Icmp process, Computer Networking

Assignment Help:

Some of the ?elds of IP and ICMP datagrams will be ?xed, some will be settable by the application, and others will computed according to the situation. You must set all ?elds of the IP header correctly. Two ?elds have ?xed and known values: the version is 4, and all service type bits are always 0. The header's protocol ?eld will be set to 1 for ICMP datagrams and 17 for ordinary data-carrying datagrams.

(Seventeen denotes UDP-we'll pretend that there is a real UDP application above IP). Datagram IDs should start at 1 and go up with each new datagram sent. Implement only the "record route" option. Details of this option are discussed below.

Use the following IP addresses:

  • A = 192.168.0.2
  • B = 192.168.0.3
  • R1 interface to A and B = 192.168.0.1
  • C = 10.0.0.2
  • D = 10.0.0.3
  • R2 interface to C and D = 10.0.0.1
  • R1 interface to R2 = 172.16.20.49
  • R2 interface to R1 = 172.16.20.50

Remember that IP datagrams forwarded by a router retain their original IP source address; the router does not substitute its own address in the source ?eld.

A few ICMP messages must be implemented. If a router decrements a TTL ?eld down to 0, it should send an ICMP "time exceeded" message to the originating host and discard the datagram. Routers should also generate ICMP "destination unreachable" messages for three reasons:
1. "Destination network unknown" (i.e., the router has no route to the destination network).

2. "Destination host unknown" (i.e., the destination network is OK but the host part of the IP address is bogus).

3. "Fragmentation needed and don't-fragment bit set." Set the ICMP type and code values correctly. Routers must maintain a very small routing table. 2 R1 should have routes to 192.168.0.2, 192.168.0.3, and the network 10. If it receives a datagram whose destination network is anything but 10 or 192.168, it should send a "destination unreachable-destination network unknown" ICMP message to the source IP address then drop the datagram. R1 should route any datagram destined to network 10 to R2. It should route datagrams destined to 192.168.0.2 and 192.168.0.3 to A and B, respectively. Any datagram addressed to network 192.168 but not to hosts 0.2 or 0.3 should result in a "destination unreachable-destination host unknown" ICMP message. R2 should behave similarly. Your code must set all remaining IP ?elds according to conditions. In particular, routers must decrement the TTL, discard the datagram if TTL reaches zero, and re-compute the checksum otherwise. You must implement fragmentation at the routers and reassembly at the hosts.


Related Discussions:- Icmp process

Framing techniques of datalink layer, java program to implement framing tec...

java program to implement framing techniques of datalink layer

Routers - network layer and routing , Routers The network  layer (also ...

Routers The network  layer (also  called layer3) manages device  addressing  tracks the location  of devices on the network  and determines  the best  way to  move data. Which

What are the advantages and disadvantages of routing table, What are the ad...

What are the advantages and disadvantages of the three types of routing tables? The three types of routing tables are fixed, dynamic, and fixed central. The fixed table must be

Explain how contract net works, Question 1 Contract Net Protocol is the...

Question 1 Contract Net Protocol is the best known and most widely used cooperation protocol Explain how contract net works Discuss the benefits and limitations of con

Basic working of spanning tree, Q. Basic working of Spanning Tree? Spa...

Q. Basic working of Spanning Tree? Spanning Tree - Redundant bridges may be installed to provide reliability - To prevent infinite looping of packets between bridges,

Original classes of ip addresses, The original IP address procedure divides...

The original IP address procedure divides host addresses into three base classes. The class of an address calculates the boundary between the network suffix and prefix. The origina

User server interaction - application layer , User Server Interaction ...

User Server Interaction Cookies of the world  wide  web  was originally designed  as a stateess entity. A client  sends a request and the server responds. Their  relationship

What do you understand by service access point, Q. How two adjacent layers ...

Q. How two adjacent layers communicate in a layered network or what do you understand by Service Access Point? Ans: In layered network, each layer has several entities and enti

Determine about the address translation, Determine about the Address Transl...

Determine about the Address Translation When a Web site address or URL is typed in the Web browser, as www.bbc.com and not as a series of numbers, it is essential for the serv

Define post office and lightweight directory access protocol, Post Office P...

Post Office Protocol and Lightweight Directory Access Protocol POP: Post Office Protocol is a used by mail clients to download messages from a mail server on the Internet. L

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd