Compute the hash - part of the packet, Computer Networking

Assignment Help:

In this question, we study Nested ESP in AH, that is, we combine ESP with AH. Let's look at the site-to-site VPN scenario shown again in Figure 1. Let's assume that Alice's desktop is on VPN Site 1 while Bob's is on VPN site 2. Assume the IP address of Alice's desktop is 130.2.3.244; the IP address of Bob's desktop is 166.100.66.2. In addition, because neither Alice nor Bob trusts all employees in their companies, they would use the Transparent Mode of ESP.

1336_Compute the hash - part of the packet.png

When Alice sends message "Stock X price $29" to Bob, the message sender program running on Alice's desktop needs to firstly compose the packet before it is encrypted. This cleartext packet will be the exact same packet in your answer for Question 3.1. Next, the sender packet will use ESP to encrypt the packet. After this packet is encrypted, what does the packet look like? Please draw the whole packet and mark the fields that are encrypted.

Next, Alice's message sender program will apply the AH protocol so that all IP spoofing attacks and message replacement attacks can be defeated. To compute the hash, which part of the packet resulted from Question 4.1 will be used as the input?

After the hash is computed by Alice's message sender program, the hash will be included in which part of the packet sent out from Alice's desktop?

After a while, the packet will arrive at the VPN router on site 2. Will the VPN router decrypt the packet? Why?

After a while, the packet will arrive at Bob's desktop. Is it possible for Bob to decrypt the packet and get the message before the AH header is verified? Why?

After the packet arrives at Bob's desktop, please give a step-by-step answer on how the AH header is verified by the receiver program running on Bob's desktop.

During the whole process from (4.1) to (4.6), where is the IKE protocol used?


Related Discussions:- Compute the hash - part of the packet

Explain different network structures in use, Computer Networking 1. Exp...

Computer Networking 1. Explain different network structures in use. 2. Elaborate the architecture and usage of ISDN. 3. Discuss the concept of framing in Data Link Layer

Nics and network hardware, NICs AND NETWORK HARDWARE:  NIC is create f...

NICs AND NETWORK HARDWARE:  NIC is create for one kind of physical network. For example Ethernet interface may not be needed with token ring and similar ATM interface cannot b

Metric translation takes place in redistributing routes, Why Does metric tr...

Why Does metric translation takes place in redistributing routes?

How do we describe the concept of dpu, How do we explain the method of DPU,...

How do we explain the method of DPU, Segments, Datagram, Frame and  packet?

Determine the subnet with subnet prefix, Consider a subnet with subnet pref...

Consider a subnet with subnet prefix 101.101.101/24  a)  If you subdivide the subnet into four equal size subnets, what are their prefixes? Give all four prefixes in the form a.

What is the protocol number for udp, User Datagram Protocol - UDP is a conn...

User Datagram Protocol - UDP is a connectionless oriented transport protocol for use when the upper layers give error-recovery and reliability. UDP does not series data or re-assem

Explain client and server networking model, Explain Client/Server Networkin...

Explain Client/Server Networking Model. A networking model where one or more powerful  computers (servers) give the dissimilar network services and all other user's computers (

Firewall architectures-screening router, Screening Router In this setu...

Screening Router In this setup network router acts as a firewall. It checks all incoming and outgoing packets according to the predefined rules. This filter is placed at the c

Command that shows traffic statistics on serial 0/1, Recognize the command ...

Recognize the command that shows traffic statistics on serial0/1? Ans) show interface serial 0/1

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd