SlideShare a Scribd company logo
IT307 Exploring the
Networks
ICMP
Presented By:
Kunal_Jangra--A2305219630_5CSE-9Y
Shivam_Tripathi--A2305219629_5CSE-9Y
What is ICMP Really is?
Internet Control Message Protocol (ICMP) is used to send control messages to
network devices and hosts. Routers and other network devices monitor the operation
of the network. When an error occurs, these devices can send a message using
ICMP.
ICMP
1. Error Handling
2. Request & Reply
Further Shivam
Tripathi is gonna
Represent
ICMP
MESSAGES
ERROR REPORTING – REPORTS PROBLEM
THAT ROUTER OR A HOST MAY ENCOUNTER
WHILE PROCESSING OF IP PACKET.
QUERY- HELP ROUTER OR A HOST TO GET
SPECIFIC INFORMATION ABOUT ANOTHER
HOST
Error Reporting Messages
• Error Reporting messages.
Error Reporting
Destination
unreachable
Source
Quench
Time Exceeded
Parameter
Problems
Redirection
Destination
unreachable
• When a route to the destination is not found
,datagram is discarded and the Router or a
host send Destination Unreachable message
back to the source.
Source
quench
• The purpose of the source quench message is congestion
control.
• This message informs the source that a datagram has been
discarded due to congestion.
• ICMP will take IP address of discarded packet and then add
the source quench message to the IP datagram to inform
the source host to reduce its transmission rate.
Time
exceeded
• Time exceeded is also known as ‘Time -To -Live’.
• This is the parameter that defines how long a packet
should live before it would be discarded.
• There are two ways when time exceeded message can e
generated:
• 1. Packet discarded due to some bad routing
implementation and this cause the looping issue and
network congestion .Due to the looping issue, the value of
TTL keeps on decrementing by the router, the Time
Exceeded message will be send by the router to the source
host.
• 2. When destination host does not receive all the
fragments in a certain time limit , then the received
fragments are also discarded , and the destination host
sends Time Exceeded message to the source.
Parameter
problem
• When a router or host discovers any missing
value in the IP datagram , the router discards
the datagram , and the ‘ Parameter problem ‘
message is sent back to the source host.
Redirection
• Redirection message is generated when host
consists of a small routing table.
• When the host consists of a limited number
of entries due to which It sends the datagram
to a wrong router.
• The router that receive a datagram will
forward a datagram to a correct router and
also sends the ‘ Redirection Message ‘ to the
host to update its routing table.
ICMP Query
messages
It is used to diagnose some Network
Problems.
1. ECHO Request and Reply – Designed for
the diagnostic purpose . These messages are
used to determine whether two system can
communicate with each other.
2. Timestamp Request and Reply - Two
machines uses these message to determine
the round-Trip time needed for an IP
datagram to travel between them.
Lets see practically what we
are talking about
Thank You
We Really Appreciate it.
you listen us

More Related Content

What's hot

Network entry success rate
Network entry success rateNetwork entry success rate
Network entry success rate
Shiraz316
 
Chapter12ccna
Chapter12ccnaChapter12ccna
Chapter12ccna
ernestlithur
 
Network layer Part 5
Network layer Part 5Network layer Part 5
Network layer Part 5
Tutun Juhana
 
Tcp
TcpTcp
Arp spoofing
Arp spoofingArp spoofing
Arp spoofing
Luthfi Widyanto
 
Arp
ArpArp
Presentation on arp protocol
Presentation on arp protocolPresentation on arp protocol
Presentation on arp protocol
Mohd. Ahmad Siddiqi
 
Firewall
FirewallFirewall
Firewall
Muuluu
 
Link state protocols.ppt
Link state protocols.pptLink state protocols.ppt
Link state protocols.ppt
Edgardo Scrimaglia
 
Iuwne10 S03 L02
Iuwne10 S03 L02Iuwne10 S03 L02
Iuwne10 S03 L02
Ravi Ranjan
 
What is LoRaNET?
What is LoRaNET?What is LoRaNET?
What is LoRaNET?
Antenna Manufacturer Coco
 
1. The Internet
1. The Internet1. The Internet
1. The Internet
jeckman1360
 
IP essentials
IP essentialsIP essentials
IP essentials
Luca Matteo Ruberto
 
Mod11
Mod11Mod11
UDP - User Datagram Protocol
UDP - User Datagram ProtocolUDP - User Datagram Protocol
UDP - User Datagram Protocol
Peter R. Egli
 
hajer
hajerhajer
hajer
ra na
 
TLE 10 (ICT): Configuring a Wireless Router
TLE 10 (ICT): Configuring a Wireless RouterTLE 10 (ICT): Configuring a Wireless Router
TLE 10 (ICT): Configuring a Wireless Router
Romne Ryan Portacion
 
Steps
StepsSteps
Tcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport LayerTcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport Layer
tmavroidis
 
Network Design For Alliance Française de Dhaka
Network Design For Alliance Française de DhakaNetwork Design For Alliance Française de Dhaka
Network Design For Alliance Française de Dhaka
MD. Naimur Rahman
 

What's hot (20)

Network entry success rate
Network entry success rateNetwork entry success rate
Network entry success rate
 
Chapter12ccna
Chapter12ccnaChapter12ccna
Chapter12ccna
 
Network layer Part 5
Network layer Part 5Network layer Part 5
Network layer Part 5
 
Tcp
TcpTcp
Tcp
 
Arp spoofing
Arp spoofingArp spoofing
Arp spoofing
 
Arp
ArpArp
Arp
 
Presentation on arp protocol
Presentation on arp protocolPresentation on arp protocol
Presentation on arp protocol
 
Firewall
FirewallFirewall
Firewall
 
Link state protocols.ppt
Link state protocols.pptLink state protocols.ppt
Link state protocols.ppt
 
Iuwne10 S03 L02
Iuwne10 S03 L02Iuwne10 S03 L02
Iuwne10 S03 L02
 
What is LoRaNET?
What is LoRaNET?What is LoRaNET?
What is LoRaNET?
 
1. The Internet
1. The Internet1. The Internet
1. The Internet
 
IP essentials
IP essentialsIP essentials
IP essentials
 
Mod11
Mod11Mod11
Mod11
 
UDP - User Datagram Protocol
UDP - User Datagram ProtocolUDP - User Datagram Protocol
UDP - User Datagram Protocol
 
hajer
hajerhajer
hajer
 
TLE 10 (ICT): Configuring a Wireless Router
TLE 10 (ICT): Configuring a Wireless RouterTLE 10 (ICT): Configuring a Wireless Router
TLE 10 (ICT): Configuring a Wireless Router
 
Steps
StepsSteps
Steps
 
Tcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport LayerTcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport Layer
 
Network Design For Alliance Française de Dhaka
Network Design For Alliance Française de DhakaNetwork Design For Alliance Française de Dhaka
Network Design For Alliance Française de Dhaka
 

Similar to IT307 Exploring the Networks.pptx

ICMP.ppt
ICMP.pptICMP.ppt
ICMP.ppt
AnilKumarD22
 
ICMP-IGMP protocols of Network Layer for ipv4
ICMP-IGMP protocols of Network Layer for ipv4ICMP-IGMP protocols of Network Layer for ipv4
ICMP-IGMP protocols of Network Layer for ipv4
AimanFatima200140
 
icmp_error_reporting_icmp_protocols.pptx
icmp_error_reporting_icmp_protocols.pptxicmp_error_reporting_icmp_protocols.pptx
icmp_error_reporting_icmp_protocols.pptx
Chaudharyshani2
 
NP - Unit 3 - Forwarding Datagram and ICMP
NP - Unit 3 - Forwarding Datagram and ICMPNP - Unit 3 - Forwarding Datagram and ICMP
NP - Unit 3 - Forwarding Datagram and ICMP
hamsa nandhini
 
5. icmp
5. icmp5. icmp
5. icmp
Swati Arora
 
Ch 19 Network-layer protocols - section 2
Ch 19   Network-layer protocols - section 2Ch 19   Network-layer protocols - section 2
Ch 19 Network-layer protocols - section 2
Hossam El-Deen Osama
 
ICMPV4
ICMPV4ICMPV4
Et3003 sem2-1314-8 network layers v (icmpv4)
Et3003 sem2-1314-8 network layers v (icmpv4)Et3003 sem2-1314-8 network layers v (icmpv4)
Et3003 sem2-1314-8 network layers v (icmpv4)
Tutun Juhana
 
05 coms 525 tcpip - icmp
05   coms 525 tcpip - icmp05   coms 525 tcpip - icmp
05 coms 525 tcpip - icmp
Palanivel Kuppusamy
 
(Icmp) internet control message protocol version 4
(Icmp) internet control message protocol version 4(Icmp) internet control message protocol version 4
(Icmp) internet control message protocol version 4
Gouasmia Zakaria
 
Network Layer Part 6
Network Layer Part 6Network Layer Part 6
Network Layer Part 6
Tutun Juhana
 
Ip and icmp
Ip and icmpIp and icmp
Ip and icmp
Programmer
 
New Creators
New CreatorsNew Creators
New Creators
guestf7a1f18
 
Icmp
IcmpIcmp
Icmp
IcmpIcmp
CN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptxCN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptx
Pondinesh2
 
Nnnnnn
NnnnnnNnnnnn
Nnnnnn
nautami
 
Transport Layer, Network layer.pptx
Transport Layer, Network layer.pptxTransport Layer, Network layer.pptx
Transport Layer, Network layer.pptx
MuhammadMoosaPanhwar
 
Funtions of i pv6
Funtions of i pv6Funtions of i pv6
Funtions of i pv6
thanhthat1
 
topicCybersecurity_4
topicCybersecurity_4topicCybersecurity_4
topicCybersecurity_4
Anne Starr
 

Similar to IT307 Exploring the Networks.pptx (20)

ICMP.ppt
ICMP.pptICMP.ppt
ICMP.ppt
 
ICMP-IGMP protocols of Network Layer for ipv4
ICMP-IGMP protocols of Network Layer for ipv4ICMP-IGMP protocols of Network Layer for ipv4
ICMP-IGMP protocols of Network Layer for ipv4
 
icmp_error_reporting_icmp_protocols.pptx
icmp_error_reporting_icmp_protocols.pptxicmp_error_reporting_icmp_protocols.pptx
icmp_error_reporting_icmp_protocols.pptx
 
NP - Unit 3 - Forwarding Datagram and ICMP
NP - Unit 3 - Forwarding Datagram and ICMPNP - Unit 3 - Forwarding Datagram and ICMP
NP - Unit 3 - Forwarding Datagram and ICMP
 
5. icmp
5. icmp5. icmp
5. icmp
 
Ch 19 Network-layer protocols - section 2
Ch 19   Network-layer protocols - section 2Ch 19   Network-layer protocols - section 2
Ch 19 Network-layer protocols - section 2
 
ICMPV4
ICMPV4ICMPV4
ICMPV4
 
Et3003 sem2-1314-8 network layers v (icmpv4)
Et3003 sem2-1314-8 network layers v (icmpv4)Et3003 sem2-1314-8 network layers v (icmpv4)
Et3003 sem2-1314-8 network layers v (icmpv4)
 
05 coms 525 tcpip - icmp
05   coms 525 tcpip - icmp05   coms 525 tcpip - icmp
05 coms 525 tcpip - icmp
 
(Icmp) internet control message protocol version 4
(Icmp) internet control message protocol version 4(Icmp) internet control message protocol version 4
(Icmp) internet control message protocol version 4
 
Network Layer Part 6
Network Layer Part 6Network Layer Part 6
Network Layer Part 6
 
Ip and icmp
Ip and icmpIp and icmp
Ip and icmp
 
New Creators
New CreatorsNew Creators
New Creators
 
Icmp
IcmpIcmp
Icmp
 
Icmp
IcmpIcmp
Icmp
 
CN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptxCN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptx
 
Nnnnnn
NnnnnnNnnnnn
Nnnnnn
 
Transport Layer, Network layer.pptx
Transport Layer, Network layer.pptxTransport Layer, Network layer.pptx
Transport Layer, Network layer.pptx
 
Funtions of i pv6
Funtions of i pv6Funtions of i pv6
Funtions of i pv6
 
topicCybersecurity_4
topicCybersecurity_4topicCybersecurity_4
topicCybersecurity_4
 

Recently uploaded

Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
Roger Rozario
 
Accident detection system project report.pdf
Accident detection system project report.pdfAccident detection system project report.pdf
Accident detection system project report.pdf
Kamal Acharya
 
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Transcat
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
aryanpankaj78
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
ElakkiaU
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
Paris Salesforce Developer Group
 
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
DharmaBanothu
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
PriyankaKilaniya
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
uqyfuc
 
This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...
DharmaBanothu
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
harshapolam10
 
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
ijseajournal
 
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls ChennaiCall Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
paraasingh12 #V08
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
VANDANAMOHANGOUDA
 
EV BMS WITH CHARGE MONITOR AND FIRE DETECTION.pptx
EV BMS WITH CHARGE MONITOR AND FIRE DETECTION.pptxEV BMS WITH CHARGE MONITOR AND FIRE DETECTION.pptx
EV BMS WITH CHARGE MONITOR AND FIRE DETECTION.pptx
nikshimanasa
 
AI in customer support Use cases solutions development and implementation.pdf
AI in customer support Use cases solutions development and implementation.pdfAI in customer support Use cases solutions development and implementation.pdf
AI in customer support Use cases solutions development and implementation.pdf
mahaffeycheryld
 
Assistant Engineer (Chemical) Interview Questions.pdf
Assistant Engineer (Chemical) Interview Questions.pdfAssistant Engineer (Chemical) Interview Questions.pdf
Assistant Engineer (Chemical) Interview Questions.pdf
Seetal Daas
 
openshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoinopenshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoin
snaprevwdev
 
Butterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdfButterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdf
Lubi Valves
 
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdfSri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
Balvir Singh
 

Recently uploaded (20)

Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
 
Accident detection system project report.pdf
Accident detection system project report.pdfAccident detection system project report.pdf
Accident detection system project report.pdf
 
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
 
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
 
This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
 
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
 
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls ChennaiCall Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
 
EV BMS WITH CHARGE MONITOR AND FIRE DETECTION.pptx
EV BMS WITH CHARGE MONITOR AND FIRE DETECTION.pptxEV BMS WITH CHARGE MONITOR AND FIRE DETECTION.pptx
EV BMS WITH CHARGE MONITOR AND FIRE DETECTION.pptx
 
AI in customer support Use cases solutions development and implementation.pdf
AI in customer support Use cases solutions development and implementation.pdfAI in customer support Use cases solutions development and implementation.pdf
AI in customer support Use cases solutions development and implementation.pdf
 
Assistant Engineer (Chemical) Interview Questions.pdf
Assistant Engineer (Chemical) Interview Questions.pdfAssistant Engineer (Chemical) Interview Questions.pdf
Assistant Engineer (Chemical) Interview Questions.pdf
 
openshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoinopenshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoin
 
Butterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdfButterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdf
 
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdfSri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
 

IT307 Exploring the Networks.pptx

  • 1. IT307 Exploring the Networks ICMP Presented By: Kunal_Jangra--A2305219630_5CSE-9Y Shivam_Tripathi--A2305219629_5CSE-9Y
  • 2. What is ICMP Really is?
  • 3. Internet Control Message Protocol (ICMP) is used to send control messages to network devices and hosts. Routers and other network devices monitor the operation of the network. When an error occurs, these devices can send a message using ICMP.
  • 4. ICMP 1. Error Handling 2. Request & Reply
  • 5.
  • 6. Further Shivam Tripathi is gonna Represent
  • 7.
  • 8. ICMP MESSAGES ERROR REPORTING – REPORTS PROBLEM THAT ROUTER OR A HOST MAY ENCOUNTER WHILE PROCESSING OF IP PACKET. QUERY- HELP ROUTER OR A HOST TO GET SPECIFIC INFORMATION ABOUT ANOTHER HOST
  • 9. Error Reporting Messages • Error Reporting messages. Error Reporting Destination unreachable Source Quench Time Exceeded Parameter Problems Redirection
  • 10. Destination unreachable • When a route to the destination is not found ,datagram is discarded and the Router or a host send Destination Unreachable message back to the source.
  • 11. Source quench • The purpose of the source quench message is congestion control. • This message informs the source that a datagram has been discarded due to congestion. • ICMP will take IP address of discarded packet and then add the source quench message to the IP datagram to inform the source host to reduce its transmission rate.
  • 12. Time exceeded • Time exceeded is also known as ‘Time -To -Live’. • This is the parameter that defines how long a packet should live before it would be discarded. • There are two ways when time exceeded message can e generated: • 1. Packet discarded due to some bad routing implementation and this cause the looping issue and network congestion .Due to the looping issue, the value of TTL keeps on decrementing by the router, the Time Exceeded message will be send by the router to the source host. • 2. When destination host does not receive all the fragments in a certain time limit , then the received fragments are also discarded , and the destination host sends Time Exceeded message to the source.
  • 13. Parameter problem • When a router or host discovers any missing value in the IP datagram , the router discards the datagram , and the ‘ Parameter problem ‘ message is sent back to the source host.
  • 14. Redirection • Redirection message is generated when host consists of a small routing table. • When the host consists of a limited number of entries due to which It sends the datagram to a wrong router. • The router that receive a datagram will forward a datagram to a correct router and also sends the ‘ Redirection Message ‘ to the host to update its routing table.
  • 15. ICMP Query messages It is used to diagnose some Network Problems. 1. ECHO Request and Reply – Designed for the diagnostic purpose . These messages are used to determine whether two system can communicate with each other. 2. Timestamp Request and Reply - Two machines uses these message to determine the round-Trip time needed for an IP datagram to travel between them.
  • 16. Lets see practically what we are talking about
  • 17. Thank You We Really Appreciate it. you listen us

Editor's Notes

  1. What is type and code in ICMP? ICMP is basically a network protocol used for diagnostics and network management. ... For example, type 8 is used for an ICMP request and type 0 is used for an ICMP reply. We use type 3 for destination unreachable messages. The second byte called code specifies what kind of ICMP message it is.