How ip packet is created from icmp packet at pc-a

Assignment Help Computer Engineering
Reference no: EM132218870

Computer Networks

Question-1:

1) Your company has recently been expanded and currently 40 users of your company need simultaneous access to the internet. However company has only one public IP address. The network diagram of the company is presented below.

Consider an example situations when three computers in switch-1 are communicating with remote server at the same time using one public IP

Assume PC-1 under switch-1 is using TCP port (1020) for this example. The public IP is assigned to the border router's (NAT router) serial interface. Explain (for PC-1) how
packet is sent to and received from the destination remote server by PC-1 through the steps:

1. source and destination addressesin outgoing packetsfrom PC-1;

2. how router keeps track of incoming packet from remote server and forwards to correct sources with private IP inside the company host by using router's entries.

Question-2:

In the following network diagram, you want to test the connectivity from PC-A to PC-B which are connected through a router in the middle. As part of this you pinged PC-B's IP address from PC-A. Eventually this causes ICMP at PC-A to create an ICMP echo request packet which is to be delivered to PC-B. List and briefly describe the detail of IP routing and frame forwarding of the processes that deliver the above ICMP echo request packet to PC-B at the ICMP protocol of PC-B.

Address the following points in your explanation:

1) How IP packet is created from ICMP packet at PC-A, i.e., describe the encapsulation of the ICMP payload into an IP packet (indicating values of relevant IP header fields).

2) How IP at PC-A determines whether PC-B is a local or remote destination including any calculations performed.

3) Once the location is determined in (2), a destination MAC address is required to prepare a frame. If PC-B is in remote, which device's MAC address will be used for encapsulation of IP packet into a frame; mention the IP of that devices? Explain why this device.

4) Once the frame is prepared and given to the physical layer of PC-A, list and briefly describe the remaining steps to deliver the frame to next device's IP protocol, including decapsulation, routing decisions, and encapsulation, until the ICMP payload can be processed at PC-B.

Question-3:

In the following network diagram two routers are connected through a WAN link. The IP addresses are mentioned for different interfaces of routers and hosts. You have studied different types of dynamic routing in the lecture and practical classes. You are required to configure the routers in the diagram below using dynamic routing protocols.

1. Identify two dynamic routing protocols that will work for the routers below.

2. Also mention a dynamic routing protocol that will not work.

3. Explain your answer for 1 and 2, why (1) will work and (2) will not work.

4. What will be the network addresses when you configure the dynamic routing in the routers?

5. Compare the routing protocols in the above with respect to their convergence properties.

Question-4:

Two processes at the application layers of sender and receiver are communicating each other. Transport layers of both ends are using a stop-and-wait protocol for flow and error control for this communication. An example flow diagram of data and acknowledgement exchange between the nodes has been presented in the following.

Create a flow diagram of data and acknowledgement exchange using stop-and-wait protocol similar to the above diagram where sender sends three packets. The first two packets arrived in time and acknowledgement also received. However third packet was delayed and resent. The duplicate third packet was received after the acknowledgement of original one.

a) Show all the exchange of data and acknowledgement for above three packets in your diagram.

b) Show all timer activities (starts and so on) at the sender side with clear indication of sending and receiving time (receiving side).

c) Show all data acknowledgment, sender and receiver sliding windows and with appropriate sequence numbers in the windows for both sides and next packet indicator.

d) Explain the fact how the duplicate third packet and acknowledgements were exchanged.

Attachment:- Problem-solving-report.rar

Reference no: EM132218870

Questions Cloud

How you explored the command on your linux system : BN206: A valid screenshot with appropriate figure number and caption showing how you explored the command on your Linux system.
How the new benefits will impact their net pay : Your organization, located in Manitoba, will be enhancing the group benefits plan offered to employees in two months by adding accidental death.
Record the purchase of the trucks : On 1 January 2017, Nicolaidis Ltd purchased two identical new machines at a total cost of $700000 plus GST. It was estimated that the machines would have.
What are yost amount of income or gain recognized : What are Yost's amount of income/gain recognized and amount of taxes payable on the grant date, exercise date, and sale date
How ip packet is created from icmp packet at pc-a : SIT202 : Identify two dynamic routing protocols that will work for the routers below. Also mention a dynamic routing protocol that will not work.
How to implement a virtual infrastructure : ITC314 : Consider how to implement a virtual infrastructure for the company and prepare a report for the board of ACL Realty.
How your current employer can change strategies : Detail how your current employer can change strategies within the organization to promote your internal motivation and innovation.
Compare harvard architecture and von neumann architecture : Compare harvard architecture and Von Neumann architecture and also what is both architectureCompare harvard and von neumann architecture and process.
What are two risk factors for intimate partner violence : What are two risk factors for intimate partner violence? What are three community approaches to the prevention of unintentional injuries?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write a program that will work as a point of sale system

Write a python program that will Work as a point of sale system at a rodeo snack bar.

  What is the most popular kind of database today

What is the most popular kind of database today? Provide three examples of products that are based on this technology.

  How companies use information systems

For this week's discussion, select one of the three areas (listed below) and discuss how companies can use information systems and the data within them).

  Program to implement the calculations

Write down a program which has a function named presentValue which carry out this calculation. The function must accept future value, annual interest rate, and number of the years as arguments.

  Analyzing the major employment level in detail

Topic: Analyzing the major employment level as a strategy to enhance student career. Purpose: Finding the major employement level in categories to suggest.

  Create a url object and write the file name

Create a URL object and write the file name, path name, port number, and protocol name for that URL.

  What are some potential problems you might encounter

What are some potential problems you might encounter when attempting to install a non-Microsoft operating system into a Hyper-V virtual machine?

  Write a program that inputs a telephone number

Write a program that inputs a telephone number as a string in the form (555) 555-5555.

  What is the speedup if one-third of the 15 seconds

Look at how speedup behaves when we incorporate faster floating point hardware.

  What circumstances would cause you to do those things

Why would you worry about doing any privilege escalation or leaving backdoors? What circumstances would cause you to do either of those things?

  What are base cases for recursive binary search algorithm

In printing the components of an array recursively, what is the base case? What are the base cases for the recursive binary search algorithm?

  Describe how you deploy to protect a small business network

Pick three and describe how you deploy them to protect a small business network. Describe the protection each technology provides?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd