Internet control message protocol layer, Computer Networking

Assignment Help:

Simulate extremely limited forms of IP and ICMP.

You will simulate 6 computers, 4 hosts and 2 routers, that are connected in an imaginary network with the topology as shown below. Each machine runs one process to simulate its IP/ICMP layer and one process per link layer attachment. In addition, each host runs an application process. Therefore, there will be a total of 20 processes, 3 per host and 4 per router, as indicated by the light blue boxes:

In order to mimic real networking software, your modules must be separate processes (in order not to share state) and can talk to each other ONLY via the layer to-layer interfaces; e.g., you are forbidden from having a APP process talk directly to a link process. At routers, the IP/ICMP process interfaces with each of the three link processes, but the link processes do not interface with each other.

1378_Internet Control Message Protocol.png


Related Discussions:- Internet control message protocol layer

Subtract two from number of hosts, Why do we require to subtract two from n...

Why do we require to subtract two from number of hosts?

Discuss about the similarity of intranets to the internet, Discuss about th...

Discuss about the similarity of Intranets to the Internet The ease of use of the end user would be the most noticeable because of the similarity of Intranets to the Internet. S

What is bus topology, Q. What is Bus Topology?  Multipoint configurati...

Q. What is Bus Topology?  Multipoint configuration  One cable acts like a backbone to link all devices   Advantages: Effortlessness of installation and less cabling

Fault tree analysis, FAULT TREE ANALYSIS Reliability engineering, in a ...

FAULT TREE ANALYSIS Reliability engineering, in a nutshell is concerned with failures.   How failures occur, how often they occur, and how to minimize them are the basic proble

What are the security models by giving striking analogies, Security models ...

Security models by giving striking analogies to the real world A classical case study: (With due acknowledgements to the security exponent who proposed this theory.) He has c

Give the types of firewalls, Give the types of firewalls Conceptually,...

Give the types of firewalls Conceptually, there are two types of firewalls: 1.  Network Level 2.  Application Level Network Level Firewall/Packet Filters The Net

Wireless access - computer network, Wireless Access Wireless access co...

Wireless Access Wireless access connecting end  systems ( that are often  mobile) into the network. Today there are two broad types  of wireless internet access(1) wireless an

Three main functions at layer three of the osi model, Identify the 3 major ...

Identify the 3 major functions at layer 3 of the OSI model Ans) Layer three explains the path, forwards the packet and executes software / logical addressing.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd