Describe one security measure against reverse tunneling, Computer Networking

Assignment Help:

Question:

a) In route-optimized communication, a mobile node sends packets to a correspondent using the home address present in the destination option. Why does the design use a routing header in the reverse direction? Why not use destination option in both ways?

b) In the basic Return Routability mechanism, the mobile node reverse-tunnels the HoTI message to the home agent, which in turn forwards the packet to the correspondent. When the IPv4 address is co-located with the mobile node, the mobile node can reverse-tunnel the HoTI message using IPv4 addresses.

i. What implications does this have on the security association and signalling?

ii. What are the savings, if any?

c) Explicit the following statement: "The return routability procedure provides an address ownership proof mechanism."

d) Assuming that IP routing works on the Internet today and we send two different secrets along two different routing paths, why a proof that combines the two secrets sufficient for binding one address to another?

e) Reverse tunneling may be used in certain cases, such as when a network does not allow outgoing datagrams with a foreign source IP address, when enabled, rather than sending datagrams directly, the mobile node tunnels all transmissions back to the home agent, which sends them on the Internet. Consider MIP in a VPN scenario.

i. Explain how reverse tunneling could be risky if appropriate security measures are absent.

ii. Describe one security measure against reverse tunneling.

f) Assuming you are using authentication schemes for communications between

(i) a MN and a HA, (ii) a MN and a FA. Which one of (i) and (ii) is less secure?


Related Discussions:- Describe one security measure against reverse tunneling

What is clipper, Clipper is a compiler that was well recognized at the time...

Clipper is a compiler that was well recognized at the time of80's and early times of 90's. We can build DOS based applications (even large applications too) using clipper. There is

describe the mips instructions - computer architecture, 1.  Detail for eac...

1.  Detail for each of the four following MIPS instructions, which actions are being taken at each of their five steps.  Do not forget to mention how and during which steps each in

Discuss the benefits and requirements of voip, Question 1 Discuss the bene...

Question 1 Discuss the benefits and requirements of VOIP Question 2 Define the following Multicast routing protocol explain in detail with diagram Multicast backbone

What is the protocol number for udp, User Datagram Protocol - UDP is a conn...

User Datagram Protocol - UDP is a connectionless oriented transport protocol for use when the upper layers give error-recovery and reliability. UDP does not series data or re-assem

Define retransmission, Define Retransmission? Retransmission is a proce...

Define Retransmission? Retransmission is a process in which the receiver detects the occurrence of an error and asks the sender to resend the message. Resending is repeated unt

What does jade stands for, QUESTION (a) Briefly describe the dire...

QUESTION (a) Briefly describe the direct coordination model and the meeting oriented coordination model (b) What does JADE stands for? (c) Name the three spec

The internet layer - fundamentals of networks, The Internet Layer The ...

The Internet Layer The  internet  layer is  responsible  for routing the data  packets  to the appropriate  destination. Internet protocol (IP) is responsible for ensuring dat

What is oltp, In the transaction server, the client component usually consi...

In the transaction server, the client component usually consists of GUI and the server components usually having of SQL transactions against a database. These applications are know

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd