Question

In: Computer Science

IP Security and IPSec Suppose you have an IPv4 packet with 825964 bytes length. Assume that...

IP Security and IPSec

Suppose you have an IPv4 packet with 825964 bytes length. Assume that this packet is to be sent through a network having 1500 bytes MTU.

Question:

(a) How many minimum fragments must be created from the IP packet?

(b) What would be the value of “flag” and “offset” fields of the first fragment? Justify your answer.

(c) What would be the value of “flag”, “offset”, and “length” fields of the last fragment? Justify your answer.

(d) What is a security issue with IPv4 fragmentation? Explain in one paragraph.

Solutions

Expert Solution

(a) the minimum fragment should be 559 as each of the fragment will send a packet of size of 1480Bytes. and total we have 825964Bytes to send. Also MTU 1500Bytes will have 20 Bytes as the header size.

(b) See when we are sending the first fragment its offset will be 0 as before this we havent send any packet. And the value of MF Flag will be 1 because this is not the last fragment we have to send more fragment. so flag will be 1.

(c) In the last fragment As the fragment is last that means there will not be any fragment after this one so. the MF flag will be 0 means there will not be any more fragment. The offset will be the no. of bytes till now sent before the last fragment. i.e 825940

Also the length of the data will be 24Bytes + 20 Bytes of header size AS only this much data left after second last data movement. so total length of last fragment will be 44 bytes.

(d) We will have issue with the Security of IPV4 fragmentation. the sender normally fragment the large packet into multiple packet and at the receiver end those fragment packets got reassembled. But there is danger in that when the fragment packet is send in that case there might be fragmentation attacks. means the receiver resources will be used by the attacker and it will be bombarded with large no. of fragments by attackers. due to which i may cause to creash the server and resources of the receiver system.


Related Solutions

Assume a byte-addressable memory has 64K bytes. Blocks are 8 bytes in length and the cache...
Assume a byte-addressable memory has 64K bytes. Blocks are 8 bytes in length and the cache consists of 4K bytes. Show the format for a main memory address assuming a 4-way set associative cache mapping scheme. Include the field names as well as their sizes.
Suppose that the security code for a particular automobile’s locks consists of 4 bytes of data...
Suppose that the security code for a particular automobile’s locks consists of 4 bytes of data transmitted via a low power radio. A byte is either sent correctly or is distorted by interference. The car locks are only opened if all 4 bytes are received correctly. Let C be the event that a byte is received correctly and F be the event that the byte is distorted in transmission. Then CCCC would mean that all four bytes were received correctly...
Assume that we have a machine with IP Address 15.107.33.204 with netmask 255.255.255.240. Assume that you...
Assume that we have a machine with IP Address 15.107.33.204 with netmask 255.255.255.240. Assume that you manage a /11 address space, and that we have fully divided it up into child networks the size of the one on which this machine resides. How many useable subnets of this size can be created? How many useable addresses will be available on each of these subnets? List the IP addresses of the first three and last three of these useable subnets. Give...
Assume that you are working as IT Security head in RLCare hospital. You hospital has 90 employees in two departments which are IP and OP.
 B3.1 Assume that you are working as IT Security head in RLCare hospital. You hospital has 90 employees in two departments which are IP and OP. The hospital had no firewall to secure its network and the entire hospital is in two LANs for each department and both connected separately to internet. However, RLCare hospital has one application proxy for FTP protocol. RLCare hospital has a Server that has all the patient records from IP and OP departments. As per the...
Assume that you have the following MAC address 01:00:5e:XX:XX:XX (where the last 3 bytes matches the...
Assume that you have the following MAC address 01:00:5e:XX:XX:XX (where the last 3 bytes matches the last 3 bytes of your own device MAC address), figure out what IPv4 multicast address does this MAC address belongs to?
Suppose you have a wire of length L. You cut a length x to make a square and use the remaining
Suppose you have a wire of length L. You cut a length x to make a square and use the remaining length L - x to make a circle. Use MuPAD to find the length x that maximizes the sum of the areas enclosed by the square and the circle.
Suppose an application generates chunks 60 bytes of data every 200msec. Assume that each chunk gets...
Suppose an application generates chunks 60 bytes of data every 200msec. Assume that each chunk gets put into a TCP packet and that the TCP packet gets put into IP packets. What is the % of overhead that is added in because of TCP and IP combines? 1) 40% 2) 10% 3) 20% 4) 70%
Suppose you have a reed of length 1 unit. If you haphazardly break this reed twice...
Suppose you have a reed of length 1 unit. If you haphazardly break this reed twice (forming 3 pieces), those 3 pieces might form a triangle, or they might not. What is the empirical probability that you can form a triangle from the pieces? Estimate this by “breaking” 2000 reeds twice and seeing if the parts form triangles.
Suppose we have a sequential ordered file of 200,000 records, where each record is 200 bytes....
Suppose we have a sequential ordered file of 200,000 records, where each record is 200 bytes. Assume blocksize = 2048 bytes (10 records per block), average seek time = 10 ms, average rotational delay = 8.3 ms, and block transfer time = 0.8 ms. Suppose we want to make X independent random record reads from the file. This could be done in two different approaches. read the entire file once and look for the X records of interest use a...
Suppose you observe the following situation: Security Beta Expected Return Assume these securities are correctly priced....
Suppose you observe the following situation: Security Beta Expected Return Assume these securities are correctly priced. peat co. 1.20 11.0 Repeat co. 0.65 9.9 Based on the CAPM, what is the expected return on the market? What is the risk-free rate? (Do not round intermediate calculations. Enter your answers as a percent rounded to 2 decimal places.) Expected return on market % Risk-free rate %
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT