diff --git a/scapy/contrib/igmp.py b/scapy/contrib/igmp.py
index b533f43cb9d4342e1e1809b83d16ade9bc846982..34892d81cce05764d1f072b1f184bbd089aca439 100644
--- a/scapy/contrib/igmp.py
+++ b/scapy/contrib/igmp.py
@@ -17,33 +17,28 @@
 # scapy.contrib.description = IGMP/IGMPv2
 # scapy.contrib.status = loads
 
-
-#  TODO: scapy 2 has function getmacbyip, maybe it can replace igmpize
-#          at least from the MAC layer
-
 from __future__ import print_function
 from scapy.packet import *
 from scapy.fields import *
 from scapy.layers.inet import *
+from scapy.layers.l2 import DestMACField, getmacbyip
+from scapy.error import warning
 
-#--------------------------------------------------------------------------
 def isValidMCAddr(ip):
-  """convert dotted quad string to long and check the first octet"""
-  FirstOct=atol(ip)>>24 & 0xFF
-  return (FirstOct >= 224) and (FirstOct <= 239)
-
-#--------------------------------------------------------------------------
+    """convert dotted quad string to long and check the first octet"""
+    FirstOct=atol(ip)>>24 & 0xFF
+    return (FirstOct >= 224) and (FirstOct <= 239)
 
 class IGMP(Packet):
-  """IGMP Message Class for v1 and v2.
+    """IGMP Message Class for v1 and v2.
 
-This class is derived from class Packet. You  need to "igmpize"
-the IP and Ethernet layers before a full packet is sent.
+This class is derived from class Packet. You  need call "igmpize()"
+so the packet is transformed according the RFC when sent.
 a=Ether(src="00:01:02:03:04:05")
 b=IP(src="1.2.3.4")
 c=IGMP(type=0x12, gaddr="224.2.3.4")
-c.igmpize(b, a)
-print "Joining IP " + c.gaddr + " MAC " + a.dst
+x = a/b/c
+x[IGMP].igmpize()
 sendp(a/b/c, iface="en0")
 
     Parameters:
@@ -55,134 +50,71 @@ See RFC2236, Section 2. Introduction for definitions of proper
 IGMPv2 message format   http://www.faqs.org/rfcs/rfc2236.html
 
   """
-  name = "IGMP"
+    name = "IGMP"
   
-  igmptypes = { 0x11 : "Group Membership Query",
-                0x12 : "Version 1 - Membership Report",
-                0x16 : "Version 2 - Membership Report",
-                0x17 : "Leave Group"}
+    igmptypes = { 0x11 : "Group Membership Query",
+                  0x12 : "Version 1 - Membership Report",
+                  0x16 : "Version 2 - Membership Report",
+                  0x17 : "Leave Group"}
 
-  fields_desc = [ ByteEnumField("type", 0x11, igmptypes),
-                      ByteField("mrtime",20),
+    fields_desc = [ ByteEnumField("type", 0x11, igmptypes),
+                    ByteField("mrtime", 20),
                     XShortField("chksum", None),
-                        IPField("gaddr", "0.0.0.0")]
-
-#--------------------------------------------------------------------------
-  def post_build(self, p, pay):
-    """Called implicitly before a packet is sent to compute and place IGMP checksum.
-
-    Parameters:
-      self    The instantiation of an IGMP class
-      p       The IGMP message in hex in network byte order
-      pay     Additional payload for the IGMP message
-    """
-    p += pay
-    if self.chksum is None:
-      ck = checksum(p)
-      p = p[:2]+chr(ck>>8)+chr(ck&0xff)+p[4:]
-    return p
-
-#--------------------------------------------------------------------------
-  def mysummary(self):
-    """Display a summary of the IGMP object."""
-
-    if isinstance(self.underlayer, IP):
-      return self.underlayer.sprintf("IGMP: %IP.src% > %IP.dst% %IGMP.type% %IGMP.gaddr%")
-    else:
-      return self.sprintf("IGMP %IGMP.type% %IGMP.gaddr%")
-
-#--------------------------------------------------------------------------
-  def igmpize(self, ip=None, ether=None):
-    """Called to explicitly fixup associated IP and Ethernet headers
-
-    Parameters:
-      self    The instantiation of an IGMP class.
-      ip      The instantiation of the associated IP class.
-      ether   The instantiation of the associated Ethernet.
-
-    Returns:
-      True    The tuple ether/ip/self passed all check and represents
-               a proper IGMP packet.
-      False   One of more validation checks failed and no fields 
-               were adjusted.
-
-    The function will examine the IGMP message to assure proper format. 
-    Corrections will be attempted if possible. The IP header is then properly 
-    adjusted to ensure correct formatting and assignment. The Ethernet header
-    is then adjusted to the proper IGMP packet format.
-    """
-
-# The rules are:
-#   1.  the Max Response time is meaningful only in Membership Queries and should be zero 
-#       otherwise (RFC 2236, section 2.2)
-
-    if (self.type != 0x11):         #rule 1
-      self.mrtime = 0
-      
-    if (self.adjust_ip(ip) == True):
-      if (self.adjust_ether(ip, ether) == True): return True
-    return False
-
-#--------------------------------------------------------------------------
-  def adjust_ether (self, ip=None, ether=None):
-    """Called to explicitly fixup an associated Ethernet header
-
-    The function adjusts the ethernet header destination MAC address based on 
-    the destination IP address.
-    """
-# The rules are:
-#   1. send to the group mac address address corresponding to the IP.dst
-    if ip != None and ip.haslayer(IP) and ether != None and ether.haslayer(Ether):
-      iplong = atol(ip.dst)
-      ether.dst = "01:00:5e:%02x:%02x:%02x" % ( (iplong>>16)&0x7F, (iplong>>8)&0xFF, (iplong)&0xFF )
-      # print "igmpize ip " + ip.dst + " as mac " + ether.dst 
-      return True
-    else:
-      return False
-
-#--------------------------------------------------------------------------
-  def adjust_ip (self, ip=None):
-    """Called to explicitly fixup an associated IP header
-
-    The function adjusts the IP header based on conformance rules 
-    and the group address encoded in the IGMP message.
-    The rules are:
-    1. Send General Group Query to 224.0.0.1 (all systems)
-    2. Send Leave Group to 224.0.0.2 (all routers)
-    3a.Otherwise send the packet to the group address
-    3b.Send reports/joins to the group address
-    4. ttl = 1 (RFC 2236, section 2)
-    5. send the packet with the router alert IP option (RFC 2236, section 2)
-    """
-    if ip != None and ip.haslayer(IP):
-      if (self.type == 0x11):
-        if (self.gaddr == "0.0.0.0"):
-          ip.dst = "224.0.0.1"                   # IP rule 1
-          retCode = True                     
-        elif isValidMCAddr(self.gaddr):
-          ip.dst = self.gaddr                    # IP rule 3a
-          retCode = True
+                    IPField("gaddr", "0.0.0.0")]
+
+    def post_build(self, p, pay):
+        """Called implicitly before a packet is sent to compute and place IGMP checksum.
+
+        Parameters:
+          self    The instantiation of an IGMP class
+          p       The IGMP message in hex in network byte order
+          pay     Additional payload for the IGMP message
+        """
+        p += pay
+        if self.chksum is None:
+            ck = checksum(p)
+            p = p[:2]+chr(ck>>8)+chr(ck&0xff)+p[4:]
+        return p
+
+    def igmpize(self):
+        """Applies IGMP rules to the packet"""
+        gaddr = self.gaddr if self.gaddr else "0.0.0.0"
+        underlayer = self.underlayer
+        # The rules are:
+        #   1.  the Max Response time is meaningful only in Membership Queries and should be zero 
+        #       otherwise (RFC 2236, section 2.2)
+        if self.type != 0x11:         # Rule 1
+            self.mrtime = 0
+        if isinstance(underlayer, IP):
+            if (self.type == 0x11):
+                if (gaddr == "0.0.0.0"):
+                    underlayer.dst = "224.0.0.1"                        # IP rule 1
+                elif isValidMCAddr(gaddr):
+                    underlayer.dst = gaddr                             # IP rule 3a
+                else:
+                    warning("Invalid IGMP Group Address detected !")
+                    return False
+            elif ((self.type == 0x17) and isValidMCAddr(gaddr)):
+                underlayer.dst = "224.0.0.2"                            # IP rule 2
+            elif ((self.type == 0x12) or (self.type == 0x16)) and (isValidMCAddr(gaddr)):
+                underlayer.dst = gaddr                                 # IP rule 3b
+            else:
+                warning("Invalid IGMP Type detected !")
+                return False
+            _root = self.firstlayer()
+            if _root.haslayer(Ether):
+                # Force recalculate Ether dst
+                _root[Ether].dst = getmacbyip(underlayer.dst)
+        return True
+
+    def mysummary(self):
+        """Display a summary of the IGMP object."""
+        if isinstance(self.underlayer, IP):
+            return self.underlayer.sprintf("IGMP: %IP.src% > %IP.dst% %IGMP.type% %IGMP.gaddr%")
         else:
-          print("Warning: Using invalid Group Address")
-          retCode = False
-      elif ((self.type == 0x17) and isValidMCAddr(self.gaddr)):
-          ip.dst = "224.0.0.2"                   # IP rule 2
-          retCode = True
-      elif ((self.type == 0x12) or (self.type == 0x16)) and (isValidMCAddr(self.gaddr)):
-          ip.dst = self.gaddr                    # IP rule 3b
-          retCode = True
-      else:
-        print("Warning: Using invalid IGMP Type")
-        retCode = False
-    else:
-      print("Warning: No IGMP Group Address set")
-      retCode = False
-    if retCode == True:
-       ip.ttl=1                                  # IP Rule 4
-       ip.options=[IPOption_Router_Alert()]      # IP rule 5
-    return retCode
-
-
-bind_layers( IP,            IGMP,            frag=0, proto=2)
-
+            return self.sprintf("IGMP %IGMP.type% %IGMP.gaddr%")
 
+bind_layers( IP,            IGMP,            frag=0,
+                                             proto=2,
+                                             ttl=1,
+                                             options=[IPOption_Router_Alert()])
diff --git a/scapy/contrib/igmp.uts b/scapy/contrib/igmp.uts
new file mode 100644
index 0000000000000000000000000000000000000000..27dbfbdddd2137e257407a42e8b7721a1992710b
--- /dev/null
+++ b/scapy/contrib/igmp.uts
@@ -0,0 +1,73 @@
+############
+% IGMP tests
+############
+
++ Basic IGMP tests
+
+= Build IGMP - Basic
+
+a=Ether(src="00:01:02:03:04:05")
+b=IP(src="1.2.3.4")
+c=IGMP(gaddr="0.0.0.0")
+x = a/b/c
+x[IGMP].igmpize()
+assert x.mrtime == 20
+assert x[IP].dst == "224.0.0.1"
+
+= Build IGMP - Custom membership
+
+a=Ether(src="00:01:02:03:04:05")
+b=IP(src="1.2.3.4")
+c=IGMP(gaddr="224.0.1.2")
+x = a/b/c
+x[IGMP].igmpize()
+assert x.mrtime == 20
+assert x[IP].dst == "224.0.1.2"
+
+= Build IGMP - LG
+
+a=Ether(src="00:01:02:03:04:05")
+b=IP(src="1.2.3.4")
+c=IGMP(type=0x17, gaddr="224.2.3.4")
+x = a/b/c
+x[IGMP].igmpize()
+assert x.dst == "01:00:5e:00:00:02"
+assert x.mrtime == 0
+assert x[IP].dst == "224.0.0.2"
+
+= Change IGMP params
+
+x = Ether(src="00:01:02:03:04:05")/IP()/IGMP()
+x[IGMP].igmpize()
+assert x.mrtime == 20
+assert x[IP].dst == "224.0.0.1"
+
+x = Ether(src="00:01:02:03:04:05")/IP()/IGMP(gaddr="224.2.3.4", type=0x12)
+x.mrtime = 1
+x[IGMP].igmpize()
+x = Ether(str(x))
+assert x.mrtime == 0
+
+x.gaddr = "224.3.2.4"
+x[IGMP].igmpize()
+assert x.dst == "01:00:5e:03:02:04"
+
+= Test mysummary
+
+x = Ether(src="00:01:02:03:04:05")/IP(src="192.168.0.1")/IGMP(gaddr="224.0.0.2", type=0x17)
+x[IGMP].igmpize()
+assert x[IGMP].mysummary() == "IGMP: 192.168.0.1 > 224.0.0.2 Leave Group 224.0.0.2"
+
+assert IGMP().mysummary() == "IGMP Group Membership Query 0.0.0.0"
+
+= IGMP - misc
+~ netaccess
+
+x = Ether(src="00:01:02:03:04:05")/IP(dst="192.168.0.1")/IGMP(gaddr="www.google.fr", type=0x11)
+x = Ether(str(x))
+x[IGMP].igmpize()
+assert x[IP].dst == "192.168.0.1"
+
+x = Ether(src="00:01:02:03:04:05")/IP(dst="192.168.0.1")/IGMP(gaddr="124.0.2.1", type=0x00)
+x[IGMP].igmpize()
+assert x[IP].dst == "192.168.0.1"
\ No newline at end of file