Application of internet control message protocol, Computer Networking

Assignment Help:

The application for this assignment is somewhat arti?cial. Normally, an application would not interact directly with IP. Instead, it would create a UDP or TCP socket and interact with the transport layer and then the transport layer would interact with the IP layer. However, in this assignment we are ignoring the transport layer - it doesn't exist in our simulation even though you're ?lling in the protocol ?eld of the IP header with the number for UDP.

Write a single application program that runs at all 4 hosts. Design it so that at any given moment it is either in "transmit mode" or "receive mode," but not both simultaneously.

When in transmit mode, the application should gather the following information from the user then pass it down to the IP layer:

  • Destination IP address
  • "Don't fragment" bit
  • TTL (time to live)
  • Whether "record route" option should be enabled
  • A string

The string will be used as IP data.

An application in receive mode will await data coming up from IP. When IP receives a datagram, it pass up the following information, which the receiving application will display:

Source IP address

  • If "record route" option was enabled, the route the datagram traveled
  • The string in the IP data ?eld

It is possible that an application in transmit mode will receive an ICMP error message in response. To handle this case, have a transmit-mode application brie?y listen for input from IP before re-prompting the user. That is, the application in transmit mode should behave like this:

Await user input forever

  • Get user input and send to IP
  • Await input from IP (i.e., ICMP error message) for ?xed length of time
  • Either display ICMP message or timeout
  • Await user input forever, etc.

When an ICMP message is received, display its type, code, and "original IP datagram" ?elds.


Related Discussions:- Application of internet control message protocol

What are the trends in network security, Q. What are the trends in Network ...

Q. What are the trends in Network Security ? Trends in Network Security Improved vigilance for virus infections Continual maturation of firewall technologies

Time out - transport layer, Time out The  protocols  name Go Back  N i...

Time out The  protocols  name Go Back  N is  derived  from the  sender behaviour in the  presence  of lost or  overly  delayed packets. A timer will again  be used  to recover

Difference between interior and exterior neighbour gateways, What is the di...

What is the difference between interior and exterior neighbor gateways? Interior gateways connect LANs of one organization, while exterior gateways connect the organization to

System - network administrator, The program must be well documented which i...

The program must be well documented which includes meaningful variable and subroutine names ("self documenting code") along with comments in the code. The following block of code w

Multicasting, MULTICASTING : The answer to above problem is multicastin...

MULTICASTING : The answer to above problem is multicasting. It is the normal form of broadcasting. It acts like broadcasting however it does not broadcast frames automatically

What is network architecture, What is Network Architecture? When two o...

What is Network Architecture? When two or more computer are linked with one another for the purpose of communicating data electronically, besides physical connection of comput

Comparison of connection-oriented and connectionless, CONNECTION-ORIENTED: ...

CONNECTION-ORIENTED: Accounting is simpler. Application can learn of network causes immediately. CONNECTIONLESS: It has fewer load. It is easier to cre

Which steps are used at receiver end by check sum, Q. Which steps are used ...

Q. Which steps are used at receiver end by check sum? The receiver follows these steps: The unit is divided into "k" sections each of "n" bits All sections are

Connection-oriented service, The connection-oriented service process for ne...

The connection-oriented service process for networking is same to the manner in which telephones are used. This is shown as follows: A caller dials a number of the receiver. The

Domains and sub domains, Hosts are generally, individual machines at a spec...

Hosts are generally, individual machines at a specific location. Normally Resources of host machine are shared and can be used by any user on Internet. Hosts & local networks are g

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd