Path Isolation Engine (SPIE) [8, 9] uses hash-based technique to gain every packet's information for IP traceback that generates and stores audit trails for inquery, and can trace  ... 
doi:10.1007/11553939_44 fatcat:wx7wlh5l5bhzpmvwpta2xtnctu

Boosting Cloud Communications through a Crosslayer Multipath Protocol Architecture

Matthieu Coudron, Stefano Secci, Guido Maier, Guy Pujolle, Achille Pattavina
2013 2013 IEEE SDN for Future Networks and Services (SDN4FNS)  
Both practices add path diversity between Cloud users and servers, unusable with legacy communication protocols.  ...  To overcome this void, we present a holistic multipath communication architecture for Cloud access and inter-Cloud communications, and defend its possible implementation using three promising recent protocols  ...  to many IP routing locators for LISP, one MAC address to many Ethernet routing locators for TRILL.  ... 
doi:10.1109/sdn4fns.2013.6702535 dblp:conf/sdn4fns/CoudronSMPP13 fatcat:pza3tez22nf2vhnypsifpxqufa

Measuring path MTU discovery behaviour

Matthew Luckie, Ben Stasiewicz
2010 Proceedings of the 10th annual conference on Internet measurement - IMC '10  
Path MTU Discovery (PMTUD) is widely believed to be unreliable because of firewalls that discard ICMP "Packet Too Big" messages.  ...  We measure the overall failure rate between 5% and 18%, depending on the MTU of the constraining link.  ...  Acknowledgements This work was supported by New Zealand Foundation for Research Science and Technology (FRST) contract UOW-X0705.  ... 
doi:10.1145/1879141.1879155 dblp:conf/imc/LuckieS10 fatcat:flikjj67rjcshggj4uuty3nasq
« Previous Showing results 1 — 15 out of 843 results