Application of internet control message protocol, Computer Networking

The application for this assignment is somewhat arti?cial. Normally, an application would not interact directly with IP. Instead, it would create a UDP or TCP socket and interact with the transport layer and then the transport layer would interact with the IP layer. However, in this assignment we are ignoring the transport layer - it doesn't exist in our simulation even though you're ?lling in the protocol ?eld of the IP header with the number for UDP.

Write a single application program that runs at all 4 hosts. Design it so that at any given moment it is either in "transmit mode" or "receive mode," but not both simultaneously.

When in transmit mode, the application should gather the following information from the user then pass it down to the IP layer:

  • Destination IP address
  • "Don't fragment" bit
  • TTL (time to live)
  • Whether "record route" option should be enabled
  • A string

The string will be used as IP data.

An application in receive mode will await data coming up from IP. When IP receives a datagram, it pass up the following information, which the receiving application will display:

Source IP address

  • If "record route" option was enabled, the route the datagram traveled
  • The string in the IP data ?eld

It is possible that an application in transmit mode will receive an ICMP error message in response. To handle this case, have a transmit-mode application brie?y listen for input from IP before re-prompting the user. That is, the application in transmit mode should behave like this:

Await user input forever

  • Get user input and send to IP
  • Await input from IP (i.e., ICMP error message) for ?xed length of time
  • Either display ICMP message or timeout
  • Await user input forever, etc.

When an ICMP message is received, display its type, code, and "original IP datagram" ?elds.

Posted Date: 3/15/2013 1:06:14 AM | Location : United States







Related Discussions:- Application of internet control message protocol, Assignment Help, Ask Question on Application of internet control message protocol, Get Answer, Expert's Help, Application of internet control message protocol Discussions

Write discussion on Application of internet control message protocol
Your posts are moderated
Related Questions
Transparent Bridges & Learning Bridges - Builds table by examining destination as well as source address of each packet it receives - Learning bridges - If address is not

Q. What are the main categories based on which applications of computer network will be categorized? Ans: The main areas under which the applications for computer network will

Options The options  fields may be  used to  provide  other functions that are not  covered by  the header. If the length  of the  options  field is not  a multiple of 32 bits

Identify the purpose of the TCP three step handshakes Ans) The three step handshake establishes the parameters needed for a TCP connection. During the handshake process series n


Verify VLANs and trunking. Use the show ip interface trunk command on S1 and the show vlan command on S2 to determine that the switches are trunking correctly and the proper VL

ENCODING THE DATA TYPE: The figure explain a frame in which the data kind is specified by using the data area. To ensure interoperability format of encoding location m


Architecture of Cisco IOS software Cisco IOS might not  applications like ms word,multimedia softwares. It is mainly for switching data packet and concentrated on switching p

Define Encoder? A device or program that uses predefined algorithms to encode, or compress audio or video data for storage or transmission use. A circuit that is used to change