Application of internet control message protocol, Computer Networking

The application for this assignment is somewhat arti?cial. Normally, an application would not interact directly with IP. Instead, it would create a UDP or TCP socket and interact with the transport layer and then the transport layer would interact with the IP layer. However, in this assignment we are ignoring the transport layer - it doesn't exist in our simulation even though you're ?lling in the protocol ?eld of the IP header with the number for UDP.

Write a single application program that runs at all 4 hosts. Design it so that at any given moment it is either in "transmit mode" or "receive mode," but not both simultaneously.

When in transmit mode, the application should gather the following information from the user then pass it down to the IP layer:

  • Destination IP address
  • "Don't fragment" bit
  • TTL (time to live)
  • Whether "record route" option should be enabled
  • A string

The string will be used as IP data.

An application in receive mode will await data coming up from IP. When IP receives a datagram, it pass up the following information, which the receiving application will display:

Source IP address

  • If "record route" option was enabled, the route the datagram traveled
  • The string in the IP data ?eld

It is possible that an application in transmit mode will receive an ICMP error message in response. To handle this case, have a transmit-mode application brie?y listen for input from IP before re-prompting the user. That is, the application in transmit mode should behave like this:

Await user input forever

  • Get user input and send to IP
  • Await input from IP (i.e., ICMP error message) for ?xed length of time
  • Either display ICMP message or timeout
  • Await user input forever, etc.

When an ICMP message is received, display its type, code, and "original IP datagram" ?elds.

Posted Date: 3/15/2013 1:06:14 AM | Location : United States

Related Discussions:- Application of internet control message protocol, Assignment Help, Ask Question on Application of internet control message protocol, Get Answer, Expert's Help, Application of internet control message protocol Discussions

Write discussion on Application of internet control message protocol
Your posts are moderated
Related Questions
What is Medium Access Control of Ethernet? The set of rules which make sure that each node in an Ethernet gets a fair amount of frame transmission opportunity, are known as the

Configure Spanning Tree Step 1: Examine the default configuration of 802.1D STP. On each switch, display the spanning tree table with the show spanning-tree command. R

QUESTION 1 (a) Draw a use-case model for the above system. You must identify all possible actors and use-cases. (b) Assume you are using the Rational Unified Process a

the equation x3-6x+9x-5=0

Recognize the access-list range for an extended IP access-list? Ans) IP extended access-lists use the number range of 100-199.

QUESTION a) How is an Intranet different from an Internet? b) State the main differences between a router and a switch c) Explain the function of a modem d) Calculate

Example Programmes for Parallel Systems Now we shall complete this with the examples on shared memory programming. Example 13: Adding elements of an array using two proce

Q. Describe about Cryptography? - Some media cannot be protected from unauthorized reception (or interception) - Encryption involves transforming the original information in

State about transcontinental ?ber A transcontinental ?ber link may have many gigabits/sec of the bandwidth, but latency will also be high due to speed of light propagation abov

a) Consider that a host is sending a frame of 1200 bytes to another host found 20 Kilometers away. (Assume that switching delay is negligible) i) Calculate the total latency (