SlideShare a Scribd company logo
Section 2
INTRO TO ICMPv4
 MESSAGES
- Error Reporting Messages.
- Deprecated Messages.
- Query messages
 Debugging Tools.
- Ping.
- Trace route or Tracert.
 ICMP Checksum
 IP protocol has no built-in mechanism to
notify the original host.
 The IP protocol also lacks a mechanism for
host and management queries.
 (ICMPv4) has been designed to compensate
for the above two deficiencies.
 It is a companion to the IP protocol. ICMP
itself is a network-layer protocol.
 messages are not passed directly to the data-
link layer as would be expected.
 the messages are first encapsulated inside IP
datagrams before going to the lower layer.
 When an IP datagram encapsulates an ICMP
message, the value of the protocol field in
the IP datagram is set to 1 to indicate that
the IP payroll is an
ICMP message.
 ICMP messages are divided into two broad
categories:
 error-reporting messages: report problems that a
router or a host(destination) may encounter when it
processes an IP packet.
 query messages: messages, which help a host or a
network manager get specific information from a
router or another host.
 An ICMP message has an 8-byte header and a variable-size data
section.
 Type, defines the type of the message.
 Code field specifies the reason for the particular message type.
 The last common field is the Checksum field.
 In error messages the data section carries
information for finding the original packet
that had the error.
 In query messages, the data section carries
extra information based on the type of
query.
 The main responsibilities of ICMP is to report some
errors that may occur during the processing of the IP
datagram.
 Error messages are always sent to the original source
because the only information available in the
datagram about the route is the source and
destination IP addresses.
 Note that all error messages contain a data section
that includes the IP header of the original datagram
plus the first 8 bytes of data in that datagram.
ICMP follows some rules in reporting messages.
 First, no error message will be generated for a
datagram having a multicast address or special
address.
 Second, no ICMP error message will be generated in
response to a datagram carrying an ICMP error
message.
 Third, no ICMP error message will be generated for
a fragmented datagram that is not the first
fragment.
ICMP forms an error packet:
 Destination Unreachable: This message uses different codes (0
to 15) to define the type of error message and the reason why a
datagram has not reached its final destination.
This may happen, for example, when we use the HTTP protocol to
access a web page, but the server is down. The message
“destination host is not reachable” is created and sent back to
the source.
ICMP forms an error packet:
 Source Quench: informs the sender that the network has
encountered congestion and the datagram has been dropped;
The source needs to slow down sending more datagrams. In other
words, ICMP adds a kind of congestion control mechanism to
the IP protocol by using this type of message.
 Parameter Problem: sent when either there is a problem in the
header of a datagram (code 0) or some options are missing or
cannot be interpreted (code 1).
ICMP forms an error packet:
 Redirection Message: used when the source uses a wrong
router to send out its message.
The router redirects the message to the appropriate router, but
informs the source that it needs to change its default router in
the future.
The IP address of the default router is sent in the message.
 query messages in ICMP can be used independently
without relation to an IP datagram.
 needs to be encapsulated in a datagram, as a
carrier.
 used to probe or test the liveliness of hosts or
routers in the Internet,
 find the one-way or the round-trip time for an IP
datagram between two devices, or even find out
whether the clocks in two devices are synchronized.
 query messages come in pairs: request and reply.
 The echo request (type 8)
 The echo reply (type 0)
 pair of messages are used by a host or a router to
test the liveliness of another host or router.
 A host or router sends an echo request message to
another host or router; if the latter is alive, it
responds with an echo reply message.
 The timestamp request (type 13) and the timestamp reply
(type 14) pair of messages are used to find the round-trip time
between two devices or to check whether the clocks in two
devices are synchronized.
 The timestamp request message sends a 32-bit number, which
defines the time the message is sent.
 The timestamp reply resends that number, but also includes
two new 32-bit numbers representing the time the request
was received and the time the response was sent.
 If all timestamps represent Universal time, the sender can
calculate the one-way and round-trip time.
Three pairs of messages are declared obsolete by IETF:
1. Information request and replay messages are not used
today because their duties are done by the Address
Resolution Protocol (ARP.
2. Address mask request and reply messages are not used
today because their duties are done by the Dynamic Host
Configuration Protocol (DHCP).
3. Router solicitation and advertisement messages are not
used today because their duties are done by the Dynamic
Host Configuration Protocol (DHCP).
There are several tools that can be used in the Internet
for debugging, We introduce two tools that use ICMP:
 Ping: We can use the ping program to find if a host is alive and
responding. We use ping here to see how it uses ICMP packets.
The source host sends ICMP echo-request messages; the
destination, if alive, responds with ICMP echo-reply messages.
The ping program sets the identifier field in the echo-request and
echo-reply message and starts the sequence number from 0; this
number is incremented by 1 each time a new message is sent.
 The traceroute program in UNIX or tracert in Windows
can be used to trace the path of a packet from a
source to the destination.
 It can find the IP addresses of all the routers that are
visited along the path.
 The program is usually set to check for the maximum
of 30 hops (routers) to be visited.
 The number of hops in the Internet is normally less
than this.
 The traceroute program gets help from two error-reporting
messages: time-exceeded and destination-unreachable.
 The traceroute is an application layer program, but only the
client program is needed, because, as we can see, the client
program never reaches the application layer in the destination
host.
 The traceroute application program is encapsulated in a UDP
user datagram, but traceroute intentionally uses a port number
that is not available at the destination.
 If there are n routers in the path, the traceroute
program sends (n + 1) messages.
 The first n messages are discarded by the n
routers, one by each router;
 the last message is discarded by the destination
host.
 The traceroute client program uses the (n + 1)
ICMP error-reporting messages received to find
the path between the routers.
 The first traceroute message is sent with time-to-live (TTL)
value set to 1; the message is discarded at the first router and
a time-exceeded ICMP error message is sent, from which the
traceroute program can find the IP address of the first router
and the router name
 The second traceroute message is sent with TTL set to 2,
which can find the IP address and the name of the second
router.
 Similarly, the third message can find the information about
router 3. The fourth message, however, reaches the
destination host.
 This host is also dropped, but for another reason. The
destination host cannot find the port number specified in the
UDP user datagram. This time ICMP sends a different message,
the destination-unreachable message with code 3 to show the
port number is not found.
 After receiving this different ICMP message, the traceroute
program knows that the final destination is reached.
 It uses the information in the received message to find the IP
address and the name of the final destination.
 also sets a timer to find the round-trip time for each router and
the destination. Most traceroute programs send three messages
to each device.
Ch 19   Network-layer protocols - section 2
 The tracert program in windows behaves
differently.
 The tracert messages are encapsulated directly
in IP datagrams.
 The tracert, like traceroute, sends echo-
request messages.
 However, when the last echo request reaches
the destination host, an echo replay message is
issued.
 In ICMP the checksum is calculated over the entire
message (header and data).
Ad

More Related Content

What's hot (20)

Ppt seminar noc
Ppt seminar nocPpt seminar noc
Ppt seminar noc
manjyanaikR
 
Intruders in cns. Various intrusion detection and prevention technique.pptx
Intruders in cns. Various intrusion detection and prevention technique.pptxIntruders in cns. Various intrusion detection and prevention technique.pptx
Intruders in cns. Various intrusion detection and prevention technique.pptx
SriK49
 
Chap 12 tcp
Chap 12 tcpChap 12 tcp
Chap 12 tcp
Sparsh Samir
 
Ch18
Ch18Ch18
Ch18
Joe Christensen
 
Ipsec
IpsecIpsec
Ipsec
Baidyanath Dutta
 
Quality of Service
Quality of ServiceQuality of Service
Quality of Service
Abhishek Wadhwa
 
Multicast routing
Multicast routingMulticast routing
Multicast routing
Gunasekara Reddy
 
wired lans
wired lanswired lans
wired lans
hoadqbk
 
Digital Signatures RSA DSS Algorithm Explained
Digital Signatures RSA DSS Algorithm ExplainedDigital Signatures RSA DSS Algorithm Explained
Digital Signatures RSA DSS Algorithm Explained
GoldenMIT
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarp
राहुल खेडेकर
 
Werksmans presentations on popi
Werksmans presentations on popiWerksmans presentations on popi
Werksmans presentations on popi
Werksmans Attorneys
 
ICMPV4
ICMPV4ICMPV4
ICMPV4
rajshreemuthiah
 
TCP - Transmission Control Protocol
TCP - Transmission Control ProtocolTCP - Transmission Control Protocol
TCP - Transmission Control Protocol
Peter R. Egli
 
Electronic mail security
Electronic mail securityElectronic mail security
Electronic mail security
Dr.Florence Dayana
 
Ch 18 intro to network layer - section 1
Ch 18   intro to network layer - section 1Ch 18   intro to network layer - section 1
Ch 18 intro to network layer - section 1
Hossam El-Deen Osama
 
Mac addresses(media access control)
Mac addresses(media access control)Mac addresses(media access control)
Mac addresses(media access control)
Ismail Mukiibi
 
Introduction to GDPR
Introduction to GDPRIntroduction to GDPR
Introduction to GDPR
Priyab Satoshi
 
Lecture #7: Bell Lapdula and Biba Model of Multilevel Security
Lecture #7: Bell Lapdula and Biba Model of Multilevel SecurityLecture #7: Bell Lapdula and Biba Model of Multilevel Security
Lecture #7: Bell Lapdula and Biba Model of Multilevel Security
Dr. Ramchandra Mangrulkar
 
Rip
RipRip
Rip
Brijesh Madaan
 
2.1 Data Mining-classification Basic concepts
2.1 Data Mining-classification Basic concepts2.1 Data Mining-classification Basic concepts
2.1 Data Mining-classification Basic concepts
Krish_ver2
 
Intruders in cns. Various intrusion detection and prevention technique.pptx
Intruders in cns. Various intrusion detection and prevention technique.pptxIntruders in cns. Various intrusion detection and prevention technique.pptx
Intruders in cns. Various intrusion detection and prevention technique.pptx
SriK49
 
wired lans
wired lanswired lans
wired lans
hoadqbk
 
Digital Signatures RSA DSS Algorithm Explained
Digital Signatures RSA DSS Algorithm ExplainedDigital Signatures RSA DSS Algorithm Explained
Digital Signatures RSA DSS Algorithm Explained
GoldenMIT
 
TCP - Transmission Control Protocol
TCP - Transmission Control ProtocolTCP - Transmission Control Protocol
TCP - Transmission Control Protocol
Peter R. Egli
 
Ch 18 intro to network layer - section 1
Ch 18   intro to network layer - section 1Ch 18   intro to network layer - section 1
Ch 18 intro to network layer - section 1
Hossam El-Deen Osama
 
Mac addresses(media access control)
Mac addresses(media access control)Mac addresses(media access control)
Mac addresses(media access control)
Ismail Mukiibi
 
Lecture #7: Bell Lapdula and Biba Model of Multilevel Security
Lecture #7: Bell Lapdula and Biba Model of Multilevel SecurityLecture #7: Bell Lapdula and Biba Model of Multilevel Security
Lecture #7: Bell Lapdula and Biba Model of Multilevel Security
Dr. Ramchandra Mangrulkar
 
2.1 Data Mining-classification Basic concepts
2.1 Data Mining-classification Basic concepts2.1 Data Mining-classification Basic concepts
2.1 Data Mining-classification Basic concepts
Krish_ver2
 

Viewers also liked (20)

Ch 18 intro to network layer - section 3
Ch 18   intro to network layer - section 3Ch 18   intro to network layer - section 3
Ch 18 intro to network layer - section 3
Hossam El-Deen Osama
 
Ch 18 intro to network layer - section 4
Ch 18   intro to network layer - section 4Ch 18   intro to network layer - section 4
Ch 18 intro to network layer - section 4
Hossam El-Deen Osama
 
Ch 18 intro to network layer - section 2
Ch 18   intro to network layer - section 2Ch 18   intro to network layer - section 2
Ch 18 intro to network layer - section 2
Hossam El-Deen Osama
 
Ch 18 intro to network layer - section 5
Ch 18   intro to network layer - section 5Ch 18   intro to network layer - section 5
Ch 18 intro to network layer - section 5
Hossam El-Deen Osama
 
Ch 20 UNICAST ROUTING SECTION 2
Ch 20   UNICAST ROUTING  SECTION  2Ch 20   UNICAST ROUTING  SECTION  2
Ch 20 UNICAST ROUTING SECTION 2
Hossam El-Deen Osama
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
guesta81d4b
 
Congetion Control.pptx
Congetion Control.pptxCongetion Control.pptx
Congetion Control.pptx
Naveen Dubey
 
Network Layer
Network LayerNetwork Layer
Network Layer
Ghaffar Khan
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
farimoin
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
Dulith Kasun
 
IEEE 802.1 x
IEEE 802.1 xIEEE 802.1 x
IEEE 802.1 x
Anwesh Dixit
 
Network Virtualization using Shortest Path Bridging
Network Virtualization using Shortest Path Bridging Network Virtualization using Shortest Path Bridging
Network Virtualization using Shortest Path Bridging
Motty Ben Atia
 
Pentesting layer 2 protocols
Pentesting layer 2 protocolsPentesting layer 2 protocols
Pentesting layer 2 protocols
Abdessamad TEMMAR
 
2008118090324 hk
2008118090324 hk2008118090324 hk
2008118090324 hk
Vivek Singh
 
Computer network ppt
Computer network pptComputer network ppt
Computer network ppt
Kashyap Davariya
 
Congestion control
Congestion controlCongestion control
Congestion control
Abhay Pai
 
Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
Mahesh Kumar Chelimilla
 
Network Layer
Network LayerNetwork Layer
Network Layer
Rutwik Jadhav
 
IPV4 Frame Format
IPV4 Frame FormatIPV4 Frame Format
IPV4 Frame Format
Aditya Rawat
 
IEEE 802 standards
IEEE 802 standardsIEEE 802 standards
IEEE 802 standards
Rosie Jane Enomar
 
Ch 18 intro to network layer - section 3
Ch 18   intro to network layer - section 3Ch 18   intro to network layer - section 3
Ch 18 intro to network layer - section 3
Hossam El-Deen Osama
 
Ch 18 intro to network layer - section 4
Ch 18   intro to network layer - section 4Ch 18   intro to network layer - section 4
Ch 18 intro to network layer - section 4
Hossam El-Deen Osama
 
Ch 18 intro to network layer - section 2
Ch 18   intro to network layer - section 2Ch 18   intro to network layer - section 2
Ch 18 intro to network layer - section 2
Hossam El-Deen Osama
 
Ch 18 intro to network layer - section 5
Ch 18   intro to network layer - section 5Ch 18   intro to network layer - section 5
Ch 18 intro to network layer - section 5
Hossam El-Deen Osama
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
guesta81d4b
 
Congetion Control.pptx
Congetion Control.pptxCongetion Control.pptx
Congetion Control.pptx
Naveen Dubey
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
farimoin
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
Dulith Kasun
 
Network Virtualization using Shortest Path Bridging
Network Virtualization using Shortest Path Bridging Network Virtualization using Shortest Path Bridging
Network Virtualization using Shortest Path Bridging
Motty Ben Atia
 
Pentesting layer 2 protocols
Pentesting layer 2 protocolsPentesting layer 2 protocols
Pentesting layer 2 protocols
Abdessamad TEMMAR
 
2008118090324 hk
2008118090324 hk2008118090324 hk
2008118090324 hk
Vivek Singh
 
Congestion control
Congestion controlCongestion control
Congestion control
Abhay Pai
 
Ad

Similar to Ch 19 Network-layer protocols - section 2 (20)

ICMP-IGMP protocols of Network Layer for ipv4
ICMP-IGMP protocols of Network Layer for ipv4ICMP-IGMP protocols of Network Layer for ipv4
ICMP-IGMP protocols of Network Layer for ipv4
AimanFatima200140
 
5. icmp
5. icmp5. icmp
5. icmp
Swati Arora
 
chapter6-1in the networksthavdbjdjdj.ppt
chapter6-1in the networksthavdbjdjdj.pptchapter6-1in the networksthavdbjdjdj.ppt
chapter6-1in the networksthavdbjdjdj.ppt
Mohammed586397
 
(Icmp) internet control message protocol version 4
(Icmp) internet control message protocol version 4(Icmp) internet control message protocol version 4
(Icmp) internet control message protocol version 4
Gouasmia Zakaria
 
Icmp
IcmpIcmp
Icmp
swarna sudha
 
Et3003 sem2-1314-8 network layers v (icmpv4)
Et3003 sem2-1314-8 network layers v (icmpv4)Et3003 sem2-1314-8 network layers v (icmpv4)
Et3003 sem2-1314-8 network layers v (icmpv4)
Tutun Juhana
 
Network Layer Part 6
Network Layer Part 6Network Layer Part 6
Network Layer Part 6
Tutun Juhana
 
IP has no mechanism for error reporting or error-correcting. ICMPv4 .pdf
IP has no mechanism for error reporting or error-correcting. ICMPv4 .pdfIP has no mechanism for error reporting or error-correcting. ICMPv4 .pdf
IP has no mechanism for error reporting or error-correcting. ICMPv4 .pdf
rishabjain5053
 
ICMP.ppt
ICMP.pptICMP.ppt
ICMP.ppt
AnilKumarD22
 
Ip and icmp
Ip and icmpIp and icmp
Ip and icmp
Programmer
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
ssuserf7cd2b
 
What are the specific ICMP errors that are generated during a tracero.docx
 What are the specific ICMP errors that are generated during a tracero.docx What are the specific ICMP errors that are generated during a tracero.docx
What are the specific ICMP errors that are generated during a tracero.docx
ajoy21
 
CREST CCT Exam Prep Notes
CREST CCT Exam Prep NotesCREST CCT Exam Prep Notes
CREST CCT Exam Prep Notes
NathanAn
 
Lecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignmentsLecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignments
Serious_SamSoul
 
New Creators
New CreatorsNew Creators
New Creators
guestf7a1f18
 
Icmp V4 And Icmp V6
Icmp V4 And Icmp V6Icmp V4 And Icmp V6
Icmp V4 And Icmp V6
Ram Dutt Shukla
 
As the packet travels through the TCP.docx
As the packet travels through the TCP.docxAs the packet travels through the TCP.docx
As the packet travels through the TCP.docx
laraibshaheen
 
Tcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication headerTcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication header
Faizan Shaikh
 
tcpheader-151221111244.pdf
tcpheader-151221111244.pdftcpheader-151221111244.pdf
tcpheader-151221111244.pdf
EnumulaBhargava1
 
Wireshark ip sept_15_2009
Wireshark ip sept_15_2009Wireshark ip sept_15_2009
Wireshark ip sept_15_2009
wab030
 
ICMP-IGMP protocols of Network Layer for ipv4
ICMP-IGMP protocols of Network Layer for ipv4ICMP-IGMP protocols of Network Layer for ipv4
ICMP-IGMP protocols of Network Layer for ipv4
AimanFatima200140
 
chapter6-1in the networksthavdbjdjdj.ppt
chapter6-1in the networksthavdbjdjdj.pptchapter6-1in the networksthavdbjdjdj.ppt
chapter6-1in the networksthavdbjdjdj.ppt
Mohammed586397
 
(Icmp) internet control message protocol version 4
(Icmp) internet control message protocol version 4(Icmp) internet control message protocol version 4
(Icmp) internet control message protocol version 4
Gouasmia Zakaria
 
Et3003 sem2-1314-8 network layers v (icmpv4)
Et3003 sem2-1314-8 network layers v (icmpv4)Et3003 sem2-1314-8 network layers v (icmpv4)
Et3003 sem2-1314-8 network layers v (icmpv4)
Tutun Juhana
 
Network Layer Part 6
Network Layer Part 6Network Layer Part 6
Network Layer Part 6
Tutun Juhana
 
IP has no mechanism for error reporting or error-correcting. ICMPv4 .pdf
IP has no mechanism for error reporting or error-correcting. ICMPv4 .pdfIP has no mechanism for error reporting or error-correcting. ICMPv4 .pdf
IP has no mechanism for error reporting or error-correcting. ICMPv4 .pdf
rishabjain5053
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
ssuserf7cd2b
 
What are the specific ICMP errors that are generated during a tracero.docx
 What are the specific ICMP errors that are generated during a tracero.docx What are the specific ICMP errors that are generated during a tracero.docx
What are the specific ICMP errors that are generated during a tracero.docx
ajoy21
 
CREST CCT Exam Prep Notes
CREST CCT Exam Prep NotesCREST CCT Exam Prep Notes
CREST CCT Exam Prep Notes
NathanAn
 
Lecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignmentsLecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignments
Serious_SamSoul
 
As the packet travels through the TCP.docx
As the packet travels through the TCP.docxAs the packet travels through the TCP.docx
As the packet travels through the TCP.docx
laraibshaheen
 
Tcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication headerTcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication header
Faizan Shaikh
 
tcpheader-151221111244.pdf
tcpheader-151221111244.pdftcpheader-151221111244.pdf
tcpheader-151221111244.pdf
EnumulaBhargava1
 
Wireshark ip sept_15_2009
Wireshark ip sept_15_2009Wireshark ip sept_15_2009
Wireshark ip sept_15_2009
wab030
 
Ad

Recently uploaded (20)

How To Maximize Sales Performance using Odoo 18 Diverse views in sales module
How To Maximize Sales Performance using Odoo 18 Diverse views in sales moduleHow To Maximize Sales Performance using Odoo 18 Diverse views in sales module
How To Maximize Sales Performance using Odoo 18 Diverse views in sales module
Celine George
 
Final Evaluation.docx...........................
Final Evaluation.docx...........................Final Evaluation.docx...........................
Final Evaluation.docx...........................
l1bbyburrell
 
Peer Assessment_ Unit 2 Skills Development for Live Performance - for Libby.docx
Peer Assessment_ Unit 2 Skills Development for Live Performance - for Libby.docxPeer Assessment_ Unit 2 Skills Development for Live Performance - for Libby.docx
Peer Assessment_ Unit 2 Skills Development for Live Performance - for Libby.docx
19lburrell
 
Search Matching Applicants in Odoo 18 - Odoo Slides
Search Matching Applicants in Odoo 18 - Odoo SlidesSearch Matching Applicants in Odoo 18 - Odoo Slides
Search Matching Applicants in Odoo 18 - Odoo Slides
Celine George
 
How to Configure Extra Steps During Checkout in Odoo 18 Website
How to Configure Extra Steps During Checkout in Odoo 18 WebsiteHow to Configure Extra Steps During Checkout in Odoo 18 Website
How to Configure Extra Steps During Checkout in Odoo 18 Website
Celine George
 
Chemotherapy of Malignancy -Anticancer.pptx
Chemotherapy of Malignancy -Anticancer.pptxChemotherapy of Malignancy -Anticancer.pptx
Chemotherapy of Malignancy -Anticancer.pptx
Mayuri Chavan
 
libbys peer assesment.docx..............
libbys peer assesment.docx..............libbys peer assesment.docx..............
libbys peer assesment.docx..............
19lburrell
 
Redesigning Education as a Cognitive Ecosystem: Practical Insights into Emerg...
Redesigning Education as a Cognitive Ecosystem: Practical Insights into Emerg...Redesigning Education as a Cognitive Ecosystem: Practical Insights into Emerg...
Redesigning Education as a Cognitive Ecosystem: Practical Insights into Emerg...
Leonel Morgado
 
2025 The Senior Landscape and SET plan preparations.pptx
2025 The Senior Landscape and SET plan preparations.pptx2025 The Senior Landscape and SET plan preparations.pptx
2025 The Senior Landscape and SET plan preparations.pptx
mansk2
 
MICROBIAL GENETICS -tranformation and tranduction.pdf
MICROBIAL GENETICS -tranformation and tranduction.pdfMICROBIAL GENETICS -tranformation and tranduction.pdf
MICROBIAL GENETICS -tranformation and tranduction.pdf
DHARMENDRA SAHU
 
Rebuilding the library community in a post-Twitter world
Rebuilding the library community in a post-Twitter worldRebuilding the library community in a post-Twitter world
Rebuilding the library community in a post-Twitter world
Ned Potter
 
ANTI-VIRAL DRUGS unit 3 Pharmacology 3.pptx
ANTI-VIRAL DRUGS unit 3 Pharmacology 3.pptxANTI-VIRAL DRUGS unit 3 Pharmacology 3.pptx
ANTI-VIRAL DRUGS unit 3 Pharmacology 3.pptx
Mayuri Chavan
 
MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)
MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)
MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)
Dr. Nasir Mustafa
 
INSULIN.pptx by Arka Das (Bsc. Critical care technology)
INSULIN.pptx by Arka Das (Bsc. Critical care technology)INSULIN.pptx by Arka Das (Bsc. Critical care technology)
INSULIN.pptx by Arka Das (Bsc. Critical care technology)
ArkaDas54
 
Peer Assesment- Libby.docx..............
Peer Assesment- Libby.docx..............Peer Assesment- Libby.docx..............
Peer Assesment- Libby.docx..............
19lburrell
 
Bipolar Junction Transistors (BJTs): Basics, Construction & Configurations
Bipolar Junction Transistors (BJTs): Basics, Construction & ConfigurationsBipolar Junction Transistors (BJTs): Basics, Construction & Configurations
Bipolar Junction Transistors (BJTs): Basics, Construction & Configurations
GS Virdi
 
How to Use Upgrade Code Command in Odoo 18
How to Use Upgrade Code Command in Odoo 18How to Use Upgrade Code Command in Odoo 18
How to Use Upgrade Code Command in Odoo 18
Celine George
 
Origin of Brahmi script: A breaking down of various theories
Origin of Brahmi script: A breaking down of various theoriesOrigin of Brahmi script: A breaking down of various theories
Origin of Brahmi script: A breaking down of various theories
PrachiSontakke5
 
How to Manage Manual Reordering Rule in Odoo 18 Inventory
How to Manage Manual Reordering Rule in Odoo 18 InventoryHow to Manage Manual Reordering Rule in Odoo 18 Inventory
How to Manage Manual Reordering Rule in Odoo 18 Inventory
Celine George
 
How To Maximize Sales Performance using Odoo 18 Diverse views in sales module
How To Maximize Sales Performance using Odoo 18 Diverse views in sales moduleHow To Maximize Sales Performance using Odoo 18 Diverse views in sales module
How To Maximize Sales Performance using Odoo 18 Diverse views in sales module
Celine George
 
Final Evaluation.docx...........................
Final Evaluation.docx...........................Final Evaluation.docx...........................
Final Evaluation.docx...........................
l1bbyburrell
 
Peer Assessment_ Unit 2 Skills Development for Live Performance - for Libby.docx
Peer Assessment_ Unit 2 Skills Development for Live Performance - for Libby.docxPeer Assessment_ Unit 2 Skills Development for Live Performance - for Libby.docx
Peer Assessment_ Unit 2 Skills Development for Live Performance - for Libby.docx
19lburrell
 
Search Matching Applicants in Odoo 18 - Odoo Slides
Search Matching Applicants in Odoo 18 - Odoo SlidesSearch Matching Applicants in Odoo 18 - Odoo Slides
Search Matching Applicants in Odoo 18 - Odoo Slides
Celine George
 
How to Configure Extra Steps During Checkout in Odoo 18 Website
How to Configure Extra Steps During Checkout in Odoo 18 WebsiteHow to Configure Extra Steps During Checkout in Odoo 18 Website
How to Configure Extra Steps During Checkout in Odoo 18 Website
Celine George
 
Chemotherapy of Malignancy -Anticancer.pptx
Chemotherapy of Malignancy -Anticancer.pptxChemotherapy of Malignancy -Anticancer.pptx
Chemotherapy of Malignancy -Anticancer.pptx
Mayuri Chavan
 
libbys peer assesment.docx..............
libbys peer assesment.docx..............libbys peer assesment.docx..............
libbys peer assesment.docx..............
19lburrell
 
Redesigning Education as a Cognitive Ecosystem: Practical Insights into Emerg...
Redesigning Education as a Cognitive Ecosystem: Practical Insights into Emerg...Redesigning Education as a Cognitive Ecosystem: Practical Insights into Emerg...
Redesigning Education as a Cognitive Ecosystem: Practical Insights into Emerg...
Leonel Morgado
 
2025 The Senior Landscape and SET plan preparations.pptx
2025 The Senior Landscape and SET plan preparations.pptx2025 The Senior Landscape and SET plan preparations.pptx
2025 The Senior Landscape and SET plan preparations.pptx
mansk2
 
MICROBIAL GENETICS -tranformation and tranduction.pdf
MICROBIAL GENETICS -tranformation and tranduction.pdfMICROBIAL GENETICS -tranformation and tranduction.pdf
MICROBIAL GENETICS -tranformation and tranduction.pdf
DHARMENDRA SAHU
 
Rebuilding the library community in a post-Twitter world
Rebuilding the library community in a post-Twitter worldRebuilding the library community in a post-Twitter world
Rebuilding the library community in a post-Twitter world
Ned Potter
 
ANTI-VIRAL DRUGS unit 3 Pharmacology 3.pptx
ANTI-VIRAL DRUGS unit 3 Pharmacology 3.pptxANTI-VIRAL DRUGS unit 3 Pharmacology 3.pptx
ANTI-VIRAL DRUGS unit 3 Pharmacology 3.pptx
Mayuri Chavan
 
MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)
MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)
MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)
Dr. Nasir Mustafa
 
INSULIN.pptx by Arka Das (Bsc. Critical care technology)
INSULIN.pptx by Arka Das (Bsc. Critical care technology)INSULIN.pptx by Arka Das (Bsc. Critical care technology)
INSULIN.pptx by Arka Das (Bsc. Critical care technology)
ArkaDas54
 
Peer Assesment- Libby.docx..............
Peer Assesment- Libby.docx..............Peer Assesment- Libby.docx..............
Peer Assesment- Libby.docx..............
19lburrell
 
Bipolar Junction Transistors (BJTs): Basics, Construction & Configurations
Bipolar Junction Transistors (BJTs): Basics, Construction & ConfigurationsBipolar Junction Transistors (BJTs): Basics, Construction & Configurations
Bipolar Junction Transistors (BJTs): Basics, Construction & Configurations
GS Virdi
 
How to Use Upgrade Code Command in Odoo 18
How to Use Upgrade Code Command in Odoo 18How to Use Upgrade Code Command in Odoo 18
How to Use Upgrade Code Command in Odoo 18
Celine George
 
Origin of Brahmi script: A breaking down of various theories
Origin of Brahmi script: A breaking down of various theoriesOrigin of Brahmi script: A breaking down of various theories
Origin of Brahmi script: A breaking down of various theories
PrachiSontakke5
 
How to Manage Manual Reordering Rule in Odoo 18 Inventory
How to Manage Manual Reordering Rule in Odoo 18 InventoryHow to Manage Manual Reordering Rule in Odoo 18 Inventory
How to Manage Manual Reordering Rule in Odoo 18 Inventory
Celine George
 

Ch 19 Network-layer protocols - section 2

  • 2. INTRO TO ICMPv4  MESSAGES - Error Reporting Messages. - Deprecated Messages. - Query messages  Debugging Tools. - Ping. - Trace route or Tracert.  ICMP Checksum
  • 3.  IP protocol has no built-in mechanism to notify the original host.  The IP protocol also lacks a mechanism for host and management queries.  (ICMPv4) has been designed to compensate for the above two deficiencies.  It is a companion to the IP protocol. ICMP itself is a network-layer protocol.
  • 4.  messages are not passed directly to the data- link layer as would be expected.  the messages are first encapsulated inside IP datagrams before going to the lower layer.  When an IP datagram encapsulates an ICMP message, the value of the protocol field in the IP datagram is set to 1 to indicate that the IP payroll is an ICMP message.
  • 5.  ICMP messages are divided into two broad categories:  error-reporting messages: report problems that a router or a host(destination) may encounter when it processes an IP packet.  query messages: messages, which help a host or a network manager get specific information from a router or another host.
  • 6.  An ICMP message has an 8-byte header and a variable-size data section.  Type, defines the type of the message.  Code field specifies the reason for the particular message type.  The last common field is the Checksum field.
  • 7.  In error messages the data section carries information for finding the original packet that had the error.  In query messages, the data section carries extra information based on the type of query.
  • 8.  The main responsibilities of ICMP is to report some errors that may occur during the processing of the IP datagram.  Error messages are always sent to the original source because the only information available in the datagram about the route is the source and destination IP addresses.  Note that all error messages contain a data section that includes the IP header of the original datagram plus the first 8 bytes of data in that datagram.
  • 9. ICMP follows some rules in reporting messages.  First, no error message will be generated for a datagram having a multicast address or special address.  Second, no ICMP error message will be generated in response to a datagram carrying an ICMP error message.  Third, no ICMP error message will be generated for a fragmented datagram that is not the first fragment.
  • 10. ICMP forms an error packet:  Destination Unreachable: This message uses different codes (0 to 15) to define the type of error message and the reason why a datagram has not reached its final destination. This may happen, for example, when we use the HTTP protocol to access a web page, but the server is down. The message “destination host is not reachable” is created and sent back to the source.
  • 11. ICMP forms an error packet:  Source Quench: informs the sender that the network has encountered congestion and the datagram has been dropped; The source needs to slow down sending more datagrams. In other words, ICMP adds a kind of congestion control mechanism to the IP protocol by using this type of message.  Parameter Problem: sent when either there is a problem in the header of a datagram (code 0) or some options are missing or cannot be interpreted (code 1).
  • 12. ICMP forms an error packet:  Redirection Message: used when the source uses a wrong router to send out its message. The router redirects the message to the appropriate router, but informs the source that it needs to change its default router in the future. The IP address of the default router is sent in the message.
  • 13.  query messages in ICMP can be used independently without relation to an IP datagram.  needs to be encapsulated in a datagram, as a carrier.  used to probe or test the liveliness of hosts or routers in the Internet,  find the one-way or the round-trip time for an IP datagram between two devices, or even find out whether the clocks in two devices are synchronized.
  • 14.  query messages come in pairs: request and reply.  The echo request (type 8)  The echo reply (type 0)  pair of messages are used by a host or a router to test the liveliness of another host or router.  A host or router sends an echo request message to another host or router; if the latter is alive, it responds with an echo reply message.
  • 15.  The timestamp request (type 13) and the timestamp reply (type 14) pair of messages are used to find the round-trip time between two devices or to check whether the clocks in two devices are synchronized.  The timestamp request message sends a 32-bit number, which defines the time the message is sent.  The timestamp reply resends that number, but also includes two new 32-bit numbers representing the time the request was received and the time the response was sent.  If all timestamps represent Universal time, the sender can calculate the one-way and round-trip time.
  • 16. Three pairs of messages are declared obsolete by IETF: 1. Information request and replay messages are not used today because their duties are done by the Address Resolution Protocol (ARP. 2. Address mask request and reply messages are not used today because their duties are done by the Dynamic Host Configuration Protocol (DHCP). 3. Router solicitation and advertisement messages are not used today because their duties are done by the Dynamic Host Configuration Protocol (DHCP).
  • 17. There are several tools that can be used in the Internet for debugging, We introduce two tools that use ICMP:  Ping: We can use the ping program to find if a host is alive and responding. We use ping here to see how it uses ICMP packets. The source host sends ICMP echo-request messages; the destination, if alive, responds with ICMP echo-reply messages. The ping program sets the identifier field in the echo-request and echo-reply message and starts the sequence number from 0; this number is incremented by 1 each time a new message is sent.
  • 18.  The traceroute program in UNIX or tracert in Windows can be used to trace the path of a packet from a source to the destination.  It can find the IP addresses of all the routers that are visited along the path.  The program is usually set to check for the maximum of 30 hops (routers) to be visited.  The number of hops in the Internet is normally less than this.
  • 19.  The traceroute program gets help from two error-reporting messages: time-exceeded and destination-unreachable.  The traceroute is an application layer program, but only the client program is needed, because, as we can see, the client program never reaches the application layer in the destination host.  The traceroute application program is encapsulated in a UDP user datagram, but traceroute intentionally uses a port number that is not available at the destination.
  • 20.  If there are n routers in the path, the traceroute program sends (n + 1) messages.  The first n messages are discarded by the n routers, one by each router;  the last message is discarded by the destination host.  The traceroute client program uses the (n + 1) ICMP error-reporting messages received to find the path between the routers.
  • 21.  The first traceroute message is sent with time-to-live (TTL) value set to 1; the message is discarded at the first router and a time-exceeded ICMP error message is sent, from which the traceroute program can find the IP address of the first router and the router name  The second traceroute message is sent with TTL set to 2, which can find the IP address and the name of the second router.  Similarly, the third message can find the information about router 3. The fourth message, however, reaches the destination host.
  • 22.  This host is also dropped, but for another reason. The destination host cannot find the port number specified in the UDP user datagram. This time ICMP sends a different message, the destination-unreachable message with code 3 to show the port number is not found.  After receiving this different ICMP message, the traceroute program knows that the final destination is reached.  It uses the information in the received message to find the IP address and the name of the final destination.  also sets a timer to find the round-trip time for each router and the destination. Most traceroute programs send three messages to each device.
  • 24.  The tracert program in windows behaves differently.  The tracert messages are encapsulated directly in IP datagrams.  The tracert, like traceroute, sends echo- request messages.  However, when the last echo request reaches the destination host, an echo replay message is issued.
  • 25.  In ICMP the checksum is calculated over the entire message (header and data).
  翻译: