How IP FRAGMENTATION Works

Поделиться
HTML-код
  • Опубликовано: 24 ноя 2024

Комментарии • 152

  • @dirkl9652
    @dirkl9652 2 года назад +12

    Good stuff Chris !!!! Keep them coming and much appreciated. It's good to review the basics from time to time.

    • @ChrisGreer
      @ChrisGreer  2 года назад +1

      Thanks for the comment Dirk! The fundamentals are everything.

    • @techlearner4806
      @techlearner4806 11 месяцев назад

      @@ChrisGreer Agreed......

  • @NarendraS
    @NarendraS 2 года назад +21

    Dude I could literally watch you whole day. Such a calm and smooth explanation

    • @ChrisGreer
      @ChrisGreer  2 года назад +3

      Thanks for the comment!

  • @herculesgixxer
    @herculesgixxer 2 года назад +7

    Chris, you never cease to explain anything with utmost clarity and precision. You inspire to learn more!

    • @ChrisGreer
      @ChrisGreer  2 года назад

      Thank you for the kind comment!

  • @LostBoi803
    @LostBoi803 2 года назад +4

    The fact that Chris thought "There might be someone who is interested in learning this, so let's make a video" in itself is great. Thank you so much Chris!

    • @ChrisGreer
      @ChrisGreer  2 года назад +1

      Thank you for thinking that! Happy that other people like to learn the same stuff my brain finds interesting. 😄

    • @LostBoi803
      @LostBoi803 2 года назад

      @@ChrisGreer You probably have a fair idea how many of us resonate with your ideas. Way to go 🥳

  • @TerrorByteX426
    @TerrorByteX426 Месяц назад

    I love your explanation, the practical with wireshark and tone of your voice... it really sinks in...
    Thanks a lot

  • @kianooshmehrandish7187
    @kianooshmehrandish7187 8 месяцев назад +1

    why I’m really finding you now? you’ve been here for 2 years and dumb me just found you, anyway you are awesome teacher keep up the great work❤

    • @ChrisGreer
      @ChrisGreer  8 месяцев назад +1

      Thank you! I’ll still be around so check back in from time to time!

  • @billybuck2713
    @billybuck2713 Год назад +4

    Super quality video! I learned so much, I love that you show us the packets so we can see whats really going on. Its a great style of learning!

  • @MrKyubiSasuke
    @MrKyubiSasuke Год назад

    Taking this class in college rn and the explanations weren’t getting through but this really helps a lot

  • @THEWolf-bz6ot
    @THEWolf-bz6ot 2 года назад

    thank you Chris for sharing all these staffs to help network engineers being in the riight direction !

  • @sharpestasset9615
    @sharpestasset9615 2 года назад +4

    My hope is to one day be as good as you. Thank you so much for all the work you put into your vids. Great explanations.👍

    • @ChrisGreer
      @ChrisGreer  2 года назад +2

      My hope is that one day you are better... 🙃

  • @mustafaabdelfattah2493
    @mustafaabdelfattah2493 Год назад

    Thanks chris , i used to bypass fragmented packets in wireshark during analysis cause i couldnt understand it , you helped too much to change the idea of fragmentation complexity
    Great vidio and explanation , thanks so much , really appaociated

  • @Manavetri
    @Manavetri 2 года назад +2

    excellent video. It shows that you have the concepts very well since you can describe them in an extremely simple way so that anyone can understand it... Thanks for the brilliant videos you have.

    • @ChrisGreer
      @ChrisGreer  2 года назад +1

      Thank you for the comment Marcelo!

  • @jodypetroni3135
    @jodypetroni3135 5 месяцев назад

    this was one of the best explanation videos ever! thanks Chris

  • @ramzal786
    @ramzal786 Год назад

    Good one Chris...kudos for taking the time to record this......Thx much.

    • @ChrisGreer
      @ChrisGreer  Год назад

      Thanks for the comment. It helps!

  • @rdp8545
    @rdp8545 2 года назад

    You're a legend Chris for sharing this info. It makes us understand Wireshark so much easier.

    • @ChrisGreer
      @ChrisGreer  2 года назад

      Awesome! Glad it helps you RDP.

  • @JoshKuo
    @JoshKuo 2 года назад

    This is the best IP fragmentation explanation I have seen! Thank you for this excellent video which both my wife and I enjoyed :)

  • @sardaukar-yt
    @sardaukar-yt 2 года назад

    They way you explain things is super clear. Thank you very much for sharing your knowledge you're amazing.

    • @ChrisGreer
      @ChrisGreer  2 года назад

      You're very welcome! Thank you for watching and commenting.

  • @rubo111
    @rubo111 10 месяцев назад

    Nice video, always enjoy the content you put out.
    At 2:35, I think you made a mistake here. The 1500 byte packet gets split into a 1400 byte packet and a 120 byte packet (assuming we are talking about L3 inclusive of headers here).

  • @spoorthipanduranga466
    @spoorthipanduranga466 2 года назад

    This is awesome, I'd been looking for this answer since last year after I failed in my Interview and I finally got the answer! Thank you very much. Its simple and well explained.

    • @ChrisGreer
      @ChrisGreer  2 года назад

      Awesome! Glad it helped you! 👏

  • @James_Knott
    @James_Knott 11 месяцев назад

    One thing to bear in mind is fragmentation is deprecated, replaced with Path MTU Discovery (PMTUD), where routers are not allowed to fragment and must return a too big ICMP message on oversize packets. This is mandatory on IPv6 and often happens on IPv4 by setting the do not fragment flat.

  • @JuberPashaShaik
    @JuberPashaShaik 2 года назад

    This is awesome. The concept was explained in a very detailed manner and easy to understand. Hope we see more videos from you.

  • @venkatesh4760
    @venkatesh4760 2 года назад

    Thanks for the Clearly Explained Video Chirs I am following along with all your videos from Pluralsight.

  • @endrixhafa6407
    @endrixhafa6407 Год назад

    much appreciated, becoming addicted on learning ,great stuff

  • @Karello1
    @Karello1 2 года назад

    The best wireshark guy out there 😊

  • @mayurhabbu7361
    @mayurhabbu7361 2 года назад

    Absolutely liked it Chris !! Much needed fundamentals brush up for me

    • @ChrisGreer
      @ChrisGreer  2 года назад

      Awesome Mayur, thank you for the comment!

  • @dimitarchristov2965
    @dimitarchristov2965 2 года назад

    Great explanation, thanks for showing how looks ok wireshark too, much easier to understand,🙌

  • @danpacheco1
    @danpacheco1 2 года назад +3

    Chris is so good, I watch his videos on topics I already know, just to see how he approaches the topic. Nice shout out to network chuck, hopefully Chris doesn’t get all clickbaity like him 🥴

    • @ChrisGreer
      @ChrisGreer  2 года назад +1

      Great to meet you Daniel, and thank you for the feedback!

  • @batista98854
    @batista98854 2 года назад

    Hi Chris. Thanks from India!! Excellent video and very well explained.

    • @ChrisGreer
      @ChrisGreer  2 года назад +1

      Glad it was helpful! Thank you!

  • @zaferseis7842
    @zaferseis7842 8 месяцев назад

    Great explanation Chris! Thanks

  • @nikolaydachev9691
    @nikolaydachev9691 2 года назад

    Chris, good job, It will be very interesting for a lot lite more advance users if you can make a video about how to detect network shaper from ISP side (our ISP limit us to what they claim or they do something else ... )

    • @ChrisGreer
      @ChrisGreer  2 года назад

      Great suggestion! I will see what I can do.

  • @vyasG
    @vyasG 2 года назад

    Great video. crystal clear explanation. Thank you so much!

  • @mcgirishnetwork
    @mcgirishnetwork 2 года назад

    Waiting for this explanation. Thanks a lot for this wonderful explanation video

  • @MyDiscovery2021
    @MyDiscovery2021 2 года назад

    Really helpful in my network testing.. Awesome

  • @manjesh23
    @manjesh23 2 года назад

    Good videos Chris, its very easy to understand the concepts what you say. Love to see some SSL handshake videos and OCSP too.

    • @ChrisGreer
      @ChrisGreer  2 года назад +1

      Thanks Manjesh! I appreciate the feedback!

  • @vu2957
    @vu2957 2 года назад

    Awesome explaination.. I can imagine packet travelling in ma brain..
    Tnx for such great share Mr. Chris🥸

  • @THEWolf-bz6ot
    @THEWolf-bz6ot 2 года назад

    THank you so much for what you share with us !!

  • @rakeshcristobal8320
    @rakeshcristobal8320 2 года назад

    Great explanation Chris! But at 5:00, wouldn't you take off 18 bytes instead of 14 for the Ethernet header? Is the 4 byte FCS not counted?

    • @ChrisGreer
      @ChrisGreer  2 года назад +1

      GREAT catch! So Wireshark doesn't calculate the FCS as a part of the length. So that is why the frame is 1514 and the remaining part of the Ethernet frame is 14 bytes.

  • @mintoo2cool
    @mintoo2cool 7 месяцев назад

    you're a great teacher!

  • @ratnavodutta
    @ratnavodutta 2 года назад

    Hello Chris,
    What I did not understand why did you mentioned that the MTU size is low then fragmentation happens?
    Opinion - Doesn't the fragmentation occurs only when the MTU size is higher than 1500bytes? That means if the value is somewhere say 2000bytes then the fragmentation occurs.

    • @ChrisGreer
      @ChrisGreer  2 года назад +1

      Hey Ratnavo - fragmentation is only necessary when the MTU is lower than the packet size. If I have an MTU that is larger than 1500, then there is no need to break up a 1500 byte packet, which is the max in most environments. Hope that helps.

  • @cr7akki
    @cr7akki Год назад

    Hi sir ,i want to know if UDP support MTU and how can we make change so client and server can see each other Mtu size on UDP ,is there a registry or some change we can do on OS?

  • @tommurphy2332
    @tommurphy2332 Год назад

    I created a display column for time-to-live and it seems that every value in the column is an integer power of 2: 1, 32, 128 and so on. So, I believe this capture file came from the server side of the network and I need to capture the client side or some other node to see a value in time-to-live that's not an integer power of 2.

  • @mahdiyasini6516
    @mahdiyasini6516 13 часов назад

    God bless you Chris

  • @osamaabou-el-gibeen9704
    @osamaabou-el-gibeen9704 2 года назад

    Excellent Video Mr G!

  • @pcbona
    @pcbona 2 года назад

    Would love to see a video on path mtu discovery. Never truly understood that functionality...

    • @ChrisGreer
      @ChrisGreer  2 года назад +1

      Good idea! Great topic that is often misunderstood.

  • @rajneeshrai1781
    @rajneeshrai1781 2 года назад

    Marvelous explanation Sir...
    Can we get a video on TCP headers???
    ✌️

    • @ChrisGreer
      @ChrisGreer  2 года назад +1

      There are quite a few on the channel already, anything specific you are looking for?

  • @dinieshvc8069
    @dinieshvc8069 2 года назад

    nice explanation chris, need video related to ECN

    • @ChrisGreer
      @ChrisGreer  2 года назад

      Oooh great idea. I like it.

  • @haroldw2823
    @haroldw2823 2 года назад

    Hi Chris, that is great stuff.
    Came here because Im starting out on this journey from scratch after a career in Oil.
    After doing a lab and not knowing anything about wireshark I found your site and clicked on the first video that came up.
    I will go through your wireshark class then head back over to ine and complete the lab.
    I like the way you explain this stuff, seems to resonate with me. Subbed and appreciated cheers mate.

    • @ChrisGreer
      @ChrisGreer  2 года назад

      Thanks Harold for the comment! Great to have you on the channel!

  • @milogop3574
    @milogop3574 2 года назад

    So i understand how Fragmentation works, and I understand what Segmentation does, but my question is: If it is common practice to use segmentation to ensure that the eventual frame being transmitted does not exceed the path MTU, then in what scenario would we need fragmentation?

    • @ChrisGreer
      @ChrisGreer  2 года назад +1

      Yes, that is why we can adjust the MSS on network devices. Let TCP do the chopping instead of the routers. Thanks for the comment!

  • @rabinupadhaya7232
    @rabinupadhaya7232 Год назад

    Who sets the df bit?? Is it the application or the gateway..??

  • @KaySwiss21
    @KaySwiss21 2 года назад

    YES, more GREER content!!

  • @xanaxity
    @xanaxity Месяц назад

    Nice video, Chris Greer !!!!!
    Can I force my packets to disable the "flags" so wireshark can't know? Like experiment idk if that even have implications. ik dumb question. 😂

    • @ChrisGreer
      @ChrisGreer  Месяц назад

      @@xanaxity I suppose so. If you created or modified the packets that were captured.
      I do that with a tool called WireEdit

  • @Study_Sleep_Chill
    @Study_Sleep_Chill 2 года назад

    Simply explained! Thanks

  • @camsasuncion
    @camsasuncion 2 года назад

    Super awesome explanation!!!!

  • @homayounshokri5041
    @homayounshokri5041 2 года назад

    Hi Chris
    Great video and really practical content that network engineers must should know.
    Can u make video tcpdump?

  • @tariqmehmood3698
    @tariqmehmood3698 2 года назад

    Thanks for the awesome video. Do you have any plan how can we split big pcap file to small? I have file with thousands of sessions but I need to filter only 2 sessions and send it to third party. Appreciate if you can guide.

    • @ChrisGreer
      @ChrisGreer  2 года назад +1

      Hey Tariq - sure use editcap on the command line. It gets installed with wireshark. If editcap is a part of your path, you can just use this syntax:
      editcap -c 100 big.pcap small pcap
      That will break up the big pcap into a bunch of small pcaps of 100 packets each. You can decide how many packets you want in each one.

    • @tariqmehmood3698
      @tariqmehmood3698 2 года назад

      @@ChrisGreer is there any way to filter on basis of source port or per session?

  • @camsasuncion
    @camsasuncion 2 года назад

    You've made me a fan!

    • @ChrisGreer
      @ChrisGreer  2 года назад

      Awesome, great to have you on the channel and thank you for the comment!

  • @x8x8x8x8
    @x8x8x8x8 2 года назад

    Good explanation.

  • @DebasishMandal
    @DebasishMandal 4 месяца назад

    great video sir.

  • @dhruvbhatia
    @dhruvbhatia 3 месяца назад

    This is gold!

  • @RolZuela
    @RolZuela 2 года назад

    The million dollar question: Is fragmentation bad? I mean if I need a 2mb pdf or a 10gb game it would still need to be sliced, right? Would you consider fragmentation as a network problem? Would fragmentation slow down an application?
    Thanks.

    • @ChrisGreer
      @ChrisGreer  2 года назад +1

      Fragmentation isn't ideal. It takes more process for the router to break it up, then the receiver to reassemble it. There would probably have to be a significant amount of fragmentation to impact performance - but the real problem is the packets that cannot be fragmented. Those will need to be retransmitted. That is what will KILL performance.

    • @RolZuela
      @RolZuela 2 года назад

      Understood @@ChrisGreer thanks for the explanation. Not too long ago a customer had problems over a VPN, the RTT was always fine, I noticed some fragmentation but it was still pretty fast and it didn't explain the app hanging for 90secs. I asked the server team to review but I never got a response back and it still bothers me hahahaha

  • @abdirahmanabdullahi1150
    @abdirahmanabdullahi1150 2 года назад

    this man is really legend expert of packet sniffing

  • @adedejiemmanuel1
    @adedejiemmanuel1 2 года назад

    This is beautiful. Thanks.

  • @neadlead2621
    @neadlead2621 Год назад

    thanks again chris the best

  • @abdirahmanabdullahi1150
    @abdirahmanabdullahi1150 2 года назад

    Chris thank you man

  • @oluwatobilobaayofe6303
    @oluwatobilobaayofe6303 2 года назад

    What if one of the fragments goes missing, how will the ACK mechanism going to deal with it? Thanks.

    • @ChrisGreer
      @ChrisGreer  2 года назад +1

      IP won’t be able to reassemble it to pass it up the stack to tcp. So tcp will treat it as a lost segment and it will have to retransmit the whole thing.

    • @oluwatobilobaayofe6303
      @oluwatobilobaayofe6303 2 года назад

      @@ChrisGreer Oh thanks!
      Please more questions if you don't mind.
      Do you know how one can modify the TCP/IP PDU to include some custom fields? I am experimenting with some SDN stuffs on mininet, hopefully you know about it?

    • @oluwatobilobaayofe6303
      @oluwatobilobaayofe6303 2 года назад

      @@ChrisGreer Also, you talk about re-assembly for fragmented IP packets. Is it the same with packet re-ordering. My current understanding of packet re-ordering is destination re-arranging the packets when they arrive out of sequence probably due to traversing different paths. Am I right on this? Kindly shed lights please. Thanks.

  • @ahmetkarakartal9563
    @ahmetkarakartal9563 Год назад

    thank you so much

  • @kevinaltizer
    @kevinaltizer 2 года назад

    Great info! Thanks!

  • @shawn8163
    @shawn8163 2 года назад

    Great video!

  • @CrashLoopBackOff-K8s
    @CrashLoopBackOff-K8s 2 года назад

    Great explanation and content. Leaving this comment for the algorithm, but if you keep putting out this kind of high quality content, you won't need any help from me. Keep up the great work!

    • @ChrisGreer
      @ChrisGreer  2 года назад

      Thanks for the comment! I appreciate that you help me out - comments really do help the algorithm which in turn helps me grow the channel.

  • @TarikZakariaBenmerar
    @TarikZakariaBenmerar 2 года назад

    you could do "sudo !!" to add sudo to the last command

    • @ChrisGreer
      @ChrisGreer  2 года назад

      Good thinking - sometimes I forget!

    • @TarikZakariaBenmerar
      @TarikZakariaBenmerar 2 года назад

      @@ChrisGreer thank you for the video. A couple of things I will add when talking about fragmentations to my students :D

  • @John-qy9rx
    @John-qy9rx Год назад

    does encryption still work with fragmentation?

    • @ChrisGreer
      @ChrisGreer  Год назад

      Fragmentation happens at a lower layer than encryption with TLS. So it won’t impact the encryption.

  • @majiddehbi9186
    @majiddehbi9186 2 года назад

    Great thx Chris

  • @villurisatya5132
    @villurisatya5132 2 года назад

    Can we avoid fragmentation by adjusting mss value ?

    • @ChrisGreer
      @ChrisGreer  2 года назад

      Yes, that is one way to do it. I'd probably do that as a last step though.

    • @villurisatya5132
      @villurisatya5132 2 года назад

      @@ChrisGreer thanks for replying... One more question... Is MSS can be changed manually or it adjust automatically

    • @villurisatya5132
      @villurisatya5132 2 года назад

      I am waiting for your reply

    • @ChrisGreer
      @ChrisGreer  2 года назад +1

      @@villurisatya5132 Hello Villuri, Yes it can be changed manually. Within the OS, or even the network infrastructure along the path can adjust it.

    • @villurisatya5132
      @villurisatya5132 2 года назад

      @@ChrisGreer Thank you Chris... I saw your video on congestion avoidence which is actually slowing down the mss once it reach to the specific limit but it's not actually avoiding the congestion
      I saw ECN is doing the congestion avoidence... Could you please do the video on ECN flag ... With wireshark captures

  • @北科大-陳俊宇
    @北科大-陳俊宇 Год назад

    why ICMP length is 162bytes

  • @james_nt
    @james_nt Год назад

    thank bro!

  • @rohscx
    @rohscx 2 года назад

    nice thanks

  • @drapala97
    @drapala97 6 месяцев назад

    why MTU is decimal not binary?

    • @ChrisGreer
      @ChrisGreer  6 месяцев назад

      Can you clarify the question? Any number you see can be displayed either way. Not sure what you’re looking for.

  • @Akibkhan-l1m
    @Akibkhan-l1m Год назад

    Nice

  • @killerx8902
    @killerx8902 2 года назад

    Awesome

  • @andreffrosa
    @andreffrosa 2 года назад

    What happens in ipv6?

    • @ChrisGreer
      @ChrisGreer  2 года назад +1

      For IPv6, fragmentation is handled by the endpoints, not the network infrastructure. Check out datatracker.ietf.org/doc/html/rfc2460#page-18 for more info.

  • @nayan271984
    @nayan271984 2 года назад

    Why offset bit is always 8 bit?

    • @ChrisGreer
      @ChrisGreer  2 года назад

      Hello Nayan. Only 13 bits in the header are used to indicate the offset. If this represented a bit-level offset, we could only offset up to 1024 bytes, which is not even up to the max MTU in most environments. Counting bytes allows for a byte offset up to 8192, which is more in line with the purpose of needing a fragment in the first place. At this point we can't adjust the number of bits allocated without breaking the protocol. So... bytes it is!

    • @nayan271984
      @nayan271984 2 года назад

      @@ChrisGreer I really appreciate your quick reply and explanation.

    • @nayan271984
      @nayan271984 2 года назад

      I have one more question but not with Fragmentation. How browser is using existing session to do ssl handshake. I thought browser will reuse existing session ID from previous SSL handshake. Today I capture logs for one website, I access the site first then kept the browser idle for 5 min and then again refresh the same page. I have seen client hello going out but then I see this message "Change Cipher Spec, Application Data" from my system. There was no server hello msg and when I checked session ID then that was also different. not sure on what basis my browser did ssl handshake.

  • @javabysaqib3303
    @javabysaqib3303 2 года назад

    Also gift us Udemy course 😁

  • @troysipple2591
    @troysipple2591 Год назад

    That was very interesting.