{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:03Z","timestamp":1750220883327,"version":"3.41.0"},"reference-count":6,"publisher":"Association for Computing Machinery (ACM)","issue":"5","license":[{"start":{"date-parts":[[2019,11,8]],"date-time":"2019-11-08T00:00:00Z","timestamp":1573171200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCOMM Comput. Commun. Rev."],"published-print":{"date-parts":[[2019,11,8]]},"abstract":"<jats:p>We look back at our 1987 paper, \"Fragmentation Considered Harmful,\" to explain why we wrote it, how the prevalence of fragmentation was reduced by approaches such as Path MTU Discovery, and how fragmentation-related issues still lurk in today's Internet. Our paper listed several reasons why we thought fragmentation was harmful; some were more true in 1987 than they are today, and after our paper was published, the community realized that fragmentation (and the mechanisms used to mitigate it) exposed harms we did not anticipate in our paper.<\/jats:p>","DOI":"10.1145\/3371934.3371950","type":"journal-article","created":{"date-parts":[[2019,11,8]],"date-time":"2019-11-08T20:27:58Z","timestamp":1573244878000},"page":"41-43","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Retrospective on \"fragmentation considered harmful\""],"prefix":"10.1145","volume":"49","author":[{"given":"Jeffrey C.","family":"Mogul","sequence":"first","affiliation":[{"name":"Google LLC"}]},{"given":"Christopher A","family":"Kantarjiev","sequence":"additional","affiliation":[]}],"member":"320","published-online":{"date-parts":[[2019,11,8]]},"reference":[{"volume-title":"Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing (PODC '98)","author":"Girish","key":"e_1_2_1_1_1","unstructured":"Girish P. Chandranmenon and George Varghese. 1998. Reconsidering Fragmentation and Reassembly . In Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing (PODC '98) . 21--29. Girish P. Chandranmenon and George Varghese. 1998. Reconsidering Fragmentation and Reassembly. In Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing (PODC '98). 21--29."},{"key":"e_1_2_1_2_1","volume-title":"Deering and Jeffrey Mogul","author":"Dr.","year":"1990","unstructured":"Dr. Steve E. Deering and Jeffrey Mogul . 1990 . Path MTU discovery. RFC 1191. (Nov. 1990). Dr. Steve E. Deering and Jeffrey Mogul. 1990. Path MTU discovery. RFC 1191. (Nov. 1990)."},{"key":"e_1_2_1_3_1","volume-title":"Proceedings of the 5th USENIX Conference on Offensive Technologies (WOOT'11)","author":"Gilad Yossi","year":"2011","unstructured":"Yossi Gilad and Amir Herzberg . 2011 . Fragmentation Considered Vulnerable: Blindly Intercepting and Discarding Fragments . In Proceedings of the 5th USENIX Conference on Offensive Technologies (WOOT'11) . USENIX Association, 2--2. Yossi Gilad and Amir Herzberg. 2011. Fragmentation Considered Vulnerable: Blindly Intercepting and Discarding Fragments. In Proceedings of the 5th USENIX Conference on Offensive Technologies (WOOT'11). USENIX Association, 2--2."},{"key":"e_1_2_1_4_1","volume-title":"Congestion Avoidance and Control. In Symposium Proceedings on Communications Architectures and Protocols (SIGCOMM '88)","author":"Jacobson V.","year":"1988","unstructured":"V. Jacobson . 1988 . Congestion Avoidance and Control. In Symposium Proceedings on Communications Architectures and Protocols (SIGCOMM '88) . 314--329. V. Jacobson. 1988. Congestion Avoidance and Control. In Symposium Proceedings on Communications Architectures and Protocols (SIGCOMM '88). 314--329."},{"volume-title":"Proceedings of the ACM Workshop on Frontiers in Computer Communications Technology (SIGCOMM '87)","author":"Kent C. A.","key":"e_1_2_1_5_1","unstructured":"C. A. Kent and J. C. Mogul . 1988. Fragmentation Considered Harmful . In Proceedings of the ACM Workshop on Frontiers in Computer Communications Technology (SIGCOMM '87) . 390--401. C. A. Kent and J. C. Mogul. 1988. Fragmentation Considered Harmful. In Proceedings of the ACM Workshop on Frontiers in Computer Communications Technology (SIGCOMM '87). 390--401."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879155"}],"container-title":["ACM SIGCOMM Computer Communication Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3371934.3371950","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3371934.3371950","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:19Z","timestamp":1750203859000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3371934.3371950"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,8]]},"references-count":6,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,11,8]]}},"alternative-id":["10.1145\/3371934.3371950"],"URL":"https:\/\/doi.org\/10.1145\/3371934.3371950","relation":{},"ISSN":["0146-4833"],"issn-type":[{"type":"print","value":"0146-4833"}],"subject":[],"published":{"date-parts":[[2019,11,8]]},"assertion":[{"value":"2019-11-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}