Evolution of mobile telephone generation landscape based on


QUESTION 1

a. Describe the evolution of mobile telephone generation landscape based on wireless celluar technologies and what improvements have been done from one generation to another generation.

b. Android is one of the popular environments for application development over the mobile application. In order to develop mobile application using Android, what are the android software requirements needed and describe the process development flow in developing the application in general.

QUESTION 2

You need to complete the simulation exercise using Wireshark simulator, Tracert and Ping commands. The simulation focuses on the Internet Control Message Protocol (ICMP). ICMP is a companion protocol to IP that helps IP to perform its functions by handling various error and test cases. It is covered in topic 5.6.4 of your text. You need to capture a data from your entire network before you are filtering the ICMP data. The report need to have an introduction and results.

You need to include the whole process how to get the results. The steps below are an important part in order to get the results, however there are many processes you need to include in the report. You also need to describe on how the data have been captured in Wireshark. There are three parts you need to follow and produce the results. The steps are as follows:

 Part 1

Start your exploration by selecting an echo (ping) request and reply packet at the start of the trace. Expand the ICMP block to see the ICMP header and payload details. Answer the following questions to demonstrate your understanding of ICMP echo messages:

a. What are the Type/Code values for an ICMP echo request and echo reply packet, respectively?

b. How do the Identifier and Sequence Number compare for an echo request and the corresponding echo reply?

c. How do the Identifier and Sequence Number compare for successive echo request packets?

d. Is the data in the echo reply the same as in the echo request or different?

Part 2

Next, explore trace route traffic by selecting any Time Exceeded ICMP packet in your trace. Expand the ICMP block to see the ICMP header and payload details:

Draw a picture of one ICMP TTL Exceeded packet to make sure that you understand its nested structure. On your figure, show the position and size in bytes of the IP header, ICMP header with details of the Type/Code and checksum subfields, and the ICMP payload. Within the ICMP payload, draw another rectangle that shows the overall structure of the contents of the payload. Answer the following questions:

a. What is the Type/Code value for an ICMP TTL Exceeded packet?

b. How can the receiver safely find and process all the ICMP fields if it does not know ahead of time what kind of ICMP message to expect? The potential issue, as you have probably noticed, is that different ICMP messages can have different formats.

For instance, Echo has Sequence and Identifier fields while TTL Exceeded does not.

c. How long is the ICMP header of a TTL Exceeded packet? Select different parts of the header in Wireshark to see how they correspond to the bytes in the packet.

d. The ICMP payload contains an IP header. What is the TTL value in this header? Explain why it has this value. Guess what it will be before you look!

Part 3

The source and destination IP addresses in an IP packet denote the endpoints of an Internet path, not the IP routers on the network path the packet travels from the source to the destination. By looking at the details of the packets, answer the following questions:

a. How does your computer (the source) learn the IP address of a router along the path from a TTL exceeded packet? mention where on this packet the IP address is found.

b. How many times is each router along the path probed by traceroute?

c. How does your computer (the source) craft an echo request packet to find (by eliciting a TTL Exceeded response) the router N hops along the path towards the destination? Describe the key attributes of the echo request packet.

Using the traceroute output, sketch a drawing of the network path. Show your computer and the remote server, both with IP addresses, as well as the routers along the path between them numbered by their distance on hops from the start of the path. To finish your drawing, label the routers along the path with the name of the real-world organisation to which they belong. To do this, you will need to interpret the domain names of the routers given by traceroute. If you are unsure, label the routers with the domain name of what you take to be theorganisation. Ignore or leave blank any routers for which there is no domain name (or no IP address).

Request for Solution File

Ask an Expert for Answer!!
Other Subject: Evolution of mobile telephone generation landscape based on
Reference No:- TGS0772366

Expected delivery within 24 Hours