Application of internet control message protocol, Computer Networking

Assignment Help:

The application for this assignment is somewhat arti?cial. Normally, an application would not interact directly with IP. Instead, it would create a UDP or TCP socket and interact with the transport layer and then the transport layer would interact with the IP layer. However, in this assignment we are ignoring the transport layer - it doesn't exist in our simulation even though you're ?lling in the protocol ?eld of the IP header with the number for UDP.

Write a single application program that runs at all 4 hosts. Design it so that at any given moment it is either in "transmit mode" or "receive mode," but not both simultaneously.

When in transmit mode, the application should gather the following information from the user then pass it down to the IP layer:

  • Destination IP address
  • "Don't fragment" bit
  • TTL (time to live)
  • Whether "record route" option should be enabled
  • A string

The string will be used as IP data.

An application in receive mode will await data coming up from IP. When IP receives a datagram, it pass up the following information, which the receiving application will display:

Source IP address

  • If "record route" option was enabled, the route the datagram traveled
  • The string in the IP data ?eld

It is possible that an application in transmit mode will receive an ICMP error message in response. To handle this case, have a transmit-mode application brie?y listen for input from IP before re-prompting the user. That is, the application in transmit mode should behave like this:

Await user input forever

  • Get user input and send to IP
  • Await input from IP (i.e., ICMP error message) for ?xed length of time
  • Either display ICMP message or timeout
  • Await user input forever, etc.

When an ICMP message is received, display its type, code, and "original IP datagram" ?elds.


Related Discussions:- Application of internet control message protocol

What is frequency borrowing, What is Frequency borrowing In the simples...

What is Frequency borrowing In the simplest case, frequencies are taken from adjacent cells by congested cells. The frequencies can also be assigned to cells dynamically.

Explain classification of computer network by range, Question 1 Explain cl...

Question 1 Explain classification of computer Network by range Question 2 Explain three major problems of Transmission lines Question 3 What is the maximum data rate of

Two types of transmission technology , What are the two types of Transmissi...

What are the two types of Transmission Technology available in ccna? Ans) Point - to - Point and Broadcast are the Two types of Transmission Technology available in CCNA

Calculate the efficiency of stop and wait arq, (i)  Suppose that frames are...

(i)  Suppose that frames are 1250 bytes long including 25 bytes of overhead. Also assume that ACK frames are 25 bytes long. a)  Calculate the efficiency of stop-and-wait ARQ in

Program to load the router with the supplied scripts-ccna, Load the Router ...

Load the Router with the Supplied Scripts Enable ! config term ! hostname Router1 ! enable secret class ! no ip domain-lookup !  interface FastEth

Name the twisted pairs cables, Name the Twisted pairs cables Twisted pa...

Name the Twisted pairs cables Twisted pairs cables (Shielded and Unshielded), Coaxial cable and Fiber optic cable. ?Testing of the points ?Testing of the entire network t

Illustrate the model for network security, Q. Illustrate the Model for Netw...

Q. Illustrate the Model for Network Security? - A message is transferred from one party (Principal) to another. - A logical information channel is founded between the t

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd