Internet control message protocol layer, Computer Networking

Assignment Help:

Simulate extremely limited forms of IP and ICMP.

You will simulate 6 computers, 4 hosts and 2 routers, that are connected in an imaginary network with the topology as shown below. Each machine runs one process to simulate its IP/ICMP layer and one process per link layer attachment. In addition, each host runs an application process. Therefore, there will be a total of 20 processes, 3 per host and 4 per router, as indicated by the light blue boxes:

In order to mimic real networking software, your modules must be separate processes (in order not to share state) and can talk to each other ONLY via the layer to-layer interfaces; e.g., you are forbidden from having a APP process talk directly to a link process. At routers, the IP/ICMP process interfaces with each of the three link processes, but the link processes do not interface with each other.

1378_Internet Control Message Protocol.png


Related Discussions:- Internet control message protocol layer

What rate rtcp will limit, Consider an RTP session consisting of five users...

Consider an RTP session consisting of five users, all of which are sending and receiving RTP packets into the same multicast address. Each user sends video at 200kbps. a)  What

Determine the concept of placing antenna on hieght, Determine the concept o...

Determine the concept of placing antenna on hieght First, starting deployment simply placed cells in regions where there was high density of vehicle or human population. Once t

Define about the term - hackers, Define about the term - hackers Every ...

Define about the term - hackers Every time technology updates itself, new techniques evolve. At the same time thieves or intruders (in the information technology line, they are

LAN, what is man LAN wan

what is man LAN wan

FTP, study on FTP

study on FTP

Explain the term standard error, Question: a) What is a Linux shell? ...

Question: a) What is a Linux shell? b) Prepare the commands for the following tasks: i) Change the working directory ii) Show the working directory iii) Execute a pro

Determine the objectives of computer security, Determine the Objectives of ...

Determine the Objectives of computer security Though computerisation helps a lot in proper organisation of experience, it also opens a Pandora's Box simultaneously. On one

Advantages of fiber optics, Q. Advantages of Fiber Optics? - Higher ban...

Q. Advantages of Fiber Optics? - Higher bandwidth in comparison to twisted-pair and coaxial cable is not limited by medium but by equipment used to generate and receive signals

Data alignment in processor arrangements, Data Alignment Arrays are ali...

Data Alignment Arrays are aligned to templates by the ALIGN directive. The ALIGN directive is used to align elements of different arrays with each other, indicating that they s

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd