Question

In: Computer Science

The following questions relate to the protocol used to manage the health of the network and...

  1. The following questions relate to the protocol used to manage the health of the network and allow network devices to communicate to each other to keep network traffic flowing freely. An example of a common command that uses this protocol is ‘ping’. (10 marks total)

    1. What is the name of this protocol? (1 mark)

    2. What layer of the TCP/IP network model does this protocol belong? (1 mark)

    3. What is the command used to display a path that network traffic takes across a network? (2 mark)

    4. Name a feature of this protocol that is used to map this path mentioned above, and briefly explain how the Tracert function works. (1 + 5 = 6 marks)

Solutions

Expert Solution

The name of this protocol is ICMP that is Internet Control Message Point. The Purpose of ICMP is for error reporting, it is used for sending control and error messages. This protocol is used by network devices such as routers to send error messages. It is also used to determine whether data is reached to the destination or not in a timely manner.

=================================================================

The ICMP protocol resides in the layer 3 of the TCP/IP network model that is the Internet layer or the Network layer. As it's job is to send error messages and to determine wheter data is reached to the destination from the source or not it resides in the layer 3 and as being in the network layer the ICMP are carried by the IP packets not the data packets. They are sent through IP datagrams.

=================================================================

One of the common application utilities of ICMP is to map out or trace the path that the data packet can take. This is done through traceroute or tracert command. For UNIX OS traceroute is used and for Windows OS tracert is used. It is the command used to display a path that network traffic takes across a network.

=================================================================

Feature of this protcol is the traceroute feature that can trace the present and future paths for a data packet to travel. In order to trace the expected and present path of the data packet empty data packets is used by tracert to accomplish this task. The Initial data packet is assigned a TTL value of 0. TTL stands for Time To Live, TTL limits how long data can live in an IP network. Every packet of data is assigned a TTL value. Every time a data packet reaches a hop, the TTL value is decreased by one. When the first router recieves the data packet it is then dropped and ICMP message is transmitted back to the source computer, first router location is known via this. After the initial data packet is sent out and returned, the next data packet is then sent out with a TTL value of 1. Once the next router receives this particular data packet, it will decrease the value by -1 and it will be returned with another ICMP message, thus revealing the identity of the second router. This process will repeat until the data packets either reach the destination device or it reaches the maximum number of hops.Traceroute measures the time between when the data is sent and when the ICMP message is received back, from this the RTT value is calculated. At the end after the completion of the this process traceroute or tracert gives us the number of hops to the destination device, the RTT length for each hop, and the device name and IP address for each hop.


Related Solutions

1) Define the following concepts: computer network, network architecture, protocol, and multilayer protocol. 2) As an...
1) Define the following concepts: computer network, network architecture, protocol, and multilayer protocol. 2) As an IT professional who works in the networked world describe the professional, social, economic, and cultural issues of computer networks. 3) As an IT professional who works in the networked world describe the ethical issues and your social responsibility.
a- Explain the role of packet sniffing and protocol analyzers as used in network firewalls b-...
a- Explain the role of packet sniffing and protocol analyzers as used in network firewalls b- Explain the role of packet sniffing and protocol analyzers as used in intrusion detection systems c-List and specifically describe the 802.x Ethernet frame header fields that would be important to Network Forensic analysis d- List and specifically describe the 802.x Wireless Ethernet frame header fields that would be important to Network Forensic analysis
What is a network protocol? What is a network service? What is the difference between a...
What is a network protocol? What is a network service? What is the difference between a service interface and implementation of a service? Discuss these concepts in the context of layered network architecture.
Topic: DCS What is the difference between DCS Network Communication Protocol and Field Communication Protocol?
Topic: DCS What is the difference between DCS Network Communication Protocol and Field Communication Protocol?
. The following is a key exchange protocol used by two clients, A and B, to...
. The following is a key exchange protocol used by two clients, A and B, to obtain a symmetric key???, using a trusted server, S. Assume that A and B had previously obtained the symmetric keys ??? and ??? securely with the server. Also assume that anyone can securely obtain a secret symmetric key with the server. I. A → S : A, B II. S → A : (???) ??? ,( ???) ??? III. A → B : (???)...
What is the 2PC protocol, and what is it used for?
What is the 2PC protocol, and what is it used for?
B. The following is a key exchange protocol used by two clients, A and B, to...
B. The following is a key exchange protocol used by two clients, A and B, to obtain a symmetric key???, using a trusted server, S. Assume that A and B had previously obtained the symmetric keys ??? and ??? securely with the server. Also assume that anyone can securely obtain a secret symmetric key with the server. I. A → S : A, B II. S → A : (???) ??? ,( ???) ??? III. A → B : (???)...
B. The following is a key exchange protocol used by two clients, A and B, to...
B. The following is a key exchange protocol used by two clients, A and B, to obtain a symmetric key???, using a trusted server, S. Assume that A and B had previously obtained the symmetric keys ??? and ??? securely with the server. Also assume that anyone can securely obtain a secret symmetric key with the server. I. A → S : A, B II. S → A : (???) ??? ,( ???) ??? III. A → B : (???)...
Scenario 1 (Use the network 221.153.17.0 for the following questions.) We need to subnet this network...
Scenario 1 (Use the network 221.153.17.0 for the following questions.) We need to subnet this network to support a minimum of 4 (four) networks. How many bits do we need to use from the last octet to support this? How many hosts would each network be able to support? What will the subnet mask be? Give the network, IP range, and broadcast address for the first 3 networks: Network 1:    _________________             Broadcast: _________________ Host IP Range:         _________________ to _________________...
Is the IRC protocol (application-level) protocol used in any connection in this trace. How to filter...
Is the IRC protocol (application-level) protocol used in any connection in this trace. How to filter packets for application-level in IRC protocol.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT