M4_L1_ICMP
.doc
keyboard_arrow_up
School
Strayer University *
*We aren’t endorsed by this school
Course
PT1420
Subject
Computer Science
Date
Feb 20, 2024
Type
doc
Pages
2
Uploaded by ProfessorBoulderWolf
DCOM 252: Lab Assignment 1
Module 4: Internet Control Message Protocol (ICMP)
Name (Please Print)
: _______LENORA GIBSON______________
Total Points
: 20 (each question is worth 2 points each)
Graded Score:
Submission Requirements
: write your answers directly on this sheet in the spaces provided
1.
The ICMP is defined in RFC __
792_____, as of what month and year?
FEB 1979
2.
ICMP messages are encapsulated within _
DATA PORTION OF THE IP DATAGRAM______.
3.
ICMP doesn’t use port numbers (like those used by TCP and UDP). Instead, ICMP uses _
MESSAGE TYPES______. For example, an echo reply uses message type _
0______.
4.
Describe a situation when a system would receive an ICMP type 3, code 3 error:
For questions 5-10, use the pingfrag.pcap
trace file:
5.
What protocol field and value tells the receiving node that what follows the header is ICMP data?
VALUE OF 1
6.
Packet #3: the client (10.0.99.2) is sending a type __8_____, code ___
0____ message to the server (10.0.0.1). 7.
Another name for the type of message sent in packet #3 is an echo ping _
A REQUEST______.
8.
Packet #3: How many bytes of data are being sent in this ICMP packet? What’s in the payload?
4096 Bytes A-W
9.
What packet number is the reply for the echo request sent in packet #3? 6
1
DCOM 252: Lab Assignment 1
Module 4: Internet Control Message Protocol (ICMP)
10.What ICMP fields and values support your answer in question #9?
Packet 3 and 6
2
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Computer Network
LAN Network Topology Image. the image below
Use the image as a reference, if the values are A, B, C and D (3rd octet) with the following conditions:
Value A = 29
Value B = A + 1
Value C = A + 2
Value D = A + 3
x1, y1, z1 are the interfaces for the router gateway, while x2, x3, y2, y3, z2, z3 are for the router interface
a. Find the Routing Table R1, R2, and R3 using the following table!
Destination
Next hop
Interface
b. With the Routing Table that you have specified in point a, which path will PC1B take when communicating with PC2B and PC3B
c. In theory there is a routing table for Network Address 0.0.0.0 with a Subnet Mask of 0.0.0.0, explain the function of this routing table?
arrow_forward
A URL (Uniform Resource Locator) is an identifier used to locate resources on the web. A URL is composed of the following components: Scheme, Host Name (with optional Port Number), Path, (optional) Query String, (optional) Anchor. These components are arranged in the following format:Scheme://Hostname:Port/Path?QueryString#AnchorFor example, in the URL "https://en.wikipedia.org:443/wiki/Kitten?printable=yes&download=no#External_links": "https" is the Scheme, "en.wikipedia.org" is the Hostname, 443 is the Port Number, "wiki/Kitten" is the Path, "printable=yes&download=no" is the Query String, and "External_links" is the Anchor.The Port Number is typically omitted when default port numbers are used by the hostname server (80 for http, 443 for https). When Path and Query String are empty, the '/' character before the Path becomes optional, e.g, as in the url: 'https://en.wikipedia.org'.Write a function url2hostname that takes in a URL and returns the hostname (without the port…
arrow_forward
This header may be used to determine if a cached page has been modified since it was last accessed.
Requests may be made for pages that include pictures, sound, video, and other types of media, in addition to HTML.
Do you believe that the efficacy of this approach is greater or worse when used to JPEG pictures as opposed to HTML code?
Consider the definition of "efficacy" carefully, and then provide an explanation for your choice.
arrow_forward
Generate an XSD for the following XML document
<?xml version="1.0" encoding="UTF-8"?>
<company>
<employee>
<id>101</id>
<name>Ram</name>
<salary>10000</salary>
<email>ram@gmail.com</email>
</employee>
<employee>
<id>102</id>
<name>Dinesh</name>
<salary>20000</salary>
<email>dinesh@gmail.com</email>
</employee>
<employee>
<id>103</id>
<name>sathish</name>
<salary>20000</salary>
<email>sathish@gmail.com</email>
</employee>
<employee>
<id>104</id>
<name>Praveen</name>
<salary>20000</salary>
<email>praveen@gmail.com</email>
</employee>
</company>
arrow_forward
Write a valid XML document following the below schema:
xmlns:xs="http://www.w3.org/2001/XMLSchema">
O
arrow_forward
Discrete Structures or Discrete Mathematics
arrow_forward
The Internet Corporation for Assigned Names and Numbers (ICANN) is a nonprofit entity
organizing Internet domain names. It is governed by a board of directors elected by various
groups with commercial interests in the Internet. One of ICANN's functions is to authorize an
entity as a registry for certain "Top Level Domains" (TLDS). ICANN entered into an agreement
with VeriSign to serve as a registry for the ".com" TLD to provide registry services in
accordance with ICANN's specifications. VeriSign complained that ICANN was restricting the
services that it could make available as a registrar and blocking new services, imposing
unnecessary conditions on those services, and setting prices at which the services were offered.
VeriSign claimed that ICANN's control of the registry services for domain names violated
Section 1 of the Sherman Act. Using the information presented in the chapter, answer the
following questions.
1. Should ICANN's actions be judged under the rule of reason or be…
arrow_forward
Extensible Markup Language is an abbreviation that stands for Extensible Markup Language, which is an acronym that stands for Extensible Markup Language. XML may also be referred to by its abbreviated name, XML. There are two different uses that may be put to XML, either of which can be pursued.
arrow_forward
What is the difference between logical tags and physical tags?
arrow_forward
Using example HTTP headers show the typical HTTP exchange between a Web Client (Browser, CURL, etc.) and a Web Server, where the client issues (i) a GET and (ii) a POST request via a HTML form containing three different HTML form fields (choose three from SUBMIT, TEXT, CHECKBOX, RADIO).
arrow_forward
The HTTP protocol uses Request and Response processes in a client-server communication as
shown in the diagram below.
Request Line
HTTP
Headers
HTTP Request
Browser
Server
HTTP Response
Status Line
HTTP
Headers
Content
Provide two of the http-header fields for each process. (Provide your answers in the order they
appear in the HTTP header fields structure)
Answer:
1. HTTP Request Header Fields: 1)
2)
2. HTTP Response Header Fields: 1)
0000
2)
arrow_forward
Detailing the Access Control list's components.
arrow_forward
What is the definition of content validity?
arrow_forward
Sort DNS records by type. Each should be defined in depth, including examples and justifications for its use. A web server and an internal mail server may share a hostname, but is this possible?
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Programming Logic & Design Comprehensive
Computer Science
ISBN:9781337669405
Author:FARRELL
Publisher:Cengage
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
New Perspectives on HTML5, CSS3, and JavaScript
Computer Science
ISBN:9781305503922
Author:Patrick M. Carey
Publisher:Cengage Learning
Related Questions
- Computer Network LAN Network Topology Image. the image below Use the image as a reference, if the values are A, B, C and D (3rd octet) with the following conditions: Value A = 29 Value B = A + 1 Value C = A + 2 Value D = A + 3 x1, y1, z1 are the interfaces for the router gateway, while x2, x3, y2, y3, z2, z3 are for the router interface a. Find the Routing Table R1, R2, and R3 using the following table! Destination Next hop Interface b. With the Routing Table that you have specified in point a, which path will PC1B take when communicating with PC2B and PC3B c. In theory there is a routing table for Network Address 0.0.0.0 with a Subnet Mask of 0.0.0.0, explain the function of this routing table?arrow_forwardA URL (Uniform Resource Locator) is an identifier used to locate resources on the web. A URL is composed of the following components: Scheme, Host Name (with optional Port Number), Path, (optional) Query String, (optional) Anchor. These components are arranged in the following format:Scheme://Hostname:Port/Path?QueryString#AnchorFor example, in the URL "https://en.wikipedia.org:443/wiki/Kitten?printable=yes&download=no#External_links": "https" is the Scheme, "en.wikipedia.org" is the Hostname, 443 is the Port Number, "wiki/Kitten" is the Path, "printable=yes&download=no" is the Query String, and "External_links" is the Anchor.The Port Number is typically omitted when default port numbers are used by the hostname server (80 for http, 443 for https). When Path and Query String are empty, the '/' character before the Path becomes optional, e.g, as in the url: 'https://en.wikipedia.org'.Write a function url2hostname that takes in a URL and returns the hostname (without the port…arrow_forwardThis header may be used to determine if a cached page has been modified since it was last accessed. Requests may be made for pages that include pictures, sound, video, and other types of media, in addition to HTML. Do you believe that the efficacy of this approach is greater or worse when used to JPEG pictures as opposed to HTML code? Consider the definition of "efficacy" carefully, and then provide an explanation for your choice.arrow_forward
- Generate an XSD for the following XML document <?xml version="1.0" encoding="UTF-8"?> <company> <employee> <id>101</id> <name>Ram</name> <salary>10000</salary> <email>ram@gmail.com</email> </employee> <employee> <id>102</id> <name>Dinesh</name> <salary>20000</salary> <email>dinesh@gmail.com</email> </employee> <employee> <id>103</id> <name>sathish</name> <salary>20000</salary> <email>sathish@gmail.com</email> </employee> <employee> <id>104</id> <name>Praveen</name> <salary>20000</salary> <email>praveen@gmail.com</email> </employee> </company>arrow_forwardWrite a valid XML document following the below schema: xmlns:xs="http://www.w3.org/2001/XMLSchema"> Oarrow_forwardDiscrete Structures or Discrete Mathematicsarrow_forward
- The Internet Corporation for Assigned Names and Numbers (ICANN) is a nonprofit entity organizing Internet domain names. It is governed by a board of directors elected by various groups with commercial interests in the Internet. One of ICANN's functions is to authorize an entity as a registry for certain "Top Level Domains" (TLDS). ICANN entered into an agreement with VeriSign to serve as a registry for the ".com" TLD to provide registry services in accordance with ICANN's specifications. VeriSign complained that ICANN was restricting the services that it could make available as a registrar and blocking new services, imposing unnecessary conditions on those services, and setting prices at which the services were offered. VeriSign claimed that ICANN's control of the registry services for domain names violated Section 1 of the Sherman Act. Using the information presented in the chapter, answer the following questions. 1. Should ICANN's actions be judged under the rule of reason or be…arrow_forwardExtensible Markup Language is an abbreviation that stands for Extensible Markup Language, which is an acronym that stands for Extensible Markup Language. XML may also be referred to by its abbreviated name, XML. There are two different uses that may be put to XML, either of which can be pursued.arrow_forwardWhat is the difference between logical tags and physical tags?arrow_forward
- Using example HTTP headers show the typical HTTP exchange between a Web Client (Browser, CURL, etc.) and a Web Server, where the client issues (i) a GET and (ii) a POST request via a HTML form containing three different HTML form fields (choose three from SUBMIT, TEXT, CHECKBOX, RADIO).arrow_forwardThe HTTP protocol uses Request and Response processes in a client-server communication as shown in the diagram below. Request Line HTTP Headers HTTP Request Browser Server HTTP Response Status Line HTTP Headers Content Provide two of the http-header fields for each process. (Provide your answers in the order they appear in the HTTP header fields structure) Answer: 1. HTTP Request Header Fields: 1) 2) 2. HTTP Response Header Fields: 1) 0000 2)arrow_forwardDetailing the Access Control list's components.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Programming Logic & Design ComprehensiveComputer ScienceISBN:9781337669405Author:FARRELLPublisher:CengageNp Ms Office 365/Excel 2016 I NtermedComputer ScienceISBN:9781337508841Author:CareyPublisher:CengageNew Perspectives on HTML5, CSS3, and JavaScriptComputer ScienceISBN:9781305503922Author:Patrick M. CareyPublisher:Cengage Learning
Programming Logic & Design Comprehensive
Computer Science
ISBN:9781337669405
Author:FARRELL
Publisher:Cengage
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
New Perspectives on HTML5, CSS3, and JavaScript
Computer Science
ISBN:9781305503922
Author:Patrick M. Carey
Publisher:Cengage Learning