Question

In: Computer Science

IP Security and IPSec Suppose you have an IPv4 packet with 825964 bytes length. Assume that...

IP Security and IPSec

Suppose you have an IPv4 packet with 825964 bytes length. Assume that this packet is to be sent through a network having 1500 bytes MTU.

Question:

(a) How many minimum fragments must be created from the IP packet?

(b) What would be the value of “flag” and “offset” fields of the first fragment? Justify your answer.

(c) What would be the value of “flag”, “offset”, and “length” fields of the last fragment? Justify your answer.

(d) What is a security issue with IPv4 fragmentation? Explain in one paragraph.

Solutions

Expert Solution

(a) the minimum fragment should be 559 as each of the fragment will send a packet of size of 1480Bytes. and total we have 825964Bytes to send. Also MTU 1500Bytes will have 20 Bytes as the header size.

(b) See when we are sending the first fragment its offset will be 0 as before this we havent send any packet. And the value of MF Flag will be 1 because this is not the last fragment we have to send more fragment. so flag will be 1.

(c) In the last fragment As the fragment is last that means there will not be any fragment after this one so. the MF flag will be 0 means there will not be any more fragment. The offset will be the no. of bytes till now sent before the last fragment. i.e 825940

Also the length of the data will be 24Bytes + 20 Bytes of header size AS only this much data left after second last data movement. so total length of last fragment will be 44 bytes.

(d) We will have issue with the Security of IPV4 fragmentation. the sender normally fragment the large packet into multiple packet and at the receiver end those fragment packets got reassembled. But there is danger in that when the fragment packet is send in that case there might be fragmentation attacks. means the receiver resources will be used by the attacker and it will be bombarded with large no. of fragments by attackers. due to which i may cause to creash the server and resources of the receiver system.


Related Solutions

Suppose that the packet length is L= 1000 bytes, and that the link transmission rate along...
Suppose that the packet length is L= 1000 bytes, and that the link transmission rate along the link to router on the right is R = 1000 Mbps. 1. What is the transmission delay (the time needed to transmit all of a packet's bits into the link) (in milliseconds)? I know that the answer to 1. is ---> The link transmission delay = L/R = 8000 bits / 1000 Mbps = 0.008 msec. 2. what is the maximum number of...
Consider the following IPv4 forwarding table, using CIDR. As in exercise 1, IP address bytes are...
Consider the following IPv4 forwarding table, using CIDR. As in exercise 1, IP address bytes are in hexadecimal, and “:” is used as the separator as a reminder. destination next_hop 00:0:0:0/2 A 40:0:0:0/2 B 80:0:0:0/2 C c0:0:0:0/2 D (a). To what next_hop would each of the following be routed? 63:b1:82:15, 9e:00:15:01, de:ad:be:ef (b). Explain why every IP address is routed somewhere, even though there is no default entry. Hint: convert the first bytes to binary
Assume a byte-addressable memory has 64K bytes. Blocks are 8 bytes in length and the cache...
Assume a byte-addressable memory has 64K bytes. Blocks are 8 bytes in length and the cache consists of 4K bytes. Show the format for a main memory address assuming a 4-way set associative cache mapping scheme. Include the field names as well as their sizes.
Suppose that the security code for a particular automobile’s locks consists of 4 bytes of data...
Suppose that the security code for a particular automobile’s locks consists of 4 bytes of data transmitted via a low power radio. A byte is either sent correctly or is distorted by interference. The car locks are only opened if all 4 bytes are received correctly. Let C be the event that a byte is received correctly and F be the event that the byte is distorted in transmission. Then CCCC would mean that all four bytes were received correctly...
Assume that we have a machine with IP Address 15.107.33.204 with netmask 255.255.255.240. Assume that you...
Assume that we have a machine with IP Address 15.107.33.204 with netmask 255.255.255.240. Assume that you manage a /11 address space, and that we have fully divided it up into child networks the size of the one on which this machine resides. How many useable subnets of this size can be created? How many useable addresses will be available on each of these subnets? List the IP addresses of the first three and last three of these useable subnets. Give...
Assume that you are working as IT Security head in RLCare hospital. You hospital has 90 employees in two departments which are IP and OP.
 B3.1 Assume that you are working as IT Security head in RLCare hospital. You hospital has 90 employees in two departments which are IP and OP. The hospital had no firewall to secure its network and the entire hospital is in two LANs for each department and both connected separately to internet. However, RLCare hospital has one application proxy for FTP protocol. RLCare hospital has a Server that has all the patient records from IP and OP departments. As per the...
Assume that you have the following MAC address 01:00:5e:XX:XX:XX (where the last 3 bytes matches the...
Assume that you have the following MAC address 01:00:5e:XX:XX:XX (where the last 3 bytes matches the last 3 bytes of your own device MAC address), figure out what IPv4 multicast address does this MAC address belongs to?
Suppose you have a wire of length L. You cut a length x to make a square and use the remaining
Suppose you have a wire of length L. You cut a length x to make a square and use the remaining length L - x to make a circle. Use MuPAD to find the length x that maximizes the sum of the areas enclosed by the square and the circle.
Suppose an application generates chunks 60 bytes of data every 200msec. Assume that each chunk gets...
Suppose an application generates chunks 60 bytes of data every 200msec. Assume that each chunk gets put into a TCP packet and that the TCP packet gets put into IP packets. What is the % of overhead that is added in because of TCP and IP combines? 1) 40% 2) 10% 3) 20% 4) 70%
Suppose you have a reed of length 1 unit. If you haphazardly break this reed twice...
Suppose you have a reed of length 1 unit. If you haphazardly break this reed twice (forming 3 pieces), those 3 pieces might form a triangle, or they might not. What is the empirical probability that you can form a triangle from the pieces? Estimate this by “breaking” 2000 reeds twice and seeing if the parts form triangles.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT