Internet control message protocol layer, Computer Networking

Simulate extremely limited forms of IP and ICMP.

You will simulate 6 computers, 4 hosts and 2 routers, that are connected in an imaginary network with the topology as shown below. Each machine runs one process to simulate its IP/ICMP layer and one process per link layer attachment. In addition, each host runs an application process. Therefore, there will be a total of 20 processes, 3 per host and 4 per router, as indicated by the light blue boxes:

In order to mimic real networking software, your modules must be separate processes (in order not to share state) and can talk to each other ONLY via the layer to-layer interfaces; e.g., you are forbidden from having a APP process talk directly to a link process. At routers, the IP/ICMP process interfaces with each of the three link processes, but the link processes do not interface with each other.

1378_Internet Control Message Protocol.png

Posted Date: 3/15/2013 12:56:19 AM | Location : United States







Related Discussions:- Internet control message protocol layer, Assignment Help, Ask Question on Internet control message protocol layer, Get Answer, Expert's Help, Internet control message protocol layer Discussions

Write discussion on Internet control message protocol layer
Your posts are moderated
Related Questions

In link-state routing network topology is filled from route calculation. Switches send link-state information about local joins. Every switch creates own routing tables. It needs

Disadvantage of VPNs The disadvantages of VPN  are related to implementation troubleshooting  trust and  internet  availability. a.Implementation  can be time consuming: Im

What are Triggers and Rules? Triggers are special user defined actions generally in the form of stored processes that are automatically invoked by the server based on data rel

Data Alignment Arrays are aligned to templates by the ALIGN directive. The ALIGN directive is used to align elements of different arrays with each other, indicating that they s

Normal 0 false false false EN-IN X-NONE X-NONE

Question 1 Explain FDM and TDM with example Question 2 Define B-ISDN and explain its services Question 3 What is symmetric key cryptography? Describe one symmetric

Client  Server Architecture There is an  always  on host  called  server  which  provides  service requests to many other hosts  called  clients. In other words  client progra

QUESTION Write a report to explain the concept of LAN and WAN including the various components of the telecommunication infrastructure required by UTM Ltd. You are required to

In FLSM subnet mask of all subnets will b same. But in FLSM it changes.