We are here with you hands in hands to facilitate your learning & don't appreciate the idea of copying or replicating solutions. Read More>>
Study Groups By Subject code Wise (Click Below on your university link & Join Your Subject Group)
Looking For Something at vustudents.ning.com?Search Here
Q1. If the application selects a datagram size greater than MTU along the path to the destination. How to handle this situation? Illustrate your answer with your own words.
Q2: How can ICMP be used for automated tool and Path discovery? Illustrate your answer with your own words.
Share This With Friends......
kisi ko iss ki ha samajh................pls
Na samjh any wali kon c bat hy is men.. :P Question tu always samjh ajata hy Solution men tension ho jati hy...lolxxxx
1st Q to ker lia mene..2nd Half kia hy..koi or b karoo..idea ho kinna theek kia hy mene :D
the second question is so simple
you just put a command in your command prompt
c:/> tracert www.vu.edu.pk
Tracing route to www.l.google.com [188.8.131.52]
over a maximum of 30 hops:
1 25 ms 29 ms 30 ms 184.108.40.206
2 17 ms 30 ms 28 ms 220.127.116.11
3 3 ms 3 ms 2 ms s11-0-4-0.rwp44d2.pie.net.pk [18.104.22.168]
4 5 ms 12 ms 8 ms rwp44.pie.net.pk [22.214.171.124]
5 27 ms 28 ms 26 ms rwp44.pie.net.pk [126.96.36.199]
6 28 ms 30 ms 28 ms static-khi-ni01-swb.pie.net.pk [188.8.131.52]
7 138 ms 137 ms * 184.108.40.206
8 137 ms 191 ms 139 ms 220.127.116.11
9 138 ms 138 ms 137 ms 18.104.22.168
10 148 ms 187 ms 172 ms 22.214.171.124
11 226 ms 238 ms 223 ms 126.96.36.199
12 242 ms 242 ms 240 ms 188.8.131.52
13 241 ms 259 ms 241 ms 184.108.40.206
14 301 ms 304 ms 296 ms 220.127.116.11
15 290 ms 318 ms 321 ms 18.104.22.168
16 287 ms 286 ms 297 ms 22.214.171.124
17 286 ms 284 ms 295 ms 126.96.36.199
18 285 ms 292 ms 293 ms 188.8.131.52
19 317 ms 317 ms 317 ms 184.108.40.206
20 317 ms 316 ms 315 ms 220.127.116.11
21 321 ms 319 ms 319 ms maa03s05-in-f20.1e100.net [18.104.22.168]
you will get complete path from your computer to the destination . this command used in windows as a tracert and in linux it is usad as traceroot ..,
how many IP based devices are in the way from source to destination like routers ..
this is ICMP echo used to trace the complete path from source to destination
CS610 Assignment No 4 Solution Fall 2011
See the attached file please
Q1. If the application selects a datagram size greater than
MTU along the path to the destination. How to handle this
situation? Illustrate your answer with your own words.
Every hardware technology specification includes the definition of the maximum size of
the frame data area, which is called the Maximum Transmission Unit (MTU). Any
datagram encapsulated in a hardware frame must be smaller than the MTU for that
One technique is to limit datagram size to smallest MTU of any network. IP uses
fragmentation i.e. datagrams can be split into pieces to fit in network with small MTU.
Router detects datagram larger than network MTU and then it splits into pieces and each
piece is smaller than outbound network MTU.
Each fragment is an independent datagram. It includes all header fields. Bit in header
indicates that the datagram is a fragment. Other fields have information for reconstructing
original datagram. Fragment offset gives original location of fragment.
Router has local MTU to computer size of each fragment. It puts part of data from
original datagram in each fragment and puts other information into header.
Q2: How can ICMP be used for automated tool and Path
discovery? Illustrate your answer with your own words.
AN ERROR REPORTING MECHANISM (ICMP)
IP provides best-effort delivery. Delivery problems can be ignored; datagrams can be
‘dropped on the floor’. Internet Control Message Protocol (ICMP) provides error
INTERNET CONTROL MESSAGE PROTOCOL:
Some errors can be reported. Router sends message back to source in datagram. Message
contains information about problem. It is encapsulated in IP datagram.
USING ICMP TO TEST REACHABILITY:
ICMP can also be used to test different tools. An Internet host A, is reachable from
another host B, if datagrams can be delivered from A to B. Ping program tests reachability.
It sends datagram from B to A, that echoes back to B. it uses ICMP echo request
and echo reply messages. Internet layer includes code to reply to incoming ICMP echo
USING ICMP FOR PATH MTU:
Fragmentation should be avoided. Source can configure outgoing datagrams to avoid
fragmentation. Source determines path MTU- smallest network MTU on path from
source to destination. Source probes path using IP datagrams with don’t fragment flag.
Router responds with ICMP fragmentation required message. Source sends smaller
probes until destination reached.
THANKS A LOTT...
Today is last date of assignment.
Yaar 2nd question ki thek se smj nahi lagi.........Is main sirf ICMP ka intro krwaya hy ye nahi btaya k how can??????