Prevention and detection of IP identification wraparound errors
First Claim
1. A method of reducing a likelihood of misassembly of data fragments from fragmented IP datagrams, comprising the steps of:
- receiving data fragments of a datagram having an IP identification number; and
discarding all received data fragments of the datagram upon detection of receipt of an overlapping data fragment having the IP identification number, wherein the overlapping data fragment overlaps data in an already-received data fragment.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of generating IP identification numbers for IP datagrams. A plurality of IP identification number generators are maintained. A plurality of receiving stations are associated with the plurality of IP identification number generators such that each receiving station has an IP identification number generator associated therewith. An IP identification number is generated for a datagram sent to a receiving station based on an output of the associated IP identification number generator. Also, a method of reducing a likelihood of misassembly of received data fragments from fragmented IP datagrams. The data fragments have an IP identification number. All received data fragments of the datagram are discarded upon detection of receipt of an overlapping data fragment having the IP identification number. Timeouts for reassembling datagrams are reduced. First, timeouts for reassembling the datagrams are reduced to less than a standard timeout. Second, timeouts are reduced upon detection of a gap in the received data fragments. Third, timeouts are reduced upon detection of a datagram having the same protocol identification number and source address, but having a different IP identification number. Furthermore, a method of detecting a likelihood of misassembly of data fragments from fragmented IP datagrams. Communication errors between a sending station and a receiving station are detected. A rate is determined at which an IP identification number generator associated with the receiving station wraps around. NFS re-transmissions are determined. Based on one or more of these, a likelihood of misassembly at the receiving station is determined to be high.
-
Citations
13 Claims
-
1. A method of reducing a likelihood of misassembly of data fragments from fragmented IP datagrams, comprising the steps of:
-
receiving data fragments of a datagram having an IP identification number; and
discarding all received data fragments of the datagram upon detection of receipt of an overlapping data fragment having the IP identification number, wherein the overlapping data fragment overlaps data in an already-received data fragment. - View Dependent Claims (2, 3, 4)
-
- 5. A method of reducing a likelihood of misassembly of data fragments from fragmented IP datagrams, comprising the step of dynamically reducing a timeout for reassembling the datagrams to less than a standard timeout based on NFS data for round-trip times between a sending station and a receiving station.
-
8. A method of reducing a likelihood of misassembly of data fragments from fragmented IP datagrams, comprising the steps of:
-
receiving data fragments of a datagram having an IP identification number; and
reducing a remaining time for reassembling the datagram upon detection of a gap in the received data fragments. - View Dependent Claims (9, 10)
-
-
11. A method of reducing a likelihood of misassembly of data fragments from fragmented IP datagrams, comprising the steps of:
-
receiving data fragments of a first datagram having a protocol identification number, a source address, and a first IP identification number; and
reducing a remaining time for reassembling the first datagram upon detection, before receipt of a last data fragment of the first datagram, of a data fragment of a second datagram having the protocol identification number and the source address but having a second IP identification number. - View Dependent Claims (12, 13)
-
Specification