SlideShare a Scribd company logo
1 of 31
4

Tutun Juhana
Telecommunication Engineering

Network Layer (Part 6)

School of Electrical Engineering & Informatics
Institut Teknologi Bandung

Computer Networks
INTERNET CONTROL MESSAGE
PROTOCOL VERSION 4 (ICMPV4)
The value of the protocol field in the IP datagram is 1 to indicate
that the IP data is an ICMP message
3
Messages

includes the IP
header of
the original
datagram + the first
8 bytes of data in
that datagram

4
Provides port numbers
(UDP and TCP) and
sequence number
(TCP).
5
ERROR REPORTING
MESSAGES
6
Error Reporting Messages

• No ICMP error message will be generated in response to a
datagram carrying an ICMP error message.
• No ICMP error message will be generated for a fragmented
datagram that is not the first fragment.
• No ICMP error message will be generated for a datagram having a
multicast address.
• No ICMP error message will be generated for a datagram having a
special address such as 127.0.0.0 or 0.0.0.0

7
Destination Unreachable

Note: For codes, please refer to Forouzan’s

8
Source Quench

9
Time Exceeded




10
11
Parameter Problem
If a router or the destination host discovers an ambiguous
or missing value in any field of the datagram, it discards the
datagram and sends a parameter-problem message back
to the source

12
Redirection

13
QUERY MESSAGES

14
Query Messages
• ICMP can also diagnose some network
problems  accomplished through the
query messages

15
Echo Request and Reply
• The echo-request and echo-reply messages are
designed for diagnostic purposes
• Network managers and users utilize this pair of
messages to identify network problems.
• The combination of echo-request and echo-reply
messages determines whether two systems
(hosts or routers) can communicate with each
other.

16
17
Timestamp Request and Reply
• Two machines (hosts or routers) can
use the timestamp-request and
timestamp-reply messages to:
– determine the round-trip time needed for
an IP datagram to travel between them
– synchronize the clocks in two machines

18
19
20
21
22
CHECKSUM

23
• In ICMP the checksum is calculated over
the entire message (header and data)

24
25
26
DEBUGGING TOOLS

27
Ping
• We can use the ping program to find if a host is alive and
responding
• The source host sends ICMP echo request messages
(type: 8, code: 0); the destination, if alive, responds with
ICMP echo reply messages
• The ping program sets the identifier field in the echo
request and reply message and starts the sequence
number from 0; this number is incremented by one each
time a new message is sent
• Note that ping can calculate the round-trip time. It inserts
the sending time in the data section of the message.
When the packet arrives it subtracts the arrival time from
the departure time to get the round-trip time (RTT).
28
29
Traceroute
• The traceroute program in UNIX or tracert
in Windows can be used to trace the route
of a packet from the source to the
destination

30
31

More Related Content

What's hot (20)

Icmp V4 And Icmp V6
Icmp V4 And Icmp V6Icmp V4 And Icmp V6
Icmp V4 And Icmp V6
 
Ch09
Ch09Ch09
Ch09
 
ICMP
ICMP ICMP
ICMP
 
5. icmp
5. icmp5. icmp
5. icmp
 
Node finder presentation
Node finder presentationNode finder presentation
Node finder presentation
 
icmp , igmp
icmp , igmpicmp , igmp
icmp , igmp
 
New Creators
New CreatorsNew Creators
New Creators
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
 
Address resolution protocol
Address resolution protocolAddress resolution protocol
Address resolution protocol
 
Tcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication headerTcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication header
 
IGMP
IGMPIGMP
IGMP
 
Ch10
Ch10Ch10
Ch10
 
Gratuitous Address Resolution Protocol(G-ARP)
Gratuitous Address Resolution Protocol(G-ARP) Gratuitous Address Resolution Protocol(G-ARP)
Gratuitous Address Resolution Protocol(G-ARP)
 
Arp spoofing
Arp spoofingArp spoofing
Arp spoofing
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarp
 
Features of tcp (part 2) .68
Features of tcp  (part 2) .68Features of tcp  (part 2) .68
Features of tcp (part 2) .68
 
Ch07
Ch07Ch07
Ch07
 
Computer networks protocols
Computer networks protocolsComputer networks protocols
Computer networks protocols
 
Intake 38 11
Intake 38 11Intake 38 11
Intake 38 11
 

Viewers also liked

Et3003 sem2-1314-4 network layers i (ipv4 addressing)
Et3003 sem2-1314-4 network layers i (ipv4 addressing)Et3003 sem2-1314-4 network layers i (ipv4 addressing)
Et3003 sem2-1314-4 network layers i (ipv4 addressing)Tutun Juhana
 
Network layer Part 7
Network layer Part 7Network layer Part 7
Network layer Part 7Tutun Juhana
 
Network layer Part 2
Network layer Part 2Network layer Part 2
Network layer Part 2Tutun Juhana
 
Network Layer Part 1
Network Layer Part 1Network Layer Part 1
Network Layer Part 1Tutun Juhana
 
Network Layer Part 4
Network Layer Part 4Network Layer Part 4
Network Layer Part 4Tutun Juhana
 
network layer description and features including protocols advantages
network layer description and features including protocols advantagesnetwork layer description and features including protocols advantages
network layer description and features including protocols advantagesaiswarya chelikani
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things SecurityTutun Juhana
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networksguesta81d4b
 

Viewers also liked (11)

Et3003 sem2-1314-4 network layers i (ipv4 addressing)
Et3003 sem2-1314-4 network layers i (ipv4 addressing)Et3003 sem2-1314-4 network layers i (ipv4 addressing)
Et3003 sem2-1314-4 network layers i (ipv4 addressing)
 
Network layer Part 7
Network layer Part 7Network layer Part 7
Network layer Part 7
 
Network layer Part 2
Network layer Part 2Network layer Part 2
Network layer Part 2
 
Chp4
Chp4Chp4
Chp4
 
Network Layer Part 1
Network Layer Part 1Network Layer Part 1
Network Layer Part 1
 
Network Layer Part 4
Network Layer Part 4Network Layer Part 4
Network Layer Part 4
 
network layer description and features including protocols advantages
network layer description and features including protocols advantagesnetwork layer description and features including protocols advantages
network layer description and features including protocols advantages
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things Security
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 

Similar to Network Layer Part 6

Et3003 sem2-1314-8 network layers v (icmpv4)
Et3003 sem2-1314-8 network layers v (icmpv4)Et3003 sem2-1314-8 network layers v (icmpv4)
Et3003 sem2-1314-8 network layers v (icmpv4)Tutun Juhana
 
Ch 19 Network-layer protocols - section 2
Ch 19   Network-layer protocols - section 2Ch 19   Network-layer protocols - section 2
Ch 19 Network-layer protocols - section 2Hossam El-Deen Osama
 
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docxWireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docxalanfhall8953
 
Internet Protocol.pdf
Internet Protocol.pdfInternet Protocol.pdf
Internet Protocol.pdfBIT DURG
 
Wireshark ip sept_15_2009
Wireshark ip sept_15_2009Wireshark ip sept_15_2009
Wireshark ip sept_15_2009wab030
 
Lecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignmentsLecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignmentsSerious_SamSoul
 
1.1.2 - Concept of Network and TCP_IP Model (2).pptx
1.1.2 - Concept of Network and TCP_IP Model (2).pptx1.1.2 - Concept of Network and TCP_IP Model (2).pptx
1.1.2 - Concept of Network and TCP_IP Model (2).pptxVINAYTANWAR18
 
Wireshark Lab IP v6.0 Supplement to Computer Networking.docx
Wireshark Lab IP v6.0  Supplement to Computer Networking.docxWireshark Lab IP v6.0  Supplement to Computer Networking.docx
Wireshark Lab IP v6.0 Supplement to Computer Networking.docxalanfhall8953
 
What are the specific ICMP errors that are generated during a tracero.docx
 What are the specific ICMP errors that are generated during a tracero.docx What are the specific ICMP errors that are generated during a tracero.docx
What are the specific ICMP errors that are generated during a tracero.docxajoy21
 
NP - Unit 3 - Forwarding Datagram and ICMP
NP - Unit 3 - Forwarding Datagram and ICMPNP - Unit 3 - Forwarding Datagram and ICMP
NP - Unit 3 - Forwarding Datagram and ICMPhamsa nandhini
 

Similar to Network Layer Part 6 (20)

Et3003 sem2-1314-8 network layers v (icmpv4)
Et3003 sem2-1314-8 network layers v (icmpv4)Et3003 sem2-1314-8 network layers v (icmpv4)
Et3003 sem2-1314-8 network layers v (icmpv4)
 
ICMP.ppt
ICMP.pptICMP.ppt
ICMP.ppt
 
Ch 19 Network-layer protocols - section 2
Ch 19   Network-layer protocols - section 2Ch 19   Network-layer protocols - section 2
Ch 19 Network-layer protocols - section 2
 
icmp protocol.ppt
icmp protocol.ppticmp protocol.ppt
icmp protocol.ppt
 
Icmp
IcmpIcmp
Icmp
 
Icmp
IcmpIcmp
Icmp
 
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docxWireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
 
Internet Protocol.pdf
Internet Protocol.pdfInternet Protocol.pdf
Internet Protocol.pdf
 
Respostas wireshark icmp
Respostas wireshark icmpRespostas wireshark icmp
Respostas wireshark icmp
 
Lecture-05.pdf
Lecture-05.pdfLecture-05.pdf
Lecture-05.pdf
 
Wireshark ip sept_15_2009
Wireshark ip sept_15_2009Wireshark ip sept_15_2009
Wireshark ip sept_15_2009
 
Lecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignmentsLecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignments
 
QSpiders - Upper layer-protocols
QSpiders - Upper layer-protocolsQSpiders - Upper layer-protocols
QSpiders - Upper layer-protocols
 
1.1.2 - Concept of Network and TCP_IP Model (2).pptx
1.1.2 - Concept of Network and TCP_IP Model (2).pptx1.1.2 - Concept of Network and TCP_IP Model (2).pptx
1.1.2 - Concept of Network and TCP_IP Model (2).pptx
 
Wireshark Lab IP v6.0 Supplement to Computer Networking.docx
Wireshark Lab IP v6.0  Supplement to Computer Networking.docxWireshark Lab IP v6.0  Supplement to Computer Networking.docx
Wireshark Lab IP v6.0 Supplement to Computer Networking.docx
 
What are the specific ICMP errors that are generated during a tracero.docx
 What are the specific ICMP errors that are generated during a tracero.docx What are the specific ICMP errors that are generated during a tracero.docx
What are the specific ICMP errors that are generated during a tracero.docx
 
Osi model
Osi modelOsi model
Osi model
 
Internet Protocol
Internet ProtocolInternet Protocol
Internet Protocol
 
TCP/IP and UDP protocols
TCP/IP and UDP protocolsTCP/IP and UDP protocols
TCP/IP and UDP protocols
 
NP - Unit 3 - Forwarding Datagram and ICMP
NP - Unit 3 - Forwarding Datagram and ICMPNP - Unit 3 - Forwarding Datagram and ICMP
NP - Unit 3 - Forwarding Datagram and ICMP
 

More from Tutun Juhana

What should you prepare for industry 4.0 era
What should you prepare for industry 4.0 eraWhat should you prepare for industry 4.0 era
What should you prepare for industry 4.0 eraTutun Juhana
 
Et4045-3-attacks-2
Et4045-3-attacks-2Et4045-3-attacks-2
Et4045-3-attacks-2Tutun Juhana
 
ET4045-3-attacks-1
ET4045-3-attacks-1ET4045-3-attacks-1
ET4045-3-attacks-1Tutun Juhana
 
ET4045-2-cryptography-3
ET4045-2-cryptography-3ET4045-2-cryptography-3
ET4045-2-cryptography-3Tutun Juhana
 
ET4045-2-cryptography-2
ET4045-2-cryptography-2ET4045-2-cryptography-2
ET4045-2-cryptography-2Tutun Juhana
 
ET4045-2-cryptography-1-2014
ET4045-2-cryptography-1-2014ET4045-2-cryptography-1-2014
ET4045-2-cryptography-1-2014Tutun Juhana
 
ET4045-1-Introduction-2014
ET4045-1-Introduction-2014ET4045-1-Introduction-2014
ET4045-1-Introduction-2014Tutun Juhana
 
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)Tutun Juhana
 
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)Tutun Juhana
 
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)Tutun Juhana
 
Introduction to Computer Networks (Lecture #1 ET3003 Sem1 2014/2015)
Introduction to Computer Networks (Lecture #1 ET3003 Sem1 2014/2015)Introduction to Computer Networks (Lecture #1 ET3003 Sem1 2014/2015)
Introduction to Computer Networks (Lecture #1 ET3003 Sem1 2014/2015)Tutun Juhana
 
Et3003 sem2-1314-10 vlans
Et3003 sem2-1314-10 vlansEt3003 sem2-1314-10 vlans
Et3003 sem2-1314-10 vlansTutun Juhana
 
Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)Tutun Juhana
 
Et3003 sem2-1314-7 network layers iv (ipv4)
Et3003 sem2-1314-7 network layers iv (ipv4)Et3003 sem2-1314-7 network layers iv (ipv4)
Et3003 sem2-1314-7 network layers iv (ipv4)Tutun Juhana
 
Et3003 sem2-1314-6 network layers iii (arp)
Et3003 sem2-1314-6 network layers iii (arp)Et3003 sem2-1314-6 network layers iii (arp)
Et3003 sem2-1314-6 network layers iii (arp)Tutun Juhana
 
Et3003 sem2-1314-5 network layers ii (intro to routing)
Et3003 sem2-1314-5 network layers ii (intro to routing)Et3003 sem2-1314-5 network layers ii (intro to routing)
Et3003 sem2-1314-5 network layers ii (intro to routing)Tutun Juhana
 
Et3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernetsEt3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernetsTutun Juhana
 
ET3003-1 introduction (Semester II 2013-2014)
ET3003-1 introduction (Semester II 2013-2014)ET3003-1 introduction (Semester II 2013-2014)
ET3003-1 introduction (Semester II 2013-2014)Tutun Juhana
 
ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)Tutun Juhana
 

More from Tutun Juhana (20)

What should you prepare for industry 4.0 era
What should you prepare for industry 4.0 eraWhat should you prepare for industry 4.0 era
What should you prepare for industry 4.0 era
 
Et4045-3-attacks-2
Et4045-3-attacks-2Et4045-3-attacks-2
Et4045-3-attacks-2
 
ET4045-3-attacks-1
ET4045-3-attacks-1ET4045-3-attacks-1
ET4045-3-attacks-1
 
ET4045-2-cryptography-3
ET4045-2-cryptography-3ET4045-2-cryptography-3
ET4045-2-cryptography-3
 
ET4045-2-cryptography-2
ET4045-2-cryptography-2ET4045-2-cryptography-2
ET4045-2-cryptography-2
 
ET4045-2-cryptography-1-2014
ET4045-2-cryptography-1-2014ET4045-2-cryptography-1-2014
ET4045-2-cryptography-1-2014
 
ET4045-1-Introduction-2014
ET4045-1-Introduction-2014ET4045-1-Introduction-2014
ET4045-1-Introduction-2014
 
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
 
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
 
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
 
Introduction to Computer Networks (Lecture #1 ET3003 Sem1 2014/2015)
Introduction to Computer Networks (Lecture #1 ET3003 Sem1 2014/2015)Introduction to Computer Networks (Lecture #1 ET3003 Sem1 2014/2015)
Introduction to Computer Networks (Lecture #1 ET3003 Sem1 2014/2015)
 
Et3003 sem2-1314-10 vlans
Et3003 sem2-1314-10 vlansEt3003 sem2-1314-10 vlans
Et3003 sem2-1314-10 vlans
 
Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)
 
Et3003 sem2-1314-7 network layers iv (ipv4)
Et3003 sem2-1314-7 network layers iv (ipv4)Et3003 sem2-1314-7 network layers iv (ipv4)
Et3003 sem2-1314-7 network layers iv (ipv4)
 
Et3003 sem2-1314-6 network layers iii (arp)
Et3003 sem2-1314-6 network layers iii (arp)Et3003 sem2-1314-6 network layers iii (arp)
Et3003 sem2-1314-6 network layers iii (arp)
 
Et3003 sem2-1314-5 network layers ii (intro to routing)
Et3003 sem2-1314-5 network layers ii (intro to routing)Et3003 sem2-1314-5 network layers ii (intro to routing)
Et3003 sem2-1314-5 network layers ii (intro to routing)
 
Et3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernetsEt3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernets
 
ET3003-1 introduction (Semester II 2013-2014)
ET3003-1 introduction (Semester II 2013-2014)ET3003-1 introduction (Semester II 2013-2014)
ET3003-1 introduction (Semester II 2013-2014)
 
ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)
 
IPv6 Introduction
IPv6 IntroductionIPv6 Introduction
IPv6 Introduction
 

Network Layer Part 6

  • 1. 4 Tutun Juhana Telecommunication Engineering Network Layer (Part 6) School of Electrical Engineering & Informatics Institut Teknologi Bandung Computer Networks
  • 3. The value of the protocol field in the IP datagram is 1 to indicate that the IP data is an ICMP message 3
  • 4. Messages includes the IP header of the original datagram + the first 8 bytes of data in that datagram 4
  • 5. Provides port numbers (UDP and TCP) and sequence number (TCP). 5
  • 7. Error Reporting Messages • No ICMP error message will be generated in response to a datagram carrying an ICMP error message. • No ICMP error message will be generated for a fragmented datagram that is not the first fragment. • No ICMP error message will be generated for a datagram having a multicast address. • No ICMP error message will be generated for a datagram having a special address such as 127.0.0.0 or 0.0.0.0 7
  • 8. Destination Unreachable Note: For codes, please refer to Forouzan’s 8
  • 11. 11
  • 12. Parameter Problem If a router or the destination host discovers an ambiguous or missing value in any field of the datagram, it discards the datagram and sends a parameter-problem message back to the source 12
  • 15. Query Messages • ICMP can also diagnose some network problems  accomplished through the query messages 15
  • 16. Echo Request and Reply • The echo-request and echo-reply messages are designed for diagnostic purposes • Network managers and users utilize this pair of messages to identify network problems. • The combination of echo-request and echo-reply messages determines whether two systems (hosts or routers) can communicate with each other. 16
  • 17. 17
  • 18. Timestamp Request and Reply • Two machines (hosts or routers) can use the timestamp-request and timestamp-reply messages to: – determine the round-trip time needed for an IP datagram to travel between them – synchronize the clocks in two machines 18
  • 19. 19
  • 20. 20
  • 21. 21
  • 22. 22
  • 24. • In ICMP the checksum is calculated over the entire message (header and data) 24
  • 25. 25
  • 26. 26
  • 28. Ping • We can use the ping program to find if a host is alive and responding • The source host sends ICMP echo request messages (type: 8, code: 0); the destination, if alive, responds with ICMP echo reply messages • The ping program sets the identifier field in the echo request and reply message and starts the sequence number from 0; this number is incremented by one each time a new message is sent • Note that ping can calculate the round-trip time. It inserts the sending time in the data section of the message. When the packet arrives it subtracts the arrival time from the departure time to get the round-trip time (RTT). 28
  • 29. 29
  • 30. Traceroute • The traceroute program in UNIX or tracert in Windows can be used to trace the route of a packet from the source to the destination 30
  • 31. 31