Podcast
Questions and Answers
When a router's queue is full due to congestion, what type of ICMP message is sent to notify the sender of a dropped packet?
When a router's queue is full due to congestion, what type of ICMP message is sent to notify the sender of a dropped packet?
- Destination Unreachable
- Time Exceeded
- Source Quench (correct)
- Echo Reply
What are the possible Code values that indicate that an ICMP 'Time Exceeded' message should be sent?
What are the possible Code values that indicate that an ICMP 'Time Exceeded' message should be sent?
- Code 0: Network unreachable, Code 1: Port unreachable
- Code 0: Router unreachable, Code 1: Host unreachable
- Code 0: TTL reached 0, Code 1: Packet too big.
- Code 0: TTL reached 0, Code 1: Fragment reassembly time exceeded (correct)
Which of the following best describes how a 'Ping of Death' attack is executed?
Which of the following best describes how a 'Ping of Death' attack is executed?
- By sending an oversized ICMP echo request packet that exceeds the maximum allowed IP datagram size. (correct)
- By exploiting vulnerabilities in DNS servers to redirect traffic.
- By sending a malformed TCP packet with invalid flags.
- By flooding the target with a large number of small ICMP echo request packets.
In a Smurf attack, what type of address is typically used as the source address, and what type of address is used as the destination address?
In a Smurf attack, what type of address is typically used as the source address, and what type of address is used as the destination address?
Which IPv6 header field is specifically designed to enable efficient traffic flow classification by routers based solely on the main header?
Which IPv6 header field is specifically designed to enable efficient traffic flow classification by routers based solely on the main header?
Which layer of the OSI model do Ethernet protocols primarily operate within?
Which layer of the OSI model do Ethernet protocols primarily operate within?
What is the EtherType value for IPv6 in Ethernet frames?
What is the EtherType value for IPv6 in Ethernet frames?
Which of the following is NOT a function of the Data Link Layer?
Which of the following is NOT a function of the Data Link Layer?
What is the decimal value of the protocol number that identifies TCP at Layer 3?
What is the decimal value of the protocol number that identifies TCP at Layer 3?
Which field in the IP header is used to prevent packets from circulating endlessly in a network?
Which field in the IP header is used to prevent packets from circulating endlessly in a network?
What does the 'DF' flag in the IP header signify?
What does the 'DF' flag in the IP header signify?
In the context of IP headers and network congestion, what does Explicit Congestion Notification (ECN) provide that traditional TCP/IP networks do not?
In the context of IP headers and network congestion, what does Explicit Congestion Notification (ECN) provide that traditional TCP/IP networks do not?
What action does an ECN-aware router take when it anticipates congestion, assuming ECN negotiation is successful?
What action does an ECN-aware router take when it anticipates congestion, assuming ECN negotiation is successful?
Which of the following is a primary function of IP Options?
Which of the following is a primary function of IP Options?
What is a fundamental characteristic of the UDP transport protocol?
What is a fundamental characteristic of the UDP transport protocol?
In TCP, what is the role of the Acknowledgment field?
In TCP, what is the role of the Acknowledgment field?
What does the 'Window' field in a TCP header primarily indicate?
What does the 'Window' field in a TCP header primarily indicate?
Among the TCP flags, what is the purpose of the PSH flag?
Among the TCP flags, what is the purpose of the PSH flag?
How does TCP's Sequence Number contribute to reliable data transmission?
How does TCP's Sequence Number contribute to reliable data transmission?
Consider a scenario where a network administrator is diagnosing a slow file transfer issue. They capture packets and notice the TCP window size advertised by the receiver is consistently small. Analyzing further, they observe frequent retransmissions of the same segments. What is the most likely cause of this issue, assuming no routing or physical layer problems?
Consider a scenario where a network administrator is diagnosing a slow file transfer issue. They capture packets and notice the TCP window size advertised by the receiver is consistently small. Analyzing further, they observe frequent retransmissions of the same segments. What is the most likely cause of this issue, assuming no routing or physical layer problems?
A security researcher discovers an unpatched legacy system on the network that utilizes IP Options for a proprietary routing protocol. The researcher successfully crafts packets with manipulated IP Options to redirect traffic through a compromised host under their control without disrupting the network's primary routing infrastructure. Which vulnerability is MOST directly exploited in this scenario?
A security researcher discovers an unpatched legacy system on the network that utilizes IP Options for a proprietary routing protocol. The researcher successfully crafts packets with manipulated IP Options to redirect traffic through a compromised host under their control without disrupting the network's primary routing infrastructure. Which vulnerability is MOST directly exploited in this scenario?
Which TCP flag is used to initiate a connection?
Which TCP flag is used to initiate a connection?
What is the purpose of the TCP three-way handshake?
What is the purpose of the TCP three-way handshake?
In TCP, what happens when a sender does not receive an acknowledgment (ACK) for a sent packet within a certain timeout period?
In TCP, what happens when a sender does not receive an acknowledgment (ACK) for a sent packet within a certain timeout period?
What is the primary function of a sliding window in TCP?
What is the primary function of a sliding window in TCP?
What is the purpose of ICMP (Internet Control Message Protocol)?
What is the purpose of ICMP (Internet Control Message Protocol)?
Which of the following scenarios would most likely require the use of ICMP?
Which of the following scenarios would most likely require the use of ICMP?
What does the 'delayed ACK' mechanism in TCP aim to improve?
What does the 'delayed ACK' mechanism in TCP aim to improve?
Which of the following flags indicates that a TCP connection should be terminated?
Which of the following flags indicates that a TCP connection should be terminated?
Consider a scenario where a TCP sender transmits packets at a rate exceeding the receiver's processing capability. Which mechanism is primarily responsible for preventing the sender from overwhelming the receiver?
Consider a scenario where a TCP sender transmits packets at a rate exceeding the receiver's processing capability. Which mechanism is primarily responsible for preventing the sender from overwhelming the receiver?
A host sends a TCP packet with the ECE and CWR flags set. What does this indicate?
A host sends a TCP packet with the ECE and CWR flags set. What does this indicate?
Which of the following is a characteristic of UDP?
Which of the following is a characteristic of UDP?
What is the primary function of ICMP?
What is the primary function of ICMP?
Which ICMP type is used to determine if a host is reachable?
Which ICMP type is used to determine if a host is reachable?
What does the 'Code' field in an ICMP message specify?
What does the 'Code' field in an ICMP message specify?
Which of the following ICMP messages falls under the 'Reporting' category?
Which of the following ICMP messages falls under the 'Reporting' category?
In the context of ICMP 'Ping', what is the purpose of the 'Identifier' and 'Sequence Number' fields?
In the context of ICMP 'Ping', what is the purpose of the 'Identifier' and 'Sequence Number' fields?
What is a key reason TCP is preferred over UDP for applications requiring high reliability?
What is a key reason TCP is preferred over UDP for applications requiring high reliability?
An application sends a series of UDP packets. What mechanisms, if any, guarantee that these packets will arrive at the destination in the order they were sent?
An application sends a series of UDP packets. What mechanisms, if any, guarantee that these packets will arrive at the destination in the order they were sent?
A network administrator observes frequent 'Source Quench' ICMP messages. What does this indicate, and why is it rarely used today?
A network administrator observes frequent 'Source Quench' ICMP messages. What does this indicate, and why is it rarely used today?
Consider a scenario where a network device sends an ICMP 'Redirect' message. Under what specific circumstances would this message be generated, and what problem is it intended to solve?
Consider a scenario where a network device sends an ICMP 'Redirect' message. Under what specific circumstances would this message be generated, and what problem is it intended to solve?
Flashcards
Protocol Headers
Protocol Headers
Defines how devices format data for transmission on a network.
Layer 2 Sublayers
Layer 2 Sublayers
Breaks the Data Link Layer into Logical Link Control (LLC) and Media Access Control (MAC).
Data Link Layer Functions
Data Link Layer Functions
Used for framing, physical addressing and error control in data transmission.
IP Addresses
IP Addresses
Signup and view all the flashcards
Netmask
Netmask
Signup and view all the flashcards
TOS (Type of Service)
TOS (Type of Service)
Signup and view all the flashcards
TCP/IP Congestion Signaling
TCP/IP Congestion Signaling
Signup and view all the flashcards
ECN (Explicit Congestion Notification)
ECN (Explicit Congestion Notification)
Signup and view all the flashcards
IP Options
IP Options
Signup and view all the flashcards
IP Options Examples
IP Options Examples
Signup and view all the flashcards
UDP (User Datagram Protocol)
UDP (User Datagram Protocol)
Signup and view all the flashcards
Port Address
Port Address
Signup and view all the flashcards
Sequence Number
Sequence Number
Signup and view all the flashcards
Window (in TCP)
Window (in TCP)
Signup and view all the flashcards
PSH Flag
PSH Flag
Signup and view all the flashcards
ACK Flag
ACK Flag
Signup and view all the flashcards
UDP
UDP
Signup and view all the flashcards
TCP
TCP
Signup and view all the flashcards
TCP Reliability
TCP Reliability
Signup and view all the flashcards
UDP Data Sequencing
UDP Data Sequencing
Signup and view all the flashcards
UDP Speed
UDP Speed
Signup and view all the flashcards
UDP Header Size
UDP Header Size
Signup and view all the flashcards
UDP Transmission
UDP Transmission
Signup and view all the flashcards
UDP Applications
UDP Applications
Signup and view all the flashcards
ICMP
ICMP
Signup and view all the flashcards
ICMP Type
ICMP Type
Signup and view all the flashcards
Destination Unreachable Message
Destination Unreachable Message
Signup and view all the flashcards
Source Quench Message
Source Quench Message
Signup and view all the flashcards
Time Exceeded Message
Time Exceeded Message
Signup and view all the flashcards
Ping of Death
Ping of Death
Signup and view all the flashcards
Smurf Attack
Smurf Attack
Signup and view all the flashcards
RST Flag (TCP)
RST Flag (TCP)
Signup and view all the flashcards
SYN Flag (TCP)
SYN Flag (TCP)
Signup and view all the flashcards
FIN Flag (TCP)
FIN Flag (TCP)
Signup and view all the flashcards
CWR Flag (TCP)
CWR Flag (TCP)
Signup and view all the flashcards
ECE Flag (TCP)
ECE Flag (TCP)
Signup and view all the flashcards
TCP Three-Way Handshake
TCP Three-Way Handshake
Signup and view all the flashcards
TCP Acknowledgment & Retransmission
TCP Acknowledgment & Retransmission
Signup and view all the flashcards
TCP Efficient Transmission Method
TCP Efficient Transmission Method
Signup and view all the flashcards
TCP Sliding Window
TCP Sliding Window
Signup and view all the flashcards
ICMP (Internet Control Message Protocol)
ICMP (Internet Control Message Protocol)
Signup and view all the flashcards
Study Notes
- The presentation covers protocol headers and focuses on understanding main protocols.
- IPv4, TCP, UDP, ICMP, IPv6 and ICMPv6 headers will be reviewed.
Layer 2 | Data Link Layer | Ethernet
- Layer 2 is divided into two sub layers: Logical Link Control (LLC) and Media Access Control (MAC).
- Ethernet type for IPv4 is 0x800, for IPv6 is 0x86DD, and for ARP is 0x806
- Ethernet functions include framing and physical addressing
- Error control checks if a received frame is corrupted; in Ethernet, corrupted frames are discarded.
- Layer 2 Ethernet header contains Destination MAC address (6 bytes), Source MAC address (6 bytes), Ether type (2 bytes), Data (46 to 1500 bytes), and FCS (4 bytes).
Layer 3
- IPv4 uses 0x800 as the Ether type
- IP addresses are used to logically address hosts in Layer 3
- A netmask is used for identifying the network address of every IP address to contact.
- If the network address is similar to the receiving device's network address, the frame is sent to the destination using the NIC interface with the destination MAC address of the receiving device.
- If the network address is different, the frame goes to the gateway (router), which is responsible for delivering the packet to its destination
IPv4 Packet Header Format Important Fields
- Version indicates the IP version.
- IHL is the IP Header Length.
- DSCP is the Differentiated Services Code Point.
- ECN is the Explicit Congestion Notification.
- Identification specifies the Identification number
- Flags indicate fragmentation flags.
- Time to Live indicates how long the packet is good for
- Protocol signifies what protocol is being used
- Source IP Address describes the senders IP address
- Destination IP Address describes the receiver IP address
- Options are enabled if the IHL is greater than 5
- Total Length indicates the length of the IP packet
- Fragment Offset specifies where the fragment belongs
- Header Checksum allows for error correction
Layer 3 Protocol Values and Names
- 1 is Internet Control Message Protocol (ICMP)
- 2 is Internet Group Management Protocol (IGMP)
- 6 is Transmission Control Protocol (TCP)
- 17 is User Datagram Protocol (UDP)
- 50 is Encapsulating Security Payload (ESP)
- 51 is Authentication Header (AH)
IP
- TOS (Type of Services) has been deprecated after the publication of RFC2474.
- DSCP stands for Differentiated Services Code Point.
- ECN is Explicit Congestion Notification
- Identifier: A unique value per source/destination address and datagram protocol
- DF (Don't Fragment): This flag indicates no fragmentation of the packet should occur
- MF (More Fragments): This flag indicates there are more fragments
- TTL: Time to live
IP | Explicit Congestion Notification
- Commonly, TCP/IP networks signal congestion by dropping packets.
- With successful ECN negotiation, an ECN-aware router can mark the IP header instead of dropping the packet to signal impending congestion.
- The receiver echoes the congestion indication to the sender, which reduces its transmission rate as if it detected a dropped packet.
IP Options
- IP options allow specialized handling by routers for datagrams or packets.
- Traceroute, Router Alert, and Record Route are a few examples of IP options.
UDP
- UDP is a transport protocol for sending messages.
- UDP has a small header size.
- Speed is fast but unreliable
- UDP header contains:
- Source Port (16 bits)
- Destination Port (16 bits)
- Message Length
- Checksum
- Data
TCP
- TCP is a connection-oriented and reliable transport protocol.
- The Acknowledgment field makes it a reliable transmission protocol.
- Port address: Addresses applications/services.
- Sequence Number: Used for reordering received datagrams.
- Header Length and Data Offset are specified.
- Code Bits (Flags): Provide control information
- Window: Sender's receive window specifies buffer space for incoming data which indicates how much data can be sent before requiring an acknowledgment in return.
TCP Flags
- URG: Urgent data (rarely used)
- ACK: Acknowledge received data
- PSH: Push/send data immediately
- RST: Aborts a connection in response to an error
- SYN: Initiates a connection
- FIN: Closes a connection
- New flags added at Reserved are (10 or 01=ECN-Capable, 11 =Congestion Encountered)
- CWR: Congestion Window Reduced
- ECE: Explicit Congestion Notification Echo
TCP | Three-Way Handshake
- SYN: The client sends a synchronization packet to the server.
- SYN-ACK: The server acknowledges the client's synchronization request, and sends its own.
- ACK: The client completes the connection with the server and acknowledges the servers packet.
- ESTABLISHED: the connection is active
TCP Acknowledgment and Retransmission
- The sender sends a packet.
- The receiver receives the packet and sends an acknowledgement packet back to the sender.
- If the sender does not receive an acknowledgement packet they will resend the initial packet.
- Packet Loss, ACK loss, and ACK delayed scenarios covered
TCP | Efficient Transmission Method
- Sliding windows are used to control flow
Error and Control Messages in the IP
- Communication among routers and hosts is sometimes necessary, to report errors, handle abnormal conditions, and to update routing information.
- The Internet Protocol defines the Internet Control Message Protocol (ICMP) for these types of messages
TCP vs UDP
- TCP establishes a connection before sending data, guarantees delivery of data packets, checks for and requests retransmission of errors, reorders data, and provides flow control, making it reliable and suitable for applications demanding high reliability.
- UDP is connectionless, immediately sends data, does not guarantee delivery, discards segments/datagrams with errors, does not reorder data, and lacks flow control, making it fast but unreliable and suitable for applications that prioritize speed over reliability and when data is not critical
ICMP
- Encapsulated as the datagram data area within an IP packet
- Includes an ICMP header and ICMP data, encapsulated by an IP header and frame header.
ICMP Fields
- Type: Identifies the message type.
- Code: Identifies the subtype.
- Checksum for error checking
ICMP | Type (RFC6918)
- Reporting
- 3: Destination Unreachable
- 4: Source Quench (Deprecated)
- 6: Alternate Host Address (Deprecated)
- 11: Time Exceeded
- 12: Parameter Problem
- discovery
- 0: Echo Reply
- 5: Redirect
- 8: Echo Request
- 9: Router Advertisement
- 10: Router Solicitation
- 13: Timestamp
- 14: Timestamp Reply
ICMP Ping Echo Request and Reply Messages
- Type: Identifies the message type.
- Code: Identifies the subtype.
- Identifier and Sequence Number: The sender can use these to identify which reply belongs to which process and request.
- TYPE (8 or 0)
- CODE (0)
- CHECKSUM
- SEQUENCE NUMBER
- OPTIONAL DATA
Destination Unreachable Messages
- Sent when a router can't route the packet
- TYPE (3)
- CODE (0-12)
- CHECKSUM
- UNUSED (MUST BE ZERO)
- INTERNET HEADER + FIRST 64 BITS OF DATAGRAM
ICMP | Congestion and Datagram Flow Control
- Hosts can overwhelm a router with packets, causing their queue to reach its limit.
- When a router's queue is full (buffer overflow), any new received packets are dropped, and the sender is notified using a Source Quench ICMP message.
- Hosts can send Source Quench ICMP messages to other hosts sending datagrams faster than they can process.
- TYPE (4)
- CODE (0)
- CHECKSUM
- UNUSED (MUST BE ZERO)
- INTERNET HEADER + FIRST 64 BITS OF DATAGRAM
ICMP | Source Quench Messages
- Congested routers send one for every datagram they drop.
- Hosts that receive can slow datagram transmissions.
- TYPE (4)
- CODE (0)
- CHECKSUM
- UNUSED (MUST BE ZERO)
- INTERNET HEADER + FIRST 64 BITS OF DATAGRAM
ICMP | Time Exceeded
- Indicates that a datagram is dropped.
- Code 0: TTL reached 0
- Code 1: Fragment reassembly time exceeded
- TYPE (11)
- CODE (0 or 1)
- CHECKSUM
- UNUSED (MUST BE ZERO)
- INTERNET HEADER + FIRST 64 BITS OF DATAGRAM
Security Issues
- ICMP can be exploited
- Denial of service attack
- Scan networks for available hosts
ICMP | Ping Packet Overflow Attack (Ping of Death)
- A denial-of-service attack sends an improperly large ICMP echo request packet (a "ping") to cause the destination system to fail.
- The IP specification allows IP datagrams up to 65,535 octets to occur
- If an IP system can't process long IP packets correctly, the ping packet can overflow the input buffer and cause a fatal system error
- Packet Header (20 Bytes)
- ICMP Header (8 Bytes)
- ICMP Data (65,510 Bytes)
ICMP | Smurf Attack (ICMP Flood)
- It is a form of a distributed denial-of-service attack.
- Source address is a spoofed IP address
- Destination address is a broadcast address.
IPv6
- Traffic Class/Priority: Used for traffic management
- Flow Label: Used to label a flow to request special handling by routers.
- Enables efficient IPv6 flow classification with main header fields in fixed positions.
- Next Header replaces protocol and header length fields in IPv4 header.
- 40 octets Basic Header
ICMPv6
- ICMPv6 Type descriptions include:
- 1: Destination Unreachable
- 128: Echo Request
- 129: Echo Reply
- 133: Router Solicitation
- 134: Router Advertisement
- 135: Neighbor Solicitation
- 136: Neighbor Advertisement
- IPv6 header and next header = 58
ICMPv6 | Echo
- Type: Identifies the ICMPv6 message type (128 for Echo Request, 129 for Echo Reply).
- Code: Not used; set to 0.
- Checksum: 16-bit checksum field for the ICMP header.
- Identifier: An optional field to help in matching Echo Request and Echo Reply messages.
- Sequence Number: A number to help in matching Echo Request and Echo Reply messages.
- Optional Data: Additional data in the Echo Request is copied into the Echo Reply sent back to the source.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Questions cover ICMP messages, network attacks, IPv6, OSI model layers, and Ethernet protocols. Key concepts include packet dropping, Smurf attacks, traffic flow classification, and TCP protocol identification. The quiz tests understanding of data link layer functions and IP header fields.