Design own message format and provide ids

Assignment Help Computer Networking
Reference no: EM1369892

Design an application that sends three UDP packets to each router from source to destination and calculate the RTT for each and provide average RTT as well with names etc. When the application comes up it starts all the routers, sources and destinations. Each has to know their role and the path to be taken if receive a packet. Only the directly related routers know about the hosts. They have to send messages to others to inform about that. System will take some time to stabilize so all routers know what is the path to take if they have to send the packets from any source to any destination in the network. There are two types of messages to be sent, one routing updates and second actual traceroute packets. The traceroute packets have TTL incrementing from 1, routers only reply to the packet if it receives one with TTL of 1, otherwise it just decrements the value and forwards to packet. We need to see some message from the routers when they forward or reply the packet. Sender sends multiple packets with increasing TTL until it receives reply from the destination. Routers have to send reply as well as forward packet when they receive traceroute messages so database at each router needs to keep all forwarding as well as reverse addresses. You have to design your own message format and give IDs in any way you want. At minimum the message must have source address, destination address, TTL and address of the sending node etc.

Reference no: EM1369892

Questions Cloud

Solving the numerical on concepts of costs : Given the quantity and total fixed and variable costs, compute the remaining costs the complete the following table.
Determine the equilibrium price and equilibrium quantity : If my comapny operates in a competitive market and competes with many other domestic and foreign firms.
Examine values with and without leverage : Examine values with and without leverage - Risk of financial distress may cause it to lose some customers and receive less favorable terms from its suppliers.
Question about quantity demand : The question asked was assume that the government imposes a price ceiling on toasters. In particular, suppose that it decrees that a toaster cannot sell for more than $14.
Design own message format and provide ids : You have to create your own message format and provide IDs in any way you want. At minimum message should have source address, destination address, TTL and address of sending node etc.
Externalities-positive and negative : What is the definition of externality? Distinction between positive externalities (positive spillover costs) and negative externalities (negative spillover costs)? Why do externalities exist?
Effective management of a decision implementation plan : Describe the considerations you believe are important in implementing decisions in global organizations
Determining cost function of firm : Find out the range of outputs for which cost function C(q) = f +cq^2 where c>0 is characterized by
Estimate the equilibrium value of gdp : Suppose that no taxes are imposed, Estimate the equilibrium value of GDP if government expenditures are $50 billion and inteneded investment is $50 billion?

Reviews

Write a Review

Computer Networking Questions & Answers

  Encapsulate ftp datagram into tcp datagram

Segmentation of a file and forming FTP datagrams: Read first 'x' number of bytes and use them as part of payload section of an FTP datagram. Encapsulate the FTP datagram into TCP datagram (generation of TCP packets)

  Type of network provides limited access to corporate data

Which type of network provides customers with limited access to corporate data such as inventory, parts lists, and orders?

  Criteria a company chooses for use edi and an extranet

When a company opens a private market space, it may use EDI, an extranet, EDI/Internet, various web services, XML or just the Internet with regular encryption.

  Describe different common types of server applications

Make a list describing different common types of server applications. Show which of these applications you would combine together on a single server.

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Explain sliding window error control system

In a sliding window error control system in which each byte is numbered, Station A sends a packet with bytes numbered 801 to 900. If the packet arrives with no errors, how does Station B respond?

  Determining the size of data in frame

How many fram need to sent? Determine the size of data in each frame?

  Benefits of authentication scheme

An example of when a failure may occur is if the clinet's MAC address is explicitly excluded in the AP/router configuration. What are the benefits of this authentication scheme?

  Receiving uart transfering incoming character to buffer

How long [in micro-seconds (µs)] does receiving UART have to transfer an incoming character to buffer or to the main computer before next character arrives?

  Determine the value of frame transmission time

Determine the value of the frame transmission time, i.e., time it takes to transmit frame from when device starts sending first bit of frame until it finishes sending last bit?

  Key pieces of basic architecture of the internet

Research to see how the Internet is put together. What are some key pieces of the basic architecture of the Internet?

  Implementing filter in the firewall

Consider yourself as the network security technician. Your internetwork connects six buildings through fiber links. You have experienced the numerous attacks on your corporate Web server.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd