Internet control message protocol layer, Computer Networking

Assignment Help:

Simulate extremely limited forms of IP and ICMP.

You will simulate 6 computers, 4 hosts and 2 routers, that are connected in an imaginary network with the topology as shown below. Each machine runs one process to simulate its IP/ICMP layer and one process per link layer attachment. In addition, each host runs an application process. Therefore, there will be a total of 20 processes, 3 per host and 4 per router, as indicated by the light blue boxes:

In order to mimic real networking software, your modules must be separate processes (in order not to share state) and can talk to each other ONLY via the layer to-layer interfaces; e.g., you are forbidden from having a APP process talk directly to a link process. At routers, the IP/ICMP process interfaces with each of the three link processes, but the link processes do not interface with each other.

1378_Internet Control Message Protocol.png


Related Discussions:- Internet control message protocol layer

Plot way forms for the modulation schemes, Plot way forms for the following...

Plot way forms for the following modulation schemes using Mathlab: a) 2 ASK   4 ASK                       b)  BFSK     4 FSK                             c) BPSK 4

Show the drawbacks of go-back-N, Q. Show the Drawbacks of Go-back-N? D...

Q. Show the Drawbacks of Go-back-N? Drawbacks of Go-back- N - Inefficient - Every out of order received packets are discarded (receiver side is simplified) - This

On which languages intranet works, On which languages Intranet works ...

On which languages Intranet works Language Support The Intranet works on the basis of scripts written in any of the following languages, viz., SGML, HTML, DHTML, XML, AS

Shared variable programme structures, Shared variable programme structures ...

Shared variable programme structures  In this section, we talk about some more concepts related to the shared programme. Concept of Lock Locks are used for protected a

Debug ip igrp transaction, To monitor IP igrp traffic, we can use "debug IP...

To monitor IP igrp traffic, we can use "debug IP igrp transaction" or "debug IP igrp events". How do we show information about IPX routing update packets? Ans) Bu using debug ip

Request to a server, If a client gives a 4096-byte request to a server loca...

If a client gives a 4096-byte request to a server located 50 km away on a 1 Gbps fiber optic, then what is the efficiency of the line during this time? Suppose that the server give

Explain about bridges, Bridges The bridge function is to attach separat...

Bridges The bridge function is to attach separate homogeneous networks. Bridges map the Ethernet address of the nodes residing on each network segment and allow only essential

What is explicit congestion signalling, What is Explicit congestion signall...

What is Explicit congestion signalling In general way, for explicit congestion avoidance, the network alerts end systems to growing congestion within the network and the end sy

Explain typical network topologies, Question: a) Explain briefly three ...

Question: a) Explain briefly three typical network topologies giving one advantage and one disadvantage of each topology. Explain the three topologies with appropriate diagrams

How does a firewall protect, How Does a Firewall Protect Firewalls work...

How Does a Firewall Protect Firewalls work by controlling the information that comes in and out of the network. By using the Application Proxy service, the flow of information

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd