1979
DOI: 10.1016/0376-5075(79)90049-7
|View full text |Cite
|
Sign up to set email alerts
|

Packet fragmentation in inter-network protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

1979
1979
1995
1995

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(8 citation statements)
references
References 3 publications
0
8
0
Order By: Relevance
“…Occasionally, the guarantees provided by the communication device must be supplemented by host software. For instance, intranetwork fragmentation [35] might be required for networks with small packet sizes.…”
Section: Internal Structure Of the Cssmentioning
confidence: 99%
“…Occasionally, the guarantees provided by the communication device must be supplemented by host software. For instance, intranetwork fragmentation [35] might be required for networks with small packet sizes.…”
Section: Internal Structure Of the Cssmentioning
confidence: 99%
“…As is our usual practice in such situations, we prefer to adopt a form of network specific fragmentation: let the driver at the entry gateway fragment the internet packet in an appropriate manner, and have the fragments reassembled at the exit gateway, before the packet is routed to its next destination [Shoch, 1979: Boggs, et aL, 1979. This means that the gateway program itself need not know anything about the fragmentation, but that the fragments must all arrive at the Radionet driver in the same exit gateway for reassembly.…”
Section: Network Software For the Radionetmentioning
confidence: 99%
“…Fragmentation, transmission and reassembly across a local network which is invisible to the internet protocol module is called intranet fragmentation and may be used [6].…”
Section: Fragmentationmentioning
confidence: 99%
“…(6) ELSE IF no buffer with BUFID is allocated (7) THEN allocate reassembly resources with BUFID; TIMER <-TLB; TDL <-0; (8) put data from fragment into data buffer with BUFID from octet FO*8 to octet (TL-(IHL*4))+FO*8; (9) set RCVBT bits from …”
Section: An Example Reassembly Proceduresmentioning
confidence: 99%