Implications of fragmentation dynamic routing for internet datagram authentication
ACM SIGCOMM Computer Communication Review
The experimental literature of the internet: an annotated bibliography
ACM SIGCOMM Computer Communication Review
A testbed for wide area ATM research
SIGCOMM '89 Symposium proceedings on Communications architectures & protocols
The next generation of internetworking
ACM SIGCOMM Computer Communication Review
SIGCOMM '91 Proceedings of the conference on Communications architecture & protocols
Journal of the ACM (JACM)
A data labelling technique for high-performance protocol processing and its consequences
SIGCOMM '93 Conference proceedings on Communications architectures, protocols and applications
Dynamics of TCP traffic over ATM networks
SIGCOMM '94 Proceedings of the conference on Communications architectures, protocols and applications
U-Net: a user-level network interface for parallel and distributed computing
SOSP '95 Proceedings of the fifteenth ACM symposium on Operating systems principles
Improving NFS Performance Over Wireless Links
IEEE Transactions on Computers - Special issue on mobile computing
Reconsidering fragmentation and reassembly
PODC '98 Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing
Modeling communication pipeline latency
SIGMETRICS '98/PERFORMANCE '98 Proceedings of the 1998 ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems
Consistent overhead Byte stuffing
IEEE/ACM Transactions on Networking (TON)
Promoting the use of end-to-end congestion control in the Internet
IEEE/ACM Transactions on Networking (TON)
The transport layer: tutorial and survey
ACM Computing Surveys (CSUR)
Practical network support for IP traceback
Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
Network support for IP traceback
IEEE/ACM Transactions on Networking (TON)
EW 7 Proceedings of the 7th workshop on ACM SIGOPS European workshop: Systems support for worldwide applications
User-level internet path diagnosis
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
DoS protection for UDP-based protocols
Proceedings of the 10th ACM conference on Computer and communications security
Measuring interactions between transport protocols and middleboxes
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
New techniques for making transport protocols robust to corruption-based loss
ACM SIGCOMM Computer Communication Review
DHTTP: an efficient and cache-friendly transfer protocol for the web
IEEE/ACM Transactions on Networking (TON)
Measuring the evolution of transport protocols in the internet
ACM SIGCOMM Computer Communication Review
Flow labelled IP over ATM: design and rationale
ACM SIGCOMM Computer Communication Review
10 papers for the Ph.D. student in networking
ACM SIGCOMM Computer Communication Review
Inferring and debugging path MTU discovery failures
IMC '05 Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement
Computer Standards & Interfaces
Tagged fragment marking scheme with distance-weighted sampling for a fast IP traceback
APWeb'03 Proceedings of the 5th Asia-Pacific web conference on Web technologies and applications
Measuring path MTU discovery behaviour
IMC '10 Proceedings of the 10th ACM SIGCOMM conference on Internet measurement
Fragmentation considered vulnerable: blindly intercepting and discarding fragments
WOOT'11 Proceedings of the 5th USENIX conference on Offensive technologies
Efficient technique for fast IP traceback
CDVE'06 Proceedings of the Third international conference on Cooperative Design, Visualization, and Engineering
Review: An initiative for a classified bibliography on TCP/IP congestion control
Journal of Network and Computer Applications
Hi-index | 0.00 |
Internetworks can be built from many different kinds of networks, with varying limits on maximum packet size. Throughput is usually maximized when the largest possible packet is sent; unfortunately, some routes can carry only very small packets. The IP protocol allows a gateway to fragment a packet if it is too large to be transmitted. Fragmentation is at best a necessary evil; it can lead to poor performance or complete communication failure. There are a variety of ways to reduce the likelihood of fragmentation; some can be incorporated into existing IP implementations without changes in protocol specifications. Others require new protocols, or modifications to existing protocols.