SlideShare a Scribd company logo
1 of 32
M.Swarna Sudha
Assistant Professor(Senior Grade)
CSE Department
Ramco Institute of Technology
Rajapalayam
1
2
Position of ICMP in the
network layer
 IP provides unreliable and connectionless
datagram
 The IP protocol is a best-effort delivery service
that delivers a datagram from its original source
to its final destination.
 IP has two deficiencies:
 Lack of error control and
 Lack of assistance mechanisms
 The IP protocol has no error-reporting or error-
correcting mechanism.
3
What happens if something goes
wrong?
 What happens if a router must discard a
datagram because it cannot find a router to the
final destination, or because the time-to-live
field has a zero value?
 What happens if the final destination host must
discard all fragments of a datagram because it
has not received all fragments within a
predetermined time limit?
4
Lacks a mechanism for host and
management queries.
 A host sometimes needs to determine if a
router or another host is alive.
 And sometimes a network administrator needs
information from another host or router
5
.
6
There is no flow-control mechanism in the IP protocol.
A router cannot detect all problems that prevent the delivery
of a packet.
 The Internet Control Message Protocol
(ICMP) has been designed to compensate for
the above two deficiencies.
Types of Messages
 ICMP messages are divided into two broad
categories:
 Error-reporting messages and
 query messages
.
7
 The error-reporting messages report problems
that a router or a host (destination) may
encounter when it processes an IP packet.
 The query messages, which occur in pairs,
help a host or a network manager get specific
information from a router or another host.
8
Message Format
 An ICMP message has an 8-byte header and a
variable-size data section
9
 Type, defines the type of the message.
 Code field specifies the reason for the
particular message type.
 The last common field is the checksum field.
 Rest of the header is specific for each message
type.
 Data section in error messages carries
information for finding the original packet that
had the error.
 In query messages, the data section carries
extra information based on the type of the
query. 10
Error Reporting
 One of the main responsibilities of ICMP is to
report errors.
 This means that error checking and error control
are not a concern of IP. ICMP was designed, in
part, to compensate for this shortcoming.
 ICMP does not correct errors-it simply reports
them.
 .
11
12
 Error messages are always sent to the original
source because the only information available in
the datagram about the route is the source and
destination IP addresses.
 ICMP uses the source IP address to send the
error message to the source (originator) of the
datagram
Figure 21.9 Error-reporting messages
Figure 21.10 Contents of data field for the error messages
Destination Unreachable
 When a router cannot route a datagram or a host
cannot deliver a datagram, the datagram is
discarded and the router or the host sends a
destination-unreachable message back to the
source host that initiated the datagram.
 Note that destination-unreachable messages can
be created by either a router or the destination
host.
15
Source Quench
 The IP protocol is a connectionless protocol.
There is no communication between the source
host, which produces the datagram, the routers,
which forward it, and the destination host,
which processes it.
 IP does not have a flow control mechanism
embedded in the protocol.
 The lack of flow control can create a major
problem in the operation of IP: Congestion.
16
 The source host never knows if the routers or the
destination host has been overwhelmed with
datagrams.
 The source host never knows if it is producing
datagrams faster than can be forwarded by
routers or processed by the destination host.
 The lack of flow control can create congestion in
routers or the destination host.
 When a router or host discards a datagram due to
congestion, it sends a source-quench message to
the sender of the datagram
17
This message has two purposes.
 First, it informs the source that the datagram has
been discarded.
 Second, it warns the source that there is
congestion somewhere in the path and that the
source should slow down (quench) the sending
process.
18
Time Exceeded
The time-exceeded message is generated in two
cases:
 Routers use routing tables to find the next hop
(next router) that must receive the packet.
 If there are errors in one or more routing tables,
a packet can travel in a loop or a cycle, going
from one router to the next or visiting a series of
routers endlessly.
 Each datagram contains a field called time to live
that controls this situation.
19
 When a datagram visits a router, the value of
this field is decremented by 1. When the time-
to-live value reaches 0, after decrementing, the
router discards the datagram.
 When the datagram is discarded, a time-
exceeded message must be sent by the router
to the original source
20
Parameter problem
21
• In a time-exceeded message, code 0 is used
only by routers to show that the value of the
time-to-live field is zero.
• Code 1 is used only by the destination host to
show that not all of the fragments have arrived
within a set time.
Redirection
22
23
Redirection
• Host A wants to send a datagram to host B
• Router R2 is obviously the most efficient routing
choice, but host A did not choose router R2.
• The datagram goes to R1 instead. Router R1, after
consulting its table, finds that the packet should have
gone to R2.
• It sends the packet to R2 and, at the same time, sends a
redirection message to host A.
• Host A's routing table can now be updated
A redirection message is sent from a router to a host
on the same local network.
21.24
Figure 21.12 Query messages
Contents of data field for the Query Message
25
Query
 In addition to error reporting, ICMP can
diagnose some network problems. This is
accomplished through the query messages
 In this type of ICMP message, a node sends a
message that is answered in a specific format by
the destination node.
 A query message is encapsulated in an IP
packet, which in turn is encapsulated in a data
link layer frame.
 However, in this case, no bytes of the original IP
are included in the message, 26
Echo Request and Reply
 The echo-request and echo-reply messages are
designed for diagnostic purposes.
 Network managers and users utilize this pair of
messages to identify network problems.
 The combination of echo-request and echo-reply
messages determines whether two systems
(hosts or routers) can communicate with each
other.
27
28
Echo-request and echo-reply messages can test the reachability of a
host. This is usually done by invoking the ping command.
Timestamp Request and Reply
 Two machines (hosts or routers) can use the
timestamp request and timestamp reply
messages to determine the round-trip time
needed for an IP datagram to travel between
them.
 It can also be used to synchronize the clocks in
two machines.
29
Timestamp-request and timestamp-reply messages can be
used to calculate the round-trip time between a source and
a destination machine even if their clocks are not
synchronized.
The timestamp-request and timestamp-reply messages can
be used to synchronize two clocks in two machines if the
exact one-way time duration is known.
30
Router Solicitation and Advertisement
• A host can broadcast a router solicitation
message.
• The router that receive the solicitation
message broadcast their routing information
using router advertisement message.
• A router can also periodically send router
advertisement even if no host has solicited.
Important points about ICMP error messages:
❏ No ICMP error message will be generated in
response to a datagram carrying an ICMP error
message.
❏ No ICMP error message will be generated for a
fragmented datagram that is not the first fragment.
❏ No ICMP error message will be generated for a
datagram having a multicast address.
❏ No ICMP error message will be generated for a
datagram having a special address such as
127.0.0.0 or 0.0.0.0.
Note
McGraw-Hill ©TheMcGraw-HillCompanies,Inc., 2000
Thank you

More Related Content

What's hot

QOS (Quality of Services) - Computer Networks
 QOS (Quality of Services) - Computer Networks QOS (Quality of Services) - Computer Networks
QOS (Quality of Services) - Computer NetworksIIIT Manipur
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network LayerRahul Hada
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer servicesMelvin Cabatuan
 
Network layer - design Issues
Network layer - design IssuesNetwork layer - design Issues
Network layer - design Issuesقصي نسور
 
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)Kruti Niranjan
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networksguesta81d4b
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionShubham Khedekar
 
Switching Concepts presentation
Switching Concepts presentationSwitching Concepts presentation
Switching Concepts presentationzameer Abbas
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayerRahul Hada
 
Sliding window protocol(ARQ technique)
Sliding window protocol(ARQ technique)Sliding window protocol(ARQ technique)
Sliding window protocol(ARQ technique)shilpa patel
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSDr. SELVAGANESAN S
 
Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point ProtocolPhan Vuong
 
Presentation Routing algorithm
Presentation Routing algorithmPresentation Routing algorithm
Presentation Routing algorithmBasit Hussain
 
Tcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport LayerTcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport Layertmavroidis
 

What's hot (20)

QOS (Quality of Services) - Computer Networks
 QOS (Quality of Services) - Computer Networks QOS (Quality of Services) - Computer Networks
QOS (Quality of Services) - Computer Networks
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
 
Routing
RoutingRouting
Routing
 
Routing Protocols
Routing ProtocolsRouting Protocols
Routing Protocols
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
 
Network layer - design Issues
Network layer - design IssuesNetwork layer - design Issues
Network layer - design Issues
 
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Switching Concepts presentation
Switching Concepts presentationSwitching Concepts presentation
Switching Concepts presentation
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayer
 
icmp , igmp
icmp , igmpicmp , igmp
icmp , igmp
 
Sliding window protocol(ARQ technique)
Sliding window protocol(ARQ technique)Sliding window protocol(ARQ technique)
Sliding window protocol(ARQ technique)
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point Protocol
 
Presentation Routing algorithm
Presentation Routing algorithmPresentation Routing algorithm
Presentation Routing algorithm
 
Tcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport LayerTcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport Layer
 
Icmp
IcmpIcmp
Icmp
 

Similar to Icmp (20)

(Icmp) internet control message protocol version 4
(Icmp) internet control message protocol version 4(Icmp) internet control message protocol version 4
(Icmp) internet control message protocol version 4
 
IT307 Exploring the Networks.pptx
IT307 Exploring the Networks.pptxIT307 Exploring the Networks.pptx
IT307 Exploring the Networks.pptx
 
Ch 19 Network-layer protocols - section 2
Ch 19   Network-layer protocols - section 2Ch 19   Network-layer protocols - section 2
Ch 19 Network-layer protocols - section 2
 
5. icmp
5. icmp5. icmp
5. icmp
 
ICMP.ppt
ICMP.pptICMP.ppt
ICMP.ppt
 
ICMPV4
ICMPV4ICMPV4
ICMPV4
 
Et3003 sem2-1314-8 network layers v (icmpv4)
Et3003 sem2-1314-8 network layers v (icmpv4)Et3003 sem2-1314-8 network layers v (icmpv4)
Et3003 sem2-1314-8 network layers v (icmpv4)
 
Network Layer Part 6
Network Layer Part 6Network Layer Part 6
Network Layer Part 6
 
NP - Unit 3 - Forwarding Datagram and ICMP
NP - Unit 3 - Forwarding Datagram and ICMPNP - Unit 3 - Forwarding Datagram and ICMP
NP - Unit 3 - Forwarding Datagram and ICMP
 
Ip and icmp
Ip and icmpIp and icmp
Ip and icmp
 
New Creators
New CreatorsNew Creators
New Creators
 
Unit 2 ppt 3.ppt
Unit 2 ppt 3.pptUnit 2 ppt 3.ppt
Unit 2 ppt 3.ppt
 
Icmp
IcmpIcmp
Icmp
 
Icmp
IcmpIcmp
Icmp
 
CN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptxCN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptx
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5
 
Networking essentials lect3
Networking essentials lect3Networking essentials lect3
Networking essentials lect3
 
Lecture9
Lecture9Lecture9
Lecture9
 
Qs.pptx
Qs.pptxQs.pptx
Qs.pptx
 

More from swarna sudha

Positioning, pointing and drawing in Human computer Interaction
Positioning, pointing and drawing in Human computer Interaction Positioning, pointing and drawing in Human computer Interaction
Positioning, pointing and drawing in Human computer Interaction swarna sudha
 
Introduction to data link layer
Introduction to data link layerIntroduction to data link layer
Introduction to data link layerswarna sudha
 
Range, quartiles, and interquartile range
Range, quartiles, and interquartile rangeRange, quartiles, and interquartile range
Range, quartiles, and interquartile rangeswarna sudha
 
Datatypes python programming
Datatypes   python programmingDatatypes   python programming
Datatypes python programmingswarna sudha
 
Foundations of hci the computer
Foundations of hci   the computerFoundations of hci   the computer
Foundations of hci the computerswarna sudha
 
Innovative teaching think pair share function
Innovative teaching think pair share  functionInnovative teaching think pair share  function
Innovative teaching think pair share functionswarna sudha
 

More from swarna sudha (6)

Positioning, pointing and drawing in Human computer Interaction
Positioning, pointing and drawing in Human computer Interaction Positioning, pointing and drawing in Human computer Interaction
Positioning, pointing and drawing in Human computer Interaction
 
Introduction to data link layer
Introduction to data link layerIntroduction to data link layer
Introduction to data link layer
 
Range, quartiles, and interquartile range
Range, quartiles, and interquartile rangeRange, quartiles, and interquartile range
Range, quartiles, and interquartile range
 
Datatypes python programming
Datatypes   python programmingDatatypes   python programming
Datatypes python programming
 
Foundations of hci the computer
Foundations of hci   the computerFoundations of hci   the computer
Foundations of hci the computer
 
Innovative teaching think pair share function
Innovative teaching think pair share  functionInnovative teaching think pair share  function
Innovative teaching think pair share function
 

Recently uploaded

Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 

Recently uploaded (20)

Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 

Icmp

  • 1. M.Swarna Sudha Assistant Professor(Senior Grade) CSE Department Ramco Institute of Technology Rajapalayam 1
  • 2. 2 Position of ICMP in the network layer
  • 3.  IP provides unreliable and connectionless datagram  The IP protocol is a best-effort delivery service that delivers a datagram from its original source to its final destination.  IP has two deficiencies:  Lack of error control and  Lack of assistance mechanisms  The IP protocol has no error-reporting or error- correcting mechanism. 3
  • 4. What happens if something goes wrong?  What happens if a router must discard a datagram because it cannot find a router to the final destination, or because the time-to-live field has a zero value?  What happens if the final destination host must discard all fragments of a datagram because it has not received all fragments within a predetermined time limit? 4
  • 5. Lacks a mechanism for host and management queries.  A host sometimes needs to determine if a router or another host is alive.  And sometimes a network administrator needs information from another host or router 5
  • 6. . 6 There is no flow-control mechanism in the IP protocol. A router cannot detect all problems that prevent the delivery of a packet.  The Internet Control Message Protocol (ICMP) has been designed to compensate for the above two deficiencies.
  • 7. Types of Messages  ICMP messages are divided into two broad categories:  Error-reporting messages and  query messages . 7
  • 8.  The error-reporting messages report problems that a router or a host (destination) may encounter when it processes an IP packet.  The query messages, which occur in pairs, help a host or a network manager get specific information from a router or another host. 8
  • 9. Message Format  An ICMP message has an 8-byte header and a variable-size data section 9
  • 10.  Type, defines the type of the message.  Code field specifies the reason for the particular message type.  The last common field is the checksum field.  Rest of the header is specific for each message type.  Data section in error messages carries information for finding the original packet that had the error.  In query messages, the data section carries extra information based on the type of the query. 10
  • 11. Error Reporting  One of the main responsibilities of ICMP is to report errors.  This means that error checking and error control are not a concern of IP. ICMP was designed, in part, to compensate for this shortcoming.  ICMP does not correct errors-it simply reports them.  . 11
  • 12. 12  Error messages are always sent to the original source because the only information available in the datagram about the route is the source and destination IP addresses.  ICMP uses the source IP address to send the error message to the source (originator) of the datagram
  • 14. Figure 21.10 Contents of data field for the error messages
  • 15. Destination Unreachable  When a router cannot route a datagram or a host cannot deliver a datagram, the datagram is discarded and the router or the host sends a destination-unreachable message back to the source host that initiated the datagram.  Note that destination-unreachable messages can be created by either a router or the destination host. 15
  • 16. Source Quench  The IP protocol is a connectionless protocol. There is no communication between the source host, which produces the datagram, the routers, which forward it, and the destination host, which processes it.  IP does not have a flow control mechanism embedded in the protocol.  The lack of flow control can create a major problem in the operation of IP: Congestion. 16
  • 17.  The source host never knows if the routers or the destination host has been overwhelmed with datagrams.  The source host never knows if it is producing datagrams faster than can be forwarded by routers or processed by the destination host.  The lack of flow control can create congestion in routers or the destination host.  When a router or host discards a datagram due to congestion, it sends a source-quench message to the sender of the datagram 17
  • 18. This message has two purposes.  First, it informs the source that the datagram has been discarded.  Second, it warns the source that there is congestion somewhere in the path and that the source should slow down (quench) the sending process. 18
  • 19. Time Exceeded The time-exceeded message is generated in two cases:  Routers use routing tables to find the next hop (next router) that must receive the packet.  If there are errors in one or more routing tables, a packet can travel in a loop or a cycle, going from one router to the next or visiting a series of routers endlessly.  Each datagram contains a field called time to live that controls this situation. 19
  • 20.  When a datagram visits a router, the value of this field is decremented by 1. When the time- to-live value reaches 0, after decrementing, the router discards the datagram.  When the datagram is discarded, a time- exceeded message must be sent by the router to the original source 20
  • 21. Parameter problem 21 • In a time-exceeded message, code 0 is used only by routers to show that the value of the time-to-live field is zero. • Code 1 is used only by the destination host to show that not all of the fragments have arrived within a set time.
  • 23. 23 Redirection • Host A wants to send a datagram to host B • Router R2 is obviously the most efficient routing choice, but host A did not choose router R2. • The datagram goes to R1 instead. Router R1, after consulting its table, finds that the packet should have gone to R2. • It sends the packet to R2 and, at the same time, sends a redirection message to host A. • Host A's routing table can now be updated A redirection message is sent from a router to a host on the same local network.
  • 25. Contents of data field for the Query Message 25
  • 26. Query  In addition to error reporting, ICMP can diagnose some network problems. This is accomplished through the query messages  In this type of ICMP message, a node sends a message that is answered in a specific format by the destination node.  A query message is encapsulated in an IP packet, which in turn is encapsulated in a data link layer frame.  However, in this case, no bytes of the original IP are included in the message, 26
  • 27. Echo Request and Reply  The echo-request and echo-reply messages are designed for diagnostic purposes.  Network managers and users utilize this pair of messages to identify network problems.  The combination of echo-request and echo-reply messages determines whether two systems (hosts or routers) can communicate with each other. 27
  • 28. 28 Echo-request and echo-reply messages can test the reachability of a host. This is usually done by invoking the ping command.
  • 29. Timestamp Request and Reply  Two machines (hosts or routers) can use the timestamp request and timestamp reply messages to determine the round-trip time needed for an IP datagram to travel between them.  It can also be used to synchronize the clocks in two machines. 29 Timestamp-request and timestamp-reply messages can be used to calculate the round-trip time between a source and a destination machine even if their clocks are not synchronized. The timestamp-request and timestamp-reply messages can be used to synchronize two clocks in two machines if the exact one-way time duration is known.
  • 30. 30 Router Solicitation and Advertisement • A host can broadcast a router solicitation message. • The router that receive the solicitation message broadcast their routing information using router advertisement message. • A router can also periodically send router advertisement even if no host has solicited.
  • 31. Important points about ICMP error messages: ❏ No ICMP error message will be generated in response to a datagram carrying an ICMP error message. ❏ No ICMP error message will be generated for a fragmented datagram that is not the first fragment. ❏ No ICMP error message will be generated for a datagram having a multicast address. ❏ No ICMP error message will be generated for a datagram having a special address such as 127.0.0.0 or 0.0.0.0. Note