IP fragmentation is an Internet Protocol (IP) process that breaks datagrams into smaller pieces (fragments), so that packets may be formed that can pass through a link with a smaller maximum transmission unit (MTU) than the original datagram size. The fragments are reassembled by the receiving host.
Open ValkyrieManager, reserve a port and load the XPC file (Test_IP_Fragmentation.xpc) to it. The configuration creates a stream of 10 IP fragmented packets in (please see the attached Test_IP_Fragmentation.xpc).
In order to make a valid IP fragmentation stream, there are several rules by RFC:
(1) All packets except the last one should have the FLAGS filed (3-bit) in the IP header set to 001. The last one should have FLAGS=000. I do this through a decrement modifier on the FLAGS field (max=1, min=0, step=1, repeat=9).
(2) Fragment Offset value should be set correctly for each packet. The OFFSET value times 8 is the IP payload length, e.g. if the IP payload length (excluding Ethernet and IP header and FCS) is 48 bytes as in my example, the OFFSET should increment by 48/8=6 for each packet. I do this through an increment modifier on the FRAGMENT OFFSET field (min=0, step=6)
The port configuration file has been verified using Wireshark, see attachment. Wireshark can successfully reassemble the 10 packets.
Hope these can help.