MTU path discovery and IPSec

Valdis.Kletnieks at vt.edu Valdis.Kletnieks at vt.edu
Fri Dec 5 04:50:33 UTC 2003


On Thu, 04 Dec 2003 17:22:23 PST, Crist Clark said:

> Excerise for the reader:
> 
> Devise an algorthm that will take an arbitrarily sized packet 20-65535
> octets and an arbitrarily sized MTU, > 576 octets, and split the 
> packet into the minimum number of "n" fragments where each fragment is
> (1) less than the MTU, (2) no two fragments differ by more than 8 octets,
> and the fragments obey the IP fragmentation rules, (3) data payload must
> end on an 8-octet boundary for all but the last fragment and (4) each
> fragment has an exact copy of the original header except for differences
> in the fragmentation fields and checksum.

> Compare to the algorithm of cutting the data in to "m" (mtu - ip_hl)-
> chunks and putting the leftovers into the final fragment.

Then re-read rfc792:

   The ICMP messages typically report errors in the processing of
   datagrams.  To avoid the infinite regress of messages about messages
   etc., no ICMP messages are sent about ICMP messages.  Also ICMP
   messages are only sent about errors in handling fragment zero of
   fragemented datagrams.  (Fragment zero has the fragment offeset equal
   zero).

and think which is more likely to silently fail - fragmenting a 1500 byte
packet 750/750, or 1430/70, if the *second* frag is in possible danger
of being lost due to buffer congestion or similar?


-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 226 bytes
Desc: not available
URL: <http://mailman.nanog.org/pipermail/nanog/attachments/20031204/c58e51f2/attachment.sig>


More information about the NANOG mailing list