Application of internet control message protocol, Computer Networking

Assignment Help:

The application for this assignment is somewhat arti?cial. Normally, an application would not interact directly with IP. Instead, it would create a UDP or TCP socket and interact with the transport layer and then the transport layer would interact with the IP layer. However, in this assignment we are ignoring the transport layer - it doesn't exist in our simulation even though you're ?lling in the protocol ?eld of the IP header with the number for UDP.

Write a single application program that runs at all 4 hosts. Design it so that at any given moment it is either in "transmit mode" or "receive mode," but not both simultaneously.

When in transmit mode, the application should gather the following information from the user then pass it down to the IP layer:

  • Destination IP address
  • "Don't fragment" bit
  • TTL (time to live)
  • Whether "record route" option should be enabled
  • A string

The string will be used as IP data.

An application in receive mode will await data coming up from IP. When IP receives a datagram, it pass up the following information, which the receiving application will display:

Source IP address

  • If "record route" option was enabled, the route the datagram traveled
  • The string in the IP data ?eld

It is possible that an application in transmit mode will receive an ICMP error message in response. To handle this case, have a transmit-mode application brie?y listen for input from IP before re-prompting the user. That is, the application in transmit mode should behave like this:

Await user input forever

  • Get user input and send to IP
  • Await input from IP (i.e., ICMP error message) for ?xed length of time
  • Either display ICMP message or timeout
  • Await user input forever, etc.

When an ICMP message is received, display its type, code, and "original IP datagram" ?elds.


Related Discussions:- Application of internet control message protocol

Point-to-point message passing, In point-to-point message passing, single p...

In point-to-point message passing, single process sends/receives message to/from another process. There are four communication modes for sending a message: i)    Buffered mode

Control flow in distributed enrollment protocol , Control Flow: Once the c...

Control Flow: Once the client has established a network connection with a server, the server must instantiate a new, empty, BasicEnrollmentManager implementation for this client,

Bandwidth and functionality, The performance of interconnection networks is...

The performance of interconnection networks is calculated on the given parameters. Bandwidth:  It is a calculated of maximum transmit rate among two nodes.   It is calculated i

Explain concept of permutation network, Concept Of Permutation Network ...

Concept Of Permutation Network In permutation interconnection networks the information transfer necessitates data transfer from input set of nodes to output set of nodes and po

Ip address, how can u identify the ip class of given ip address

how can u identify the ip class of given ip address

Describe briefly how the news filtering agent works, QUESTION (a) Conce...

QUESTION (a) Concerning agents that reduce workload, there are four agents developed using a learning approach among which is the News Filtering Agent. Name the other three age

Show the model for network access security, Q. Show the Model for Network A...

Q. Show the Model for Network Access Security? Model for Network Access Security (1) Gatekeeper functions comprise Password-based login authentications. (2)

Synchronization in factor causing , Synchronization Multiple processors...

Synchronization Multiple processors need synchronization with each other while implementing a parallel algorithm. That is, the task running on processor X might have to wait fo

Illustrate the advantages of VLANs, Q. Illustrate the Advantages of VLANs? ...

Q. Illustrate the Advantages of VLANs? - Cost and time reduction in moving stations from one group to another - Creation of virtual workgroups - Security Position of

Mail message format - application layer, Mail Message  Format When an...

Mail Message  Format When an e mail  is sent from one person  to another  a header containing peripheral information precedes  the body  of the message itself. This contained

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd